Recent years have seen an explosion in graph data from a variety of scientific, social and technological fields. From these fields, emotion recognition is an interesting research area because it finds many applications in real life such as in effective social robotics to increase the interactivity of the robot with human, driver safety during driving, pain monitoring during surgery etc. A novel facial emotion recognition based on graph mining has been proposed in this paper to make a paradigm shift in the way of representing the face region, where the face region is represented as a graph of nodes and edges and the gSpan frequent sub-graphs mining algorithm is used to find the frequent sub-structures in the graph database of each emotion. To reduce the number of generated sub-graphs, overlap ratio metric is utilized for this purpose. After encoding the final selected sub-graphs, binary classification is then applied to classify the emotion of the queried input facial image using six levels of classification. Binary cat swarm intelligence is applied within each level of classification to select proper sub-graphs that give the highest accuracy in that level. Different experiments have been conducted using Surrey Audio-Visual Expressed Emotion (SAVEE) database and the final system accuracy was 90.00%. The results show significant accuracy improvements (about 2%) by the proposed system in comparison to current published works in SAVEE database.
In the image processing’s field and computer vision it’s important to represent the image by its information. Image information comes from the image’s features that extracted from it using feature detection/extraction techniques and features description. Features in computer vision define informative data. For human eye its perfect to extract information from raw image, but computer cannot recognize image information. This is why various feature extraction techniques have been presented and progressed rapidly. This paper presents a general overview of the feature extraction categories for image.
The [2-aminobenzothiazole]was reacted with [2,4,6 triyhydroxy-acetophenon monohydrate] to give a new ligand [2-N-2,4,6-trihydroxyacetophenonyliden benzothiazole] [H3L]. This ligand was reacted with metal ions ( CoII, NiII,CuII and ZnII) in methanol as solvent with ( 1:2 ) metal : ligand ratio to give a series of new complexes with general formula [ M(H2L)2],(where:M= CoII, NiII ,CuIIand, ZnII).All compounds were characterized by spectroscopic methods ( I.R , U.V – vis,HPLC) atomic absorption, along with chloride content and conductivity measurements. According to the data of these measurements we suggested a tetrahedral
The reaction of poly (vinyl alcohol) (PV A) with Urea in (DMSO)
resulted in uerthanised oxim, wr,ich reacted with diacetylmonoxime in a (DY.ISOfmethanol) to give anew type (N2) polymeric bidentate imine oxime ligand [HL], The ligand was reacted with MCh (where M= Co, Cu, and Hg). Under reflux in a (DMF/Methanol) mixture with (I:1) ratio to give Complexes of the general formula [M (T.)2]X, (where M=
Co,Hg, Cu). All .:ompouncs have been characterized by spectroscopic
methods [IR, U.V.-Vis, A tomi<;absorption] microanalysis along with conductivity measurements, from the above:: data the proposed molecular structure for Co,Cu, and Hg is a
... Show MoreThe reaction of poly (vinyl alcohol) (PV A) with Urea in (DMSO) resulted in uerthanised oxim, wr,ich reacted with diacetylmonoxime in a (DY.ISOfmethanol) to give anew type (N2) polymeric bidentate imine oxime ligand [HL], The ligand was reacted with MCh (where M= Co, Cu, and Hg). Under reflux in a (DMF/Methanol) mixture with (I:1) ratio to give Complexes of the general formula [M (T.)2]X, (where M= Co,Hg, Cu). All .:ompouncs have been characterized by spectroscopic methods [IR, U.V.-Vis, A tomi<;absorption] microanalysis along with conductivity measurements, from the above:: data the proposed molecular structure for Co,Cu, and Hg is a distorted. Tetrahedml
New (pentulose-?-lactone-2,3-enedibenzoate barbituric acid) (L) have been synthesized by reaction of (5-C-dimethyl malonyl-pentulose-?-lactone-2,3-enedibenzoate) with urea in alkaline media (sodium methoxide). (Ca+2, Co+2, Ni+2, Cu+2, Zn+2, Cd+2 and Hg+2) complexes of (pentulose-?-lactone-2,3-enedibenzoate barbituric acid) (L) have been prepared and characterized by (1H and 13CNMR), FTIR, (U.V-Vis) spectroscopy, Atomic absorption spectrophotometer (A.A.S), Molar conductivity measurements and Magnetic moment measurements, and the following general formula has been given for the prepared complexes [MLCl2(H2O)].XH2O, where M = (Ca+2, Co+2, Ni+2, Cu+2, Zn+2, Cd+2, Hg+2), X = five molecules with (Cd+2) complex, L = (pentulose-?-lactone-2,3
... Show MoreA frequently used approach for denoising is the shrinkage of coefficients of the noisy signal representation in a transform domain. This paper proposes an algorithm based on hybrid transform (stationary wavelet transform proceeding by slantlet transform); The slantlet transform is applied to the approximation subband of the stationary wavelet transform. BlockShrink thresholding technique is applied to the hybrid transform coefficients. This technique can decide the optimal block size and thresholding for every wavelet subband by risk estimate (SURE). The proposed algorithm was executed by using MATLAB R2010aminimizing Stein’s unbiased with natural images contaminated by white Gaussian noise. Numerical results show that our algorithm co
... Show MoreTelevision white spaces (TVWSs) refer to the unused part of the spectrum under the very high frequency (VHF) and ultra-high frequency (UHF) bands. TVWS are frequencies under licenced primary users (PUs) that are not being used and are available for secondary users (SUs). There are several ways of implementing TVWS in communications, one of which is the use of TVWS database (TVWSDB). The primary purpose of TVWSDB is to protect PUs from interference with SUs. There are several geolocation databases available for this purpose. However, it is unclear if those databases have the prediction feature that gives TVWSDB the capability of decreasing the number of inquiries from SUs. With this in mind, the authors present a reinforcement learning-ba
... Show MoreA security system can be defined as a method of providing a form of protection to any type of data. A sequential process must be performed in most of the security systems in order to achieve good protection. Authentication can be defined as a part of such sequential processes, which is utilized in order to verify the user permission to entree and utilize the system. There are several kinds of methods utilized, including knowledge, and biometric features. The electroencephalograph (EEG) signal is one of the most widely signal used in the bioinformatics field. EEG has five major wave patterns, which are Delta, Theta, Alpha, Beta and Gamma. Every wave has five features which are amplitude, wavelength, period, speed and frequency. The linear
... Show More