The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid growth of online content consumption, knowing end-users and having actionable content insights has become extremely important for any online content provider. Insights from user segment identification could help in developing a content recommendation as well as new content acquisition. For advertisers, identifying segments could assist in designing ad campaigns with greater target accuracy...
This paper proposes an approach to estimating fungibility between skills given multiple information sources of those skills. An estimate of skill adjacency or fungibility or substitutability is critical for effective capacity planning, analytics and optimization in the face of changing skill requirements of an organization. The proposed approach is based on computing a similarity measure between skills,...
Distance or similarity measures are essence components used by distance-based recognition techniques. Since the Euclidean distance function is the most widely used distance metric in PCA and LDA recognition systems , no empirical study examines the recognition performance based on these two methods by using different distance functions, especially for biometric authentication domain problems. The...
The dysregulations of long intergenic non-coding RNAs (lincRNAs) have shown to be linked with a wide variety of human diseases over the past few years. However, there are only a few lincRNA-disease association inference tools available with most of them relying on very specific type of prior knowledge about the lincRNAs and the diseases. They fall short in generalized association predictions when...
Recently, the problem of the intrusion detection has been largely studied by the computer and networks security communities. Then, the Intrusion Detection System (IDS) becomes a interest topic in research and in particular in machine learning and data mining. In order to improve the classification accuracy and to reduce high false alarm rate from the classical data base like KDD99 or others. In this...
Representing reality in computer graphics requires simulating the appearance of real-world materials. Bidirectional Reflectance Distribution Functions (BRDFs) are commonly used to perform this task, as they represent the appearance of a material through the quotient between the reflected radiance and the incoming irradiance at this point. Acquiring the BRDF of a real material is an expensive task...
Face recognition is considered as one of the relatively new and interesting concepts in the area of biometrics and comprises a huge number of applications. This study involves implementation of a robust recognition system by employing global and random local facial features of an individual. The proposed scheme considers the extraction of global facial features and some randomly selected local facial...
Interest on palmprint biometrics has experimented a strong growth in the last decades due to its useful characteristics as uniqueness, permanence, reliability, user-friendliness, acceptability, non-intrusiveness, and low cost of the acquisition devices, which make it attractive for civil and commercial applications. Accordingly, a wide research has been developed in this field. Nevertheless, there...
Biometrics is an active research field that is increasingly being integrated into current technology. As a result, more and more people are becoming familiar with biometric technics such as fingerprint or facial recognition. Nevertheless, there are innovative techniques such as ear-based biometrics which are not very well known yet because they are at initial stages of research. In this work, an ear...
Our aim is to use randomly generated image transformation in order to obtain image features of low dimensionality. The transformation consists of local projections of spatiallyorganized parts of an image, for example rectangular image blocks. After this transformation the content of an image is hidden and will not be stably recoverable, so it can be used in systems where privacy-preserving property...
Relaxed acquisition conditions in iris recognition systems have significant effects on the quality and resolution of acquired images, which can severely affect performance if not addressed properly. Here, we evaluate two trained super- resolution algorithms in the context of iris identification. They are based on reconstruction of local image patches, where each patch is reconstructed separately using...
Face recognition systems as a biometrie system for human identification and verification has indeed shown a lot of progress over the years, illustrated through the various applications it has been used for. These applications include Human Computer Interaction systems, law, terrorist attacks, health and multimedia indexing. Furthermore, the installation of face recognition systems in public and private...
This paper mainly introduces an image quality assessment for stereoscopic images via Convolutional Neural Networks (CNN). Firstly, the left and the right view images of a stereoscopic image need to be fused in the way of Principal Component Analysis (PCA). Secondly, method of Mean Subtraction and Contrast Normalization (MSCN) is applied in the fusion images. Finally, taking non-overlapping small patches...
This paper proposes an effective fusion scheme for extracting more discriminative information from bimodal biometrics at data, feature and decision levels. In all these three levels of fusion, information from both face andfingerprint image of a single subject are fused to effectively represent it in a more discriminative ways. For all these three approaches, a combination of wavelet and principal...
Ethnicity is one of the most salient clues to face identity. Analysis of ethnicity-specific facial data is a challenging problem and predominantly carried out using computer-based algorithms. Current published literature focusses on the use of frontal face images. We addressed the challenge of binary (British Pakistani or other ethnicity) ethnicity classification using profile facial images. The proposed...
Facial recognition is a challenging problem in image processing and machine learning areas. Since widespread applications of facial recognition make it a valuable research topic, this work tries to develop some new facial recognition systems that have both high recognition accuracy and fast running speed. Efforts are made to design facial recognition systems by combining different algorithms. Comparisons...
Recent work in the recognition of naturalistic expressions, which is also known as spontaneous facial expressions recognition, has attracted researchers' attention due to its importance in different behavioural and clinical applications. The main design challenges in the area of emotion computing for automatic recognition of spontaneous facial expression are the face pose, capture distance, illumination...
The number of deaths due to the motor vehicle accidents has increased drastically during the last few years. It is estimated that nearly 40–50 % of the accidents are due to the distractions of the driver. One of the methods to assess driver distraction is using head pose estimation. The unavailability of a standard driving database hampers the study and testing of driver distraction algorithms. In...
Security concerns increase as the technology for falsification advances and biometrics provides airtight security by identifying an individual based on the physiological and/or behavioral characteristics. Physiological hidden biometrics represented by ECG biomedical signal is highly confidential, sensitive, and hard to steal and replicate, and also hold great promise to provide a more secure biometric...
Heart electrical activity is measured on the body surface; this measure is known as electrocardiogram (ECG). The ECG signals are commonly accompanied by different types of noise, that can lead to a difficult and imprecise computational process to diagnose heart diseases. In this paper, we propose the Kernel Principal Component Analysis (KPCA) method, usually used in image denoising, for minimizing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.