Abstract: In this paper, we present an optimization technique or
a learning algorithm using the hybrid architecture by combining the
most popular sequence recognition models such as Recurrent Neural
Networks (RNNs) and Hidden Markov models (HMMs). In order to
improve the sequence/pattern recognition/classification performance
by applying a hybrid/neural symbolic approach, a gradient descent
learning algorithm is developed using the Real Time Recurrent
Learning of Recurrent Neural Network for processing the knowledge
represented in trained Hidden Markov Models. The developed hybrid
algorithm is implemented on automata theory as a sample test beds
and the performance of the designed algorithm is demonstrated and
evaluated on learning the deterministic finite state automata.
Abstract: In the last decade the emergence of new social needs
as an effect of the economic crisis has stimulated the flourishing of
business endeavours characterised by explicit social goals. Social
start-ups, social enterprises or Corporate Social Responsibility
operations carried out by traditional companies are quintessential
examples in this regard. This paper analyses these kinds of initiatives
in order to discover the main characteristics of social business models
and to provide insights to social entrepreneurs for developing or
improving their strategies. The research is conducted through the
integration of literature review and case study analysis and, thanks to
the recognition of the importance of both profits and social impacts
as the key success factors for a social business model, proposes a
framework for identifying indicators suitable for measuring the social
impacts generated.
Abstract: In this paper, we present a comparative study of three
methods of 2D face recognition system such as: Iso-Geodesic Curves
(IGC), Geodesic Distance (GD) and Geodesic-Intensity Histogram
(GIH). These approaches are based on computing of geodesic
distance between points of facial surface and between facial curves.
In this study we represented the image at gray level as a 2D surface in
a 3D space, with the third coordinate proportional to the intensity
values of pixels. In the classifying step, we use: Neural Networks
(NN), K-Nearest Neighbor (KNN) and Support Vector Machines
(SVM). The images used in our experiments are from two wellknown
databases of face images ORL and YaleB. ORL data base was
used to evaluate the performance of methods under conditions where
the pose and sample size are varied, and the database YaleB was used
to examine the performance of the systems when the facial
expressions and lighting are varied.
Abstract: Due to the fast and flawless technological innovation
there is a tremendous amount of data dumping all over the world in
every domain such as Pattern Recognition, Machine Learning, Spatial
Data Mining, Image Analysis, Fraudulent Analysis, World Wide
Web etc., This issue turns to be more essential for developing several
tools for data mining functionalities. The major aim of this paper is to
analyze various tools which are used to build a resourceful analytical
or descriptive model for handling large amount of information more
efficiently and user friendly. In this survey the diverse tools are
illustrated with their extensive technical paradigm, outstanding
graphical interface and inbuilt multipath algorithms in which it is
very useful for handling significant amount of data more indeed.
Abstract: In this paper, we describe the use of formal methods
to model malware behaviour. The modelling of harmful behaviour
rests upon syntactic structures that represent malicious procedures
inside malware. The malicious activities are modelled by a formal
grammar, where API calls’ components are the terminals and the set
of API calls used in combination to achieve a goal are designated
non-terminals. The combination of different non-terminals in various
ways and tiers make up the attack vectors that are used by harmful
software. Based on these syntactic structures a parser can be
generated which takes execution traces as input for pattern
recognition.
Abstract: This paper presents the interface ConductHome which
controls home automation systems with a Leap Motion using
“invariant gesture protocols”. This interface is meant to simplify the
interaction of the user with its environment. A hardware part allows
the Leap Motion to be carried around the house. A software part
interacts with the home automation box and displays the useful
information for the user. An objective of this work is the
development of a natural/invariant/simple gesture control interface to
help elder people/people with disabilities.
Abstract: In some applications, such as image recognition or
compression, segmentation refers to the process of partitioning a
digital image into multiple segments. Image segmentation is typically
used to locate objects and boundaries (lines, curves, etc.) in images.
