The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In partial occlusion problem, we have many methods for gait identification. However, based on Gait Energy Image (GEI) part, they are hardly occluded local part threshold problem. We propose an adaptive local module weight to reduce score of the occluded part. The adaptive local module weight is constructed from a consensus and a complementary principles of global and local modules. Firstly, we construct...
A hardware design for genetic algorithm (GA) can implement only one specific cost function of a problem at a time. Actually, different GA applications require different GA hardware architecture. The development of a flexible very-large-scale integration (VLSI) for GA has been proposed in this paper. For the hardware architecture, we has develop on a random number generator (RNG), crossover, and mutation...
This paper proposes a design of a power harvester for a semi-passive RFID tag. A tunable impedance transformation circuit is inserted between the antenna and the rectifier unit to maximize the power delivered to the rectifier of a tag and minimize reflections from the antenna input port. A power harvester for the UHF band of 950 MHz has been designed based on a 0.35 mum CMOS technology. This impedance...
Reliable and trustworthy routing operation is a very crucial requirement in Vehicular Communication (VC) that enables a new set of applications to improve active safety, traffic efficiency and driving comfort. To make this application possible, a security mechanism must be taken into account. Major security issue for VC is secure routing. Practical routing schemes in VC are geographic-based, which...
Identifying whether or not two persons in two set of different videos are the same person can be useful in many applications such as a video surveillance system. However, the problem is very difficult because in actual applications two videos can contain different amount of information. This paper proposes an approach to answer the question in term of a similarity score with level of confidence based...
Dog breed classification or identification is important for dog training, and curing. The conventional identification method is based on experts which is hard to find. This paper proposes a method to classify dog breed based on the dog face images. The proposed method is based on the coarse to fine concept, where the template matching technique is applied for coarsely classifying the images into 5...
An independent visual objects tracking is less reliable than the data association of visual objects tracking. This paper describes a tracking method based on the nearest neighbor (NN) data association, which serves lower computational than do the multiple hypothesis tracking (MHT) or the joint probabilistic data association filter (JPDAF) but gives low reliability, if the number of targets is increased...
This paper presents hybrid series active filter based on an adaptive predictive algorithm to compensate voltage sags and current harmonics for residential equipment. Generally, in order to detect current harmonics and voltage sags, the conventional detection algorithms such as RMS-based algorithm and FFT-based algorithm have been introduced to achieve the detection task. In this paper, an alternative...
In computer vision interface for interactive computer game, gestures can be used as commands for the game control instead of keyboard or mouse. The utilization of hand gesture in human-computer interaction enables human operators to interact with computer environments in a natural and intuitive manner. This paper proposes visual gesture recognition for manipulating objects in a board game such as...
Tonsillitis disease is a major cause of serious diseases such as heart attack and pneumonia. This paper proposes a computer-aided-diagnosis of tonsillitis using tonsil size and color. In this method, we employ red color and tonsil size as features. In order to detect the abnormal features, the proposed idea considers a trend of changing the features in each day. The change of tonsillitis features...
Since PCA-based teeth-image personal identification method (K. Prajuabklang, et al., 2004) is not robust against reflection and orientation, registered persons in database are rejected around 7%. This paper proposes a method to improve the PCA-based teeth-image personal identification method. In this method, the teeth image failed from the matching in the PCA-based system is reconsidered by feeding...
Automatic classification of normal mammograms, which constitute a majority of screening mammograms, is a new approach to computer-aided diagnosis of breast cancer. This approach may be limited, however, by non-separable "crossed" distributions of features that are extracted from digitized mammograms. This work presents a method of mapping such non-separable input features into a new set...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.