The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sleep deprivation distracted most people. The common ways to monitor people sleeping are electroencephalogram and polysomnography. Recently, wearable devices provide function to estimate sleep status. However, in some situations people feel uncomfortable to wear devices, such as elder with dementia. This paper presents a scheme to estimate sleep status based on wearable free device. We utilized SVM...
The widespread use of handwritten signatures for idnetity authentication has resulted in a need for automated verification systems that make use of modern electronic devices (e.g., scanners, cameras, and digitizing tablets). However, there is still significant room for improvement in the performance of these automated systems when compared with that of human analysis, particularly that of forensic...
A decision-level fusion (DLF)-based team tactics estimation method in soccer videos is newly presented. In our method, tactics estimation based on audio-visual and formation features is newly adopted since the tactics of the soccer game are closely related to the audio-visual sequences and player positions. Therefore, by using these features, we classify the tactics via Support Vector Machine (SVM)...
While addressing real-world issues, there is a significant quantity of domain knowledge available in prior which helps in yielding different perspectives on various characteristics related to the issue. At the same time, several types of machine learning methods do not depend on such prior explicitly expressed domain information. However, such methods require especially in case of operating learning...
Nowadays Opinion mining is given more important, since it provides decision makers to estimate the success of a newly proposed techniques, novel ad campaign or novel product launch. In general, supervised methods such as Support Vector Machine (SVM) and Artificial Neural Network (ANN) are used to classify the opinions. In some cases SVM performs better classification and some cases ANN performs better...
Gait has been used in many research area including medical and health. One of the ways to capture gait signal is by using the accelerometer sensor in the smartphone. In this work, gait signal is used to identify a person. The accuracy of the gait recognition while the phone held in the palm is evaluated. Besides that, the factor of linear interpolation is examined. Lastly, k-NN, MLP and SVM algorithm...
Identification of functional characteristics of the virus-antibody interplay in individuals can provide insight to the development of effective vaccines against HIV virus. In order to reveal the functional interactions between human immune system and HIV virus, computational methods such as clustering, classification, feature selection and regression methods can be utilised to construct predictive...
Solar activity has various influences on the global environment. Specifically, it may have serious impacts on the Earth such as satellite damage, etc. and power plant failures causing more serious disaster. For a precise forecast of larger scale solar flares causing serious disaster, it is important to improve the space weather forecast, a daily forecast of the solar flare. In our work so far, a machine-learning...
SQL injection is one of vulnerabilities of web application and there is a risk of an unauthorized access if web application has this vulnerability. A lot of heuristic prevention and detection methods of SQL injection attacks have been developed, however, theoretical performance analysis is difficult about them. In this paper, an approximate maximum likelihood estimation of parameter of a stochastic...
In this paper, we propose an indoor action detection system which can automatically keep the log of users' activities of daily life since each activity generally consists of a number of actions. The hardware setting here adopts top-view depth cameras which makes our system less privacy sensitive and less annoying to the users, too. We regard the series of images of an action as a set of key-poses...
Indirect immunofluorescence (IIF) imaging is an important technique for detecting antinuclear antibodies in HEp-2 cells and therefore employed in the diagnosis of autoimmune diseases and other important pathological conditions involving the immune system. Here, HEp-2 cells are categorised into different groups, which allow to make implications about different autoimmune diseases. Traditionally, this...
This paper describes a variant of the Incremental Ant Colony Optimization algorithm for continuous optimization (IACOℝ). The original IACOℝ approach estimates the Probability Density Function (PDF) using Gaussians constructed around candidate solutions to generate new solutions. We use Support Vector Regression (SVR) to fit a regressor to the candidate solutions. The minima of the fitted regressor...
The work addresses classification of EEG signals into seizure and non-seizure by applying EMD and SVM with proposal of new feature Root Mean Square (RMS) frequency and feature using Hilbert marginal spectrum which overcomes the drawback of feature instantaneous bandwidth. We have success in achieving the consistency with the new features which shows classification average accuracy of 97.72% and highest...
This paper presents a new method to recognize the person's identity through their palmprints. Palmprint recognition is among the most reliable physiological characteristics that can be used especially in forensic applications thanks to its simplicity and its ease of use, its user friendliness and high identification reliability. Accordingly, it has gained great popularity within the pattern recognition...
The advantage of using collaborative brain-computer interfaces in improving human response in visual target recognition tests was investigated. We used a public EEG dataset created from recordings made using a 32-channel EEG system by Delorme et al. (2004) to compare the classification accuracy using one, two, and three EEG signal sets from different subjects. Fourteen participants performed a go/no-go...
Existing researches on user mouse authentication mostly focus on fixed tracks, which leads to the lack of practicability. This paper is not restricted to fixed tracks and models the non-fixed mouse behavior pattern. By simulating scenarios of dynamic soft keyboard, mouse behavior data in relatively free tracks is collected. New mouse characteristics are proposed based on the behavioral trait. Mouse...
Understanding video-based activities have remained the challenge regardless of efforts from the image processing and artificial intelligence community. However, the rapid developing of computer vision in 3D area has brought an opportunity for the human pose estimation and so far for the activity recognition. In this research, the authors suggest an impressive approach for understanding daily life...
The Medical Subject Headings (MeSH) term search is typical data-gathering method in biomedical text mining. However, it has two problems: the allocation delay of the MeSH term and missing valuable literature sources. Since MeSH term allocation is performed by a human being, the allocation process has delay. In addition, even if a literature source was allocated with a MeSH term, there is a still the...
Data streams are rapidly and constantly growing. Analysis of rapidly changing data streams is quite difficult since the amount of data increases in timely manner. Individual patient records provide a vital resource for health research for the benefit of society, such as understanding the association between human immune system and viruses. As the patient records have been constantly growing, data...
Classification involves the learning of the mapping function that associates input samples to corresponding target label. There are two major categories of classification problems: Single-label classification and Multi-label classification. Traditional binary and multi-class classifications are sub-categories of single-label classification. Several classifiers are developed for binary, multi-class...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.