The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The increase of the quantity of user-generated content experienced in social media has boosted the importance of analysing and organising the content by its quality. Here, we propose a method that uses audio fingerprinting to organise and infer the quality of user-generated audio content. The proposed method detects the overlapping segments between different audio clips to organise and cluster the...
Palmprint based identification has attracted much attention in the past decades. In some real-life applications, portable personal authentication systems with high accuracy and speed efficiency are required. This paper presents an embedded palmprint recognition solution based on the multispectral image modality. We first develop an effective recognition algorithm by using partial least squares regression,...
Tracheoesophageal (TE) speech is generated by patients who have undergone a total laryngectomy where the larynx (voice box) is removed and replaced by a tracheoesophageal puncture. This work presents a novel low complexity algorithm to estimate the degree of severity of disordered TE speech. The proposed algorithm uses features which are computed from 32-ms voiced frames of the speech signal. A 21-st...
In order to extract useful information from massive data, the researchers proposed data mining technology, one of the most critical technology is clustering analysis technology. In this paper, an improved clustering algorithm based on shared nearest neighbor is proposed for the existing shared clustering algorithm, and the improved algorithm is applied to fingerprint localization. The algorithm reduces...
It was analyzed the most frequent security algorithms used for information security to mitigate the integrity, confidentiality and availability of the information. The objective is to have an approach on security algorithms and define a quantitative algorithm using flowchart techniques for a process of Ecuador civil registry database. The deductive method was used to analyze the information of the...
Based on the development and application of on-board subsystem test bench for current CTCS-3 system, this paper focuses on the approach of automatically generation of test sequence, takes the existing test sequences of ETCS-2 (European Train Control system level 2) as the train set existing relatively mature test sequence as the training set, to execute association rule mining. The whole data mining...
Calibration-free Laser-induced Breakdown Spectroscopy (CF-LIBS) has caused a heated discussion since it was proposed in 1999, and separate works were presented for better quantitative analysis performance. In this article, we introduce a particle swarm optimization algorithm to search for the actual element number densities in CF-LIBS. The main thought is that the actual element number densities and...
A huge amount of data is available to the web users with evolution of web technology. The available resources in web are used by the users and also they involve in giving feedbacks and thus generate additional information. It is very essential to explore, analyze and organize their opinions and feedbacks in an efficient way for better decision making. So sentiment analysis (SA) is used to find the...
Cluster analysis aims at classifying data elements into different categories according to their similarity. It is a common task in data mining and useful in various field including pattern recognition, machine learning, information retrieval and so on. As an extensive studied area, many clustering methods are proposed in literature. Among them, some methods are focused on mining clusters with arbitrary...
This paper has proposed gait recognition approach for analyzing and classifying human identification under carrying a bag and wearing a clothing thus improving recognition performances. The proposed method is based on detail wavelet features extracted from the Haar-wavelet decomposition of dynamic areas in the Gait Energy Image (GEI). Spectral Regression Kernel Discriminant Analysis (SRKDA) is then...
Detection, and localization of Bangla text from natural scene images are important prerequisites for developing Bangla OCR as well as many content-based image analyses. But there is no standard Bangla OCR to be used in the daily work. Due to the presence of some unique features, detection and localization of Bangla text have become more challenging than English text. In this paper, we have proposed...
A typical palmprint identification system identifies a query palmprint by matching it with the templates in the database and comparing the result with the pre-defined similarity threshold. When applied on large-scale databases, it is often necessary to speed up this process. Previous study shows that POP hashing is very effective for fast and accurate palmprint identification. As state-of-the-art...
Designing Chinese-Uighur-English online dictionary is very important for the development of ethnic scientific research and education, which is the basis for the work of Uighur semantic study. Online dictionary with a huge thesaurus can be implemented by knowledge graph, existing works have not addressed in much detail. In order to design the thesaurus of the online dictionary, this paper is based...
Iris recognition is a biometric authentication system proving vital for ensuring security and has been employed as an important case to test the algorithms developed in pattern recognition. The unique circular shape of the iris and its time invariance makes it a versatile technique that has an accuracy that can be mathematically proven. Here in this work we propose a new segmentation technique and...
The purpose of data mining is to explore, find and hence analyze relevant data from a massive data source using various technical means. This paper introduces the development of data mining to date, its functions, tasks and algorithms, as well as the process of data mining. The application and problems of data mining are also presented and finally the potential future development of data mining technology...
This paper proposes an attack pattern mining algorithm to extract attack pattern in massive security logs. The improved fuzzy clustering algorithm is used to generate sequence set. Then PrefixSpan is used to mine frequent sequence from the sequence set. The experimental results show that this algorithm can effectively mine the attack pattern, improve the accuracy and generate more valuable attack...
We introduce a new external denoising algorithm that utilizes pre-learned transformations to accelerate filter calculations during runtime. The proposed fast external denoising (FED) algorithm shares characteristics of the powerful Targeted Image Denoising (TID) and Expected Patch Log-Likelihood (EPLL) algorithms. By moving computationally demanding steps to an offline learning stage, the proposed...
There is no previous research that compares the results of k-means, CLOPE clustering and Latent Dirichlet Allocation (LDA) topic modeling algorithms for detecting trending topics on tweets. Since not all tweets contain hashtags, we considered three training data feature sets: hashtags, keywords and keywords + hashtags in this study. Our proposed methodology proved that CLOPE can also be used in a...
Metabolic pathways provide key information to achieve a better understanding of life and all its processes; this is useful information for the improvement of medicine, agronomy, pharmacy and other similar areas. The main analysis tool used to study these pathways is based on the idea of pathway comparison, using graph data structures. Graph comparison has been defined as a computationally complex...
With the prevalence of cloud computing, privacy-preserving database outsourcing has been spotlighted. To preserve both data privacy and query privacy from adversaries, databases need to be encrypted before being outsourced to the cloud. However, there exists the only kNN classification scheme over the encrypted databases in the cloud. Because the existing scheme suffers from high computation overhead,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.