The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The smartphone applications have taken place of the web browser and became the user's primary internet entrance. One application's popularity can be measured by its downloading times, and it is valuable for commercial advertising. Identifying app installation packages from network traffic is one of the most feasible approaches to collect these data. But asymmetric routing, incomplete capture and so...
This paper proposes a psychologically inspired convolutional neural network (PI-CNN) to achieve automatic facial beauty prediction. Different from the previous methods, the PI-CNN is a hierarchical model that facilitates both the facial beauty representation learning and predictor training. Inspired by the recent psychological studies, significant appearance features of facial detail, lighting and...
In this paper, a novel face dataset with attractiveness ratings, namely the SCUT-FBP dataset, is developed for automatic facial beauty perception. This dataset provides a benchmark to evaluate the performance of different methods for facial attractiveness prediction, including the state-of-the-art deep learning method. The SCUT-FBP dataset contains face portraits of 500 Asian female subjects with...
This paper reports our research on utilizing discernibility matrix method of Rough Set (RS) theory to improve the OGC web services (OWSs) semantic search. Based on RS theory, we build a description vocabulary reduction model involving attributes and spatial relation for OWSs and implement knowledge reduction on Geographic Information Service (GISe) instance-database. Also, the semantic reasoning framework...
As Cloud Computing becomes the trend of information technology computational model, the Cloud security is becoming a major issue in adopting the Cloud where security is considered one of the most critical concerns for the large customers of Cloud (i.e. governments and enterprises). Such valid concern is mainly driven by the Multi-Tenancy situation which refers to resource sharing in Cloud Computing...
Individual recognition is the technique which recognizes person's identity through his gait. Gait energy image (GEI) is a classical gait representation and it can be decomposed into structural part and detailed part. Then virtual gait energy image (VGEI) can be constructed in virtual space by integrating those two different parts. The generalized principal component analysis (GPCA) is applied to VGEI...
The key security challenges and solutions on the cloud have been investigated in this paper with the help of literature reviews and an experimental model created on OPNET that is simulated to produce useful statistics to establish the approach that the cloud computing service providers should take to provide optimal security and compliance. The literatures recommend the concept of Security-as-a-Service...
Large-scale data processing systems frequently require users to make timely and high-value business decisions based upon information that is received from a variety of heterogeneous sources. Such heterogeneity is especially true of service-oriented systems, which are often dynamic in nature and composed of multiple interacting services. However, in order to establish user trust in such systems, there...
This paper proposes a novel method of sparse Fisher linear discriminant analysis (SFLDA) for dimensionality reduction. Utilizing the equivalence of Fisher linear discriminant analysis (FLDA) and least squares linear regression (LSLR), sparse Fisher linear discriminant vector can be obtained by introducing L1 regularization into a least squares error criterion function. The sparse Fisher linear discriminant...
In this paper, an efficient feature extraction technique called Local Graph Embedding Discriminant Analysis (LGEDA) is developed for solving one sample per person problem. In our algorithm, a mean filter is used to generate imitated images and a double size new training set can be obtained. Taking the local neighborhood geometry structure and class labels into account, the proposed algorithm can maximize...
Radio Frequency Identification technology (RFID) has a wide range of potential applications and many successful stories. However, there are certain issues regarding Electronic Product Code (EPC) network architecture and tag-reader security models, such as security, privacy and scalability of the EPC network whilst authenticating RF tags. The EPC network architecture specification has no authentication...
To improve work efficiency of the coning, drawing and twisting workshop, reduce labor cost of the textile enterprise, on-line monitoring and control of production yield and machine operating status become very important. According to the information construction requirements of the textile enterprise, firstly, we set up the structure frame diagram through LAN, adapt network distributed structure based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.