Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Identifying the parameters of a model such that it best fits an observed set of data points is fundamental to the majority of problems in computer vision. This task is particularly demanding when portions of the data has been corrupted by gross outliers, measurements that are not explained by the assumed distributions. In this paper we present a novel method that uses the Least Quantile of Squares...
The main aim of this paper is to design and implement robust and novel watermarking scheme for H.264 encoded videos. The method used for watermarking is multi resolution wavelet decomposition. The watermark used is a binary image. This watermark is embedded in the wavelet coefficients of the LH, HL and HH sub-bands of the third wavelet decomposition level by quantization. We have tested the resilience...
In order to utilize identification to the best extent, we need robust and fast algorithms and systems to process the data. Having palmprint as a reliable and unique characteristic of every person, we extract and use its features based on its geometry, lines and angles. There are countless ways to define measures for the recognition task. To analyze a new point of view, we extracted textural features...
In this paper, we present a saliency-aware image completion method which takes full advantage of a saliency detection result. On one hand, the saliency map is incorporated into the completion order computation procedure to take human visual attention into account. On the other hand, the saliency map used in patch matching makes the searched result more accurate and smooth. Furthermore, we employ an...
In this paper, we propose a robust proximal classifier via absolute value inequalities (AVIPC) for pattern classification. AVIPC determines K proximal planes by solving K optimization problems with absolute value inequalities. In AVIPC, each proximal plane is closer to one class and far away from the others. By using the absolute value inequalities, AVIPC is more robust and sparse than traditional...
The advance of high throughput biotechnology enables the generation of large amount of biomedical data. The microarray is increasingly a popular approach for the detection of genome-wide gene expression. Microarray data have thus increased significantly in public accessible database repositories, which provide valuable big data for scientific research. To deal with the challenge of microarray big...
In order to utilize identification to the best extent, we need robust and fast algorithms and systems to process the data. Having palmprint as a reliable and unique characteristic of every person, we extract and use its features based on its geometry, lines and angles. There are countless ways to define measures for the recognition task. To analyze a new point of view, we extracted textural features...
A robust and high quality image watermarking method has high demand for protection of copyrighted multimedia data over internet. The existing image watermarking methods generally exploit the correlated color models due to which only one color component at a time can be used for embedding the watermark. Therefore, in this paper, a novel steerable pyramid transform (SPT) based digital image watermarking...
In this paper we explore and analyse the heterogeneity existent within a seemingly homogenous sample of online consumer behaviours in terms of their demographic profile. The data from a sample of 371 survey respondents is clustered using various distance functions and a clustering algorithm. In doing so, the respondents are clustered based on their response profiles to online behaviour questions rather...
Triple negative breast cancers (TNBC) are clinically heterogeneous, an aggressive subtype with poor diagnosis and strong resistance to therapy. There is a need to identify novel robust biomarkers with high specificity for early detection and therapeutic intervention. Microarray gene expression-based studies have offered significant advances in molecular classification and identification of diagnostic/prognostic...
In this paper, performance of orthogonal transforms with their wavelet transforms and Hybrid wavelet transforms are compared for image steganography. Here, wavelet transforms and Hybrid wavelet transforms are proposed to be used for Image steganography. A set of 10 Cover images for hiding 10 varied message images has been used for research. Results validates that, Hybrid wavelet transforms performs...
This paper investigates the problems of robust D-stability and D-stabilization for linear discrete uncertain descriptor systems ties in the whole system matrices cover that in the coefficient matrix E. We assume that the coefficient matrix E is rank-invariant, that is, rank(E) = r ≤ n for all admissible uncertainties. Thus, we consider the robustness analysis problem as two cases: the right-descriptor...
The development of the sensor networks has enabled increasing commercial or scientific applications in which data are available as streams. And sometimes the core security requirement of streaming data in WSNs is integrity rather than confidentiality. Former stream authentication schemes based on watermarking usually suffer from the vulnerability of grouping. This paper proposed a novel integrity...
Communication networks are prone to failures due to targeted attacks or large-scale disasters. Networks can be improved to withstand challenges using mechanisms such as diversity, which can simply be improved by adding links, however achieving maximum resilience is not feasible due to limited budget. Therefore, algorithms that improve the diversity of networks cost-efficiently are necessary. In this...
Improving resilience against failures and targeted attacks is an important aspect of network design. The resilience and cost of networks are two opposing objectives in which a designer should consider when building networks. We develop a heuristic algorithm that balances the centrality of networks by adding a set of links that minimizes the variance of graph centrality measures in a least costly fashion...
A study regarding the swing-up and stabilization problem of a double pendulum on a cart is presented. Current methods of feed forward control, energy based control, and passivity based control are used to select a design for the swing-up controller. The stabilization is done using an LQR controller. The nonlinear controller is analyzed with respect to being approximated by a neural network [1].
The existing GNSS (Global Navigation Satellite System) has the weakness in availability and continuity for the vehicles in urban area since the number of visible satellites decreases abruptly due to large buildings and other structures. In this paper, a new method is proposed to estimate the relative lateral distance of a vehicle from surrounding buildings by a vision sensor to supplement the shortage...
Rules inferring the memberships to single decision classes have been induced in rough set approaches and used to build a classifier system. Rules inferring the memberships to unions of multiple decision classes can be also induced in the same manner. In this paper, we show the classifier system with rules about the union of multiple decision classes has an advantage in the accuracy of classification...
Real data often are comprised of multiple modalities or different views, which provide complementary and consensus information to each other. Exploring those information is important for the multi-view data clustering and classification. Multiview embedding is an effective method for multiple view data which uncovers the common latent structure shared by different views. Previous studies assumed that...
We present a robust and generic framework for web-scale distributed e-Science Artificial Intelligence search. Our validation approach is to distribute constraint satisfaction problems that require perfect accuracy to 10, 12 and 15 digits. By checking solutions obtained using the framework against known results, we can ensure that no errors, duplications nor omissions are introduced. Unlike other approaches,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.