The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a novel local posture orientation-context descriptor, and proposes a FDDL(Fisher discriminant dictionary learning) method based on local orientation-preserving(LOP-FDDL) for sparse coding in action recognition task. To take full use of the information about the position of the local body-part related to the center of the torso, ant the spatial-temporal shape changes of the human...
In this paper, we propose a new discriminative dictionary learning framework, called robust Label Embedding Projective Dictionary Learning (LE-PDL), for data classification. LE-PDL can learn a discriminative dictionary and the blockdiagonal representations without using the l0-norm or l1-norm sparsity regularization, since the l0 or l1-norm constraint on the coding coefficients used in the existing...
This paper presents a peak-triggered sampling scheme for future cochlear implants that aim to reserve temporal fine structure in the neural stimulation pulses. To address the low-power and small-area challenge for such application, the asynchronous delta modulation techniques are used to implement the scheme in VLSI circuitry. Simulation results show that the proposed circuitry achieves the required...
TCM is a traditional medicine in China and has made great contributions to the Chinese nation and has rich information resources. With the development of information technology, data mining technology is rapidly rising. Under the guidance of Chinese medicine theory, how to combine data mining technology with Chinese medicine to make it serve people has become a new topic. This paper mainly applies...
The latest video compression standards, such as the H.264/AVC and the High Efficiency Video Coding (HEVC), provide fast Motion Estimation (ME) algorithms in their reference software aiming at complexity reduction. Test Zone Search (TZS) is the state-of-the-art fast ME algorithm, currently deployed in the reference HEVC encoder due to its great coding efficiency. However, ME is still one of the main...
In recent years, many online health communities (OHCs) are established to provide the patients with the services of disease prevention and self-management. Patients in those online health communities discuss their health conditions and share their experiences with other patients using narrative texts in the posts. Those posts contain a vast amount of patients' information, including drugs, symptoms,...
In this paper we present our exploratory findings related to extracting knowledge and experiences from a community of senior tourists. By using tools of qualitative analysis as well as review of literature, we managed to verify a set of hypotheses related to the content created by senior tourists when participating in on-line communities. We also produced a codebook, representing various themes one...
Document summarization is a strategy, intended to extract information from multiple documents, deliberating the same subject. Many software applications handle document summarization, helping people grab the main thought, from a collection of documents, within a short time. Automatic summaries present information algorithmically extracted from multiple sources, without any impressionistic human intervention...
We investigate the properties of two particular sets of separable two-qubit states with maximally mixed marginals, named parallel states and antiparallel states respectively. Although these two sets of states are prepared by the same type of quantum operations acting on classically correlated states with equal classical correlations, they share different properties. By comparing two fundamental figures...
Iris recognition is a biometric authentication system proving vital for ensuring security and has been employed as an important case to test the algorithms developed in pattern recognition. The unique circular shape of the iris and its time invariance makes it a versatile technique that has an accuracy that can be mathematically proven. Here in this work we propose a new segmentation technique and...
Software repositories contain a lot of information that can be transformed into suggestions other files they need to modify during maintenance tasks (so-called "coupled changes"). Existing studies however ignore developer feedback and their influence on the developer strategy for getting help during maintenance tasks. We used the Grounded Theory approach to investigate screen capture videos...
Predictive process monitoring emerged as a technique to anticipate the outcome of a running instance of a business process. To this end, it first constructs a forecast model based on an encoding of traces of past process executions that are labelled with the prediction target. This model is then used to predict the outcome of a running process instance. However, existing approaches neglect that real-world...
We consider the {n, k, d, l) secure exact-repair regenerating code problem, which generalizes the {n, k, d) exact-repair regenerating code problem with the additional constraint that the stored file needs to be kept information-theoretically secure against an eavesdropper, who can access the data transmitted to regenerate a total of l different failed nodes. For all known results on this problem,...
Fuzzy association rules are one of the most important data mining techniques. They allow to discover useful and meaningful information that help in decision-making. Many algorithms have been proposed to extract fuzzy association rules. A major drawback of these proposed algorithms is their high run-time for extracting fuzzy association rules. To overcome this problem, we introduce in this paper a...
As the software development community makes it easier to contribute to open source projects, the number of commits and pull requests keep increasing. However, this exciting growthrenders it more difficult to only accept quality contributions. Recent research has found that both technical and social factors predictthe success of project contributions on GitHub. We take this question a step further,...
Static analysis tools are often used by software developers to entail early detection of potential faults, vulnerabilities, code smells, or to assess the source code adherence to coding standards and guidelines. Also, their adoption within Continuous Integration (CI) pipelines has been advocated by researchers and practitioners. This paper studies the usage of static analysis tools in 20 Java open...
Chat messages of development teams play an increasinglysignificant role in software development, having replacedemails in some cases. Chat messages contain informationabout discussed issues, considered alternatives and argumentationleading to the decisions made during software development. These elements, defined as rationale, are invaluable duringsoftware evolution for documenting and reusing developmentknowledge...
Given a programming problem, because of a variety of data structures and algorithms that can be applied and different tradeoffs, such as space-time, to be considered, there may be many distinct solutions. By comparing his/her solution against others’ and learning from the distinct solutions, a learner may quickly improve programming skills and gain experience in making trade-offs. Meanwhile, on the...
Source code comments are valuable to keep developers' explanations of code fragments. Proper comments help code readers understand the source code quickly and precisely. However, developers sometimes delete valuable comments since they do not know about the readers' knowledge and think the written comments are redundant. This paper describes a study of lost comments based on edit operation histories...
Data obfuscations are program transformations used to complicate program understanding and conceal actual values of program variables. The possibility to hide constant values is a basic building block of several obfuscation techniques. For example, in XOR Masking a constant mask is used to encode data, but this mask must be hidden too, in order to keep the obfuscation resilient to attacks. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.