The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Alzheimer's disease (AD) is the most common cause of age-related dementia, which prominently affects the human connectome. Diffusion weighted imaging (DWI) provides a promising way to explore the organization of white matter fiber tracts in the human brain in a non-invasive way. However, the immense amount of data from millions of voxels of a raw diffusion map prevent an easy way to utilizable knowledge...
Whenever a research scholar starts working on some innovative ideas he/she searches for the domain specific technical research articles published as research papers in most of the international journals, conferences or workshops. The problems associated with these papers are similarity in contents and repeated relevant information. Reading these all relatedpapers completely one by one to get the latest...
Nowadays people's life become more rich and convenient than before, but the obesity also become a problem with people. One cause of obesity is lack of exercise. Although the reason is known by people and the method of keeping health is self maintenance, but it is hard for most people, especially the elderly people. Because of this, we design a daily exercise support application, which is based on...
Steganography can be defined as a method of hiding data within a cover media so that other individuals fail to realize their existence. Steganographic systems play a vital role in covertly transmission of information even in the presence of an arbiter The message can be hidden in images, audio files or in text. Although the embedded message changes the characteristics and nature of the document in...
This paper puts forward a method to extract information from input image and further analyse using that information. However it is relatively difficult to extract the information as the segmentation technique required, is variable between images; a limit of segmentation performance. The main objective of our paper is to propose an algorithm on how to extract that relative information out of given...
The field of Culturomics exploits “big data” to explore human society at population scale. Culturomics increasingly needs to consider geographic contexts and, thus, this research develops a geospatial visual analytical approach that transforms vast amounts of textual data into emotional heatmaps with fine-grained spatial resolution. Fulltext geocoding and sentiment mining extract locations and latent...
This paper describes a framework for perception creation from sensor data. We propose using data abstraction techniques, in particular Symbolic Aggregate Approximation (SAX), to analyse and create patterns from sensor data. The created patterns are then linked to semantic descriptions that define thematic, spatial and temporal features, providing highly granular abstract representation of the raw...
In this paper, we propose a method for representing “neighborhoods” of moving objects such as people. By using neighborhoods, it is possible to determine whether the spatial relations between objects and their surrounding spatial information are strong. It can be said that a neighborhood is the spatial area of an object's attention, interest or concern. It is preferable that neighborhoods move while...
Located in the Western Hubei eco-tourism circle, the Wudangshan Tourism and Economic Special Zone, has beautiful scenery and good natural environment. The ecological protection will become especially important. Therefore, it is very significant to research on ecological land of the Special Zone. The types of ecological land use were first defined in the article. Then, various types of land use changes...
Software developers have long been supported by a variety of tools, such as version control systems (e.g., GIT), issue tracking systems (e.g., BugZilla), and mailing list services (e.g., Mailman). These tools accumulate a wide range of information that is recorded in the repositories these tools store their data in. This information is comprised of two significantly different types of data: structured...
Facial asymmetry is an important characteristic used in a number of applications. It plays a vital role in human perception of attractiveness and as such has been used in psychology including research on facial expressions evaluation as well as in plastic surgery and orthodontics. It has been also recognized as a biometric feature used for identification and has important applications in detection...
Non-verbal human social signals have emerged as an important area of study including the analysis of human deception. The ability to credibly detect truth and deception can be critical today especially due to the wave of terrorism acts and illegal immigration upheavals just to mention a few instances where individuals might not be forthright with their information. Unlike for non-verbal human social...
With the development of mobile web integration technologies and wireless sensor networks, the interactive activities of human society increasingly rely on the heterogeneous network environment including the communication network, the Internet and sensor networks. This paper tries to apply socially aware computing and data mining to the mobile web application integration technology. It emphasizes understanding...
When a lot yield is low, we used to survey the related APC data whether it shows the abnormal signal and could be detected early to minimize the yield loss. And now, we propose to identify the yield impact by using the abnormal data detected by checking the trend or from the frequency alarm of FDC. Then we'll know the importance and share with the module as a lesson learned.
In recent years, many user-interface devices appear for managing variety the physical interactions. There are the researches with the interface model of body movements in a learning environment. In this paper, we talk about a motion mining supporting system using Microsoft Kinect for educational system developments.
Unusual behaviour detection and information extraction in streams of short documents and files (emails, news, tweets, log files, messages, etc.) are important problems in security applications. In [1], [2], a new approach to rapid change detection and automatic summarization of large documents was introduced. This approach is based on a theory of social networks and ideas from image processing and...
Due to the development of World Wide Web technologies, people are living in the place flooding trillions of web pages in every moment. The amount of web size has been increasing dramatically. For this reason, it is getting more difficult to find relevant web documents corresponding to what users want to read. Classifying documents into predefined categories is one of the most important tasks in Natural...
Human gait is the main activity of daily life. Gait can be used for applications like human identification (in medical field etc). Since gait can be perceived from a distance it can be used for human identification. Gait recognition means identifying the person with his/her gait. Human identification using gait can be used in surveillance. A method is proposed for gait recognition using a technique...
In this research, the authors aimed to mining Life logs for developing a user model-based service application. Life logs can be constructed by analyzing Motion logs, which are obtained from questionnaires, or motion data collected from sensors. And the user models, which help applications to provide appropriate service, can be constructed by mining these Life logs.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.