The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Rice Planthopper (RPH) infestation in paddy field is a serious disaster in Asia every year. Finding RPHs based on image processing is an important thing before RPHs growth. We propose a region of interest (ROI) method to detect RPHs clearly. First, get rectangle ROI in HSV space and do color analysis. By using decision tree algorithm, classify analytic data to get binary image of RPHs. The results...
A Minor Incident is a personal creation of animated short film that reflects upon the essence of human integration. Through the comparison and combination of individual differences in existential values, this film investigates the essence of group integration. Interactions among various ethnic and cultural groups in Taiwan are presented with a metaphorical story where personification is applied in...
Recent artistic and cultural creations and performances in Taiwan have exhibited certain trends and phenomena. Most creations focused on the essential features and social relationships of everyday lives, traditional craft, and folk traditions and rites and attempted to translate these elements into new forms of contemporary Taiwanese art. In truth, however, such phenomenon begun to appear in the late...
The purpose of this study is to explore the flavored form of narrow mouth pottery through the market study. Consumer's preferences towards different types of narrow mouth pottery are explored through a questionnaire survey. 40 subjects of different age groups and different degrees of appreciation of pottery are invited for the survey. The target user group for artistic narrow mouth pottery is the...
This paper proposes a constellation design for color shift keying (CSK) based on phase shift keying (PSK) conversion, to be used in cascaded power line communications (PLC) and visible light communications (VLC) systems integration. We optimize the design of MPSK-CSK constellations and analyze the performance of MPSK-CSK systems based on the optimized Euclidean distance calculated on the red-green-blue...
Current approaches for text line segmentation often are either very specialized to specific domains or they depend on many parameters. More specifically, the extraction of text-lines with large sizes, i.e., headings and titles in the Arabic like script could not be segmented correctly by state-of-the-art methods. In this work, we present a simple and robust text-line segmentation approach. The proposed...
A comprehensive Arabic handwritten text database is an important resource for Arabic handwritten text recognition research. It is essential for training text recognition algorithms and vital for evaluating the performance of these algorithms. In this paper, we present a database that includes manuscripts from the Islamic heritage project (IHP), consisting of 333 historical manuscripts written by 302...
Urdu text detection and extraction from videos especially from news feed is a challenging task. The main challenge is to design a robust algorithm that can accurately detect and localize Urdu text regions in videos. Urdu language is originated from oriental languages like Arabic, Persian and Turkish, so alphabets of these languages are very similar. Due to the similarities of basic alphabets and writing...
In this paper, we aim to identify and track people in a given video footage. We perform face detection and recognition, and then use a block matching algorithm to continuously track each detected face. We develop a simple, intuitive, user-friendly interface that enables search by name or image that is useful and convenient for people identification and activity recognition. In addition, we also generate...
Feature fusion methods have been demonstrated to be effective for many computer vision based applications. These methods generally use multiple hand-crafted features. However, in recent days, features extracted through transfer leaning procedures have been proved to be robust than the hand-crafted features in myriad applications, such as object classification and recognition. The transfer learning...
Depth cameras are low-cost, plug & play solution to generate point cloud. 3D depth camera yields depth images which do not convey the actual distance. A 3D camera driver does not support raw depth data output, these are usually filtered and calibrated as per the sensor specifications and hence a method is required to map every pixel back to its original point in 3D space. This paper demonstrates...
Fog and haze are generally a huge cause associated with accidents. Fog reduces the visibility of scene. Fog is formed by the combination of airlight and attenuation. Airlight enhances the whiteness and attenuation reduces the contrast within the scene. Fog detection and removal is a challenging task as it depends upon unknown depth information. Various fog removal methods are used for removing the...
Visual Cryptography is a technique, which is used to conceal the secret image into transparencies and these transparencies are distributed to the intended recipients. They demonstrated a visual secret sharing scheme, where an image was broken up into n shares so that only someone with all n shares could decrypt the image, while any n−1 shares revealed no information about the original image. In this...
The human detection and tracking in a video plays major roll in security systems. This paper proposes an approach to detect and track the persons in a video. This approach uses Gaussian Mixture Model to detect the person and Kalman filter to track the detected person. The processing time to detect the person is reduced by performing the detection operation on down-sampled video. After detecting the...
The quality of outdoor captured images by camera may be degraded due to the occurrence of haze in the atmosphere. The process of enhancing the image by removing the haze is call dehazing. In this paper, dark channel prior and fuzzy enhancement based method is applied to remove haze from a hazy image. The performance of the proposed method is evaluated by comparing average information content and natural...
In this paper, we introduce a new color texture operator for natural texture classification, the Dominant and Minor Sum and Difference Histograms (DM-SDH) descriptor. The proposed approach allows to incorporate both color and texture information in order to enhance the texture discrimination performance. For this purpose, a vectorial representation of the image is used for the descriptor extraction...
Our society is in the trends of changing. As the changing increases, people's stress also increases. In recent year, many research reports found people can focus on drawing pictures and has an effect of mitigating stress when they drawing. The research utilized a survey questionnaire to explore students subjective preferences about the pictures. And use the wearable EEG equipment to detect the brainwave...
The difficulty in searching natural images is the semantic gap between low-level pixel data and the content that is perceived by human. We observed that when viewing images, people often focus on the major color regions and ignore small, isolated sectors. Thus, instead of considering all pixels in the images, which is usually inefficient and prone to noise, we examine and utilize color features after...
As smart-phones become more and more popular, there is growing demand on the mobile version of image processing applications. Due to the limitations on the mobile hardware, the computational load and the amount of data transfer should be more efficient. In this paper, we try to improve the implementation of the histogram equalization algorithm by leveraging the decimation approach. The conventional...
We undertake statistical analysis and find that the character hong (***) has the highest frequency of use at close to 5000 in the Quan Song Ci (complete poems of Song Dynasty). It is often accompanied by cui (***, jade green) or lù (***, green variant), such as in "lu fei hong shou" [thinning red and rich green]. The most commonly used vocabulary are hong chen, hong zhuang, and can hong,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.