The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sometimes, quality of a process can be described by a functional relationship between response variables and explanatory variables which called profile. In some situations, there is an autocorrelation structure within a profile. Most of the times in real practice there is no enough data to estimate the process parameters. In this case, we can use a self-starting control chart which does not need preliminary...
Consider the problem of allocation of spatially correlated gridded data to finer spatial scale, conditionally on covariate information observable in a fine grid. Spatial dependence of the process can be captured with the conditional autoregressive structure, suitable for gridded (areal level) data. Also geostatistical methods, particularly empirical universal kriging, can be used for this purpose...
L1-L2C is the first dual-frequency pair of civilian GPS signals, expected to become available over the full constellation by 2019. Pre-operational CNAV broadcast is made available to support development of L2C signal processing capability in modernized GPS receivers. The transmission of synchronized L1 C/A and L2C codes by Block IIR-M and follow-on generations of GPS satellites allows GPS receiver...
Keccak is the hash function selected by NIST as the new SHA-3 standard. Keccak is built on sponge construction, and it provides a new keyed Message Authentication Code (MAC) function called MAC-Keccak. The focus of this work was to apply the power analysis attacks that use Correlation Power Analysis (CPA) technique to extract the secret key. Our attack methodology utilizes simulated power consumption...
Current Security Information and Event Management systems (SIEMs) constitute the central platform of modern security operations centers. They gather events from multiple sensors (intrusion detection systems, anti-virus, firewalls, etc.), correlate these events, and deliver synthetic views of the alerts for threat handling and security reporting. However, as the number of security incidents, and thus...
Emotional processing of ex-combatants is affected by chronic exposure to violent events. For a successful reintegration into society, it is necessary to discriminate their brain responses from civilian people, as a first stage to develop treatment strategies. This paper presents a comparative analysis between a Multilayer Perceptron Neural Network and a Fuzzy C-Means classifier to differentiate ex-combatant...
The combination of standard visible RGB channels and near infrared (NIR) information has been observed to perform better than RGB-only data in the scene categorization task. However, RGB-NIR data are limited due to the collection difficulties. With limited data, it is hard for most deep networks to learn an effective solution, while humans are able to solve such kind of problem within a little of...
This paper introduces an approach to employ deep features for person re-identification. In contrast to existing works, we focus on using pre-trained deep models and their concept-based output to enhance attribute presentations of person images. There are two main contributions. First, we investigate recent state-of-the-art deep learning models for the task and provide a comprehensive evaluation. Second,...
Facial expression which carries rich information of body behavior is the leading carrier of human affective and the symbol of intelligence. The main purpose of this paper is to recognize 3D human facial expression. The research in this paper includes the expression feature extraction algorithm and fusion with different kinds of feature. To contain more local texture feature information, we proposed...
There are different opinions on the names and quantity of semantic roles. In order to analyze the deep meaning of human language, we did two parts of tasks based on Chinese Semantic Dependency Graph Bank, which is a corpus analyzed by semantic dependency graph (SDG). After calculating the frequency of each role, we normalized the roles' names and distinguished the differences between each other. There...
Being able to automatically predict digital picture quality, as perceived by human observers, has become important in many applications where humans are the ultimate consumers of displayed visual information. Standard dynamic range (SDR) images provide 8 bits/color/pixel. High dynamic range (HDR) images which are usually created from multiple exposures of the same scene, can provide 16 or 32 bits/color/pixel,...
This article introduces a spectral method for statistical subspace clustering. The method is built upon standard kernel spectral clustering techniques, however carefully tuned by theoretical understanding arising from random matrix findings. We show in particular that our method provides high clustering performance while standard kernel choices provably fail. An application to user grouping based...
Quaternions, a four dimensional extension of complex numbers, are increasingly being used in various signal processing applications. At the same time, there are few probabilistic representations for capturing such random variables. In this work we present a new copula-based distribution over quaternions. The distribution extends the classical Gaussian and independent distributions, while maintaining...
A novel method of data masking is presented which allows Poisson and some Gaussian data sets to be altered without changing the overall probability density function. The method consists of multiplying each entry by a random complex exponential function, i.e. a rotation in the complex plane, and exchanging imaginary components between entries. The transformation preserves the properties of the data...
From a sequence of similarity networks, with edges representing certain similarity measures between nodes, we are interested in detecting a change-point which changes the statistical property of the networks. After the change, a subset of anomalous nodes which compares dissimilarly with the normal nodes. We study a simple sequential change detection procedure based on node-wise average similarity...
In this paper we describe different procedures to compensate the fixed pattern noise (FPN). These procedures have been developed and tested for a camera designed by us, which is based on a CMOS active pixel sensor (APS). In this kind of sensors, the FPN mainly depends on the noise coming from the column selection electronics. In this sense, we suggest and assess three different methods for FPN compensation:...
The notion of subjective image quality (SIQ) is particularly difficult to define as it depends on a large variety of physical attributes and psycho-physical factors. One important attribute which SIQ depends on is the illumination under which visual stimuli are observed. Recent studies have shown that achromatic fidelity (i.e. perceived resemblance in lightness) is significantly less dependent on...
Information and Communication Technology (ICT) has changed the world scenario including business and economies. There are new opportunities and challenges for every country to produce knowledge oriented citizens. Driven by these changes, numerous higher education institutions around the world are integrating and adopting latest ICT tools to deliver quality education. However, the Effectiveness of...
Frame discrimination algorithms are discussed that address the problem of differentiating user frames transmitted asynchronously through optical fading channels. In communications systems where multiple users transmit asynchronously, fading channels can render the received frames unidentifiable at the receiver so that intended user destinations for the frames are then unknown. Algorithms that are...
Radio Frequency Identification Device (RFID) technology use in health care services has been shown to save lives, prevents errors, save costs and increases security. Implementation of RFID technology has been challenged with high implementation costs, substantial gap between technology implementation costs and the RFID-enabled benefits, lack of common standard of usage/data analysis and low operational...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.