The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
DDoS attacks bring huge threaten to network, how to effectively detect DDoS is a hot topic of information security. Currently, there are some methods designed to detect DDoS attacks, but the detection rate of them is low. Moreover, DDoS detection is easily misled by flash crowd traffic. In this paper, a new method to detect DDoS attacks based on RDF-SVM algorithm is proposed. By considering the importance...
This work presents an original real time, robust micro-expression detection algorithm. The algorithm analyses the movement modifications that occur around the most prominent facial regions using two absolute frame differences. Next, a machine learning algorithm is used to predict if a micro-expression occurred at a given frame t. Two classifiers were evaluated: decision tree and random forest classifier...
Forest disturbances caused by Pantana phyllostachysae caused the death of extensive bamboos in Hubei province, China in 2015. Field survey is time-consuming and at higher cost to satisfy the forest management requirements. Satellite remote sensing technology having the characteristics of landscape of coverage, convenient, and fast in formation acquisition, is one of the most important and most effective...
This paper presents a Face Detection System with Expression Recognition using Artificial Neural Networks. It is an automated vision system designed and implemented using MATLAB. The Face Detection with Expression Recognition system accomplishes facial expression recognition through two phases. The captured image is processed first to detect the face, and then the facial expression is recognized. These...
Autonomous micromanipulation has a great potential to impact every research field concerning objects at a small scale. In this paper, we report our work on detection and tracking of a transparent SU-8 microchip in 3D Cartesian space during micromanipulation. Conditions such as occlusion, variant object orientation and poor edge prominence hinder the implementation of conventional vision algorithms...
While the world's population is growing, average life expectancy is increasing. As a result, the growing elderly population is profoundly affecting the delivery of healthcare for everyone and in particular for those with chronic diseases. The remote monitoring of chronic patients may be achieved by a telemedicine system utilizing today's information and mobile communication technologies. In this study,...
Covert channels exploit side channels within existing network resources to transmit secret messages. They are integrated into the elements of network resources that were not even designed for the purpose of communication. This means that traditional security features like firewalls cannot detect them. Their ability to evade detection makes covert channels a grave security concern. Hence, it is imperative...
In the context of triple play the media business is exploding. Incidents that TV shows and Web videos are tampered maliciously occur occasionally. To solve this problem, a LOF-Co-Forest algorithm is proposed and applied to video tamper detection. Experimental results show that the algorithm can be applied to different types of video tamper detection, having obvious advantages with less labeled samples,...
In this paper, we present a new approach for the detection and classification of real time road signs from video. The proposed system is composed of two processing stages: detection and classification signs. The system has detected road signs by color and shape feature of segmentation color in HSV color space, especially red and blue. The detected signs are then classified by method template matching,...
In this paper, we present a new approach for the detection and classification of real time road signs from video. The proposed system is composed of two processing stages: detection and classification signs. The system has detected road signs by color and shape feature of segmentation color in HSV color space, especially red and blue. The detected signs are then classified by method template matching,...
Search engines are usually used for exploring the net and finding required information. When search results are shown usually 10 links are included in the first page. It must be notices how many percent of achieved results are related to our request. Unfortunately some of advertisement websites utilize phony techniques to attract users so that they could obtain their personal goals (such as increase...
In this paper, we present work in progress on application scenario where a smartphone is used to detect and quantitatively index early signs of asthma attack triggered by exercise. Here, the embedded microphone in the mobile phone records the user's breath sound while motion sensors-accelerometer, gyroscope and digital compass provide measurements on the level or intensity of activity and posture...
Multiple people detection and tracking is a challenging task in real-world crowded scenes. In this paper, we have presented an online multiple people tracking-by-detection approach with a single camera. We have detected objects with deformable part models and a visual background extractor. In the tracking phase we have used a combination of support vector machine (SVM) person-specific classifiers,...
This paper proposes the application of Discrete Wavelet Transform (DWT) to detect the QRS of an electrocardiogram (ECG) signal. Wavelet Transform provides efficient localization in both time and frequency. In preprocessing stage, DWT is used to remove the baseline wander in the ECG signal. The performance of the algorithm of QRS detection is evaluated against the standard MIT BIH Arrhythmia database...
The paper presents Artificial Neural Network techniques that are used to determine the probability for the detection of breast cancer using feed forward neural networks trained by a back propagation algorithm. During training the back propagation were independently applied to optimize, to evolve inter connecting weights of the ANN's. This paper explored an ANN using 25 features like (12 patient history,...
Accurate and robust image analysis software is crucial for assessing the quality of ultrasound images of fetal biometry. In this work, we present the result of our automated image analysis method based on a machine learning algorithm in detecting important anatomical landmarks employed in manual scoring of ultrasound images of the fetal abdomen. Experimental results on 2384 images are promising and...
Sleep spindle is the hallmark of second stage of sleep in human being, which is defined as a rhythmic sequence with waxing and waning waves, whose frequency is approximately between 8 to 14 Hz, and its time duration is between 0.5 to 2 seconds. Bump modeling is a method for extracting regions with higher amounts of energy in a related time-frequency map. The bump model of the sleep spindle consists...
This paper presents an algorithm for Electrocardiogram (ECG) analysis to detect and classify ECG waveform anomalies and abnormalities. This is achieved by extracting various features and durations of the ECG waveform such as RR interval, QRS complex, P wave and PR durations. These durations are then compared with normal values to determine the degree and types of abnormalities. Most of the data used...
In the boost phase, it is important to early detect and classify an enemy ballistic missile for a swift defense response. These tasks can be typically achieved by search radar which is generally operated at a low data gathering rate of 6 and 12rpm. Moreover, detection altitude is limited by the elevation angle of an antenna. For these reasons, the number of radar measurement is about only 10 to 20...
A new method for detecting and classifying loudspeaker faults is presented in this paper. Total response of high-order harmonics groups is measured and used as defect features of loudspeaker. Based on support vector machine (SVM), we built a classification system combined with one-class SVM and Directed Acyclic Graphic SVM (DAGSVM). Comparing with K-nearest neighbor (k-NN) classifier, the accuracy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.