The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) is a concept that involves connecting endpoint devices and physical objects to the Internet. While IoT is envisioned to dramatically increase convenience in our daily lives, it could also result in catastrophic economic and safety issues. Considering the applications envisioned for IoT (smart cities, homes, retail, etc.), security must be handled with great care and should...
Speech emotion recognition is an aspect of equipped robots with the human capabilities. The need to tradeoff between computational volume and performance accuracy is the main challenge of real-time processes. Application domain of this paper is robotic; therefore both mentioned factors are important. Selecting distinguishing factor with low dimension and high resolution is the optimal solution for...
Iris recognition is the most reliable and accurate biometric identification system. Iris recognition system captures an image of an individual's eye, the iris in the image is segmented and normalized for extracting its feature. The performance of iris recognition systems depends on the process of segmentation of iris form the eye image. Segmentation is the most important part in iris recognition process...
Owing to an increased demand for identity management system in day to day applications, considering user convenience as a priority, we conduct a survey on biometric systems and observed serial multimodal systems as the most user convenient and reliable system. For further enhancement of the system performance, the discriminating capacity of the weaker trait can be improved, and we expect that the...
The performance of multiple matchers heavily influence the recognition accuracy of a multi-biometric system under the simple sum-rule-based score-level fusion. In this paper, a weighting technique, referred to as score reliability based weighting (SRBW) technique, is developed to estimate weights for the matchers in order to improve the recognition rate of multi-biometric systems at the score level...
Iris recognition system is the secure authentication tool to control access to physical assets based on iris texture. It is the most reliable biometric system because of its uniqueness and stability over time, even the genetically identical twins have different Iris textures. This paper presents a system that is immune to tilt and scale variations. The iris region of interest is segmented based on...
We present a system for predicting gaming-related properties from Twitter profiles. Our system predicts various traits of users based on the tweets publicly available on their profiles. Such inferred traits include degrees of tech-savviness, knowledge on computer games, actual gaming performance, preferred platform, degree of originality, humor and influence on others. Our approach is based on machine...
Content based image retrieval (CBIR) is an application of computer vision which tackles the problem of recovering images in large datasets based on a similarity criterion. The role of CBIR in biomedical field is potentially very important, since every day large volumes of different types of images are produced. An effective and reliable CBIR system can help the decision-making process and support...
Vehicle Make and Model Recognition (VMMR) plays an important role in Intelligent Transportation Systems. Due to the increase in volume and diversity of vehicles on the road, traffic monitoring has become both important and difficult. Several cues could be used in VMMR. Examples include salient features extracted from vehicle representing the shape of different parts or logo detection and recognition...
People are depending on information very much and it is becoming essential to carry out different activities every day. The degree of security in many situations becoming critical and need to be paid attention because of increase of crime rate with sophisticated technology. To increase the privacy and safety of information care must be taken to protect the information. Individual authentication is...
Nowadays, people purchase a lot of products from online shopping sites. To support customers in decision making, some sites collect and provide user reviews on products. However, contents of the user reviews are too abundant for customers to analyze them in a short period of time. The automatic analysis of reviews is important to provide users with valuable information about goods of any category...
In the last decade, crowdsourcing (CS) has emergedas a very promising approach for obtaining services, feedbackor data from a large number of people connected through theInternet, in a short time and at a reasonable cost. CS has beenused in a large range of contexts, thus proving its versatility. However, the quality of the services or data provided by theworkers (the "crowd") is not guaranteed,...
Iris recognition uses automated techniques to extract iris features which are stored in a database as a feature template to be later used for individual identification and authentication. Strict image quality control is a basic requirement for most iris identification systems. Low cost devices used under uncontrolled environments acquire poor iris images with inconsistent illumination and specular...
Authentication is the fundamental defense against any illegitimate access to a computing device or any sensitive online applications. Due to recent trends of emerging security threats, authentication using only a single factor is not reliable to provide adequate protection for these devices and applications. Hence, to facilitate continuous protection of computing devices and other critical online...
Enhanced Thematic Mapper is a eight-band multispectral sensor in LANDSAT satellite capable of providing high resolution images. These remote sensing images have a wide range of applications in agriculture, deforestation, land cover, volcanic flow activity monitoring etc. All these applications require very accurate image registration. But, automatic registration of these images is still a vital challenge...
In the Data mining process the dispensation of in sequence can be done with dissimilar ideas. An optimization is the dilemma of penetrating out the paramount announcement from all the practical solutions. Artificial Bee Colony (ABC) is proposed which is based on intelligent advancement and is defined to get the powerful and reliable solution. Process scheduling algorithm is presented under distributed...
Islanding of DGs in micro grid has created many problems in operation and network management. Thus correct and accurate diagnosis of this phenomenon is one of the most important cases in micro grid protection. Passive methods are the most conventional methods in this case. These methods are based on electrical parameters measurement in the point in which DGs connects to the micro grids. Passive methods...
We present a new approach for remote sensing image classification. The methodology combines many related tasks namely non linear source separation, feature extraction, feature fusion and learning classification. Nonlinear source separation is a pre-processing stage that aims to compensate the nonlinear mixing natural phenomenon. Latent signals, called sources are transformed to the feature presentation...
The single biometric system may be inadequate in many applications such as public security, access control and banking because of noise in data samples or because of unavailability of a sample at a given time. In order to overcome the limitation of the single biometric, a Multi-representation biometric is used. In this paper we present a multimodal personal identification system using the Histogram...
We propose a new feature-based algorithm to detect image splicings without any prior information. Local features are computed from the co-occurrence of image residuals and used to extract synthetic feature parameters. Splicing and host images are assumed to be characterized by different parameters. These are learned by the image itself through the expectation-maximization algorithm together with the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.