The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For most English learners, reading English articles has always been a good way of improving the English proficiency. However, it is not easy to select interesting English articles of adequate difficulty vocabulary level. The purpose of this work is to devise a mechanism for selecting appropriate English articles for ESL learners in Taiwan. The proposed mechanism works by indicating whether a particular...
A case study in a pediatric dental clinic was presented. The data were transformed into LRFM (Length, Recency, Frequency, and Monetary) format with fixed M covered by National Health Insurance program in Taiwan, where the data were categorized into 1 to 5 for L, R, and F variables. Later, gender was classified into two types, and age was grouped into four categories. The target in this study was frequency,...
With the development of computer network and widely used of Internet, online information increases in broadband level exponentially, the difficulty and complexity of information retrieval also increase gradually, so the Crawler is developing rapidly. Crawler is a program that can auto collect information from internet. In this paper, we design and implement a multi-thread Crawler for specific resources...
Eye detector and eye tracker have been individually used to solve the task of eye localization in video. Although the eye detection based approach seems to be robust especially in frontal view faces and opened eyes, its performance drops dramatically in the presence of large head pose change and closed eyes. Meanwhile, eye tracking based approaches can estimate closed eyes and eyes in extreme head...
Semi-supervised classification from pairwise constraints is a challenge in pattern recognition, since the constraints just represent the relationships between data pairs rather than the definite labels. In the last few years, several methods have been proposed, however, they still utilize either the discriminability within the constraints or the abundant unlabeled data insufficiently. In this paper,...
Large databases of digital information are ubiquitous. Data from the neighborhood store's checkout register, your bank's credit card authorization device, records in your doctor's office, patterns in your telephone calls and many more applications generate streams of digital records archived in huge databases, sometimes in so-called data warehouses A new generation of computational techniques and...
This paper presents a face recognition method using the Weber Local Descriptor (WLD) feature. The WLD consists of differential excitation component and orientation component, which contains abundant local texture information. In our method, we firstly divide face images into a set of sub-regions and extract their WLD features respectively. We introduce the Sobel descriptor to obtain the orientation...
Previous research [1] has indicated that reputation scores can be used as the basis for trust computation in P2P networks. In this paper, we use reputation scores calculated from P2P search engine rating sites to determine whether a torrent is likely to be linked to a fake file (or not). Our results indicate clear separability between files which are fake and which are genuine, assuming the integrity...
In this paper, a new method of personalized retrieval based on algorithm of BP(Back Propagation) Neural Networks is establish to meet the growing demand for search. The method which can make search engines more intelligent and more personalized tries to provide the best search results.
Research and development of a character recognition systems in the past years has been matured with publicly available either free or commercial character recognition systems especially for isolated Latin characters in multiple languages. The character recognition problem itself can be considered as a mostly solved. Some problems that are still being worked on in this community are unconstrained handwritten...
In data cleaning, detecting approximately duplicate records in data warehouse is an important task. However, due to the wide range of possible data inconsistencies and the sheer data volume, determining whether two records are equal is not a simple arithmetic predicate. This paper proposes an improved algorithm of approximately duplicate records cleaning based on attributes selection after analyzing...
The great success and high number of participants in pattern recognition related competitions last years show an important improvement of recognition and classification approaches. This success is unconceivable without the availability of huge datasets of real world data. We have invited for proposals for competitions to be held in the framework of the 12th International Conference on Frontiers in...
Mammograms are X-ray images which are used in breast cancer detection. In Computer Aided Detection of breast cancer from digital mammogram, elimination of pectoral muscle is a very important and challenging issue. This is because of the fact that pectoral muscle in mediolateral oblique (MLO) mammogram images has common photographic properties with suspicious mass and micro-calcification. Presence...
We are developing a multilingual chat application to help children in Japanese schools whose native language is not Japanese communicate with teachers and support staff. Our multilingual chat application utilizes machine translation to allow communication in their native languages. Since special words or expressions are used in school settings, a machine translation service often produces inadequate...
Nowadays there still exists many problems with regard to student grants in higher education in practice, especially the judgement standard related to poor students. Aiming at the issue, we make use of the data from campus smart card system of certain college, and carry out data mining of poor students to derive groups with different characteristics by clustering analysis. Different groups have adopted...
Taking wise career decision is so crucial for any body for sure. In modern days there are excellent decision support tools like data mining tools for the people to make right decisions. This paper is an attempt to help the prospective students to make wise career decisions using technologies like data mining. In India technical manpower analysis is carried out by an organization named NTMIS(National...
This paper analyzed the various constraints of course scheduling according to the teaching practice of Xiamen University. Combining practice with the theory of simulated annealing algorithm, we applied the method of RBAC (role based access control) to subdivide the role of course scheduling, designed and implemented the course scheduling subsystem of educational administration system. Practice has...
Schema matching is a difficulty in many database application domains, e.g., data integration, E-business, data warehousing and semantic query processing. We can get correct schema mapping by mining the semantics of elements from the elementspsila own information (e.g., elementspsila names and elementspsila data types and domains), data instances and structure information. But in fact, most existing...
In this Paper we have presented a Fingerprint verification system based on hybrid approach which combines both the Feature extraction by applying a set of different wavelet families (functions) and minutiae information available in the fingerprint image by fusion rule method. The Core Point (CP) of the input Fingerprint is detected. Keeping the CP in the center,the image of size w x w is cropped and...
We have investigated a technique for recognising faces invariant of facial expressions. We apply multi-linear tensor algebra, which subsumes linear algebra, to analyse and recognise 3D face surfaces. This potent framework possesses a remarkable ability to deal with the shortcomings of principle component analysis in less constrained situations. A set of vector spaces can be used to represent the variation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.