In this paper we explore features for text detection within images of scenes containing other background objects using a Support Vector Machine (SVM) algorithm. In our approach, the Haar-like features are designed and...
详细信息
ISBN:
(纸本)9784901122092
In this paper we explore features for text detection within images of scenes containing other background objects using a Support Vector Machine (SVM) algorithm. In our approach, the Haar-like features are designed and utilised on banks of bandpass filters and phase congruency edge maps. The designed features with SVM leverages the properties of text geometry and colour for better differentiation of text from its background in real world scenes. We also evaluate the contributions of the features to text detection by the SVM coefficients, which leads to time-efficient detection by using an optimal subset of features.
In this paper, we investigate some issues related to real-time processing for independent component analysis (ICA), based on gradient learning with simultaneous perturbation stochastic approximation (SPSA). Real-time ...
详细信息
ISBN:
(纸本)0769522165
In this paper, we investigate some issues related to real-time processing for independent component analysis (ICA), based on gradient learning with simultaneous perturbation stochastic approximation (SPSA). Real-time ICA processing is especially necessary for an application in dynamic mixing environment, since a batch type of ICA processing can work well only in a static or stationary mixing environment. Although there are many choices for an ICA object function to which SPSA can be applied, in this paper, we choose a diagonality of the non-linear correlation matrix as our object function. Theories and implementations of the algorithm are described. Results of computer simulation are also presented to demonstrate the effectiveness.
Peculiarity rules are a new type of interesting rules which can be discovered by searching the relevance among peculiar data. A main task of mining peculiarity rules is the identification of peculiarity. Traditional m...
详细信息
With the increasing demand for enhanced security, iris biometrics-based personal identification has become an interesting research topic in the field of pattern recognition. While most state-of-the-art iris recognitio...
详细信息
With the increasing demand for enhanced security, iris biometrics-based personal identification has become an interesting research topic in the field of pattern recognition. While most state-of-the-art iris recognition algorithms are focused on preprocessing iris images, important new directions have been identified recently in iris biometrics research. These include optimal feature selection and iris pattern classification. In this paper, we propose an iris recognition scheme based on Genetic Algorithms (GAs) and asymmetrical Support Vector Machines (SVMs). Instead of using the whole iris region, we elicit the iris information between the collarette and the pupillary boundaries to suppress effects of eyelids and eyelashes occlusions, and pupil dilation, and to minimize the matching error. To select the optimal feature subset together with increasing the overall recognition accuracy, we apply GAs with a new fitness function. The traditional SVMs are modified into asymmetrical SVMs to handle: (1. highly unbalanced sample proportion between two classes, and 2) different types of misclassification error that lead to different misclassification losses. Furthermore, the parameters of SVMs are optimized in order to improve the generalization performance. The proposed technique is computationally effective, with recognition rates of 97.80% and 95.70% on the Iris Challenge Evaluation (ICE) and the West Virginia University (WVU) iris datasets, respectively.
This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES'05 Workshop. These were transcribed from hand-written notes. 1.9; Springer-Verlag Berlin Hei...
详细信息
Paper, glass, fruit, scrap metal equipment, and other materials have become domestic garbage as people's living standards have dramatically improved. Plastic trash, including bags, and disposable lunch boxes, has ...
详细信息
The aspiration of this research is to explore the impact of non-similar modeling for mixed convection in magnetized second-grade nanofluid *** flow is initiated by the stretching of a sheet at an exponential rate in t...
详细信息
The aspiration of this research is to explore the impact of non-similar modeling for mixed convection in magnetized second-grade nanofluid *** flow is initiated by the stretching of a sheet at an exponential rate in the upward vertical *** buoyancy effects in terms of temperature and concentration differences are inserted in the x-momentum *** aspects of heat and mass transfer are studied using dimensionless thermophoresis,Schmidt and Brownian motion *** governing coupled partial differential system(PDEs)is remodeled into coupled non-similar nonlinear PDEs by introducing non-similar *** numerical analysis for the dimensionless non-similar partial differential system is performed using a local non-similarity method via ***,the quantitative effects of emerging dimensionless quantities on the nondimensional velocity,temperature and mass concentration in the boundary layer are conferred graphically,and inferences are drawn that important quantities of interest are substantially affected by these *** is concluded that non-similar modeling,in contrast to similar models,is more general and more accurate in convection studies in the presence of buoyancy effects for second-grade non-Newtonian fluids.
This paper provides a description of the programming language Pascal. It has been published to enable those without easy access to the official BSI ‘draft for comment’ to comment on the description.
This paper provides a description of the programming language Pascal. It has been published to enable those without easy access to the official BSI ‘draft for comment’ to comment on the description.
Cost estimation is a critical issue for software organizations. Good estimates can help us make more informed decisions (controlling and planning software risks), if they are reliable (correct) and valid (stable). In ...
详细信息
Porting an application written for personal computer to embedded devices requires conversion of floating-point numbers and operations into fixed-point ones. Testing the conversion hence requires the latter be as close...
详细信息
暂无评论