The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This document presents a study regarding the potential of head movement in lie detection. The potential was analyzed using a non-invasive technique that detects the head movement out of video. In the literature there is a lot of information regarding lie indicators and for this reason we made a short review of them. Application was built in order to detect the head movement and head position by performing...
Accurate estimation of detection/classification performance for sidescan sonar systems in Mine Counter-Measure (MCM) applications is important for informing mission tactics and adapting autonomous behaviors. The approach presented in this paper assumes that detection/classification performance can be estimated solely from historical data collected from similar surveys. This paper introduces an algorithm...
Focusing on detection technology for autonomous underwater detection device which found marine target which radiated noise signal submerged in background noise, chaotic detector based on Duffing oscillator is researched. In this paper, the Duffing oscillator and chaotic detector based on Duffing oscillator are described. Through numerical simulation and theoretical analysis, it is proved that the...
Automatic detection of optic disc and fovea is a precursor to the computer-aided analysis of retinal pathologies. In this paper, we present a unified approach for optic disc and fovea detection based on normalized cross-correlation technique. The algorithm performance is optimized by introducing vector inner products and norms instead of conventional mean and variance computations. We report optic...
We consider the problem of inferring the operational status of a reactor facility using measurements from a radiation sensor network deployed around the facility's ventilation off-gas stack. The intensity of stack emissions decays with distance, and the sensor counts or measurements are inherently random with parameters determined by the intensity at the sensor's location. We utilize the measurements...
Wireless capsule endoscopy (WCE) is a contemporary method that can view the entire intestine. Because of its advantages, it has been widely used. However, physicians demand an automatic way to shorten the time required to analyze the produced images (over 55,000 images in one examination for one patient). In this paper a recognition system for CE imaging has been developed to automatically detect...
The application of machine learning to software fault injection data has been shown to be an effective approach for the generation of efficient error detection mechanisms (EDMs). However, such approaches to the design of EDMs have invariably adopted a fault model with a single-fault assumption, limiting the practical relevance of the detectors and their evaluation. Software containing more than a...
In this paper the method for extraction of selected human body features, particularly dimensional units, is presented. The key parameters we focus on are the total human body height, arm length, leg length, shoulders distance and head height. Prototype software solution utilizes Histogram of Oriented Gradients (HOG) and Haar classifiers algorithms. The analysis of existing object detection approaches...
It is a challenging task to detect people in crowded scene owing to the heavy occlusion and small object characteristic of crowed people. In this paper we propose a multi-layer regional-based convolutional network to address the tasks of people detection in the crowded scenes. Unlike the traditional methods, we propose an end-to-end framework that uses the convolutional network as feature extractor...
DDoS attacks bring huge threaten to network, how to effectively detect DDoS is a hot topic of information security. Currently, there are some methods designed to detect DDoS attacks, but the detection rate of them is low. Moreover, DDoS detection is easily misled by flash crowd traffic. In this paper, a new method to detect DDoS attacks based on RDF-SVM algorithm is proposed. By considering the importance...
This paper deals with induction machines bearing failures detection and diagnosis using vibration and temperature signals. It proposes the use of a new Classical Mechanics-inspired Optimization (CMO) metaheuristic for data clustering. To ensure failure detection, transitions from a state to another is analyzed in order to form a transitional model between system states generated by the clustering...
A new detection algorithm for direct sequence spread spectrum (DSSS) signals using peak-to-average power ratio (PAPR) is proposed. The received signals are divided into several blocks. Then we calculate peak-to-average power ratio of each block and we use the average of peak-to-average power ratios as test statistics. The advantage of the proposed algorithm is no need to estimate noise variance. Additionally,...
This paper introduces a novel system for sports motion analysis. The system utilizes wearable sensors and video cameras to detect a sports motion and to provide image sequences of the motion automatically. Deep neural networks were adopted for detection and explicit segmentation of a sports motion into submotions. The proposed system is evaluated by implementing a soccer kick analysis system as an...
Voltage dips are significant threat for distributed generation (DG) connected via grid-tie inverter to the power system. Fast detection of voltage dips is essential for proper operation of the DGs. The paper presents an overview of different methods for their detection. The dips can be traced by appearance of voltage harmonics. Therefore, categorization of harmonics estimation techniques is given...
Marine mammal tonal vocalizations are studied to help marine biologists get a better knowledge of their behavioral context. The vocalizations are often analyzed by characterization of the frequency contours. An automated frequency contour extraction method extended by image-based technique is proposed. The spectrogram is first de-noised and then two binary images are derived with a low threshold and...
This design takes MC9S12XS128 single chip microcomputer as the core, and takes linear CCD sensor as the detection element. It designs a system which can check the wood scar and drive the motor to be excised. In the aspect of software design, through the CodeWarrior IDE programming software in the operation process, can real-time monitor the change of the input signal, the computer can see different...
Nowadays, the safety of passengers on board is the first preoccupation for aircraft manufacturers. For this reason, next-generation helicopters are now being designed with a wide range of advanced technologies to reinforce safety. In this context, a new fire detection system based on reflectometry is proposed for monitoring the engines of helicopters. The main idea is to mesh engines by a fireproof...
Diabetic Retinopathy (DR) is an eye disease due to diabetes, which is the most ordinary cause of blindness among adults of working age in Malaysia. To date, DR is still screened manually by ophthalmologist using fundus images due to insufficiently reliable existing automated DR detection systems. However, the manual screening process is the weakest link as it is a complicated and time-consuming process...
It has been recognized that current phishing filters in existence today are steadily lacking in effectiveness. Furthermore, users and organizations are lacking appropriate security policies and education, which has led to massive reports of data and privacy breaches in organizations. To address this issue, a phishing filter is proposed which will build upon and broaden the scope of existing techniques...
The quality of source code is an important stake for the construction of software. The source code quality facilitates the maintenance and the evolution of the program. In the object-oriented paradigm, a modular system is easy to maintain thanks to its components with strong cohesion and weak or low coupling. Weak coupling is among the key factor to reduce the cost and the deadline of the system developing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.