The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computers and Smartphone's becomes vital part of everyday life and hence use of internet becomes more and more. Due to internet, computers are becomes vulnerable of different kinds of security threats. Therefore it is required that we need to have efficient security method in order to avoid leakage of important data or misuse of data. This security method is called as Intrusion Detection System (IDS)...
Combining signals from traditional electroencephalography with those of novel physiological measures such as pupil dilation could enable more accurate and robust real-time monitoring of cognitive workload.
Traffic identification technique is used for classification of different network protocols and applications even with detection of users' network activities. In this paper, we conduct our study on some typical users' network activities and present a traffic identification method to describe the feature about users' behaviors. We convert users' network activities information into different sequences...
In this paper, we propose a novel method for point clouds registration. In point clouds, there always exist a large number of surfaces with low curvatures. Let the surface locate in an OXYZ coordinate system, if we rotate the mean normal of the surface parallel with the Z axis, the 3D surface can be projected to 2D image via orthographic projection. Then we can detect and describe SIFT features in...
In this paper, microcontroller based automatic door open system has been developed. The system is developed as speech recognition circuit where programmable voice is used as reference. Programmable means trained voice has been used for identification of authorized and unauthorized person. As software part, MATLAB GUI interface has been used to record authorized voice, and to synthesize the recorded...
The main aim of this paper is an improvement of the famous Scale Invariant Feature Transform (SIFT) algorithm used in place categorization. Masking approach to reduce the computational complexity of SIFT have been proposed. Tradeoff between key points and processing time on feature extraction has been used. Selected parameters used in the experiment demonstrated that the computational cost of SIFT...
A classifier fusion interactive software package has been constructed for implementing the classification task in the electromyographic (EMG) signal decomposition process using the MATLAB high-level programming language and its interactive environment. The package employs classifier fusion schemes of multiple classifier combination for the purpose of fusing the decisions of a set of heterogeneous...
Peer-to-Peer (P2P) botnets have emerged as a serious threat against the network security. They are used to carry out various illicit activities like click fraud, DDOS attacks and for information exfiltration. These botnets use distributed concept for command dissemination. These botnets are resilient to dynamic churn and to take-down attempts. Earlier P2P botnet detection techniques have some shortcomings...
Rapid growth in Information technology and Communication networking, have increased the inclination of professionals in storage and archival of multimedia-video data. Efficient and accurate retrieval of archived video data is essential need of many professional groups like researchers, analyst, journalist and historians. Textual metadata based video retrieval is intuitive and subject to human perception...
Important task in image database is to organize images into appropriate category using different features of images. Image classification is studied for many years. There are various techniques proposed to increase the accuracy of classification. In this paper a novel data mining based approach is proposed for content based image classification. Feature extraction and classification algorithms are...
We explore the feasibility of measuring learner engagement and classifying the engagement level based on machine learning applied on data from 2D/3D camera sensors and eye trackers in a 1:1 learning setting. Our results are based on nine pilot sessions held in a local high school where we recorded features related to student engagement while consuming educational content. We label the collected data...
In this paper, researchers test several algorithms called by features, as part of pre-processing from AudiTion application. AudiTion is a mobile application that help deaf people to know their environment with visualized the sound into text that describes the sound itself. However, AudiTion has some problems, like delay, the load process, and the accuracy in predict sound. The research will use different...
One of the common methods in the area of combating with malwares is the use of opcodes-sequence exist in the malwares' assembly code. In this study, a new method has been used based on the structural classification of opcodes to detect malwares and its efficiency has also been put into investigation compared to the opcodes method. For this purpose, two different methods are to be applied for eliciting...
Up to now, for computer aided celiac disease diagnosis reliable subimages showing discriminative features must be manually extracted by the physicians, prior to the automatized classification. This must be done to get idealistic data which is free from image degradations, in order to enable a reliable computer based classification. However, this interactive stage during medical treatment requires...
Position localization is essential for visually impaired individuals to live independently. Comparing with outdoor environment in which the global positioning system (GPS) can be utilized, indoor positioning is more difficult due to the absence of the GPS signal and complex or unfamiliar building structure. In this paper, a novel landmark-based assistive system is presented for indoor positioning...
Segmentation is one of the important steps of character recognition system. It is an important step because inaccurate segmentation of characters will cause errors in the recognition stage. In optical character Recognition (OCR) system the presence of touching characters and broken characters decreases the accuracy rate of character recognition. Touching of half character or full character with other...
Face detection technology is a hot topic of pattern recognition and computer vision. The method based on skin color feature and AdaBoost are both the most representative methods. Among them, the former method has a faster detection speed, but lower accuracy; the latter method has a higher accuracy, but slower speed. In this paper, a fast face detection method based on the combination of skin color...
Dyslexia is a learning difficulty and in most cases cannot be identified until a child is already in the third grade or later. At this time a dyslexic child have only an one-in-seven chance of ever catching up with his or her peers in reading, writing, speaking or listening. Early identification can pave the way for early intervention and the dyslexic child can be helped at an early stage. Furthermore,...
For a multi script/lingual country like India Script identification is a complex real life problem for automation of document processing. Handwritten script identification is again much more complex compared to print one. Here scripts from multi script handwritten documents are identified and then performance is compared using different well known classifiers. We followed a two stage approach for...
Saliency map is a central part of many visual attention systems, particularly during learning and control of bottom-up attention. In this research we developed a hardware tool to extract saliency map from a video sequence. Saliency map is obtained by aggregating primary features of each frame, such as intensity, color, and lines orientation, along with temporal difference. The system is designed to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.