Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Classical methods for processing and analysis of multidimensional signals — such as color videos and hyperspectral images — do not exploit full information contained in inner their factors. On the other hand, recently developed tensor based methods allow for data representation and analysis which directly account for data multidimensionality. Examples can be found in many applications such as face...
Grey Level Co-Occurrence matrix is one of the oldest techniques used for texture analysis. The Grey Level Co-Occurrence matrix has two important parameters i.e. distance and direction. In this paper various combinations of distance and directional angles used for GLCM calculation are analyzed in order to recognize certain patterned images based on their textural features. Patterns considered in this...
Visualization became one of the solutions in showing the attack on the network. With Visualize the attack, it would be easier in recognizing and conclude the pattern from the complex image visual. The target of DoS attacks can be addressed to the various parts of the network, it can be routing, web, electronic mail or DNS servers (Domain Name System). The purpose of the DoS attacks create a server...
Many computer vision problems require optimization of binary non-submodular energies. In this context, iterative submodularization techniques based on trust region (LSA-TR) and auxiliary functions (LSA-AUX) have been recently proposed [9]. They achieve state-of-the-art-results on a number of computer vision applications. In this paper we extend the LSA-AUX framework in two directions. First, unlike...
Recently, Long Short-Term Memory (LSTM) has become a popular choice to model individual dynamics for single-person action recognition. However, existing RNN models only focus on capturing the temporal dynamics of the person-person interactions by naively combining the activity dynamics of individuals or modeling them as a whole. This neglects the inter-related dynamics of how person-person interactions...
To solve the problem of real-time and regional identification in an intelligent control classroom, both edge and extended moment invariants are employed in this paper. By computing and visually analysing the moment invariants from a classroom video image, a set of 10-dimensional edge invariant moments is chosen, which is stable, practical and provides adequate real-time performance. The pattern recognition...
${K}$ -nearest neighbor rule (KNN) and sparse representation (SR) are widely used algorithms in pattern classification. In this paper, we propose two new nearest neighbor classification methods, in which the novel weighted voting methods are developed for making classification decisions on the basis of sparse coefficients in the SR. Since the sparse coefficients can well reflect the neighborhood...
This paper aims to show how some eye-tracking variables during reading are affected by various major factors, including individual differences, the difficulty level of the text, and the topic of the text. For this purpose, we conducted an eye-tracking experiment with 21 subjects who read six passages with different topics. For each subject, changes in three variables were evaluated: the mean fixation...
In this paper we consider the problem of training a Support Vector Machine (SVM) online using a stream of data in random order. We provide a fast online training algorithm for general SVM on very large datasets. Based on the geometric interpretation of SVM known as the polytope distance, our algorithm uses a gradient descent procedure to solve the problem. With high probability our algorithm outputs...
Colour, texture, shape, and relative position descriptors are fundamental visual descriptors. In particular, a relative position descriptor is a quantitative representation of the relative position of two spatial objects, and a basis from which models of spatial relationships (like inside, above, around, near) can be derived. The affine properties of visual descriptors have been the subject of much...
Support Vector Machine (SVM) is usually used to pattern recognition, classification and regression analysis. However, SVM is easily affected by tilt datasets, which can lead to the offset of the classification decision surface and can make the optimal hyperplane inclined to the small sample size class. Consequently, this certainly will increase the classification error. To solve the problem, this...
J. Conway's renowned evolutionary problem Game of Life attracts researchers for its capability to transfer the deputized patterns from a generation to its next. In this paper, we propose an efficient solution to this Game problem. In the implementation of the proposed solution a higher abstraction has been used to partition the program into serial and parallel regions. This abstraction improves the...
In this research, a study on color image reconstruction from Bessel-Fourier moments is conducted. We have calculated the Bessel-Fourier moments of a color image in three different color channels, reconstructed images in different color channels, and integrated the separately reconstructed images to a color image. Our experimental results show that the color image reconstruction performances from different...
Clustering plays a basic role in many areas of data engineering, pattern recognition and image analysis. Gaussian Mixture Model (GMM) and Cross-Entropy Clustering (CEC) can approximate data of varied shapes by covering it with several clusters e.g. elliptical ones. However, it often happens that we need to extract clusters concentrated around lower dimensional non-linear manifolds. Moreover it is...
This Paper proposes a novel method for the blind detection of image pre-processing techniques by means of statistical pattern recognition in image forensics. The technique is intended to detect sensor intrinsic pre-processing steps as well as manually applied filters. We have exemplary chosen 6 pre-processing filters with different parameter settings. The concept utilizes 29 image features which are...
Historical documents are essentially formed of handwritten texts that exhibit a variety of perceptual environment complexities. The cursive and connected nature of text lines on one hand and the presence of artefacts and noise on the other hand hinder achieving plausible results using current image processing algorithm. In this paper, we present a new algorithm which we termed QTE (Query by Text Example)...
This paper proposes a new similarity measure between intuitionistic fuzzy sets (IFSs) for pattern recognition based on the centroid points of transformed right-angled triangular fuzzy numbers to deal with pattern recognition problems. The proposed similarity measure between IFSs outperforms the existing similarity measures for dealing with the pattern recognition problems.
Visual secret sharing (VSS) scheme aims to encrypt a secret image into multiple (more than or equal to 2) secret shares. The secret share could be treated as an image with random black and white pixels. The secret image will be revealed by collecting all the shares. In the past related works, the VSS schemes focus on how to generate a best security or how to achieve an optimal contrast for secret...
General purpose compilers aim to extract the best average performance for all possible user applications. Due to the lack of specializations for different types of computations, compiler attained performance often lags behind those of the manually optimized libraries. In this paper, we demonstrate a new approach, programmable composition, to enable the specialization of compiler optimizations without...
Arrangement of description of any specific object have a pattern structure in image processing filed to analyze and observe a targeted object and declare as goal is a hot field of research. For a random situation complexity is going to increase when we have classes that specifies concurrently and co-relate with each other with complex database. With an algorithm to follow sketch and finalized as a...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.