The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Transcoding is an inevitable need that is highly required for the current communication system like telemedicine, education, etc. However, it is not devoid of challenges that occur during retrieval end of format incompatibility. Apart from the massive research work in past on designing efficient transcoder architecture, quality of image resolution in wireless media is found to be quite challenging...
Evaluating the quality of geospatial dataset is an important aspect that needs to be considered in order to improve the quality of results in any project. This issue has become even more critical these days due to the ever growing platforms and services that produce and share Volunteered Geographic Information (VGI) in the world wide domain. In this paper, we introduce the architecture of QualEvS4Geo;...
This paper presents a three-dimensional (3D) motion analysis, motion database construction, and 3D motion visualization of national rider athletes under horse simulator environments. The 3D motion database captured from national rider athletes are constructed by four riding types such as walking, trotting, cantering, and galloping. Finally we cover the motion analysis and evaluation based on the flexion...
In recent years, advanced driver assistance system (ADAS) and intelligent traffic system (ITS) both are popular issues. This paper presents an efficient and accurate roadside sign recognition which can be used to collect traffic sign and point of interest (POI) information by any end-users with smart phones or driving video recorders. In order to achieve high recognition performance for the proposed...
Innovation in computing technology especially in embedded processors capabilities has opened up the boundaries for an enormous potential to facilitate automation in domestic consumer market normally for the sake of added safety and reliability [1][2]. These applications also demand real time processing capabilities for example as required in Surveillance. Although majority of research in computer...
Muscular motion estimation in ultrasound images is of great importance for investigating causes of musculoskeletal conditions in pathological examinations. However, the quality of ultrasound images is usually depressed due to speckle noises and temporal decorrelation of speckle patterns, making certain difficulties in motion estimation. To resolve the problem, this paper presents a new model-based...
In professionel movie post-production, various components are pushed to their performance limits. Former processors for example were not able to playback the JPEG 2000 compressed image-sequences which are used for distribution in Digital Cinema as well as long term storage in digital archiving — in real time. While today's processors are able to decode such files a new bottleneck became part of the...
Network components of an environmental monitoring system comprising conventional sensor nodes and wireless visual sensor nodes are evaluated in this paper. In the context of the CYBERSENSORS research project, we look into its communications aspects and heterogeneous networks it employs. Hardware implementation and simulation tools are used here to derive a number of design guidelines that will help...
TV logo is widely used in copyright protection, video surveillance, etc. Traditionally, TV logo is detected and recognized by pixel-wise template matching, which neither deals well with translucent-static TV logos, nor addresses the scaling problem well. This paper proposes a novel TV logo recognition algorithm, which is composed of three steps. Firstly, the real time TV logo region is detected by...
So far many biometric systems such as fingerprint, palm print and iris have been developed for several years. Nowadays, many researchers are interested in developing new and more efficient biometric systems by using alternative features. In line with this, a newer characteristic that is dorsal hand vein patterns are used to identify an individual because its uniqueness, reliability, permanence and...
Hand vein biometrics is gaining popularity over other biometrics due to its uniqueness and stability. However, the variations of images at image capture process pose a challenge in the performance of a biometric security system. Different processing techniques applied so far on dorsal hand vein images cannot represent the different orientation of the dorsal hand vein patterns at image capture. In...
Internet Voting System (IVS) Using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. It has the flexibility to allow casting of vote from any remote place, even when key stakeholders of election process are not available at workplace. This is enabled by leveraging and implementing the features provided by the VC in IVS. The...
With the rapid development of cloud computing, more and more users begin to share documents in cloud servers. Since cloud servers are not within the trusted domain of users, encryption and access control are needed to protect the digital content. Attribute-based encryption is a favorable scheme that has been used for content protection in cloud computing. It can provide “one-to-many” encryption service...
This paper describes a method aimed at automatically determining security services to be implemented in products, services and devices involved on the Internet of Things scenarios. It is important to consider the specific context, legislative diversity and nature of the information since its main objective is to have correct and fair data processing that avoids users in perceiving any danger to their...
Web services facilitate the sharing of resources between groups within a collaborative environment. Privacy is an important concern when sharing data. Access control can be used to protect privacy by limiting the access privileges to the underlying resources. This paper outlines a framework for applying access control to data providing Web services. The framework makes use of ontologies allowing for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.