Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A large corpus of ceramic sherds dating from High Middle Ages has been extracted in Saran (France). The sherds have an engraved frieze made by the potter with a carved wooden wheel, used as a dating to study the dissemination of productions. ARCADIA project aims to develop an automatic classification of this archaeological heritage. The sherds are scanned using a 3D laser scanner. Then, a binary pattern...
Coronary artery disease is the leading cause of death in the world. In this research, we propose an algorithm based on the machine learning techniques to predict the risk of coronary artery atherosclerosis. A ridge expectation maximization imputation (REMI) technique is proposed to estimate the missing values in the atherosclerosis databases. A conditional likelihood maximization method is used to...
The identification of facial expressions with human emotions plays a key role in non-verbal human communication and has applications in several areas. In this work, we analyze two main approaches for expression recognition.
Biometric systems can be attacked in several ways and the most common being spoofing the input sensor. Therefore, anti-spoofing is one of the most essential prerequisite against attacks on biometric systems. For face recognition it is even more vulnerable as the image capture is non-contact based. Several anti-spoofing methods have been proposed in the literature for both contact and non-contact based...
This paper proposes an object verification method by using sparse representation (SR) which has been applied for object representation and recognition. However, SR dictionary does not show sufficient compactness. Our method comprises three major modules. First, we train the sparse matrix by using boost K-Singular Value Decomposition (boost K-SVD) to obtain a sparse vector set. Second, we combine two...
Web applications hosted on the Internet are naturally exposed to a variety of attacks and constantly probed by hackers for vulnerabilities. SQL Injection Attack (SQLIA) has been a major security threat on web applications since over 15 years. Detecting SQLIA at runtime is a challenging problem because of extreme heterogeneity of the attack vectors. This paper explores application of node centrality...
This paper presents a facial expression recognition framework which infers the emotional states in real-time, thereby enabling the computers to interact more intelligently with people. The proposed method determines the face as well as the facial landmark points, extracts discriminating features from suitable facial regions, and classifies the expressions in real-time from live webcam feed. The speed...
In current years, the binate codify of facial features, being local binary patterns (LBP) and local ternary patterns (LTP) has grown into face recognition. Those confined facet descriptors subsidize a smooth and influential way for texture description. With this, we conclude an innovative process, LTP with Genetic Algorithm to extricate feature vector and segregated features through Support Vector...
Gender estimation has received increased attention due to its use in a number of pertinent security and commercial applications. Automated gender estimation algorithms are mainly based on extracting representative features from face images. In this work we study gender estimation based on information deduced jointly from face and body, extracted from single-shot images. The approach addresses challenging...
This paper proposes a speech/music classification system based on i-vector. An analysis of two classification methods, namely cosine distance score (CDS) and support vector machine (SVM) is performed. Two session compensation methods, within-class covariance normalization (WCCN) and linear discriminant analysis (LDA) are also discussed. The performance of proposed systems yields better results compared...
It is very difficult, if not impossible, to obtain a clean reference signal of a noisy speech recorded in a practical environment. As a result, intrusive methods that evaluate the quality of speech signal with the help of a clean reference signal has little value in real world applications. In this paper, we investigate the effectiveness of data-driven non-intrusive method for assessing quality of...
Detecting a small number of outliers from a set of data observations is always challenging. This problem is more difficult in the setting of multiple network samples, where computing the anomalous degree of a network sample is generally not sufficient. In fact, explaining why a given network is exceptional, expressed in the form of subnetwork, is also equally important. We develop a novel algorithm...
Now a days purchasing and selling products online has become more common. People often ask others about the product before purchasing, otherwise see the reviews about the product in the different e-commerce sites and then come to conclusion whether to buy the product or not. This decision making process is very important before purchasing any product. But it is not easy to read all the reviews because...
Vascular networks in infrared faces are created due to the blood flow under the skin. Variations in blood flow in the blood vessels cause temperature difference, which produces the vascular networks. This paper deals with binary classification of various infrared facial expressions using vascular network. The classification has been performed using Support Vector Machine classifier on five types of...
SQL injection is the most common web application vulnerability. The vulnerability can be generated unintentionally by software developer during the development phase. To ensure that all secure coding practices are adopted to prevent the vulnerability. The framework of SQL injection prevention using compiler platform and machine learning is proposed. The machine learning part will be described primarily...
To retrain an existing multilayer perceptron (MLP) on-line using newly observed data, it is necessary to incorporate the new information while preserving the performance of the network. This is known as the “plasticitystability” problem. For this purpose, we proposed an algorithm for on-line training with guide data (OLTA-GD). OLTA-GD is good for implementation in portable/wearable computing devices...
Face recognition has been receiving continuous academic and commercial attention for the last decades. In this paper, we construct two face recognition systems adopting SVM and Adaboost as the classifiers with fast PCA for facial feature representation. The detailed discussions about algorithm realization are given. Comparison between the two systems and analysis of them are provided through several...
Iris is one of the popular biometrics that is widely used for identity authentication. Different features have been used to perform iris recognition in the past. Most of them are based on hand-crafted features designed by biometrics experts. Due to tremendous success of deep learning in computer vision problems, there has been a lot of interest in applying features learned by convolutional neural...
Biometric systems may be used to create a remote access model on devices, ensure personal data protection, personalize and facilitate the access security. Biometric systems are generally used to increase the security level in addition to the previous authentication methods and they seen as a good solution. Biometry occupies an important place between the areas of daily life of the machine learning...
Facial expression recognition in complex environment is one of the difficult tasks of visual recognition in recent years. This paper introduces the visual saliency mechanism and we design automatic searching of the face region in the image. Using the narrow band C-V model to evolve curve, the proposed scheme can obtain the accurate face region. Meanwhile, the SVM will be trained by standard database...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.