A new method for rare feature extraction in patent documents

Author(s):  
Mengzhuo Guo ◽  
Hua Yuan ◽  
Yu Qian
2010 ◽  
Vol 41 (10) ◽  
pp. 29-37 ◽  
Author(s):  
Zhixiong Li ◽  
Xinping Yan ◽  
Chengqing Yuan ◽  
Jiangbin Zhao ◽  
Zhongxiao Peng

2019 ◽  
Vol 277 ◽  
pp. 01012 ◽  
Author(s):  
Clare E. Matthews ◽  
Paria Yousefi ◽  
Ludmila I. Kuncheva

Many existing methods for video summarisation are not suitable for on-line applications, where computational and memory constraints mean that feature extraction and frame selection must be simple and efficient. Our proposed method uses RGB moments to represent frames, and a control-chart procedure to identify shots from which keyframes are then selected. The new method produces summaries of higher quality than two state-of-the-art on-line video summarisation methods identified as the best among nine such methods in our previous study. The summary quality is measured against an objective ideal for synthetic data sets, and compared to user-generated summaries of real videos.


2019 ◽  
Vol 9 (19) ◽  
pp. 4086 ◽  
Author(s):  
Yongjun Lee ◽  
Hyun Kwon ◽  
Sang-Hoon Choi ◽  
Seung-Ho Lim ◽  
Sung Hoon Baek ◽  
...  

Potential software weakness, which can lead to exploitable security vulnerabilities, continues to pose a risk to computer systems. According to Common Vulnerability and Exposures, 14,714 vulnerabilities were reported in 2017, more than twice the number reported in 2016. Automated vulnerability detection was recommended to efficiently detect vulnerabilities. Among detection techniques, static binary analysis detects software weakness based on existing patterns. In addition, it is based on existing patterns or rules, making it difficult to add and patch new rules whenever an unknown vulnerability is encountered. To overcome this limitation, we propose a new method—Instruction2vec—an improved static binary analysis technique using machine. Our framework consists of two steps: (1) it models assembly code efficiently using Instruction2vec, based on Word2vec; and (2) it learns the features of software weakness code using the feature extraction of Text-CNN without creating patterns or rules and detects new software weakness. We compared the preprocessing performance of three frameworks—Instruction2vec, Word2vec, and Binary2img—to assess the efficiency of Instruction2vec. We used the Juliet Test Suite, particularly the part related to Common Weakness Enumeration(CWE)-121, for training and Securely Taking On New Executable Software of Uncertain Provenance (STONESOUP) for testing. Experimental results show that the proposed scheme can detect software vulnerabilities with an accuracy of 91% of the assembly code.


Author(s):  
Donglin Xue ◽  
Jiufen Zhao ◽  
Qinhong Tang ◽  
Shaokun Shi ◽  
Zhifeng Zhao

2005 ◽  
Vol 56 (5) ◽  
pp. 791 ◽  
Author(s):  
M. Palmer ◽  
A. Álvarez ◽  
J. Tomás ◽  
B. Morales-Nin

Individual and population age structures constitute essential knowledge for proper management of commercial fisheries. Despite the important advances made in age determination using otolith growth structures, there is still a need to improve both precision and accuracy. The problem of increasing precision in age estimations has been addressed via increasing automation in the identification of growth marks. However, approaches based on otolith size, weight, perimeter, and related measurements (including contour analysis) have moderate success in age prediction. Likewise, early attempts of image analysis have reported poor results, both in cases of 1D (grey-intensity profiles) or 2D images. Recent developments in image analysis have broken this trend, and fully automatic techniques could be an alternative for routine ageing in the near future. Here, we propose a new method for 2D feature extraction that provides robust numerical descriptors of the growth structures of otoliths.


Sign in / Sign up

Export Citation Format

Share Document