Results (95)
Search Parameters:
Keyword: IdentificationHuman Emotion Recognition Based on EEG Signal Using Fast Fourier Transform and K-Nearest Neighbor
Human emotional states can transform naturally and are recognizable through facial expressions, voices, or body movements, influenced by received stimuli. However, the articulation of emotions is not practicable by every individual, even when feelings of joy, sadness, or otherwise are experienced. Biomedically, emotions affect brain wave activities, as the continuously functioning brain cells communicate through…
Read MoreHand-Based Biometric Recognition Technique – Survey
In today’s modern world, reliable automatic personal recognition is a crucial area of discussion, primarily because of the increased security risks. A large number of systems first require the recognition of a person before they can access their services. Biometric recognition can be used, which can be understood as automatic identification or automatic verification of…
Read MoreDesign and Implementation a Novel System for Estimation Precise Transfer Function of DC Motor
A precise modelling plant system is substantial to improve the design of the DC motor controller, where a low accurate model may cause an unacceptable controller system. This study presents a hardware-in-the-loop (HIL) system for design a high speed motor data acquisition system (HSMDAQS) and injected collected data (ICD) Simulink model to estimate accurately the…
Read MorePath Loss Estimation for Some Korek-Telecom Sites Operating at (1.8) GHz and (2.1) GHz for Urban and Suburban Area in Erbil City
This investigation deals with the identification of the suitable empirical models for predicting radio wave propagation path losses in Erbil city of Kurdistan region in Iraq. For this purpose, two sites of Korek Telecom operating at 1800 MHz and 2100 MHz have been selected at urban and sub-urban environments in the city and seven different…
Read MoreStudent’s Belief Detection and Segmentation for Real-Time: A Case Study of Indian University
This paper has explored the technology beliefs of university students considering four parameters. We have proposed an automatic belief identification system for academic institutions. For this, we used two different clustering algorithms to segment the student group with different beliefs about the technology. In the Hierarchical Clustering (HC), the Agglomerative approach was followed. The beliefs…
Read MoreSemiclassical Theory for Bacteria Motility Under External Electric Fields and Interactions with Nanodevices
The accurate identification and characterization of microbiological species is a must that allows us to design engineered pharmacology to tackle down the diversity of diseases derived of them. This paper presents a study about the usage of both classical dynamical and electrodynamics in conjunction to the Feynman’s path integral to describe as well as identify…
Read MoreArtificial Intelligence Approach for Target Classification: A State of the Art
The classification of static or mobile objects, from a signal or an image containing information as to their structure or their form, constitutes a constant concern of specialists in the electronic field. The remarkable progress made in past years, particularly in the development of neural networks and artificial intelligence systems, has further accentuated this trend.…
Read MoreA Fuzzy-PID Controller Combined with PSO Algorithm for the Resistance Furnace
The paper presents a novel control strategy applying the particle swarm optimization (PSO) algorithm to optimize the scaling weights coefficients of the fuzzy-PID controller for the resistance furnace temperature control system, called PSO-based fuzzy-PID controller/ algorithm. The proposed PSO-based fuzzy-PID controller in this paper consist of the fuzzy-PID controller and the PSO algorithm. The proposed…
Read MoreRacial Categorization Methods: A Survey
Face explicitly provides the direct and quick way to evaluate human soft biometric information such as race, age and gender. Race is a group of human beings who differ from human beings of other races with respect to physical or social attributes. Race identification plays a significant role in applications such as criminal judgment and…
Read MoreA Survey on Image Forgery Detection Using Different Forensic Approaches
Recently, digital image forgery detection is an emergent and important area of image processing. Digital image plays a vital role in providing evidence for any unusual incident. However, the image forgery my hide evidence and prevents the detection of such criminal cases due to advancement in image processing and availability of sophisticated software tamper of…
Read MorePerformance Effects of Algorithmic Elements in Selected MANETs Routing Protocols
Over time, several routing protocols have been suggested for use in Mobile Ad Hoc Networks (MANETs). Because of availability of so many MANETs routing protocols, network engineers and administrators face difficulties in identifying an appropriate routing protocol for a particular scenario. This challenge results from the unavailability of adequate technical analytic studies designed to examine…
Read MoreEnhancing an SDN Architecture with DoS Attack Detection Mechanisms
A Software Defined Network (SDN) architecture is characterized by decoupling the data plane and control plane. This feature enables the establishment of a programmable environ- ment in which the control plane acts under the data plane, managing and configuring the network over a standard protocol, such as OpenFlow. Although there are numerous benefits to the…
Read MoreTransfer Learning and Fine Tuning in Breast Mammogram Abnormalities Classification on CBIS-DDSM Database
