The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ischemic heart disease is a leading cause of death both in developed and developing countries. In this paper, efforts to detect myocardial ischemia are focused on developing a screening system through vectorcardiogram (VCG). Existing systems manifest a low accuracy, as a result of concentrating more on ST segment and statistical features of VCG. In our work, several novel strategies have been introduced,...
Tracheoesophageal (TE) speech is generated by patients who have undergone a total laryngectomy where the larynx (voice box) is removed and replaced by a tracheoesophageal puncture. This work presents a novel low complexity algorithm to estimate the degree of severity of disordered TE speech. The proposed algorithm uses features which are computed from 32-ms voiced frames of the speech signal. A 21-st...
The Cardiovascular disease (CVD) is one of the most serious diseases in the world. To monitor cardiac condition and diagnose cardiovascular disease conveniently, a mobile intelligent Electrocardiogram (ECG) monitoring system is developed. The system is consisted of signal acquisition module, Bluetooth transmission module, signal processing module and intelligent diagnosis module. The ECG signals collected...
This study presents an age and gender estimation system that considers ethnic difference in face images using a Convolutional Neural Network(CNN) and Support Vector Machine(SVM). Most age and gender estimation systems using face images are trained on ethnicity-biased databases. Therefore, these systems show limited performance on face images of ethnic groups occupying a small proportion of the training...
In this study, we present a method for extracting and representing knowledge of presentation slide creators based on the slide contents that are published on a slide sharing service. The proposed method regards the number of views, downloads, and likes from other users as the users rating for a presentation slide, and extract knowledge of the slide creator in terms of the usefulness and knowledge...
This paper presents a multiclass classifier based on principal component analysis (PCA) of histogram of oriented gradient (HOG) for accurate and fast recognition of handwritten digits. HOG is known as an effective feature descriptor for computer vision and image processing, and PCA has shown its ability for fast multiclass recorgenition. By combining PCA with HOG, the PCA-of-HOG based classifier is...
In the animation movie production, there is a common tool namely motion capture (mocap) to capture the motion of actors. Using this technology, reconstruction of actors motion is being mapped to drive 3D character in the animation. In the reconstruction process of human motion, there were some significant parameters that affect the quality of the result such as subtle motion and high precision reconstruction...
Off-label drug use is quite common in clinical practice and inevitable to some extent. Such uses might deliver effective treatment and suggest clinical innovation sometimes, however, they have the unknown risk to cause serious outcomes due to lacking scientific support. As gaining information about off-label drug use could present a clue to the stakeholders such as healthcare professionals and medication...
Left ventricular hypertrophy (LVH) is the main manifestation of cardiovascular disease in patients with hypertension, and is an independent risk factor for multiple cardiovascular complications. So the medical researchers attach enough importance to it in aspect of clinical practice. Electrocardiograph (ECG) has the unique advantages of simple operation and low price, which support its widespread...
In recent times, there has been significant interest in the machine recognition of human emotions, due to the suite of applications to which this knowledge can be applied. A number of different modalities, such as speech or facial expression, individually and with eye gaze, have been investigated by the affective computing research community to either classify the emotion (e.g. sad, happy, angry)...
In this paper we approach the problem of scene recognition in paintings. We tackle this task with the aid of Convolutional Neural Networks and a large database consisting of around 80,000 paintings. The main purpose is to identify an efficient method to enlarge the database by domain transfer from photographic content to artistic content. Thus, we discuss the practical capabilities of a recent method...
This paper introduces a complete heartbeat classification system based on modified stacked denoising autoencoders and neural networks. This system includes three parts and they are preprocessing, feature extraction, and classification. In the preprocessing part, the original ECG signal is filtered and segmented as each single heartbeat. In the feature extraction part, the features are extracted from...
Finger vein recognition is a smart and consistent biometrics which makes use of the uniqueness of the vein patterns of human finger for personal identification in security systems. Interval type-2 fuzzy theory is applied in this paper for enhancing the finger vein biometric images in a unique way. Membership function aggregate for the required fuzzy set is calculated using Einstein T co-norm. Minutiae...
With the development of urbanization, the underground pipelines play an important role in ensuring the basic conditions of citizen life. However, construction activities are continuously increasing in the mainland of China nowadays, which lead to serious damages and threatens to the underground pipelines by excavation equipment. To this end, we focus on developing an automatically monitoring system...
Attacks on authentication services are major security concerns. Password-based authentication systems can be compromised using known techniques, such as brute force and dictionary-based attacks. Biometric-based authentication systems are becoming the preferred choice to replace password-based authentication systems. Among several variations of biometrics (e.g., face, eye, fingerprint), iris-based...
A huge amount of data is available to the web users with evolution of web technology. The available resources in web are used by the users and also they involve in giving feedbacks and thus generate additional information. It is very essential to explore, analyze and organize their opinions and feedbacks in an efficient way for better decision making. So sentiment analysis (SA) is used to find the...
Biometrics is a growing research field due to an increasing demand for safety and security in both the public and private. Biometric recognition refers to the identification of a person by analyzing its physiological and/or behavioral traits. Among several physiological traits, palmprint has become an attractive characteristic due to its reliability, flexibility, stability, non-intrusiveness and discriminating...
Extract facial feature is considered as the most important step in face recognition systems. Several researches have been made to improve facial feature extraction techniques. This paper proposes hybrid global and local feature based on Gabor filter bank and double coding local binary pattern (LBP). The proposed features are concatenated and reduced using generalized discriminant analysis (GDA). The...
In recent years, video surveillance technology has become ubiquitous in every sphere of our life. But automated video surveillance generates huge quantities of data, which ultimately does rely upon manual inspection at some stage. The present work aims to address this ever increasing gap between the volumes of actual data generated and the volume that can be reasonably inspected manually. It is laborious...
This paper attempts to represent the mapped data in the radial basis function (RBF) feature space under non-negativity constraints and develops a RBF kernel based non-negative matrix factorization (KNMF-RBF) algorithm. Based on an objective function with Frobenius norm, we obtain the multiplicative update rules of our KNMF-RBF approach using kernel theory and gradient descent method. The proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.