The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Localization of an unmanned vehicle, locating it in a three-dimensional space and identifying its acceleration, velocity, position and orientation accurately is a very challenging and demanding task. One of the most common systems used for localization is an Inertial Navigation System, which uses accelerometers and gyroscopes to determine position and orientation of the body in three-dimensional space...
Copy move forgery is a one of the common type of image forgery method. There are different methods of image forgery by copy move. One such method is where a background portion of image is copied and pasted on the foreground object to hide the some information from the image. In this paper we proposed a method for detection of such image tampering with the use of SIFT features and Chan-Vese's approach.
Recognition of dynamic gesture is one of the most challenging tasks in the computer vision. This paper deals with dynamic hand gesture (digits) recognition. The method consist of three fold novel contributions: firstly finding the flow of hand, secondly recognition technique of signs (Dynamic digits) and thirdly classification of gesture. We worked on 11 to 20 (digits) gestures. Spatiotemporal volume...
The problem of high dimensionality has been gaining increased focus in the recent literature on pattern recognition. This is due to the increase in the availability of the high volumes of data in various fields. Multiple sensors are being used to extract the data and each sensor gives multiple features. On the other side performance of a classifier depends on the type of features that are used to...
This paper considered the main limitation of spectral subtraction technique that is, the presence of musical noise in enhanced speech. One of the main reasons for this problem is an incorrect assumption of cross spectral terms involving clean spectrum and noise spectrum as equal to zero. In this paper a new speech enhancement technique based on spectral subtraction is proposed. The principle of proposed...
Image processings applications like in object tracking, medical imaging, satellite imaging, face recognition and segmentation requires image denoising as the preprocessing step. Problem with current image denoising methods are bluring and artifacts introduces after removal of noise from image. Current denoising methods are based on patches of image has well denoisinging ability but implemention of...
This paper introduces linear-in-the-parameters model for strong nonlinear systems such as an ideal voltage comparator. This system characteristics (input-output) are approximated by even mirror fourier nonlinear filter based on Stone-Weierstrass approximation theorem. The performance of the proposed filter compared against the volterra filter for high and low input amplitudes. Also this paper discusses...
Recovering dehazed image from the single underwater image has always been a challenging task. Inspired from dark channel prior, we extend it further to dehaze the underwater images using a single color channel. The red color component undergoes maximum attenuation on account of the longest wavelength and dominates the dark channel prior in the underwater scenario. We developed the algorithm based...
Growth in information technology has increased repository of document images in various organizations, digital libraries and government offices. Logo based document image retrieval provides an easier way of searching and browsing of these documents. Duty noise, large ink blobs and choosing appropriate features are major challenges to implement logo based retrieval of document images. This paper presents...
The use of content based image retrieval system in real life applications is limited because of the semantic gap between the low level and high level image features, used for the image similarity measure. Relevance feedback has been considered as a competent technique to overcome the semantic gap problem. However most of the relevance feedback based algorithms suffer from the problem of imbalanced...
Human age classification via face images becoming an interesting research area because of potential applications in the field of computer vision such as Age Specific Human Computer Interaction (ASHCI), biometrics, security and surveillance, etc. In this paper, a novel method for human age classification using facial skin analysis for aging feature extraction and Multi-class Support Vector Machine...
A tumor is an abnormal growth of new tissue that can occur in any of the body's organs. In recent years, there are many kinds of tumors are detected in the human body like Breast tumor, Bone tumor, Brain tumor, etc. Which are detected manually by doctors, but because of noise and low quality images of infected body parts, the tumor is not detected easily and is time consuming. Medical Imaging technique...
Image matting is an important problem in computational photography. Although, it has been studied for more than two decades, yet there is a challenge of developing an automatic matting algorithm which does not require any human intervention. Most of the state-of-the-art matting algorithms require human intervention in the form of trimap or scribbles to generate the alpha matte form the input image...
Edges are instant change in intensity value of pixels in the digital image. Image edge detection converts original image in to binary image. This binary image contains information about edges of digital image. Recently Ant Colony Optimization Meta-heuristic algorithm is used for the image edge detection. Ant colony optimization algorithm is inspired from the behaviour of real ants. From this ACO based...
The analysis and description of rocks is very well useful in geological industry and also in rock mining. Igneous rock is most abandoned rock in nature. The classification of Igneous rocks in its two types namely Plutonic and Volcanic is a complex and tedious job because of homogeneity between the classes. In geology this classification process has been carried out on the manual basis regularly, requiring...
An ElectroCardiogram (ECG) inter-patient heartbeat time series classification method by a hierarchical system of based on support vector machine and Decision rule, using full heart-beat time series by alignment of R-peaks of all beats, is proposed. PQRST Time series of heart-beats having converted into equal length series by alignment of R-peaks of all heart-beats based on R-peak of largest length...
Wireless capsule endoscopy (WCE) is an immense discovery for Gastrointestinal Tract (GIT) diagnosis and it can visualize complete area in GIT. However, A severe problem associated with this new technology is that there are huge amount of images to be inspected by clinician through naked eyes which causes visual fatigue often and it leads to false detection. Therefore an automatic platform is much...
Structural changes in the choroid, interspersed between the retina and sclera, could indicate various vision impairments. So far, choroidal thickness and volume measured from optical coherence tomography (OCT) scans of the rear part of the eye have found clinical applications. However, such gross measurements do not provide vasculature-specific information crucial in managing various chorioretinal...
In this paper, we are presenting a rotation variant Oriented Texture Curve (OTC) descriptor based mean shift algorithm for tracking an object in an unstructured crowd scene. The proposed algorithm works by first obtaining the OTC features for a manually selected object target, then a visual vocabulary is created by using all the OTC features of the target. The target histogram is obtained using codebook...
Open air transmission is imperative asset of Multi-hop wireless network; which enables malicious attackers to do attacks such as traffic analysis. This motivates enormous need of securing privacy of MWN. The necessity of privacy issue pioneers concept of network coding. To avert traffic analysis attacks it has to be implemented which integrates coding and mixing operation at in-between nodes. Simple...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.