The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a system to recognize text in traffic signs, along with its context based recognition result corrections that we developed. This system detects text in traffic signs region using contour detection and using KNN Classifier to recognize letters in it. The result of the recognitions that may contain errors will be corrected using Forward Reverse Dictionary that has Contextual...
While there are many commercial Extraction, Transformation and Loading (ETL) platforms that facilitate fast and easy development of ETL applications, ETL testing is largely a manual process. In order to allow frequent releases of reliable ETL applications, an automated regression testing approach is needed. This paper presents 1TH, one such test harness tool and a methodology for agile ETL development...
There are many "continuous" practices in software engineering, for example continuous integration (CI), continuous delivery (CD), continuous release (CR), and DevOps. However, the maintenance aspect of continuity is rarely mentioned in publication or education. The continuous practices and applications depend on many repositories and artifacts, such as databases, servers, virtual machines,...
Mutation testing is a well-known method for measuring a test suite's quality. However, due to its computational expense and intrinsic difficulties (e.g., detecting equivalent mutants and potentially checking a mutant's status for each test), mutation testing is often challenging to practically use. To control the computational cost of mutation testing, many reduction strategies have been proposed...
We propose a Convolutional Neural Network model to learn spatial footstep features end-to-end from a floor sensor system for biometric applications. Our model's generalization performance is assessed by independent validation and evaluation datasets from the largest footstep database to date, containing nearly 20,000 footstep signals from 127 users. We report footstep recognition performance as Equal...
With the wide deployment of the face recognition systems in applications from deduplication to mobile device unlocking, security against the face spoofing attacks requires increased attention; such attacks can be easily launched via printed photos, video replays, and 3D masks of a face. We address the problem of face spoof detection against the print (photo) and replay (photo or video) attacks based...
Low cost RGB-D cameras are gaining significant popularity in surveillance scenarios. While RGB images contain good quality discriminative information, depth images captured in uncontrolled environment at a distance does not provide accurate depth map. In this research, we present a learning based reconstruction and mapping algorithm to generate a feature rich representation from the RGB images. These...
Vortex-Induced Vibrations (VIV) is a ubiquitous phenomenon caused by shedding vortices behind bluff bodies. VIV induced by ocean currents and waves generates fatigue damage in riser systems. This disturbance creates a big challenge for designing ocean exploration systems. A key feature in determining VIV is the shape and size of the bluff bodies. Therefore, a new design shape, riser section with buoyancy...
In the learning process, it is important to analyze the answers given by the assessed persons at the knowledge-check tests. In this matter, an important component is the comparison of the given answers and the correct ones by measuring the similarity between them. This paper proposes to present a modality of measuring the similarity degree between answers given by learners at the questions from within...
The estimated accuracy of an algorithm is the most important element of the typical biometrics research publication. Comparisons between algorithms are commonly made based on estimated accuracies reported in different publications. However, even when the same dataset is used in two publications, there is a very low frequency of the publications using the same protocol for estimating algorithm accuracy...
Face spoofing can be performed in a variety of ways such as replay attack, print attack, and mask attack to deceive an automated recognition algorithm. To mitigate the effect of spoofing attempts, face anti-spoofing approaches aim to distinguish between genuine samples and spoofed samples. The focus of this paper is to detect spoofing attempts via Haralick texture features. The proposed algorithm...
In presented paper we describe a design and implementation of an information system based on base of embedded client and Linux application server architecture. Presented information system serves for remote collection, storing and processing information on the number of carried out mechanical cycles for group of older existing fatigue test machines in an automotive components production. This upgrade...
Critical infrastructure such as power plants, oil refineries, and sewage are at the core of modern society. Supervisory Control and Data Acquisition (SCADA) systems were designed to allow human operators supervise, maintain, and control critical infrastructure. Recent years has seen an increase in connectivity of SCADA systems to the Internet. While this connectivity provides an increased level of...
The architecture of remote Education Resource Center for the students of engineering on the basis of data space is developed. The consolidated data catalog and the query processing schemes in data space are proposed.
The purpose of the paper is to develop methodological bases for assessing vocational aptitude of human-operators of man-machine systems. The model of vocational aptitude and the process of decision-making in the class of hierarchical systems were developed based on the hierarchy analysis method. The experimental research of vocational aptitude assessment for operators of transport-technological machines...
Cloud Computing is storing of data and application on remote servers and accessing them via internet rather than installing and saving them on your personal computers. Growing volume of scientific data sets which are publicly available has made it impractical to move data to desktop for analysis. To solve these issues we require a new computing paradigm. In recent years, cloud computing has grown...
With the goal of increasing the resolution of face images, recent face hallucination methods advance learning techniques which observe training low and high-resolution patches for recovering the output image of interest. Since most existing patch-based face hallucination approaches do not consider the location information of the patches to be hallucinated, the resulting performance might be limited...
When hiding messages in digital images, care needs to be exercised how the embedding changes are executed in or near saturated pixels. In this paper, we consider three different rules that are currently being used that adjust the embedding in saturated pixels and assess their impact on empirical steganographic security of four modern embedding algorithms. Surprisingly, the rules can have a major effect,...
The approximation of nonlinear kernels via linear feature maps has recently gained interest due to their applications in reducing the training and testing time of kernel-based learning algorithms. Current random projection methods avoid the curse of dimensionality by embedding the nonlinear feature space into a low dimensional Euclidean space to create nonlinear kernels. We introduce a Layered Random...
Image super-resolution has gained much attention in these years, while video super-resolution remains almost unchanged. In this paper, we propose a fast super-resolution method for video. We exploit recent development of learning-based technique that achieves state-of-the-art in accuracy and efficiency for image super-resolution. We leverage the temporal coherency of video contents to approximate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.