The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the ever-advancing technology, usage of information technology in modern life is increasing at a fast pace. Hence, ICT based systems have enormous potential providing accessibility and affordability to the urban inhabitants in developing countries. In this paper, a framework for a dynamic vehicle pooling system for Dhaka city is proposed. Comparing to existing systems, some new concepts have...
The recognition system when concerned with high-security, authentication of authorized person and invalidation of an imposter is a vital task for the system. The system based on iris feature is considered as highly secure and most reliable system due to the intrinsic property of an iris. This paper presents an efficient iris recognition approach based on the fusion of modular neural network output...
In today's present image processing world, Object Recognition is most important feature for images. In such signal and image processing sections Scale Invariant Feature Transform (SIFT) plays an important role as robust local invariant feature descriptor for object recognition. To further improve the recognition and subsequently the retrieval, Sparse coding using SIFT features are performed using...
Mining subgraph patterns is an active area of research. Existing research has primarily focused on mining all subgraph patterns in the database. However, due to the exponential subgraph search space, the number of patterns mined, typically, is too large for any human mediated analysis. Consequently, deriving insights from the mined patterns is hard for domain scientists. In addition, subgraph pattern...
Domain adaptation has achieved promising results in many areas, such as image classification and object recognition. Although a lot of algorithms have been proposed to solve the task with different domain distributions, it remains a challenge for multi-source unsupervised domain adaptation. In addition, most of the existing algorithms learn a classifier on the source domain and predict the labels...
Tourist identification with a lower effort can be highly demandable for the tourism department and related organizations of a country. Nowadays, most of the people including tourists use cell phones to keep communication resulting in corresponding data for every transaction (call, SMS, MMS, mobile data) named call detail record. This kind of data is usually collected and stored by telecom operators...
The analysis of the temporal evolution of dynamic networks is a key challenge for understanding complex processes hidden in graph structured data. Graph evolution rules capture such processes on the level of small subgraphs by describing frequently occurring structural changes within a network. Existing rule discovery methods make restrictive assumptions on the change processes present in networks...
Geolocation databases are widely used for mapping Internet devices' IP address to the physical location. However, there are inconsistencies between them. It is difficult to avoid because the methodology used by database provider to gather their geographic information is different. Moreover it is impossible to update database in real time. Yet by analyzing inconsistencies between geolocation databases,...
The document image segmentation is an indispensable task in the document layout analysis system. This paper presents an accurate segmentation approach based on fuzzy classification for the administrative document image. The texture-based analysis works for this kind of document image are rare. And the research works on specific tasks are limited. Moreover, the texture-based segmentation methods are...
The automatic detection of electrocardiogram waves presents an important step for cardiac disease diagnosis. In this work, we developed an algorithm for locating the waveform boundaries by using the empirical mode decomposition which has interesting properties concerning the pseudo periodic signals. The introduced method allows identifying an appropriate and optimum set of intrinsic mode functions...
In this paper, we introduce a new color texture operator for natural texture classification, the Dominant and Minor Sum and Difference Histograms (DM-SDH) descriptor. The proposed approach allows to incorporate both color and texture information in order to enhance the texture discrimination performance. For this purpose, a vectorial representation of the image is used for the descriptor extraction...
The architecture oriented smart tourism innovative service system, using Structure-Behavior Coalescence (SBC) architecure description language to design innovative service system, the design platform of smart tourism innovative service system can be described effectively. Through the SOLOMO model and SBC architecture description language make the combination of social and travel specs patterns to...
The image on a digital book cover gives potential buyers not only an impression of the book's contents but also serves as an aid when searching and browsing before and after buying the book. We have developed a method for revising book cover images to reflect readers' impressions. It uses a database of the correspondence between adjectives and colors as extracted from book reviews. This correspondence...
Nowadays there is a widespread diffusion of mobile applications for weight and diet management. Even though, the most popular apps are not usually experimented in clinical contexts, as well as apps are not supported by medical evidence. Further research is necessary to assess the effectiveness of apps for weight and diet management. Moreover, there are few examples of food recommender systems that...
To enhance the computer science curriculum, a mobile device application (smart phone app), Kizzle, was developed and is currently tested in an introductory course in computer science. The motivation for the app comes from recent literature that indicates that women and students of color are less likely to participate in class, either to ask or answer questions [1][2]. As a result of this “shyness”...
The Multiple Institution Database for Investigating Engineering Longitudinal Development (MIDFIELD) is expanding to include 113 institutions and is being redesigned and archived to be more accessible to researchers. This special session will describe how researchers can better use or gain access to MIDFIELD. At the conclusion of the session participants should be able to: describe MIDFIELD including...
Kinect v2 provides depth images with reduced noises and holes, which simplifies the pre-processing of eliminating noises and filling holes. This also allows us to detect the moving object with the depth information of Kinect v2 without resorting to RGB image. Based on this a fast moving object detection method for Kinect v2 is presented in this paper. Our method performs very quickly while extracting...
We consider networks where a set of end users, equipped with cache memories, are connected to a single server via a set of relay nodes. We further consider a special class of such networks that satisfy the so called resolvability property and study centralized coded caching scenarios under three security requirements. Under the first scenario, i.e., secure delivery, the wiretapper should not gain...
SMS service is a basic feature that has been built into the cell phone, since a function of exchanging messages are practical and easily understood by all mobile phone users, when SMS is used for negative purposes then it can be used as evidence of the law. This applications was designed to help search a text messages as evidence in a crime that use SMS as a medium of communication, This Application...
In today's world SNS i.e. social networking sites have become an integral part of our day to day life. SNS is the place where a person is free to express his views and opinions about others, share information with others. Millions of visitors daily share their views and opinions on websites like twitter, MySpace and Facebook which produces enormous data. It has become important to analyze this data...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.