The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Remote sensing image as a digital product, one of its important significance lies in quickly extracting information and applying the information to practice. However, in the process of extracting information, one of the basic problems is to conduct feature extraction. In this paper, the point and line features of remote sensing image are extracted, and the comparison of a variety of feature extraction...
The feature extraction is one of the key steps for SAR ATR. It can greatly reduce the amount of information processing by SAR ATR, improve the identification efficiency, reduce the time of recognition and lower resources utilization by means of the feature extraction. In the beginning, the feature extraction methods are classified by target type and then various categories methods are summarized....
According to the problem of extracting transition region inaccurately based on typical local complexity method, due to its excessively low complexity measurement and deficient detail representation, we propose an improved infrared image transition region extraction algorithm. By constructing local definition cluster function and calculating its complexity, we improve the complexity measurement of...
An improved method based on balloon snake for road contour extraction is proposed, the method initializes the road contour with the output of centerline detection and introduces an adjustable expansion coefficient, which is being tuned according to image gradient and contour curvature during road contour extraction process, the improved method can recover some missing road segments and solves the...
Face image classification is a central problem in computer vision research and information retrieval area. Most image classification systems have taken one of two approaches, using either global or local features exclusively. This may be in part due to the difficulty of combining a single global feature vector with a set of local features in a suitable manner. To classify images for versatile applications,...
Discrete wavelet transform has both good qualities in time domain and frequency domain which is an ideal tool in analyzing unsteady signals. Discrete cosine transform is one of the approaches used in image compressing which is also used to extract features. This paper proposes a combined feature extraction method which is based on DWT and DCT for face recognition. First the original face image is...
This paper proposes a novel approach for edge detection by first applying the structure tensor. The method firstly presents the definition of scale vector by analyzing the structure tensor, to calculate the weight between two graph-nodes. The nature of structure tensor helps the new features retain more structure information of image, and that makes the detection more accurately. In addition, the...
The research of distinction of name ambiguity in the field of information retrieval could enhance searching effect. Therefore, it plays an important role to mine the data of name ambiguity in order to obtain useful knowledge. In this paper, we focus on the problem of traditional evaluation and ranking method used in the clustering. Traditional evaluation and ranking method ignores the association...
With the rapid development of the multimedia technology and Internet, content-based image retrieval (CBIR) has become an active research field at present. Many researches have been done on visual features and their combinations for CBIR, but few on the performance comparison of different visual feature combinations. Therefore, in the paper, different visual feature combinations are firstly compared...
E-mail is the most commonly used network application which has become an important way of network communication. The research of content-based spam filtering technology is a key problem of the Internet security field. The paper described a spam filtering which was based on the Naive Bayesian algorithm and designed a spam filtering model based on the naive Bayesian algorithm. The paper carried out...
As accurate identification of weeds from crops is the prerequisite for precise herbicides spraying, this paper proposes a multi-feature fusion method based on neutral network and D-S evidential theory to improve the accuracy of weed recognition. Firstly, three kinds of single features such as color, shape and texture are extracted from the weed and crop leaves after a series of image processing. Secondly,...
In this paper, an improved intrusion detection system is designed based on the analysis of traditional IDS, which combined the advantages of data capture techniques by honeypot and tow layer Detection. The system can detect intruders not only outside but also abusers within the system. The system provides a complete, controllable, reliable proactive protection for computers and network.
Based on computational geometry of the triangle, triangular mesh representation model of image is efficient to represent images, which has great use video communication, three-dimensional reconstruction and so on. Referring to the idea of contour extraction, characteristic points of image border can be extracted by use of polygon growing algorithm, Delaunay triangular mesh can be initialized with...
Aim at the faults of the traditional background difference method based on Bayes Rule when detects motion hand gestures, such as the existence of interference regions, slow computing speed and so on. A method of dynamic hand gesture detection based on local background updates and skin color model is proposed in this paper. The skin color region in a single image is extracted through skin color model...
The amount of computer virus is on the increase since its first appearance and has posed serious security threats to the computer systems. Most of the current anti-virus systems attempt to detect these new malicious programs through heuristics scheme, but this costs a lot and is often ineffective. In this paper, an N-gram-based malicious code feature extraction algorithm, based on statistical language...
Data normalization is the first step of pattern recognition (PR). Feature selection is another part of work in PR. All of them are very important and challengeable. In this paper, some normalization methods and some feature selection methods are introduced first, then, discussed the relationship between feature selection and data normalization. Finally, an algorithm is described how to normalize supervised...
Based on analyzing traditional feature weighting algorithm and according to the problem that the traditional feature weighting algorithm only considers term frequency and inverse document frequency, a improved weighting algorithm is put forward, that is, synthesizing the length, position and class information of term when computing its weight. Then verify effectiveness of the classification by KNN...
The existing particle swarm optimization (PSO) and genetic algorithms (GA) could not solve some discrete-valued problems effectively such as Endmember extraction in hyperspectral imagery. Firstly, the theory of particle swarm optimization was reviewed, and a genetic algorithm based Endmember extraction method was analyzed, which combined with the convex geometry theory. Then, a particle swarm optimization...
Deaf-mutes have the stronger advantage of visual identification ability and visual memory ability for color, a new speech visualization method for deaf-mute was proposed,it created readable patterns by integrating different speech features into a single picture. Firstly, series preprocessing of speech signals were done. Secondly, extracting features were done, among them, using three formant features...
For the problem of object location under complex environment, especially for unknown object-quantity and object-type, a fusion vehicle license plate(VLP) location method with object authenticity confirmation is presented. Firstly, every region related to multi-type object color is marked in the same gray-level image by multi-value processing. Secondly, vertical edge operator is used to extract object...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.