The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, the importance of feature engineering has been confirmed by the exceptional performance of deep learning techniques, that automate this task for some applications. For others, feature engineering requires substantial manual effort in designing and selecting features and is often tedious and non-scalable. We present AutoLearn, a regression-based feature learning algorithm. Being data-driven,...
Ballistocardiogram (BCG) has been revisited in the last years as an unobtrusive method to detect heart beats. New electromechanical film (EMFi) sensors are now able to detect minimal oscillations in its surface, allowing to detect the mechanical action of the heart as it beats. This has allowed to develop unobtrusive systems for heart rate monitoring to be used as Point-of-Care devices, and to deploy...
Free-head 3D gaze tracking outputs both the eye location and the gaze vector in 3D space, and it has wide applications in scenarios such as driver monitoring, advertisement analysis and surveillance. A reliable and low-cost monocular solution is critical for pervasive usage in these areas. Noticing that a gaze vector is a composition of head pose and eyeball movement in a geometrically deterministic...
The objective of this paper is to describe a least square method to compute the far field from a nonuniformly spaced antenna array. This is because the far field pattern of an antenna array is the Fourier transform of the current distribution developed on the antenna structure, This is equivalent to computing the spectrum from a nonuniformly spaced data set using a least squares method. The merit...
The performance of classification of various mental states using Electroencephalography (EEG) is often limited by the lack of information regarding the most discriminative channels and frequency bands. The paper proposes a Canonical Correlation Analysis (CCA) of EEG recorded during bilateral imagined hand movement. CCA determines linear transformation of EEG that is maximally correlated with a transformed...
This paper proposes a general analytical approach to derive the outage probability of hybrid automatic repeat request with incremental redundancy (HARQ-IR) over correlated fading channels in closed-form. Unlike prior analyses, the consideration of channel correlation is one of the key reasons making the outage analysis involved. Using conditional Mellin transform, the outage probability of HARQ-IR...
It is well known that given the (partial) correlation sequence from a 2nd order stationary Gaussian process, one can associate a (rational) positive real function with it. Indeed, a partial correlation sequence can be essentially be described by a lossless two-port, a passive loading of which provides all extensions of partial correlation sequence. While the above is true for one-dimensional processes...
We present our previous work in [17] in a more generic way to construct q-ary Golay complementary sets and near-complementary sets of size N and sequence length M · Nm by using different seed sequences, where m is an arbitrary non-negative integer, M is the length of seed sequences and N is a power of 2. The boolean functions of these sequences will also be derived with our method. To illustrate it,...
Image Multi-label Classification (IMC) assigns a label or a set of labels to an image. The big demand for image annotation and archiving in the web attracts the researchers to develop many algorithms for this application domain. The Multi-Instance Multi-Label Learning (MIML) is an important type of machine learning framework proposed recently for IMC. In this framework, an image is described with...
Semi-bent functions have very high nonlinearity and hence they have many applications in symmetric-key cryptography, binary sequence design for communications, and combinatorics. In this paper, we focus on studying the additive autocorrelation of semi-bent functions. We provide a lower bound on the maximum additive autocorrelation absolute value of semi-bent functions with three-level additive autocorrelation...
Multimodal medical volumetric image fusion (MVIF) plays an important role in medical image processing. This paper presents a novel MVIF method based on multifeature obtained by a multiscale geometric analysis of the threedimensional shearlet transform (3DST) with contextual hidden Markov model (CHMM) and type-2 fuzzy logic techniques. First, the preregistered medical volumetric images are decomposed...
This paper presents two intra prediction algorithms in High Efficiency Video Coding (HEVC) encoder for reducing the computational complexity and increase the encoding speed. The first algorithm takes advantage of the high spatial correlation among neighboring pixels to substitute the reference samples as the first row or first and second rows of the current block to be predicted, while the pixels...
Feature embedding is an emerging research area which intends to transform features from the original space into a new space to support effective learning. Many feature embedding algorithms exist, but they are often designed to handle a single type of feature, or users have to clearly separate features into different feature views and supply such information for feature embedding learning. In this...
Epilepsy is a typical neurological disorder. To find the characteristics of epilepsy, scalp level connectivity is one of the interests that widely studied before. However, another aspect about the scalp representative channels, which presents the synchronous regions, has not yet been investigated. In this work, we focus on study the scalp responses of epilepsy by connectivity and representative channels...
The aim of this paper is to adapt automatic jigsaw puzzle solvers, which are methods of assembling jigsaw puzzles, to the field of information security. Encryption-then-Compression (ETC) systems have been considered for the user-controllable privacy protection of digital images in social network services. Block scrambling-based encryption schemes, which have been proposed to construct ETC systems,...
This paper presents a new approach for action recognition in the first-person videos which aggregates both of the short- and long-term trends based on the coefficients of the Hilbert-Huang transform (HHT), a renowned time-frequency analysis tool. In contrast to previous works like Pooled Time Series (PoT), the new scheme can extract the salient features of activities based on the non-stationary HHT...
The core of existing cross-modal retrieval approaches is to close the gap between different modalities either by finding a maximally correlated subspace or by jointly learning a set of dictionaries. However, the statistical characteristics of the transformed features were never considered. Inspired by recent advances in adversarial learning and domain adaptation, we propose a novel Unsupervised Cross-modal...
In this paper we introduce two fundamentally different techniques for optimizing counter formations in team sports. In the first technique, we use canonical correlation analysis (CCA) to learn an "explicit" relationship between offensive and defensive formations. We then use the learned CCA components to make predictions about players' spatial position. Experimenting with the basketball...
In an IoT environment, process analysis becomes more difficult as a process usually spans over a set of autonomous and distributed sensors. This paper consummates our previous service hyperlink model, to encapsulate dependencies among events generated from services. To effectively discover service hyperlinks, we transform the service hyperlink discovery problem into a frequent sequence mining problem...
Consider a polar code designed for some binary memoryless symmetric channel. We develop a lower bound on the probability of error of this polar code under successive-cancellation decoding. The bound exploits the correlation between the various codeword bits and improves upon existing lower bounds.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.