The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose a method to estimate the fundamental matrix for hybrid cameras robustly. In our study a catadioptric omnidirectional camera and a perspective camera were used to obtain hybrid image pairs. For automatic feature point matching, we employed scale invariant feature transform (SIFT) and improved matching results with the proposed image preprocessing. We also performed matching...
Biometrics play an important role in modern access control systems to overcome the problems of forgotten, stolen or easily-guessed passwords. With the recent developments in cryptography, hashing and random number generation, biometrics and cryptography are combined in new generation cryptosystems. In this paper, it is aimed to produce a unique binary biometric identity code (bit string) by using...
Non-rigid registration of 3D faces finds a variety of applications in computer vision, human-computer interaction and graphics. However, automatic non-rigid registration is a non-trival problem. In this paper, we introduce an elastic deformation based method for the non-rigid registration of 3D faces that are subject to large deformations due to expressions and that are contaminated by sensor noise...
In this paper, we propose a new image feature extraction method. We define a matrix called co-difference matrix for a given region. This matrix can be computed without performing any multiplications. The operator that we use forms a semi-group on real numbers. The co-difference based feature extraction method can be used in other image and video processing applications such as object tracking, face...
This paper proposes two different methods in order to improve the performance of traffic sign detection process. These methods are used for efficient and robust detection of red or blue colored, circular, octagonal, rectangular and triangular traffic signs. Proposed methods use both color and shape features of the traffic signs. Both of the methods gather the color and edge information of the image...
In this paper, we propose new controls for a simple intersection based on new information and communication system for intelligent vehicles. These controls are performed to take into account all vehicle arrivals individually. Hence, we consider that there is no traffic light planned by the city and vehicles negotiate their time of access between them or through an intelligent device embedded in the...
Protection and trust in financial infrastructures (PARSIFAL) project is targeting this ambitious objective concerning coordination activities between the stakeholders necessary to protect CFI and information infrastructures, both today and tomorrow, and specifically those areas which span beyond a single bank or a single country.
We introduce MobiTOP, a map-based interface for accessing hierarchically organized georeferenced annotations. Each annotation contains multimedia content associated with a location, and users are able to annotate existing annotations, in effect creating a hierarchy. MobiTOPpsilas interface was designed using a participatory design methodology to ensure that the user interface meets the needs of potential...
In this research, our aim is to increase the efficiency of individual visitors and the whole system by reducing traffic congestion in large-scale crowdpsilas activities. To achieve the goal, a route guidance mechanism with centralized information control (CIC) is proposed by granting priority to visitors using CIC. Through multi-agent simulation, we confirmed that the CIC mechanism was effective in...
The following topics are dealt with: next generation high performance CPU; chip-to-chip interconnection; regulators; system on chip; millimeter wave design; low power analog technique; voltage control oscillator; data converters; PLL and divider; ADC and clocking; and video and image processing.
This paper presents an effective channel selection algorithm for a mesh of access points (AP) operating on the same frequency in order to minimize the interference experienced by the APs. By using multiple thresholding mechanisms, the proposed algorithm not only minimizes the number of APs experiencing intolerable amount of interference, but it also strives to avoid unnecessary switching of the operating...
Multi modal images need to be registered in order to use the unique information contained in these different modality images. In this paper, modifications on scale invariant feature transformation (SIFT), which is a popular method used for image matching, to improve its success on multi modal images are described. SIFT algorithm is immune to linear and partially immune to non-linear illumination changes...
Underwater is a complex structured environment because of inhomogeneous light absorption and light scattering by the environment. These factors make 3D reconstruction in underwater more challenging. In the literature, only calibrated cameras and predefined camera motions are allowed for 3D reconstruction. In this study, 3D representation of underwater scenes are reconstructed from uncalibrated video...
One of the most efficient methods for cracking passwords is the one based on ldquorainbow tablesrdquo; those lookup tables are offering an almost optimal time-memory tradeoff in the process of recovering the plaintext password from a password hash generated by a cryptographic hash function. In this paper, we demonstrate the first known system, implemented in a state-of-the-art reconfigurable device...
Based on the semantic query expansion, we propose a novel approach to re-rank the query result that enables users to retrieve the required documents quickly. Our technique is different from others in that (1) ontology entries are added to the query by disambiguating word senses. (2) We propose a new algorithm to mine frequent patterns, which is used to construct semantic user focus. (3) It utilizes...
Although smooth groups and smooth rings were presented, however the important method that smooth ring acts on smooth group has not been seen in report. In order to solve the problem, this paper defines smooth modulus, smooth homomorphism and smooth quotient modulus by the action. In order to compare two smooth modulus, this paper proves the fundamental theorem of smooth homomorphism of smooth modulus...
This paper describes speaker diarization system on a NIST Rich Transcription 2007 (RT-07) meeting recognition evaluation data set for the task of multiple distant microphone (MDM). Our implementation includes three components: initial clustering, non-speech removal and cluster purification. Initial clusters are generated using directional of arrival (DOA) information and bootstrap clustering. Multiple...
Without any assumption on the cover source, this paper presents a complete characterization of all perfectly secure stego-systems that employ mutually independent embedding operation. It is shown that for a fixed embedding operation, the only perfectly secure stego-systems are those whose cover distribution is an element of a linear vector space with basis vectors determined by the embedding operation...
An integrated RF-powered Li-ion battery charger solution has been developed for biomedical applications. RF energy received through an antenna is rectified, regulated, and passed on to a battery charger circuit that charges a Li-ion battery efficiently and accurately. The charger system has been implemented using UMC 90 nm BiCMOS process library. Experimental results show that a battery model with...
State diagrams are commonly used to describe the dynamic behavior of an individual object. In other words, state diagrams can represent sequences of operations in classes. In addition, state diagrams are commonly used for various purposes: test case generation, formal verification and code generation. Because state diagrams describe all the possible dynamic behaviors of an object, it is very difficult...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.