In this paper we present a novel approach to the problem of understanding, monitoring, and controlling the machining process of composites materials. the approach is called Logical Analysis of data (LAD). It is based ...
详细信息
In this paper, we study the computer recognition of emotions involved in facial expressions. We propose a recognition system based on a support vector machine (SVM) system as a classifier for detecting of spontaneous ...
详细信息
We can face withthe patternrecognition problems where the influence of hidden context leads to more or less radical changes in the target concept. this paper proposes the mathematical and algorithmic framework for t...
详细信息
the proceedings contain 52 papers. the topics discussed include: multi-view video dissemination and delivery: challenges and solutions;binary SIFT: towards efficient feature matching verification for image search;Touc...
ISBN:
(纸本)9781450316002
the proceedings contain 52 papers. the topics discussed include: multi-view video dissemination and delivery: challenges and solutions;binary SIFT: towards efficient feature matching verification for image search;TouchPaper ? an augmented reality application with cloud-based image recognition service;a transmission scheme for opportunistic networks with social selfish nodes;face recognition method based on dynamic threshold local binary pattern;training support vector machinethrough redundant data reduction;facial expression recognition using geometric and appearance features;cross community news event summary generation based on collaborative ranking;robust hand tracking by integrating appearance, location and depth cues;unsupervised human skeleton extraction from kinect depth images;real-time fingertip tracking and detection using kinect depth sensor for a new writing-in-the air system;and simulated annealing ant colony algorithm based on backfire method for QAP.
Kernel-based methods have gained great attention by researchers in the field of patternrecognition and statistical machinelearning. they are the most nominated algorithms whenever a non-linear classification model i...
详细信息
Multiple instance learning, when instances are grouped into bags, concerns learning of a target concept from the bags without reference to their instances. In this paper, we advance the problem with a novel method bas...
详细信息
Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medica...
详细信息
ISBN:
(纸本)9780819490261
Today's advanced scenario where each information is available in one click, data security is the main aspect. Individual information which sometimes needs to be hiding is easily available using some tricks. Medical information, income details are needed to be kept away from adversaries and so, are stored in private tables. Some publicly released information contains zip code, sex, birth date. When this released information is linked withthe private table, adversary can detect the whole confidential information of individuals or respondents, i.e. name, medical status. So to protect respondents identity, a new concept k-anonymity is used which means each released record has at least (k-1) other records in the release whose values are distinct over those fields that appear in the external data. K-anonymity can be achieved easily in case of single sensitive attributes i.e. name, salary, medical status, but it is quiet difficult when multiple sensitive attributes are present. Generalization and Suppression are used to achieve k-anonymity. this paper provides a formal introduction of k-anonymity and some techniques used with it l-diversity, t-closeness. this paper covers k-anonymity model and the comparative study of these concepts along with a new proposed concept for multiple sensitive attributes.
Ranking over sets arise when users choose between groups of items. For example, a group may be of those movies deemed 5 stars to them, or a customized tour package. It turns out, to model this data type properly, we n...
详细信息
Bi-directional Associative Memory (BAM) is an artificial neural network that consists of two Hopfield networks. the most important advantage of BAM is the ability to recall a stored pattern from a noisy input, which d...
详细信息
Malicious PDF files have been used to harm computer security during the past two-three years, and modern antivirus are proving to be not completely effective against this kind of threat. In this paper an innovative te...
详细信息
暂无评论