The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a hierarchical framework for detecting and localizing object by components. The system is structured with a root detector and several component detectors that are trained to separately find the object and different parts of the object on the first level. On the second level the spatial relations model performs detection by combining the root detector and the component detectors...
In this paper, an image stabilization method based on the adaptive Gaussian mixture model (GMM) is presented in order to smooth down the airborne image vibration. Firstly, the image edge is enhanced and then projection is adopted to estimate motion; secondly, GMM parameter is obtained after analyzing characteristics of the first n images; finally, a stable image sequence is achieved after GMM motion...
To address copyright protection and content authentication, researchers have proposed various digital watermarking methods. In this paper, an improved, multipurpose method is proposed where the authentication watermark and the robust watermark are embedded in the wavelet transform domain. Through a series of experiment, supportive evidence is provided to demonstrate the proposed method being effective...
Wireless sensor networks have recently gained a lot of attention. Target tracking is a canonical application of wireless sensor networks and task allocation is an unavoidable problem for target tracking. To improve the tracking quality and save more energy, an auction-based dynamic coalition scheme of task allocation for single target tracking in wireless sensor networks was introduced. Furthermore,...
Wireless sensor networks constitute a special kind of ad hoc network. In this paper, we consider the problem of routing between the base station and remote data sources via intermediate sensor nodes in a hierarchical sensor network. Sensor nodes having limited and unreplenishable power resources, both path length and path energy cost are important metrics affecting sensor lifetime. In this paper,...
This paper presents a new model to analyze the channel access delay of 802.11 DCF. Based on this analytical model, the average channel access delay of 802.11 DCF is derived. By means of simulation, the correctness of the analysis is validated, and the channel access delay of 802.11 DCF is further evaluated
Authentication can provide security by preventing unauthorized usage and negotiating the credentials for secure communications. Nevertheless, it induces heavy overhead to communications, further deteriorating the quality of service (QoS). Therefore, analyzing the QoS and security impact of authentication becomes critical to developing efficient authentication schemes. In this paper, we first introduce...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.