The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Prior works have been elaborated on activity inferences from context information sensed on smart phones. Most of sensing computations are performed on CPU of smart phones. Thus, Sensor Hub is designed to avoid CPU involvement. However, Sensor Hub has several limitations, such as limited memory space and computation power. Since activity inference is a classification problem, prior works have already...
Prediction of precipitation is a necessary tool in meteorology. To date, it is technologically and scientifically a challenging task for scientists and researchers around the globe. Rainfall is a liquid form of precipitation that depends primarily on humidity, temperature, pressure, wind speed, dew point, and so on. Because rainfall depends on several parameters, its prediction becomes very complex...
Indonesia has a large geographic area with large variance of quality service of education. This paper will analyze whether it has a correlation or not, between the quality level of school and its characteristic of geographic area. This paper describes performance of two kind of decision tree method in predicting level of accreditation for public junior high school in Bogor, West Java. With three scenarios...
The goal of this article is to analyse how the length of utterances affects performance of an automatic speech recognizer (ASR). Benchmarks of an ASR system were performed for utterances of various lengths on English and Czech corpora. Then the observed phenomena are tried to be explained theoretically. Eventually, results are summarized and some conclusions drawn.
In this paper, standard normal cloud model is adopted to deal with the randomness and fuzziness of power quality comprehensive assessment indicators, through quantifying qualitative indicators. Taking both the subjective and objective factors into consideration, the improved multi-level interactive decision-making mode is chosen to detemine the weights of different indexes, cosidering the two-way...
The aim of this paper was to separate the EEG recordings into cerebral and noncerebral waves and compare a statistical properties of chosen components using the coefficient of excess kurtosis. Noncerebral waves, particularly the ocular artifacts, should be properly identified, because some of them imitate the cerebral potentials. The eye opening and closure, blinks or eye flutter are similar to the...
The task of writer identification is based on the assumption of individuality of handwriting. While previous studies of individuality have considered different statistical extremes: representative population of the United States and a population of twins, the present study takes a third approach-an analysis of handwriting over time, specifically children's handwriting as they develop in early grades...
DoS attack is the threat to ICT (Information and communications technology) society. There are many existed detection methods, but countermeasures has been become difficult according to complication of attacks. In conventional methods, entropy-based methods detect attacks using the property of entropy that it enables to estimate increase and decrease of dispersion of header information values, like...
In the biomedical field, current technology allows for the collection of multiple data modalities from the same subject. In consequence, there is an increasing interest for methods to analyze multi-modal data sets. Methods based on independent component analysis have proven to be effective in jointly analyzing multiple modalities, including brain imaging and genetic data. This paper describes a new...
We have developed numerical approaches to dynamical analysis of heart rates, measured as interbeat or RR, intervals, based on entropy and fluctuation analyses in a large data base of consecutive Holter monitor recordings. In Part I, we present a RR interval-based classifier that distinguishes normal sinus rhythm (NSR), atrial fibrillation (AF) and sinus rhythm with ectopy with an accuracy of 99%,...
Night video surveillance is crucial to construct an all-weather video surveillance system. However, night video surveillance faces several problems: no color information, low brightness, low contrast, and low signal to noise ratio (SNR). These problems can introduce serious false and missing object detections. In this paper, we propose a novel night video surveillance method based on the image second-order...
Attacks against web servers and web-based applications remain a serious global network security threat. Attackers are able to compromise web services, collect confidential information from web data bases, interrupt or completely paralyze web servers. In this study, we consider the analysis of HTTP logs for the detection of network intrusions. First, a training set of HTTP requests which does not contain...
A brain-computer interface (BCI) is a system for direct communication between brain and computer. The P300 BCI system relies on an oddball paradigm to elicit the P300. With the aim to extract different P300 feature information from different subjects and reduce the data amount of electroencephalogram (EEG) in P300 classification, a P300 feature extraction algorithm is proposed, which is based on independent...
This paper proposes a new feature extraction scheme for speaker-independent Speech Emotion Recognition under both unsupervised and supervised conditions following a non-hierarchical process first and then a hierarchical one. The feature is derived from the Teager energy operated wavelet coefficients of speech signal. The wavelet coefficients enhanced by TE operation is used to compute entropy thus...
The present paper proposes wavelet based entropy features and Support Vector Machine (SVM) multi classifier for Heart Rate Variability (HRV) signals classification. The Heart Rate (HR) signals are obtained from ECG signals. The HR signal is decomposed into different frequency bands by wavelet decomposition. The entropy is calculated for each wavelet sub band coefficients. The wavelet based entropy...
The wide spread of World Wide Web has brought a new way of expressing the sentiments of individuals. It is also a medium with a huge amount of information where users can view the opinion of other users that are classified into different sentiment classes and are increasingly growing as a key factor in decision making. This paper contributes to the sentiment analysis for customers' review classification...
This paper introduces a novel method for forming efficient one-class classifier ensembles. A common problem in one-class classification is a complex structure of the target class, which often leads to creation of a too expanded decision boundary. We propose to employ a clustering step in order to partition the target class into atomic subsets and using these as input for one-class classifiers. By...
Determining the original file type of data fragments helps data recovery, spam detection, virus scanning, and network monitoring operations. In many cases, only unordered fragments of the original file are available for investigation. Therefore, we can only base on the content of a fragment to identify its file type. However, data fragments come with different sizes, as they may be the residual data...
In order to realize texture image segmentation, a new texture segmentation method is presented. The method fused with Local Binary Pattern (LBP), Gray-level Co-occurrence Matrix (GLCM) and permutation entropy. After processing the texture image by the rotation invariant LBP operator, the LBP image can be obtained. Then co-occurrence matrixes can be calculated in the LBP image, some features which...
Bai and Hancock recently proposed a novel information theoretic kernel for graphs, namely the Jensen-Shannon graph kernel. One drawback of their approach is that it cannot be applied to either attributed or labeled graphs. In this paper, we aim to define a new Jensen-Shannon diffusion kernel for attributed graphs. We commence by using a tree-index based label strengthening method on an attributed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.