The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to accomplish the product special requirements of customers and establish the product developing platform for non-professional effectively, the requirement feature and requirement agile expression model of individualized product were put forward. The logical meta model and physical structure model of individualized product requirement information were built, the basic management and operating...
Some types of biometric patterns can be represented as a collection of variable-length interconnected lines. This is the case of handwriting signature strokes, palmprint lines or infrared hand vein data. Typical variations in size, shape and orientation of these patterns for the same person make difficult to develop reliable biometric verification systems for them. Fuzzy snakes have been successfully...
Multimodal biometric fusion is gaining more attraction among researchers. As multimodal biometric consolidates the information from multiple biometric sources, the effective fusion of information obtained at score level is a challenging task. In this paper, we propose a novel frame work for optimal combination of match scores using Gaussian mixture model (GMM) and Monte Carlo method. The proposed...
Ranking model construction is an important topic in Web mining. Recently, many approaches based on the idea of ??learning to rank?? have been proposed for this task and most of them attempt to score all documents of different queries by resorting to a single function. In this paper, we propose a novel framework of query-dependent ranking. A simple similarity measure is used to calculate similarities...
This paper presents a new method for modeling driver operation behavior. The proposed method is based on using the predictor coefficients as feature vectors extracted from driving operation signal by linear prediction analysis (LPA). The distribution of the feature vectors is captured by employing auto associative neural networks (AANN) model. The performance of the model was evaluated through driver...
Fusion is a promising strategy to improve performance in biometrics, and many fusion methods have been proposed. Most of them are user-generic fusion strategies, because generating user-specific strategies for each user is difficult. In this paper, we propose an online signature verification method using a user-specific global-parameter fusion model. The basic fusion model is a user-generic (global-parameter)...
Gene mention tagging is a critical step for biomedical text mining. Only when gene and gene product mentions are correctly identified could other more complex tasks, such as, gene normalization and gene-gene interaction extraction, be performed effectively. In this paper, six divergent models are implemented with different machine learning algorithms and dissimilar feature sets. We integrate these...
Even though numerous kinds of anti-virus software packages have been used for many years, previously unseen malware is still a serious threat to computer and information system. By analyzing portable executable header entries of executables, a malware detection model which consists of four stages: attribute extraction, attribute binarization, attribute elimination, and feature selection and classifier...
Feature models represent the variability and commonality of software product lines and permit the configuration of each specific application to be selected. We use a hypergraph based formalism to define an extensible and comprehensive feature meta-model. As a result, we readily can build a set of modeling tools compatible with the different flavors of these diagrams. Finally, automatic transformations...
With the development of computer techniques, 3D model has been used more and more widely and content-based 3D model retrieval has been a hotspot in the area of multimedia information retrieval. How to extract 3D models' feature effectively is still a difficulty. Projection based 3D model feature extraction is an important kind in feature extraction, because of its robustness against noise, simplification...
Story boundary detection is the foundation of content based news video retrieval. In this paper, Naive Bayes Model, which has been successfully used in multi-modal feature fusion, is implemented in news video story segmentation. Firstly, we get candidate boundaries through shot detection. Secondly, middle-level features such as visual features, audio type, motion and caption, are extracted from shots...
Script identification has always been a topic of much research interest in the field of document analysis. The accurate determination of the identity of the script is paramount to many post-processing steps such as document sorting, translation and in determining the choice of linguistic resources to use for OCR or handwriting recognition. However, few works exist with regards to the identification...
A novel intelligent fault diagnosis model for flue gas turbine based on EMD (Empirical mode decomposition) and VPRS (Variable precision rough set) theories, is proposed in order to solve the difficult problems of knowledge information acquisition and improve fault diagnosis accuracy in practice. This model combines EMD and VPRS techniques. First EMD signal processing technique is employed to excavate...
Enterprises development trend depends on many factors such as product, distribution, manpower and market. These factors are interactive and coupling in statistic data that makes it difficult to determine which enterprise is promising and which one should transfer type. How to classify the enterprises condition and predicate their future is urgent to solution. This paper utilizes the inner production...
Warranty domains contain hundreds of policies. It is obvious fact that policies are based upon certain criteria but it is not always obvious that these criteria are context sensitive. Further, complication is added by dynamic nature of these contexts making it a dynamism within a dynamism. This paper presents a solution in the form of a design pattern called dynamic applicability-policy. The pattern...
Markov random field (MRF, CRF) models are popular in computer vision. However, in order to be computationally tractable they are limited to incorporate only local interactions and cannot model global properties, such as connectedness, which is a potentially useful high-level prior for object segmentation. In this work, we overcome this limitation by deriving a potential function that enforces the...
Most of the methods used so far for road extraction are to extract the roads as poly-lines from remote sensing image, but in the high resolution image, the road always has the character of surface, so the extraction result should be parallel contour. In the paper, multi-resolution analysis, template matching theory, combining double-Snake model are used to extract the road from high resolution image...
New image retrieval technology, which is used for a service demonstration project ldquoView Search Hokkaidordquo in ldquoInformation Grand Voyage Projectrdquo conducted by Ministry of Economy, Trade and Industry, Japan, is presented in this paper. The new technology enables image retrieval based on low-level features without utilizing any tag-based scheme and realizes a 3D interface for image retrieval...
The paper mainly studies the designs of LA, LS and LAS codes. Then it makes simulation for theirs auto-correlation functions and cross-correlation functions. Simulation and analysis show that, LAS code has zero cross-correlation in the "zero interference window", and has only an impulse auto-correlation in the "zero interference window", and these excellent features help to eliminate...
We present in this paper a study on the ability and the benefits of using a keystroke dynamics authentication method for collaborative systems. Authentication is a challenging issue in order to guarantee the security of use of collaborative systems during the access control step. Many solutions exist in the state of the art such as the use of one time passwords or smart-cards We focus in this paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.