The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent advances in neuroscience made it possible to understand how the human brain processes emotions and affective states. However, the modeling of emotion remains elusive due to inherent ambiguity and complexity related to the perception of emotions, interpersonal variabilities, and context-specific interpretations. Here, we present a robust method of modeling 4-D continuous affective space (Valence,...
With the rapid advancements in technology, Massive Open Online Courses (MOOCs) have become the most popular form of online educational delivery, largely due to the removal of geographical and financial barriers for participants. A large number of learners globally enrol in such courses. Despite the flexible accessibility, results indicate that the completion rate is quite low. Educational Data Mining...
Strength of encryption algorithm is based on statistical performance of the bits key stream. Generate high quality key stream is a difficult task, which decides the level of security provided by the encryption algorithm. This paper propose two main directions to deal with the biometric features of human voice: first it focuses on how to extract good features that lead to produce encryption keys of...
The inherent intangible nature, complexity, context-specific interpretations of emotions make it difficult to quantify and model affective space. Dimensional theory is one of the effective methods to describe and model emotions. Despite recent advances in affective computing, modeling continuous affective space remains a challenge. Here, we present a computational framework to study the role of functional...
This paper presents a new feature extraction algorithm for the challenging problem of the classification of myoelectric signals for prostheses control. The algorithm employs the orientation between a set of descriptors of muscular activities and a nonlinearly mapped version of them. It incorporates information about the Electromyogram (EMG) signal power spectrum characteristics derived from each analysis...
We tackle the challenging problem of myoelectric prosthesis control with an improved feature extraction algorithm. The proposed algorithm correlates a set of spectral moments and their nonlinearly mapped version across the temporal and spatial domains to form accurate descriptors of muscular activity. The main processing step involves the extraction of the Electromyogram (EMG) signal power spectrum...
Confocal microscopy is employed as a fast and non-invasive way to capture a sequence of images from different layers and membranes of the cornea. The captured images are used to extract useful and helpful clinical information for early diagnosis of corneal diseases such as, Diabetic Peripheral Neuropathy (DPN). In this paper, an automatic corneal subbasal nerve registration system is proposed. The...
Aim of this study is applying the ensemble classification methods over the stock market closing values, which can be assumed as time series and finding out the relation between the economy news. In order to keep the study back ground clear, the majority voting method has been applied over the three classification algorithms, which are the k-nearest neighborhood, support vector machine and the C4.5...
The Timed Up and Go (TUG) is a clinical test used widely to measure balance and mobility, e.g. in Parkinson's disease (PD). The test includes a sequence of functional activities, namely: sit-to-stand, 3-meters walk, 180° turn, walk back, another turn and sit on the chair. Meanwhile the stopwatch is used to score the test by measuring the time which the patients with PD need to perform the test. Here,...
Intrusion Detection Systems (IDS) are one of the powerful systems used to secure the computer environments. These systems trigger thousands of alerts per day and become a headache issue to the analyst, because they need to analyze the severity of the alerts and other fields, such as the IP addresses. This paper Investigates the most popular aggregation methods, which deals with IDS alerts. In addition,...
Breast cancer is one of the most common cancers among woman of the developing countries in the world, and it has also become a major cause of death. Treatment of breast cancer is effective only if it is detected at an early stage. X-ray mammography is the most effective method for early detection but the mammography images are complex. Thus nowadays, image processing and image analysis techniques...
Content fingerprinting provides a compact representation of multimedia objects for copy detection. This paper analyzes the robustness of the ordinal ranking module frequently used in content fingerprinting by examining the changes in ranks as local variations are introduced in feature values. Closed-form expressions to measure such sensitivity are derived when feature values are jointly Gaussian-distributed...
This paper employs voice analysis techniques to detect hoarseness occurring as a result of administration of local anesthetic for shoulder surgery. The patients in our study developed transient vocal cord dysfunction; however surgery and anesthesia can also cause permanent vocal cord paralysis, which is a significant clinical problem. Early detection is important to optimize the chance of repair,...
In this paper, we propose a new algorithm for color iris recognition using quaternion phase correlation. The proposed scheme leads to new hypercomplex phase-based color iris recognition and matching method that is based on the joint modeling of the iris color components using the ??holistic?? representation provided by the quaternion representations. The efficiency of the proposed iris recognition...
This paper presents a content-adaptive semi-fragile watermarking method for image authentication. The method is based on the semi-fragile watermark of Lin, Podilchuk, and Delp. However, the proposed method adapts the strength of the watermark and the detector type according to the content features of the image. Simulation results show that the proposed method outperforms the original method providing...
Orthogonal frequency division multiplexing (OFDM) is the modulation scheme of choice for digital video broadcasting-handheld (DVB-H), which is required to operate under high mobility conditions resulting in significant Inter-carrier Interference (ICI). To mitigate ICI, several cancellation schemes have been proposed but they require reliable channel information at the receiver which is quite challenging...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.