Production and usage of touch sensing has attracted much attention, nevertheless, the current touch screen systems highly suffer from the dependency on the platform material. To overcome this drawback, here, a novel m...
详细信息
ISBN:
(纸本)9781479920938
Production and usage of touch sensing has attracted much attention, nevertheless, the current touch screen systems highly suffer from the dependency on the platform material. To overcome this drawback, here, a novel method is proposed by considering the infrared transmitters and receivers sensors instead of the piezoelectric sensors. In this way, the transformed platform works based on employing K-nearest neighbor (KNN) in conjunction with the spatial-temporal windowing to increase the sensitivity and accuracy of the detecting the finger place on the screen. To verify the proposed approach, the necessary hardware was set up. To test the hardware, the platform is locally segmented (e. g. like a grid) into a 7*8 table and 50 persons with different finger size were participated. Experimental results show the superior efficiency of the proposed method compare to the conventional methods.
In this paper, we present a local morphological pattern spectrum based approach for off-line signature verification. The proposed approach has three major phases : Preprocessing, Feature extraction and Classification....
详细信息
Proteins are known to interact with each other by forming protein complexes and in order to perform specific biological functions. Many community detection methods have been devised for the discovery of protein comple...
详细信息
face recognitions systems suffer from the problem associated with illumination variation. Therefore, there39;s a need to address this problem. In this paper, we present a novel algorithm for illumination normalizati...
详细信息
ISBN:
(纸本)9781479902699;9781479902675
face recognitions systems suffer from the problem associated with illumination variation. Therefore, there's a need to address this problem. In this paper, we present a novel algorithm for illumination normalization call Local Trapezoid Feature LTF. The features are derived from the trapezoid rule and the experiments results on extended Yale face database demonstrated the effectiveness and the superiority of the algorithm. Furthermore, our algorithm doesn't require dimensionality reduction or feature extraction.
The current paper is an attempt to integrate privacy preservation with privacy leak detection in the context of text mining. This may be considered as extending the Storage as a Service feature of Cloud Computing wher...
详细信息
ISBN:
(纸本)9781467345286
The current paper is an attempt to integrate privacy preservation with privacy leak detection in the context of text mining. This may be considered as extending the Storage as a Service feature of Cloud Computing wherein the user in the role of content creator submits the documents to be stored. There exists a facility to cluster these documents based on the concept-based mining algorithm. The clustered documents are usually available in the form a tree. When a user in the role of a subscriber requests to access a document, this request for access will have to go through an authentication procedure based on the Leakage Free Redactable Signature Scheme. Access control information is being maintained in the form of a Cloud user access control list. A privacy detection leak module which detects privacy leaks depending upon the pattern of previous privacy leaks is also being proposed. This information is then used to update the cloud user access control list and users responsible for privacy leaks are prevented from accessing the cloud service. The current document being requested by the user together with the information from the access control list is used to decide which part of the redacted trees have to be made available to the user as a response. Thus this combination of this authentication procedure and privacy leak detection can be used to ensure the privacy of the sensitive information stored by the user in the cloud.
A method is proposed for detecting anomalies in extremely crowded scenes using analysis of motion patterns. The optical flow is computed by initializing the video as a dynamical system. Optical flow is a vector field ...
详细信息
ISBN:
(纸本)9780769550336
A method is proposed for detecting anomalies in extremely crowded scenes using analysis of motion patterns. The optical flow is computed by initializing the video as a dynamical system. Optical flow is a vector field where each vector represents the direction and amount of motion. This generated model can be used to define trajectories. Then these trajectories are clustered hierarchically using spatial and temporal information for learning the motion patterns. Based on the learned statistical motion patterns, anomalies are detected using statistical methods.
In biology, similarity in structure or sequence between molecules is often used as evidence of functional similarity. In protein interaction networks, structural similarity of nodes (i.e., proteins) is often captured ...
详细信息
This paper is mainly discussing the key technology of label automatic identification system using the indirect fuzzy patternrecognition based on the features of image and the fuzzy theory. This method greatly improve...
详细信息
The development in communication and use of multimedia applications has created a remarkable demand for robust ways to store and transmit large databases of images. The current communication system demands compression...
详细信息
ISBN:
(纸本)9780769550336
The development in communication and use of multimedia applications has created a remarkable demand for robust ways to store and transmit large databases of images. The current communication system demands compression techniques to store and transmit data in an apposite manner. Compression schemes for images can be used to manage data of high sensitivity with less computational complexity. In this paper we suggest a novel algorithm for image compression and pattern matching called Difference Component Analysis (DCA). DCA extract the most relevant image feature components that identify the image. The DCA is based on the premise that matching images have minimal difference components. The experiment on DCA is done using more than 1000 human face images. The results show that the image can be compressed to a single decimal value and uses less computational steps. The concept can be applied for patternrecognition encryption techniques.
Through identifying the exploitation and utilization of water resources system, this paper establishes an improved fuzzy patternrecognition model by combining fuzzy matter-element model with the improved entropy eval...
详细信息
ISBN:
(纸本)9783037857779
Through identifying the exploitation and utilization of water resources system, this paper establishes an improved fuzzy patternrecognition model by combining fuzzy matter-element model with the improved entropy evaluation method and sets up the comprehensive evaluation index system which includes 3 layers and 10 indicators from two aspects: water utilization efficiency and water ecological environment. The proposed model and evaluation index system are applied to evaluate the comprehensive exploitation-utilization grade in Shandong Province. Results show that the exploitation-utilization of water resources and water ecological environment are not balanced in Shandong province, this indicates that the growth of ecological benefits and the protection of water ecological environment are ignored in the process of water resources exploitation-utilization.
暂无评论