The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, we present a novel method for accurate affine transformation estimation of image regions. We illustrate the benefits of using such a method in a point matching mechanism that enables locating large amount of point matches with high geometric precision and low rate of false matches. Recent publications have shown that considering the affine transformation model of local regions, is extremely...
This paper presents an empirical study on selecting a small amount of useful unlabeled data with which the classification accuracy of semi-supervised learning algorithms can be improved. In particular, a hybrid method of unifying the simply recycled selection method and the incrementally reinforced selection method is considered and empirically evaluated. The experimental results, obtained using well-known...
The usage of mobile application in various aspects has been worldwide accepted and there are variety of mobile applications which developed to cater the usage of different background of the user. In this paper, a short survey which includes questionnaire is distributed to find the interest of user whom using application for learning Quran and concept of mobile speech apps. The main interest of this...
Advances in technology have made it possible to collect personal and professional data about individuals and the connections between them, such as their email correspondence and friendships on the internet. Many agencies and researchers who have collected such social network data often have a compelling interest in allowing others to analyze the data. However, in many cases the social network data...
There is growing interest among smartphone users in the ability to determine their precise location in their environment for a variety of applications related to way finding, travel and shopping. While GPS provides valuable self-localization estimates, its accuracy is limited to approximately 10 meters in most urban locations. This paper focuses on the self-localization needs of blind or visually...
Network intrusion is recognized as a chronic and recurring problem. Hacking techniques continually change and several countermeasure methods have been suggested in the literature including statistical and machine learning approaches. However, no single solution can be claimed as a rule of thumb for the wide spectrum of attacks. In this paper, a novel methodology is proposed for network intrusion detection...
The brain computer interface (BCI) is an emerging technology for paralyzed people to communicate with external environments through their minds. However, current EEG equipment utilizes metal electrodes, such as gold cup, AgCl, etc., with electrolytes to attach on human skin. These wet-type electrodes are not convenient for use. It usually requires a lousy preparation process and the refill of electrolyte...
Introduction: Pedicle screw fixation is a standard procedure of spinal instrumentation. The aim of this work was to evaluate accuracy and safety of using personalized guiding templates for pedicle screw placement on thoracic spine. Methods and Results: We performed a computer tomography (CT) scan of the spine specimen to acquire virtual 3D model of the spine. Computer software (EBSTM, Ekliptik, Slovenija)...
The aim of this paper is to show that an accurate and efficient text classifier for relatively simple problem domains can be created in only a few hours of development time. The motivating example discussed in the paper is a recent HackerRank competition problem that tasked competitors with creating a classifier for questions from the popular question and answer platform StackExchange. The paper describes...
This paper represents a new and intelligent system for license plate recognition used in many cases, for example: unattended parking lots, security control of restricted areas, traffic law enforcement, congestion pricing, and automatic toll collection. The proposed system is a process based on a combination of the complement methods that increases the accuracy of output data and is generally accountable...
Traditionally, the architecture of control system in large physics experiment is based on PLC and DCS like EPICS. For the control information in controls system, its timestamp is marked in control computer after transferred from PLC to computer. This mode will introduce more time deviation in time stamp. In CSNS, we will use a new PLC from BECKHOFF which can provide real-time timestamp, and we can...
Signature customization is a technique to help the misuse network based IDS to select an appropriate signature for the protected hosts. Additionally, it eliminates unnecessary signature matching in order to enhance the detection capabilities for the NIDS. This paper assesses the effectiveness of depending only on vulnerability scanners to perform signature customization. In addition, it introduces...
Mainstream indoor localization technologies rely on RF signatures that require extensive human efforts to measure and periodically re-calibrate. Although recent crowdsourcing based work has started to address the issue, incentives are still lacking for wide user adoption. Thus the progress to ubiquitous localization remains slow. In this paper, we explore an alternative approach that leverages environmental...
Swarms of autonomous underwater vehicles (AUVs) forming mobile underwater networks often operate in moving currents, which introduce severe turbulence that interferes with coordinated and stealthy navigation of fleet. Therefore, individual AUV must adjust their heading whenever needed to ensure it can reach a pre-determined destination. To achieve accurate navigation, AUVs must maintain precise knowledge...
We propose a technique of automatic classification of DRDO tender documents into predefined technological categories. The dataset comprised of 698 tender files obtained from DRDO website. The dataset was processed and fed into Weka toolkit. Experiments were conducted using Naïve Bayes classifier with 10 folds cross validation. The documents were classified with 75.21 percent accuracy by technology...
In the NLP world the recognizing speech as in the voice recognition and also allowing voice to serve as the "main interface between the human and the computer. This paper mainly focuses on the tools that are used to deliver how current speech recognition technology facilitates the learning part of the students, and also in what way the technology will be help to developing the advance learning...
In this paper we present a novel technique called iDMI that imputes missing values of a data set by combining a decision tree algorithm (DT) and an expectation-maximization (EMI) algorithm. We first divide a data set into horizontal segments through applying a DT algorithm such as C4.5, and then apply an EMI algorithm on each segment in order to impute the missing values belong to the segment. If...
In medical field the disease diagnosis is often made based on the knowledge and experience of the medical practitioner. Due to this there are chances of errors, unwanted biases and also takes longer time in accurate diagnosis of disease. In case of heart disease, its diagnosis is most difficult task. It depends on the careful analysis of different clinical and pathological data of the patient by medical...
This paper presents the possibilities and usage of metrotomographic measurements using Metrotom device. The main motivation is to evaluate the precision of the scanning for complex objects. We also present a comparison of measuring strategies, which round up in the conducted experiment. In this experiment, we have paired a cloud of points of the measured element with its CAD model. With each one of...
To explore the academic progression of the students, higher educational institutions need better assessment and prediction tools. In this regard, Multilayer Perceptron (MLP) based prediction application is proposed to predict the Grade Point Average (GPA) of the Undergraduate students by the make use of student's Previous Academic History, Regularity, No. of Backlogs, Degree of Intelligence, Working...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.