The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Now a day when huge amount of documents and web contents are available, so reading of full content is somewhat difficult. Summarization is a way to give abstract form of large document so that the moral of the document can be communicated easily. Current research in automatic summarization is dominated by some effective, yet naive approaches: summarization through extraction, summarization through...
Cluster is bunch of similar items. Unsupervised classification of patterns into clusters is known as clustering. It is useful in knowledge discovery in data. Clustering is able to deal with different data types. Fuzzy rules are used for data intelligence illustration purpose. User gets highly interpretable discovered clusters using fuzzy rules. To generate accurate fuzzy rules triangular membership...
It is impossible for severely disabled people to browse or learn through the Internet due to the mere lack of independent control of the mouse. This paper proposes a brain computer interface (BCI) to aid severely disabled individuals, such as people disabled by amyotrophic lateral sclerosis (ALS), in browsing or learning on the Internet. By analyzing specific components of event-related potentials...
In order to expand the application of rough set operator, we analyzed two kinds of operator and the relationship between conversion structure based on the degree of rough set operator and variable precision rough set operator. By introducing a parameter, we give a Graded-Variable precision rough set model. And we get the Upper approximation operator and Lower approximation operator and some of its...
To deal with the existence of malicious secondary users bring damage to the performance of cooperative spectrum sensing, a trust game model named FRTrust is proposed. In FRTrust, the reputation status is used to describe the performance of a secondary user in cooperative spectrum sensing process. It encourages secondary users to choose positive and honest behavior strategies for greater and long term...
Dyslexia is a learning difficulty and in most cases cannot be identified until a child is already in the third grade or later. At this time a dyslexic child have only an one-in-seven chance of ever catching up with his or her peers in reading, writing, speaking or listening. Early identification can pave the way for early intervention and the dyslexic child can be helped at an early stage. Furthermore,...
Due to the disadvantage of the word segmentation tool in the aspect of the accuracy of word segmentation and speech tagging, it has harmful effects to the further research work. So this paper proposes a method based on the results of word segmentation to utilize language rules, which has been defined and described in Event Ontology, to verify and correct them. Experimental results show that compared...
Malware stand for Malicious Software became a major threat facing the massive amount of data transmitted through the internet and the systems holding that data. Malware detection is the process of identifying the malicious behavior or object as malware. Many methods used to do the detection process, these methods are varied depending on the process used by the detector -anti virus or anti malware...
This paper quantifies existing techniques for feature detection in human action recognition. Four different feature detection approaches are investigated using Motion SIFT descriptor, a standard bag-of-features SVM classifier with x2 kernel. Specifically we used two popular feature detectors; Motion SIFT (MOSIFT) and Motion FAST (MOFAST) with and without Statis interest points. The system was tested...
Model verification and validation are defined, and why model verification and validation are important is discussed. The three approaches to deciding model validity are described. A graphical paradigm that shows how verification and validation are related to the model development process and a flowchart that shows how verification and validation is part of the model development process are presented...
Physical activities play important role in having better health. However, due to the nature of our jobs, most of us have developed sedentary habits and it is very seldom that we find dedicated time for exercise or other physical activities. Sedentary behavior has been identified as an important factor in preventing good health and there is a need to push adults to carry out physical activities regularly,...
In this paper, we look into the colour transformation algorithm, which focuses on the red-green colour vision deficient individuals. Red-green colour deficiency is the most common category of color blindness that causes red and green to be seen as beige color. Two main colour transformation algorithms namely the Daltonize and RGB-HSV algorithm are used to compare to see the different. These algorithms...
Cellular Data Network measurement and analysis has long been used to characterize Cellular Data Network usage and user behaviors, but with the rapid growing of all kinds of smart terminals and the varied applications on them, the amount of Cellular Data Network data has been growing exponentially. With respect to this challenge, a new management system for the data storage and query has been emerging...
The logarithmic number system (LNS) has found appeal in digital arithmetic because it allows multiplication and division to be performed much faster and more accurately than with the widely used floating-point (FP) number formats. We review the sign/logarithmic number system and present a comparison of various techniques and architectures for performing arithmetic operations efficiently in LNS. As...
This paper describes a substation avalanche test system which is based on B code. The system supports simultaneous operation of multiple remote signaling and can ensure the synchronization and accuracy of time's movement. Using platform of ARM9 hardware and embedded operating systems, the system has lots of feature, such as high integration, small size and stable. The host computer can operate the...
Diagnosis of the thyroid function abnormalities may take much precious time of the patient. So, a computer aided diagnosis system can guide physicians in diagnosis and can save time of the patient. In this study, seven different types of neural networks were implemented in order to realize more robust and reliable networks on thyroid diagnosis. The particle swarm optimization and artificial bee colony...
For a multi script/lingual country like India Script identification is a complex real life problem for automation of document processing. Handwritten script identification is again much more complex compared to print one. Here scripts from multi script handwritten documents are identified and then performance is compared using different well known classifiers. We followed a two stage approach for...
This work addresses to problems in design and testing of the computer systems and their components, which are considered in content of natural development of the resources for solving these challenges. The resources are examined as target and natural. The target resources contain the models, methods and means. The natural resources are considered like their particularities. Development of the resources...
Saliency map is a central part of many visual attention systems, particularly during learning and control of bottom-up attention. In this research we developed a hardware tool to extract saliency map from a video sequence. Saliency map is obtained by aggregating primary features of each frame, such as intensity, color, and lines orientation, along with temporal difference. The system is designed to...
Error concealment is a useful method for improving the damaged video quality in the decoder side. In this paper, a dynamic method with low computational complexity is presented to improve the visual quality of videos when up to 50% of the frames are damaged. In the proposed method, temporal replacement and the improved outer boundary matching algorithm are used for dynamical error concealment in inter-frames...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.