The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Plants play a crucial role in terms of the lives of human and other creatures since the existence of the universe. Despite the studies of plant scientists, there are many undiscovered and unidentified species in our environment. This paper is aimed to add the leaves, whose images have been clearly attained, to the system and to provide a proper analysis of those leaves. The images could be either...
In this paper, we present a cost aggregation using anisotropic diffusion on a feature space for hybrid stereo matching. Stereo matching can be classified into two categories: feature-based and area-based approaches. Feature-based approaches generate accurate but sparse disparity maps. On the other hand, area-based approaches generate dense but unreliable disparity maps, especially at depth discontinuities...
In this paper, drape property measured values are classified into 5 grades based on FPCM(Fuzzy Possibilistic C-Means Clustering), which resolves problem of the noise point's impact on clustering center that cannot be done in FCM(Fuzzy C-Means Clustering). It restrains the errors caused by all kinds of unfavorable factors, and then clustering center is more precise. By testing 124 fabric samples, it...
This paper presents an empirical study of multi-label classification methods, and gives suggestions for multi-label classification that are effective for automatic image annotation applications. The study shows that triple random ensemble multi-label classification algorithm (TREMLC) outperforms among its counterparts, especially on scene image dataset. Multi-label k-nearest neighbor (ML-kNN) and...
Here, we intend to introduce new face invariant descriptors, composed by two kinds of features, in order to explore the problem of faces classification. The first kind is defined from the p-order moments of a curvature function of the geodesic curve according to its arc length. The second one describes relative positions between important localities of faces. Two classes Fisher discriminate analysis...
Learning in a non-stationary environment and in the presence of class imbalance has been receiving more recognition from the computational intelligence community, but little work has been done to create an algorithm or a framework that can handle both issues simultaneously. We have recently introduced a new member to the Learn++ family of algorithms, Learn++.NSE, which is designed to track non-stationary...
Radio frequency identification (RFID) suffers from collisions when multiple tags respond in the same time. This paper presents Query Tree ALOHA (QTA) anti collision algorithm, improved by using a new tag estimation technique based on signal strength. In addition, by using this technique it is possible to detect when two tags remain in the identification tree and hence acknowledge these tags without...
Radio frequency identification (RFID) is a wireless communication technology that provides automatic identification and data collection. In RFID systems with a large number of tags, many tags respond to the reader at the same time. Thus, enhanced anti-collision algorithms are required to have a fast multiple tag identification process. Anti-collision algorithms can be classified as probabilistic (eg...
We present a method for automatic algorithm recognition, which consists of two phases. First, the target algorithms are converted into characteristic vectors, which are computed based on static analysis of program code including various statistics of language constructs and analysis of Roles of Variables. In the second phase, the algorithms are classified based on these vectors using the C4.5 decision...
In recent years, the management and processing of data streams has become a topic of active research in several fields of computer science, such as distributed systems, database systems, and data mining. In data streams' applications, such as network monitoring, telecommunication systems and sensor networks, because of online monitoring, answering to the user's queries should be time and space efficient...
Chromosome segmentation affects the performance of the chromosome automatic analysis systems. Watershed algorithm is a widely used segmentation method. Applying it to segment chromosome images can overcome the difficulty caused by overlapping chromosomes. But the vice of the algorithm is its over-segmentation results. An algorithm based on watershed was presented in this paper. The overlapping chromosome...
Vendor selection is a strategic issue in supply chain management for any organization to identify the right supplier. Such selection in most cases is based on the analysis of some specific criteria. Most of the researches so far concentrate on multi-criteria decision-making analysis. Though many approaches have been proposed, analytic hierarchy process (AHP) is the most well known as it can deal with...
In the last few years, text mining have become the area of interests in Natural Language Processing (NLP). They share a similar idea i.e. to extract important facts from unstructured text which later help to populate database entries. Name Entity Recognition (NER) is one of the main task needed to develop text mining systems in which it is used to identify and classify entities in the text into predefined...
Collaborative tagging systems have emerged in recent years to become popular tools for organising information on the Web. While collaborative tagging offers many advantages, they also suffer from several limitations, with a major one being the existence of ambiguous tags. To understand what an ambiguous tag is intended to mean, we need to know the contexts in which it is used. Instead of using common...
Due to output similarity matrix often involves some error mappings when using multi-strategies for ontology alignment, how to extract the mappings from similarity matrix correctly and effectively will have an important influence on precision. In this paper, a novel approach is proposed, which employs Sufferage algorithm combined with logical reasoning to extract mappings. Firstly, distributed description...
This paper presents a fast wireless anti-collision algorithm for radiofrequency identification (RFID) systems. The proposed algorithm introduces a new kind of inquiry round to gain the request prefixes from tags. It also has the advantages of jumping and dynamic searching algorithm (JDS) and prefix-randomized query-tree protocol (PRQT). Analysis and simulation results show that the proposed algorithm...
This paper prepares a review of ICA based approaches that are used for separation of components in functional MRI sequences. In previous works, the FastICA and the Infomax algorithms are investigated in more details; therefore, in this paper we focus on methods such as "radical ICA", "SDD ICA", "Erica" and "Evd" for separation purposes. This comparative study...
Encryption algorithms could suffer fault injection attacks in order to obtain the secret key. In this paper, a specific protection for any round-based encryption algorithm is presented, analyzed and tested. It is providing a high degree of robustness together with a small penalty in the algorithm throughput when dealing with specific intentional attacks. Experimental results on advanced encryption...
The World Wide Web is a major source of the news now. The news analysis play more and more important roles in the political decision, financial analysis, invest decision, market forecast and so on. This paper proposes a news analysis system based on the hall for workshop of metasynthetic engineering. In this system, in order to analyses online news, the news articles are active fetched, and being...
Localization error is a widely considered problem in the node localization of wireless sensor network. The error can be caused by many reasons, and the most important three reasons are measurement distance, localization cumulative error and the number of anchor nodes. This paper proposes a range-based synergetic localization algorithm, which makes the best of all the sensor network for localization,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.