The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In modern time, finger-vein recognition technology has become increasingly popular. Basically, the finger-vein recognition process involves finger-vein image acquisition, feature extraction and recognition. The recognition algorithm is the key research issue. Because of the differences between acquisition devices and individuals, the performance of the algorithm is affected by image rotation, translation...
Chinese hacker communities are of interest to cybersecurity researchers and investigators. When examining Chinese hacker communities, researchers and investigators face many challenges, including understanding the Chinese language, detecting variations in topic evolution, and identifying key hackers with their specialty areas. Therefore, we are motivated to develop a framework for analyzing key hackers...
Multi-document summarization has gained popularity in many real world applications because significant information can be obtained within a short time. Extractive summarization aims to generate a summary of a document or a set of documents by ranking sentences, whose performance relies heavily on the quality of sentence features. However, almost all previous algorithms require hand-crafted features...
Tourism has become the world's largest economy industry. More and more people share their travelogues on travel websites. Recommender system is an effective tool to provide travel services (e.g., Landscapes selection) for tourists. Many recommender systems are based on travel data that are supplied by travel agencies, and provide travel packages from a fixed package set, which bring two challenges...
The analysis of electroencephalogram (EEG) signal is a low-cost and effective technique to examine electrical activity of the brain and diagnose brain diseases in the Brain Computer Interface (BCI) applications. Classification of EEG signals is an important task in BCI applications. This paper investigates two common methods of feature extraction on EEG signals, autoregressive (AR) model and approximate...
The increasing use of smartphones to access sensitive and privacy data has given rise to the need of secure authentication technique. Existing authentication mechanisms on smartphones can only provide one-time verification, but the verified users are still vulnerable to the session hijacking. In this article, we propose a transparent and continuous authentication system based on users' touch interaction...
This paper presents an improved compressive tracking algorithm via local context learning. There are two primary problems with compressive tracker, occlusion and drifting, both of which are solved by introducing a local context model. The local context information, which are often discarded in generative methods, provides specific information about the configure of a scene. The spatial relationships...
A novel descriptor for laser printing character recognition is proposed by using the fusion features and multilevel classification. There are two level features in the feature extraction module, the first level feature uses the coarse grid statistical features, having great applicability for local character distortion and stroke thickness inequality. Wavelet moment, as the second level feature, has...
Cooperative spectrum sensing can improve sensing capability of the system. But in a system which owns channels of different protection levels, it will bring bad effects to detection performance when using a single sensing algorithm and data fusing rule in different channels of this system. Therefore this paper proposes a cooperative sensing algorithm, which is based on policy database to select different...
In this paper, we present a non-symmetry and anti-packing object pattern representation model (NAM). The NAM model codes the geometry of generic object categories as a hierarchy of sub-patterns and each sub-pattern is represented by a rich set of image cues. The sub-pattern-based NAM model is designed to decouple variations due to affine warps and other forms of shape deformations. The combination...
Feature selection methods are critical in mammography computer-aided diagnosis and clinical decision support systems. However, searching for an optimal or near optimal feature subset is still a difficult task. After examining the problems with both filter and wrapper methods in feature selection, we propose a hybrid feature selection method using both Filter and Wrapper by taking advantage of both...
A novel method of registering the satellite images is introduced in this paper. The existing vector road maps are used as control information instead of the ground control points. The whole process is divided into 4 issues: find the initial relationship between the road maps and the satellite image with the help of the initial rough value of RPCs (the Rational Polynomial Coefficients);find the corresponding...
Cell segmentation in microscopy imagery is essential for many biomedical applications. In this paper, a novel level set based technique is proposed for segmenting the differential interference contrast (DIC) red blood cell microscopy images. Based on the framework of subjective surfaces, a local complex phase based edge indicator function is introduced to replace the traditional gradient-based edge...
SIFT feature matching algorithm, which has good robustness to image rotation and zoom scale, is a certain degree of stability on the angle changes and affine transformation. It also has the more stable match capacity on images which are taken from any point of view. It has been widely used in the field of wide baseline stereo matching. But the biggest problem is that extracts too many feature points,...
Measuring similarity has a wide range of application in information retrieval, machine translation or other related fields. In this paper, we proposed a text similarity computation based on improved optimal assignment model, which combine the improved Hungarian algorithm with the semantic similarity of terms to obtain the maximum semantic similarity between two documents or between a query and a document...
Harris corner detection is a classic corner detection algorithm, but using Gaussian smoothing filter, there is phenomenon of corner information missing and corner migration. In this paper, to have a data-fitting and low-pass characteristics of B-spline function introduced into the algorithm, construct a new filter, while introducing the idea of image sub-block and the excluding neighboring points...
Automatic or semi-automatic segmentation and tracking of artery trees from computed tomography angiography (CTA) is an important step to improve the diagnosis and treatment of artery diseases, but it still remains a significant challenging problem. In this paper, we present an artery extraction method to address the challenge. The proposed method consists of two steps: (1) a geometric moments based...
Dendritic spines play an essential role in the central nervous system. Recent experiments have revealed that neuron functional properties are highly correlated with the statistical and morphological changes of the dendritic spines. In this paper, we propose a new multi scale approach for detecting dendritic spines in a 2D Maximum Intensity Projection (MIP) image of the 3D neuron data stacks collected...
Previous wrappers of information extraction are mostly set for the web page which has one information block, so they are unable to deal with the multiple information blocks web page. Because of the adapt ability of the above mentioned shortcomings, this paper proposes a multiple wrappers information extraction method based on tree model. It will generate a wrapper for every block using the Tree-Align...
In this paper, we extend the Fisher nonnegative matrix factorization (FNMF) to weighted FNMF (WFNMF). The goal of this technique is to improve the performance of FNMF-based face recognition method under varying expressions, varying illumination, and especially for the case of partial occlusions. An objective function is defined by incorporating weighting into the cost of FNMF decomposition in order...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.