The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
Thanks to the exceptionally good properties, chaotic systems have been widely studied and developed in image scrambling and watermarking algorithms in recent years. In this paper, the chaotic standard Baker map is improved and employed to scramble the pixel positions of host image and watermark image in the preprocessing of watermarking. Experimental results show that the scrambling algorithm based...
This paper studies a design of Sliding Mode Control (SMC) for Negative Output Elementary Super Lift Luo Converter (NOESLLC) operated in Continuous Conduction Mode (CCM). The NOESLLC performs the voltage conversion from positive DC source voltage to negative DC load voltage. In order to improve the dynamic performances of NOESLLC for both static and dynamic specifications, we propose a sliding mode...
Economical and ecological motives are pushing shoreside power supply by power electronics systems for merchant ships as well as for cruise ships. Also, final tests of on-ship power systems and generation are simplified considerably. Fault scenarios on-ship and within the harbour grid and the variability of the parameters of on-ship distribution - each ship is special, and large consumers or generators...
Video segmentation is a key step for the long videos recorded from Television channels to be represented in the hierarchical structure. In this paper, a novel approach based on acoustic cues for automatic segmenting television stream into individual programs is proposed. This presented method is composed of the following steps: Several sets of repetitions in the audio track is detected by using silence...
Most video processing applications require object tracking as it is the base operation for real-time implementations such as surveillance, monitoring and video compression. Therefore, accurate tracking of an object under varying scene conditions is crucial for robustness. It is well known that illumination variations on the observed scene and target are an obstacle against robust object tracking causing...
Collaborative filtering (CF) recommender systems help people discover what they really need in a large set of alternatives by analyzing the preferences of other related users. Recent research has shown that the accuracy of recommendations can be improved significantly by using matrix factorization (MF) models. In particular, a mixed MF model was used by BellKor's Pragmatic Chaos to win the Netflix...
We propose an image stitching method which can compose the images with similar overlapped regions seamlessly. Traditional minimal error boundary (MEB) based method can't produce correct stitching result when the input images exist photometric inconsistency. To cope with the problem, we adopt the weighted sum of gradient and curvature as the robust feature, which represent the primary content of the...
This paper proposes a method for the design of adaptive scalar quantizer based on the source statistics. Adaptivity is useful in applications where the statistics of the source are either not known a priori or will change over time. The proposed method first determines two quantizer cells and the corresponding output levels such that the distortion is minimized over all possible two-level quantizers...
Non linear control of the squirrel induction motor propelling an Electric Vehicle (EV) is designed using sliding mode theory. The proposed scheme uses an adaptive flux and speed observer that is based on a full order model of the induction motor in the indirect vector-controlled drive. The sliding mode tools allow us to separate the control from these two outputs torque and flux. To take account of...
We prove a quantitative version of the Gibbard-Satterthwaite theorem. We show that a uniformly chosen voter profile for a neutral social choice function f of q ≥ 4 alternatives and n voters will be manipulable with probability at least 10-4∈2n-3q-30, where e is the minimal statistical distance between / and the family of dictator functions. Our results extend those of, which were obtained for the...
In this paper, we propose a method for reconstructing the output of an Oversampled Filter Bank (OFB) when instantaneous erasures happen in the sub-band domain. Instantaneous erasure is defined as a situation where the erasure pattern changes in each time instance. This definition differs from the type of erasure usually defined in literature, where e erasures means that e channels of the OFB are off...
This paper presents an Augmented Reality (AR) system for physical text documents that enable users to click a document. In the system, we track the relative pose between a camera and a document to overlay some virtual contents on the document continuously. In addition, we compute the trajectory of a fingertip based on skin color detection for clicking interaction. By merging a document tracking and...
Particle filtering is known as a robust approach for motion tracking by vision, at the cost of heavy computation in a high dimensional pose space. In this work, we describe a number of heuristics that we demonstrate to jointly improve robustness and real-time for motion capture. 3D human motion capture by monocular vision without markers can be achieved in realtime by registering a 3D articulated...
Content-Based Image Retrieval (CBIR) has been recently used as a filtering mechanism against the piracy of multimedia contents. Many publications in the last few years have proposed very robust schemes where pirated contents are detected despite severe modifications. As none of these systems have addressed the piracy problem from a security perspective, it is time to check whether they are secure:...
The application of Missing Data Technique (MDT) has shown to improve the performance of speech recognition. To apply MDT to cepstral domain, this paper presents a weighted approach to compute the reliability of cepstral feature based on sigmoid function and introduces a weighted distance algorithm. It is deduced that the reliability compensates the Gaussian variance in hidden Markov model (HMM) frame...
This article is a theoretical study on binary Tardos' fingerprinting codes embedded using watermarking schemes. Our approach is derived from and encompasses both security and robustness constraints. We assume here that the coalition has estimated the symbols of the fingerprinting code by the way of a security attack, the quality of the estimation relying on the security of the watermarking scheme...
Current telepresence systems, while being a great step forward in videoconferencing, still have important points to improve in what eye-contact, gaze and gesture awareness concerns. Many-to-many communications are going to greatly benefit from mature auto-stereoscopic 3D technology; allowing people to engage more natural remote meetings, with proper eye-contact and better spatiality feeling. For this...
In this paper, we present a novel rateless code which outperforms LT-code, since it is adapted for network coding. To reduce the delay incurred at the intermediate nodes because of decoding and re-encoding, we design and analyze a novel degree distribution which we call Switched Distribution. This distribution increases the delivery ratio at the decoder even when few encoded symbols are received....
In this paper the linear beamforming design of a point to point relay system having multiple antennas at the transmitter, the relay and the receive side is addressed. The Channel State Information (CSI) is assumed to be perfectly known for the link from the source to the relay station. However, it is assumed that CSI from the relay station to the destination is imperfectly known. This uncertainty...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.