The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over the years, a large number of methods have been proposed to analyze human pose and motion information from images, videos, and recently from depth data. Most methods, however, have been evaluated on datasets that were too specific to each application, limited to a particular modality, and more importantly, captured under unknown conditions. To address these issues, we introduce the Berkeley Multimodal...
Synthesis of natural sounding speech is the greatest challenge in a Text-to-Speech Synthesis (TTS) system. In natural speech, duration, intensity and pitch are dynamically varied which is manifested as rhythm or prosody of speech. If these variations are not recreated, the synthesized speech will sound robotic. Synthesis of good quality speech depends on how well the duration and intonation patterns...
Ontology has become a very vital issue to solve important issues regarding human diseases through data integration of chemical and biological data. Mining such data discovers highly important knowledge about diseases can give an important insight to arrive to new drug targets and assist in personalized medicine. In the current paper, a mining technique for diseases is developed based on integrated...
This paper proposes a novel concept called gCreativity Miningh for making use of everybody's potential creativity. Even though it is quite difficult for general people to create novel things, that does not mean that we are not creative. We all potentially have creativity. We simply cannot manifest our potential creativity at will or are unaware of its existence. In this sense, we are not uncreative...
With the rapid advancement of hardware efficiency in recent years, computation power has significantly improved, increasing the speed and depths of the game tree search in computer chess programs. However, to satisfy the need of increasing search depth, the investment in hardware is no longer personally affordable. Thus, another method must be found in addition to improving the efficiency of hardware...
Image quality assessment (IQA) is a crucial feature of many image processing algorithms. The state-of-the-art IQA index, the structural similarity (SSIM) index, has been able to accurately predict image quality by assuming that the human visual system (HVS) separates structural information from non-structural information in a scene. However, the precision of SSIM is relatively lacking when used to...
Traditional methods do not actually measure peoples' risk attitude naturally and precisely. Therefore, a fuzzy risk attitude classification method is developed. Since the prospect theory is usually considered as an effective model of decision making, the personalized parameters in prospect theory are firstly fuzzified to distinguish people with different risk atti-tudes, and then a fuzzy classification...
This paper puts forward a method to extract information from input image and further analyse using that information. However it is relatively difficult to extract the information as the segmentation technique required, is variable between images; a limit of segmentation performance. The main objective of our paper is to propose an algorithm on how to extract that relative information out of given...
In this work, we present a new technique to speed up 3D shape retrieval. Instead of performing an exhaustive search over the whole database, which implies a systematic comparison of the query object with all 3D objects in the database, we restrict the pattern matching to a subset of “good candidates” (the most similar to the query). Assuming that the database has been partitioned into several classes,...
As human interfaces enhanced by augmented reality (AR) and ubiquitous service environments begin to take hold in society, researches are undertaken on daily life support services that focus on the availability of life logs. This paper presents an intelligent mirror (IM) system that is intended to assist the user with fashion coordination based on his/her clothes life logs. A clothes life log used...
The development of Affective Computing has witnessed tremendous number of studies about facial and vocal expression, while bodily expression only comprises the minority. However, with the emerging of social signal processing, people have paid more attention to the significant role of body language in social communication and emotional expression. One situation when body language shows its importance...
The recognition of face images is a complicated problem. Face images are often sufferedfrom variations in brightness, head rotation, facial emotions and so on. Besides, amazing abilities of human brain in face recognition in the presence of these variations, contribute to design face recognition systems based on procedure of human brain. Surveying the recognition and perceptual system of human, shows...
During the past years, face and gait recognition in video have received significant attention. Consequently, their recognition problems have challenged due to largely varying appearances and highly complex pattern distributions. However, the complementary properties of these two biometrics suggest fusion of them. Face recognition is more reliable when the person is close to the camera. On the other...
The importance and emphasis on interactive teaching is to implement the modern educational thought, but also to achieve quality education. Especially in online teaching, the strengths and weaknesses of the interaction is an important guarantee for the quality of teaching. This article describes the history and development of the game theory, summarizes three features of online games in the view of...
In this paper, we present a boosting approach by combining the pose estimation and the upper body tracking to on-line recognize human actions. Instead of using a predefined pose to initialize the human skeleton, we construct a key poses database with depth HOG features as searching indexes. When user enters the camera view, we automatically search the database to get the initial skeleton. Then we...
Hierarchical task network (HTN) is widely used for intelligent planning. For typical HTN algorithm, if the current state does not support any decomposition prescription, the HTN planner will not try to change the state, but just return failure. This characteristic requires technicians to compile a large prescription database, which is time consuming. To overcome this shortcoming, the paper infuses...
The human experience in the analysis of the handwriting of male and female writers indicates that gender affects the appearance of the handwritten text. These differences are usually very difficult to describe numerically. In order to analyze the handwriting differences between male and female writers, several shape description techniques, such as the tangent angle function, curvature function and...
The weak connection between human users and their digital identities is often the target vulnerability explored by attacks to information systems. Currently, authentication mechanisms are the only barrier to prevent those attacks. Traditional password-based authentication is efficient (especially from the user point of view), but not effective -- the lack of continuous verification is a severe access...
Supported by maturing information and communication technology (ICT) technologies, the medical care industry entered its digitization age. However, medical information is highly confidential and involves privacy; even legitimate access can cause privacy infringements. Under the current medical administration system, no established application systems conform to the IRB (Institutional review board)...
Emotion plays a critical role in human interaction. Listeners can perceive the emotional state of speakers from their facial expression, gestures and/or speech. In this paper, we investigate the relationship of the intended emotion expressed by speakers and the emotion perceived by listeners of a newly recorded corpus. We investigate the consistency of the emotion expressed by speakers and the emotion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.