The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To better restore human hand function, advanced hand prostheses should be able to deal with a variety of daily living conditions. In this paper, we addressed myoelectric signal variations introduced by different muscle contractions, dynamic arm movements, and outer interfering forces in the practice of pattern recognition-based myoelectric control schemes. We examined four different training paradigms...
Currently, most of the human detection methods are based on low-level features. In this paper, we proposed a middle-level feature generation method based on non-negative matrix factorization (NMF) for human detection. We also proposed an improvement scheme to guarantee that a better middle-level feature can be achieved. The proposed scheme can be applied to a complex background and the experimental...
In statistics, Canonical Correlation Analysis (CCA) is a kind of method to effectively analyze the correlation between two data. In recent years, some methods reported in literatures treated the action video sequences as the tensors, and calculated the similarity between two video sequences using CCA. Each of these tensors was unfolded into several matrices or vectors in the previous works. And estimated...
infrared image pattern recognition system consists of image enhancement, segmentation and pattern classification. Image segmentation is realized through Threshold Segmentation. Generally speaking, there are several methods of threshold segmentation such as double-hump method, iterated method and maximum entropy method and the otsu method and so on. These segmentation methods are used for the automatic...
In the image, the automatic segmentation of regions that we are interested in is the important issue in image pattern recognition. The concept of watershed in mathematical morphology is applied to the CCD infrared images to achieve a kind of algorithm on automatic detection and segmentation of image information in regions that interest us in image and apply the algorithm to the automatic segmentation...
The traditional Fourier descriptor (FD) can only be used to objects with single boundary. We develop a novel method, Generic Ring Fourier Descriptor (GRFD), which can be applicable to gray-scale image. Firstly, we take an unconventional view of the traditional FDs, as we treat the boundary as a closed-curve in a 2-D binary image. Consequently, the generated FD (GFD) is proposed such that it can be...
The problem of recognizing multiple object classes in natural images has proven to be a difficult challenge for compute vision. It is reasonable to look to biology for inspiration, a novel multiclass object recognition algorithm based on a biologically inspired model named ST model is proposed. ST model is based on the theory of biological neurology, which calculates object features that exhibit position...
In this article, the notion of orthogonal nonseparable four-dimensional wavelet packets, which is the generalization of orthogonal univariate wavelet packets, is introduced. A new approach for constructing them is presented by iteration method. The orthogonality properties of four-dimensional wavelet packets are discussed. Three orthogonality formulas concerning these wavelet packets are established.
Outlier detection can find its tremendous applications in areas such as intrusion detection, fraud detection, and image processing. Among many outlier detection algorithms, LOF is a very important density-based algorithm in which one critical step is to find the k-distance neighbors. In some privacy preserving circumstances, the cooperation between data holders is necessary while the privacy of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.