The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An epileptic seizure is a brief episode of symptoms due to abnormal excessive or synchronous neuronal activity in the brain. Epilepsy is a chronic disorder that affects people of all ages, and one of the most common neurological diseases globally. Epilepsy can have both genetic and acquired causes, nevertheless, the exact mechanism of epilepsy is still unknown. It merits further investigation under...
Subspace clustering aims to reveal the latent subspace structure underlying high dimensional data by segmenting the data into corresponding subspaces. It has found wide applications in machine learning and computer vision. Most recent works on subspace segmentation focus on subspace representation based methods, which constructs the affinity matrix from the subspace representation of data points....
Research on China's outward foreign direct investment has gained a lot of attention during the last two decades due to its rapid growth, though most studies ignore the spatial interdependence of outward foreign direct investment on the choice of Chinese outward foreign direct investment location. This study aims to examine the spatial links in China's outward foreign direct investment using the spatial...
We propose a method to improve the consistency of human evaluation of non-native speaker's utterance, with a capability to evaluate features such as accent and rhythm. In this method, human evaluators evaluate the accent and the rhythm independently by using average voice model and prosody substitution. We also investigated the advantages of evaluating those features independently. We found that,...
An ECG process based on Einthoven principle was developed for this study. A circuit and DAQ card were incorporated in a human machine interface using LabVIEW to detect the PQRSTpoints in ECG and display the processed ECG signals of the test subjects. The ECG data saved were plotted into dynamical map of chaotic dynamic error using a master-slave chaos system. Chaos eye was selected as the feature...
This paper explores the viability of Hartley Transforms as an alternative to Fourier Transforms for Face Recognition. The paper provides a brief introduction to Hartley Transform, which is a reasonable alternate to Fourier Transform due to its similarities in the choice of basis function. Correlation filter is a pattern recognition tool that is efficient and robust. This includes extraction of features...
Classification between foggy and non-foggy images is a primitive step for automation in traffic activity and industries. The existing techniques provide low accuracy and needs validation over both synthetic and natural database. Foggy images are identified and classified based on their optical characteristics for vision enhancement and to make them more efficient for further processing. In proposed...
In this article we present an approach in predicting a user's behavior using big data, correlations, Ramsey theory and generalized suffix trees. Recommendation systems are widely used, especially in e-commerce. The purpose of the recommendation system is to predict what items a user would prefer. This predictions are based on some information like the group in which the user could fit or the past...
A fundamental challenge in controlling the leakage of sensitive information by computer systems is the possibility of correlations between different secrets, with the result that leaking information about one secret may also leak information about a different secret. We explore such leakage, here called Dalenius leakage, within the context of the g-leakage family of leakage measures. We prove a fundamental...
With explosive growth in fingerprint database, Automatic Fingerprint Identification System (AFIS) has become more difficult than ever. Consequently, it is necessary to get an effective and discriminative fingerprint feature binary representation. In this paper, we firstly analyze the characteristic of Minutia Cylinder Code (MCC) representation to find that it is strongly bit-correlated and with a...
Biometric recognition requires that the biometric characteristics used for the verification should be unique among individuals. The purpose of this study is to verify the individuality of finger vein, a new trait with superiority on accuracy and security. To carry out the research, we construct a large-scale finger vein database consisting of 710,399 images from 363,703 fingers. We adopt a score level...
As 3D media became more and more popular over the last years, new technologies are needed in the transmission, compression and creation of 3D content. One of the most commonly used techniques for aiding with the compression and creation of 3D content is known as view synthesis. The most effective class of view synthesis algorithms are using Depth-Image-Based-Rendering techniques, which use explicit...
The most well known and widely used method for comparing two homogeneous color samples is the CIEDE2000 color difference formula because of its strong agreement with human perception. However, the formula is unreliable when applied over images and its spatial extensions have shown little improvement compared with the original formula. Hence, researchers have proposed many methods intending to measure...
The objective measurement of blurring artifacts plays an important role in the dynamic monitoring, adjusting image quality, optimizing algorithms and parameter settings in a variety of image and video processing applications. In this paper, we propose a no-reference metric to estimate blurriness distortion. The work addresses the problem that existing no-reference metrics fail to predict the correct...
The safety of critical structures such as dams, are great concern of authorities around the world. Conventionally, systems based on time series analysis method have been used to detect anomalies in order to ensure the safety in the operation of these structures. This paper proposes a supplementary system able to receive messages and alarms coming from the first assessment performed by the main system...
Stethoscope is one of the critical tools used to assess a patient's health by performing auscultation. There is a necessity to develop a device which can recognize the heart disease that a patient might have in the initial stages of examination. This paper proposes a stand-alone system based on DSK6713 that can identify an abnormality in a heart sound while the auscultation is being performed. The...
This paper introduces a good technique for the utilization of cancelable features for speaker identification. This technique depends on the use of encrypted features extracted from speech signals for identification. The encrypted features are obtained through convolution with random kernels. The proposed speaker identification system using cancelable features has been evaluated under the effect of...
Estimating mobile user speed is a problematic issue which has significant impacts to radio resource management and also to the mobility management of Long Term Evolution (LTE) networks. This paper introduces two algorithms that can estimate the speed of mobile user equipments (UE), with low computational requirement, and without modification of neither current user equipment nor 3GPP standard protocol...
The major objective of mobility management is to achieve efficient contents transfer for mobile nodes. Content Centric Networking (CCN), as a content-oriented architecture, is designed for efficient content delivery which can easily provide mobility management based on content caching. Caching schemes of CCN deeply influences the content acquisition efficiency and whole network performance. However,...
Telecom Networks produce huge amount of daily alarm logs. These alarms usually arrive from different regions and network equipments of mobile operators at different times. In a typical network operator, Network Operations Centers (NOCs) constantly monitor those alarms in a central location and try to fix issues raised by intelligent warning systems by performing a trouble ticketing based management...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.