1,284 research outputs found

    Content Recognition and Context Modeling for Document Analysis and Retrieval

    Get PDF
    The nature and scope of available documents are changing significantly in many areas of document analysis and retrieval as complex, heterogeneous collections become accessible to virtually everyone via the web. The increasing level of diversity presents a great challenge for document image content categorization, indexing, and retrieval. Meanwhile, the processing of documents with unconstrained layouts and complex formatting often requires effective leveraging of broad contextual knowledge. In this dissertation, we first present a novel approach for document image content categorization, using a lexicon of shape features. Each lexical word corresponds to a scale and rotation invariant local shape feature that is generic enough to be detected repeatably and is segmentation free. A concise, structurally indexed shape lexicon is learned by clustering and partitioning feature types through graph cuts. Our idea finds successful application in several challenging tasks, including content recognition of diverse web images and language identification on documents composed of mixed machine printed text and handwriting. Second, we address two fundamental problems in signature-based document image retrieval. Facing continually increasing volumes of documents, detecting and recognizing unique, evidentiary visual entities (\eg, signatures and logos) provides a practical and reliable supplement to the OCR recognition of printed text. We propose a novel multi-scale framework to detect and segment signatures jointly from document images, based on the structural saliency under a signature production model. We formulate the problem of signature retrieval in the unconstrained setting of geometry-invariant deformable shape matching and demonstrate state-of-the-art performance in signature matching and verification. Third, we present a model-based approach for extracting relevant named entities from unstructured documents. In a wide range of applications that require structured information from diverse, unstructured document images, processing OCR text does not give satisfactory results due to the absence of linguistic context. Our approach enables learning of inference rules collectively based on contextual information from both page layout and text features. Finally, we demonstrate the importance of mining general web user behavior data for improving document ranking and other web search experience. The context of web user activities reveals their preferences and intents, and we emphasize the analysis of individual user sessions for creating aggregate models. We introduce a novel algorithm for estimating web page and web site importance, and discuss its theoretical foundation based on an intentional surfer model. We demonstrate that our approach significantly improves large-scale document retrieval performance

    Machine Learning Methods Enable Predictive Modeling of Antibody Feature:Function Relationships in RV144 Vaccinees

    Get PDF
    The adaptive immune response to vaccination or infection can lead to the production of specific antibodies to neutralize the pathogen or recruit innate immune effector cells for help. The non-neutralizing role of antibodies in stimulating effector cell responses may have been a key mechanism of the protection observed in the RV144 HIV vaccine trial. In an extensive investigation of a rich set of data collected from RV144 vaccine recipients, we here employ machine learning methods to identify and model associations between antibody features (IgG subclass and antigen specificity) and effector function activities (antibody dependent cellular phagocytosis, cellular cytotoxicity, and cytokine release). We demonstrate via cross-validation that classification and regression approaches can effectively use the antibody features to robustly predict qualitative and quantitative functional outcomes. This integration of antibody feature and function data within a machine learning framework provides a new, objective approach to discovering and assessing multivariate immune correlates.U.S. Military HIV Research ProgramCollaboration for AIDS Vaccine Discover (OPP1032817)National Institutes of Health (U.S.) (3R01AI080289-02S1)National Institutes of Health (U.S.) (5R01AI080289-03)United States. Army Medical Research and Materiel Command (National Institute of Allergy and Infectious Diseases (U.S.) Interagency Agreement Y1-AI-2642-12)Henry M. Jackson Foundation for the Advancement of Military Medicine (U.S.) (United States. Dept. of Defense Cooperative Agreement W81XWH-07-2-0067

    Feature Extraction Methods for Character Recognition

    Get PDF
    Not Include

    Object Segmentation And Recognition Using Gradient Based Descriptors And Shape Driven Fast Marching Methods

