The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distortions, such as perspective distortion and partial occlusion, causes objects in different locations in the image of a scene appear to have different sizes. We present a new camera calibration method for estimating the dimension of objects, particularly people, in several locations in the image of a scene. Segmentation methods such as background subtraction combined with frame differencing is...
Mutation analysis has proven to be a strong technique for software testing. Unfortunately, it is also computationally expensive and researchers have therefore proposed several different approaches to reduce the effort. None of these reduction techniques however, focuses on non-functional properties. Given that our goal is to create a strong test suite for testing a certain non-functional property,...
Having the correct posture is essentially important in our life to make our body functions properly and keeps us healthy. In our previous work, a posture detection system using consumer mobile devices for checking proper posture in a daily exercise was proposed, where, in addition to acceleration values obtained from each device sensor, the possiblitly of using the strength of RSSI (Received Signal...
This paper presents an iterative pre-filtering based algorithm for Wiener system identification by using bilinear parameterized formulation. This method assumes the invert ability of the non-linearity involved in the modeling of wiener model. In addition, the output of the linear block is corrupted with noise signal resulting a model with correlated noise disturbance. The least square solution fails...
The Hardware Description Language is transformed into intermediate format. The intermediate format can be Control Data Flow Graph (CDFG), Data Flow Graph (DFG), Control Flow Graph (CFG), Finite State Machine (FSM) etc. The intermediate format used in our tool is Control Flow Graph. A novel technique for hardware estimation is suggested for control construct alone. The estimation is carried out for...
Internet of things (IoT) integrate the technologies such as sensing, communication, networking and cloud computing in wide range monitoring zone. For applications of IoT, the most appropriate monitoring network is wireless sensor networks (WSN). It is most important to develop energy efficient cluster head (CH) selection scheme to increase the network lifetime of WSNs. It is most crucial to save the...
Indoor systems cannot obtain a precise estimate of the location, due to unstable signals. In this paper, we use realistic wireless data from the IEEE International Conference on Data Mining (ICDM) dataset and Azure Machine Learning Studio to perform Bagging (also called bootstrap aggregating). By using the machine leaning technique in the Azure Machine Learning Studio, we can obtain more than 69 percent...
The conventional positioning systems require the users to carry an electronic device, which helps in the localization process. Device-free Passive Localization (DfPL) techniques are used to position the users in a passive manner such that they do not engage in the process. A typical DfPL setup comprises of Wi-Fi Access Points (APs) that transmit periodic signals to Monitoring Points (MPs). Any intrusion...
Floating Content (FC) has recently been proposed as an attractive application for mobile networks, such as VANETs, to operate opportunistic and distributed content sharing over a given geographic area, namely Anchor Zone (AZ). FC performances are tightly dependent on the AZ size, which in literature is classically chosen by the node that generates the floating message. In the present work, we propose...
Noise estimation plays an essential role in enhancing the performance of non-coherent spectrum sensors such as energy detectors. If the noise energy is misestimated, detector performance may deteriorate. In this paper, we present an energy detector based on the behavior that Empirical Mode Decomposition (EMD) has on noise-only channels. EMD decomposes time-series signals into a finite set of components...
As IoT devices become prevalent in our daily lives, estimation of their trustworthiness plays an important role for privacy protection complementary to security solutions. Existing trust estimation solutions are based on SIoT whose full social network is not likely to be observable in a public space or do not reflect situation-dependent dynamism of trust. In this paper, we propose a new trust estimation...
Asian countries like Indonesia, Cambodia, Thailand and India used Palm leaves to record vital information, to pass it down the generations. Palm Leaves are innate, organic items and presented to attrition because of climatic elements, light and insects. This poses a hazard in scrutinizing the invaluable details. Preservation and translation of information on these palm leaves into a digital format...
Based on Khatri-Rao subspace, a novel direction of arrival (DOA) estimation method for wideband uncorrelated signals is proposed in the presence of unknown mutual coupling. The effect of mutual coupling at each frequency bin can be compensated by setting several auxiliary array elements on each side of the original array and the DOAs can be accurately estimated by applying the technique of Khatri-Rao...
Moving item recommendation is now and again a champ among the most key and basic procedures in PC perspective programs. In this paper, a novel organization model is suggested to get rid of illustrating closer see things from files that may contain different sorts of disturbing impact, for instance, light changes, camera parameter varieties, bustles and component back-grounds, etc. For each appearance,...
In the real world, sensors are always exposes to noise and error during measurements. These problems will lead to invalid and overshoot readings, as well as blank data. Fortunately, these errors can be treated using filters. For data collection process using laser range finder, the use of filters is necessary as they can help to overcome the laser limitations and improve the scanning input. Here,...
An implementable blood glucose estimation in computer is presented. In general, the existing effective approaches for measuring the blood glucose concentration are mainly based on blood test, which is painful for patient. Painless methods to obtain blood glucose concentration will dramatically improve the case. As one of the painless methods, this paper implements the blood glucose estimation with...
Graphlets represent small induced subgraphs and are becoming increasingly important for a variety of applications. Despite the importance of the local subgraph (graphlet) counting problem, existing work focuses mainly on counting graphlets globally over the entire graph. These global counts have been used for tasks such as graph classification as well as for understanding and summarizing the fundamental...
High-dimensional and sparse (HiDS) matrices are commonly encountered in many big data-related industrial applications like recommender systems. When acquiring useful patterns from them, non-negative matrix factorization (NMF) models have proven to be highly effective because of their fine representativeness of non-negative data. However, current NMF techniques suffer from a) inefficiency in addressing...
We introduce a powerful technique to make classifiers more reliable and versatile. Background Check equips classifiers with the ability to assess the difference of unlabelled test data from the training data. In particular, Background Check gives classifiers the capability to (i) perform cautious classification with a reject option, (ii) identify outliers, and (iii) better assess the confidence in...
How to make a decision is a critical problem in speaker verification system and it directly affects the final verification results. This paper describes a new efficient threshold setting method that performs speaker verification system with I-vector technique. Unlike typical system under laboratory, it is difficult to obtain a large number of data to fully estimate the speaker recognition threshold...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.