Results (104)
Search Parameters:
Keyword: DatabaseSynthesis of SQL Queries from South African Local Language Narrations
English remains the language of choice for database courses and widely used for instruc- tion in nearly all South African universities, and also in many other countries. Novice programmers of native origins are mostly taught Structured Query Language (SQL) through English as the medium of instruction. Consequently, this creates a myriad of problems in understanding…
Read MoreDense SIFT–Flow based Architecture for Recognizing Hand Gestures
Several challenges like changes in brightness, dynamic background, occlusion and inconsistency of camera position make the recognition of hand gestures difficult in any vision-based method. Diversity in finger shape, size, distribution and motion dynamics is also a big constraint. This leads to the motivation in developing a dense Scale Invariant Feature Transform (SIFT) flow based…
Read MoreClassification of Handwritten Names of Cities and Handwritten Text Recognition using Various Deep Learning Models
This article discusses the problem of handwriting recognition in Kazakh and Russian languages. This area is poorly studied since in the literature there are almost no works in this direction. We have tried to describe various approaches and achievements of recent years in the development of handwritten recognition models in relation to Cyrillic graphics. The…
Read MoreInnovative Solution for Parking-Sharing of Private Institutions Using Various Occupancy Tracking Methods
This work presents an innovative solution for parking-sharing of private institutions based on daily occupancy patterns and using different real time tracking methods of vacant parking slots. The research objective consists in finding the most accurate cars detection method, for determining of vacant parking slots and updating them on application web page. Beside the technical…
Read MoreAdvances in Optimisation Algorithms and Techniques for Deep Learning
In the last decade, deep learning(DL) has witnessed excellent performances on a variety of problems, including speech recognition, object recognition, detection, and natural language processing (NLP) among many others. Of these applications, one common challenge is to obtain ideal parameters during the training of the deep neural networks (DNN). These typical parameters are obtained by…
Read MoreKnowledge Mapping of Virtual Academic Communities: A Bibliometric Study Using Visual Analysis
This study aims to provide a systematic and complete knowledge map for researchers in the field of virtual academic communities (VACs) and to help them quickly understand the key knowledge, evolution trends and research frontiers. This paper adopts the bibliometric method, with the help of bibliometric analysis software Citespace and VOSviewer quantitative analyze the retrieved…
Read MoreISR Data Processing in Military Operations
This paper provides an overview of Intelligence, Surveillance, and Reconnaissance (ISR) data with respect on NATO standards and recommendations; further presents methods, tools, and experiences in ISR data processing in military operations. The steps of the Intelligence cycle and disciplines Business Intelligence (BI), Data Warehousing, Data Mining, and Big Data are presented in the introduction.…
Read MoreSupervised Machine Learning Based Medical Diagnosis Support System for Prediction of Patients with Heart Disease
Application in the field of medical development has always been one of the most important research areas. One of these medical applications is the early prediction system for heart diseases especially; coronary artery disease (CAD) also called atherosclerosis. The need for a medical diagnosis support system is to detect atherosclerosis at the earlier stages to…
Read MoreTowards Directing Convolutional Neural Networks Using Computational Geometry Algorithms: Application to Handwritten Arabic Character Recognition
Suppose we want to classify a query item Q with a classification model that consists of a large set of predefined classes L and suppose we have a knowledge that indicates to us that the target class of Q belongs to a small subset from L. Naturally, this filtering will improve the accuracy of any…
Read MoreFacial Expression Recognition using Facial Landmarks: A Novel Approach
The universally common mode of interaction is the human emotions. Thus, there are several advantages of automated recognition of human facial expressions. The primary objective of the proposed framework in this paper, is to classify a person’s facial expression into anger, contempt, disgust, fear, happiness, sadness and surprise. Firstly, CLAHE is performed on the image…
Read MoreOverview of Solar Radiation Estimation Techniques with Development of Solar Radiation Model Using Artificial Neural Network
Estimation Solar radiation is the most significant part of the optimization of solar power. This may be achieved if the solar radiation is predicted well in advance. Meteorological stations have radiation measuring devices like pyranometer, pyrheliometer, radiometer, solarimeter, etc. however, it may not be available at the location of interest for researchers. Due to this…
Read MoreHuman-Robot Multilingual Verbal Communication – The Ontological knowledge and Learning-based Models
In their verbal interactions, humans are often afforded with language barriers and communication problems and disabilities. This problem is even more serious in the fields of education and health care for children with special needs. The use of robotic agents, notably humanoids integrated within human groups, is a very important option to face these limitations.…
