The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, blogs were used between friends and family members. Nowadays, more and more bloggers are willing to share information with others. Therefore, it is desirable that related blogs can be connected. Clustering is often used for establishing connections between blogs. Full-text keywords retrieval process (FKRP) is generally used to obtain the keywords of posts, and the keywords were then...
Chronic hepatitis is one of the most important health threats worldwide. Although ultrasound is commonly used to diagnosis of various liver diseases, the accuracy of visual diagnosis is very low, and it also strongly depends on the experience of radiologist. The identification and classification of ultrasound images have become very desirable due to the rapid development of computer technology. However,...
A control system of network analyzer based on LabVIEW is introduced in the paper. The system connects PC and network analyzer through USB/GPIB bus, and then realizes the control operation of control instruction using SCPI control instructions, finally, completes the measurement of reflection loss, insertion loss and band flatness. The automatic test system has the advantages of high reliability and...
One of the challenges in malware analysis has been finding out the dormant functionality of the malware. Requirement of manual analysis along with code obfuscation and encryption rules out static analysis as it may not be effective and scalable in the face of continuously rising number of malware produced daily. Dynamic analysis on the other hand relies on the exhibited behavior of the malware, which...
Multi-bit minimum error replacement (MER) is a method that can embed multi-bit logo/secret data into k least-significant bits (LSBs) of cover data only introduces minimum embedding error (MEE). However, k-LSBs MER suffers from weak robustness. Moreover, it is unfortunate because no literature discusses the formulations and the properties of multi-bit MEE up to this day. Therefore, this work proposes...
Skewed ness in popularity among subscriptions and events is an inherent property in publish/subscribe systems. In this paper, we propose to exploit the popularity skew by utilizing unsupervised machine learning techniques in the design of publish/subscribe systems. The design comprises three main ideas. First, similar subscriptions are clustered together using unsupervised machine learning methods,...
Fingerprint based identification is becoming increasingly useful and cost effective now a days to tackle growing trend of identity theft, repeat offenses, authentication frauds, medical malpractices, and unlawful access & permissions. This paper provides a historical background on the evolution of fingerprint technology and detailed the salient feature such system should possess to meet the...
Automated Fingerprint Identification System (AFIS) is a de-facto standard for processing of identity claims in criminal and civilian settings around the world. There are dozens of commercial organizations and vendors offering their end-to-end solutions and software development kits (SDKs) world wide, yet the development and deployment of such a system is always an uphill task due to interdisciplinary...
In recent years, singular value decomposition has become a popular tool for image watermarking. In this paper, we propose a new blind watermarking scheme by quantizing the singular values of wavelet component. To optimize the system performance, we treat the image watermarking as a multi-objective optimization problem based on non-dominated sorting genetic algorithm II. Based on this new perspective,...
Transmitting compressed video data is quite common over wireless and wired networks. In error-prone networks, however, packet loss can lead to incorrect decoding. With the new generation standard, H.264/AVC, such issues are prevalent and drastically degrade the quality of decoded video. To solve these problems, error concealment is applied in the decoder. However, traditional error concealment does...
Epilepsy, which is caused by abnormal discharges in the brain, is one of the most common neurological disorders. To diagnose efficiently epilepsy, it is valuable to classify electroencephalogram signal. In this paper, we proposed a new e-health design of Electroencephalogram (EEG) signal classification for epilepsy diagnosis. The design is based on support vector machine to classify electroencephalogram...
Breast cancer is one of the most common malignancy in women. Recently, the development in medical imaging technology increases the diagnosis effectiveness in predicting breast tumor in the early stage. The trend in breast cancer diagnose is to predict what kind of breast cancer could be happened instead of detecting the disease. In this paper, a breast magnetic resonance imaging is applied to compute...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.