The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the embryo development problem for the Drosophila melanogaster, a set of molecules known as mor-phogens are responsible for the embryo segmentation. These morphogens are encoded by different genes, including the GAP genes, maternal coordination genes and pair-rule genes. One of the maternal coordination genes encodes the Bicoid morphogen, which is the responsible for the development of the Drosophila...
Monte Carlo (MC) simulations play a crucial role in nuclear medical imaging since they can provide the ground truth for clinical acquisitions, by integrating and quantifing all physical parameters that affect image quality. The last decade a number of realistic computational anthropomorphic models have been developed to serve imaging, as well as other biomedical engineering applications. The combination...
Emissions of the greenhouse gases N2O, CO2, and CH4 have increased in the past years. CH4 has a distinct contribution to global warming and climate change. Rice production plays an important role in CH4 emission. Thus, the rice fields in China should be considered in assessing CH4 emission. This study simulated CH4 emission in rice fields in China during the past 40 years (1971 to 2010) using the...
Spatio-temporal interesting points feature is a key technology for a wide class of computer vision approaches to recognize human actions. In this paper, a novel bio-inspired model based spatio-temporal interesting points (BIM-STIP) framework is proposed. Different from traditional STIP framework, the introduction of bio-inspired model provides a biological theory for interest points detection and...
In this study, based on kernel-driven linear BRDF model, a new spectral vegetation index named anisotropic flat index (AFX) and a hotspot kernel function are described. Anisotropic Flat Index (AFX), which is created by normalization of net scattering magnitude with the isotropic scattering, can summarize the variability of basic dome-bowl anisotropic reflectance pattern of the terrestrial surface...
Alzheimer's Disease (AD) speech production is being classicaly studied under different aspects as prosody, rhythmic or semantics, phonation being an unexplored field. The present work is devoted to the study of several cases under the scope of phonation, including AD speakers and healthy controls. Temporal events with interest in phonation are studied. These include fillers (spontaneous voiced pauses...
Recent developments of modern technologies such as cloud computing, wearable sensor devices and big data have significantly impacted people's daily lives, and offer real potential for an Internet-wide, people-centric ecosystem. These advances in technology will considerably extend human capabilities in acquiring, consuming and sharing personal health information. A future in which we are all equipped...
PLM (product lifecycle management) is the management of the enterprise's products all the way across their lifecycles in the most effective way. However, at present, the PLM system in the market is not very appropriate to the small and medium-size enterprises. This paper presents a workflow engine-driven universal PLM system framework, which is constructed by four layers: client layer, application...
Human gait recognition is a distance based second generation biometrics, which is unobtrusive. Human gait recognition is nothing but identifying a person from its walking style. Human Cooperation is not required in this biometric system. There are two approaches of gait recognition, which are model based and model free approaches. This paper provides a recent comprehensive survey of only model free...
Many applications need methods for handling missing or insufficient data. This paper applies a correlation technique to improve the fallback methods previously used to handle the paucity of keystroke data from the infrequently used keys in a keystroke biometric system. The proposed statistical fallback model uses a correlation based fallback table based on the linear correlation between pairs of keys...
Mammogram retrieval systems and techniques have a key role in supporting the radiologists and physicians in their decision making. This paper presents an approach based on the biorthogonal wavelet and decision tree methods for the retrieval of mammograms from digital database for screening mammogram (DDSM) database. Classification and regression tree (CART) algorithm and LeGall 5/3 wavelet are considered...
Named entity recognition (NER) is an essential step in the process of information extraction within text mining. This paper proposes a technique to extract drug named entities from unstructured and informal medical text using a hybrid model of lexicon-based and rule-based techniques. In the proposed model, a lexicon is first used as the initial step to detect drug named entities. Inference rules are...
In the research on automated (design-time) generation of graphical user interfaces (GUIs), the focus is on how such a generation works and on the resulting GUI's appearance. However, the integration of the software part implementing the resulting GUI with an application logic does not appear to be in a well-defined software architecture. We propose an integration in the well-known Model-View-Controller...
Large-scale software-intensive systems are often considered as systems of systems (SoS) comprising multiple heterogeneous but interrelated systems. The engineering of SoS often involves the derivation of system variants from multiple interrelated product lines to meet the overall requirements. If multiple teams and experts are involved in the configuration of these individual systems, their individual...
Network theory has been used for modeling biological data as well as social networks, transportation logistics, business transcripts, and many other types of data sets. Identifying important features/parts of these networks for a multitude of applications is becoming increasingly significant as the need for big data analysis techniques grows. When analyzing a network of protein-protein interactions...
Many scientific experiments are designed as computational workflows in the bioinformatics domain, which facilitates implementation and analysis. However, the amount of data generated increases at every phase of each execution, hindering the identification of the source and the data transformation. Therefore, it has become necessary to create new tools to verify automatically which resources and parameters...
While single-view human action recognition has attracted considerable research study in the last three decades, multi-view action recognition is, still, a less exploited field. This paper provides a comprehensive survey of multi-view human action recognition approaches. The approaches are reviewed following an application-based categorization: methods are categorized based on their ability to operate...
This paper establishes an outer bound of the capacity region of general biometric systems. The goals of biometric systems considered include person identification and secret binding, while template protection, privacy, and secrecy leakage are security issues addressed. A general model of biometric systems is proposed, in which the use of private keys are also incorporated. The system model captures...
A biometric identification system determines the identity of a given biometric input data, among a set of gallery identities stored in the database. The existing identification techniques typically base the decision on the match scores representing the similarity between the query and the template of each gallery. The strategies proposed so far for combining different biometric identification systems...
This paper argues that biometric verification evaluations can obscure vulnerabilities that increase the chances that an attacker could be falsely accepted. This can occur because existing evaluations implicitly assume that an imposter claiming a false identity would claim a random identity rather than consciously selecting a target to impersonate. This paper shows how an attacker can select a target...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.