The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The use of autonomous drones in industrial inspection is gaining momentum with improvements in hardware and control. Considering the availability of historical data as drones gather information by regular sorties, a new opportunity for change detection is emerging for inspection and maintenance. In this paper, we propose a visual change detection framework using multi- scale super pixel approach....
Stress has become a household term for which ascertaining a meaning has become increasingly difficult these days. Physiologically, stress is observed to act through hypothalamus which modulates the autonomic nervous system mainly via sympathetically mediated effects. Utilizing this theory, a model based inference engine was developed for the estimation of stress. A computational model was used to...
In this era of digitization, there are many applicationswhich can be used for sharing videos to a group ofpeople around the world in real time. During the acquisitionof real time data, many sensitive information also gets captured along. This poses a threat to privacy of data. In this paper, we consider the scenario of real time sharing of video from multiple sources to multiple end users through...
In case of disasters such as cyclones, earthquakes, severe floods etc., widespread damages to infrastructures such as power grid, communication infrastructure etc. is commonplace. Especially to power grid, the damages to various structures are typically spread out in wide areas. Usage of drones to do fast remote survey of damage area is gaining popularity. From the remote surveillance video of any...
To design measurement systems, appropriate data models and measurement models need to be defined, which can be used for instrument calibration. Data and measurement models using the Wigner-Ville distribution are proposed for measurement of events on vehicular accelerometer data, which is a self-similar non-stationary random process. Model variables and parameters are defined which can be chosen to...
At the outset, Augmented Reality (AR) technology in mobile applications is heavily leveraged. Mobile AR, as it is called is gaining popularity across all domains. This makes content security a prime area of concern. Hence it is inherent that the security and privacy concerns need to be addressed. In this paper, we propose “SMART” (Secure Mobile Augmented Reality for Tele-Assistance), a system which...
Secure distribution of software among an exclusive set of subscribers is an important problem in the IT industry. Software licensing is a tool to combat piracy by provisioning legitimate users with the license file to access the software. Existing licensing schemes are prone to license key confiscation and bypassing of license validation code attacks by software pirates. To counter piracy, the validation...
Mobile Augmented Reality (MAR) is an emerging field with a wide variety of applications involving the intricate challenges of computer vision. However, Mobile Augmented Reality for Inspection and Tele-Assistance (MARITA) is a relatively unknown entity which opens up new challenges in the field of wireless communications along with the existing computer vision hurdles. MARITA aims at providing augmented...
3-D modeling of aerial wireless coverage is an important requirement for many an applications of UAVs. Typically such model is used in communication-aware path planning of the vehicle. When the surveillance area is vast, such as that of long linear utility infrastructures e.g. power grids, oil and gas pipelines, railway corridors etc., signal coverage is quite sparse due to lack of transmitters in...
Privacy Enhancing Techniques (PET) are key to the success in building the trust among the users of the digital world. Enhancing the communication privacy is getting attention nowadays. In this direction, anonymity schemes such as mix, mix networks, onion routing, crowds etc., have started in roads into the deployment at individual and community network levels. To measure the effectiveness and accuracy...
The suitability of using Qualitative Probabilistic Networks (QPN) for knowledge modeling and inference in Cognitive Wireless Networks is studied in this paper. This can be considered as a light weight approach compared to the complexity associated with the use of Bayesian Networks. This study brings out the advantages and issues involved in using QPN for modeling the dynamic behavior of wireless networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.