Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Trajectories of moving objects provide crucial clues for video event analysis especially in surveillance applications. In this paper, we proposed a novel approach for detecting abnormal events in video surveillance. Our approach is based on trajectory analysis involving two phases. In the first phase, we extracted clusters of normal events through an agglomerative hierarchical clustering of saved...
Background extraction is considered the first and key processing stage in video surveillance systems. This paper proposed an novel fuzzy architecture for background estimation. fuzzy architecture was built based on mamdani based fuzzy model and we used mean, median and mode values as membership function. Background estimated by using this system is robust to adaptive background, and varying illumination...
Day by day scanned documents are increasing to preserve the old literatures digitally, especially Telugu literatures. During this scanning so much noise comes into the scanned documents, in addition to noise, other geometry distortions, scale changes will take place while scanning. In this scenario, general optical character recognition (OCR) systems fail to extract the text due to these problems...
Transgender face recognition is gaining increasing attention in the face recognition community because of its potential in real life applications. Despite extensive progress in traditional face recognition domain, it is very challenging to recognize faces under transgender setting. The gender transformation results in significant face variations, both in shape and texture gradually over time. This...
Non-rigid point set registration is a fundamental problem for many computer vision technologies. In this paper, we proposed a new non-rigid point set registration method based on coherent spatial mapping (CSM) and local geometrical constraint. Our central idea is to express each point as a weighted sum of several nearest neighbors and the same relation holds after the transformation. The registration...
Hadoop deals with big data which is an open source Java framework. There are two core components in it namely: HDFS (Hadoop distributed file system) is the ability of a system to continue normal operation against hardware or software faults using inexpensive hardware and which stocks huge extent of data another one is MapReduce is a processing technique and programming model done in lateral and scattered...
In this paper, combination of statistical model based approach and Non-negative matrix factorization (NMF) based approach with on-line update of speech and noise bases for speech enhancement is proposed. Template based approaches are more robust and performs better to non-stationary noises compared to the statistical model based approaches. However, the template based approach is dependent on a priori...
In this paper, an effective algorithm for providing copyright protection is proposed by using a new embedding strategy for Discrete Wavelet Transform-based video watermarking. Discrete Wavelet Transform (DWT) is applied on the video, to convert the spatial data into frequency domain, having low pass and high pass components. The low frequency component is used for generating the key, by using the...
The complexity associated with Urdu fonts regarding OCR in newspapers is being dealt with active research. When creating an Urdu OCR you are limited to a certain font size i.e. if working with a font size of 12, you will have to create a database covering all characters/words of font size 12. In order to work with another font size of same Urdu font you'll have to cover all the characters/words of...
In this paper, a novel logo recognition algorithm based on a set of invariant features, which are calculated by using Radon transform and complex moments is proposed. This set of features is invariant to Rotation, Scaling, and Translation (RST) and it is also robust to additive noise. Radon transform is powerful tool for rotation, scaling, and translation properties which make it useful for our purpose...
Perceptual audio hashing, which summarizes big audio data into compact and robust digest, provides a useful tool for the identification, retrieval, authentication, and other information processing of multimedia contents. This paper proposes a perceptual audio hashing algorithm based on Radon transform in wavelet domain. The wavelet approximate coefficients are mapped into a two dimensional matrix...
A near-duplicate video clustering algorithm based on multiple complementary video signatures is proposed in this work. We use three kinds of frame descriptors: RGB histogram, color name histogram, and ternary pattern. Then, we convert each kind of frame descriptors for a video into a video signature based on the bag-of-visual-words scheme. Consequently, we have three signatures to represent the video...
The growth of audiovisual content, and in particular video requires the creation of robust tools for detecting illegal copies. This paper presents an effective approach to search and detect illegal copies in large video databases. This automatic detection operates two local descriptors and their paths through the video. This method allows to reduce the temporal redundancy intrinsically linked to the...
Assistive devices for the hearing impaired have been developed to assist them through various techniques such as peripheral awareness and alerting systems. The disadvantage of presently available alerting systems is its fixed wired or wireless connection to the alert transmitter. This study focused on providing an alternative to these alerting systems in overcoming the transmitter dependence limitation...
Recognizing faces in presence of illuminations, pose, facial expression variations in controlled as well as uncontrolled environments remains one of the most challenging aspect. In this paper, we propose a novel recognition methodology which deals with challenges of face recognition to obtain robust and efficient recognition. The framework is based on extracting discriminant statistical features from...
This paper presents a novel facial expression recognition approach in the presence of partial occlusion using Gabor filters and gray-level co-occurrence matrix (GLCM). At first, we design an algorithm to extract the block Gabor feature statistics according to the spatial distribution of the face organ. Then, GLCM is firstly introduced into expression recognition field to make up for the deficiency...
This paper presents a voice controlled speaker verification system for hand-held devices in noisy environments. In noisy environments, users unintentionally increase their voice intensity because of the ear-mouth feedback mechanism i.e., the Lombard effect; thus, the characteristic of the input signal is much different from that in a quiet environment. To enhance the accuracy of a speaker verification...
Local ternary pattern (LTP) is a noise-robust version of local binary pattern (LBP). They are both encoding for the differences between the intensity of the center pixel and its neighborhoods. In this paper, based on Webers law we propose two new local descriptors, named Weber binary pattern (WBP) and Weber ternary pattern (WTP), which utilize binary and ternary encoding separately for the evaluation...
In the field of automatic face recognition, transformations of facial features due to aging cause a problem. Due to small amounts of extracted features, the identity verification can be difficult. The feature-based methods that are present in the literature are still being developed, with unsatisfactory results caused by high rates of false matching. In this paper we present a new method of matching...
A program developed in MATLAB® is presented; the function of this program is to reproduce the music that is contained in a sheet of music. Initially, the program only uses the G- Clef and for the notes only the Semibreve, Minim, Crochet, and Quaver are taken into account. A description of the program function is given, and then the results of the program are analyzed. Finally future work is proposed...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.