The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
People usually get involved in multiple social networks to enjoy new services or to fulfill their needs. Many new social networks try to attract users of other existing networks to increase the number of their users. Once a user (called source user) of a social network (called source network) joins a new social network (called target network), a new inter-network link (called anchor link) is formed...
The day mankind met with smartphones, a new era started. Since then, daily mobile internet usage rates are increasing everyday and people have developed new habits like frequently sharing information (photo, video, location, etc.) on online social networks. Location Based Social Networks (LBSNs) are the platforms that empowers users to share place/location information with friends. As all other social...
Movement Related Cortical Potentials (MRCP) have been the subject of numerous studies. They accompany many self-initiated movements and this makes them a good candidate for incorporation in BCI paradigms. In this work we propose a novel experimental protocol involving natural controlling of a computer mouse and based on EEG recordings from 5 subjects, show that it elicits MRCP. We also show the feasibility...
Melanoma, most threatening type of skin cancer, is on the rise. In this paper an implementation of a deep-learning system on a computer server, equipped with graphic processing unit (GPU), is proposed for detection of melanoma lesions. Clinical (non-dermoscopic) images are used in the proposed system, which could assist a dermatologist in early diagnosis of this type of skin cancer. In the proposed...
Detectors and descriptors refer to the key points of the images where informative features can be detected or extracted to use in machine learning for classification or clustering problems. Four algorithms as two descriptor (SURF, MRES) and two detectors (Harris, Shi Tomasi) are utilized for semen cell detection problem in this paper. Results emphasize the best algorithm for future studies to use...
Hand Gesture Recognition System (HGRS) for detection of American Sign Language (ASL) alphabets has become essential tool for specific end users (i.e. hearing and speech impaired) to interact with general users via computer system. ASL has been proved to be a powerful and conventional augmentative communication tool especially for specific users. ASL consists of 26 primary letters, of which 5 are vowels...
Unmanned aerial vehicles (UAV), also referred to as drones, are a growing field in computer science with applications in military systems, delivery services, emergency relief and evacuation. One of the primary obstructions to the allowance of UAV journeys over populated areas is the lack of sophisticated automated systems that detect drone landing sites. In this paper, we propose a landing area detection...
We present an efficient approach to lane and pedestrian detection by processing sequential images from a camera attached to a moving vehicle. The left and right lines of the current lane are detected by finding high intensity pixels along multiple horizontal scan lines and connecting the detected pixel points. Line positions are predicted by tracking in order to increase detection credibility while...
Android has dominated the market of mobile devices. Meanwhile, it has become the main target for attackers. How to detect and analyze Android malicious applications (malapps) is an ongoing challenge. Current malapps have become increasingly sophisticated. In particular, zero-day (unknown) malapps appear very frequently and can evade most detection systems that are based on the signatures or patterns...
This paper presents the novel multimedia human-computer interaction system based on Kinect and depth image understanding. For human-machine interface of the user intent is one of the research directions. Industrialized society goal is the satisfaction of the material quantity and quality, which is the measure of people's living standards. It is the purpose of the man-machine interface design and let...
Automatic recognition of emotion through facial expressions remains an active area of study. This study concerns the detection of shyness in smiles. As far as our knowledge is concerned, detecting the emotion of shyness through smile thus far has not been studied. Experiment was conducted where test subjects underwent an experiment with a stimuli designed to elicit shyness in their smiles. The expected...
This paper compares the probability similarities between a cyberattack, the distributed denial-of-service, and the mathematical model of probability, Lévy walks. This comparison aims to explore the validity of Lévy walks as a model resembling the DDoS probability features. This research also presents a method, based on the Smirnov transform, for generating synthetic data with the statistical properties...
Recognizing computer users' handedness provides important clues for profiling computer criminals in digital forensic analysis. Existing technologies for handedness recognition have two main problems that limit their applicability in the scenario of digital crimes: they can be intrusive, and they require costly equipment. Our solution is to infer users' handedness by analyzing keystroke-typing behavior...
A development of Human-Computer Interface (HCI) technology is proposed to estimate and investigate user's fatigue problem with non-invasive optical technique using web-camera sensor. Two kind of parameters are used such as heart rate (HR) as the physiological sign by processing the change of the skin color from face area and separating the signal color that normalized and analyzed using Independent...
Phishing is a considerable problem differs from the other security threats such as intrusions and Malware which are based on the technical security holes of the network systems. The weakness point of any network system is its Users. Phishing attacks are targeting these users depending on the trikes of social engineering. Despite there are several ways to carry out these attacks, unfortunately the...
Due to increase embedded computer technology, it has been increasingly used in many research field including area of Wireless Sensor Network (WSN). The principle of embedded technology is flexible but low operational cost. Nowadays, embedded system technology is chosen because it offers brilliant solutions from many possibilities combined with its nature of economic and feasibility of advanced. This...
In this paper, a complete voiceprint recognition based on Matlab was realized, including speech processing and feature extraction at early stage, and model training and recognition at later stage. For speech processing and feature extraction at early stage, Mel Frequency Cepstrum Coefficient (MFCC) was taken as feature parameter. For speaker model method, DTW model was adopted to reflect the voiceprint...
For the forest, the fire is an extremely serious damage. In the forest fire point positioning research, it was found that the monocular vision system combination of digital elevation model(DEM) is a better way to locate fire position. However, this method has insufficient. This paper presents an improved monocular forest fire point positioning method on the grayscale bit plane. This way can make up...
The lasting popularity of many social Q&A websites, such as Yahoo! Answers and ResearchGate, has become valuable knowledge repositories for people to search for answers to questions in various aspects in life. Finding the most relevant questions is often a non-trivial task, and a fine-grained classification system of questions will be an important aid. Existing work mainly focused on classifying...
In this paper, we present a fast approach for fall recognition. This approach according to human-body skeleton information which was obtained from Kinect sensor. First, following the falls defined by FICSIT, head and center joints, and their relative distance are considered as feature to describe the behavior. Second, applying the slide-window method and threshold for behavior action stage, motion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.