The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a fast image stitching method based on the Shape-Preserving Half-Projective warps. The method includes three principal steps: Firstly, the feature points are extracted and matched using the SIFT algorithm; Secondly, image registration is completed by estimating the converting relationship between images with the RANSAC and the Shape-Preserving Half-Projective Warps. Finally, seamless...
This paper presents a hierarchical feature extraction technique for non-stationary time-series data that is considered to be a slow-time scale mixture of time-series segments which are quasi-stationary at a faster time-scale. The problem is to model an unknown number of unique stationary segments at the low level while capturing their switching characteristics at a higher level. Symbolic Dynamic Filtering...
Complex social networks are often arranged in communities of agents playing similar roles in the network, and detecting these communities can bring insights into the behaviour of such systems. Among many existing methods, a model of communication dynamics that involves exchange and agreement on shared words -- the Naming Game -- has been applied for community detection based on local interactions...
Aimed at solving the problem that traditional clustering methods are vulnerable to the sparsity feature of the high dimensional data, a spectral clustering algorithm is proposed based on K-SVD dictionary learning. The algorithm firstly learns a dictionary by K-SVD and obtains sparse representation coefficients of all data samples in the dictionary by l1 sparse optimization. Then the similarity matrix...
Detection of a moving object in a non-stationary scene is a very critical and challenging step for visual surveillance applications. Background subtraction (BS) is a widely used algorithm for moving object detection in the presence of static cameras. Its performance purely depends on the choice of features used for background modeling. The traditional BS assumes that the background is static or near-static...
Video segmentation can distinguish the video content preliminarily. It gets ready for the following Analysis scene and object recognition. The accurate video segmentation would do the direct impact on successor task. When the video segmentation algorithm is accurate, the video in painting effect based on motion mask is well. Therefore, more and more people pay close attention to the improvement about...
Heavy loads increase the risk of musculoskeletal injury for foot soldiers and first responders. Continuous monitoring of load carriage in the field has proven difficult. We propose an algorithm for estimating load from a single body-worn accelerometer. The algorithm utilizes three different methods for characterizing torso movement dynamics, and maps the extracted dynamics features to load estimates...
Clustering large collections of binary programs is a challenging task due to two factors. First of all, a way to determine if two samples are similar or not is required. Secondly, pair wise comparison is impractical on collections comprising millions of items. This paper will mainly focus on the second factor and will propose a clustering algorithm based on the properties of Min Hash functions. The...
Biometric systems either use physiological or behavioural characteristics to identify an individual. However, if a biometric is compromised it could be difficult or impossible to change it. This paper proposes a biometric authentication system based on gesture recognition, where gestures can be easily changed by the user. The system uses a Kinect™ device to capture and extract features, as it provides...
Different methods employed for object detection are widely exploited covering application areas such as traffic monitoring, video surveillance and capturing various human activities and motion. The traditional methods that have earlier been proposed for detection are found to be beneficial if the detected object is properly identified. Moreover, minimizing the effect of dynamic changes as well as...
The explosive growth of Internet commerce has made phishers who may attempt to create phishing sites aimed to steal personal information such as password, banking account and credit card account details, etc. Most of these phishing pages look similar to the real pages in terms of interface and uniform resource locator (URL) address. Many techniques have been proposed to identify phishing sites. However,...
This paper presents a novel approach for optimizing the number of decision rules and select important features based on reduct. We compute the reduct using entropy value of conditional attribute then eradicates the redundant dataset, noisy features and uncertainty of dataset using coverage factor and generate optimized number of rules. Experimental results show that this approach achieves high data...
In this paper, a new set of features for addressing the problem of unsupervised query-by-example spoken term detection is proposed. The main purpose of this is to find a spoken query in large speech databases. In unsupervised audio search, language specific resources are not required. Thus this system is more appropriate in cases where enough training data is not available for creating an Automatic...
As mobiles become a ubiquitous, they are used more and more for operations that may involve sensitive data or huge amounts of money. The mobile is also increasingly being used as the tool of preference for browsing and using the Internet. Hence, new security measures must be developed to support increased functionality of these devices, to protect users in the case of any mishap. Authentication using...
Online signature recognition is one of the important behavioral biometric trait. This signature has information of x, y, z variations, pressure, azimuth of pen tip, altitude of pen tip. This makes online handwritten signature based biometric system more accurate than the static ones. In this paper new set of features are proposed for online or dynamic signature recognition. Geometric centers, Grid...
An algorithm for the robust detection and recognition of gestures for the interaction between human and a domestic floor cleaner robot is presented. The gestures are selected through a user study, in which the participants are asked to show natural gestures to the robot in given specific interaction scenarios. The gestures selected are those repeated by majority of participants and consist both commanding...
HDR (high dynamic range) imaging is to obtain HDR image by fusing a few LDR (Low dynamic range) images with different dynamic range together. Due to the difference in the dynamic ranges between acquired image and actual scene, overexposure and underexposure may appear in HDR images obtained. Thus, the detail information of images may get lost in the result image This paper proposes a method to relieve...
In order to improve the recognition rate of palm vein recognition algorithm, a recognition algorithm based on SIFT and ORB features extraction and score-level fusion is presented in this paper. Score-level fusion is an information fusion technique, which has six common combination rules. Two dynamic weight combination rules are proposed as a supplement here. The main steps of the proposed algorithm...
World dynamic situation are full of random changes which include multiple factors like audio, video and image. So cause of concurrent incident and simultaneously device performance requirement become typical for information retrieval. That make segmentation approach a method of combining feature transformation with clustering algorithm which is proposed for adequate retrieval of image, that could...
Music has always been the vital part of entertainment. Musical schools and singing reality shows are very popular and have become an integral part of our daily life. They provide entertainment to the viewers and a platform to the willing contestants to show their talent. This paper introduces the idea for evaluating the performance of singers using melodic pattern matching techniques, namely LBDM...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.