240 resultados para Jensen, Sid


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the last decade, the efforts of spoken language processing have achieved significant advances, however, the work with emotional recognition has not progressed so far, and can only achieve 50% to 60% in accuracy. This is because a majority of researchers in this field have focused on the synthesis of emotional speech rather than focusing on automating human emotion recognition. Many research groups have focused on how to improve the performance of the classifier they used for emotion recognition, and few work has been done on data pre-processing, such as the extraction and selection of a set of specifying acoustic features instead of using all the possible ones they had in hand. To work with well-selected acoustic features does not mean to delay the whole job, but this will save much time and resources by removing the irrelative information and reducing the high-dimension data calculation. In this paper, we developed an automatic feature selector based on a RF2TREE algorithm and the traditional C4.5 algorithm. RF2TREE applied here helped us to solve the problems that did not have enough data examples. The ensemble learning technique was applied to enlarge the original data set by building a bagged random forest to generate many virtual examples, and then the new data set was used to train a single decision tree, which selects the most efficient features to represent the speech signals for the emotion recognition. Finally, the output of the selector was a set of specifying acoustic features, produced by RF2TREE and a single decision tree.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, a composite descriptor for shape retrieval has been proposed. The proposed descriptor is obtained from Generic Fourier Descriptors (GFD) for the shape region and the shape contour. A composite descriptor derived from GFD of the shape region and the shape contour is used for indexing and retrieval of shapes. Difference between two images is computed as the Euclidean distance between their composite descriptors. Experiments are performed to test the effectiveness of the proposed descriptor for retrieval of 2d images. Sets of composite descriptors, obtained by assigning different weights to the region component and the contour component, are also evaluated. Item S8 within the MPEG-7 Still Images Content Set is used for performing experiments; this dataset consists of 3621 still images. Experimental results show that the proposed descriptor is effective.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This work presents a new approach to detecting the scene change in the successive capture of photographs of a place within equal time interval. This method is based on a gray level histogram of every image. In this method the histogram of an image is processed to modify it for matching with the processed histogram of a reference image. The coefficient of correlation is taken as the measure of matching. As the method does not do any heavy signal processing, and the images are taken successively with a multi-shot digital still camera, it can be applied for real-time processing of such pictures for detection of a scene change. A multi-camera in multi-position approach is also shown to evaluate the change in scene simultaneously from different angles. Both multi-camera and single-camera approaches are compared in detecting a scene change.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With an increasing emphasis on the emerging automatic person identification application, biometrics based, especially fingerprint-based identification, is receiving a lot of attention. This research developed an automatic fingerprint recognition system (AFRS) based on a hybrid between minutiae and correlation based techniques to represent and to match fingerprint; it improved each technique individually. It was noticed that, in the hybrid approach, as a result of an improvement of minutiae extraction algorithm in post-process phase that combines the two algorithms, the performance of the minutia algorithm improved. An improvement in the ridge algorithm that used centre point in fingerprint instead of reference point was also observed. Experiments indicate that the hybrid technique performs much better than each algorithm individually.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Distributed collaborators require computermediated communication (CMC) technologies in order to work together. Various systems have been developed for this express purpose with varying degrees of success. A basic method of evaluating the usability of a system is to compare it with face-to-face interaction. To replicate the face-to-face context, it is necessary to investigate how visual information plays a role in supporting collaborators performing tasks.
This research examines the effects of visual information and its role in both face-to-face and video generated visual contexts. The results were generated by asking participants to collaboratively solve visual tasks in either of the two contexts. The results show that both the face-to-face and the video conferencing contexts have similar effects on subjects’ ability to perform tasks. Task outcomes exhibited no significant difference between these two contexts. Awareness and conversational grounding had positive effects on the subject’s task performance and communication. On the other hand, presence had mixed effects on a subject’s task performance and communication behaviors.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