Breast cancer has an important incidence in women mortality worldwide. Currently, mam- mography is considered the gold standard for breast abnormalities screening examinations, since it aids in the early detection and diagnosis of the illness. However, both identification of mass lesions and its malignancy classification is a challenging problem for artificial intelligence. In this work,…
Read MoreClassification System for the Interpretation of the Braille Alphabet through Image Processing
The Braille language system or also known as the language for the blind people was created so that these people can understand the vocabulary words depending on the country in which they are located, this system is based on points in which the points raised or also known as the largest points depending on their…
Read MoreFuzzy Modelling using Firefly Algorithm for Phishing Detection
A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. To generate the fuzzy parameters automatically, an optimization method is needed. One of the suitable methods provides the Firefly Algorithm (FA). FA is a nature-inspired algorithm…
Read MoreEKMC: Ensemble of kNN using MetaCost for Efficient Anomaly Detection
Anomaly detection aims at identification of suspicious items, observations or events by differing from most of the data. Intrusion Detection, Fault Detection, and Fraud Detection are some of the various applications of Anomaly Detection. The Machine learning classifier algorithms used in these applications would greatly affect the overall efficiency. This work is an extension of…
Read MoreVerification of the Usefulness of Personal Authentication with Aerial Input Numerals Using Leap Motion
With the progress of IoT, everything is going to be connected to the network. It will bring us a lot of benefits however some security risks will be occurred by connecting network. To avoid such problems, it is indispensable to strengthen security more than now. We focus on personal authentication as one of the security.…
Read MoreDFIG Defects Diagnosis Method for Wind Energy Conversion Chain
This paper is an extension of research work originally presented in 2018 IEEE fifth International Congress on Information Science and Technology (CiSt). The research consists on developing method to diagnose electrical defects affecting wind turbine doubly-fed induction generator DFIG which constitutes a crucial part of wind energy conversion chain. First off all, we create a…
Read MoreApplication of Fractal Algorithms to Identify Cardiovascular Diseases in ECG Signals
The aim of this article was the identification of cardiovascular diseases, after applying Katz and Higuchi fractal algorithms on 4 databases of ECG signals downloaded from the Physionet website: heart failure (HF), hypertension (H), ischemic heart disease (IHD) and normal sinus rhythm (NSR). For this purpose, initially the ECG signals passed through a filtering stage…
Read MoreDevelopment of Tactile Display and an Efficient Approach to Enhance Perceptual Analysis in Rehabilitation
Tactile displays are widely used in the rehabilitation and education of blind persons, as it is one of the media of communication amongst them. Tactile display performance is measured in terms of accuracy in presenting pattern, accuracy in identification, recognition and reading time of presented pattern. However, it has had meager attention from researchers. This…
Read MoreState Estimation based Echolocation Bionics and Image Processing based Target Pattern Recognition
This paper deals with the theoretical aspect of bat echolocation and bionics, and image processing-based target recognition and identification methods. The state estimation methods utilizing the linear rustic filters such as fixed gain and Kalman filters are studied and implemented for echolocation bionics for estimating the LOS distance. A complete mathematical modeling and simulation of…
Read MoreModified HOG Descriptor-Based Banknote Recognition System
This survey paper deals with the structural health monitoring systems on the basis of methodologies involving intelligent techniques. The intelligent techniques are the most popular tools for damage identification in terms of high accuracy, reliable nature and the involvement of low cost. In this critical survey, a thorough analysis of various intelligent techniques is carried…
Read MoreRecent Advances in Intelligent-Based Structural Health Monitoring of Civil Structures
This survey paper deals with the structural health monitoring systems on the basis of methodologies involving intelligent techniques. The intelligent techniques are the most popular tools for damage identification in terms of high accuracy, reliable nature and the involvement of low cost. In this critical survey, a thorough analysis of various intelligent techniques is carried…
Read MoreThe impact of Big Data on the Android Mobile Platform for Natural Disaster Situations
This application developing for the project OCEMA comes as result of architecture building in Android, then the development of a professional modeling in Talend Open Studio for Big Data, which enabled the integration of data from many data sources. One of its uses is the quick identification of people found in areas affected by natural…
Read MoreCancer Mediating Genes Recognition using Multilayer Perceptron Model- An Application on Human Leukemia
In the present article, we develop multilayer perceptron model for identification of some possible genes mediating different leukemia. The procedure involves grouping of gene based correlation coefficient and finally select of some possible genes. The procedure has been successfully applied three human leukemia gene expression data sets. The superiority of the procedure has been demonstrated…
Read More