    Get PDF
    Tez (Doktora) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2010Thesis (PhD) -- İstanbul Technical University, Institute of Science and Technology, 2010Bu çalışmada, aktif çevrit nesne bölütleyici yöntemlerle birlikte kullanılabilecek yeni bir şekil betimleme ve tanıma sistemi önerilmiştir. Önerilen sistem daha önce yapılan çalışmalar gibi aktif çevriti önceden tanımlı şekillerden birine zorlamak yerine, çevrit nesne sınırlarına yapışırken aynı zamanda şekil betimleme yapmayı amaçlamıştır. Aktif çevrit bölütleyici olarak Hızlı Yürüme (Fast Marching) algoritması kullanılmış, Hızlı Yürüme metodu için yeni bir hız işlevi tanımlanmıştır. Ayrıca çevriti nesne sınırlarından geçtiği sırada durdurmayı amaçlayan özgün yaklaşımlar önerilmiştir. Çalışmanın en önemli katkılarından birisi yeni ortaya atılan Gradyan Temelli Şekil Betimleyicisi (GTŞB) dir [1]. GTŞB, aktif çevrit bölütleyicilerin yapısına uygun, sınır tabanlı, hem ikili hem de gri-seviyeli görüntülerle rahatça kullanılabilecek başarılı bir şekil betimleyicidir. GTŞB nin araç plaka karakter veritabanı, MPEG-7 şekil veritabanı, Kimia şekil veritabanı gibi farklı şekil veritabanlarında elde ettiği başarılar diğer çok bilinen sınır tabanlı betimleyicilerle de karşılaştırılarak verilmiştir. Elde edilen sonuçlar GTŞB nin tüm veritabanlarında diğer yöntemlere göre daha başarılı olduğunu işaret etmektedir. Çalışmada geliştirilen bir diğer önemli yaklaşım da Hızlı Yürüme çevritinin nesne sınırına yaklaşırken örneklenerek şeklin birden fazla defa betimlenmesine olanak veren yeni sınıflandırıcı yapıdır. Bu yaklaşım nesne tanımayı bir denemede sonuçlandıran geleneksel yöntemlerin bu sınırlamasını aşarak aynı nesneyi birçok kez tanıma olanağı sunmaktadır. Bu tanıma sonuçlarının tümleştirilmesiyle tek tanımaya göre daha yüksek başarılar elde edildiği çalışmanın ilgili bölümlerinde başarıları karşılaştıran tablolar yardımıyla gösterilmektedir.In this thesis, a gradient based shape description and recognition methodology to use with active contour-based object segmentation systems has been proposed. The Fast Marching (FM) active contour evolving model is utilized for boundary segmentation. A new speed functional has been defined to use first and second order image intensity derivatives. A local front stopping algorithm has also been proposed to improve the boundary handling performance of the FM model. The most critical improvement of the thesis is defining a new shape descriptor called the Gradient Based Shape Descriptor (GBSD) [1]. GBSD is a new boundary-based shape descriptor that can operate on both binary and gray-scaled images. The recognition performance of GBSD is measured on a license plate character database, MPEG-7 Core Experiments shape data set and Kimia data Set. The success rates are compared with other well-known boundary-based shape descriptors and it is shown that GBSD achieves better recognition percentages. A new recognition approach that utilizes the progressive active contours while iterating towards the real object boundaries has been proposed. This approach provides the recognizer many trials for shape description; it removes the limitation of traditional recognition systems that have only one chance for shape classification. Test results shown in this study prove that the voted decision result among these iterated contours outperforms the ordinary individual shape recognizers.DoktoraPh

    Non-Intrusive Subscriber Authentication for Next Generation Mobile Communication Systems

