The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Monitoring heartbeats takes an important role to ensure a person's health and well-being. Few of the existing systems are accurate, unobtrusive, robust and easy to install at the same time. Thus, we propose a completely unobtrusive system which can detect heartbeats during sleep by sensing the weak ballistic vibrations caused by heartbeats on any bed. The system, HB-Phone, is centered around the off-the-shelf...
Smart wrist devices available today like smart watches and fitness trackers are usually enriched with inertial sensors such as accelerometers and gyroscopes that can be used to capture wrist motions. This opens an opportunity to use these devices for user authentication, exploiting an important biometric trait of a user: the wrist gestures during performing a signature in the air. In contrast to traditional...
Image-based information hiding technology has been extensively studied in recent years. In order to ensure the security of information transmission, image information hiding technology must have the characteristics of transparency, security and robustness. In this paper, an improved image-based information hiding method is proposed, which utilizes the imperceptibility of the human eye to the change...
Infrared small target detection is still one of the key techniques in the infrared search and track systems. We proposed a robust and efficient detection method by exploiting low-rank and sparse representation. We extend traditional low-rank and sparse representation to temporal domain. Initially, we use the proposed method to locate the suspected position of a target in the first frame. Then, we...
In this paper, we propose a robust transductive support vector machine (RTSVM) classifier that is suitable for large-scale data. To this end, we use the robust Ramp loss instead of the Hinge loss for labeled data samples. The resulting optimization problem is non-convex but it can be decomposed to a convex and concave parts. Therefore, the optimization is accomplished iteratively by solving a sequence...
Robustness is an important and challenging issue in internet of things (IoT), where contains multiple types of heterogeneous networks. To solve this problem, we design and realize a greedy model with small world properties (GMSW) for heterogeneous sensor network of IoT. In GMSW, two greedy criteria are presented firstly, which are used to distinguish importance of different network nodes. On the basis,...
The Christmas and new year 2016 are coming, in order to stimulate the future development, explore novel applications, and exchange ideas for developing robust solutions, the 12th International Computer Conference on Wavelet Active Media Technology and Information Processing 2015 (ICCWAMTIP 2015) is held at University of Electronic Science and Technology of China (UESTC) in Chengdu on December 2015...
A generalised Lasso iteratively reweighted scheme is here introduced to perform spatially regularised Hurst estimation on semi-local, weakly self-similar processes. This is extended further to the robust, heavy-tailed case whereupon the generalised M-Lasso is proposed. The design successfully incorporates both a spatial derivative in the generalised Lasso regulariser operator and a weight matrix formulated...
The automated detection of abandoned objects is a quickly developing and widely researched field in video processing with specific application to automated surveillance. In the recent years, a number of approaches have been proposed to automatically detect abandoned objects. However, these techniques require prior knowledge of certain properties of the object such as its shape and color, to classify...
This paper considers the detection of possible deviation from a nominal distribution for continuously valued random variables. Specifically, under the null hypothesis, samples are distributed approximately according to a nominal distribution. Any significant departure from this nominal distribution constitutes the alternative hypothesis. It is established that for such deviation detection where the...
A notion of fc-robustness for complex networks has received much attention recently. The motivation for this notion of robustness is to measure the effectiveness of local-information-based diffusion algorithms in the presence of adversarial nodes. In this paper, we first correct the relationship between fc-robustness and fc-connectivity studied in related work. Then we derive a sharp zero-one law...
The development of quantum information enabled technologies has reached an interesting stage where we can now in principle engineer composite systems to exploit the best properties of these individual systems. Hybridization potentially allows us to undertake operations and tasks that may otherwise prove difficult. Such an example occurs where we couple a superconducting circuit to an electron spin...
In this work, we experimentally evaluate and verify model assumptions for our recently proposed algorithm (practical ReProCS) for recovering a time sequence of sparse vectors St and a time sequence of dense vectors Lt from their sum, Mt := St + Lt, when Lt lies in a slowly changing low-dimensional subspace. A key application where this problem occurs is in video layering where the goal is to separate...
In response to the urgent need for learning tools tuned to big data analytics, the present paper introduces a feature selection approach to efficient clustering of high-dimensional vectors. The resultant method leverages random sampling and consensus (RANSAC) arguments, originally developed for robust regression tasks in computer vision, to yield novel dimensionality reduction schemes. The advocated...
One of the main problems in systems biology is learning gene interaction networks from experimental data. This turns out to be a challenging task as the experimental data is sparse and noisy, and network learning algorithms are computationally intense. Bayesian Networks (BN) have become a popular choice for learning such networks as BNs avoid overfitting and are robust to noise. In this paper we build...
Design of a robust multimedia watermarking is a complex task, as there exists trade-off among robustness, perceptibility and achievable rate of reliable communications. Watermarking of digital media to get high robustness without perceptibility lost is a challenging task. In ordinary watermarking techniques it is not possible to detect the actual colluder unless the watermark signal is uniquely assigned...
In this paper, an adaptive spatial domain image watermarking scheme is proposed which embeds watermark information to the uneven bit depth salient image pixels. Watermarked image thus produced has better visual transparency with respect to human visual system (HVS) with high payload capacity. In proposed scheme, salient pixels are determined using the bottom-up Graph-Based Visual Saliency (GBVS) model...
In this paper we propose a new invisible, non-blind digital watermarking scheme for color images based on singular vector domain (SVD). In this new approach, same or different watermarks can be embedded into the three color channels (R, G, B) of the host image in order to increase the robustness of the watermark. The proposed method demonstrates that color image watermarking is possible without affecting...
Airborne threats like aircrafts and missiles at long ranges appear as point or small targets in visible and infra-red image sequences. Size of the target in input image increases as it approaches towards the imaging sensor. Mathematical morphology is used to detect such targets but its performance is highly dependent on shape and size of structuring element. In this paper, we propose a novel robust...
In this paper, a robust and imperceptible dual watermarking algorithm is proposed by the combination of multiple parameter fractional Fourier transform (MPFRFT) and least significant bits (LSB) technique. Original cover image is segregated into sub - bands of block size 8 × 8 and then MPFRFT transform is applied to each block, and the dual watermark images are embedded using the LSB technique. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.