The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A feature extraction approach for printed Tibetan character based on fractal moments is proposed. After analyzing present feature extraction approaches-image projection approach and directional line element approach, the fractal moments theory is applied in the proposed approach. The extracted features using the new method can describe the local and global properties of the character, and decrease...
The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc, the iris has some advantages such as uniqueness, stability, high recognition rate, and non-infringing etc. As we known, the traditional iris recognition is using Gabor wavelets features;...
A novel feature extraction algorithm was proposed aiming at improving speech recognition rate in noise environmental conditions. Core technology was the Multiple Signal Classification (MUSIC), which estimated MUSIC spectrum from the speech signal and incorporated perceptual information directly into the spectrum estimation, then the cepstrum coefficients were extracted as the feature parameter. We...
Iris recognition, a relatively new biometric technology, has great advantages, such as variability, stability and security, thus it is the most promising for high security environments. Hence numbers of IRIS recognition algorithms are proposed, such as ICA (independent component analysis), SVD (singular value decomposition), Characterizing key local variation etc. which extracts iris features and...
A new blind geometric robust watermarking scheme is presented based on singular value decomposition (SVD) and discrete wavelet transform (DWT). In the scheme, the host image is decomposed with n-level DWT and the low frequency sub-band is divided into nonoverlapping blocks. SVD is applied to every block. The watermark is embedded into the low frequency DWT coefficients by modifying the largest singular...
In this paper we are using Devanagari script OCR for recognition. The handwritten data set is created by us and for printed characters we have used ISM font. Here we are using gradient and curvature based feature extraction method. We have compared Nearest Neighbor, K-Nearest Neighbor, Euclidian Distance-based K-NN, Cosine Similarity -based K-NN, Condensed Nearest Neighbor, Reduced Nearest neighbor,...
The principle and algorithm of Empirical mode decomposition (EMD) and ensemble empirical mode decomposition (EEMD) is introduced, and two methods are respectively used to analyze simulated signal and engine's vibration signals. Based on EEMD, the signal can be efficiently decomposed into a finite number of intrinsic mode functions (IMFs) by adding white noise, and the problem of mode mixing in frequency...
Ground Penetrating Radar (GPR) is widely used in the probe of subsurface targets, in which the Time-Frequency Representation (TFR) approaches have been proved effective for GPR signatures. Since we can treat TFR results as 2-D images, texture analysis is an applicable way for image discrimination. In this study, we propose a target detection method based on TFR textures of GPR A-scans and then select...
This paper describes an adaptive grid-point detector for the feature detection task in a pseudo-random structured light pattern. In the algorithm, a local entropy map is firstly constructed to evaluate the distribution of the projected pattern elements in the captured image. A mask in the shape of a cross is then used for the preliminary detection of grid-point candidates. With reference to the entropy...
Relation Extraction is an important research field in Information Extraction. In this paper, we present a novel mixed model to extract relation between named entities in Chinese, which combines the merits of both feature based method and tree kernel based method. Feature based method captures the language information of the text, while, the tree kernel based method shows the structured information...
Illumination and expression variation are the major challenges in the face recognition. This paper presents comparative analysis of two normalization techniques namely, DCT in Log domain and 2-point normalization method.. The DCT is employed to compensate for illumination variations in the logarithm domain. Since illumination variation lies mainly in the low frequency band, an appropriate number of...
The automatic generation of malicious behavior pattern based on system call trace is important to malware detection. This paper studied the existing generation method of malicious behavior specification. In order to reduce the complexity of pattern generation, it constructs graph which vertex label is unique, and uses these graphs to mine the pattern. To address the issue of limitation of the minimal...
Mutual information (MI) is a well accepted similarity measure for image registration. However, MI based registration faces the challenges of high computational complexity, low registration efficiency and high likelihood of being trapped into local optima due to an absence of spatial information. In this paper, we propose a new multiscale registration framework based upon an edge preserving total variation...
Some registration approaches can fail when percentage of outliers is too high in remote images. We introduce, in this paper, a new approach to improve the robustness of feature extration for automatic image registration. This method is based on long-edge correlation and consistency check. Long-edge correlation extracts a long edge as reference curve in order to increase the percentage of common feature...
The properties of average short-term entropy of audio sequence are discussed in this paper. It is discovered that the changes of average short-term entropy on different scales depict the audio's statistical features well, which can be used to generate zero-watermark of an audio clip. A method of calculating normalized entropy vectors is presented in this paper. To generate the zero-watermark of an...
Mammography is the most effective method for the early diagnosis and treatment of breast Cancer diseases. However, data sets collected by image sensors are generally contaminated by noise. This ensures the need for image enhancement to aid interpretation. This paper introduces an efficient enhancement algorithm of digital mammograms based on wavelet analysis and modified mathematical morphology. In...
Jiaguwen or Oracle bone script, which is inscribed on ox bones or tortoise shells of the Shang dynasty in ancient China, is one of the oldest mysterious characters in the world. Along with the rapid development of computer science and information technology, people are eager to deal with Jiaguwen characters just like the way they deal with modern characters. Unfortunately, Jiaguwen characters have...
Content-based image retrieval is an important research area in digital libraries and multimedia databases. In this paper, we present a novel image retrieval method based on improved Hough transform. First, we developed a new general method of acceleration of the convergence of the Hough transform based. It works on an improvement of the image analysis speed as well as the space undersampling of the...
Most pornographic image recognition researches focus on detection accuracy. However, as the highly increasing of web data, detection speed becomes a new consideration. In this paper, the new issue is discussed from the following two aspects: 1) feature extraction in compressed domain and 2) classifier design, and then a simple, novel and yet effective pornographic image recognition method in compressed...
In order to identify human behavior classification in Intelligent Security Monitoring System, an articulated model to extracting human body and classifying the behaviors of the moving objects is presented in this paper. An improved statistical Gaussian model is used as adaptive background updating method. After silhouettes of objects are extracted from the video images, we propose an articulated model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.