The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a new approach to describe facial expressions based on axiomatic fuzzy set (AFS), which can convert the features to semantic knowledge. The method has two advantages: the first one is that the semantic concepts are gained by data distribution. It means that the concepts can be directly obtained from data set, and the priori model is not required. The second one is the semantic concepts...
Person identification is a very important task for intelligent devices when communicating or interacting with humans. A potential problem in real applications is that the amount of enrollment data is insufficient. When multiple modalities are available, it is possible to re-train the system online by exploiting the conditional independence between the modalities and thus improving classification accuracy...
This paper presents an approach to blending a de-identified face region with its original background, for the purpose of completing the process of face de-identification. The re-identification risk of the de-identified FERET face images has been evaluated for the k-Diff-furthest face de-identification method, using several face recognition benchmark methods including PCA, LBP, HOG and LPQ. The experimental...
The most fundamental problem of local feature based kinship verification methods is that a local feature can capture the variations of environmental conditions and the differences between two persons having a kin relation, which can significantly decrease the performance. To address this problem, we propose a feature subtraction method to remove the kinship unrelated part from the local feature through...
In this paper, we present a local feature learning method for face recognition to deal with varying poses. As opposed to the commonly used approaches of recovering frontal face images from profile views, the proposed method extracts the subject related part from a local feature by removing the pose related part in it on the basis of a pose feature. The method has a closed-form solution, hence being...
Quantitative analysis of security properties in wireless communication systems is an important issue; it helps us get a comprehensive view of security and can be used to compare the security performance of different systems. This paper analyzes the security of future wireless communication system from an information-theoretic point of view and proposes an overall security metric. We demonstrate that...
Wireless Local Area Network (WLAN) technology has evolved very quickly in recent years. This paper introduces several new trends in the development of WLAN technology. Activities and progress in the standardization organization of WLAN, e.g. IEEE 802.11, are introduced. Next generation WLAN technology, a key enabling technology to make WLAN easy to use, together with low power and extended radio coverage...
Image classification is an important task in content-based image retrieval, which can be regarded as an intermediate component to handle large-scale image datasets for improving the accuracy of image retrieval. Traditional image classification methods generally utilize Support Vector Machines (SVM) as image classifier. However, there are several drawbacks of using SVM, such as the high computational...
Linear regression analysis is an important method in face recognition. It establishes a new framework for feature extraction and small sample size (SSS) problem. However, in real world, the accuracy is susceptible to occlusion, illumination and varying pose. In this paper, we present a novel method using frequency features of image to recognize different individual face. According to robustness of...
Web community discovery is much important for engineering optimization, search engine design and so on. In this paper, we propose a Linear Multi-Community Partition Algorithm for Scale-free network. We first take a function to measure the weight of each node in network and generate an order series by the weight of node, then iterate the algorithm to complete web community discovery. We use different...
To address the problem of quick searching for evolutionary stable strategy in replicated dynamic mechanism, a solving algorithm based on parallel particle sub-swarm optimization (PSSO) is proposed. Firstly, evaluating function is introduced to integrate multiple objectives of all strategies. Secondly, multiplier method is used to derivate the fitness function. Finally, the optimal solution of strategy...
This paper introduces a method of hand-raising gestures detection in indoor environments, using shape and edge features. Past approaches have detected the gestures through recognizing the action for isolated or seated persons. Here, to deal with movements, non-rigidity and partially occlusions of human bodies, the gestures are detected by searching for raised hands and arms rather than recognizing...
Resource allocation in grid environment is a complex undertaking due to the heterogeneity and dynamic nature aroused by wide area sharing. Most of the existing studies for this problem have been found to be performance deficiency or slow convergence. To address the heterogeneous and computationally intractable problem of resource allocation optimization in grid, this paper presents an allocation algorithm...
This paper introduces a method for hand-raising gestures detection based on human body silhouette analysis in indoor environments. Past approaches have detected the gestures for isolated persons or seated persons. Our method can deal with moving persons in crowd. First, background subtraction based on integration of intensity histograms with codebook of color feature is employed to segment human bodies...
Traffic metrics at application level are critical for protocol research, abnormity detection, accounting and network operation. There are great challenges to identify packets at application level since dynamic protocol ports and packet encryption are deployed popularly. There are several different methods of traffic identification being proposed in recently research for corresponding applications...
In P2P multicast applications, membership management protocols are the basic utilities. In this context, gossip-based protocols have emerged as attractive ones for that they are highly reliable, scalable and simple. Existing gossip-based membership protocols either ignore the underlying topology and the heterogeneity nature of peer nodes or consume lots of control overhead. In this paper, first, we...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.