Image segmentation is to classify or cluster an image into several
parts (regions) according to the feature of image, for example, the
pixel value or the frequency response. More precisely, image
segmentation is the process of assigning a label to every pixel in an
image such that pixels with the same label share certain visual
characteristics. The result of image segmentation is a set of segments
that collectively cover the entire image, or a set of contours extracted
from the image. Several image segmentation algorithms were
proposed to segment an image before recognition or compression. Up
to now, many image segmentation algorithms exist and be
extensively applied in science and daily life. According to their
segmentation method, we can approximately categorize them into
region-based segmentation, data clustering, and edge-base
segmentation. In this paper, we give a study of several popular image
segmentation algorithms that are available.
Abstract: This study examined the mental health and behavioral
problems in early adolescence with the instrument of Achenbach
System of Empirically Based Assessment (ASEBA). The purpose of
the study was stratified sampling method was used to collect data
from 1975 participants. Multiple regression models and hierarchical
regression models were applied to examine the relations between the
background variables and internalizing problems, and the ones
between students’ performance and internalizing problems. The
results indicated that several background variables as predictors could
significantly predict the anxious/depressed problem; reading and
social study scores could significantly predict the anxious/depressed
problem. However the class as a hierarchical macro factor did not
indicate the significant effect. In brief, the majority of these models
represented that the background variables, behaviors and academic
performance were significantly related to the anxious/depressed
problem.
Abstract: Laban Movement Analysis (LMA), developed in the
dance community over the past seventy years, is an effective method
for observing, describing, notating, and interpreting human
movement to enhance communication and expression in everyday
and professional life. Many applications that use motion capture data
might be significantly leveraged if the Laban qualities will be
recognized automatically. This paper presents an automated
recognition method of Laban qualities from motion capture skeletal
recordings and it is demonstrated on the output of Microsoft’s Kinect
V2 sensor.
Abstract: As smartphones are equipped with various sensors,
there have been many studies focused on using these sensors to create
valuable applications. Human activity recognition is one such
application motivated by various welfare applications, such as the
support for the elderly, measurement of calorie consumption, lifestyle
and exercise patterns analyses, and so on. One of the challenges one
faces when using smartphone sensors for activity recognition is that
the number of sensors should be minimized to save battery power. In
this paper, we show that a fairly accurate classifier can be built that
can distinguish ten different activities by using only a single sensor
data, i.e., the smartphone accelerometer data. The approach that we
adopt to deal with this twelve-class problem uses various methods.
The features used for classifying these activities include not only the
magnitude of acceleration vector at each time point, but also the
maximum, the minimum, and the standard deviation of vector
magnitude within a time window. The experiments compared the
performance of four kinds of basic multi-class classifiers and the
performance of four kinds of ensemble learning methods based on
three kinds of basic multi-class classifiers. The results show that
while the method with the highest accuracy is ECOC based on
Random forest.
Abstract: One of the most critical decision points in the design of a
face recognition system is the choice of an appropriate face representation.
Effective feature descriptors are expected to convey sufficient, invariant
and non-redundant facial information. In this work we propose a set of
Hahn moments as a new approach for feature description. Hahn moments
have been widely used in image analysis due to their invariance, nonredundancy
and the ability to extract features either globally and locally.
To assess the applicability of Hahn moments to Face Recognition we
conduct two experiments on the Olivetti Research Laboratory (ORL)
database and University of Notre-Dame (UND) X1 biometric collection.
Fusion of the global features along with the features from local facial
regions are used as an input for the conventional k-NN classifier. The
method reaches an accuracy of 93% of correctly recognized subjects for
the ORL database and 94% for the UND database.
Abstract: Over the past few years, a lot of research has been
conducted to bring Automatic Speech Recognition (ASR) into various
areas of Air Traffic Control (ATC), such as air traffic control
simulation and training, monitoring live operators for with the aim
of safety improvements, air traffic controller workload measurement
and conducting analysis on large quantities controller-pilot speech.
Due to the high accuracy requirements of the ATC context and its
unique challenges, automatic speech recognition has not been widely
adopted in this field. With the aim of providing a good starting
point for researchers who are interested bringing automatic speech
recognition into ATC, this paper gives an overview of possibilities
and challenges of applying automatic speech recognition in air traffic
control. To provide this overview, we present an updated literature
review of speech recognition technologies in general, as well as
specific approaches relevant to the ATC context. Based on this
literature review, criteria for selecting speech recognition approaches
for the ATC domain are presented, and remaining challenges and
possible solutions are discussed.
