The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a new scheme to enhance security of wireless gateway node is presented. In proposed scheme, analysis of implementing counter with cipher block chaining message authentication code on field programmable gate array has been proposed. Preliminary results show that proposed scheme does not have application dependency and have potential to be integrated with any application of wireless sensor...
In field of image processing and pattern recognition, the use of edges as a feature is significant for feature extraction owing to its simplicity and accuracy. Its areas of application vary from object recognition to satellite based terrain recognition. There are many edge detection techniques like the canny edge detector and Sobel edge detector etc. However, the quality of an efficient algorithm...
The idea of safe and smart vehicles has been thoroughly researched over the past decades to ensure drivers' safety from possibly dangerous situations. This paper presents a brief review of different applications of image processing and computer vision techniques in smart vehicles. To detect other on-road vehicles, researchers have approached the problem from various angles; with solutions ranging...
Scale Invariant Feature Transform (SIFT) is widely used in vision systems for various applications such as object detection and face recognition. In SIFT, threshold is applied to determine local extrema (keypoint selection) and global extrema (keypoint refinement). Next, descriptor matching is performed with selected keypoints. This paper presents a new method of adaptive thresholding which improves...
Hand gestures can be used for natural and intuitive human-computer interaction. Our new method combines existing techniques of skin color based ROI segmentation and Viola-Jones Haar-like feature based object detection, to optimize hand gesture recognition for mouse operation. A mouse operation has two parts, movement of cursor and clicking using the right or left mouse button. In this paper, color...
Edge map of an image contains a lot of information about objects in the image. That is why edge detection has been widely used in numerous image processing and vision algorithms. Although there has been a lot of research on this topic, however, most of the practically used algorithms, like a Canny edge detector, still lack basic requirement of edge localization. If noise is to be removed by using...
Vehicle recognition techniques are used for recognition of vehicles and to alert driver from dangerous situations that may cause accidents. In this paper, we introduced Difference of BiGaussian (DoBG) based edge detection method. This method is proved to be better than other famous edge based methods like canny edge detector. It was observed that horizontal edges are strong heuristic for vehicle recognition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.