The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Human-computer interaction is moving towards giving computers the ability to adapt and give feedback in accordance to a user's emotion. Studies on emotion recognition show that combining face and voice signals produce higher recognition rates compared to using either one individually. In addition, majority of the emotion corpus used on these systems were modeled based on acted data with actors who...
Laughter is one important aspect when it comes to non-verbal communication. Though laughter is often associated with the feeling of happiness, it may not always be the case; laughter may also portray different kinds of emotions. We infer that a variety of other emotions exist during laughter and occurrence and therefore investigate this phenomenon. It is the objective of this research to be able to...
Four group detection models (e.g. GDM, OGDM, SoDM and ComDM) are developed based on crime data features. These detection models are compared more common baseline SNA group detection algorithms. It is intended to find out, whether these four crime data specific group detection models can perform better than widely used k-core and n-clique algorithms. Two data sets which contain previously known criminal...
This paper explores website link structure considering websites as interconnected graphs and analyzing their features as a social network. Factor Analysis provides the statistical methodology to adequately extract the main website profiles in terms of their internal structure. However, due to the large number of indicators, a genetic search of their optimum number is proposed, and applied to a case...
Advancement in ambient intelligence is driving the trend towards innovative interaction with computing systems. In this paper, we present our efforts towards the development of the ambient intelligent space TALA, which has the concept of empathy in cognitive science as its architecture's backbone to guide its human-system interactions. We envision TALA to be capable of automatically identifying its...
In this paper, a novel method for profiling phishing activity from an analysis of phishing emails is proposed. Profiling is useful in determining the activity of an individual or a particular group of phishers. Work in the area of phishing is usually aimed at detection of phishing emails. In this paper, we concentrate on profiling as distinct from detection of phishing emails. We formulate the profiling...
Over the last decade blogs became an important part of the Web, where people can announce anything that is on their mind. Due to their high popularity blogs have great potential to mine public opinions regarding products. Such knowledge is very valuable as it could be used to adjust marketing campaigns or advertisement of products accordingly. In this paper we investigate how the blogosphere can be...
The motivation for the study described in this paper is realizing the fact that organizational structure of a group is a key indicator in determining its strengths and weaknesses. A general knowledge of the prevalent models of terrorist organizations leads to a better understanding of their capabilities. Knowledge of the different labels and systems of classification that have been applied to groups...
This paper proposes the method that makes an input target image into exaggerated cartoon-like images by using reference images. To deform a target image, we extract feature points from a target image and define the feature point model on reference images. And then, we apply feature based warping method to this deformation. For our result be felt more cartoonish, we additionally apply the luminance...
This paper proposes a new method to cluster law texts based on referential relation of laws. We extract law entities (an entity represents a law) and their referential relation from law texts. Then SimRank algorithm is applied to calculate law entity's similarity through referential relation and law clustering is carried out based on the SimRank similarity. This is the first time to apply SimRank...
In order to discriminate normal and abnormal heart sounds (HSs) accurately and effectively, a new method for clinical diagnosis of the heart valve diseases is proposed. The method is composed of three stages. The first stage is the preprocessing stage. During the pre-processing stage, the improved wavelet threshold shrinkage denoising algorithm is used for the noise reduction of the measured HSs....
HVS theory plays important role in the application of digital image watermarking technique. When inserting watermarking, the visual masking feature of HVS could be fully used to design digital watermarking algorithm with good perceived performance. When extracting watermarking from the damaged image, human's visual feature could be combined to recover the damaged image so as to obtain better effect...
Jiaguwen or Oracle bone script, which is inscribed on ox bones or tortoise shells of the Shang dynasty in ancient China, is one of the oldest mysterious characters in the world. Along with the rapid development of computer science and information technology, people are eager to deal with Jiaguwen characters just like the way they deal with modern characters. Unfortunately, Jiaguwen characters have...
Mean shift algorithm has grained great success in object tracking domain due to its ease of implementation, real time response and robust tracking performance, however, the fixed kernel bandwidth may cause tracking failure for size changing objects. A novel object tracking algorithm for FLIR imagery is proposed based on mean shift with adaptive bandwidth. The scale invariant feature transform is employed...
Because of having many advantages, optical fiber network is applied widely in high-tech fields. But the existence of optical fiber fusion defects will debase the quality of message transmission. A set of defect recognized system is established based on the compensatory fuzzy neural network of using wavelet and with fast algorithm in this paper. The `energy-defect' method to extract eigenvalue is used...
This paper firstly examines the traditional vehicle styling evaluation methods and issues, and then presents a new approach which uses ANN (artificial neural network) to build an expert system for bus styling evaluation. It describes the key technical issues of quasi-three-dimensional bus styling evaluation expert system from data collection, graphical pre-processing, graphics feature extraction,...
Three-dimensional laser scanning produces a large number of point clouds data. In order to efficiently retrieve the point clouds data, this paper stores the point clouds data in SQL Server 2008, and create a spatial index. Using C # software and SQL Server 2008 Spatial technology to achieve the storage and inquiry of point clouds data, and the results of the inquiry is carried out visualization in...
In order to address the unreadable problem of direct unique identification on metal reflective surface during product real-time tracking, in this paper, two different reflective region images are captured for the same identification, the wavelet-based homomorphic filtering is applied to enhance the contrast of reflective region, the zoning Otsu thresholding is used to get the binary image, the characteristic...
Chinese Web Automatic Document Classification is one of the core technologies in Chinese information retrieval. Web Spider technology is the key in Chinese WEB document automatic classification. this issue surrounds WEB information explore which is this cutting-edge research, combined with the overall requirements of the Chinese WEB Document Classification System Framework, achieving roaming of the...
In order to identify human behavior classification in Intelligent Security Monitoring System, an articulated model to extracting human body and classifying the behaviors of the moving objects is presented in this paper. An improved statistical Gaussian model is used as adaptive background updating method. After silhouettes of objects are extracted from the video images, we propose an articulated model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.