The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Local features have been widely used in visual object tracking for their robustness in illumination, deformation, rotation and partial occlusion. Traditional feature selection algorithms based on accumulated knowledge of previous frames usually adopt the perspective of continuity of changes, which could lead to degradation. Exploiting discrimination and uniqueness of local sub-blocks, we build an...
Rules inferring the memberships to single decision classes have been induced in rough set approaches and used to build a classifier system. Rules inferring the memberships to unions of multiple decision classes can be also induced in the same manner. In this paper, we show the classifier system with rules about the union of multiple decision classes has an advantage in the accuracy of classification...
This paper proposes a new Wi-Fi based indoor positioning method that is robust over unstable Wi-Fi access points (APs). Because Wi-Fi based indoor positioning relies on unstable and uncontrollable infrastructure (Wi-Fi APs), the positioning performance significantly decreases when such unstable APs are included in the localization system. This paper proposes a indoor positioning method by employing...
Reliable and accurate position estimation of “agent” nodes is essential for many wireless applications. Typically agents perform position estimation through ranging with respect to “anchor” nodes with known positions. In range-based localization techniques, system accuracy and energy efficiency are affected by both transmit power and signal bandwidth. We thus investigate the joint power and bandwidth...
The localization of eye centers technique is used in several applications. In this paper, we combine the face shape model to eye center location method to obtaining robustness in eye center localization from a low-resolution image. We make use of shape regression approach and combine it to the eye-center localization using isophote curvature features which has shown its advantage from previous work...
Low cost pervasive electrocardiogram (ECG) monitors is changing how sinus arrhythmia are diagnosed among patients with mild symptoms. With the large amount of data generated from long-term monitoring, come new data science and analytical challenges. Although traditional rule-based detection algorithms still work on relatively short clinical quality ECG, they are not optimal for pervasive signals collected...
This work considers the problem of speed sensorless vector control of a three-phase PMSM using nonlinear control methods. An improved design of continuous sliding mode observer (SMO) is provided with a comprehensive analysis of sigmoid boundary layer to establish its relation with the estimation accuracy. The idea of cascaded SMO and high gain observer (HGO) is proposed for robust speed estimation...
In this paper we describe a new system for eye center (pupil) localization. The patch centered on the eye is described by concatenations of integral and edge projections. Next, for dimensionality reduction, the Principal Component Analysis (PCA) technique is employed, while the discrimination among possible candidates is performed with a Bagged ensemble of Regression Trees (BRT) classifier. The accuracy...
In practical applications, the accuracy of a LPS is often affected by non-line-of-sight (NLOS) errors which disable proper locating results. In this article, a robust localization algorithm capable of minimizing the effects of NLOS errors during position estimation is presented. The robust localization algorithm uses hyperbolic multilateration in combination with proximity based grouping and final...
Depth from Defocus (DFD) is known as the technology which is able to estimate depth in the scene by a monocular camera without any additive devices. Using this advantage of DFD, we improved the speed of Auto Focus (AF). To apply DFD to AF, it is necessary to capture 2 images that have a small amount of “difference in focal positions” (we call DiFP). In this paper, we show the performance of the depth...
The GrabCut, which uses the graph-cut iteratively, is popularly used as an interactive image segmentation method since it can produce the globally optimal result. However, since the initialization of the GrabCut is roughly performed by the manual interaction, the accuracy of the segmentation result is not guaranteed when the user defines an inaccurate guide. To solve this problem, in this paper, we...
In this paper, we investigate the recognition of speech produced by a person with an articulation disorder resulting from athetoid cerebral palsy. The articulation of the first spoken words tends to become unstable due to strain on speech muscles, and that causes a degradation of traditional speech recognition systems. Therefore, we propose a robust feature extraction method using a convolutive bottleneck...
This paper proposes a robust template based on the previously proposed ECWRT (enhanced cross word reference template) for template-based ASR, by using correlational weight adjusting method to improve robustness against elderly speech variation named CWCWRT. This work addresses two vital issues: such as outlier rejection in training set and elimination of unwanted utterances which usually happen by...
Multibiometrics aims at improving biometric security in presence of spoofing attempts, but exposes a larger availability of points of attack. Standard fusion rules have been shown to be highly sensitive to spoofing attempts - even in case of a single fake instance only. This paper presents a novel spoofing-resistant fusion scheme proposing the detection and elimination of anomalous fusion input in...
This paper proposed a new improved singular value decomposition method to achieve high accuracy and much more number of correct point correspondences between uncalibrated images with large scene variations. The proposed matching method is based on singular value decomposition and Sift feature descriptor. The proximity matrix for decomposition is redefined to improve the performance of robustness and...
A digital forensics examiner often has to deal with large amounts of multimedia content during an investigation. One important part of such an investigation is to identify illegal material like pictures containing child pornography. Robust image hashing is an effective technique to help identifying known illegal images even after the original images were modified by applying various image processing...
We propose a novel algorithm for automatic text line extraction on color and gray scale manuscript pages without prior binarization. Our algorithm is based on seam carving to compute separating seams between text lines. Seam carving is likely to produce seams that move through gaps between neighboring lines, if no information about the text geometry is incorporated into the problem. By constraining...
Security of fingerprint authentication systems remains threatened by the presentation of spoof artifacts. Most current mitigation approaches rely upon the fingerprint liveness detection as the main anti-spoofing mechanisms. However, liveness detection algorithms are not robust to sensor variations. In other words, typical liveness detection algorithms need to be retrained and adapted to each and every...
Fuzzy clustering has been extensively used in brain magnetic resonance (MR) image segmentation. However, due to the existence of noise and intensity inhomogeneity, many segmentation algorithms suffer from limited accuracy. In this paper, we propose a fuzzy clustering algorithm via enhanced spatially constraint for brain MR image segmentation. A novel spatial factor is proposed by incorporating the...
Managed pressure drilling technology is gaining in popularity because of the necessity to mitigate drilling risks while drilling off-shore and also to make it possible to drill in challenging reservoirs. In this paper we have investigated the contribution of various drilling parameters to the variations in simple first order model of drilling. We also present a robust SISO controller for a particular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.