The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Considering the facts that people access to item information more easily than to user information given user privacy, and the features of items selected by the user always imply his/her preferences, we hope to utilize item features to mine user preferences besides ratings. What is more, ratings are often linguistic labels and fuzzy set is tailor-made to represent them. Therefore, we propose a novel...
The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., to detect sensitive information being stored or transmitted in the clear. However, detecting the exposure of sensitive information is challenging due to data transformation in the...
Selecting a feature subset with strong discriminative power is a critical process for high dimensional data analysis, which has attracted much attention in many application domains, such as text categorization and genome projects. Since traditional feature selection methods provide limited contributions to classification, many researchers resort to hybrid or elaborate approaches to choose interesting...
With the rapid development of social media, research about its application and organization has attracted considerable attention. Many social media sharing websites allow users to tag the uploaded images with tags. However, the tags are usually uncontrolled, ambiguous, and overly personalized. One of the most challenging issues is how to match the textual tags with the visual image to rank tags accurately...
In this paper, a modified CRF algorithm is proposed for recognition of vision-based dynamic hand gestures. This algorithm abandons the condition necessary for Hidden Markov Models that the action sequences must be independent. And dynamic hand gestures are classified by some most representative segments (MRSs) rather than the full gestures themselves. First, the Longest Common Sequence (LCS) is employed...
In this paper, a new method for music symbol classification named Combined Neural Network (CNN) is proposed. Tests are conducted on more than 9000 music symbols from both real and scanned music sheets, which show that the proposed technique offers superior classification capability. At the same time, the performance of the new network is compared with the single Neural Network (NN) classifier using...
For the network environment with the limited transmission capacity, a multi-nodes image retrieval method based on visual words is proposed. Firstly, the visual words of query image are built by using the K-means clustering method after the color features and SIFT features of query image are extracted. Then the visual-words histogram of the query image is carried by the mobile Agent. The image similarity...
Parameters selection of support vector machine (SVM) is a key problem in the application of SVM, which has influence on generalization performance of SVM. The commonly used method, grid search (GS), is time-consuming especially for very large dataset. By using coarse grid search and pattern search (PS) to select kernel parameters and penalty factor, a fast method of parameters selection of SVM based...
The speech of cleft palate (CP) patients has typical characteristics. Hypernasality and low speech intelligibility are the primary characteristics for CP speech. In this work, an automatic evaluation of different levels of hypernasality and speech intelligibility algorithm for CP speech was proposed, in order to provide an objective tool for speech therapist. To identify different levels of hypernasality,...
Data creditability plays a very important role in the complex system simulation creditability. From the point of how to evaluate and improve the complex system simulation data creditability, the concept of the data quality modeling is advanced and the three-dimension data quality modeling space is founded. Based on which, a multiple attributes decision making theory based data creditability evaluating...
This study aims to estimate the spatial distribution patterns of three typical meteorological factors: maximum temperature, minimum temperature and precipitation in JiTai basin. Forty-seven-year monthly mean meteorological data were interpolated using Inverse distance weight (IDW), Ordinary kriging (OK) and Tension spline function (TPF). Cross-validation was applied to evaluate the accuracy of the...
Depth generation is the key technology in the 3DTV system. Due to the demands for accuracy and real-time execution, local methods are more suitable, but the challenge is to decide an appropriate window for each pixel. We propose a novel local method, which constructs the support windows adaptively only based on the intensity, and the process has no relation with disparities. This is the main difference...
In this paper, a content-based audio retrieval method is proposed, which can quickly detect and locate similar sound in audio database. We extract a chroma-based audio feature: chromagram, a variation on time-frequency distributions, which represents the spectral energy at each of 12 pitch classes. Compared with traditional feature MFCC (Mel Frequency Cesptral Coefficient), chromagram is better when...
Considering noise interference often exists in audio processing, it is not robust enough to calculate audio similarity by using distance measure directly. In this paper, basing on Renyi's quadratic entropy, a novel scheme for audio similarity measure is proposed. In our work, we extract Mel Frequency Cepstral Coefficients (MFCCs) to represent each audio, and then calculate the similarity based on...
This paper presents a parallel algorithm for computing one dimensional unstable manifold of a hyperbolic fixed point of discrete dynamical system. It is pointed out that parallel computing can be realized by subdividing the unstable manifold into mutually independent subsections. In each subsection, the one dimensional unstable manifold is grown by forward iteration. Curvature constraint and distance...
Splicing detection is of fundamental importance in digital image forensics. Recent image forensic research has resulted in a number of tampering detection techniques utilizing statistical features. Fusion of multiple features provides promises for improving detection performance. In this paper, we propose a new splicing detection approach based on the features utilized for steganalysis. We merge Markov...
It has been shown that the fuzzy integral is an effective tool for the fusion of multiple classifiers. Of primary importance in the development of the system is the choice of the measure which embodies the importance of subsets of classifiers. In this paper we propose a method for a dynamic fuzzy measure which will change following the pattern to be classified (data dependent). This method uses the...
Double image compression might occur if the image has been tampered with or embedded into secret data. It is essential to detect double compression for image forensics and blind steganalysis. This paper analyzes the statistical difference in the sub-band DWT (discrete wavelet transform) coefficient histograms between single and double JPEG 2000 compression; devises a scheme to discriminate between...
In this paper, we propose a new edge-based text verification approach for video. Based on the investigation of the relation between candidate blocks and their neighbor areas, the proposed approach first detects background edges in candidate blocks, then erases them by an edge tracking technique, and finally the candidate blocks containing too few remaining edges are eliminated as false alarms. Three...
The paper addresses a novel, fast and low complexity gaze tracking method, which remedies computation complexity and real-time processing problems of most existing gaze tracking methods. Face images are captured and pre-processed under infrared lamp-houses with dual thresholds. Pupil area is verified by the run-length in eight directions, and the gaze point is located by mapping the vectors of pupil...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.