Read MoreThe Role of KM in Enhancing AI Algorithms and Systems
Knowledge Management processes present a vital role in improving AI systems and algorithms. Many studies and reviews were carried out to examine the relationship between KM processes and AI systems. However, studies were focusing on specific methods and the impact on some AI algorithms, neglecting the role of other KM processes and how it may…
Read MoreSurvey Analysis: Enhancing the Security of Vectorization by Using word2vec and CryptDB
Vectorization is extracting data from strings through Natural Language Processing by using different approaches; one of the best approaches used in vectorization is word2vec. To make the vectorized data secure, we must apply a security method, which will be CryptDB. The paper is analyzing the survey, which is created to interview security engineers through the…
Read MoreComposition of Methods to Ensure Iris Liveness and Authenticity
In a biometric system technology, a person is authenticated based on processing the unique features of the human biometric signs. One of the well known biometric systems is iris recognition, this technique being considered as one of the most secure authentication solutions in the biometric field. However, several attacks do exist that are able to…
Read MoreGenerating a Blockchain Smart Contract Application Framework
Blockchain is a new generation technology that allows the central control mechanism or trusted authority to be removed, spreading the encrypted data across all participants in the network in a distributed database structure instead of central trust. The Smart Contract structure, which defines the rules and flow that allow the things we value to operate…
Read MoreUniversity Students Result Analysis and Prediction System by Decision Tree Algorithm
The main assets of universities are students. The performance of students plays a vital role in producing excellent graduate students who will be the future viable leader and manpower in charge of a country’s financial and societal progress. The purpose of this research is to develop a “University Students Result Analysis and Prediction System” that…
Read MoreA Study on the Effects of Combining Different Features for the Recognition of Handwritten Bangla Characters
This paper studies and compares the effectiveness of four different features and their combinations on the recognition accuracy of handwritten Bangla characters. The longest run, chain code histogram, shadow, and Gabor filter-based features and their eleven (11) combinations were tested on a standard Bangla database of 15; 000 basic handwritten characters to compare their recognition…
Read MoreNAO Humanoid Robot Obstacle Avoidance Using Monocular Camera
In this paper, we present an experimental approach that allows a humanoid robot to effectively plan and execute whole body motions, like climbing obstacles and straight stairs up or down, besides jumping over obstacles using only on-board sensing. Re- liable and accurate motion sequence for humanoid employed in complex indoor en- vironments is a necessity…
Read MoreThe Financial Services Authority of Indonesia E-Reporting System Development Based on Metadata XBRL Taxonomy
The XBRL taxonomy has been proven to be able to restore various forms of redundancies and ambiguities in making financial reports from financial service institutions. However, the nature of XBRL which is oriented towards documents and based on XML makes the XBRL taxonomy difficult to use because the information cannot be directly read by ordinary…
Read MoreCSFs for the Implementation of the Hybrid Lean ERP System. Stakeholders Interactions
Lean ERP system is considered among the new trends of systems in the manufacturing sector, it has become one of the most widely adopted systems, thanks to its various benefits such as: a centralized database which gathers all the data of the enterprise in a single database which is accessible to all the departments, reduction…
Read MoreFuzzy Modelling using Firefly Algorithm for Phishing Detection
A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm…
Read MoreMultiscale Texture Analysis and Color Coherence Vector Based Feature Descriptor for Multispectral Image Retrieval
Content Based Image Retrieval (CBIR) for remote sensing image data is a tedious process due to high resolution and complexity of image interpretation. Development of feature extraction technique is a major portion to represent the image content in an optimal way. In this paper, we propose a feature descriptor which combines the color coherent pixel…
Read MoreSpiral Curve for Revocable Touchless Fingerprint Template Securisation
Fingerprint data is really protected by cancelable fingerprint template because it can be revoked when compromise and a new one can be reissued. We develop a touchless cancelable fingerprint template whose algorithm was published in our previous work. We implement here the algorithm and conducted several tests on several databases to confirm the stability of…
Read MoreIntelligent Wireless System for PV Supervision Based on The Raspberry Pi
Photovoltaic systems and monitoring go hand in hand. There is no better way to check the health of your photovoltaic system than to utilize a remote monitoring system. Monitoring and tracking of photovoltaic systems are crucial for reliable functioning and optimal yield of any solar electric system. This paper aims to introduce a remote electronic…
Read More
