The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Outlier detection is a primary step in many data mining applications. An outlier is an abnormal individual from a population, which usually leads poor accuracy in models. Medical literatures are the most reliable resources for researchers to know the progress in their research areas and latest contributions from others. Traditional keyword search retrieves all the text data that contain the keywords...
Performance evaluation of fingerprinting using simplified statistical matching algorithm with two similarity metrics is presented. The collection of RF information can be automatically accomplished with the minimization of drive testing (MDT) in long term evolution (LTE) networks. In the case of non-ideal cell detection, the proposed algorithm greatly decreases the calculation of RF information and...
This study proposes a system to automaticallyidentify multiple singers in a long audio stream that may havesinging voices overlapping in time. The system is of great helpin handling the rapid proliferation of music data. To achievethis, an audio stream is segmented into a sequence ofconsecutive, non-overlapping, fixed-length clips using asliding window, and then undergoes solo/duetrecognition, single...
As a powerful algorithm for face recognition, the proposed Two-Phase Test Sample Representation (TPTSR) increases the classification rate by dividing the recognition task into two steps. The first step intends to find the M most possible candidate training samples from the whole training set to match with the testing input, and the second phase classifies the testing sample to the class with the most...
This paper presents the result of a recent large-scale subjective study of image retargeting quality on a collection of images generated by several representative image retargeting methods. Owning to many approaches to image retargeting that are developed, there is a need for a diverse independent public database of the retargeted images and the corresponding subjective scores that is freely available...
Face verification is defined as a person whose identity is claimed a priori will be compared with the person's individual template in database, and then the system checks whether the similarity between pattern and template is sufficient to provide access. In this paper we introduce a new procedure of face verification with an embedding Electoral College framework, which has been applied successfully...
Developed a website in VB.net, and the nuclear judging engine in C language, in order to realize managing, tutoring, practising, testing, feeding back, answering questions, BBS et al for Computer drawing course Internet-based. By SQL server database at background for interchanged data. Dividing the knowledge points to different tables and saving them into database. Users could login and browse the...
The eXtreme Programming (XP) software development methodology has received considerable industrial attention in recent years. As a methodology which is highly responsive to customer's changing requirements, XP has been widely used in Web application developing process. As a key characteristic of XP, Test-Driven Development(TDD) can be used for refactoring the new code and ensuring the quality of the...
Apply the Active Data Objects to LabVIEW, coordinating the LabSQL tool kit in several ways to carry on the connection separately to three kinds of commonly used databases (Access, MySQL, MS SQL), which has expanded the applications of LabSQL tool kit, enriched testing software's database connection mode, and a guide to improving the data-handling capacity of the testing software. Then with the efficiency...
This paper proposes a novel method using sparse representation to improve the performance of head pose estimation. Sparse Representation Classifier (SRC) has been applied in face recognition and the related problem. In this paper, we first argue that SRC is efficient in head pose estimation. Then we propose the Block based Spare Representation Classifier (BSRC) method to reduce the influence of the...
It very hard to collect a large set of handwriting samples used as training set. We generate a good handwriting Arabic character samples, the algorithm learns the stroke direction of the handwriting Arabic character from those real samples. In this paper, we present decision tree and matching algorithm to learn the stroke direction of the Arabic character and recognize the online Arabic handwriting...
The use of biometrics, and their associated handheld field devices, as an identification and verification technique is growing at a considerable rate. Governments and private organizations are making significant investments to identify and research new types of biometrics while pushing the industry to provide scanners capable of weathering field missions. In parallel, similar levels of investment...
Nowadays, intelligent teaching system can't realize the function of individuation serve well. This paper introduces the technique of agent into intelligent teaching system, constructs an architecture of individuation Web-learning based on multi-agent, analyses the functions and working process of every agent in the architecture, and proposes a model to extract and deal with individuation characters...
Aiming at automated security test on communication protocols, this paper proposes an automated manipulation mechanism of testing procedure based on FSM (Finite State Machine), and designs an automated packet generation mechanism based on a protocol template library. The practical experiments and applications show that the automated security testing platform of communication protocols based on this...
This paper introduces the research and application about general-purpose electronic system test platform including hardware and software. The characteristics of general automatic test system are discussed, and a kind of method for constructing electronic system general-purpose test platform is presented including system architecture, software design and hardware design. Automatic test system or test...
In the palmprint recognition application utilizing more information other than principle lines or minutiae is much helpful. In this paper we proposed discrete cosine transform (DCT) based feature vector for palmprint representation and matching and compared with DFT and wavelet transform. Here the central part of the palmprint image of size 128 times 128 is resized to the size of 64 times 64 and divided...
This paper presents an adaptive framework of keyword-driven automation testing to support the conversion of the keyword-based test cases into different kinds of test scripts automatically to be executed by different test applications under different test environments (such as GUI environment, database environment, etc.). XML is used to describe the keyword-based commands for the test case. An engine...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Computer-based automatic human facial expression recognition (FER) is fundamental and indispensable in realizing truly intelligent human-machine interfaces. In this paper, a new FER technique is proposed, which uses lower-frequency 2D DCT coefficients of binarized edge images and constructive one-hidden-layer (OHL) feedforward neural networks (NNs). The 2D DCT is thereby used to compress the binarized...
Thalassemia is a genetic defect that is commonly found in many parts of the world. Number of humans that are suffering from this disease is determined by screening the heterozygous population. This article investigates the thalassemia screening problem using the unconstrained functional networks classifier. The learning algorithm for this new scheme is briefly illustrated. The new intelligent system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.