The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Arabic recognition is a very challenging task that begins to draw the attention of the OCR community. This work presents our latest contributions to this task, exploring the impact of several features and classifiers combinations on the performances of some developed systems. Different types of writings were considered (machine-printed, multi-fonts, handwritten, unconstrained, multi-writers, bi-dimensional,...
In this paper we mainly introduce a method for mathematical formula script and type identification based on handcrafted features. Arabic/Latin scripts are discriminated by detecting specific symbols based on their pixel density and distribution. Once the formula script identified, we proposed to separate between machine-printed and handwritten formulas. For that, we analyzed the spaces between some...
Classifying ancient Arabic manuscripts based on handwriting styles is one of the important roles in the field of paleography. Recognizing the style of handwriting in Arabic manuscripts helps in identifying the origin and date of ancient documents. In this paper we proposed using segmented letters from Arabic manuscripts to recognize handwriting style. Both Gabor Filters (GF) and Local Binary Pattern...
This paper addresses the problem of handwritten and printed text separation in Arabic document images. The objective is to extract handwritten text from other parts of the document. This allows the application, in a second time, of a specialized processing on the extracted handwritten part or even on the printed one. Documents are first preprocessed in order to remove eventual noise and correct document...
Handwritten text in any language is believed to convey a great deal of information about writers' personality and identity. Handwritten documents are frequently used as evidences in forensic tasks. Handwriting skills is learnt and developed from the early schooling stages. Research interest in behavioral biometrics was the main driving force behind the growth in research into Writer Identification...
A new approach for authentication of individuals is presented in this paper. Use of the veins of the dorsal hand using infrared imaging and extraction of knuckle tip information is done. The knuckle tips are used as control points for obtaining the region which we are interested in that is the region of interest. The vein pattern is extracted to locate the branching points from which the intersection...
Due to massive growth in digital media for communication, the number and size of videos being generated and accumulated is increasing and hence searching desired content from the video is becoming more complex. As text in videos provide additional information on the content of the videos, methods for text based retrieval is desired. This paper presents an approach to retrieve video clips having similar...
Authorship analysis deals with the identification of authors which is a problem of text data mining and classification. There are numerous techniques and algorithms that have been published so far, in the field of stylometry. In this regard, the primary objective of the present review is to provide the status of the different studies carried out on authorship analysis based on the important research...
Recommendation System for Technical paper reviewer assignment is very important for many applications especially in the academic environment and industry. Previous work to build the expert finding system based on a paper title. Here we take a scenario of a conference where they need some experts who can review the paper for that we identify whether the reviewer is expert in that topic or domain to...
Recruiters evaluate and filter job seekers, ranking them on various criteria. This includes how much of the required and desired requirements are satisfied, ensuring the candidate is the “best match” to vacancy. However, most vacancies do not classify the set of skills as required and desired explicitly. Required skills are those skills a job seeker must have in order to be considered for the job...
For food application, recipe retrieval is an important task. However, many of them rely on only text query. Food image retrieval has relation to recipe retrieval so that similar food images are expected that they have similar recipes. Rising image retrieval performance is desired for recipe retrieval. On the other hand, to learn similarity by Siamese Network or Triplet Network are known as an effective...
We extend our previous work on experience-based planning domains in robotics to detect and represent loops in actions sequences that achieve certain tasks; and to generate action sequences from loop descriptions. The approach includes methods for conceptualizing robot experiences containing loops; and generating plans based on learned task knowledge with loops. This facilitates the reuse of existing...
Dimensionality reduction is an important factor in fault diagnosis, when dealing with a high-dimensional feature space, since it decreases the computational burden and the model complexity. This paper focuses on the development and comparison of several state-of-the-art linear dimensionality reduction techniques to provide discriminant features for the process fault diagnosis. These techniques, including...
This paper presents a new approach for acoustic environment classification based on the discrete Hartley transform. The approach applies a Hidden Markov Model based classifier on test data composed of audio clips, in order to determine which environment is surrounding these audio clips. The approach uses features obtained from the discrete Hartley transform, leading to a set of features that require...
Content-based image retrieval is a technology that is used to identify similar images based on their visual content. Relevant images are found by employing methods that rank images and show the top-ranked images. One important query pertaining to image retrieval methods is regarding as to how to rank the results. This paper proposes a new method based on an unsupervised Hopfield neural network that...
Feature fusion methods have been demonstrated to be effective for many computer vision based applications. These methods generally use multiple hand-crafted features. However, in recent days, features extracted through transfer leaning procedures have been proved to be robust than the hand-crafted features in myriad applications, such as object classification and recognition. The transfer learning...
This article is devoted to improving previously developed texture classifier that performs on noisy images. The basic principle of this classifier is to join several simple local parameters using some fuzzy logic system (support vector machine or neural network). It is shown that aggregating procedure applied on the classifier's input can result in significant improvement of its efficiency.
User generated data is tremendously increasing on the web. Many social networking sites are popular and powerful platforms for finding friends and people like to post comments. This data can be exploited for analyzing sentiments of the user. Feature extraction from text is crucial stage for sentiment analysis. This paper is intended to propose a simple method for feature extraction from text. Proposed...
Anomaly in Online Social Network can be referred as abnormal or unexpected behavior which deviates from majority of users. Due to popularity of social networking sites such as Facebook, Twitter etc., malicious activities have increased in recent past. Anomaly detection has become an important area for researchers to be looked upon. This survey gives an overview of existing techniques, which is further...
Millions of comments are available on forums, Facebook, Tweeter, YouTube etc. Proper analysis of these huge comments can lead to solve many social, economic, political, business related questions which otherwise are difficult to understand and analyse. Proposed system explores the statistical approach for sentiment analysis of product reviews using expectation maximization algorithm. Systematic mathematical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.