Computer data processing mode in the era of big data from patternrecognition to intelligent sensing is discussed in this paper. Intelligence refers to the interconnection between things and things and people through ...
详细信息
The proceedings contain 51 papers. The topics discussed include: soft measurements of qualitative integral indicators for monitoring quantitative dataset;methodological foundations of scaling in modern measurement the...
The proceedings contain 51 papers. The topics discussed include: soft measurements of qualitative integral indicators for monitoring quantitative dataset;methodological foundations of scaling in modern measurement theory. classification of measurement scales and their application under uncertainty based on Bayesian intelligent technologies;multi-stage scale of the incentive system for distributors of an electrical company;metrological parameters of information and measurement systems for the study of a kinematic portrait of a person;combining scenario approach and choquet integral in decision making;support for the personalization of master's studies based on a fuzzy competency model (on the example of data analysis disciplines);and mutual recognition mechanism of legally significant e-documents and data in cross-border document flow.
Tinnitus is attributed by the perception of a sound without any physical source causing the symptom. Symptom profiles of tinnitus patients are characterized by a large heterogeneity, which is a major obstacle in devel...
详细信息
ISBN:
(纸本)9781728111797
Tinnitus is attributed by the perception of a sound without any physical source causing the symptom. Symptom profiles of tinnitus patients are characterized by a large heterogeneity, which is a major obstacle in developing general treatments for this chronic disorder. As tinnitus patients often report severe constraints in their daily life, the lack of general treatments constitutes such a challenge that patients crave for any kind of promising method to cope with their tinnitus, even if it is not based on evidence. Another drawback constitutes the lack of objective measurements to determine the individual symptoms of patients. Many data sources are therefore investigated to learn more about the heterogeneity of tinnitus patients in order to develop methods to measure the individual situation of patients more objectively. As research assumes that tinnitus is caused by processes in the brain, electroencephalography (EEG) data are heavily investigated by researchers. Following this, we address the question whether EEG data can be used to classify tinnitus using a deep neural network. For this purpose, we analyzed 16,780 raw EEG samples from 42 subjects (divided into tinnitus patients and control group), with a duration of one second per sample. Four different procedures (with or without noise reduction and down-sampling or up-sampling) for automated preprocessing were used and compared. Subsequently, a neural network was trained to classify whether a sample refers to a tinnitus patient or the control group. We obtain a maximum accuracy in the test set of 75.6% using noise reduction and down-sampling. Our findings highlight the potential of deep learning approaches to detect EEG patterns for tinnitus patients as they are difficult to be recognized by humans.
A new trapezoidal approximation of Atanassov’s intuitionistic fuzzy sets (AIFSs) and a new distance measure between AIFSs based on the area relations of membership function graphs of their corresponding trapezoidal f...
详细信息
Center-symmetric local binary pattern (CS-LBP), an important tool for feature extraction, which is widely used for object recognition. In this research work, a reversible watermarking technique has been introduced for...
详细信息
ISBN:
(纸本)9789811524493;9789811524486
Center-symmetric local binary pattern (CS-LBP), an important tool for feature extraction, which is widely used for object recognition. In this research work, a reversible watermarking technique has been introduced for image authentication making use of local and global feature vector generated by exploiting CS-LBP, discrete cosine transform (DCT) and discrete wavelet transform (DWT). In the embedding procedure, authentication code (AC) is generated by employing CS-LBP operator on the colored cover image using a shared secret key and local feature vector and global feature vector generated by exploiting DCT and DWT which has been stored in an INFO matrix as well as embedded within the host image. In the detection procedure, authentication code (AC) is extracted with the help of a shared secret key and verified its originality by comparing it with a shared INFO matrix. Here, the symmetric property of LBP provides a minimum change in the watermarked image which helps to enhance the quality and authenticate the watermarked image.
In this dissertation, several techniques used in face recognition have been investigated. Besides, a critical problem in face recognition which is illumination variation has been considered. In this dissertation, a fa...
详细信息
The proceedings contain 1408 papers. The topics discussed include: deep gait relative attribute using a signed quadratic contrastive loss;variational capsule encoder;the DeepHealth toolkit: a unified framework to boos...
ISBN:
(纸本)9781728188089
The proceedings contain 1408 papers. The topics discussed include: deep gait relative attribute using a signed quadratic contrastive loss;variational capsule encoder;the DeepHealth toolkit: a unified framework to boost biomedical applications;hierarchically aggregated residual transformation for single image super resolution;occlusion-tolerant and personalized 3D human pose estimation in RGB images;computing stable resultant-based minimal solvers by hiding a variable;semantic segmentation for pedestrian detection from motion in temporal domain;multi-label contrastive focal loss for pedestrian attribute recognition;DmifNet: 3D shape reconstruction based on dynamic multi–branch information fusion;visual localization for autonomous driving: mapping the accurate location in the city maze;Bayesian active learning for maximal information gain on model parameters;and cross-spectrum face recognition using subspace projection hashing.
Thin flexible plates are widely used in various mechanisms such as springs, soft robot bodies and impulse force generators. Previous study proposed a method for estimating the deformation of thin flexible plates by pr...
详细信息
ISBN:
(纸本)9781728172934
Thin flexible plates are widely used in various mechanisms such as springs, soft robot bodies and impulse force generators. Previous study proposed a method for estimating the deformation of thin flexible plates by printing asymmetric and symmetric electro-conductive patterns on them. However, previous method required resistance model of conductive pattern, and the method had estimation errors due to the resistance model. Therefore, in this paper, deformed shape estimation method of thin flexible plate without resistance model is proposed. In this method, constraint conditions such both edge angles and buckling distance are estimated using resistances of conductive pattern. Then, the deformation shape is estimated from constraint conditions. In this paper, this measurement flow is simulated. Simulation results showed that the better function for calculate the relationship between constraint conditions and resistances is second degree of multivariable polynomial. We find the deformed shape estimated from the resistance values of the conductive patterns are consistent with actual deformation shape in the simulation. It confirm that the deformation shape can be estimated using the proposed estimation method.
This paper examines the human expressive states dependent on facial pictures utilizing a few viable component extraction methods. It reproduces the K-Nearest Neighbor (k-NN) classifier to approve the adequacy of succe...
详细信息
This paper examines the human expressive states dependent on facial pictures utilizing a few viable component extraction methods. It reproduces the K-Nearest Neighbor (k-NN) classifier to approve the adequacy of successful capabilities separated from the Local Binary pattern (LBP) and Histograms of Oriented Gradients (HOG) for the said task. An examination of the strategies has been made dependent on the normal acknowledgment precision of the classifiers utilizing the calculation unpredictability as a compromise. The component extraction methods have been approved for their discriminative force under various preparations for testing information division proportions, Kappa Coefficient, and order time. The LBP has outperformed the HOG include extraction strategy with a normal precision of 79.6% yet remains computationally costly. On the contrary, the HOG method has furnished a lower characterization time with a normal precision of 59.3 % as uncovered from our outcomes.
Targeting proposing a web based checking strategy for infiltration status in MIG welding, discernible bend sound sign under halfway entrance, precarious infiltration, full infiltration and extreme entrance over the sp...
详细信息
暂无评论