The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Despite the great advances made in the field of image super-resolution (ISR) during the last years, the performance has merely been evaluated perceptually. Thus, it is still unclear whether ISR is helpful for other vision tasks. In this paper, we present the first comprehensive study and analysis of the usefulness of ISR for other vision applications. In particular, six ISR methods are evaluated on...
The aim of this work is to design and develop an online screening tool for dyslexia based on kinesthetic perception without much of manual intervention. Existing methods available for testing Dyslexia are done manually. Also these tests require psychologists and specialists who are scarce. This research aims to exploit the use of multimedia tests for screening of fine motor movements for dyslexia...
Visual cryptography (VC) is a method for shielding the secret image which encodes the image into many shares and allocates them to various participants. When all shares are aligned and stacked together, they expose the secret image. In k out of n (k, n) VC scheme, the secret image is shared into n shares such that when k or more participants by amassing their transparencies by means of an overhead...
Vehicle simulators are widely used to test the correctness of vehicle control algorithms. It is important to create a virtual road environment in a way that the vehicle algorithm can be tested under various circumstances that may happen in the real world. However, building such a road environment is typically time consuming and performed in a manual and ad-hoc fashion without having a good notion...
Computer vision has many applications that were implemented to the existing advance technology. Vehicle tracking and counting in video surveillance is one of them. Vehicle tracking allow the computer to detect and tracking the vehicles that capture through the video surveillance. Afterwards vehicle counting allow to the computer to count all of the vehicles on video. Background Subtraction is one...
Graphical User Interface (GUI) testing which is done manually requires great effort, because it needs high precision and bunch of time to do the all scenarios repeatedly. In addition, it can be prone to errors and most of testing scenarios are not all done. To solve that problems, it is proposed automated GUI testing. The latest techniques of automated GUI testing (the 3rd generation) is through a...
Assurance cases are used to document an argument that a system -- such as a critical software system -- satisfies some desirable property (e.g., safety, security, or reliability). Demonstrating high confidence that the claims made based on an assurance case can be trusted is crucial to the success of the case. Researchers have proposed quantification of confidence as a Baconian probability ratio of...
In image classification and retrieval, the semantic gap is the major challenge. It characterizes the difference between human perception of a concept and how it can be represented using machine level language. Bag of visual words is a well-known efficient method for image representation, however it showed some limitations. The loss of information during the vector quantization process is one of these...
Complex visual data contain discriminative structures that are difficult to be fully captured by any single feature descriptor. While recent work on domain adaptation focuses on adapting a single hand-crafted feature, it is important to perform adaptation of a hierarchy of features to exploit the richness of visual data. We propose a novel framework for domain adaptation using a sparse and hierarchical...
Conventional autostereoscopic quality assessment focuses on the physical properties and not on the perceptual aspects; however, the user visual quality verifications, especially in mobile gaming, is also crucial since personal experience determines the success of these products. For evaluating the quality features of autostereoscopic displays, especially in terms of viewing angle or viewing field,...
Rapid software development demand in software engineering is increasing with passage of time in all fields of life and in all domains of computer. Agile methodology is result of this rapid software demand and it is focusing on how to balance the ratio of developed software according to user demands. This research paper enlightens the agile methodologies and their conversion into the agile project...
Maintaining package-based Linux operating system distributions and addressing their evolution have always been a challenge. Since all packages that form a distribution of Linux Operating system interact with each other, it leads to complicated dependency relationships of each distribution. Current package managers only provide a local view of the dependency relationship. It is still a lack for distribution...
Saliency detection is one of the most active research area in computer vision. Since L. Itti et al. [1] suggested computational model of visual attention, numerous detection algorithms have been proposed. However, most of modern saliency detection methods are based on superpixels which make detection results have abrupt edges inside the salient part. In this paper, we propose pixel-wise detection...
The diagnosis of patients with Disorders Of Consciousness represents a challenge in the clinical routine. Recently, Brain Computer Interfaces based in Electroencephalography (EEG-BCI) have been used to detect signs of consciousness in these patients. This approach allows to discover brain responses to command following. Nevertheless, a reliable BCI strategy must to be able to determine the commands...
Visual contracts model the operations of components or services by pre-and post-conditions formalised as graph transformation rules. They provide a precise intuitive notation to support testing, understanding and analysis of software. However, due to their detailed specification of data states and transformations, modelling real applications is an error-prone process. In this paper we propose a dynamic...
In a patch-based object recognition system the key role of a visual vocabulary is to provide a way to map the low-level features into a fixed-length vector in histogram space to which standard classifiers can be directly applied. The discriminative power of such a visual vocabulary determines the quality of the vocabulary model, whereas the size of the vocabulary controls the complexity of the model...
Computer Based Perimetry system has been designed and manufactured which features the patient gaze fixation system. The results obtained from diagnosing various patients were compared to those obtained by internationally approved perimetery systems. This shows that our system is reliable as a standard perimetry.
The existence of binocular vision is essential in increasing the quality of life and in both intellectual and in personal development. The social and psychological reasons are not the only advantages related to a normal functioning of binocular vision. The view itself is greatly enhanced in the presence of normal cooperation between the eyeballs. Studies have shown that there is a strong reason why...
Bugs reports and version archives are two useful sources of information for quality analysts, with the goal of mapping the bugs fixes to source code files. Manually performing this task is as arduous as it is time consuming. We propose a tool which programmatically performs this job in two phases-First, it filters relevant log entries by traversing CVS/SVN log files and then it parses the textual...
This article describes the design and implementation of visualization and communication system used to control a robotic head. This document also describes the solution for communication protocol used by internal data bus of the robotic equipment and the proposal for communication protocol used to communicate with the visualization system section. Verification method and testing of the proposed cyber...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.