The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, 60 GHz technology has become a promising alternative for indoor positioning systems because it can provide very accurate temporal and spatial information for precise time of arrival (TOA) estimation. However, non-line-of-sight (NLOS) propagation in indoor environments can significantly degrade the localization accuracy with 60 GHz signals. To reduce the effects of NLOS propagation, a fingerprinting...
In this paper we propose an improvement of a human action recognition method that uses a string-based representation and a string edit distance to compare the observed action with reference actions in the training set. In particular, the original improvement is based on a specific formulation of the string edit distance that is more suited to take into account the problems related to noise and to...
In this paper, we propose a skeleton and gesture-based user authentication system using depth cameras. When a user would like to register, our system will capture a user's skeleton and gesture information and store it into the database. When authenticating a user, our system will capture the user's skeleton and gesture information and compare it with the data stored in the database. Experimental results...
Electrocardiograms (ECG) emerged as a novel biometric identification system in the past decade which yields high level of uniqueness and permanence. Moreover ECG provides inherent characteristic of liveness of a person, so it can furnish a superior solution as compared to other biometric techniques. This research provides with the complete systematic approach for ECG based person identification in...
A multimodal biometric system consolidates multiple biometric sources and mitigates the limitations of the unimodal biometric system. The consolidation of information can be done at various levels of fusion. In this paper, a normalization technique for score-level fusion based on a new anchor, which is computed from the raw score set, has been proposed. This new anchor is independent of the statistatical...
Human Computer Interaction would be much more smooth with the implementation of rapid recognition, the aim of which is to recognize the hand gesture before it is completed. In this paper, a rapid recognition for dynamic hand gestures using leap motion is proposed. The database contains the three-dimensional motion trajectory of the numbers and the alphabet (36 gestures in total) which captured by...
Properly addressing the performance issues presented in database systems is and has been a significant technological challenge, this due to the uncontrolled fluctuation of user requests. Being able to predict the behaviour of such systems can greatly improve their performance. Several prediction methods, such as linear regression and autoregressive moving average, among others, have extensively been...
We propose to address the handwritten digits recognition (HWDR) problem by using a two-dimensional (2-D) discrete cosine transform (DCT) based sparse principal component analysis (PCA) algorithm for fast classification. The gain of processing speed is achieved by utilizing the ability of 2-D DCT for energy compaction and signal decorrelation. The proposed algorithm was applied to the mixed national...
Along with the development of technology at this era, the need of Internet access service as a media of communication is increasing. This increasing led to anomalies in network traffic. These anomalies, can occur because of a Distributed Denial of Service (DDoS) that deliberately. The impact of an anomaly is to make the user cannot access the internet service. If left alone, these anomalies can be...
In this paper, we propose an algorithm for automatic detection of seals in aerial remote sensing images using features extracted from a pre-trained deep convolutional neural network (CNN). The method consists of three stages: (i) Detection of potential objects, (ii) feature extraction and (iii) classification of potential objects. The first stage is application dependent, with the aim of detecting...
Electrocardiogram (ECG) is a key diagnostic tool to visualize the heart's activity and to study its normal or abnormal functioning. Physicians perform routine diagnosis by visually examining the shapes of ECG waveform. However, automatic processing and classification of ECG data would be extremely useful in patient monitoring and telemedicine systems. Such realtime applications require techniques...
Information fusion is a key research area widely applied to various multimedia analysis tasks such as artificial intelligence, humancomputer interaction, robotics, distributed computing, financial systems and security/surveillance. Feature level fusion has been considered as the most promising fusion method due to the rich information presented at this level. A critical operation of feature level...
The evaluation of cleft palate (CP) speech is a critical clinical treatment. The most typical characteristics of CP speech include hypernasality and consonant misarticulation. Currently, the evaluation of CP speech is carried out by experienced speech therapists. It strongly depends on their clinical experience and subjective judgment. This work aims to propose an automatic evaluation system of resonance...
The rise of internet web-based application and smart phone ease access to the stock market, attracting newcomer investors. Most investors have made their decision based on information from stock investment researches published by the brokers. An automated stock recommendation system from stock investment research is introduced in this paper. The system collects several investment researches from multiple...
Heating, ventilation, and air conditioning (HVAC) control is used to effectively reduce energy consumption in a home energy management system (HEMS). For the HVAC control, it is necessary to evaluate the indoor comfort level because the HVAC operation is significantly related to indoor environmental conditions. Although there are some indices for indoor comfort, individuals have different comfort...
This work presents a novel hybrid approach for feature selection using a combination of ranking and wrapper methods. Its main goal is to select features quickly, without significant loss of classification performance. Experiments comparing this approach with Sequential Forward Feature (SFS) selection showed its viability using Support Vector Machine and K-Nearest Neighbor classifiers in specific scenarios...
Handwritten signature recognition is one important component of biometric authentication. This is a central process in a broad range of areas requiring personal identification, such as security, legal contracts and bank transactions. Extensive efforts have been put into the research towards the verification of handwritten signatures, which contain biometric information. Although many successful methods...
Since the fault prediction is an important technique to help allocating software maintenance effort, much research on fault prediction has been proposed so far. The goal of these studies is applying their prediction technique to actual software development. In this paper, we implemented a prototype fault-prone module prediction tool using a text-filtering based technique named "Fault-Prone Filtering"...
Similarity learning ranges over an extensive field in machine learning and pattern recognition. This paper deals with similarity learning based on multiple support vector data description (SVDD). It is well known that SVDD was proposed for one-class or two-class unbalanced learning problems. Thus, we propose a multiple SVDD (MSVDD) algorithm and apply it to multi-class learning problems. A SVDD model...
Identifying people through automated analysis of biometric data is in a continuous evolution. Some biometric features may change over time or depend on the context in which biometric measurements were made. Biometric data are taken over time and are stored on different data servers. Identifying of a person should take all the biometric data acquired over time and to interpret them as a unique system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.