The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Background extraction is considered the first and key processing stage in video surveillance systems. This paper proposed an novel fuzzy architecture for background estimation. fuzzy architecture was built based on mamdani based fuzzy model and we used mean, median and mode values as membership function. Background estimated by using this system is robust to adaptive background, and varying illumination...
Quality of an image plays a fundamental role in taking vital decisions. In various walks of life, one such decision is personal identification. Hence, it's assessment is essential prior to using it in many biometric applications such as face recognition, iris, fingerprint analysis etc. The proposed technique classifies images into four classes based on their illumination and contrast quality. Then,...
The success of web services is changing the way in which software is designed, developed, and distributed. Services are in fact continuously re-designed and incrementally developed, released in heterogeneous and distributed environments. They are selected and integrated at runtime within external business processes. To ensure that a deployed service fulfils the QoS requirements, a Service Level Agreement...
Received signal strength (RSS) based fingerprinting localization technique has been researched widely for the indoor location based services (LBSs) in recent years. However, the accuracy performance suffers from the time-varying characteristic of RSS due to the multi-path and shadow effect. In this paper, we propose a fingerprinting positioning system based on power delay profile (PDP). The system...
Independent component analysis (ICA) is a recent technique used in signal processing for feature description in classification systems, as well as in signal separation, with applications ranging from computer vision to economics. In this paper we propose a preprocessing step in order to make ICA algorithm efficient for rotation invariant feature description of images. Tests were carried out on five...
The vocal separation is to separate vocal part and remove the accompaniment part from the mixed music data. Vocal part include many information, singer, lyric and emotion of the song. If we can extraction only the vocal part from the original sound from CD source, it can be applied to various applications. In this paper, we propose a new method to take out the natural vocal parts from mixed music...
Recently, geotagged posts to social media such as Twitter have been used to automatically construct a geographical dictionary containing diverse types of local words which indicate specific locations in the real world. The existing methods typically examine the spatial locality of the usage patterns observed in the geotagged posts accumulated for a certain period of time to select the local words,...
Following previous series on Looking at People (LAP) competitions [14] [13] [11] [12] [2], in 2015 ChaLearn ran two new competitions within the field of Looking at People: age and cultural event recognition in still images. We proposed a crowd-sourcing application to collect and label data about the age people looks like instead of the real age. In terms of cultural event recognition, one hundred...
Image forensic techniques have a sensitive role in determining authenticity of digital images. Multiple tampering operations and varied image content has led to high false positive rate of these methods when applied to real world forgeries. A detection method based on fusion of multiple cues is desired to improve reliability and accuracy in image forensics. Hence, there is an insistent need of testing...
Age estimation from facial images is an important problem in computer vision and pattern recognition. Typically the goal is to predict the chronological age of a person given his or her face picture. It is seldom to study a related problem, that is, how old does a person look like from?the face photo? It is called apparent age estimation. A key difference between apparent age estimation and the traditional...
Existing age estimation algorithms based on facial images have been showing high dependency on the age range with the range 29–49 yielding the best estimation results. This paper introduces a new multi-stage binary age estimation (MSAE) system configured as a network of decision making neural network (NN) and support vector machine (SVM) units. The decision making process was based on the classification...
Indoor localization in multi-floor buildings is an important research problem. Finding the correct floor, in a fast and efficient manner, in a shopping mall or an unknown university building can save the users' search time and can enable a myriad of Location Based Services in the future. One of the most widely spread techniques for floor estimation in multi- floor buildings is the fingerprinting-based...
Video saliency detection is typically performed by combining temporal saliency and spatial saliency, which are detected separately. Among various available techniques, uncertainty-based combination is a unique and promising approach. In this paper, we study the uncertainty of each point within a map generated from video saliency detection. We develop an adaptive temporal correlation-based method for...
Latent fingerprints have been used by law enforcement agencies to identify suspects for a century. However, because of poor image quality and complex background noise, latent fingerprints are routinely identified relying on features manually marked by human experts in practice. A large number of latent fingerprints can not be treated in time due to lacking well trained experts, highlighting the need...
We propose a new, hierarchical, aggregation-based deep neural network to learn aging features from facial images. Our deep-aging feature vector is designed to capture both local and global aging cues from facial images. A Convolutional Neural Network (CNN) is employed to extract region- specific features at the lowest level of our hierarchy. These features are then hierarchically aggregated to consecutive...
In this work, we present a collection of different techniques oriented to the altitude estimation in topological visual navigation tasks. All the methods use descriptors based on the global appearance of the scenes. The techniques are tested using our own experimental database, which is composed of a set of omnidirectional images captured in real lightning conditions including several locations and...
[Context]: The numerous challenges that can hinder software companies from gathering their own data have motivated over the past 15 years research on the use of cross-company (CC) datasets for software effort prediction. Part of this research focused on Web effort prediction, given the large increase worldwide in the development of Web applications. Some of these studies indicate that it may be possible...
Context: The pool of papers published in ESEM. Objective: To utilize citation analysis and automated topic analysis to characterize the SE research literature over the years focusing on those papers published in ESEM. Method: We collected data from Scopus database consisting of 513 ESEM papers. For thematic analysis, we used topic modeling to automatically generate the most probable topic distributions...
Indoor positioning based on the received signal strength (RSS) in wireless local area networks (WLAN) is one of the most promising approaches to provide Location-based services. Gaps in the coverage of the fingerprint can lead to significant errors. We propose a localization scheme that minimizes these faults. By using Gaussian Processes (GP) we are able to incorporate model knowledge and empirically...
Manual identifying region with visual attention in image/video frames is not a facile task. An algorithm which automatically reveals salient region from a single image is presented. The challenging problem of saliency detection is tackled by the Delaunay triangulation with an advanced salient criteria. The criteria addresses to difference of intensive value and image feature which is based on local...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.