The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Speech coder identification refers to identification or recognition of a speech coder directly from a bit stream. The fundamental idea behind coder identification is that different coders should posses different statistical bit patterns and therefore recognition should be possible using chaotic features such as false nearest neighbor fractions. In this study theoretical coders have been investigated...
In this work, cancer recognition in digital cytology data was carried out using quasi-supervised learning. The data subject to recognition contained ground-truth data only in the form of a labeled set of cancer-free samples and the cancerous samples were provided along with cancer-free samples in an unlabeled mixed dataset. In this framework, a predictive method was derived to label future samples...
In this research, we propose a novel parallelizable architecture for the optimization of various sound synthesis parameters. The architecture employs genetic algorithms to match the parameters of different sound synthesizer topologies to target sounds. The fitness function is evaluated in parallel to decrease its convergence time. Based on the proposed architecture, we have implemented a framework...
In this study, a video-based pupil detection system and neuropsychological tests for the system are developed for diagnosis of neuropsychiatric disorders. An Active Contour Snake model is proposed to extract the position (x,y) and radius (r) information of pupils in video sequences. The test in this research is applied to two different groups, namely; bipolar disorder group and control (nonbipolar)...
The clinical diagnosis of voice pathologies is based on examination of structural defect of the vocal folds with video laryngostroboscope. Clinical studies show that pathologies not only cause vocal fold mulfunction but also effect the visual characteristics of blood vessels on the superior surface of vocal folds. In this article, we propose a novel system that extracts the vocal folds vessels in...
This paper describes our method to fit a 3D skeleton to the human hand using depth images. The human hand is represented by a 3D skeleton with 21 parts. This model is used to generate synthetic depth images, that are used to train Random Decision Forests (RDF), which are used to assign each pixel to a hand part. Mean-shift method is used on the classification results and joint locations are estimated...
In two-way relay channels (TWRC), consisted of one relay and two end nodes, it is generally assumed that all nodes have full channel state information (CSI) about the two links. However, one end node can not obtain the CSI of the link between relay and the other end node, without extra protocol complexity. Therefore, it is difficult to implement the strategies such as partial-decode-and-forward (PDF)...
In this study, locations of two sources have been detected using source signals separated with independent component analysis (ICA) method. The spherical interpolation least squares method which is based on the time difference of arrivals (TDOA) between the microphones is used for the solution of position detection. Although, there are different approaches and methods based on the TDOA for position...
In this study, the separation of the stimulus effects from the baseline was investigated in electroencephalography data recorded under different visual stimuli using quasi-supervised learning. The data feature vectors were constructed using independent component analysis and wavelet transform, and then, these feature vectors were separated using quasi-supervised learning. Experiment results showed...
Transposing music corresponds to moving a piece up or down in pitch by some amount while maintaining the relative structure of the harmonics. In theory, this operation can be realized by shifting the frequencies on a log-axis. However, in practice, realizing such a scheme requires a very redundant transform. In this paper, we propose a method for pitch-shifting that makes use of a wavelet family that...
Breast cancer detection with infrared imaging is a technique that is hazardous radiation free, increases the early detection chance and has a high detection probability. Asymmetry analysis is used for the diagnosis and the analysis is done using the breast segments obtained from the infrared image. In this work, a breast segmentation system based on parabolic Hough transform is presented. Besides,...
Data compression and encryption are critical issues for efficiency and security requirements of information transmission. In order to improve the performance and the flexibility of multimedia applications, it is worthwhile to perform compression and encryption in a single process. Recently Hermassi et al. proposed a method for joint compression and encryption using chaotically mutated Huffman trees...
Today, software defined radio systems are superseding traditional radio communication systems rapidly. In this process flexibility and upgradeability of software plays an important role. In this project, a “Directional Frequency Analysis and Recording” (DIFAR) type sonobuoy receiver has been developed using software defined radio. Sonobuoy is a system that can be thrown from aircraft or ship for detecting...
In this study, fiber lengths of each stage of the three stages L band erbium doped fiber amplifier (L-EDFA) and the pump laser power are optimized to achieve the maximum gain, the minimum noise figure and the minimum gain ripple. It is obtained on an average 34.7–37.1 dB gain, 6.28–6.0 dB noise figure, and 2.13–2.28 dB gain ripple along all L band for the 980–1480nm pump wavelengths, respectively.
Mobile devices, applications, cloud services and associated mobile experiences have seen exponential advancements in recent years. We have recently seen major improvements in user interfaces such as multi-touch, mobile compute and storage capabilities, wireless network bandwidth as provided by HSPA+ and LTE, sensors such as low-power accelerometers and gyroscopes, location estimation and associated...
The most widely used cytogenetic method is G-banded karyotyping. A new feature extraction method is proposed for G-banded chromosome recognition. Chromosome features are mostly extracted on chromosome skeleton. The main innovation of the proposed method is extracting features around chromosome boundary contours, not the skeleton. The circular boundary contour signatures are extracted and applied to...
In this work, a novel system, which works on a multidimensional feature space and detects the prominent signal components on the spectrum with high recall and precision, is presented. The boundary hiper planes are determined by using Support Vector Machine (SVM) classifier in the multidimensional feature space. The solution to the class training set imbalance problem is investigated with multiple...
Improving the lifetime of Wireless Sensor Networks (WSNs) is directly related with the energy efficiency of computation and communication operations in the sensor nodes. By employing the concepts of Compressive Sensing (CS) theory it is possible to reconstruct a signal with a certain number of random linear measurements, which is much less than the number of measurements necessary in conventional...
The dimensions of the feature vectors being used at the classification methods in the literature affect directly the time performance. In this study, how to reduce the dimension of the feature vector by using Turkish's grammar rules without compromising success rates is explained. The feature vector is weighted on the basis of the word frequency as the word stems have been selected as features. During...
As a result of rapid advances in information technology electronic mail has become one of today's most important communication tool. Electronic mail which provides conveniences to its user in many cases, is also an attractive environment for criminals. Malicious electronic mail whose actual owner is uncertain, is taking place in cyber crimes and authorship analysis has become necessary for determining...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.