The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents hardware constraints analysis of Gabor filtering operation for its hardware implementation in a real time Facial Expression Recognition System (FERS). Gabor filter is the most common feature extractor employed for the realization of such system. Feature extraction using Gabor filter is efficient and has better discrimination capability. In this work, we have employed software-based...
Electroencephalographic (EEG) patterns are electrical signals generated in association with neural activities. Most anomalies in brain functioning manifest with their signature characteristics in EEG pattern. Epileptic seizure, which is a brain abnormality well-studied through EEG analysis, is an abnormal harmonious neural activity in the brain characterized by the presence of spikes in EEG. An automated...
The location of a mobile user is used to deliver context sensitive information like advertisements and deals. Predicting the future possible locations of a mobile user can help target specific services. Nokia provided researchers with data collected from around 200 mobile users over a period of about 2 years for the purpose of research. Previous efforts have attempted either to predict the location...
This paper proposes an efficient multimodal face recognition method by combining the textural as well as depth features, extracted from directional faces of input image. Directional faces are obtained using filters which are designed using Local Polynomial Approximation (LPA). The efficient modified Local Binary Pattern (mLBP) operator is used for the feature extraction from optimized directional...
Author attribution has grown into an area that is more challenging from the past decade. It has become an inevitable task in many sectors like forensic analysis, law, journalism and many more as it helps to detect the author in every documentation. Here unigram/bigram features along with latent semantic features from word space were taken and the similarity of a particular document was tested using...
This paper addresses the problem of recognizing handwritten numerals for Gujarati Language. Three methods are presented for feature extraction. One belongs to the spatial domain and other two belongs to the transform domain. In first technique, a new method has been proposed for spatial domain which is based on Freeman chain code. This method obtains the global direction by considering n × n neighbourhood...
This paper presents a computational based system for detection and classification of lung nodules from chest CT scan images. In this study we consider the case of a primary lung cancer. Optimal thresholding and gray level characteristics are used for segmentation of lung nodules from the lung volume area. After detection of lung mass tissue, geometrical features are extracted. Simple image processing...
Latent Fingerprint Images have been extensively used by law enforcement agencies in investigating the crime spot and use the necessary information obtained as evidence to validate the criminal in Court. Although an important breakthrough in this direction has already been made in plain biometrics recognition, still identifying biometric such as Face in CCTV footage and Latent Fingerprint in uncontrolled,...
Human Computer Interaction would be much more smooth with the implementation of rapid recognition, the aim of which is to recognize the hand gesture before it is completed. In this paper, a rapid recognition for dynamic hand gestures using leap motion is proposed. The database contains the three-dimensional motion trajectory of the numbers and the alphabet (36 gestures in total) which captured by...
Brain-machine interfaces (BMI) allow to decode motor commands from paralyzed patients' brains and use those commands with a rehabilitative or assistive purpose. However, brain non-stationarities can affect BMI performance over time in multi-session interventions. The amount and type of data used for calibration may play an important role on the posterior decoding performance. This paper studies six...
Branch Retinal Vein Occlusion (BRVO) is one of the most common retinal diseases that could impair people's vision seriously if it is not timely diagnosed and treated. It would save a lot of time and money for both medical institutions and patients if BRVO could be well recognized automatically. In this paper, we propose to exploit Convolutional Neural Networks (CNN) for BRVO recognition. We propose...
System call analysis is a behavioral malware detection technique that is popular due to its promising detection results and ease of implementation. This study describes a system that uses system call analysis to detect malware that evade traditional defenses. The system monitors executing processes to identify compromised hosts in production environments. Experimental results compare the effectiveness...
In addition to the traditional video surveillance, various audio processing techniques can also be added to the existing CCTV cameras. They can be used as additional features to help in analyzing the scene better and autonomously detecting violence or any unwanted activity in the scene. For this purpose, a deep learning based scream sound detection approach is proposed in this paper. MFCC features...
As the number of cyber attacks have increased, detecting the intrusion in networks become a very tough job. For network intrusion detection system (NIDS), many data mining and machine learning techniques are used. However, for evaluation, most of the researchers used KDD Cup 99 data set, which has widely criticized for not showing current network situation. In this paper we used a new labelled network...
Occurrence of multiple seizures is a common phenomenon observed in patients with epilepsy: a neurological malfunction that affects approximately 50 million people in the world. Seizure prediction is widely acknowledged as an important problem in the neurological domain, as it holds promise to improve the quality of life for patients with epilepsy. A noticeable number of clinical studies showed evidence...
In digital retinal images, positive means of texture feature detection around the macula region with specified radius is still an open issue. Diabetic macular edema is a complication caused due to Diabetic Retinopathy (DR) and is the true cause of blindness and visual loss. In this paper, we have presented a computerized method for texture feature extraction around the specified radius taking macula...
Routability is one of the primary objectives in placement. There have been many researches on forecasting routing problems and improving routability in placement but no perfect solution is found. Most traditional routability-driven placers aim to improve global routing result, but true routability lies in detailed routing. Predicting detailed routing routability in placement is extremely difficult...
Malware analysis on the Android platform has been an important issue as the platform became prevalent. The paper proposes a malware detection approach based on static analysis and machine learning techniques. By conducting SVM training on two different feature sets, malicious-preferred features and normal-preferred features, we built a hybrid-model classifier to improve the detection accuracy. With...
This paper aims at building a portable robotic hand for physically disabled people to perform basic hand movements. Surface Electromyography(EMG) signal is collected from muscles of human forearm to extract the subject's intentions of action, where six kinds of gestures are selected for discussion. An Artificial Neural Network(ANN) is trained and utilized to distinguish the desired movement according...
There are many shape-similar gestures which cause errors in the process of hand gesture recognition. In this paper, a new method which can distinguish the similar gestures was proposed. The information of motion trajectory is captured by a leap motion in three-dimension space, and the orientation characteristics are quantified and coded as the feature. Then the Hidden Markov Model (HMM) algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.