The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a method that embeds stability-sensitive filter in the temporal matching kernel with explicit feature maps (TE). The added filter improves the robustness of TE to noise for content-based video retrieval. Originally TE embeds temporal information of frame descriptors by using explicit feature mapping in a fixed length video vector by using a temporal invariant match kernel. TE matches...
Palmprint based identification has attracted much attention in the past decades. In some real-life applications, portable personal authentication systems with high accuracy and speed efficiency are required. This paper presents an embedded palmprint recognition solution based on the multispectral image modality. We first develop an effective recognition algorithm by using partial least squares regression,...
Thanks to a remarkably great ability to show amusement and engagement, laughter is one of the most important social markers in human interactions. Laughing together can actually help to set up a positive atmosphere and favors the creation of new relationships. This paper presents a data collection of social interaction dialogs involving humor between a human participant and a robot. In this work,...
It is true that Internet has not only expanded our horizons, but also triggered an unprecedented revolution of operating electronization against the traditional method after we entered the 21st century — also called the age of Internet. In the business area, many enterprises have already achieved the goal of electronic management, saved human resources as well as material consuming, and largely increased...
Fingerprinting based localization is one of the most widely used indoor localization methods. This method is divided into two phases: during the off-line training phase, fingerprints within the area of interest are collected and stored in a fingerprint database; during the on-line mapping phase, the real-time location of a device is estimated by mapping itself to the most accurate fingerprint in the...
Based on the evaluation and a classification of RFID vulnerability, a universal vulnerability detect model is established to evaluate the potential weakness of RFID application system. The model evaluate vulnerabilities from aspects of tags, readers, wireless channel and back-end systems. And consequently an RFID Vulnerability Scanner tool kit based on the above theoretical analysis is implemented...
This paper proposes a cloud-based architecture for enhancing the performance and capacity of vehicular networks of potentially multiple different wireless technologies. The approach addresses the well-known limitations of today's vehicle-initiated as well as base station-assisted handoff solutions; the former is reactive, therefore slow and inefficient, while the latter is mostly limited to within...
Discriminant Locality Preserving Projection (DLPP) has been successfully used as a dimensionality reduction technique to many classification problems, which incorporate discriminant information into Locality Preserving Projection (LPP) to improve recognition rate. However, in order to avoid small sample size problem, DLPP needs to reduce dimensions, which will lose some important discriminative information...
E-government is a virtualized platform which is used by the government to do the administration online. According to the observation from a growing perspective, the e-government platform should be an intelligent information management bases. In an information based e-government platform, consulting subsystem plays an important roll. Here comes up with an auto-answer counseling subsystem as an attempt...
Most information systems using C / S and B / S architecture, cannot meet the real-time data acquisition and transmission. Based on the design of a smart home, it designs an interacting system capable of real-time data aggregation and analysis. Function modules of the system are given a specific design, and describe the system implementation process
This article designs a cooperative mission management system (CMMS) architecture for a multi-agent team using the integrated method, which units the control center subsystem for the team mission assignment and the onboard management subsystem for the sole autonomous management in an effective way. The proposed “distributed architecture under the distributed center-control” distributes the control...
The traditional k-means algorithm has sensitivity to the initial start center. To solve this problem, this paper proposed a new method to find the initial center and improve the sensitivity to the initial centers of k-means algorithm. The algorithm first computes the density of the area where the data object belongs to; then it finds k data objects, which are belong to high density area, as the initial...
In this paper, we propose a visual tracking approach based on "bag of features" (BoF) algorithm. We randomly sample image patches within the object region in training frames for constructing two codebooks using RGB and LBP features, instead of only one codebook in traditional BoF. Tracking is accomplished by searching for the highest similarity between candidates and codebooks. Besides,...
A diagnosis system for pests on fruit trees based on multiple levels imprecise reasoning arithmetic is developed using Visual C++. Object-oriented knowledge expression method is used, which makes it easy to dig and express knowledge and make it efficiently to reason. The mixture of forward and backward reasoning mechanism is used in the system. The rule of depth preference is adopted when searching...
Contactless biometrics provide high comfort and hygiene in person recognition. Because of this, such systems are better accepted by the general public. This paper proposes an adaptive, contactless, biometric system which combines two modalities: palmprint and face. The processing chain has been designed to overcome embedded system constraints and small sample set problem: after a palmprint is extracted...
This paper presents a new multi-views face database and some development results on face recognition tasks based on it. Our objective is to find an efficient and simple algorithm for performing face recognition in real time. The image acquisition system is composed of five standard cameras, which together can simultaneously take five pictures of a human face from different perspectives. We address...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.