The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Protein-protein interactions (PPI) occur at every level of cell functions. The identification of protein interactions provides a global picture of cellular functions and biological processes. It is also an essential step in the construction of PPI networks for human and other organisms. PPI prediction has been considered a promising alternative to the traditional drug design techniques. The identification...
Speaker verification based on phonetic-acoustic approach and text-dependent framework has been applied for forensic purposes in Indonesian court since 2008. In order to accelerate the speaker verification process, an automatic text-independent system is developed. This automatic system employs MFCC features and GMM speaker modeling, a standard and simple approach used in automatic speaker recognition...
The present work proposes to recognize the static hand gestures taken under invariations features as scale, rotation, translation, illumination, noise and background. We use the alphabet of sign language of Peru (LSP). For this purpose, digital image processing techniques are used to eliminate or reduce noise, to improve the contrast under a variant illumination, to separate the hand from the background...
Palmprint recognition has received in the last 20 years a great deal of the research community's attention. In this paper a new palmprint matching approach based on corner feature point extraction is proposed. A 72-element fixed-length descriptor is used to capture distinctive information of each feature point neighborhood and to build a measure of similarity whilst their coordinates provide a measure...
Grey Level Co-Occurrence matrix is one of the oldest techniques used for texture analysis. The Grey Level Co-Occurrence matrix has two important parameters i.e. distance and direction. In this paper various combinations of distance and directional angles used for GLCM calculation are analyzed in order to recognize certain patterned images based on their textural features. Patterns considered in this...
Agricultural textures are in the interest of classification in image processing. Natural images have unique textural shapes inside which cause a tough problem for classification. This paper tests different feature extraction and classification approaches to serve a benchmarking on several agricultural databases like seeds and leaves. Features are obtained using Local Binary Pattern (LBP), Gray Level...
In this paper, we propose a palmprint recognition scheme using histograms of sparse codes (HSC) as a new feature for palmprint image. In the feature extraction stage, the HSC feature is obtained by computing sparse codes for a given dictionary from a palmprint image, which results in a feature image. In the feature encoding stage, a hash table is designed from the feature image using the binary hashing...
With its ability to detect, identify and, if applicable, recover from occurred faults, online-diagnosis can help achieving fault-tolerant systems. A sound decision on an occurred fault is the foundation for fault-specific recovery actions. For this, typically a large amount of data has to be analyzed and evaluated. A diagnostic process implemented on a distributed system needs to communicate all those...
A new approach based on applying the Two Dimensional Discrete Multiwavelet Transform (2D DMWT) to the partitioned faces is proposed in this paper for face recognition. First, the input facial image is divided into six parts in the preprocessing step to reduce the effect of the unnecessary information (background) on the system performance. Then, the 2D DMWT is applied to each part for feature extraction...
The analysis of the Variability of the Heart Rate (HRV) is coming as an important indicator for different clinical applications like the prediction of arrhythmias, sudden cardiac death, assessing cardiovascular and metabolic illness progression or in sports physiology. In this paper we have developed an algorithm to detect a supraventricular arrhythmia, by processing the heart rate variability (HRV)...
In this paper, we are proposing Bag of Feature (BoF) approach for vehicle classification using Speeded Up Robust Features (SURF). First, monocular video taken using a stationary camera is given as the input to Gaussian Mixture Model (GMM) based foreground detector. Then a grid is used to measure the number of foreground pixels. If the pixels inside the grid is greater than a pre-assigned threshold,...
Neuroscience researchers have a keen interest in finding the connection between various brain regions of an organism. Researchers all across the globe are finding new connections everyday and it is very difficult to keep track of all those, so it is important to create a centralized system which is able to give the relation between brain entities. Databases like PubMed contains abstracts and references...
Currently, the American Sign Language (ASL), expressed through the use of body gestures (hand, face, torso) and perceived through the eyes, is the standard language of communication used by the Deaf community. Our main objective is to implement an automated translation system that is capable of translating ASL to English text using common computing environments such as a computer and a generic webcam...
In this work the use of palmprints as an alternative biometric for smartphones is investigated and its feasibility is evaluated across multiple devices using unconstrained acquisition. A novel multi-device database that covers a wide range of camera systems with data obtained in various conditions was built. This database contains palmprint images from 81 users acquired with 5 smartphones and is publicly...
Security concerns increase as the technology for falsification advances and biometrics provides airtight security by identifying an individual based on the physiological and/or behavioral characteristics. Physiological hidden biometrics represented by ECG biomedical signal is highly confidential, sensitive, and hard to steal and replicate, and also hold great promise to provide a more secure biometric...
Indonesian text data from social media is one of large text data that interesting to be mined. Mining the insight knowledge from large text data need more effort and time to processed. Moreover, Indonesian text data from social media contains natural language, including slang that require special treatment. We propose incremental technique for more efficient mining process of large text data with...
We present a non-intrusive codec type and bit-rate detection algorithm that extracts a number of features from a decoded speech signal and models their statistics using a Deep Neural Network (DNN) classifier. We also present a method for reducing the computational complexity and improving the robustness of the algorithm by pruning features that have a low importance and high computational cost using...
In this paper, the problem of age estimation is addressed based on two modalities: speech utterances and speakers' face images. The proposed age estimation framework employs the Shifted Covariates REgression Analysis for Multi-way data (SCREAM) model, which combines Parallel Factor Analysis 2 and Principal Covariates Regression. SCREAM is able to extract a few latent variables from multi-way data...
Speech Synthesis (SS) and Voice Conversion (VC) presents a genuine risk of attacks for Automatic Speaker Verification (ASV) technology. In this paper, we evaluate front-end anti-spoofing technique to protect ASV system for SS and VC attack using a standard benchmarking database. In particular, we propose a novel feature set, namely, Energy Separation Algorithm-based Instantaneous Frequency Cosine...
Hyperspectral imaging has been rarely investigated for honey analyses, on the contrary to the optical spectroscopy which is widely investigated. The essential missing component to kick start this research is a standard honey hyperspectral images, called hypercubes, dataset. This paper proposes a systematic procedure for the preparation of the first honey hypercube dataset using hyperspectral imaging...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.