Abstract: Feature selection has been used in many fields such as
classification, data mining and object recognition and proven to be
effective for removing irrelevant and redundant features from the
original dataset. In this paper, a new design of distributed intrusion
detection system using a combination feature selection model based
on bees and decision tree. Bees algorithm is used as the search
strategy to find the optimal subset of features, whereas decision tree
is used as a judgment for the selected features. Both the produced
features and the generated rules are used by Decision Making Mobile
Agent to decide whether there is an attack or not in the networks.
Decision Making Mobile Agent will migrate through the networks,
moving from node to another, if it found that there is an attack on one
of the nodes, it then alerts the user through User Interface Agent or
takes some action through Action Mobile Agent. The KDD Cup 99
dataset is used to test the effectiveness of the proposed system. The
results show that even if only four features are used, the proposed
system gives a better performance when it is compared with the
obtained results using all 41 features.
Abstract: EEG correlates of mathematical and trait anxiety level
were studied in 52 healthy Russian-speakers during execution of
error-recognition tasks with lexical, arithmetic and algebraic
conditions. Event-related spectral perturbations were used as a
measure of brain activity. The ERSP plots revealed alpha/beta
desynchronizations within a 500-3000 ms interval after task onset
and slow-wave synchronization within an interval of 150-350 ms.
Amplitudes of these intervals reflected the accuracy of error
recognition, and were differently associated with the three conditions.
The correlates of anxiety were found in theta (4-8 Hz) and beta2 (16-
20 Hz) frequency bands. In theta band the effects of mathematical
anxiety were stronger expressed in lexical, than in arithmetic and
algebraic condition. The mathematical anxiety effects in theta band
were associated with differences between anterior and posterior
cortical areas, whereas the effects of trait anxiety were associated
with inter-hemispherical differences. In beta1 and beta2 bands effects
of trait and mathematical anxiety were directed oppositely. The trait
anxiety was associated with increase of amplitude of
desynchronization, whereas the mathematical anxiety was associated
with decrease of this amplitude. The effect of mathematical anxiety
in beta2 band was insignificant for lexical condition but was the
strongest in algebraic condition. EEG correlates of anxiety in theta
band could be interpreted as indexes of task emotionality, whereas
the reaction in beta2 band is related to tension of intellectual
resources.
Abstract: Cyberspace has become a more viable arena for
budding artists to share musical acts through digital forms. The
increasing relevance of online communities has attracted scholars
from various fields demonstrating its influence on social capital. This
paper extends this understanding of social capital among Filipino
music artists belonging to the SoundCloud Philippines Facebook
Group.
The study makes use of various qualitative data obtained from
key-informant interviews and participant observation of online and
physical encounters, analyzed using the case study approach.
Soundcloud Philippines has over seven-hundred members and is
composed of Filipino singers, instrumentalists, composers, arrangers,
producers, multimedia artists and event managers. Group interactions
are a mix of online encounters based on Facebook and SoundCloud
and physical encounters through meet-ups and events. Benefits
reaped from the community are informational, technical,
instrumental, promotional, motivational and social support. Under the
guidance of online group administrators, collaborative activities such
as music productions, concerts and events transpire. Most conflicts
and problems arising are resolved peacefully. Social capital in
SoundCloud Philippines is mobilized through recognition, respect
and reciprocity.
Abstract: This paper presents the ‘Eye Ball Motion Controlled
Wheelchair using IR Sensors’ for the elderly and differently abled
people. In this eye tracking based technology, three Proximity
Infrared (IR) sensor modules are mounted on an eye frame to trace
the movement of the iris. Since, IR sensors detect only white objects;
a unique sequence of digital bits is generated corresponding to each
eye movement. These signals are then processed via a micro
controller IC (PIC18F452) to control the motors of the wheelchair.
The potential and efficiency of previously developed rehabilitation
systems that use head motion, chin control, sip-n-puff control, voice
recognition, and EEG signals variedly have also been explored in
detail. They were found to be inconvenient as they served either
limited usability or non-affordability. After multiple regression
analyses, the proposed design was developed as a cost-effective,
flexible and stream-lined alternative for people who have trouble
adopting conventional assistive technologies.
