The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The single biometric identification technology has the inherent and difficult overcoming shortcomings, so multi-modal biometric fusion and identification techniques were proposed to improve the performance and accurate rate of identification system. This paper proposed a model combined with 2-dimensional Fisher linear discriminant analysis for face and iris feature fusion and recognition. First face...
Traditional fault diagnosis system in large industrial networks is not intelligent enough and cannot predict faults. It is too expensive for industrial corporations. This paper brings forward an intelligent fault diagnosis system-IFDS, which uses new types of intelligent database technology, and has the ability of effectively solving the fault diagnosis and prediction issue of current industrial Ethernet...
Data classification has been studied widely in the fields of Artificial Intelligence, Machine Learning, Data Mining and Pattern Recognition. Up to the present, the development of classification has made great achievements, and many kinds of classified technology and theory will continue to emerge. This paper discusses a great deal of classification algorithms based on the Artificial Neural Networks,...
With the interface from words to graphic, the quality of application program is more and more depend on the degree which the graphic interface feat the taste of the users. So if we can predict the users' taste of the style of application program, our work must be more popular. Now with the help of BP-neural network we can do it because of its strong capacity of prediction.
Rough set theory is not only a new mathematical tool dealing with vagueness and uncertainty but also a new effective soft computing method. It was been widely used in the area of artificial intelligence, data mining, pattern recognition, decision analysis, fault diagnosis and so on. So according to the rough set theory and its extensive applications, the application of rough set theory to algebra...
The device failure must be taken into account in the nano-scale design. This paper presents the probabilistic logic model to model the probabilistic behavior of a nanoscale adder. The analysis shows that the device probability distribution highly depends on the system structures and other performance parameters.
Obtaining invariant representation of time varying signals is one of the major problems in object recognition. Recently, a new method that slowly feature analysis (SFA) which can extract invariant features of temporally varying signals is being explored, which is an extension of independent component analysis (ICA) which has been used for extracting facial feature. The technique of SFA can be extended...
To locate the object accurately in a scene for further vision processing, a novel approach for figure-ground segmentation is proposed, which combines the normalized-cut method (Ncut) and top-down method inspired by the trickle-up and trickle-down processing in primate visual pathways. Firstly, as the trickle-up stage, the Ncut method groups the pixels into multiple partitions based on the global criterion,...
The probabilistic diagnosis model is useful in many fields such as distributed network, digital system level testing, wafer fault testing. Some topologies and continuous defect units distributions are studied in the previous work. In this paper, we extend the model to arbitrary topology structure with share nodes and to the discrete defect distributions, such as Poission distribution and binomial...
In order to effectively evaluate the system security, a quantitative information security evaluation method which combine analytic hierarchy process (AHP) and fuzzy comprehensive evaluation were proposed. Firstly, referring to Common Criteria (CC), we established security evaluation hierarchy model. Then, the analytic hierarchy process (AHP) method was used to calculate the security factors' weights...
The axiom definition of distance measure between vague sets is introduced. Some distance measures are proposed and corresponding proofs are given. The relations between similarity measure and distance measure of vague sets are analyzed. Finally, distance measures of vague sets are applied to pattern recognitions.
Dynamic cluster organization is a hotspot research field for wireless sensor networks. A new algorithm of building and regroup clusters - improved distributed cluster organization algorithm (IDCOA) is proposed in this paper. By IDCOA, nodes are clustered via the way that some nodes propose invitations, and the other sensors respond. Member nodes in the networks save the cluster's id, but header nodes...
A kind of adaptive PID control algorithm is analyzed, and the drawbacks of the existing algorithms are commented. As an improvement, a neural network intelligent control algorithm based on one-step prediction is developed. Result show that the new control method is more adaptable to the control of time-varying and nonlinear control systems.
Web document classification is the process of grouping web documents into one or more predefined categories based on their content. It is an important component of web monitor system that can assist people to reduce the dissemination of harmful information. This paper proposes a combined approach for building a decision tree with the multilayer neural network as its categorically value function, and...
The paper first gives a method for removing the thousands of noisy points by using neighborhood centroid constrained fairing algorithm. And then, uses the 3D point clouds to reconstruct the face surface. At last, we could extract the facial feature.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.