The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present the ATM (Awesome Translation Machine), which translates handwriting texts in English into Chinese, and then provides its pronunciations in both the two languages. Specifically, two types of the databases that contain characters and sentences for training the ATM are constructed. Various signal processing techniques are employed sequentially for processing and analyzing the...
In this paper, we propose a two-step approach for the super-resolution reconstruction of video sequences based on the degraded model. Firstly we use the sparse principal component analysis and the linear minimum mean square-error estimation method to remove the noises from the degraded video sequences. Secondly we adopt the Newton-Thiele's vector valued rational interpolation which is one of the nonlinear...
In this paper we extend our previous work on strategies for automatically constructing noise resilient SVM detectors from click through data for large scale concept-based image retrieval. First, search log data is used in conjunction with Information Retrieval (IR) models to score images with respect to each concept. The IR models evaluated in this work include Vector Space Models (VSM), BM25 and...
Facial gender recognition plays an important role in various industrial applications such as human-computer interaction and targeted advertising. Although several methods have been applied to facial gender recognition, it is still considered as a challenging problem. In this paper, a system based on optimal trade-off (OT) — Maximum average correlation height (MACH) filter is developed for facial gender...
Active robot learners take an active role in its own learning by asking queries to its human teachers when they receive new data. However, not every received input is useful for the robot, and asking for non-informative inputs or asking too many questions might produce a negative impact on how the human perceives the robot. We present a novelty detection system that enables a robot to ask questions...
One of the most challenging problems encountered when analyzing real-world gene expression datasets is high dimensionality (overabundance of features/attributes). This large number of features can lead to suboptimal classification performance and increased computation time. Feature selection, whereby only a subset of the original features are used for building a classification model, is the most commonly...
In this paper we are going to estimate the vehicular traffic density by using acoustic or sound signals. Here we will estimate three probable conditions of traffic that is heavy flow traffic (0-10km/h), medium flow (20-40km/h), and free flow (above 40km/h) traffic. Cumulative sound signals consist of various noises coming from various part of vehicles which includes rotational parts, vibrations in...
Side-channel analysis of cryptographic systems can allow for the recovery of secret information by an adversary even where the underlying algorithms have been shown to be provably secure. This is achieved by exploiting the unintentional leakages inherent in the underlying implementation of the algorithm in software or hardware. Within this field of research, a class of attacks known as profiling attacks,...
In this paper we propose the use of Support Vector Machine classifiers (SVM) and linear discriminant analysis (LDA) to determine the existence of magnetic flux leakage (MFL) in non-destructive testing (NDT for its acronym in English) performed on ferromagnetic sheets. These signals were provided by the Corporation for Research in Corrosion (CIC) and were acquired on a dyno. The signals are preprocessed...
This paper explores how noise can improve classification accuracy of motor imagery classification using an ensemble support vector machine (ESVM) classifier. We add white Gaussian noise to the EEG signals and use them with the original signal data set for the ESVM training process. The ESVM classifier uses coefficients of the discrete wavelet transform (DWT) and coefficients of the autoregressive...
We describe a novel appearance model with optimal combined features to produce the accurate vessel segmentation. It starts with investigating a set of multi-scale vessel features, followed by a weighed approach to optimally combine different features. Then the optimally combined features advantage the appearance model to reveal more detailed information of vessel. The novelty of the work lies in the...
Non-intrusive load monitoring (NILM) is an important topic in smart-grid and smart-home. Many energy disaggregation algorithms have been proposed to detect various individual appliances from one aggregated signal observation. However, few works studied the energy disaggregation of plug-in electric vehicle (EV) charging in the residential environment since EVs charging at home has emerged only recently...
An indoor positioning system based on Receive Signal Strength Indication(RSSI) from wireless access equipment has become very popular in recent years. This system is very useful in many applications such as tracking service for older people or customer inside living communities, mobile robot localization, logistics systems etc. While outdoor environment using Global Navigation Satellite System(GNSS)...
This document proposes the comparison of four statistical classification models for partial discharge (PD) classification as follows: k-nearest neighbors (KNN) model, probabilistic neural network (PNN) model, and other two statistical models using principal component analysis (PCA) for a data reduction approach combined with KNN and PNN models, so called, PCA-KNN model and PCA-PNN model. PD phenomena,...
Online group shopping is feasible if the online store comprises useful products. The product needs to attract customer interest. The customer will have varied choices to choose from the available products. For feasibility of Online group shopping by customers the products have to be properly classified. The site offers the customer to form a group based on his/her interest. The site gives the best...
A novel method for liveness detection of dorsal hand vein (DHV) based on AR model is proposed. Firstly, existing real DHV images are used to constitute a projection space based on modified principal component analysis (PCA). Unlike the previous works using the method of PCA, zero eigenvalues with their eigenvectors are used to constitute the projection space in this work. Secondly, test samples, including...
The aim of this paper is to describe the effect of training methods on the accuracy of PCA-KNN partial discharge (PD) classification model. This model used principal component analysis (PCA) combined with k-nearest neighbor (KNN) model, so called, PCA-KNN PD classification model for PD pattern classification. PD phenomena, corona at high voltage side in air (CHV), corona at low voltage side in air...
Bayesian filtering often relies on a reduced system state relating to robot internal variables only. The exogenous variables and their effects on the measurement process are then encompassed within a global observation noise model. Even if Bayes filters proved to be robust to such approximations, special care has to be taken to handle some of these exogenous effects, usually by introducing complex...
High-level synthesis ensures that a program code written in a programming language can be easily transferred into a hardware description language and thereby makes the design process faster and less demanding. However, professional synthesis tools are very complex and not well suited for deployment in embedded systems with limited resources. Evolutionary on-line synthesis is proposed in this paper...
Evaluating the accuracy of HMM-based and SVM-based spotters in detecting keywords and recognizing the true place of keyword occurrence shows that the HMM-based spotter detects the place of occurrence more precisely than the SVM-based spotter. On the other hand, the SVM-based spotter performs much better in detecting keywords and has higher detection rate. In this paper, we propose a rule based combination...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.