The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cluster analysis aims at classifying data elements into different categories according to their similarity. It is a common task in data mining and useful in various field including pattern recognition, machine learning, information retrieval and so on. As an extensive studied area, many clustering methods are proposed in literature. Among them, some methods are focused on mining clusters with arbitrary...
Pill identification is a serious concern for pharmacists due to similarity of pill appearances. Pill imprints usually contain important information that can be used to add or search for pill information on existing pill databases. However, current techniques for extracting imprints often give results as vectors which cannot be used with existing databases. Thus, this paper proposed an approach for...
Integrating legacy plant and process information into engineering, control, and enterprise systems may significantly increase the efficiency of managerial and technical operations in industrial facilities. The first step towards the pursued data integration is the extraction of relevant information from existing engineering documents, many of which are stored in vector-graphics-compatible formats...
Data mining is a field of computer science and information technology that deals with the discovery of hidden patterns or interesting patterns in a large or a complex database. As the dimensions of database is growing rapidly, it is necessary to analyze the huge amount of information. Nowadays, there are many applications that are generating streaming data i.e. a sequence of objects that are arriving...
In the rapidly expanding fields of cellular and molecular biology, fluorescence illumination and observation is becoming one of the techniques of choice to study the localization and dynamics of proteins, organelles, and other cellular compartments, as well as a tracer of intracellular protein trafficking. The automatic analysis of these images and signals in medicine, biotechnology, and chemistry...
Brazilian energy distribution companies need to frequently update their database of the public lighting network. Since changes on this network are frequently not reported, it is important to monitor where they are made. An electronic device is under development for making this task easier. One component of this device uses image processing and recognition techniques to identify the luminaire models...
Facial asymmetry is an important characteristic used in a number of applications. It plays a vital role in human perception of attractiveness and as such has been used in psychology including research on facial expressions evaluation as well as in plastic surgery and orthodontics. It has been also recognized as a biometric feature used for identification and has important applications in detection...
Information Retrieval in large digital document repositories is at the same time a hard and crucial task. While the primary type of information available in documents is usually text, images play a very important role because they pictorially describe concepts that are dealt with in the document. Unfortunately, the semantic gap separating such a visual content from the underlying meaning is very wide...
In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this...
The Arabic web content is growing rapidly and the need for its efficient management is gaining importance and the morphological complexity of Arabic raises many challenges in this regard. This paper reports on some of our work aimed at designing text mining and query pre-processing tools that are able to efficiently process and search large quantities of Arabic web data. In our research we try to...
Although several algorithms for computing the reverse skyline queries have been proposed, they are developed only for point datasets and cannot handle reverse skyline queries over arbitrary spatial objects such as regions, polygons or lines. In this paper, we introduce a novel method for processing reverse skyline queries over arbitrary spatial objects. The proposed method also processes reverse skyline...
The rejoining of oracle bone inscription is an important process of oracle bone arrangement. In this paper, we proposed the algorithms for contour information extracting and tracking from these shell images and vector extracting algorithms of the feature of the contour fragments. We proposed the technical route and implementation method of establishing oracle shell images database, and developed a...
A growing number of organizations and individuals improve efficiency by utilizing geographical data. When the geographical data are updated, the changed information must be transferred to the end-users to keep their client-databases current. Distinguishing and identifying the change types of the geographical objects is the premise of transferring the change information. But now the methods for classifying...
This paper provides a comprehensive analysis of algorithms for spatio-temporal pattern mining, which helps to select appropriate algorithms for a given Moving Objects Database. We can distinguish basic and extended comparing functions. The basic ones correspond to research fields related to pattern mining. The extended comparing functions extend the analysis to additional aspects. All these functions...
Density based clustering algorithms are one of the primary method for data mining. The clusters which are formed using density clustering are easy to understand and it does limit itself to shapes of clusters. Existing density based algorithms have trouble because they are not capable of finding out all meaningful clusters whenever the density is so much varied. VDBSCAN is introduced to compensate...
This paper presents 2D shape matching technique using hierarchical tree structure extracted from shock graph that in turn extracted from the skeleton of the shape of interest. Object recognition and shape matching are important issues in the field of image processing. Extraction and application of skeleton of a shape is widely used in these fields. In this paper shape representation, matching and...
Region-based descriptors often use moments to describe shapes. The discreet radial Tchebichef moment descriptors have been proposed. The radial Tchebichef moments are invariant with respect to image rotation. In order to achieve the scale invariance, researchers resort to resizing the original shape to predetermined size. This traditional scheme of scaling is time expensive and leads to the loss of...
Developing efficient handwriting recognition systems that are fast and highly reliable is a challenging problem. This work represents the development of an online handwriting recognition system for Bangla script, widely used in eastern India and Bangladesh. In our approach, an online handwritten character/cluster is characterized by structure or shape based representation of a stroke in which a stroke...
The direction chain code has been widely used in image coding and recognition for its simplicity and low storage requirement. However, the researches on how to use chain code for shape retrieval are few. The traditional retrieval methods, chain code histogram (CCH) and Minimize Sum Statistical Direction Code (MSSDC) did not take the distribution feature into consideration. In our previous work, three...
By integrating the recursive and iterative thoughts commonly used in modeling fractals, an intelligent plant simulation technique is presented in the paper. With the technique, not only can the overall shapes and details of plants be controlled interactively by designing parametric fractals and parameterized growth process of fractals, but also the complexity in space and time of fractal-plants be...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.