Preferred Language
Articles
/
bsj-9454
Research on Emotion Classification Based on Multi-modal Fusion
...Show More Authors

Nowadays, people's expression on the Internet is no longer limited to text, especially with the rise of the short video boom, leading to the emergence of a large number of modal data such as text, pictures, audio, and video. Compared to single mode data ,the multi-modal data always contains massive information. The mining process of multi-modal information can help computers to better understand human emotional characteristics. However, because the multi-modal data show obvious dynamic time series features, it is necessary to solve the dynamic correlation problem within a single mode and between different modes in the same application scene during the fusion process. To solve this problem, in this paper, a feature extraction framework of the three-dimensional dynamic expansion is established based on the common multi-modal data, for example video , sound ,text.Based on the framework, a multi-modal fusion-matched framework based on spatial and temporal feature enhancement, respectively to solve the dynamic correlation within and between modes, and then model the short and long term dynamic correlation information between different modes based on the proposed framework. Multiple group experiments performed on MOSI datasets show that the emotion recognition model constructed based on the framework proposed here in this paper can better utilize the more complex complementary information between different modal data. Compared with other multi-modal data fusion models, the spatial-temporal attention-based multimodal data fusion framework proposed in this paper significantly improves the emotion recognition rate and accuracy when applied to multi-modal emotion analysis, so it is more feasible and effective.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Baghdad Science Journal
A New Methodology to Find Private Key of RSA Based on Euler Totient Function
...Show More Authors

          The aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Mon Mar 11 2019
Journal Name
Baghdad Science Journal
A Spectral, Optical, Microscopic Study, Synthesis and Characterization of PVC Films Containing Schiff Base Complexes
...Show More Authors

In this work, synthesis of conducting polymeric films namely, PVC thin films was carried out containing Schiff base (L) with Cu2+, Cr3+, Ni2+, Co2+, in addition to inspecting the possibilities of measuring energy gap values of PVC-L-M with variety metal ions. These new polymeric films (PVC-L-M) were characterized by FTIR spectrophotometry, energy gap and surface morphology. The optical data recorded that the band gap values are influenced by the type of metals. All modified films have a red shift in optical properties in the ultraviolet region. The PVC-L-Co(II) was the lowest value of the optical band gap, 3.1 eV.

View Publication Preview PDF
Scopus (13)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Mon Nov 30 2020
Journal Name
Journal Of Economics And Administrative Sciences
The Impact Of Adopting The Social Responsibility On Marketing Performance An Applied Study on NAFTAL Company
...Show More Authors

This research paper aims at studying the effect of adopting the corporate social responsibility on marketing performance indicators, where the study adopted the descriptive method for theoretical concepts, in addition to the statistical approach by using the SPSS v25 program to analyze the questionnaire and test the hypotheses of the study. The results showed that there is a positive correlation between social responsibility and marketing performance indicators, and the study found that it is better for NAFTAL Company to mix the environmental and social responsibilities in order to improve its marketing performance. Also, the study recommended that Naftal should adopt the four responsibilities equally, correctly and make its work

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Oct 31 2020
Journal Name
International Journal Of Intelligent Engineering And Systems
Speech Emotion Recognition Using MELBP Variants of Spectrogram Image
...Show More Authors

View Publication Preview PDF
Scopus (9)
Crossref (5)
Scopus Crossref
Publication Date
Tue Jan 29 2019
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Impact of Financial Guarantee Assessmeats on Accounting Profite: Apractical Research In Dell Company
...Show More Authors

The research specialized in examining the role of guarantees and their impact on accounting benefits quality using statistical analysis to the income before and after the impact of guarantee on the accounting profits.This research depended on the inductive approach, which ensures that companies could manipulate in benefits through a variety of means including the guarantees. As it is possible that the companies can use the policy of guarantee as a strategy in business deal. The research aimed to highlight the different companies' practices on policies guarantee and its impact on accounting benefits. The benefit of Dell Company has been chosen as a sample for the research because of the availability of interim data from the company for te

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Dec 14 2020
Journal Name
2020 13th International Conference On Developments In Esystems Engineering (dese)
Anomaly Based Intrusion Detection System Using Hierarchical Classification and Clustering Techniques
...Show More Authors

With the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect

... Show More
View Publication
Scopus (4)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Wed Apr 01 2015
Journal Name
2015 Annual Ieee Systems Conference (syscon) Proceedings
Automatic generation of fuzzy classification rules using granulation-based adaptive clustering
...Show More Authors

View Publication
Scopus (4)
Crossref (4)
Scopus Crossref
Publication Date
Sat Jan 10 2015
Journal Name
British Journal Of Mathematics & Computer Science
The Use of Gradient Based Features for Woven Fabric Images Classification
...Show More Authors

View Publication
Crossref
Publication Date
Thu Oct 01 2015
Journal Name
Engineering And Technology Journal
Genetic Based Optimization Models for Enhancing Multi- Document Text Summarization
...Show More Authors

View Publication
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Cryptography based on retina information
...Show More Authors

The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref