The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite the popularity of Fingerprinting Localization Algorithms (FPS), general theoretical frameworks for their performance studies have rarely been discussed in the literature. In this work, after setting up an abstract model for the FPS, we show that a fingerprinting-based localization problem can be cast as a Hypothesis Testing (HT) problem and therefore various results from the HT literature...
In the context of a growing need for dedicated solutions in the field of human space mission support, this paper proposes an emotion assessment system and its dedicated implementation architecture. The proposed system is described and a pilot implementation of the emotion assessment system is developed utilizing open source software OpenFace for detection of key facial features, called Action Units...
Roadway traffic safety is a major concern for transportation governing agencies as well as ordinary citizens. In order to give safe driving suggestions, careful analysis of roadway traffic data is critical to find out variables that are closely related to fatal accidents. In this paper we apply statistics analysis and data mining algorithms on the FARS Fatal Accident dataset as an attempt to address...
The selection process of master's applicants has serious implications for the University. Students must contribute to science through scientific publications in congresses and journals, increasing the institution levels. However, predicting its performance demand advisor's experience and time. The advisors must select from a group of projects which one is the best for both sides. This procedure can...
Knowledge Discovery in Databases (KDD) is a major innovation in knowledge extraction. This knowledge can be extracted to recognize patterns or behaviors. Board games playing patterns are a concise experiment on testing data mining methods in order to find such patterns and behaviors. In this work a Connect-4 game is simulated with several distinct players with different characteristics. Most of these...
This paper proposes a computerized technique aimed at detecting heart beat positions in electrocardiograms (ECGs). The algorithm was implemented by adapting one of the most popular methods (Pan-Tompkins) developed to detect beat positions in ECG records, to be used in different leads of multi-channel ECGs. First, the Pan-Tompkins algorithm was programmed, and next, a lead-dependent version was implemented,...
This paper proposes a novel scheme for RFID anti-counterfeiting by applying bisectional multivariate quadratic equations (BMQE) system into an RF tag data encryption. In the key generation process, arbitrarily choose two matrix sets (denoted as A and B) and a base Rab such that [AB] = λRABT, and generate 2n BMQ polynomials (denoted as p) over finite field Fq. Therefore, (Fq, p) is taken as a public...
Aiming at the current medical cosmetology, late into the film and television both photo editing and predicting the baby looks specific application in the field of entertainment, this paper proposes a face fusion technology based on Laplacian pyramid (LP). Firstly, Harris corner detection technology is introduced in the technology whether source face image and the target face image features at the...
Till date, the community evaluation in the field of scientific collaboration network, have been taken place on an individuals' impact. Very less findings have been done on the community detection and community evaluation considering the acquaintances of co-authors. This paper comprises of network in which the database of author's publications is used. The authors are the nodes and they are connected...
Nowadays, the attacks on the Internet are becoming more complex, advanced and concealed. A large number of security threats arise. The signature-based detection technology is efficient and simple which is widely used for malicious codes detection system. In this paper, we firstly focus on the principle of the method, and summarize the specific steps to implement it, especially feature extraction,...
Data analysis plays an indispensable role in the knowledge discovery process of extracting of interesting patterns or knowledge for understanding various phenomena or wide applications. Visual Data Mining is further presenting implicit but useful knowledge from large data sets using visualization techniques, to create visual images which aid in the understanding of complex, often massive representations...
Femtocells are deployed to provide good indoor coverage and to offload data traffic from macrocell networks. Unnecessary handoffs (HOs), ping-pong effects, and cell utilization are important performance metrics for evaluating the quality of connections and data offloading in femtocell networks. Though significant research has been conducted on HO decision algorithms to reduce unnecessary HOs and ping-pong...
We consider a particular paradigm of steganalysis, called universal blind steganalysis, namely, no knowledge of the steganographic way and all knowledge of the cover-source. Its goal is to detect all known (already existing) and unknown (previously unseen) steganographic algorithms in such a paradigm. However, the existing approaches can not achieve overall good performance on both known and unknown...
In this digital world, we are facing the flood of data, but depriving for knowledge. The eminent need of mining is useful to extract the hidden pattern from the wide availability of vast amount of data. Clustering is one such useful mining tool to handle this unfavorable situation by carrying out crucial steps refers as cluster analysis. It is the process of a grouping of patterns into clusters based...
In this paper, we addressed in social network visualization for people's interest in music. This visualization system designed for interest in music on social networks provides several capabilities: (A) visualization for friends who share the same interest in music, (B) to group people who share the same interest in music into categories, and (C) to recommend songs function for an increase in the...
The development of optimization algorithms for combinatorial problems is a complicated process, both guided and validated by the computational experiments over the different scenarios. Since the number of experiments can be very large and each experiment can take substantial execution time, distributing the load over the cloud speeds up the whole process significantly. In this paper we present the...
Glaucoma is a lifetime medical condition which might results in the deprivation of visual sense from an individual permanantly if remained untreated and undiagnosed at early phase. Some structural changes are observed by ophthalmologists using state of art biomedical imaging techniques i.e. Fundscopy and optical coherence tomography in retinal layers and optic nerve head of person effected by glaucoma...
We present a new RGB-D database for multi-pose object recognition tasks. With the help of a multi-axis rotation framework, we are capable of capturing depth and color data of arbitrary small objects from virtually any viewpoint. In addition, recording is performed in a nearly lossless fashion, avoiding typical bleeding artifacts present in related reference data bases. This contribution presents the...
Fingerprint location algorithm is often used in process of indoor location. But the complex environment will cause fluctuations in signal strength and this fluctuation will lead to positioning errors. In order to correct the error we use Gaussian filtering to preprocess the location data and adopt based on voting region decision policy and based on maximum signal strength AP selection policy. SSCM-WKNN...
Paroxysmal tachycardia (supraventricular and ventricular) is an episodic condition with an abrupt onset and termination followed by a rapid heart rate, usually between 140 and 250 beats per minute. Paroxysmal tachycardia can be discovered by detecting a QRS complex in ECG signals. Supraventricular tachycardia is characterized by a narrow QRS complex, and on the other side, ventricular tachycardia...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.