The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Connectivity-network-based techniques have been recently developed for the diagnosis of Alzheimer's disease (AD) as well as its prodromal stage, i.e., mild cognitive impairment (MCI). However, most existing methods focus on using only a single property of connectivity networks (e.g., The correlation between paired brain regions), which can not fully reflect the topological information among multiple...
Nowadays, the surge of complex structured data in the form of single information network puts new challenges for advanced searching and indexing mechanisms. Traditional feature-based indexing no longer works in the new scenario, because the mining deficiency and pattern recurrence curse on the excessive and complicated internal structure prevent index construction and storage from being handled efficiently...
Emotion classification is an active area of research. It is difficult to differentiate among different emotion categories. This paper deals with classification of emotions into seven different categories such as (i) Anger, (ii) Disgust, (iii) Fear, (iv) Guilt, (v) Joy, (vi) Sadness, and (vii) Shame using ngram (unigram, bigram, and trigram) features. The features are extracted from the ISEAR dataset...
Web services are developed independently and deployed in a distributed environment, new service can be obtained by composing existing ones. The rapid introduction of new services also results in undesirable interactions between services. These conflicts are not mismatches of interfaces, but are usually based on the data in the executing instance and therefore runtime management of conflicts in Web...
When an image identifier is generated by using luminance based method and variance in luminance domain does not exist, the generation of identifier might be failed in terms of satisfied requirements. In this paper, we present a noble identifier generation method that utilizes luminance and corresponding location in an image.
Due to its simplicity and effectiveness, copy-move forgery has become a commonly used approach to forging images and detection of this behavior has attracted much attention in recent years. Usually integrated in the copy-move forgery process is the rotation operation, which makes rotation invariance a critical property of the copy-move forgery detection methods. In this paper, we propose to use screened...
The proposed system discuss a text summarization system over the social web site. The proposed system works by assigning scores to sentences in the document to be summarized, and using the highest ranking sentences in the summary. Highest ranking values are based on features extracted from the sentence. A linear combination of feature scores is used. In addition to basic summarization, some attempt...
In this paper we present novel algorithm for the cursive style Korean handwriting synthesis method based on the shape analysis with minimized input data. Hangul (Korean Character) has the different characteristics in structure, that is, character consists of consonants and vowels like English and also it is a combination character like Chinese character. This research aims at using minimal input character...
Nowadays, hand vein recognition is amongst the most recent biometric technologies used for the identification/authentication of individuals. Indeed, hand veins biometric are robust and steady human authentication unlike to other biometric technologies as fingerprint, face, signature and voice. In the present work, the proposed system consists of image preprocessing, feature extraction and identification...
This paper presents a novel technique for the classification of Arabic sentences as Dialogue Acts, based on structural information contained in Arabic function words. It focuses on classifying questions and non-questions utterances as they are used in Conversational Agents. The proposed technique extracts function words features by replacing them with numeric tokens and replacing each content word...
In this paper, we propose a texture matching approach based on a new decomposing architecture. First, the main window starting from the converging point a to the bottom-right corner of the image is considered. For each iteration, the main window's size is reduced by a distance d and other windows with the same main window's size are generated if possible. The Local Binary Pattern (LBP) technique,...
The computational complexity of fractal image compression is mainly because of the huge number of comparisons required to find a matching domain block corresponding to the range blocks within the image. Various schemes have been presented by researchers for domain classification which can lead to significant reduction in the time spent for range-domain matching. All the schemes propose to first separate...
Lip motion features such as changes in lip width and length can provide important information for authenticating personal identification or recognizing lip motions as commands. Unfortunately, lip motion can be significantly influenced by vocalization. In this paper, we investigate the differences in lip motion directly attributable to vocalization, with specific focus on the transition and variation...
Node classification in social networks is an important problem that has been widely studied in recent years. Several existing node classification methods mainly focus on identifying node classes by exploiting structural and attribute information. However, the information in an emerging information network is usually limited. For example, an emerging social networking service usually has very few registered...
The computational complexity of fractal image compression is mainly because of the huge number of comparisons required to find a matching domain block corresponding to the range blocks within the image. Various schemes have been presented by researchers for domain classification which can lead to significant reduction in the time spent for range-domain matching. All the schemes propose to first separate...
A main challenge facing the law-enforcement and intelligence-gathering environment is accurately and efficiently analyzing the huge volumes of data. Analyzing crime data can be difficult because of recognizing key features and transactions among the large amounts of data, of which only a small section is relevant to illegal process. An intelligent forensic system (IFS) is a powerful medium that enables...
In fingerprint identification system, fingerprint image is influenced inevitably by noise. So minutia extracting and recognition rely heavily the result of preprocess which can decreases the noise. The normalization, which belong to preprocess operation, based on blocking process of fingerprint image which is proposed. First, an original image is divided into sub-blocks with the size W W and the region...
We deal with ridge detection methods from digital elevation map (DEM) data. As ridge detection methods, the O (N^2) -time steepest ascent method and the O (N) -time discrete Lap lace transform (D.L.T.) method are known, where N is the number of cells. However, the D.L.T. method is too blurry to form ridge lines. In this paper, we introduce a 12 neighbor D.L.T. method which is a modification of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.