With more and more multimedia applications on the Internet, such as IPTV, bandwidth becomes a vital bottleneck for the booming of large scale Internet based multimedia applications. Network coding is recently proposed to take advantage to use network bandwidth efficiently. In this paper, we focus on massive multimedia data, e.g. IPTV programs, transportation in peer-to-peer networks with network coding. By through study of networking coding, we pointed out that the prerequisites of bandwidth saving of network coding are: 1) one information source with a number of concurrent receivers, or 2) information pieces cached at intermediate nodes. We further proof that network coding can not gain bandwidth saving at immediate connections to a receiver end; As a result, we propose a novel model for IPTV data transportation in unstructured peer-to-peer networks with network coding. Our preliminary simulations show that the proposed architecture works very well.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this work we present a novel security architecture for MANETs that merges the clustering and the threshold key management techniques. The proposed distributed authentication architecture reacts with the frequently changing topology of the network and enhances the process of assigning the node's public key. In the proposed architecture, the overall network is divided into clusters where the clusterheads (CH) are connected by virtual networks and share the private key of the Central Authority (CA) using Lagrange interpolation. Experimental results show that the proposed architecture reaches to almost 95.5% of all nodes within an ad-hoc network that are able to communicate securely, 9 times faster than other architectures, to attain the same results. Moreover, the solution is fully decentralized to operate in a large-scale mobile network.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Worms and other forms of malware have been considered by IT Security firms and large companies for many years as one of the leading threats to the integrity of their data and security. However, several researchers over recent years have been working on creating worms which, instead of causing harm to machines which they infect, or the networks on which the machines reside, actually aid the network and systems administrators. Several uses of these worms have been proposed by these researchers, including, but not limited to, rapid remote patching of machines, network and system administration through use of their unique discovery and propagation methods, actively hunting, and defending against, other forms of malware such as "malevolent" worms, viruses, spyware, as well as increasing reliable communication of nodes in distributed computing. However, there has been no hint of commercial adoption of these worms, which one researcher has described as being due to a fear factor'. This paper concentrates on assessing and delivering the findings of user attitudes towards these worms in an attempt to find out how users feel about these worms, and to try and define and overcome the factors which might contribute to the fear factor'.

Relevância:

10.00% 10.00%

Publicador:

Relevância:

10.00% 10.00%

Publicador:

Resumo:

To provide managers with a critical insight into the management of new technology, this paper uses a case study research strategy to examine the technology management experiences of a leading UK manufacturing organization during its adoption of a vendor-supplied Manufacturing Resource Planning information system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Objective: To examine patient- and treatment-based differences between psychiatric patients who do and do not die by suicide. Method: By linking databases of deaths and psychiatric service use in Victoria, we compared 597 cases who suicided over 5 years with individually matched controls. Results: Cases and controls could not be distinguished on the majority of patient- or treatment- based characteristics. The exceptions were that cases were more likely to be male, less likely to be outside the labour force, more likely to have recent contact with inpatient and community services, and more likely to have a registration as their last contact. Conclusions: Patients who suicide 'look' similar to those who do not, suggesting prevention approaches should ensure that all psychiatric patients receive optimal care, including appropriate detection, diagnosis, assessment and treatment of mental health problems, and careful, individualised assessment of suicide risk.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The effect of exercise intensity on skeletal muscle AMP-activated protein kinase (AMPK) signaling and substrate metabolism was examined in eight men cycling for 20 min at each of three sequential intensities: low (40 ± 2% Vo2 peak), medium (59 ± 1% Vo2 peak), and high (79 ± 1% Vo2 peak). Muscle free AMP/ATP ratio only increased at the two higher exercise intensities (P < 0.05). AMPK a1 (1.5-fold) and AMPK a2 (5-fold) activities increased from low to medium intensity, with AMPK a2 activity increasing further from medium to high intensity. The upstream AMPK kinase activity was substantial at rest and only increased 50% with exercise, indicating that, initially, signaling through AMPK did not require AMPK kinase posttranslational modification. Acetyl-CoA carboxylase (ACC)-ßphosphorylation was sensitive to exercise, increasing threefold from rest to low intensity, whereas neuronal NO synthase (nNOS)µphosphorylation was only observed at the higher exercise intensities. Glucose disappearance (tracer) did not increase from rest to low intensity, but increased sequentially from low to medium to high intensity. Calculated fat oxidation increased from rest to low intensity in parallel with ACCß phosphorylation, then declined during high intensity. These results indicate that ACCß phosphorylation is especially sensitive to exercise and tightly coupled to AMPK signaling and that AMPK activation does not depend on AMPK kinase activation during exercise.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Until now sport managers have had difficulties in identifying core issues that form the framework for successful sport management practice. The purpose of this study was to explore what sport managers believe are the core issues that can contribute to successful sport management practice. This was achieved through an examination of the narrative experiences of 7 sport managers (4 male and 3 female) that highlighted how narrative can be used to enhance a sport manager's understanding of their work environment through critical reflection. Through this examination the overriding issues that the participating sport managers believed provided a unique insight into their everyday lives centered on: (1) experience and power, (2) accountability; (3) demands of the job; (4) professional development; (5) ways of knowing; (6) collegiality; and (7) critical reflection. This narrative approach to understanding the lived experiences of sport managers allowed the researchers to connect theory with experience and to establish a relationship between daily practice and knowledge. Understanding the lived experiences of sport managers in this way can allow sport managers to establish new insights into how they interact with their sport organizations and the individuals and communities they serve in their daily operations. The following paper concludes by suggesting that through an increased interest in narrative as a way of knowing the stories disclosed may move other sport managers to share their own stories and experiences to assist in framing their own identity. Moreover, by prompting other sport managers to tell their stories, a deeper understanding of how professionals continue to grow and advance their sport management knowledge may be promoted. These narratives also taught us about deepening and extending our understanding of how sport managers construct meaning. In this way, new insights may be derived about the practice of sport management and how important it is to adding new knowledge for the discipline.