The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although light field data provides abundant cues for depth estimation, light field depth estimation suffers from occlusion and uncertain edges. In this paper, we propose occlusion robust light field depth estimation using segmentation guided bilateral filtering. First, we calculate refocused images from light field data using digital refocusing. Second, we perform support vector machines (SVM) classification...
Estimating speaker's physical parameters like height, weight and shoulder size can assist in voice forensics by providing additional knowledge about the speaker. In this work, statistics of the components of background GMM are employed as features in estimating the physical parameters. These features improved the performance of height and shoulder size estimation as compared to our earlier attempt...
Consider a face image data set from clients of a company and the problem of building a face recognition system from it. Video cameras can be used to acquire several images per client in order to maximize the robustness of the system. However, as the data set grows huge, the accuracy of the system might be seriously compromised since the number of negative samples for each user is increasing. We propose...
Representation of data is very important in case of machine learning. Better the representation, the classifiers will give better results. Contractive autoencoders are used to learn the representation of data which are robust to small changes in the input. This paper uses contractive autoencoder and SVM classifier for handwritten Devanagari numerals recognition. The accuracy obtained using CAE+SVM...
There has been a phenomenal increase in the utility of text classification (TC) in applications like targeted advertisement and sentiment analysis. Most applications demand that the model be efficient and robust, yet produce accurate categorizations. This is quite challenging as their is a dearth of labelled training data because it requires assigning labels after reading the whole document. Secondly,...
This paper presents a multiple classifier system (MCS) to identify plants species based on the texture and shape features extracted from leaf images. A diverse pool of SVM and Neural Network classifiers is trained on four different feature sets, namely, Local Binary Pattern (LBP), Histogram of Gradients (HOG), Speed of Robust Features (SURF) and Zernike Moments (ZM). Then, a static classifier selection...
Over a decade of continual expansion in networking and cloud computing has naturally created an increased demand for cybersecurity solutions. Due to the large number of communication devices and content, it is ideal that these cybersecurity solutions are automated. Unfortunately, malicious content and/or activity is often designed to “look” normal and new malicious attacks are repeatedly being developed...
In this fast developing world, the number of motor vehicles is increasing rapidly but road resources remain limited, causing severe congestion problem of city traffic. In order to predict short-term traffic condition accurately, we propose a short-term traffic condition prediction method for urban road network based on improved support vector machine. As outliers inevitably exist in collected traffic...
Unlike Support Vector Machine (SVM), Kernel Minimum Classification Error (KMCE) training frees kernels from training samples and jointly optimizes weights and kernel locations. Focusing on this feature of KMCE training, we propose a new method for developing compact (small scale but highly accurate) kernel classifiers by applying KMCE training to support vectors (SVs) that are selected (based on the...
We present a method to improve the accuracy of a foot-mounted, zero-velocity-aided inertial navigation system (INS) by varying estimator parameters based on a real-time classification of motion type. We train a support vector machine (SVM) classifier using inertial data recorded by a single foot-mounted sensor to differentiate between six motion types (walking, jogging, running, sprinting, crouch-walking,...
Individualized blood transfusion management would benefit from the ability to prospectively identify patients at risk of complications of blood transfusion, and target them for closer monitoring or intervention. This study presents a simple and efficient multi-task learning method for predicting multiple surgical outcomes based on the weighted least squares support vector machine. To accelerate the...
During target tracking, in order to obtain a higher tracking accuracy, the region we would like to track should have a good feature expression. Furthermore, we need to extract multilevel and complex features to deal with problems which are usually encountered during UAV tracking, such as the target deformation, scale change and occlusion. However, such features make tracker more complex which would...
An image watermarking algorithm based on grey relational analysis and singular value decomposition in wavelet domain is proposed. Firstly, the host image is processed with one-level of discrete wavelet transform. The low frequency coefficients LL1 can be obtained from mentioned operation, and LL1 is divided into non-overlapping blocks whose size is same as watermarking. Secondly, through the gained...
Vehicle classification plays an important part in Intelligent Transport System. Recently, deep learning has showed outstanding performance in image classification. However, numerous parameters of the deep network need to be optimized which is time-consuming. PCANet is a light-weight deep learning network that is easy to train. In this paper, a new robust vehicle classification method is proposed,...
Learning robust regression model from high-dimensional corrupted data is an essential and difficult problem in many practical applications. The state-of-the-art methods have studied low-rank regression models that are robust against typical noises (like Gaussian noise and out-sample sparse noise) or outliers, such that a regression model can be learned from clean data lying on underlying subspaces...
We propose a novel and principled hybrid CNN+CRF model for stereo estimation. Our model allows to exploit the advantages of both, convolutional neural networks (CNNs) and conditional random fields (CRFs) in an unified approach. The CNNs compute expressive features for matching and distinctive color edges, which in turn are used to compute the unary and binary costs of the CRF. For inference, we apply...
We propose a family of quasi-linear discriminants that outperform current large-margin methods in sliding window visual object detection and open set recognition tasks. In these tasks the classification problems are both numerically imbalanced – positive (object class) training and test windows are much rarer than negative (non-class) ones – and geometrically asymmetric –...
Random forest has emerged as a powerful classification technique with promising results in various vision tasks including image classification, pose estimation and object detection. However, current techniques have shown little improvements in visual tracking as they mostly rely on piece wise orthogonal hyperplanes to create decision nodes and lack a robust incremental learning mechanism that is much...
Fine-grained activity understanding in videos has attracted considerable recent attention with a shift from action classification to detailed actor and action understanding that provides compelling results for perceptual needs of cutting-edge autonomous systems. However, current methods for detailed understanding of actor and action have significant limitations: they require large amounts of finely...
Pattern recognition techniques have been widely used in security-sensitive applications to distinguish malicious samples from legitimate ones. However, there usually exist some intelligent attackers who intend to have malicious samples to be mis-classified as legitimate at test time, i.e. evasion attack. Current researches show that traditional Support Vector Machines (SVMs) are vulnerable to evasion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.