The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays capturing the image of eyeball with camera and estimating gaze points using pupil positions is the most common method for eye-tracking devices. Head-mounted eye-tracking equipment has a wide range of application because of its flexibility and high gaze estimation accuracy. But the user's head should keep still using a chin rest or other tools, or will lead to enormous gaze estimation errors...
An i-vector has become the state-of-the-art algorithm for text-independent recognition. Most of related works take the extraction of the i-vector as a black-box by using some open software (e.g. Kaldi, Alize) and focus on the vector-based back-end algorithms, such as length normalization, WCCN, or PLDA. In this paper, we study the variational method and present a concise derivation for the i-vector...
N-1 security criteria is a key principle for distribution operation. However, it is hardly taken into account in modern distribution feeder reconfiguration models, which cannot satisfy security margin demands. To address this fundamental problem, this paper develops a new stochastic reconfiguration method for distribution network considering N-1 security and net loss. Firstly, three indexes-average...
Word posterior probability has been widely used as the confidence estimation of automatic speech recognition (ASR) systems and has been proved to be quite effective in related applications such as keyword search. However, word posterior probability tends to overestimate the true probability of a hypothesis, as it is computed on a subset of the total hypothesis space. In this paper, we show that a...
This paper presents a statistical modeling framework termed as PRISM for text-independent speaker verification. We decompose the verification task into three subtasks: PRobability density estimation, Information metric and Subspace/Manifold learning (PRISM). Subsequently, we take advantages of variational maximum likelihood estimation, Fisher information metric and discriminant locality preserving...
Image classifications including sub pixel analysis are often used to estimate directly the crop acreage, while ground data collected during field surveys play a secondary role. This type of crop area assessment using image classifications often leads to a biased estimation due to non-representative selection of training data and subjective a-priori knowledge. Instead regression estimator approach...
Several studies have showed that network features (e.g., packet interval and packet size) may be well modeled by a hidden Markov model (HMM) with appropriate hidden variables that capture the current state of the network. In this paper, we propose a prediction mechanism on the basis of the HMM model to assist the Power Saving (PS) in WiMAX. In comparison with prior models whose analyses are often...
The handover mechanism in wireless networks has been intensively investigated in the past years. The traditional solutions are to customize various protocols in different layers to provide uninterrupted communication, which is particularly important for real time traffic. In this paper, we intend to exploit silence gap, inherently existing in realtime traffic, to improve handover performance. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.