Abstract: The aim of this investigation is to elaborate nearinfrared
methods for testing and recognition of chemical components
and quality in “Pannon wheat” allied (i.e. true to variety or variety
identified) milling fractions as well as to develop spectroscopic
methods following the milling processes and evaluate the stability of
the milling technology by different types of milling products and
according to sampling times, respectively. These wheat categories
produced under industrial conditions where samples were collected
versus sampling time and maximum or minimum yields. The changes
of the main chemical components (such as starch, protein, lipid) and
physical properties of fractions (particle size) were analysed by
dispersive spectrophotometers using visible (VIS) and near-infrared
(NIR) regions of the electromagnetic radiation. Close correlation
were obtained between the data of spectroscopic measurement
techniques processed by various chemometric methods (e.g. principal
component analysis [PCA], cluster analysis [CA]) and operation
condition of milling technology. It is obvious that NIR methods are
able to detect the deviation of the yield parameters and differences of
the sampling times by a wide variety of fractions, respectively. NIR
technology can be used in the sensitive monitoring of milling
technology.
Abstract: To explore how the brain may recognise objects in its
general,accurate and energy-efficient manner, this paper proposes the
use of a neuromorphic hardware system formed from a Dynamic
Video Sensor (DVS) silicon retina in concert with the SpiNNaker
real-time Spiking Neural Network (SNN) simulator. As a first step
in the exploration on this platform a recognition system for dynamic
hand postures is developed, enabling the study of the methods used
in the visual pathways of the brain. Inspired by the behaviours of
the primary visual cortex, Convolutional Neural Networks (CNNs)
are modelled using both linear perceptrons and spiking Leaky
Integrate-and-Fire (LIF) neurons.
In this study’s largest configuration using these approaches, a
network of 74,210 neurons and 15,216,512 synapses is created and
operated in real-time using 290 SpiNNaker processor cores in parallel
and with 93.0% accuracy. A smaller network using only 1/10th of the
resources is also created, again operating in real-time, and it is able
to recognise the postures with an accuracy of around 86.4% - only
6.6% lower than the much larger system. The recognition rate of the
smaller network developed on this neuromorphic system is sufficient
for a successful hand posture recognition system, and demonstrates
a much improved cost to performance trade-off in its approach.
Abstract: Driver fatigue is an important factor in the increasing
number of road accidents. Dynamic template matching method was
proposed to address the problem of real-time driver fatigue detection
system based on eye-tracking. An effective vision based approach
was used to analyze the driver’s eye state to detect fatigue. The driver
fatigue system consists of Face detection, Eye detection, Eye
tracking, and Fatigue detection. Initially frames are captured from a
color video in a car dashboard and transformed from RGB into YCbCr
color space to detect the driver’s face. Canny edge operator was used
to estimating the eye region and the locations of eyes are extracted.
The extracted eyes were considered as a template matching for eye
tracking. Edge Map Overlapping (EMO) and Edge Pixel Count
(EPC) matching function were used for eye tracking which is used to
improve the matching accuracy. The pixel of eyeball was tracked
from the eye regions which are used to determine the fatigue state of
the driver.
Abstract: Thousands of organisations store important and
confidential information related to them, their customers, and their
business partners in databases all across the world. The stored data
ranges from less sensitive (e.g. first name, last name, date of birth) to
more sensitive data (e.g. password, pin code, and credit card
information). Losing data, disclosing confidential information or
even changing the value of data are the severe damages that
Structured Query Language injection (SQLi) attack can cause on a
given database. It is a code injection technique where malicious SQL
statements are inserted into a given SQL database by simply using a
web browser. In this paper, we propose an effective pattern
recognition neural network model for detection and classification of
SQLi attacks. The proposed model is built from three main elements
of: a Uniform Resource Locator (URL) generator in order to generate
thousands of malicious and benign URLs, a URL classifier in order
to: 1) classify each generated URL to either a benign URL or a
malicious URL and 2) classify the malicious URLs into different
SQLi attack categories, and a NN model in order to: 1) detect either a
given URL is a malicious URL or a benign URL and 2) identify the
type of SQLi attack for each malicious URL. The model is first
trained and then evaluated by employing thousands of benign and
malicious URLs. The results of the experiments are presented in
order to demonstrate the effectiveness of the proposed approach.