The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, fast ellipse fitting based pupil tracking design is studied for human-computer interaction applications. The proposed scheme uses the two-stage Random Sample Consensus (RANSAC) based fast ellipse fittings. At the first stage, the binaried pupil contour based ellipse model is applied to select the possible candidate points on Canny filtered edges. At the second stage, the Canny edge...
Desktop Grid (DG) systems use a combination of geographically heterogeneous distributed resources to execute jobs from science and engineering projects. Organization of the distributed resources are administrated by scheduling policies. To evaluate and prove the effectiveness of DG scheduling policy, a simulator is necessary since DG is an unpredictable and unrepeatable environment. Hence, the goal...
In this paper ART2 classifier is used to extract clusters of databases taken from complex processes with different behaviors. The used classifier is an unsupervised one and the obtained clusters characterize local models of a considered system. These local models represent linear behaviors of the process. This result is the consequence of the characteristic of the F1 layer of the ART2 neural network...
Emergency response is an important phase in emergency management when natural or human-made disasters occur and Incident Action Plan (IAP) is a very important component in the response phase of emergency management. Traditionally, IAP is created manually and presented as an oral or written plan. With advances in computers and information technology, it is feasible to generate IAP based on Emergency...
There are hundreds or thousands of web data sources providing data of relevance to a particular domain on the Web, so how to find a suitable set of sources quickly to integrate from a number of sources is becoming more and more important. Traditional data sources selection methods that are based on data quality do not consider quality characteristics of data sources under the different domains, but...
We are dealing with a matrix of the size 136 (formerly 79) known as financial social accounting matrix (FSAM). Inside a financial SAM is a square matrix of 107 rows times 107 columns sub set known as SAM. We are augmenting a command line based software for more functionality. The addition from us includes: data base for the output, bar chart output, table generation, graphical presentation of path...
Advancement in computing has opened up the possibility of mechanizing the process of music creation. Through Concatenative Sound Synthesis, best matched segments between target and source sounds are found and synthesized. Factors that affect the distance of the match, such as the order and weight of the features are examined and presented here. A robust algorithm to automatically assign consistent...
Reacting to technological advances in the domain of mobile devices, many traditionally desktop-bound applications now are ready to make the transition into the mobile world. Especially mobile shopping applications promise a large potential for commercial. However, in order to work on the limited screen estate even of modern devices, traditional category-based browsing approaches to online shopping...
Water is one of the most important natural elements on earth. Water quality directly and indirectly influences human lives and development. In this paper, a GIS-based system is designed to assist water resources professionals in making economical and efficient decision. GIS and remote sensing techniques are effectively used to replace, complement and supplement data collection in various facets of...
As two-dimension bar code Aztec Code has a lot of outstanding excellences such as high capacity, high density, strong error-correcting ability and security, it is widely used in online tickets selling. According to the practicability, this paper has designed a system processes Aztec code distortion. In this paper, the algorithm of two-dimension barcode is introduced in detail. It can be also used...
ECG signal processing is one of the earliest challenges for scientists as a tool for cardiovascular assessment. T-wave, as a part of ECG signal, is produced by ventricular repolarisation and its orientation usually corresponds with that of the QRS complex. Inverted T-wave in some leads can be a sign of abnormality. In this work we proposed a real-time algorithm to detect the polarity and symmetry...
Unlike the traditional paper-and-pencil tests, computer adaptive testing (CAT) presents the next item based on his or her past responses, which is more appropriate for a particular individual. However, it is rarely seen in a smaller-scale scenario, such as in classrooms or business, because of the complexity of Item Response Theory (IRT) and the possible usages of services may not be known or may...
Fixture design plays an important role at the planning stage before shop-floor production. A desired fixture design can be employed to hold the workpart securely so that slippage and excessive deformation can be prevented during machining. Therefore, appropriate fixturing contributes highly to machining quality. To reduce lead time and the human effort devoted to fixture planning, it is significant...
To cultivate the innovative and multiplex people full of computer skills, this paper proposes a new cultivation model, which gives priority to curriculum competition and takes the application and development of database as assistant measures. This new model is called four curricula and two competitions. English and mathematics analyse are two basic curricula. Programming language is the course of...
The procedure of electric-discharge XeCl-excilamps modeling is presented. There are many reports on the different models of XeCl-excilamps, but for practical applications and theoretical analysis having clear physical sense it is useful to consider a general procedure. In general case program of XeCl-excilamps modeling includes the next subprograms: the subprogram for solution of Boltzmann equation...
The procedure of electric-discharge XeCl-excilamps modeling is presented. There are many reports on the different models of XeCl-excilamps, but for practical applications and theoretical analysis having clear physical sense it is useful to consider a general procedure. In general case program of XeCl-excilamps modeling includes the next subprograms: the subprogram for solution of Boltzmann equation...
We have investigated a technique for recognising faces invariant of facial expressions. We apply multi-linear tensor algebra, which subsumes linear algebra, to analyse and recognise 3D face surfaces. This potent framework possesses a remarkable ability to deal with the shortcomings of principle component analysis in less constrained situations. A set of vector spaces can be used to represent the variation...
We review some recent techniques for 3D tracking and occlusion handling for computer vision-based augmented reality. We discuss what their limits for real applications are, and why object recognition techniques are certainly the key to further improvements.
This paper describes a face-muscle model system capable of emoting avatars in a variety of applications. The presented model produces dynamically changing facial expressions on computer generated faces, using mathematically modeled muscle deformations. The muscle model used to distort sets of vertices in a 3D space, is independent of the geometric model and hence it can be applied to arbitrary face...
This paper proposed a two layer authorization mechanism, including traditional password system and rhythm recognition. The whole system includes two phases: preprocessing and usual operation for users. In preprocessing phase, users type password in a specific rhythm in order to record and analyse the characteristics of behaviour of users. In the second phase, how to verify a user in usual operation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.