The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A novel retrieval method for mammograph images was proposed in this paper. The texture structure of mammograph image was firstly extracted by the maximum and minimum of local intensity. Then, a new texture feature, distortion constraint, was introduced based on the speciality of the region of interest. Combined with the weighted moments, the new descriptor was given as an index for mammograph image...
Following the intuition that the image variation of faces can be effectively modeled by low dimensional linear spaces, we propose a novel linear subspace learning method for face analysis in the framework of graph embedding model, called semi-supervised graph embedding (SGE). This algorithm builds an adjacency graph which can best respect the geometry structure inferred from the must-link pairwise...
A new method based on discriminative model combination for acoustic model training is proposed. The MPE trained model and the MMIE trained model are used for model combination. The combination criterion is based on the ratio of the inter-variance to the intra-variance of each model. Besides we also propose a ldquoclusterrdquo method for the model to choose its confusion models in order to get the...
Chinese electronic government (E-Government) has achieved great success in several years, to quicken the pace of building E-Government, the central government of China has programmed to establish four governance information resource databases in next five years, data center construction in the developed cities is becoming an important project for present China??s E-Government. Through investigation...
Dimensionality reduction algorithms, which aim to select a small set of efficient and discriminant features. In this paper, a new manifold learning algorithm, called Uncorrelated Locality Information Projection (ULIP), to identify the underlying manifold structure of a data set. ULIP considers both the between-class scatter and the within-class scatter in the processing of manifold learning. Equivalently,...
This paper proposes the concept of evolutionary personal information partner system as a special kind of autonomous evolutionary information system. The paper defines what is an evolutionary personal information partner system, shows possible applications of evolutionary personal information partner systems, discusses fundamental issues in development and maintenance of evolutionary personal information...
In this paper, based on face recognition, the core algorithm is studied, which was applied in access control system. This algorithm carries on two-dimensional principal component analysis (2DPCA), singular value decomposition (SVD) and the fusion of 2DPCA and SVD, which the main characteristic vector of the PCA is fused to form a new one that is taken as the distinction standard. The experiment results,...
A novel generation key scheme based on DNA is proposed. By using a key expansion matrix, the scheme improves the independence and the strict avalanche of the key. Although it increases computation amount because of using the matrix operation, the random number can be generated by the DNA sequence directly and the speed of the computation is greatly improved. Therefore, the new scheme has wide application...
In this paper we propose a more efficient and effective algorithm of generalized discriminant analysis (GDA) by performing Gram-Schmidt orthogonalization procedure in feature space only once on difference vectors. The proposed method is substantially equivalent to class-incremental GDA [W. Zheng, ??class-Incremental generalized discriminant analysis??, neural computation 18, 979-1006 (2006)], since...
The popularity of Radio Frequency Identification (RFID) has raised the interest towards its security. Threat concerns towards individuals privacy slows down the adoption of the technology in the new innovative application areas. In this paper we will describe simple and efficient security method for lightweight RFID tags with support for ownership transfer. It based on solution described by Osaka...
Efficiency is critical to data mining algorithm. Based on fully analyzing the PF_growth, an association rule mining algorithm, we in this paper give a new association rule mining algorithm called MFP. MFP algorithm converts a transaction database to an MFP_tree through scanning the transaction database only once, then prune the tree and at last mine the tree. Because the MFP algorithm scans a transaction...
The kernel fisher nonlinear discriminant analysis (KFDA) has become one of the most effective methods applied to extract the nonlinear discriminant face features. However, the face recognition problem is a typical problem of high dimension with small sample, the KFDA is imperfect because the within-class scatter matrix is irreversible. In this paper, a new method (L-KFDA) is proposed to extract the...
Research of the security model is one of security system keys. The secrecy and the integrity are two important demands of security system. BLP model mainly satisfies the secret request , and Biba model emphasises the integrity request. The few security models unify the secrecy with the integrity. A mutilevel database security model increases integrity examination in the foundation of original secret...
Recently, how to utilize information that is stored in hundreds of millions of databases effectively, especially on the Web, has received increasing attention. It relates to many fields such as data mining, search engine and massive data processing. In order to improve methods which are limited in finding the relationship between conceptions of terms from different information sources manually, this...
This article introduces a new intelligent online test system, whose obvious difference with the traditional test system is that this test system does not based on the question bank, all test questions are produced automatically by questions-providing algorithm, providing explanation process of test question automatically by questions-solving algorithm simultaneously. The test questions that the system...
This paper presents a method of improving fuzzy k-nearest neighbor (k-NN) using genetic algorithm (GA). k-NN is an important classification algorithm. However, a major drawback of the method is that each of the patterns of known classification is considered equally important in the assignment of the pattern to be classified. This can cause difficulties in regions where pattern data overlap. To overcome...
With the widespread application of large and complicated network, network safety has become an important issue. In this paper, a security operation center (SOC) concept based on multi-sensor data fusion technology is presented from the viewpoint of the network security. A structure of a SOC system based on radial basis function neural (RBFN) network is proposed, and the detailed method of data fusion...
This paper proposes a self-constructed Mercer kernel based subspace LDA approach for face recognition. Our self-constructed Mercer (SM) kernel function is constructed from a given block diagonal matrix. The entries of all its block diagonal sub-matrices are equal to 1. It shows that this kind of matrix is a symmetric, positive semi-definite matrix and thus can serve as a kernel matrix. Based on such...
This paper presents a novel approach of palmprint authentication based on the directional gaussian derivative filters. In this approach, the palmprint image is firstly filtered using some directional Gaussian derivative filters in different directions. Then the orientation and the phase of each pixel of the palmprint image are extracted to form a feature. In the matching phase, the Hamming distance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.