Emotion recognition has important applications in human-computer interaction. Various sources such as facial expressions and speech have been considered for interpreting human emotions. The aim of this paper is to develop an emotion recognition system from facial expressions and speech using a hybrid of machine-learning algorithms in order to enhance the overall performance of human computer communication. For facial emotion recognition, a deep convolutional neural network is used for feature extraction and classification, whereas for speech emotion recognition, the zero-crossing rate, mean, standard deviation and mel frequency cepstral coefficient features are extracted. The extracted features are then fed to a random forest classifier. In
... Show MoreThis study aims to enhance the RC5 algorithm to improve encryption and decryption speeds in devices with limited power and memory resources. These resource-constrained applications, which range in size from wearables and smart cards to microscopic sensors, frequently function in settings where traditional cryptographic techniques because of their high computational overhead and memory requirements are impracticable. The Enhanced RC5 (ERC5) algorithm integrates the PKCS#7 padding method to effectively adapt to various data sizes. Empirical investigation reveals significant improvements in encryption speed with ERC5, ranging from 50.90% to 64.18% for audio files and 46.97% to 56.84% for image files, depending on file size. A substanti
... Show MoreThis work presents mainly the buckling load of sandwich plates with or without crack for different cases. The buckling loads are analyzed experimentally and numerically by using ANSYS 15. The experimental investigation was to fabricate the cracked sandwich plate from stainless steel and PVC to find mechanical properties of stainless steel and PVC such as young modulus. The buckling load for different aspect ratio, crack length, cracked location and plate without crack found. The experimental results were compared with that found from ANSYS program. Present of crack is decreased the buckling load and that depends on crack size, crack location and aspect ratio.
Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreThis study investigates the feasibility of a mobile robot navigating and discovering its location in unknown environments, followed by the creation of maps of these navigated environments for future use. First, a real mobile robot named TurtleBot3 Burger was used to achieve the simultaneous localization and mapping (SLAM) technique for a complex environment with 12 obstacles of different sizes based on the Rviz library, which is built on the robot operating system (ROS) booted in Linux. It is possible to control the robot and perform this process remotely by using an Amazon Elastic Compute Cloud (Amazon EC2) instance service. Then, the map to the Amazon Simple Storage Service (Amazon S3) cloud was uploaded. This provides a database
... Show MoreThis work investigates generating of pure phase Faujasite-type zeolite Y at the ranges chosen for this study via a static aging step in the absence of seeds synthesis. Nano-sized crystals may result when LUDOX AS-40 is used as a silica source for gel composition of range 6 and the crystallization step may be conducted for a period of 4 to 19 hr at 100 ⁰C. Moreover, large-crystals with high crystallinity pure phase Y zeolite can be obtained at hereinabove conditions but when hydrous sodium metasilicate is used as a silica source. The other selected ranges also offer pure phase Y zeolite at the same controlled conditions.
Background: Lowering the amount of iodinated contrast material and tube voltage may increase pulmonary artery opacification and thrombus identification without compromising picture quality.
Objectives: To explore the efficiency of using lower tube voltage and a lower contrast medium dose for conducting computed tomography for pulmonary angiography (CTPA) aiming to increase its accuracy in detecting pulmonary thromboembolism (PTE).
Subjects and Methods:100 patients scheduled for CTPA with a preoperative diagnosis of PTE were grouped into two: group A, (50 patients) got 1 mL/kg at 120 kV and group B, (50 patients) received 0.5 mL/kg at 80 kV.The tec
... Show More