The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For i-vector model, normalization approach is Probabilistic linear discriminant analysis and has a significant performance for verification of speaker. However it requires a huge development data which cost a lot in many cases. Unsupervised adaption method is a possible approach, which use unlabeled data to adapt PLDA scattering matrices to the target domain. In this paper, ‘local training’ approach...
The k-nearest neighbor (KNN) based indoor localization methods are practical to the wireless sensor network constructed by internet of things. The weighted KNN (WKNN) method is designed as the enhanced KNN but actually does not outperform KNN. Inspired by the technique of differential coordinates from satellite-based localization, in this paper we propose the differential coordinate based WKNN (DC-WKNN)...
With the rapid development of computer and network technology, micro-blog system provides to exchange information and proceed social life. It provides very favorable ways. Especially, how to quickly obtain information and release information, sharing of information in today's society become a research direction for a big data. In this paper, we based on Struts2, JSP, MySql, Ajax and JQuery related...
In this paper, we addressed in social network visualization for people's interest in music. This visualization system designed for interest in music on social networks provides several capabilities: (A) visualization for friends who share the same interest in music, (B) to group people who share the same interest in music into categories, and (C) to recommend songs function for an increase in the...
Hidden behind domain names, there are lucrative (and ingenious) business models that misuse/abuse the DNS namespace and employ a diversified form of monetization. To curb some of those abuses, many research works have been proposed. However, while having a clear contribution and advancing the state-of-the-art, these works are constrained by their limited datasets and none of them present a survey...
In the traditional concept, to become a professional cartoonist, need to accept a long time of painting training and implementation, and in the screen and the role and script design, the need to have a certain degree of imagination or talent, with these related Of the creative ability to create a fascinating comic works, this is not an easy thing.
At present, most of the automobile engine temperature warning system are using the indicator light and sound alert to remind the drivers when the engine overheat happens, and there is no sufficient data to provide the drivers for further advices or solutions and without a database to record, that would increase the tension to cause the error operation of the drivers.
Printing good-sized complicated practical report forms is one puzzle in application system with B/S architecture. In order to solve this problem, performing data exchange using XML to come true printing is explored. Windows Form in the framework of .NET is embedded in FrontPage. By self-programming, XML document is analyzed and client-side printing is controlled. Fundamental technique on implementing...
Outdoor sports equipment without maintenance usually caused injury to users. This paper proposes to design an App notification system combine with IoT to monitor the equipment status. We converted our action signal into frequency domain for analysis. But the useless signal might decline classifier efficiency. Therefore we propose an empirical support vector machine (SVM) to reduce the useless signal...
AMNESiA is an affinity measurement platform for NFV-enabled networks, designed to consolidate and interpret existing monitoring data into an affinity metric, aiding operators to identify affinity and anti-affinity relations in the network. AMNESiA uses the latest snapshot of usage data, collected through a generic monitoring solution, from the database to measure affinity between VNFs.
A random-walk-based (RW-based) information search makes a single query or multiple queries walk around a network to search for the target information. Local navigation rules, based on which a query chooses an adjacent node to move from the current location, are important for increasing the search speed of the RW-based information search. In the present paper, we focus on degree-dependent navigation...
We have presented the real time database management in mobile computing system and supported by mobile computing system. The process of the system including various mobile system those are wireless network, the database management, disconnection.
Text in natural scenes provides many information for peoples and presents an essential tool to interact with their environment. Therefore, recognizing text existing in camera-captured images has become an important issue for many researches in the last decades. Currently, there isn't any available dataset of Arabic script text images in the wild. Since our aim is to help the research community in...
In this paper, we present a segmentation method of handwritten Arabic texts. The proposed method uses the algorithm for construction of the Outer Isothetic Cover (OIC) of a digital object. This technique 3allows the construction of polygons of all connected components on the binary image of the document. The first specificity of this method is that it allows the extraction of the shape of the script...
In this paper we present a new database with handwritten Arabic script. It is based on five books written by different writers from the years 1088–1451. We took 680 pages from these five books, and fully annotated them on the sub-word level. For each page we manually applied bounding boxes on the different sub-words and annotated the sequence of characters. It consists of 121,636 sub-word appearances...
Offline Arabic handwriting recognition has been a challenging sequence modeling problem due to the cursive nature of Arabic script. This paper proposes a four-layer bidirectional Gated Recurrent Unit (GRU) network incorporated with dropout mechanism, which improves the model capacity and the generalization ability compared with a baseline system of a three-layer Long Short Term Memory (LSTM) network...
A comprehensive Arabic handwritten text database is an important resource for Arabic handwritten text recognition research. It is essential for training text recognition algorithms and vital for evaluating the performance of these algorithms. In this paper, we present a database that includes manuscripts from the Islamic heritage project (IHP), consisting of 333 historical manuscripts written by 302...
In today's high paced world where time management stands next to God, it becomes very essential to manage all our roles as well as goals, in order to complete the given task on time. The inability of an individual to do so might lead to serious consequences. At times one might feel extreme pressure and cannot stop worrying about tomorrow's job and pending deadlines. Along with this one has to also...
This paper presents the principal phase of extraction and recognition of the basic emotions in the Arabic speech applied to five emotional states were taken into effect; neutral, sadness, fear, anger and happiness. Emotional speech database REGIM TES [1] [23] was created and evaluated to provide all practical experiences of extraction. The selected descriptors in our study are; Pitch of voice, Energy,...
Handwritten text in any language is believed to convey a great deal of information about writers' personality and identity. Handwritten documents are frequently used as evidences in forensic tasks. Handwriting skills is learnt and developed from the early schooling stages. Research interest in behavioral biometrics was the main driving force behind the growth in research into Writer Identification...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.