Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Content-based image retrieval plays a key role in the management of a large image database. However, the results of existing approaches are not as satisfactory for the gap between visual features and semantic concepts. Therefore, a novel scheme is here proposed. First, to tackle the problem of large computational cost involved in a large image database, a pre-filtering processing is utilized to filter...
In this paper, multiuser channel quality indicator (MU-CQI) prediction based on channel quantization error feedback is proposed for massive multiple-input multiple-output (MIMO) systems. Basically, CQI reporting in the practical systems is performed based on the single user (SU) MIMO transmission mode to keep low feedback overhead and computational complexity. To operate in MU-MIMO transmission mode,...
Permissions-based security model of Android increasingly shows its vulnerability in protecting users' privacy information. According to the permissions-based security model, an application should have the appropriate permissions before gaining various resources (including data and hardware) in the phone. This model can only restrict an application to access system resources without appropriate permissions,...
Due to no feedback process and simplicity in searching algorithm, conventional selected mapping (CSLM) is an efficient crest factor reduction (CFR) technique in orthogonal frequency division multiplexing (OFDM) systems. However high number of inverse fast Fourier transform (IFFT) block is required to achieve the desired PAPR reduction performance. In this paper a PAPR reduction method based on N point...
This paper proposes an efficient motion compensated frame rate conversion method using scaled motion. Different from previous methods where motion estimation and motion compensated interpolation having same search range, proposed method reduces the search range of motion compensated interpolation while search range of motion estimation remains unchanged. Experimental results show that the proposed...
A variety of portable or wearable navigation systems mounted on smart glasses and smartphones have been developed to assist visually impaired people over the last decade. In these systems, collision detection is one of the key components. Many conventional methods with the monocular vision estimate the collision risk based on the motion information of obstacles in the image by measuring the size change...
Conditional replenishment algorithm (CRA) was proposed to improve the quality of a hybrid 3DTV system with mixed resolution. Since CRA generates additional information which includes inter-view vectors, it is needed to efficiently encode the information. This paper proposes a method to apply differential pulse code modulation (DPCM) to the inter-view vectors so as to improve the coding efficiency...
In this paper, we derive the distributed observable state from first principles. In particular, we extend the estimation setup to a distributed framework where in addition to the state and sensing, we also have communication among the sensors. We consider that each sensor estimates the entire state-vector to recover its unobservability. Combining the estimates at all of the sensors we arrive at the...
Detection of multi-manipulated image has always been a more realistic direction for digital image forensic technologies, which extremely attracts interests of researchers. However, mutual affects of manipulations make it difficult to identify the process using existing single-manipulated detection methods. In this paper, a novel algorithm for detecting image manipulation history of blurring and sharpening...
This paper presents the application of binary firefly algorithm (BFA) in obtaining the optimal location of battery energy storage systems (BESS) in photovoltaic generation integrated radial distribution network in order to mitigate the voltage rise problem. The optimization process aims to obtain the optimal location by minimizing the voltage deviation of the PVDG bus. A BESS placement (BP) vector...
We consider a confidential communication system in which a source sends a confidential information to the destination in the presence of an eavesdropper. Multiple relays are used to provide cooperative diversity to the destination. The destination and the eavesdropper are equipped with multiple antennas while each relay and source are equipped with single antenna. We are interested to protect the...
With the development of communications and network technologies, video streaming service is becoming increasingly important. However, in the transmission of high compressed video, bit-stream is easily damaged by channel errors which will lead to the decline of the video sequence. Error concealment is an effective approach to reduce the influence in error-prone network and notably improve the video...
In a cognitive radio ad hoc network, secondary users must cooperate in a decentralized way in order to determine the presence or absence of the primary user. In such a setting, malicious nodes deteriorate the cooperative spectrum sensing performance by reporting incorrect sensing information to the other nodes. We classify distributed cooperative spectrum sensing in cognitive radio ad hoc networks...
Power consumption in a digital circuit increases significantly during test mode. The paper proposes a novel technique to minimize the peak power by circuit clustering based on distribution of energy among the scan cells. All the clusters are equally compatible with respect to the number of scan cells and total system energy which is equally divided among the clusters. The final energy of the system...
In recent years, many vehicle detection algorithms have been proposed. However, a lot of challenges still remain. Local Binary Pattern (LBP) is one of the most popular texture descriptors which has shown its superiority in face recognition and pedestrian detection. But the original LBP pattern is sensitive to noise especially in flat region where gray levels change rarely. To solve this problem, Local...
Nonlinear sparse sensing (NSS) techniques have been adopted for realizing compressive sensing (CS) in many applications such as Radar imaging and sparse channel estimation. Unlike the NSS, in this paper, we propose an adaptive sparse sensing (ASS) approach using reweighted zero-attracting normalized least mean fourth (RZA-NLMF) algorithm which depends on several given parameters, i.e., reweighted...
This paper introduces the framework of mobile Computer Music interfaces within the context of Human Computer Interaction (HCI). It examines the unique problems posed by the use of computers by composers and performers of music. It emphasizes on the new various interfacing protocols, metaphors and paradigms that apply HCI design methodologies on the world of music, producing special modules like: performance...
Detecting pedestrians is a challenging problem owing to the motion of the subjects, the camera and the background and to variations in pose, appearance, clothing, illumination and background clutter. The Region Covariance Matrix (RCM) descriptors show experimentally significantly out-performs existing feature sets for pedestrian detection. In this paper, we present an efficient features extraction...
Many attempts have been made to identify the region of interest in an image. In this paper, we have provided a new approach for ROI detection using the output of image annotation. Our claim is that because ROI is a subjective concept, a method should be used to diagnosis human mental models and for this purpose, we have used KNN base annotation in our method. Because many people in pictures that are...
The images of lace textile are particularly difficult to be analyzed in digital form using classical image processing techniques. The major reasons of this difficulty emerge from the complex nature of lace which generally has different textures in its constituents like the background and patterns. In this paper, we study the behavior of Image Histogram (HistI) and Local Binary Patterns (LBP) on image...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.