The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Machine-learning test strategy has been developed in the last decade as an alternative to costly specification-driven tests for Analog, Mixed-Signal and RF circuits (AMS-RF). The concept is simple: powerful algorithms are used to map simple measurements onto specifications. But the proper execution requires an information-rich input space. This paper presents an efficient hybrid algorithm to select...
In this paper, a global algorithm for human action, facial and gesture recognition is presented. The proposed algorithm depends on the extraction of multiple transform domain features and Canonical Correlation Analysis (CCA) for features fusion and classification. The proposed algorithm achieved the best reported results for facial and facial expression recognition. Excellent comparable results were...
The widely known classifier chains method for multi-label classification, which is based on the binary relevance (BR) method, overcomes the disadvantages of BR and achieves higher predictive performance, but still retains important advantages of BR, most importantly low time complexity. Nevertheless, despite its advantages, it is clear that a randomly arranged chain can be poorly ordered. We overcome...
Intrusion detection system (IDS) research field has grown tremendously in the past decade. Improving the detection rate of user to root (U2R) attack classes is an open research problem. Current IDS uses all data features to detect intrusions. Some of the features may be redundant to the detection process. The purpose of this empirical study is to identify important features to improve the detection...
To solve the problem of the low rate of recognition in current complex pulse recognition, this paper puts forward a new approach to it. The paper preprocess and analyze the pulse information by using the neural network and genetic algorithm. The algorithm system includes pulse information collecting, network training, simulant diagnosis, correlation analysis. Pearson's coefficient test shows the system...
Aflatoxin is one of the mycotoxins released by Aspergillus flavus and Aspergillus parasiticus. It is carcinogenic and has stringent regulations in terms of residue limit across the globe. Various food commodities like chilli, groundnut, maize and nutmeg are susceptible to aflatoxin and face challenges in meeting the residue limits set by various importing countries. ITC Limited, an FMCG Conglomerate...
Recently, bug resolution has become a pivotal issue for software maintenance where recommendations for appropriate fixers are an important task. Some approaches (e.g., Social network and machine learning techniques) exist that can achieve automatic bug triage (i.e., Developer recommendation). This paper proposes a new method to recommend the most suitable fixer for bug resolution. Different from previous...
A wireless local area network infrastructure, consisting of a couple of tens of access points exists in each office building, university or even block of flats. These can be used for indoor localization purposes without interfering with network activities. In this paper a correlation based method for indoor localization is presented. No specific infrastructure is needed except for the existing wireless...
The idea concerning usage of the eye movement for human identification has been known for 10 years. However, there is still lack of commonly accepted methods how to perform such identification. This paper describes the second edition of Eye Movement Verification and Identification Competition (EMVIC), which may be regarded as an attempt to provide some common basis for eye movement biometrics (EMB)...
Multimodal brain imaging data fusion is a scientifically interesting and clinically important topic; however, there is relatively little work on N-way data fusion. In this paper, we applied multi-set canonical correlation analysis (MCCA) to combine data of resting state fMRI, EEG and sMRI, in order to elucidate the abnormalities that underlie schizophrenia patients and also covary across multiple...
Eye localization is a key step in many face analysis related applications. In this paper, we present a novel eye localization method based on a group of trained filters called correlation filter bank (CFB). We formulate the eye localization problem as an optimization problem with a well-defined cost function based on CFB. The CFB is trained with an EM-like adaptive clustering approach. The trained...
In this paper, a novel naïve Bayesian classifier based on the hybrid-weight feature attributes (short of "NBCHWFA") is proposed. NBCHWFA arranges a hybrid weight for each feature attribute by merging the effectiveness of feature attribute on classification and the dependence between feature attribute and class attribute. In order to demonstrate the feasibility and effectiveness of proposed...
Dyspepsia is a condition of indigestion and became one of the diseases with a large number of patients in Indonesia. Early detection of Dyspepsia is done to assist in the prevention of the disease. Iridology is a method of early detection in human organs disorders by analyzing the iris patterns. However, the application of Iridology technique often finds difficulties because it requires a high level...
In this paper, we study neural network ensembles (NNE) classifier with regularized negative correlation learning (RNCL) and its application to pattern classification. In RNCL algorithm, the regularization parameter is used to control the trade off between mean square error and regularization, and to improve the ensemble's generalization ability. We propose an automatic RNCL algorithm based on gradient...
The hidden Markov model is supposed as the most common and effective method used in speech recognition for all languages including Vietnamese. However, this method is quite cumbersome and difficult to implement in many embedded systems that have limited resources. Dynamic Time Warping (DTW) method, whereas, has been in much study by many scientists and is proved to be simple and efficient for a relatively...
MicroRNAs (miRNAs) are small, non-coding RNAs which are involved in the posttranscriptional modulation of gene expression. Their short (18–24) single stranded mature sequences are involved in targeting specific genes. It turns out that experimental methods are limited and that it is difficult, if not impossible, to establish all miRNAs and their targets experimentally. Therefore, many tools for the...
The existing high resolution palm print matching algorithms essentially follow the minutiae-based fingerprint matching strategy and focus on full-to-full/partial-to-full palm print comparison. These algorithms would face problems when they are applied to forensic palm print recognition where latent marks have much smaller area than full palm prints. Therefore, towards forensic scenarios, we propose...
Traditional image subcategory classification methods combined multiple features into a feature vector. Such methods neglect distinct roles of diverse features on discriminating image subcategories. In this paper, the Dempster-Shafer evidence theory is applied to fuse different features in image subcategory classification. It considers the different contribution of each feature to image classification...
This paper presents a new semi-supervised method to effectively improve traffic classification performance when few supervised training data are available. Existing semi supervised methods label a large proportion of testing flows as unknown flows due to limited supervised information, which severely affects the classification performance. To address this problem, we propose to incorporate flow correlation...
Cross-Validation (CV) is the primary mechanism used in Machine Learning to control generalization error in the absence of sufficiently large quantities of marked up (tagged or labelled) data to undertake independent testing, training and validation (including early stopping, feature selection, parameter tuning, boosting and/or fusion). Repeated Cross-Validation (RCV) is used to try to further improve...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.