The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, mechanical condition monitoring in induction motors has become an important research area because of its relevance in different industrial applications. Infrared thermography has been considered for improving the monitoring of induction motors with the advantage of being a non-invasive technique and having a wide range of analysis. In this work, infrared thermography is used as complementary...
In this paper we consider the problem of matching feature points between multi-source images. Straightforwardly comparing visual features such as SIFT may result in desirable local feature correspondences for single-source images. However, when it comes to matching feature between multi-source images, e.g. between an RGB color image and an infrared image, the feature based matching scheme tends to...
The Point-and-Shoot Face Recognition Challenge (PaSC) is a performance evaluation challenge including 1401 videos of 265 people acquired with handheld cameras and depicting people engaged in activities with non-frontal head pose. This report summarizes the results from a competition using this challenge problem. In the Video-to-video Experiment a person in a query video is recognized by comparing...
Biometric systems based on iris are vulnerable to several attacks, particularly direct attacks consisting on the presentation of a fake iris to the sensor. The development of iris liveness detection techniques is crucial for the deployment of iris biometric applications in daily life specially in the mobile biometric field. The 1st Mobile Iris Liveness Detection Competition (MobILive) was organized...
Modulation identification of communication signals is an important content of wireless communication technology and a hot topic in the research field of the intercepted signal processing. Because the modulation mode is one of the most important characteristics to be used to distinguish various communication signals, in this paper, a new algorithm using feature parameters based on higher order cumulants...
Integrating large scale processing environments, such as Hadoop, with traditional repository systems, such as Fedora Commons 3, have long proved a daunting task. In this paper we show how this integration can be achieved using software developed in the SCAPE project. The SCAPE integration is based on four steps: retrieving the metadata records from the repository, reading the records and their references...
This paper describes the first edition of the Arabic writer identification competition using AHTID/MW and KHATT databases held in the context of the 14th International Conference on Frontiers in Handwriting Recognition (ICFHR2014). This competition has used the new freely available Arabic Handwritten Text Images Database written by Multiple Writers (AHTID/MW) and the Arabic handwritten text database...
Recognition of offline musical symbols can aid in automatic retrieval of a particular piece of musical notation from a digital repository. Though some work on on-line Musical symbol notations exists, little work has been done on off-line recognition of the symbols. This article proposes a system for offline isolated musical symbol recognition. Efficacy of a texture analysis based feature extraction...
Making violent threats towards minorities like immigrants or homosexuals is increasingly common on the Internet. We present a method to automatically detect threats of violence using machine learning. A material of 24,840 sentences from YouTube was manually annotated as violent threats or not, and was used to train and test the machine learning model. Detecting threats of violence works quit well...
Double-pulse tests are commonly used as a method for assessing the switching performance of power semiconductor switches in a clamped inductive switching application. Data generated from these tests are typically in the form of sampled waveform data captured using an oscilloscope. In cases where it is of interest to explore a multi-dimensional parameter space and corresponding result space it is necessary...
Kinship verification from facial images in wild conditions is a relatively new and challenging problem in face analysis. Several datasets and algorithms have been proposed in recent years. However, most existing datasets are of small sizes and one standard evaluation protocol is still lack so that it is difficult to compare the performance of different kinship verification methods. In this paper,...
Classic shape context algorithm uses the correspondence points between contour points. Those points represent the outline of a shape characteristic. Select a different position and number of sampling points to produce different effect on the similar shape feature description. Uniform random sampling algorithm can not solve the problem of selective retention for classic shape context with similar characters...
For classification of hyperspectral images, particularly using limited training samples, supervised feature extraction is an approach for reduction of dimensionality, overcoming the Hughes phenomenon and increasing the classification accuracies. Classic and popular feature extraction methods such as linear discriminant analysis (LDA) have not good efficiency in small sample size situation because...
Link prediction is a basic problem in the research of social networks. At present, most link prediction algorithms are based on the features extracted from network structure, few research concerns the effect of natural attributes of nodes for creating a link. In this paper we develop a novel way to predict links based on Random Walk algorithm using the information from both the network topology and...
This paper presents a method for depth measurement based on Speeded Up Robust Features (SURF) and pixel number variation of CCD Images. A single camera is used to capture two images in different photographing distances, where features in the images are extracted and matched by SURF. To remove false matching points, an Identifying point correspondences by Correspondence Function (ICF) method is adopted...
Web databases contain a huge amount of structured data which are easily obtained via their query interfaces only. The query results are presented in dynamically generated web pages, usually in the form of data records, for human use. The automatical web data extraction is critical in web integration. A number of approaches have been proposed. The early work are most based on the source code or the...
NG Health IT and UMBC are collaborating together to advance the fields of healthcare and bioinformatics, with an emphasis targeting Personalized Medicine. As progress in biomedical analysis and personalized medicine provide new sources and levels of information about genomics and other 'omics, problems of sorting through, integrating, and presenting this information to clinical practitioners to allow...
Key phrase extraction is widely used in information retrieval, automatic summarizing, text clustering, etc. KEA is a traditional and classical algorithm. But it mainly uses the statistical information and ignores the semantic information. In our paper, we propose a method which combine semantic information with KEA by constructing lexical chain that based on Reget's thesaurus. In this method, we use...
The sense of presence is often used to evaluate the performances of audio content and systems. To estimate the overall presence of a content item, we have developed estimation models for the sense of presence in audio-only and audio-visual content. In this study, the audio-only model is expanded to estimate the instantaneous presence in an audio content item. Initially, we conducted an evaluation...
Social network provide detailed records of human communication patterns, offering convenient way to information spreading and explore the structure of social networks. Here we provide a model to examine the relationship strengths of social network users, allowing us to simultaneously study diffident structure of social network. We observe a coupling between users' relationship strengths and network's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.