The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper present a novel algorithm for cartoon image segmentation based on the simple linear iterative clustering (SLIC) superpixels and adaptive region propagation merging. To break the limitation of the original SLIC algorithm in confirming to image boundaries, this paper proposed to improve the quality of the superpixels generation based on the connectivity constraint. To achieve efficient segmentation...
Face detection is an important task in the field of computer vision, which is widely used in the field of security, human-machine interaction, identity recognition, and etc. Many existing methods are developed for image based face pose estimation, but few of them can be directly extended to videos. However, video-based face pose estimation is much more important and frequently used in real applications...
Active Contour method has been shown very effective in detecting the contour of region(s)-of-interest(ROI) and is widely used in image processing and computer vision. In this work, we aim to improve the performance of Zhang's method in detecting boundary of ROIs. Specifically, we will generalize the CV energy functional and give a new special case. The new energy functional penalize the approximation...
We have reduced the number of lifting steps in the calculation of the two-dimensional discrete wavelet transform by factoring the underlying lifting scheme into a new spatial form. Compared with recently proposed non-separable structure, we have reduced also the number of operations. Our scheme is primarily designed for CDF 5/3 and CDF 9/7 wavelets employed in JPEG 2000 image compression standard...
With regard to the problems of traditional sparse array antenna imaging approach, since azimuth sampling insufficient of echo signal, it will cause poor resolution such as low resolution, serious main lobe expansion and side lobe jamming, 3D imaging approach of sparse array antenna based on compressed sensing is proposed. Based on Linear array antenna mode, sparse banded observer is designed, and...
Early detection of breast cancer plays an important role in reducing the mortality rate of the disease. Dynamic contrast-enhanced magnetic resonance imaging (DCE-MRI) of the breast is especially robust for the diagnosis of cancer in high risk women due to its high sensitivity. Despite excellent sensitivity of DCE-MRI, there is still some difficulty in the prediction of malignancy because of the lack...
Thyroiditis is a health disorder and it refers to “inflammation of the thyroid glands”. Once a thyroid nodule has been detected (or suspected), the first test that is routinely being performed is the fine needle aspiration (FNA) biopsy (invasive). This test result is helpful in the classification of the nodule being benign or malignant with the aid of bio-markers. Another common test is the Ultrasound...
Feature extractor plays an important role in visual tracking due to the changing appearance of the object. In this paper, we propose a novel approach in correlation filter framework, which decomposes the task of tracking into translation and scale estimation. We employ two correlation filters with hierarchical convolutional features to estimate the translation. Furthermore, we use a discriminative...
Longitudinal rip of conveyor belts is a serious threat to safety production. Based on the machine vision technology, an algorithm used to find longitudinal rip of belts on-line from gray belt images directly is proposed. A gray image is first translated into a unidimensional vector. The unidimensional vector is further analyzed to obtain rip eigenfunctions. Then, faults of longitudinal rips are diagnosed...
Breast cancer is one of the leading causes of death in women worldwide. Therefore, ultrasound examination has become an important method of detecting breast tumors. However, given the special features of ultrasonic imaging, lesion segmentation is a challenging task in computer-aided diagnosis systems. In this study, we proposed a complex and automated approach to segment breast ultrasound images....
Visual secret sharing (VSS) by random grids (RG) has gained much attention since it can avoid pixel expansion problem without codebook design. However, the previous RG-based threshold VSS schemes still suffer from low visual quality or no threshold. Even the more shares are stacked, the worse reconstructed secrets are revealed. In this paper, a new quality-adaptive threshold RG-based VSS with improved...
The three-dimensional high efficiency video coding (3D-HEVC) is an emerging standard to compress multi-view video plus depth (MVD) data. In 3D-HEVC, many new approaches are developed for depth intra coding. In addition to the 35 intra prediction modes inherited from HEVC, depth modeling modes (DMMs) are also employed to better preserve the object edges, which improve the coding efficiency significantly,...
Detecting infrared pedestrian in outdoor smart video surveillance is always a challenging and difficult problem. Although there have been many methods based on histograms of oriented gradients (HOG) to solve this problem, they would probably fail because of shelter and poor quality of image. To overcome this problem, we propose a robust feature to describe pedestrian which is called entropy-edge weighted...
With the development of optical character recognition research, many techniques for printed character recognition have been developed. But the character recognition study for the New Tai Lue has lagged behind. As a result, the digital processes of New Tai Lue have been in troubles. To solve this problem, this paper proposed a printed New Tai Lue character recognition method based on the Back Propagation...
Based on embedded Linux system, data transmission system for weapon's exterior ballistic speed measurement radar is studied based on the ARM Cortex-A9, communication interface is designed based on ARM and FPGA, the specific hardware design and the character device driver design are proposed, using interrupts and DMA technology. Data can be transferred high-speed and correctly, the test result shows...
Entanglement-assisted quantum error-correcting codes are not only theoretically interesting, but also of great importance in practical physically applications. In this work, two class of entanglement-assisted quantum codes are constructed. The first class of entanglement-assisted quantum codes is minimal ebits entanglement-assisted quantum codes, which require only one copy of maximally entangled...
Pseudorandom sequences have important applications in information security, and the generation method of pseudorandom sequence is an important hotspot of research. Because of owning the large amount of the Knight-tour Hamilton cycles in large size Knight-tour graph, a method based on SemiHam algorithm to generate pseudorandom sequence is proposed in this paper. Firstly, use SemiHam algorithm to produce...
It is natural way to write Chinese characters by digital pen for foreign students, whose handwriting information is much richer than digital image. Stroke matching is the prerequisite to analyze handwriting errors of Chinese character. Present research hardly delivers the optimal solution of the problem on the growing sizes and complexity because of wide differences among learners' writing qualities...
Existing quality assessment methods of contrast-distorted images have excellent performance by obtaining information of reference images. However, in actual life, there are not any reference images. To deal with this problem, we propose a simple yet promising no-reference quality assessment algorithm based on the human perception features for contrast-distorted images. First, human visual perception...
A non-cooperative source localization method utilizing the time difference of arrival (TDOA) of a rotating short baseline on a single observer is proposed in this paper. The localization bias caused by constant TDOA measurement bias is analyzed. It can be proved that this localization bias can be auto-eliminated when the sum of baseline orientation vectors that correspond with all TDOA measurements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.