The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we develop and evaluate a robust single-lead electrocardiogram (ECG) delineation systemand waves localization method based on nonlinear filteringapproach. This system is built in two phases. In the firstphase, we proposed a mathematical model for detectingECG features like QRS complex peak, P and T-wavesonsets and ends from noise free of synthetic ECG signal. Later, we develop a theoretical...
Barcodes have been widely popular. Their popularity has encouraged an ongoing invention of decoding methods. Barcodes can be categorized into 2 main groups, namely one-dimension (1D) barcodes at which information is stored horizontally and two-dimension (2D) barcodes which contain information in both vertical and horizontal direction, promising a higher storage capacity compared to 1D barcodes. Despite...
This paper presents the design of an applicationfor engagement with audiovisual digital cultural heritage inthe classroom, called the Carrot. The aim of this interactivetool is to make online cultural heritage accessible andunderstandable for students in different levels of education. In relation to this work we pose two research questions: Whydo we need to develop tools for contextualization ofaudiovisual...
The recent availability of low cost wearable augmented reality (WAR) technologies is leveraging the design of applications in the cultural heritage domain in order to support users in their emotional journey among the cultural artefacts and monuments of a city. In this paper, we describe a user study evaluating the usability of a wearable augmented reality touchless interface for the enjoyment of...
Virtual reconstruction of cultural heritage is limited to the availability of reference materials. This study looks at the state of preservation and archiving of cultural heritage in the Southeast Asia region through reviewing 2 cases in Malaysia. Many iconic heritage buildings were demolished in this country during the past decades without being properly achieved for the future generations. Despite...
Vulnerability assessments are best practices for computersecurity and requirements for regulatory compliance. Potentialand existing security holes can be identified during vulnerabilityassessments and security breaches could be averted. However, the unique nature of cloud computing environmentsrequires more dynamic assessment techniques. The proliferationof cloud services and cloud-aware applications...
Campania is one of the most important region of Italy for its Cultural Heritage, in fact UNESCO has already declared five World Heritage Sites and many others, considered "minor", that are not adequately promoted in spite of their high artistic value. Cultural Heritage is an inestimable resource that should be protected, preserved and promoted by "inserting" it in the digital ecosystem...
In this paper we offer a preview of the pilot project in progress at the "Paolo Orsi", the Syracuse Regional Archaeological Museum (Italy). Thanks to a free partnership with Google Business Photos/Street View Indoor, we managed to map the entire museum, the only archaeological museum in South Italy that can be visited online on a 360° tour on a Google platform, an unicum on Google Maps....
In the era of social networks, gene sequencing, and big data, a new class of applications that analyze the properties of large graphs as they dynamically change over time has emerged. The performance of these applications is highly influenced by the data structures used to store and access the graph in memory. Depending on its size and structure, update frequency, and read accesses of the analysis,...
The use of association rules extracted from daily geophysical measures allows for the detection of previously unknown connections between events, including emergency conditions. While these rules imply that the presence of a given symbol occurs while a second one is present, their classification performance may vary with respect to test data. We propose to build strong classifiers out of simpler association...
Inconsistency measure is an activity related to the ontology evolution. Being a coherent entity, an ontology must change and a modification operation in ontology could generate inconsistencies in its other parts. It is then important to measure these inconsistencies and follow the impact propagation. In this paper, we propose an inconsistency measure of an ontological change and its propagation effects...
A partial face recognition strategy based on template matching is proposed in this paper. In real-world face recognition applications such as surveillance or forensics images only a small part of face image is available. In the proposed approach in this paper, instead of comparing the small sub-image to the complete face images in the database, a template matching technique finds face parts on the...
Contamination may appear in various stages of hard disk manufacturing including the head gimbal assembly. Currently, the detection of contamination requires manual intervention. An image based automatic contamination detection strategy is therefore presented. After a preprocessing step, the contamination detection algorithm first detects potential areas of contamination using circle detection. Then,...
High efficiency video coding (HEVC) improves coding efficiency significantly relative to previous standards. But the computational complexity also increases drastically. Much of the complexity increase is due to the intra coding. In this paper, we propose a novel algorithm which utilizes the similarity among the reference samples to accelerate the intra mode decision. The encoding time saving can...
Human face detection plays an important role in various biometric applications such as crowd surveillance, photography, human computer interaction, tracking, automatic target recognition and many security related areas. Varying illumination conditions, color variance, brightness, pose variations are major challenging problems for face detection. This paper proposes a localized approach for face detection...
In Computer Vision, Visual Surveillance or in caseof Intelligent Transportation System, one of the most challengingtasks is the extraction of moving object or foreground extraction. Background Subtraction is the most intuitive method using singlefixed threshold for foreground extraction. Some techniques makeuse of correlated nature of RGB intensities, but can't resolvethe ambiguities of using a single...
Finger vein biometric systems have shown a vulnerability to presentation attacks (or direct attack or spoof attack). The presentation attacks have raised crucial security issues for finger vein biometric systems mainly due to the widespread application of these biometric sensors in the financial sector. In this paper, we present a novel algorithm to detected the presentation attack on a finger vein...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.