The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The style of clothing is complex and changeable, there are many kinds of clothing styles, different styles have different emotional expression, but the current description of clothing emotions is mostly qualitative characterization, and the words to express which have no systemic analysis until now. To establish the clothing semantic emotions space is the important prerequisite for computer recognition...
Infographic is a type of information visualization that uses graphic design to enhance human ability to identify patterns and trends. It is popularly used to support spread of information. Yet, there are few studies that investigate how infographics affect learning and how individual factors, such as learning styles and enjoyment of the information affect infographics perception. In this sense, this...
Temporal alignment aligns two temporal sequences and is quite challenging due to drastic differences among temporal sequences and source data from different views. Canonical time warping (CTW) has shown great potential in temporal alignment tasks because it can reduce data redundancy by transforming high-dimensional data to a lower-dimensional subspace via canonical correlation analysis (CCA). However,...
We propose a method to improve the consistency of human evaluation of non-native speaker's utterance, with a capability to evaluate features such as accent and rhythm. In this method, human evaluators evaluate the accent and the rhythm independently by using average voice model and prosody substitution. We also investigated the advantages of evaluating those features independently. We found that,...
The paper is devoted to an analysis of a one-year-long period of operation of a honeynet composed of 6 Dionaea honeypots emulating Windows services. The analysis focused on the frequency of attacks according to the location of individual honeypots (sensors) as well as to the geographical location of attackers. From the statistical processing of the results, it was demonstrated that the most frequently...
Recent advances in computer technology and calculation theory have enabled us to simulate more complex and various phenomena on computer than before. Computer based calculation is used in wide fields from weather prediction to protein structure analysis. Precise simulations by adopting excellent models and appropriate algorithms have given us numerous novel information and understandings. Here, we...
The paper presents mathematical apparatus allowing to calculate the correlation properties of electromagnetic field generated by the Dicke system of two-level emitters. Evolution equations are constructed on the basis of Bogolyubov reduced description method for the system macrostate depicted with energy density of emitters and field amplitudes and binary correlation functions with using ideas of...
Cognitive radio is an innovative technology which seeks to provide a new way to extend utilization of available spectrum. The spectrum detection is an essential problem for cognitive radio. Spectrum sensing is an efficient way to detect spectrum holes in cognitive radio network. In this paper, we present cyclostationary Detection Based on Non-cooperative spectrum sensing in cognitive radio network...
A theoretical method to relate the electrical relative permittivity (dielectric constant) and thermal conductivity of sands is presented. Extensive previous work has been done to relate the physical state (void ratio, water content, and saturation percent) of sandy soils to the bulk thermal conductivity and bulk relative permittivity respectively. These parameters have always been observed isolated...
Honeypots and honeynets are unconventional security tools for the purpose of studying techniques, methods, tools, and goals of attackers. Analysis of data collected by these security tools is important for network security. In this paper, we focus on information about the locations, shapes of geographic features and the relationships between them, usually stored as coordinates and topology (spatial...
The medical therapeutic method presented in this paper is an extension of the biofeedback technique that uses supplementary stimuli and a pattern recorder of the bio signals correlated to the patient's subjective state of wellness. The method puts the patient in the automated therapeutic system acting as the regulator of his (her) own physiological parameters and provides a set of patterns for further...
Locality-based feature learning has drawn more and more attentions recently. However, most of locality-based feature learning methods only consider a kind of local neighbor information, and such the locality-based methods are difficult to well reveal intrinsic geometrical structure of raw high-dimensional data. In this paper, we propose a novel multi-locality correlation feature learning algorithm...
With the production values of the secondary and tertiary industries and 18 industries, and the amount of energy consumption of 8 cities in Shandong peninsula urban agglomeration in 2014, The Theil index, data envelopment analysis, correlation analysis, stepwise multiple regression analysis and ArcGIS spatial analysis were applied to study the spatial patterns of the industrial development and energy...
An effective way to reduce the energy consumption of energy constrained wireless sensor networks is reducing the number of collected data, which causes the recovery problem. In this paper, we propose a novel data recovery method based on low-rank tensors for the heterogeneous wireless sensor networks with various sensor types. The proposed method represents the collected high-dimensional data as low-rank...
This work presents a novel writing style-based approach to detect multi-account users on User-Generated Content (UGC) sites. Unlike existing works which emphasize feasibility and privacy leakage, we focus on precise writing style-based multi-account detection. Specifically, we leverage a one-class classification-based approach to detect multi-account behaviors, in which a mutual similarity measurement...
Human recognition has been an active research area in the past decade. As the traditional biometrics such as face, fingerprint and iris have been widely deployed around the world, the vulnerability of such systems to falsification and spoofing attacks has been admitted. ECG is related to electrical activities of heart and is among the newer additions to biometric family. In addition to its inherent...
Video surveillance has been widely used in many applications. Public safety and theft protections are most important uses of it. A system like this needs an efficient transmission and storage of the large video data. Key frame extraction is a simple and powerful system to accomplish this objective. Keyframe extraction also called as a summary of the video because it gives the only important content...
Automatic identification of emotions from text has been an interesting area of research in the recent times. With the exponentially growing number of online users, emotion identification of the text being read by the users can help in providing a comforting environment to the readers. In this paper, emotion classification is attempted on the news articles from the society channel of Sina. The proposed...
'Crime analysis plays a major part in crime prevention and safety of people in a country. The paper focuses on state based frequent crime pattern knowledge discovery and prevention. Our work concentrates on Finding frequent crimes state wise using FP Max a bottom up approach which uses linked lists for reduction of space complexity. The generated frequent crime sets of state will be undergone through...
The Dynamometer card is commonly used to analyze down-hole working conditions of the beam pumping unit in the practical oil production. In order to improve the reliability and comprehensiveness of the computer diagnosis method, an integrated fault diagnosis method is proposed in this paper. First, the surface dynamometer card is transformed into the down-hole dynamometer card using the Fourier coefficient...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.