Learn More
In this paper, we propose a data driven approach to text segmentation, while most of the existing unsu-pervised methods determine segmentation boundaries by empirically exploring similarity measurement between adjacent units (e.g. sentences). Firstly, we train a latent Dirichlet allocation (LDA) model with the large scale Wikipedia Corpus to avoid the(More)
Large amount of labeled training data is required to develop robust and effective facial expression analysis methods. However, obtaining such data is typically a tedious and time-consuming task that is proportional to the size of the database. Due to the rapid advance of Internet and Web technologies, it is now feasible to collect a tremendous number of(More)
The potential interference of endocrine disrupting chemicals (EDCs) on aquatic animals and humans has drawn wide attention in recent years. Reports have shown that some organophosphorus pesticides were a kind of EDCs, but their effects on fish species are still under research. In present study, flow cytometry data of HEC-1B cell line showed that(More)
Automatic analysis of facial expressions is rapidly becoming an area of intense interest in computer vision and artificial intelligence research communities. In this paper an approach is presented for facial expression recognition of the six basic prototype expressions (i. e. The approach utilizes the hybrid transform in which consists of two transforms;(More)
A novel Penicillium oxalicum strain YC-WM1, isolated from activated sludge, was found to be capable of completely degrading 100 mg/L of nicosulfuron within six days when incubated in GSM at 33 °C. Nicosulfuron degradation rates were affected by GSM initial pH, nicosulfuron initial concentration, glucose initial concentration, and carbon source. After(More)
The popular i-vector model represents speakers as low-dimensional continuous vectors (i-vectors), and hence it is a way of continuous speaker embedding. In this paper, we investigate binary speaker embedding, which transforms i-vectors to binary vectors (codes) by a hash function. We start from locality sensitive hashing (LSH), a simple binarization(More)