Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
A 3D model watermarking against affine transformation is proposed in this paper. Firstly, the original watermark is embedded in an image, then we compare the watermarked image with the original watermark image and embed the watermark information into three-dimensional mesh model with distance between vertices and the center of a model. The algorithm has strong robustness against attacks, such as scaling,...
Unexpected fall remains the major threat for elderly since it can cause severe consequences. In this paper, an automatic human fall detection approach is proposed using RGB-Depth (RGBD) cameras. Based on the skeleton and joints data, three velocity features and a head-hip height difference feature are extracted within each sliding window. The features are then gradually analyzed and compared to adaptive...
High-quality image denoising is required for many image processing applications. Our work concentrates on portraying a fast noise process method using PCA referring to weaked textured image patches, with patches generated from the noisy image corrupted by zero-mean Gaussian noise. The main contribution lies in the selection of specified blocks. We adopt a new measurement according to the gradients...
CCD / CMOS imaging technology is often used in satellite-based remote sensing. Although the image quality is affected by many factors, most published research work is focused on image blur caused by the satellite movement along its orbit and high frequency movement. In this paper we show that the image can also be distorted due to the swing of the satellite as it moves along its orbit. We simulate...
Deep learning is a hot research topic at home and abroad. In view of the massive 3D model data, a 3D model identification method based on topographic sparse coding is proposed. Firstly, the 3D model is projected to get its three views, and the feature vector is used as the training sample. A complete dictionary is constructed by using the greedy algorithm to train the dictionary, which makes the normal...
This work presents a novel method for human action recognition based on feature level fusion and random projection. The proposed method exploits both spatial-temporal gradient features and Gabor features of the action in video, which helps representing the action more accurately after feature level fusion. Meanwhile, the random projection is employed to reduce the dimensionality of features effectively...
The article proposes a kind of joint relay and antenna selection scheme with the optimal power allocation in full-duplex(FD) cognitive relay network(CRN), including a pair of source and destination node, some FD amplify-and-forward (AF) relays and one primary user. In this work, the transmit (Tx) antenna and receive (Rx) antenna of each relay are selected adaptively. Then, the relay under optimal...
Safe and reliable communication technologies are the key to transmission line monitoring system. Currently, most of system use public network to communicate, condition monitoring data are difficult to transmit to the master station when signal is weak or no. To solve this problem, this paper proposes converged communication mode, that is public network and optical fiber converged. Based on the optical...
Software Defined Network (SDN), a very new idea in networking domain, promises to dramatically simplify network management and enable innovation through network programmability. In spite of significant benefits, this emerging architecture suffers from several security challenges which make it vulnerable to different attacks like denial of service attack, man-in-middle attack etc. In this paper, we...
Running on a size-reduction network simulated by a given large-scale topology can obviously enhance the time efficiency. In this paper, we realize the size-reduction using the input extracting of a network simulator and evaluate the similarity between the size-reduction and given topologies using multiple criterions. The evaluation result verifies that the network simulation with input extracting...
Bluetooth suits for diverse computing and communication devices and becomes a built-in feature in millions of products. One of important problems for Bluetooth nodes is to become aware of their neighbors. Since the process is time consuming it is critical to compute the neighbor discovery timeouts. Therefore the mean and variance of the device discovery time is analyzed considering different magnitude...
In this paper, we have applied Spectrally Modulated Spectrally Encoded (SMSE) framework to design multiple input multiple output (MIMO) waveform. The existing SMSE framework can be used to generate different multi-carrier waveforms by appropriately designing variables including data, coding, orthogonality, windowing, availability of frequency and used frequency components. It has been approved to...
Crowdsourcing is rising as a new framework that enables human workers to solve tasks in the physical world. With spatial crowdsourcing(SC), a major challenge is to assign reliable workers to nearby tasks. The goal of such task assignment process is to maximize the task completion in the face of uncertainty. Two modes of task assignment have been proposed by Kazemi and Shahabi: worker select task(WST)...
In this paper we discuss about 3 general issues on mesh topology in “networks on chip” (NOC): Utilizing multi-level mesh for delay reduction, using route by considering the mesh topology concept, and finally an optimal model of mesh topology named “multi-level mesh topology” which is defined based on 5-layer network model is suggested. In multi-level mesh topology we can see that this architecture...
In recent years, power analysis attacks have caused increasingly serious security threats on cryptographicalgorithm, to solve this problem different researcher has put forward many solutions, and among them the fixed value masking technology is one of the mostly used due to its lower cost and faster speed. Both theoretical and practical results have shown that the masking method has a good resistance...
Based on the study of the AIS (Automatic Identification System) and the video of the inland river in the target identification and tracking, this paper presents an algorithm for automatic identification of ships. The AIS data and video data are fused by Kalman filtering algorithm. We can get the optimal value of ship trajectory, improve the reliability and accuracy of the Inland Waterway Navigation.
Clustering is the technique to partition data patterns into different clusters. In real datasets, there are often a large number of unlabeled data patterns and a small number of labeled data patterns. Clustering technology can group data by using the unlabeled data only, but the accuracy is often poor. Classification can learn a classification model through labeled data. Classification can group data...
Data dependent dissimilarity provides a better closest adaptation than distance measures. When dealing with arbitrary types of data sets especially those with manifold structures, mass-based dissimilarity [1] cannot perform well. Taking the structure into account, this paper introduces a generic structural mass-based dissimilarity which is easily applied to existing algorithms in different missions...
Community detection has been a hot area with the development of modern society. Many community detection algorithms have been proposed to detect communities in complex networks. But efficiency is still a great challenge for community detection algorithms. In this paper, we propose a fast community detection algorithm. Our algorithm first constructs initial communities according to the similarity between...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.