The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Historically, journalists have manually selected news. This process has been changing dramatically with the development of personalized news aggregators (PNAs), which rely on social recommender systems (SRSs) technology. PNAs provide content geared to the personal preferences of news consumers, and thus offer new business opportunities for news providers. However, little research exists on users'...
We present a simple and effective means for position estimation designed to be deployed in urban and dense multipath environments characteristic of 4G wireless networks. To address the multipath channel of such environments a fingerprinting scheme is proposed. One of the drawbacks to this class of methods is the large initial cost associated with establishing a database matrix. This issue is addressed...
This paper presents a multispectral palmprint recognition approach based on palm line orientation feature extracted with high order steerable filter. Gaussian function is used as isotropic window to design a high order steerable filter. The orientation features are selected as per dominant filter response for a particular orientation. Optimum values for parameters, i.e., standard deviation and number...
Many plants are facing the risk of extinction due to unplanned urbanization and over growth of population. Digital databases of plants should be maintained for proper tracking of local flora and making data-driven policies/decisions for their preservation. Plant identification is important for medical as well as educational purposes but maintaining an exhaustive digital database is a challenging task...
Unsupervised speaker adaptation of Deep Neural Network (DNN) is investigated for lecture transcription tasks, in which a single speaker gives a long speech and thus speaker adaptation is important. The proposed method selects similar speakers to the test data (test speaker) from the training database, which are used for retraining the baseline DNN. Several speaker characteristic features are defined...
The researchers of biométrie community have built a variety of benchmarks to evaluate face recognition methods. It is vital for researchers to leverage these methods and conduct sound experimental validation along to the comparison with state-of-the-art methods. In past few decades, the Eigenfaces and Fisherfaces face recognition methods are evaluated using the Euclidean distance metric that have...
The analysis of various components of the Electroglottograph (EGG) signal, obtained after Ensemble Empirical Mode Decomposition (EEMD) is the primary objective of this paper. The ability of EEMD to detect intermittent high frequency data embedded in the data of lower frequency is exploited to segregate the Epoch locations and the Periodic nature of EGG signal. The dyadic filterbank property of EEMD...
Nowadays, many people suffer from heart problems and hence the demand of inexpensive and efficient electrocardiogram (ECG) for frequent heart monitoring is becoming crucial. To make the ECG device portable, cost-effective and light-weight, an alternative of deploying an ECG system is on Field Programmable Gate Array (FPGA). It is also important to choose suitable algorithm that optimize in terms of...
Preserving the privacy of biometric data becomes a critical work. To increase the privacy of the biometric data, novel method is proposed. In this proposed method, two different biometric data such as features from fingerprint and face are combined. In the face, the features like eyes, lips and brow are extracted. In the fingerprint, orientation feature is extracted. The database contains the training...
Human palm print is a wide spreading biometric characteristic that has been used to detect an individual identity. In this paper, hybrid Discrete Wavelet Transform - Discrete Cosine (DWT-DCT) Transform technique is proposed for the feature extraction in palm-print image. A palm-print image is first segmented into thirty two bands in spatial-domain and then a frequency-domain transformation is applied...
The paper presents two advanced methods for comparative study in the field of computer vision. The first method involves the implementation of the Scalar Invariant Fourier Transform (SIFT) algorithm for the leaf recognition based on the key descriptors value. The second method involves the contour-based corner detection and classification which is done with the help of Mean Projection algorithm. The...
In this paper, a simple biometric scheme based on RGB retinal fundus images is proposed. First, prominent vasculature energy based feature vectors are constructed from RGB retinal fundus images to utilize the unique pattern of retinal vasculature. Next, fast normalized cross-correlation based feature matching is employed for person identification on publicly available DRIVE and STARE databases. This...
Face recognition in extreme situations is still challenging to researchers. While several algorithms have shown great recognition results in ideal conditions, accuracy decreases when recognition tasks present a high illumination variation. In this paper, we propose to add two components to the recognition system to make the surf descriptor efficient in such extreme situations. First, we learn a discriminant...
This paper presents a multi-label automatic GrabCut technique for the problem of image segmentation. GrabCut is considered as one of the binary-label segmentation techniques because it is based on the famous s/t graph cut minimization technique for image segmentation. This paper extends the automatic binary-label GrabCut to a multi-label technique that can segment a given image into its natural segments...
In the recent years, contour-based shape representation is an important issue in the object recognition research area. In this paper, a new shape descriptor A-DCE is proposed based on DCE and DP for contour deformation and recognition. Firstly, the object contour is evolved adaptively by DCE to extract the contour information with important visual parts. Secondly, the costing feature descriptor is...
Electrocardiogram (ECG) as a new biometric trait has the advantage of being a liveliness indicator and difficult to be spoofed or falsified. According to the utilized features, the existing ECG based biometric systems can be classified to fiducial and non-fiducial systems. The computation of fiducial features requires the accurate detection of 11 fiducial points which is a very challenging task. On...
Digital graphics tools are nowadays capable of rendering highly photorealistic imagery, which easily puzzle our perception of reality. This poses serious ethical and legal issues, which in turn create the need for further technologies able to ensure the trustworthiness of digital media as a true representation of reality, especially when depicting humans. In this work, we propose a novel forensic...
Intrinsically disorder regions (IDRs) or, proteins (IDPs) are associated with important biological functions, while lacking stable structure in their native state. The phenomena of disordered proteins or residues are abundant in nature and are extensively involved in critical human diseases and hence impacting drug discovery. Thus, the study using disorder prediction is becoming crucial in the proteomic...
In this paper, we address offline signature verification by proposing a new Partial Invariant Chord Oriented Gap (PICOG) feature. The new heuristically developed feature is conceptualized after observing the directional variation of the gaps (sequence of white pixels) between signature strokes. A set of unique and partial invariant chords is identified using genuine and forgery training signatures...
In this paper, a single hidden-layer feedforward fusion network is proposed for face identity verification. Essentially, the feature extraction, matching score calculation and fusion algorithm design steps are integrated and absorbed into a hidden layer of the model. Each hidden node works on the raw face image directly and produces an Euclidean distance based match score within the network. These...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.