The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: multimedia technology; digital content; image processing; wireless network; open source software; e-learning; digital watermarking; and wavelet transform.
Hidden Markov Models have been widely used, which are usually considered as a set of states with Markovian properties and observations generated independently by those states. This kind of considerations may have confusion and thus needs improvement from the viewpoint of formalization. Moreover, there are different definitions for Hidden Markov Models, the relations between them also needs clarification...
Based on sliding window technology a robust video watermarking algorithm was proposed in this paper. The watermarks are designed to be encoded in AVS video streaming and be decoded or detected without the original video clips. That is the proposed algorithm is a blind video watermarking for AVS. In order to minimize the loss of video quanlity, the proposed scheme only embeds the watermarks in the...
This paper proposes a simple but practical Gaussian-distributed pseudo-random number generator. The features of this generator include a compact architecture based on a decimator connected linear feedback shift register, Gaussian-distributed N-bit random number output, long period of a random number sequence, and good statistical properties.
The fingerprint database calls for the valid compression algorithm of the storage and transmission. Wavelet Scale Quantization (WSQ) is commonly adopted for the general image compression, however, it dose not sufficiently take account of the ridge texture character. Above all, this paper proposes a matrix optimization model for the image compression and reconstruction (MOMICR). In succession, we put...
In order to achieve secure access to color medical image, a symmetric color medical image encryption is proposed in this paper. The proposed algorithm is base on combination of scrambling and confusion processes. 2D lower triangular map used for scrambling the addresses of image pixels, and the proposed propeller algorithm is used to confuse the gray values of image pixels. A number of security analyses...
For the combination optimization problem, it is difficult to describe the updating of the particles by using standard particle swarm optimization algorithm. On account of this problem, an improved particle swarm optimization algorithm is proposed in this paper which combined with genetic algorithm and adopts information-sharing strategy, in addition to this, the lowest horizontal search algorithm...
Watermarking techniques have been proposed to solve the problem of copyright protection and authentication of digital media. In this paper, a robust blind lossless watermarking scheme is proposed that is based on similarity between DCT coefficients of original image and watermark. The watermark extraction procedure does not require the original image and extracts the watermark by using the secret...
As a result of increasing parameters and different conditions in traffic light control domain, modeling and updating this domain enables traffic agents to understand the environment better and make decisions effectively. By considering this viewpoint, firstly, we propose a fuzzy traffic light ontology which is made manually based on traffic standards and expert's knowledge. Next, an intelligent agent...
We propose an efficient method of multi-rate and multimedia communication using self-encoded spread spectrum with iterative detection (SESS ID). SESS ID is a novel approach to multi-rate multimedia system due to its unique nature of spreading method. We compare the SESS multi-rate system with other conventional spread spectrum such as m-sequence and Gold codes. SESS with iterative detection outperforms...
Dangling pages are one of the major drawbacks of page rank algorithm which is used by different search engines to calculate the page rank. The number of these pages increasing with web as the source of knowledge. However search engines are the main tools used in knowledge extraction or Information retrieval from the Web. We proposed an algorithm to handle these pages using a hypothetical node and...
“Education-based social game” means the social game which has the educational significance. The most difference is that it need a few real friends to participate in the community and experience the activities. The researchers use “happy farms” as the introduction of the Integrated Practice Course of “recognizing common eating plants”. Results reveals that Education-based social game can completely...
This paper is concerned with the Improving Space Time Diversity In a Fixed Point-to-Point link Using LMS Based Interference Cancellers, carrying SDH signals with 30 MHz channel spacing. A system model is presented based on a proposal to achieve higher spectral efficiency and data rates. Signals are modulated with 8 QAM & with 64 schemes, and Reed Solomon codes are used for error control coding...
Digital watermarking is a technique that can embed identity information and secrecy information into images. For copyright protection and content authentication of digital color image, A Blind Watermarking Algorithm for Color Image based on Singular Value quantization (SVD) in DWT Domain is proposed in this paper. Firstly, the blue component of the original color image is decomposed with DWT, then,...
Web page segmentation is an important technology for web-driven applications such as search engine and web browser on mobile device. Currently, the researches in this field attempted to mine the features of visual presentation and document structure, but it is difficult to choose proper features to obtain a precise result. The approach which focuses on either vision-based method or DOM structure analysis...
Blogs-Online digital diary like application on web 2.0 has opened new and easy way to voice opinion, thoughts, and like-dislike of every Internet user to the World. Blogosphere has no doubt the largest user-generated content repository full of knowledge. The potential of this knowledge is still to be explored. Knowledge discovery from this new genre is quite difficult and challenging as it is totally...
Based on interest keypoints extracted as salient space-time volumes, human-action can be described as a “bag of visual words”. This representation has been frequently used in the classification of image and video data. The representation choices regarding the dimension, selection, and weighting of visual words are crucial to the classification performance. In this paper, we address the problem of...
Content-Based Video Retrieval has been a challenging problem and its performance relies on the modeling and representation of the video data and the underlying similarity metric. Most existing metrics evaluate pairwise shot similarity based only on shot perceptual content, which is denoted as content-based similarity. In this study, our concern is to recognize and detect video events that are “semantically...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.