    Get PDF
    Merged with duplicate record 10026.1/753 on 14.03.2017 by CS (TIS)The last decade has witnessed massive growth in both the technological development, and the consumer adoption of mobile devices such as mobile handsets and PDAs. The recent introduction of wideband mobile networks has enabled the deployment of new services with access to traditionally well protected personal data, such as banking details or medical records. Secure user access to this data has however remained a function of the mobile device's authentication system, which is only protected from masquerade abuse by the traditional PIN, originally designed to protect against telephony abuse. This thesis presents novel research in relation to advanced subscriber authentication for mobile devices. The research began by assessing the threat of masquerade attacks on such devices by way of a survey of end users. This revealed that the current methods of mobile authentication remain extensively unused, leaving terminals highly vulnerable to masquerade attack. Further investigation revealed that, in the context of the more advanced wideband enabled services, users are receptive to many advanced authentication techniques and principles, including the discipline of biometrics which naturally lends itself to the area of advanced subscriber based authentication. To address the requirement for a more personal authentication capable of being applied in a continuous context, a novel non-intrusive biometric authentication technique was conceived, drawn from the discrete disciplines of biometrics and Auditory Evoked Responses. The technique forms a hybrid multi-modal biometric where variations in the behavioural stimulus of the human voice (due to the propagation effects of acoustic waves within the human head), are used to verify the identity o f a user. The resulting approach is known as the Head Authentication Technique (HAT). Evaluation of the HAT authentication process is realised in two stages. Firstly, the generic authentication procedures of registration and verification are automated within a prototype implementation. Secondly, a HAT demonstrator is used to evaluate the authentication process through a series of experimental trials involving a representative user community. The results from the trials confirm that multiple HAT samples from the same user exhibit a high degree of correlation, yet samples between users exhibit a high degree of discrepancy. Statistical analysis of the prototypes performance realised early system error rates of; FNMR = 6% and FMR = 0.025%. The results clearly demonstrate the authentication capabilities of this novel biometric approach and the contribution this new work can make to the protection of subscriber data in next generation mobile networks.Orange Personal Communication Services Lt

    Multimodal magnetic resonance neuroimaging measures characteristic of early cART-treated pediatric HIV: A feature selection approach

    Get PDF
    Children with perinatally acquired HIV (CPHIV) have poor cognitive outcomes despite early combination antiretroviral therapy (cART). While CPHIV-related brain alterations can be investigated separately using proton magnetic resonance spectroscopy

    Anomaly-based Correlation of IDS Alarms

    Get PDF
    An Intrusion Detection System (IDS) is one of the major techniques for securing information systems and keeping pace with current and potential threats and vulnerabilities in computing systems. It is an indisputable fact that the art of detecting intrusions is still far from perfect, and IDSs tend to generate a large number of false IDS alarms. Hence human has to inevitably validate those alarms before any action can be taken. As IT infrastructure become larger and more complicated, the number of alarms that need to be reviewed can escalate rapidly, making this task very difficult to manage. The need for an automated correlation and reduction system is therefore very much evident. In addition, alarm correlation is valuable in providing the operators with a more condensed view of potential security issues within the network infrastructure. The thesis embraces a comprehensive evaluation of the problem of false alarms and a proposal for an automated alarm correlation system. A critical analysis of existing alarm correlation systems is presented along with a description of the need for an enhanced correlation system. The study concludes that whilst a large number of works had been carried out in improving correlation techniques, none of them were perfect. They either required an extensive level of domain knowledge from the human experts to effectively run the system or were unable to provide high level information of the false alerts for future tuning. The overall objective of the research has therefore been to establish an alarm correlation framework and system which enables the administrator to effectively group alerts from the same attack instance and subsequently reduce the volume of false alarms without the need of domain knowledge. The achievement of this aim has comprised the proposal of an attribute-based approach, which is used as a foundation to systematically develop an unsupervised-based two-stage correlation technique. From this formation, a novel SOM K-Means Alarm Reduction Tool (SMART) architecture has been modelled as the framework from which time and attribute-based aggregation technique is offered. The thesis describes the design and features of the proposed architecture, focusing upon the key components forming the underlying architecture, the alert attributes and the way they are processed and applied to correlate alerts. The architecture is strengthened by the development of a statistical tool, which offers a mean to perform results or alert analysis and comparison. The main concepts of the novel architecture are validated through the implementation of a prototype system. A series of experiments were conducted to assess the effectiveness of SMART in reducing false alarms. This aimed to prove the viability of implementing the system in a practical environment and that the study has provided appropriate contribution to knowledge in this field
    corecore