The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A global frame of secure instant messaging system based on Microsoft MSN is proposed to solve the security problems that exist in instant messaging. A secure add-in is designed and integrated seamlessly into the MSN client utilizing interfaces of the MSN client. The identity based cryptography is introduced into the secure instant messaging field and thus a secure instant messaging key management...
This paper presents a novel approach of feature selection based on analysis of covariance matrix of training patterns, a correlation-based feature selection method is put forward. An objective measure is proposed and defined. It is shown that for a given set of features, a subset of features that has the highest sum of the correlation coefficients has the tendency to be reduced, if it meets the requirement...
There are a large quantity of non-certain and non-structure contents in the Web text at the present time. It is difficult to cluster the text by some normal classification methods. An algorithm of Web text clustering analysis based on fuzzy set is proposed in this paper, and the algorithm has been described in detail by example. The technique can improve the algorithm complexity of time and space,...
Ant colony optimization (ACO) algorithms have been applied successfully to combinatorial optimization problems. Rough set theory offers a viable approach for feature selection from data sets. In this paper, the basic concepts of rough set theory and ant colony optimization are introduced, and the role of the basic constructs of rough set approach in feature selection, namely attribute reduction is...
Gender classification is one of the most challenging problems in the field of pattern recognition. The pixel-based gray image recognition method is quite sensitive to illumination variation and has high dimensions for computation. PCA-based image feature recognition algorithm can reduce the image dimension, but it is only on the basis of optimal entropy to choose face features which neglects the different...
Some target tracking occasions often requires to tracking a kind of target, such as human face, automobile and so on. A specific target tracking algorithm based on support vector machine (SVM) and AdaBoost is proposed. Moreover, the characteristic data of SVM is a critical factor to success to detecting target. The method selects part of Harr wavelet characters by AdaBoost as input data of SVM training...
With the wide application of global navigation and location technology, people have growing demands of solving the shortest path problem. In the real traffic network, all kinds of traffic information have greatly influenced path searching, such as traffic jams. So existing algorithms just remove the congested road and recompute the path. So the traveler needs to wait for a period of time. In order...
An anomaly intrusion detection algorithm based on minimal diversity is proposed. It can deal with mixed attributes, so overcomes the deficiencies of most unsupervised learning methods. Based on the minimal diversity measurement, we use a small amount of marked data to guide clustering. When detecting new records, we calculate its diversity from the existing clusters to determine its category. This...
An implementation of data preprocessing system for Web usage mining and the details of algorithm for path completion are presented. After user session identification, the missing pages in user access paths are appended by using the referer-based method which is an effective solution to the problems introduced by using proxy servers and local caching. The reference length of pages in complete path...
Traditional collaborative filtering algorithms all suffer from inaccurate recommendation and bad scalability. In this paper, we propose a new collaborative filtering algorithm based on user??s interest partition. We divides user??s whole interest into pieces. Each piece of interest is called interest unit. And the similarity between users on interest unit is named local similarity. The similarity...
Since face detection use a single classification is very time-consuming and inefficient. To solve this problem, we propose to establish two classifiers which are based on facial features and human eye features using the Adboost algorithm. First, use the facial features classifier detected out a rough location of the face. Then give out the accurate location of the face accord to the distance and the...
The objective of this study was to develop a computerized empty glass bottle inspection method in an attempt to replace manual inspection. The inspection system structure based on machine vision was illustrated in the article. Morphologic methods and wavelet transform were used to extract features of the bottle body and the finish from images. The fuzzy support vector machine neural network was adopted...
According to the global and local features of Chinese manual alphabet images, Fourier descriptor and other multi-features is introduced for the vision-based multi-features classifier of Chinese sign language recognition. At first, extracting features of letter images is done, then classification method of SVMs for recognition is brought into use. Experimentation with 30 groups of the Chinese manual...
This paper presents a new face recognition method based on the analysis of local features. Firstly, we can get the images of magnitude by means of analyzing face images with the Gabor wavelets. Secondly, the magnitude images are divided into blocks, then principle components analysis (PCA) could be directly used to all the blocks to construct the feature space. Finally, all the blocks of images are...
It is very important to detect singular points (core and delta) accurately and reliably for classification and matching of fingerprint. In this paper, an improved method for singularity detection in fingerprint images, which based on continuous orientation field, is proposed to improve accuracy of the position and reliability of the singularity. Firstly, the blocks which may contain singularities...
The client credit scoring is an effective method of credit risk management. At present, the credit scoring of client mainly relies on the weighted sum of each index on index system. However, it results in ineffective using of historical information and the dependency information between indexes. In this paper, a conditional Markov network hybrid classifier is proposed for client credit scoring and...
Taking the example of designing classifier in intrusion detection system, this paper studies on samples selection problem for classifier and proposes a method fitting for large data set. First, use cluster analysis and the information known of classification to select boundary samples of each class. Then cluster for each class of the remaining non-border samples and adopt the method based on sample...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.