The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SIFT-based identification techniques have been broadly criticised in biometrics due to its high false matching rate. To overcome this weakness, a new method for SIFT-based palmprint matching, called the Self Geometric Relationship-based matching (SGR-Matching) is presented. While existing matching techniques consider only the relationship between the SIFT-points of the query image on one hand and...
Health care system's instantaneous answering method using machine-learning process has hindered the cross-system operability and the inter-user reusability. The scheme consists of two naturally reinforced components of database, namely Local Repository and Web. Primarily the user can access the local-repository database with simple keywords for the health data from the local repository. In other cases,...
In order to avoid the effect of initial pheromones for Ant Colony Algorithm, Ant Colony Algorithm and Genetic Algorithm are integrated to mine maximum frequent item sets in this paper. First of all, this paper introduces the ideas of Hybrid Ant Colony Algorithm and briefly explains how to process the data of database. In the second place, Ant Colony Algorithm and Genetic Algorithm are designed respectively,...
To store a acquired ECG data huge space is required even if the ECG signal is sampled at lower rate. The relevance of telecardiology is more pronounced in contemporary times for diagnosing heart abnormalities by analyzing ECG signal. Transmission of such huge data for medical purpose is not possible without compression and also it will required more energy for wireless transmission for large amount...
Unicode font is the universally used coding system that provides a unique number of every character irrespective of the platform, program and language. The benefit of using Unicode fonts over ASCII fonts is that the Unicode fonts are visible in any computer system as well as in the web. ASCII and Unicode play the same role for English character coding system but for many languages including some major...
The best strategy for combating SQL injection, which has emerged as the most widespread website security risk, calls for integrating defensive coding practices with both vulnerability detection and runtime attack prevention methods.
This paper puts forward the function requirements of the tooth code system, and according to them describes a design that based on VC++ 6.0 and Access database. The system software can generate all the code combinations automatically according to the tooth stage head (the depth of the valleys on the key) and the number of teeth (number of the valleys) [1], and it also can remove the codes that you...
Researchers have proposed multiple solutions to cross-site scripting, but vulnerabilities continue to exist in many Web applications due to developers' lack of understanding of the problem and their unfamiliarity with current defenses' strengths and limitations.
Most legacy computer systems only well support input and display of 20,902 Han characters (Hanzis for short) encoded in Unicode 1.0. In 2010, Unicode 6.0 has encoded 75,616 Hanzis. However, it is not easy to use these newly encoded Hanzis, even in the latest computers. Most of these newly encoded Hanzis are rarely used in daily lives. Some are only used in ancient literature or individual Sinospherical...
The first level of material's classification information by means of tree structure is added up to thousands of kinds, and dozens of levels in depth. Therefore, it is rather hard to make the spanning tree. By comparing of three methods of spanning tree, by using the median compositor cardinal number, recursive method, loop method, it is found that the efficiency of their existence spanning tree is...
Recently, computer go has experienced great advance with the introduction of Monte-Carlo Tree Search (MCTS). Although MCTS programs are overall stronger than previous programs, their strength manifests mostly as the game advances. Strong human players applying established opening principles overtake current MCTS programs in the early moves of non-handicap 19×19 games. In this paper, the authors propose...
An algorithm, TBCClustering, is presented in the paper for clustering GML documents using maximal frequent induced subtree patterns. TBCClustering mines the maximal frequent induced subtrees by using the structural information of GML documents, it can get the best minimum support automatically, and then chooses a set of subtree patterns to form the optimistic clustering features. Finally it uses CLOPE...
As 2D bar code Aztec Code has a lot of outstanding excellences such as high capacity, high density, strong error-correcting ability and security, it is widely used in online tickets sold. According to the practicability, this paper has designed a system processes Aztec code stretching Distortion. In this paper, the algorithm of 2D bar code is introduced in detail. It can be also used in other similar...
Based on the current learning atmosphere of students and the present employment market situation, we analyze the short semester teaching objectives and characteristics, so that an actual project which regarding database development during the short semester can be assigned for practice purposes. In order to present the practical purpose of the short semester and the training approach of the innovative...
Automatic inference of affect relies on representative data. For viable applications of such technology the use of naturalistic over posed data has been increasingly emphasised. Creating a repository of naturalistic data is however a massively challenging task. We report results from a data collection exercise in one of the most significant application areas of affective computing, namely computer-based...
This paper presents a fish disease diagnosis system using the short message service (SMS) which can compensate the lacking of computer and the inconvenient using of Web-debased fish disease diagnosis system for poor basic-establishment of computer in countryside in China. This study is based on the broad using of mobile phone, the convenience of using short message service and the technology of short...
We have investigated a technique for recognising faces invariant of facial expressions. We apply multi-linear tensor algebra, which subsumes linear algebra, to analyse and recognise 3D face surfaces. This potent framework possesses a remarkable ability to deal with the shortcomings of principle component analysis in less constrained situations. A set of vector spaces can be used to represent the variation...
This paper describes a face-muscle model system capable of emoting avatars in a variety of applications. The presented model produces dynamically changing facial expressions on computer generated faces, using mathematically modeled muscle deformations. The muscle model used to distort sets of vertices in a 3D space, is independent of the geometric model and hence it can be applied to arbitrary face...
Morphology is the field of the linguistics that studies the internal structure of the words. Morphological analysis and generation are essential steps in any NLP application. Morphological analysis means taking a word as input and identifying their stems and affixes. Morphological analysis provides information about a wordpsilas semantics and the syntactic role it plays in a sentence. Morphological...
In this paper, a new on-line signature verification system using neural network is presented. The proposed system is based-on a newly developed Spatio-Temporal Artificial Neuron (SPAN), which is well adapted for the verification of Spatio-Temporal patterns. In this model, the strokes of a signature generated by a digitizing tablet is presented in form of a sequence of spikes corresponding to displacement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.