The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Current estimation methods for band level resolutions of human chromosome images in cytogenetic laboratories are time consuming and required experienced specialists to manually perform. To alleviate this problem, in this paper, a computerized approach to estimate band level resolution is proposed. The intensity gradient profile and sign profile of chromosome images are utilized to count the number...
The ability to recognize human activities from sensed information becomes more attractive to computer science researchers due to a demand on a high quality and low cost of health care services at anytime and anywhere. This work compares C-Support Vector Machine (C-SVM), Conditional Random Fields (CRF) and Linear Discriminant Analysis (LDA) for imbalanced dataset to perform automatic recognition of...
The objective of this research is to investigate the effect of design factors which consist of training content, training delivery, trainer competency and opportunity to use on small businesswomen's goal setting activities. The instrument for this research is adapted and modified from the Training Transfer Model and Model for Excellence (American Society of Training and Development Competency Research)...
The objective of the paper is to identify the factors and principles of soft skills and emotional intelligence which is lacked among the junior executive and is the primary cause of leadership failure in business organization today. This paper examines the gap, characteristics of soft skills and emotionally intelligence. It further highlighted the needs, systematic and step-by-step experiential approach...
Human activity recognition using wearable body sensors is playing a significant role in ubiquitous and mobile computing. One of the issues related to this wearable technology is that the captured activity signals are highly dependent on the location where the sensors are worn on the human body. Existing research work either extracts location information from certain activity signals or takes advantage...
This paper presents a hierarchal, two-layer, connectionist-based human-action recognition system (CHARS) as a first step towards developing socially intelligent robots. The first layer is a K-nearest neighbor (K-NN) classifier that categorizes human actions into two classes based on the existence of locomotion, and the second layer consists of two multi-layer recurrent neural networks that distinguish...
Pedestrian detection is one of the fundamental tasks of an intelligent transportation system. Differences in illumination, posture and point of view make pedestrian detection confront with great challenges. In this paper, we focus on the main defect in the existing methods: the interference of the non-person area. Firstly, we use mapping vectors to map the original feature matrix to the different...
This paper presents a new generic framework for human visual system inspired object detection and recognition and introduces the idea of feature extraction based on the human visual sensitivity. These methods can greatly enhance robotic vision applications. Additionally a new computationally effective object detection algorithm is presented based on image morphology and visual sensitivity. This new...
We have performed city-verification of videos based on the videos' audio and metadata, using videos from the MediaEval Placing Task's video set, which contain consumer-produced videos “from-the-wild”. 18 cities were used as targets, for which acoustic and language models were trained, and against which test videos were scored. We have obtained the first known results for the city verification task,...
In this work, we consider a classification problem of 14 physical activities using a body sensor network (BSN) consisting of 14 tri-axial accelerometers. We use a tree-based classifier, and develop a feature selection algorithm based on mutual information to find the relevant features at every internal node of the tree. We evaluate our algorithm on 31 features per accelerometer (total of 434), and...
Natural pitch fluctuations are essential to human singing. To effectively synthesize singing voice, the generation of these pitch fluctuations is necessary. Previous synthesis methods classify and reproduce them individually. These fluctuations, however, are found to be dependent and vary under different contexts. This paper proposes a generalized framework for F0 modelling to learn and generate these...
Eating and drinking activity recognition can be considered a solitary research field in activity recognition area. The development of an application capable to identify human eating and drinking activity can be really useful in a smart home environment targeting to extend independent living of older persons in the early stages of dementia. In this paper a novel method aiming at eating and drinking...
One of the great benefits VR systems offer is their ability to simulate a number of virtual humans when their presence is needed in the context of some learning or training experience. Being that the real humans may not be available to play different roles and support virtual sessions, the ability of a system to generate highly believable representations of autonomous virtual humans — virtual intelligent...
Human silhouette reconstruction has a wide range of applications in motion analysis, object segmentation and tracking, etc. In this paper, we propose a human silhouette reconstruction method based on the exploration of temporal information. Given a test silhouette, the proposed method aims to find its reliable templates for reconstruction by using the intrinsic temporal relationship among different...
Human age estimation based on face images can figure in a wide variety of real-world applications. In this paper, we propose a novel and efficient facial age estimation algorithm which decides human age in a hierarchical framework. Biologically, human lives can be roughly divided into two stages, the period from birth to adulthood and the period from adulthood to old age, which are quite different...
Face recognition is a biometric tool for authentication and verification having both research and practical relevance. A facial recognition based verification system can further be deemed a computer application for automatically identifying or verifying a person in a digital image. Varied and innovative face recognition systems have been developed thus far with widely accepted algorithms. The two...
Ways in which people perceive machines as robots can influence their subsequent behavior and interactions. Individuals may make these classification decisions based solely on visual information, and thus the physical form of the entity alone. Participants viewed images of robots from a variety of identified domains and rated each image according to the extent to which they perceive the entity as a...
With the development of network security technical, the pivotal factor is not technique but the administrator and management mechanism. In the domain of information security, social engineering can get into information system by using people' s weakness, just not using the computer's leak. This method can be used in many attacking way and turn up a new important project for its study and protection...
In object detection, the offline trained detector's performance may be degraded in a particular deployed environment, because of the large variation of different environments. In this work, we propose a data level object detector adaptation method to new environments. By recording a small amount of offline data, it's fully compatible with offline training method and easy to implement. We re-derive...
Over the last decade organisations have taken a keen interest in retaining tacit knowledge as it is a very important asset for organisations. This has led to the adoption of knowledge management practices that provide innovation in decision making, product and process efficiency. However as organisational knowledge is greatly dependant on the tacit knowledge that its employees possess, it is important...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.