The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Privacy is an increasing concern as the number of databases containing personal information grows. Differential privacy algorithms can be used to provide safe database queries through the insertion of noise. Attackers cannot recover pieces of the initial data with certainty, but this comes at the cost of data utility. Noise insertion leads to errors, and signal to noise ratio can become an issue....
This paper presents an investigation into the detection and classification of drum sounds in polyphonic music and drum loops using non-negative matrix deconvolution (NMD) and the Itakura Saito divergence. The Itakura Saito divergence has recently been proposed as especially appropriate for decomposing audio spectra due to the fact that it is scale invariant, but it has not yet been widely adopted...
In this paper, we study the problem of mining frequent sequences under the rigorous differential privacy model. We explore the possibility of designing a differentially private frequent sequence mining (FSM) algorithm which can achieve both high data utility and a high degree of privacy. We found, in differentially private FSM, the amount of required noise is proportionate to the number of candidate...
The best form of identifying a person for criminal investigation is from the fingerprint. Identifying suspects based on latent fingerprint is a procedure that is extremely important to forensics and law enforcement agencies. The small number of minutiae and the noise characteristic of latents make it extremely difficult to automatically match latents to their mated full prints that are stored in law...
In the recent years, contour-based shape representation is an important issue in the object recognition research area. In this paper, a new shape descriptor A-DCE is proposed based on DCE and DP for contour deformation and recognition. Firstly, the object contour is evolved adaptively by DCE to extract the contour information with important visual parts. Secondly, the costing feature descriptor is...
Original sequential pattern mining model only considers occurrence frequentness of sequential patterns, disregards their occurrence periodicity. We propose the asynchronous periodic sequential pattern mining model to discover the sequential patterns which are not only occurring frequently, but also appearing periodically. For this mining model, we propose a pattern-growth mining algorithm to mine...
In this paper, we focus on developing a novel noise-robust LBP-based texture feature extraction scheme for texture classification. Specifically, two solutions have been proposed to overcome the primary two reasons that cause local binary pattern sensitive to noise. First, a hybrid model is proposed for noise-robust texture description. In this new model, the local primitive micro features are encoded...
A measurement system able to extract the envelop of signals coming from electrical motors has been presented. The system use a tri-axial accelerometer mounted on an electrical motor used on small Unmanned Aerial Vehicles to made a vibrational analysis. The aim of this paper is to show the first part of this system based on the Envelope Analysis that, with the support of a database and a comparison...
Most of the clustering algorithms are affected by the number of attributes and instances with respect to the computation time. Thus, the data mining community has made efforts to enable induction of the clustering efficient. Hence, scalability is naturally a critical issue that the data mining community faces. A method to handle this issue is to use a subset of all instances. This paper suggests an...
We aim to learn local orientation field patterns in fingerprints and correct distorted field patterns in noisy fingerprint images. This is formulated as a learning problem and achieved using two continuous restricted Boltzmann machines. The learnt orientation fields are then used in conjunction with traditional Gabor based algorithms for fingerprint enhancement. Orientation fields extracted by gradient-based...
Low-rank matrix completion has recently emerged in computational data analysis. The problem aims to recover a low-rank representation from the contaminated data. The errors in data are assumed to be sparse, which is generally characterized by minimizing the L1-norm of the residual. This actually assumes that the residual follows the Laplacian distribution. The Laplacian assumption, however, may not...
In this paper we introduce an algorithm to analyze the human iris, long-range iris recognition software has been developed to be more user-friendliness and create an economic way to the identification. Our algorithm centralized on pupil detection, and by using estimated ranges we omit the other regions to create more efficient search space. The final decision on iris region detection provides by Hough...
The difficulties faced by hearing and speech impaired people in communicating with others and among themselves can be easily overcome by building an assistive communication system. This real time communication system enables differently impaired people to communicate among themselves without an intermediate human translator. The proposed system is a potential human-computer and computer-human interaction...
This paper comes within the framework of designing a recognition system of mathematical symbols. Through this, we first recall the general process of recognition of mathematical symbols while focusing on the description of our method for segmentation of offline mathematical symbols. Our goal is to detect, extract and segment the different symbols of mathematical expression. This expression will be...
ECG analysis represents a key way of determining the condition of a patient's heart and the accurate detection of the R-peak in the QRS complex of an ECG signal is one of the most important steps for proper diagnosis. In this paper we present R-READER: a Rapid-Ramp Effective Algorithm for Detection of ECG R-peaks; it uses the slopes between adjacent signals to determine the occurrence of the R-peak...
Automatic detection of Atrial Fibrillation (AF) is necessary for the long-term monitoring of patients who are suspected to have AF. Several methods for AF detection exist in the literature. These methods are mainly based on two different characteristics of AF ECGs: the irregularity of RR intervals (RRI) and the fibrillatory electrical Atrial Activity (AA). The electrical AA is characterized by the...
The problem of similarity measure for time series has attracted considerable research interest. Most of the recently used algorithms utilize the Dynamic Time Warping (DTW) distance for measuring the similarity of time series, in various areas such as science, medicine, industry, and finance. DTW is a considerably more robust distance measure for time series, which allows similar shapes to match even...
In order to improve the poor accuracy and stability of the traditional geomagnetic matching navigation by TERCOM, In this paper, we discuss a new method which is based on the integration of TERCOM, K-means clustering algorithm and INS (inertial navigation system) in detail. Through an experiment, we find that the new method has higher accuracy and stability than the traditional method, especially...
This paper describes the design and verification of algorithm for voice transmission quality measurements in the environment of non-native listeners; it means the communication language differs from the mother tongue of the expected communication service user. The algorithm is based on existing ITU-T P.862 (PESQ) enhanced by newly developed non-nativity emulation block. The calculations in this block...
Identification of singular points in the ridge structure is an important problem in fingerprint matching. This paper presents a fingerprint singular point detection method that is applicable to various fingerprint images regardless of their resolutions. Using the Discrete Hodge Helmholtz Decomposition (DHHD) method, potential structures of singular points can be extracted. We also calculate Poincare...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.