The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Breast cancer is one of the leading causes for high mortality rates among young women, in the developing countries. In Latin American this is an important health problem, for instance in Brazil and Ecuador this is the leading cause of cancer among women around 35 years old. Currently mammography is used as the gold standard for screening breast cancer. However, for young women mammograms are not recommended...
This paper introduces an enhanced equivalent model of the half-bridge symmetrical monopole Modular Multilevel Converter (MMC) topology for the analyses of the electromagnetic transients. As compared with the existing MMC models, the proposed model reduces the simulation computational time without compromising accuracy, and contrary to the existing models, it provides accurate representation of the...
Welcome to this special panel aiming to reexamine the history of modern computing during early 20th century. During our discussion we will recognize some of the earliest efforts in transforming the world through electronic digital computing.
Coverage-based fault localization techniques leverage coverage information to identify the suspicious program entities for inspection. However, coincidental correctness (CC) widely occurs during software debugging, and brings negative impact to the effectiveness of CBFL techniques. In this paper, we propose a regression approach to identity CC execution with weighted clustering analysis. Based on...
This paper proposes a novel method for discriminating the supraventricular tachycardias and the ventricular tachycardias via a high dimensional linear discriminant function and a perceptron with a multi-piece domain activation function having multi-level functional values. The algorithm is implemented via the mobile application. First, the discrete cosine transform is applied to each training electrocardiogram...
The bag of visual words is a well established representation in diverse computer vision problems. Taking inspiration from the fields of text mining and retrieval, this representation has proved to be very effective in a large number of domains. In most cases, a standard term-frequency weighting scheme is considered for representing images and videos in computer vision. This is somewhat surprising,...
This paper discusses the design and implementation of a light-weight thermal camera payload for small fixed-wing UAVs with a pan/tilt mechanism and georeferencing based on a simple autopilot's GPS and IMU. Further, an effective and simple method to accurately calibrate a thermal camera is developed and tested. In order to evaluate the accuracy of the georeferencing algorithm, a test flight was conducted...
Imaging methods are an essential tool for improving processing of solar cells. Unfortunately, it is difficult to validate the imaging methods in detail. One focus of our work was to establish an approach by which one can assess the accuracy of the determination of the influence of defects via imaging on CIGS solar cells. The method is, however, not restricted to CIGS and should be easily transferable...
Recognition of handwritten numerals has gained much interest in recent years due to its various application potentials. Although Bangla is a major language in Indian subcontinent and is the first language of Bangladesh study regarding Bangla handwritten numeral recognition (BHNR) is very few with respect to other major languages such Roman. The existing BHNR methods uses distinct feature extraction...
In this paper, microcontroller based automatic door open system has been developed. The system is developed as speech recognition circuit where programmable voice is used as reference. Programmable means trained voice has been used for identification of authorized and unauthorized person. As software part, MATLAB GUI interface has been used to record authorized voice, and to synthesize the recorded...
This paper presents an overview of methods for combinational, base-two logarithmic approximation using Mitchell's algorithm, piecewise-linear/quadratic error compensation schemes, and direct approximation. Optimization methods are used for computing linear segments for each compensation scheme including Hamming weight minimization and pattern recognition of segment slopes for multiplier-less error...
There is a large interest on performing elderly care monitoring using Computer Vision. It has the potential to provide a better scene understanding than current sensing approaches at an affordable price, but there are still considerable practical challenges that have limited its deployment. The BAM descriptor is a privacy-conscious, calibration-free representation of a singleperson bed obtained from...
In remote display protocols, screen image compression plays an important role to improve quality of experience (QoE) of users and reduce the bandwidth consumption. Not all image elements on the display have the same type, so it is wise to apply a screen image classification for compression decision. In this paper, we propose a novel efficient approach for screen image classification that separate...
Radix conversion for conventional number systems can be computed using one of the four algorithms reviewed and discussed in [1], depending on whether the source or the destination radix arithmetic is used and whether an integer or a fraction is to be converted. Out of the four radix conversion algorithms, expensive division operations are required in two of them. In this short paper, two new radix...
Developed a method for computer analysis of the microparticles motion parameters along trajectories, based on the proposed A. A. Vavilov principle consistent disclosure of structural, parametrical and signal uncertainty. Signal uncertainty is caused by instrumental and methodological errors in the localization of microparticles position in the trajectories resulting from image processing. The difference...
The main aim of this paper is an improvement of the famous Scale Invariant Feature Transform (SIFT) algorithm used in place categorization. Masking approach to reduce the computational complexity of SIFT have been proposed. Tradeoff between key points and processing time on feature extraction has been used. Selected parameters used in the experiment demonstrated that the computational cost of SIFT...
Odometer is an instrument that functions to measure the vehicle mileage and is usually used for periodic inspection of vehicle lubricant replacement. For companies that have a large number of vehicles (for example banks, travel agencies, etc.), vehicle lubricant replacement is an important thing to do, because if it is not maintained well it may cause fatal damage to the vehicle and can even endanger...
A classifier fusion interactive software package has been constructed for implementing the classification task in the electromyographic (EMG) signal decomposition process using the MATLAB high-level programming language and its interactive environment. The package employs classifier fusion schemes of multiple classifier combination for the purpose of fusing the decisions of a set of heterogeneous...
This paper is concerned with the problem of validation in the context of numerical computations in control. We explore the possibility of using computer algebra tools and interval methods to compute solutions which have guarantees on accuracy, e.g. which are not subject to unknown errors due to rounding or approximation. We demonstrate that this is possible for two common norms of a linear system...
Trust-aware recommender systems are intelligent technology applications that make use of trust information and user personal data in social networks to provide personalized recommendations. Trust clearly elevates accuracy of prediction rating for users; especially, when the user's preferences are insufficient, trustworthy friend or people viewpoints can be confidence referenced. However in previous...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.