The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a method to improve the performance of content-based image retrieval (CBIR) systems. The idea is based on the concept of query models [1], which generalizes the notion of similarity in multi-feature queries. In a query model features are organized in layers. Each succeeding layer has to investigate only a subset of the image set the preceding layer had to examine. For the purpose of performance...
In this paper, we present a novel approach for recognition of human faces using Markov Random Fields (MRF) and Bayesian models. We examine the relationship between feature vectors in a close proximity system. The feature vectors are coefficients of the 2D Gabor Wavelet Transform (DWGT). The MRF is implemented to match the constraint configurations between the feature vectors. The MRFs posterior probability...
The Domain Name System (DNS) is an essential component of the Internet infrastructure that translates domain names into IP addresses. Recent incidents verify the enormous damage of malicious activities utilizing DNS. Therefore, detecting malicious domains using the DNS network structure is an important challenge. We take the famous colloquial expression Tell me who your friends are and I will tell...
Ongoing developments in stereoscopic display technologies have led to the proliferation of huge stereo image databases. Therefore, the design of an appropriate Content Based Image Retrieval (CBIR) system for stereo images is an important emerging issue. In this paper, we propose a novel retrieval method which exploits simultaneously the spatial and cross-view dependencies of the stereo images. Within...
The need for efficient tools to index and retrieve 3D content becomes even more acute. This paper presents a fully automatic 3D-object retrieval method. It consists of two main steps namely shape signature extraction to describe the shape of objects, and similarity computing to compute similarity between objects. In the first step (signature extraction), we use a shape descriptor called geodesic cords...
During bug reporting, The same bugs could be repeatedly reported. As a result, extra time could be spent on bug triaging and fixing. In order to reduce redundant effort, it is important to provide bug reporters with the ability to search for previously reported bugs efficiently and accurately. The existing bug tracking systems are using relatively simple ranking functions, which often produce unsatisfactory...
In this paper we present XSW, a new parallel Smith-Waterman algorithm for searching protein sequence databases on the Xeon Phi coprocessor. In order to make full use of the compute power of the many-core Xeon Phi hardware, we have used a two-level parallelization scheme: the thread level coarse-grained and VPU level fine-grained parallelism to implement our algorithm. At the thread level, XSW employs...
We assume a database of items in which each item is described by a set of attributes, some of which could be multi-valued. We refer to each of the distinct attribute values as a feature. We also assume that we have information about the interactions (such as visits or likes) between a set of users and those items. In our paper, we would like to rank the features of an item using user-item interactions...
Classic support vector machines (SVM) kernels (e.g. polynomial, Gaussian) are unable to take advantage of existing problem-specific knowledge. This is especially true when the problem at hand is the classification of sets (or bags) of vectors that may represent textual or visual (e.g. images, videos) data. This article tackles the problem of the classification of sets of positive vectors via SVM....
Facial expressions are one of the most important elements for our social interaction. Automatic processing and recognition of facial expressions is hence one of the core areas in computer vision, computer graphics, and social signal processing. Conditional Random Fields (CRFs) and their extensions are widely used for recognizing facial expressions. Most research in this area, however, is done either...
We address the task of mapping a given textual domain model (e.g., an industry-standard reference model) for a given domain (e.g., ERP), with the source code of an independently developed application in the same domain. This has applications in improving the understandability of an existing application, migrating it to a more flexible architecture, or integrating it with other related applications...
This paper presents a new similarity measure and matching scheme for content-based image retrieval (CBIR), based on modeling positive and negative hypotheses and testing a query image against these two hypotheses. The paper proposes to calculate first a universal image model (UIM), which is built based on a large set of images. The derived UIM is then used as a reference for the calculation of adapted...
Modern airborne or satellite SAR radar systems provide geometric resolution below ten centimeters. By SAR interferometry from pairs of such images, DEM image can be obtained. Using data of this kind it is possible to build a simple 3D models of remote objects. Similarity measurement between model of unknown object and known database models can be used for classification and recognition. In this paper...
Automatic personal identification is playing an important role in security systems. Biometrics technologies has been emerging as a new and effective methods to achieve accurate and reliable identification results. A number of biometric traits exist and are in use in various applications. Palmprint is one of the relatively new biometrics due to its stable and unique characteristics. In this paper,...
This article deals with universal sequential audio pattern search and sound recognition method. Inspired by classical phoneme-based speech recognition and word spotting systems, where longer speech patterns are formed by sequences of basic speech units, we propose a methodology for creating a finite database of elementary sound models. These models can be arbitrary concatenated into sequences, thus...
Playlist generation may be defined as the generation of a list of musical items or songs based on a pre-existing set of songs selected by the user. A common approach would be to suggest a number of songs based on the currently playing song. An exhaustive algorithm would involve computation of similarity of musical attributes of all of the songs with respect of the reference song. This paper introduces...
Nowadays, the exploding number of functionally similar Web services has led to a new challenge of selecting the most relevant services using quality of service (QoS) aspects. Traditionally, the relevance of a service is determined by computing an overall score that aggregates individual QoS values. Users are required to assign weights to QoS attributes. This is a rather demanding task and an imprecise...
Playlist generation may be defined as the generation of a list of music items or songs based on a preexisting set of songs. A common approach would be to suggest a number of songs based on the currently playing song. An exhaustive algorithm, based on similarity calculation between two songs, would involve computation of similarity of musical attributes of all of the songs with respect of the reference...
The conventional shape feature-based method did not describe the local feature enough. This paper proposed a new 3D model retrieval method based on projected area at mesh vertex. First, sum the projected area on vertical plane of the normal vector at mesh vertex, then normalized the list of the projected area distributions and transfer these data by Fourier transform method. Then the result is defined...
Surrogate model assisted evolutionary algorithms are receiving much attention for the solution of optimization problems with computationally expensive function evaluations. For small scale problems, the use of a Gaussian Process surrogate model and prescreening methods has proven to be effective. However, each commonly used prescreening method is only suitable for some types of problems, and the proper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.