The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a facial expression recognition based on contourlet features and a regularized discriminant analysis (RDA)-based boosting algorithm. The proposed method utilizes a RDA-based boosting algorithm with effective contourlet features to recognize the facial expressions. Entropy criterion is applied to select the informative contourlet feature which is a subset of informative and nonredundant...
The following topics are dealt with: digital content; digital life; e-learning; Web service; HCI; information security; mobile computing; wireless communication; vehicular technology; image processing; computer graphics; multimedia technologies; computer architecture; SoC; embedded systems; artificial intelligence; knowledge discovery; fuzzy systems; computer networks; Web technologies; biomedical...
Home care for the elders who live alone is considered in this research. We focus on the movements of the elders at home. The RFID technology is used to collect the movement data first. Active RFID tags are deployed in the home environment. The elder carries a reader that can detect the signals sent from the tags in real time. The collected signals give us the movements of the elder at home. Clustering...
Cases of physical and mental diseases caused by stress and negative emotions have increased annually. Many emotion recognition methods have been proposed. Facial expression is widely used for emotion recognition. However, since facial expressions may be expressed differently by different people, inaccurate results are unavoidable. Nerve and Physiological responses are incontrollable native response...
Emotions evoked by were analyzed. An estimation of the correlation coefficient was applied to determine features of music that evoke an emotion. These features were then used to train two support vector machines (SVMs) for an individual subject to classify music that evokes happiness, anger, sadness, and peacefulness. The proposed approach can be used to classify music that evokes an emotion and to...
Due to the high robustness, Active Appearance Model algorithm (AAM) has been adopted to find face feature points. However, if the initial position of the AAM does not properly cover these feature points, AAM will converge to an illogical location. To resolve this problem, this paper develops salient region constraints on AAM initialization for facial feature extraction. In this approach, we first...
Halftone visual cryptography is an encryption mechanism that a secret image is encoded into halftone shares for showing meaningful images. You only need to superimpose part of these share images. Then, images can be shown the original confidential. In this paper, we propose an encoding scheme to improve the efficiency of visual secret sharing technology. We use the relative location information of...
Video security is one of multi-view video applications. However the current multi-view video coding (MVC) software does not contain any rate control technique, this paper proposes a rate control algorithm for MVC based on the quadratic rate-distortion (R-D) model. The proposed algorithm adopts the fluid-flow traffic model, HRD (hypothetical reference decoder) and linear prediction model of MAD (the...
In this paper, a robust watermarking scheme using singular value decomposition (SVD) and quantization is proposed. The SVD technique is used to extract important features from a host protected image; the important features are preserved in the singular values which are resistant to a rotation attack. Due to the sensitivity of singular values, the quantization technique is applied to find an appropriate...
Digital watermarking is an effective and popular technique to disapprove illegal copying and distribution of copyrighted digital content. One of the important issues of watermarking is the robustness subject to resist the lossy compression of the watermarked image. In addition, in JPEG quantification, there is a question which is that the two similar DCT coefficients will be quantified to the same...
In this paper, we will propose a data hiding method to embed the color information into the grayscale image and then only authorized users can recover the original color image. At the same time, according to the viewer's reliability, image owners can distribute the different embedding color image information. In other words, they will assign the more closer to the original image color information...
This paper uses GNU Radio and USRP boards to implement a feasibility study of using FM radio for data transmission in vehicular networks. Specifically, it implemented packet transmission with GNU Radio, USRP boards and FM radio (88MHz~108MHz) and observed the packet loss rate, packet correct rate with different distances.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.