Results (79)
Search Parameters:
Keyword: ExtractionA Model for the Application of Automatic Speech Recognition for Generating Lesson Summaries
Automatic Speech Recognition (ASR) technology has the potential to improve the learning experience of students in the classroom. This article addresses some of the key theoretical areas identified in the pursuit of implementing a speech recognition system, capable of lesson summary generation in the educational setting. The article discusses: some of the applica- tions of…
Read MoreTexture Based Image Retrieval Using Semivariogram and Various Distance Measures
In a content-based image retrieval system(CBIR) feature classification,identification, and ex- traction play an important role. The retrieval of images using a single feature is a challenging task in CBIR systems. The high retrieval rates are reported based on combining multiple features, multiple algorithms and preprocessing steps, feature classification, and segmentation because the image retrieval are…
Read MoreSIFT Implementation based on LEON3 Processor
This paper proposes a new method of implementation of the part of SIFT (Scale-Invariant Feature Transform) algorithm used to extract the feature of an image of a size 256×256 of pixels, which is mainly based on the using the LEON3 soft core processor .With this method it is possible to detect points of interest and…
Read MoreMultiple Machine Learning Algorithms Comparison for Modulation Type Classification Based on Instantaneous Values of the Time Domain Signal and Time Series Statistics Derived from Wavelet Transform
Modulation type classification is a part of waveform estimation required to employ spectrum sharing scenarios like dynamic spectrum access that allow more efficient spectrum utilization. In this work multiple classification features, feature extraction, and classification algorithms for modulation type classification have been studied and compared in terms of classification speed and accuracy to suggest the…
Read MoreSH-CNN: Shearlet Convolutional Neural Network for Gender Classification
Gender detection and age estimation become an active research area and a very important field today, wish has been widely used in various applications including them: biometrics, social network, Targeted advertising, access control, human-computer interaction, electronic customer, etc. The need to further improve the recognition or classification rate keeps increasing day after day. In this…
Read MoreWideband Active Switch for Electronic Warfare System Applications
Discrete component based ultra-wideband SPDT switch modelling, design and implementation challenges are reported in this article. The basic SPDT switch is planned to design using PIN diodes (bare die). Nonlinear parameters extraction steps of PIN diode from datasheets have been proposed in this article instead of using readymade nonlinear PIN diode models. Equalizers are designed…
Read MoreTowards a Documents Processing Tool using Traceability Information Retrieval and Content Recognition Through Machine Learning in a Big Data Context
In 1980, an application was developed to track, manage and store documents in electronic format. Scan technology has enabled organizations to digitize papers for easier document storage and tracking. Document management tools have since developed by introducing new functionalities, related to security, users services, workflow and audit. Our research is part of the context of…
Read MoreHuman Emotion Recognition Based on EEG Signal Using Fast Fourier Transform and K-Nearest Neighbor
Human emotional states can transform naturally and are recognizable through facial expressions, voices, or body movements, influenced by received stimuli. However, the articulation of emotions is not practicable by every individual, even when feelings of joy, sadness, or otherwise are experienced. Biomedically, emotions affect brain wave activities, as the continuously functioning brain cells communicate through…
Read MoreDesign of a Remote Real-time Groundwater Level and Water Quality Monitoring System for the Philippine Groundwater Management Plan Project
Recent technological advances allow us to utilize remote monitoring systems or real-time access of data. While the use of remote monitoring systems is not new, there are still numerous applications that can be explored and improved on, one such is groundwater level and quality monitoring. In the Philippines, the extraction of groundwater for both domestic…
Read MoreDense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile Phone
The ever-growing technology in mobile smartphones has enabled users to store sensitive and private information; as a result, it required the need for an improved security system. Previous approaches heavily relied on shallow machine learning algorithms that require feature extraction which is time consuming, laborious and can cause, resulting in poor authentication. In this paper,…
Read MoreA Fuzzy Controller Based SAPF for Power Quality Enhancement of Distribution System Integrated with Wind Energy Source
Wind energy is emerged rapidly as the most important and viable sustainable power source due to the mature technology and wide availability. The integration of wind energy sources and utilization of nonlinear loads having different characteristics results in several challenges in a distribution system. One of which is power quality issue .Hence, in this work,…
Read MoreEffective Segmented Face Recognition (SFR) for IoT
Face recognition technology becoming pervasive in the fields of computer vision, image processing, and pattern recognition. However, face recognition accuracy rates will decrease if training is done on disguised images with covered objects on a face area. This paper aims to propose a state-of-the-art face recognition methodology which could be applied in Internet of Things…
