The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the principal phase of extraction and recognition of the basic emotions in the Arabic speech applied to five emotional states were taken into effect; neutral, sadness, fear, anger and happiness. Emotional speech database REGIM TES [1] [23] was created and evaluated to provide all practical experiences of extraction. The selected descriptors in our study are; Pitch of voice, Energy,...
Handwritten text in any language is believed to convey a great deal of information about writers' personality and identity. Handwritten documents are frequently used as evidences in forensic tasks. Handwriting skills is learnt and developed from the early schooling stages. Research interest in behavioral biometrics was the main driving force behind the growth in research into Writer Identification...
Due to massive growth in digital media for communication, the number and size of videos being generated and accumulated is increasing and hence searching desired content from the video is becoming more complex. As text in videos provide additional information on the content of the videos, methods for text based retrieval is desired. This paper presents an approach to retrieve video clips having similar...
Crime pattern theory emphasize how crime appear from Spatio-temporal method. To get knowledge on crimes, it has to be studied in terms of space and time. Crime patterns and crime related activities research those spatio (location) distribution of crimes, omitting the temporal (time) dimensions. Exactly separation of crimes by space and time, example hour of a specific day, day of a specific week,...
The blockchain has fueled one of the most enthusiastic bursts of activity in applied cryptography in years, but outstanding problems in security and privacy research must be solved for blockchain technologies to go beyond the hype and reach their full potential. At the first IEEE Privacy and Security on the Blockchain Workshop (IEEE S&B), we presented peer-reviewed papers bringing together academia...
This paper presents a comparative study of four steganalysis techniques for speech/audio files. The Mel-Frequency Cepstral Coefficients (MFCCs) are used for the acoustical analysis of the audio files. The following steganalyzers are assessed: Support Vector Machines (SVMs), Gaussian Mixture Models (GMMs), Deep Belief Networks (DBNs) and Recurrent Neural Networks (RNNs). These steganalysis methods...
We demonstrate DANCE, a system that assists domain experts in the efficient resolution of integrity constraints violation. DANCE is demonstrated on the UEFA Champions League database, employing the ICDE'17 audience for effective data cleaning.
Oracle's Real Application Cluster (RAC) allows multiple database instances to run on different server nodes in a cluster against a shared set of data files. A critical aspect of an Oracle RAC system is that of instance recovery. When a node suffers from a hardware failure, or a database instance suffers from a software failure, instance recovery is performed by a surviving instance to ensure that...
In this paper, we address the problem of sampling from a set and reconstructing a set stored as a Bloom filter. To the best of our knowledge our work is the first to address this question. We introduce a novel hierarchical data structure called BloomSampleTree that helps us design efficient algorithms to extract an almost uniform sample from the set stored in a Bloom filter and also allows us to reconstruct...
This paper explores the causality and responsibility problem (CRP) for the non-answers to probabilistic reverse skyline queries (PRSQ). Towards this, we propose an efficient algorithm called CP to compute the causality and responsibility for the non-answers to PRSQ. CP first finds candidate causes, and then, it performs verification to obtain actual causes with their responsibilities, during which...
Here, we have focused to process inconsistent data through imprecise queries from a database which consists of neutrosophic and vague set. Neutrosophic set is based on truth, indeterminacy and false membership values where as vague set is based on truth and false membership value. Firstly, we have applied two different similarity measure formulas to measure closeness of two neutrosophic data and vague...
Fault localization is very important to both researchers and practitioners. Running tests is a useful approach to identify the fault location. Researchers have studied how to automatically identify faults in database applications [1], [2], [3]. However, those research considers the entire SQL statement as one line of code, indicating that the whole SQL statement contains errors. Little attention has...
In this paper, we have proposed a smart ration card using Radio frequency identification (RFID) technique, biometrics and SMS gateway to prevent the ration forgery. In this system, a RFID tag is used that carries family member details and the customer needs to show this tag at the ration shop. The user will also have to provide thumb impression on the biometric machine. If the user is found authentic...
Identification and apprehension of criminals by matching facial sketches with photographic faces is one of the major law enforcement applications of the modern world. Majority of the crime occur where there will not be any information available regarding the suspect. In such situation, forensic sketch artist who usually deals with the eyewitness of the crime or victim in order to draw the sketch that...
A knowledge about test activity is valuable information. To store and share the knowledge across software development projects is a key to achieve effective and efficient test activity. We have built a knowledge database about test types to reuse in new projects. However, the intentions of the test types are often misinterpreted when they are reused because of inappropriate descriptions of the test...
Source code reuse is a common practice in software development. Since industrial developers may accidentally reuse source files developed by open source software, clone detection tools are used to detect open source files in their closed source project. To execute a clone detection, developers need a database of existing open source software. While a web-service providing clone detection using a centralized...
A modern development in time and technology requires faster information broadcasting. United, personalized, intelligent information applications are more significant in business and private lives. Such appliances are cell phones, two-way pagers, personal organizers, screen phones, etc. An ACC (Android College Campus) is an application to access the organization and particularly by students well over...
The main aim of recognising gestures is to build a system that can identify human gestures that are specific and then to use them to put forth desired information to the device. By using mathematical algorithms, human gestures can be interpreted. This is referred to as Gesture Recognition. Mudra is an expressive form of gesture that is mainly used in Indian classical dance form where the gesture is...
Information retrieval and integration of web data is recent trend in today's world of technology. Huge amount of data is available in online repositories but most of it is hidden under deep web interfaces. As deep web is growing at a very fast rate it is becoming difficult to efficiently locate the deep-web interfaces and retrieving the required data. The large volume of web resources and the dynamic...
Networked Virtual Environments (NEV) are sets of disjointed virtual worlds which are topographically set apart from the users yet connected through the communication network to give them the illusion of being in the same virtual location. NVEs are increasingly receiving consideration from business and research point of view. Contrasted with various sorts of possible applications, NVEs require a high...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.