The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present an efficient lossless ECG compression method for real-time applications. The proposed method hybridizes ECG predictive coding algorithm based on R-wave identification and Takagi-Sugeno fuzzy neural network. The ECG signal is predicted and encoded by using the periodicity of the electrocardiogram, the correlation between the electrocardiogram signal and the adjacent heartbeat,...
With the development of next-generation sequencing technologies, large number of transcripts has been accumulated in public databases. Long non-coding RNAs (lncRNAs), typically above 200 nucleotides in sequence length, have recently attracted increasing interests because of their important roles in various cellular processes. While it is straightforward to distinguishing lncRNAs from most small non-coding...
To solve the problem of performance appraisal of SME (Small and medium-sized enterprises) s' designers, this paper proposes a design method of appraisal system combining with product data management (PDM) workflow management. Designed a performance appraisal system model based on process management; taking into account the characteristics of supporting businesses, introduced a workflow template customization...
An automatic system for health data management and service report generation from Android OS smartphones was designed and implemented. QR Code is used as an identifier and a tracking tool for patients involved in rehabilitation treatments. The system was implemented both in a rehabilitation gymnasium and in a hospital ward. The experimental results highlight clearly an efficiency improvement in health...
For reliable control of the cardiovascular, respiratory, musculoskeletal systems of the human body must be continuously recorded electro-cardio signal for a long time. Detected and quickly transferred over the wireless channel the most informative pieces of daily electro-cardio signal will allow duty cardiologists for react and provide the necessary medical care to remote cardiac patients. The sequences...
Rapid analysis of DNA forensic samples can have a critical impact on time sensitive investigations. Analysis of forensic DNA samples by massively parallel sequencing is creating the next gold standard for DNA forensic analysis. This technology enables the expansion of forensic profiles from the current 20 short tandem repeat (STR) loci to tens of thousands of single nucleotide polymorphism (SNP) loci...
In this paper, we propose a palmprint recognition scheme using histograms of sparse codes (HSC) as a new feature for palmprint image. In the feature extraction stage, the HSC feature is obtained by computing sparse codes for a given dictionary from a palmprint image, which results in a feature image. In the feature encoding stage, a hash table is designed from the feature image using the binary hashing...
In the field of natural language processing, processing Vietnam ethnic minority languages in general and Ede ethnic minority language in particular have been always open and difficult problems that have not resolved systematically. The purpose of the paper is deploying an environment for processing Ede ethnic minority language. Through this environment, Vietnamese-Ede bilingual vocabulary database...
Biometrics is a growing research field due to an increasing demand for safety and security in both the public and private. Biometric recognition refers to the identification of a person by analyzing its physiological and/or behavioral traits. Among several physiological traits, palmprint has become an attractive characteristic due to its reliability, flexibility, stability, non-intrusiveness and discriminating...
Most existing hashing methods resort to binary codes for similarity search, owing to the high efficiency of computation and storage. However, binary codes lack enough capability in similarity preservation, resulting in less desirable performance. To address this issue, we propose an asymmetric multi-valued hashing method supported by two different non-binary embeddings. (1) A real-valued embedding...
The High Efficiency Video Coding (HEVC) standard significantly saves coding bit-rate over the proceeding H.264 standard, but at the expense of extremely high encoding complexity. In fact, the coding tree unit (CTU) partition consumes a large proportion of HEVC encoding complexity, due to the brute-force search for rate-distortion optimization (RDO). Therefore, we propose in this paper a complexity...
Iris recognition is a biometric authentication system proving vital for ensuring security and has been employed as an important case to test the algorithms developed in pattern recognition. The unique circular shape of the iris and its time invariance makes it a versatile technique that has an accuracy that can be mathematically proven. Here in this work we propose a new segmentation technique and...
The users of information systems often have to deal with outliers in their data. Such outliers can have negative (i.e. abnormal observations) or positive (i.e. detection of new features) impact on their work. Despite the fact, that several methods of outlier detection already exist, there is still a need to improve them. In this work we propose a method for evolutionary outlier detection. The novelty...
Facial analysis plays very important role in many vision applications, such as authentication and entertainments. The very early works in the 1990s mostly focus on estimating geometric deformations of facial landmarks to address this task. While in the past several years, more and more efforts have been made to directly learn an appearance regression for facial analysis. Though training regressions...
Thai language is derived from Bali-Sanskrit which is a language based on sounds and tones. Foreigners need to converse using Thai. The phonology of this language causes mapping from one system of writing into another and data control to be complicated. The calibrating of sounds from one language into a workable writing system called transcription as opposed of transliteration, which maps the letters...
This paper addresses the problem of Approximate Nearest Neighbor (ANN) search in pattern recognition where feature vectors in a database are encoded as compact codes in order to speed-up the similarity search in large-scale databases. Considering the ANN problem from an information-theoretic perspective, we interpret it as an encoding, which maps the original feature vectors to a less entropic sparse...
As private information of individuals become more accessible, data privacy evolved to be an important aspect of communication technologies. Among existing privacy definitions, the utility privacy trade-off model is suitable for the assessment of privacy due to its relation with the information theory and the rate distortion theory. In this paper, the effects of the transmission errors due to the wireless...
We consider a cache network, where a single server is connected to multiple users via a shared bottleneck link. The server has a set of files, which can be cached by each user in a prefetching phase. In a following delivery phase, each user requests a file and the server delivers user demands as efficiently as possible by taking into account their cache contents. We focus on an important and commonly...
We study a two-hop cache-aided network, where a layer of relay nodes connects a server and a set of end users, i.e., a combination network. We consider the case where both the relay nodes and the end users have caching capabilities. We provide upper and lower bounds which are applicable to any combination network, noting that previous work had focused on models where the relays do not have caches...
It is well recognized that the signal processing methods contributes in biology to the control of the DNA spatial structure. From the previous studies, it is inferred that the significant portion of the eukaryotic genomes is composed of transposable elements (TEs). The TEs play an important role as a driving force of genome evolution. An important sub class of ETs class II, Helitrons, have been revealed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.