Read MoreInteractive Virtual Rehabilitation for Aphasic Arabic-Speaking Patients
Objective: Individuals with aphasia often experience significant problems in their daily lives and social participation. Technologies that address speech and language disorders deficit in merging between therapist’s major role and reinforcing the training between sessions at home. It also lacks the Arabic language attention; however, current systems are typically expensive and lack amusement. Moreover, cumulative…
Read MoreFeature Extractors Evaluation Based V-SLAM for Autonomous Vehicles
Visual Simultaneous Localization and Mapping known as V-SLAM, is an essential task for autonomous vehicles. It can be carried out using several sensors, in particular with on board cameras. To locate a vehicle, SLAM algorithms are based on two main tasks. The first task (front-end kernel) is intended to process images in order to provide…
Read MoreInvestment of Classic Deep CNNs and SVM for Classifying Remote Sensing Images
Feature extraction is an important process in image classification for achieving an efficient accuracy for the classification learning models. One of these methods is using the convolution neural networks. The use of the trained classic deep convolution neural networks as features extraction gives a considerable results in the remote sensing images classification models. So, this…
Read MoreReview of Orange Juice Extractor Machines
There is some agricultural equipment for post harvesting of Orange fruit Juice, all the machine is geared towards extraction of the fruit juice. Fruit juice extraction is the act of wringing out the juice content of fruits by way of an effective processing and storage which enhance reduction in wastage. Fruit juices which literally have…
Read MoreDifferential Evolution based Hyperparameters Tuned Deep Learning Models for Disease Diagnosis and Classification
With recent advancements in medical filed, the quantity of healthcare care data is increasing at a faster rate. Medical data classification is considered as a major research topic and numerous research works have been already existed in the literature. Presently, deep learning (DL) models offers an efficient method for developing a dedicated model to determine…
Read MoreFuzzy Recognition by Logic-Predicate Network
The paper presents a description and justification of the correctness of fuzzy recognition by a logic-predicate network. Such a network is designed to recognize complex structured objects that can be described by predicate formulas. The NP-hardness of such an object recognition requires to separate the learning process, leaving it exponentially hard, and the recognition process…
Read MoreA Support Vector Machine Based Technique for Fault Detection in A Power Distribution Integrated System with Renewable Energy Distributed Generation
The integration of renewable energy distributed generation (REDG) into the energized distribution power grid has become more popular in recent years. This has been escalated by the general global energy shortages. The REDG has proven to be effective for energy sustainability and reliability. However, there are technical challenges which arise from integrating REDG into the…
Read MoreArtificial Intelligence Approach for Target Classification: A State of the Art
The classification of static or mobile objects, from a signal or an image containing information as to their structure or their form, constitutes a constant concern of specialists in the electronic field. The remarkable progress made in past years, particularly in the development of neural networks and artificial intelligence systems, has further accentuated this trend.…
Read MoreKeyword Driven Image Description Generation System
Image description generation is an important area in Computer Vision and Natural Language Processing. This paper introduces a novel architecture for an image description generation system using keywords. The proposed architecture uses a high-level feature such as keywords for generating captions. The important component of caption generation is the deep Bidirectional LSTM network. The space…
Read MoreNonlinear \(\ell_{2,p}\)-norm based PCA for Anomaly Network Detection
Intrusion detection systems are well known for their ability to detect internal and external intrusions, it usually recognizes intrusions through learning the normal behaviour of users or the normal traffic of activities in the network. So, if any suspicious activity or behaviour is detected, it informs the users of the network. Nonetheless, intrusion detection system…
Read MoreImproved Nonlinear Fuzzy Robust PCA for Anomaly-based Intrusion Detection
Among the most popular tools in security field is the anomaly based Intrusion Detection System (IDS), it detects intrusions by learning to classify the normal activities of the network. Thus if any abnormal activity or behaviour is recognized it raises an alarm to inform the users of a given network. Nevertheless, IDS is generally susceptible…
Read MoreAlternative Real-time Image-Based Smoke Detection Algorithm
Most buildings are equipped with various types of sensors to detect smoke in the event of a fire, though most are located internally. Practically, smoke has to reach the sensor in order for the sensor to react. The limitations of these sensors are their inability to respond in the early stages of a fire, and…
Read MoreReview on Smart Electronic Nose Coupled with Artificial Intelligence for Air Quality Monitoring
With the advent of the Internet of Things Technologies (IOT), smart homes, and smart city applications, E-Nose was created. Almost of gas sensors consisting the electronic nose system suffer from cross sensitivity and lack of selectivity. Coupling smart gas sensors with artificial intelligence algorithms can thus empower conventional gas sensing technologies and increase accuracy in…
Read More
