The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In social network, correlation estimation is a critical problem with promising application prospect. Numerical records of the interaction can serve as informative reflections of the correlation between users. However, due to the noise during data acquisition and storage as well as the privacy concern, the interaction data are usually partially observed. Moreover, even if the complete interaction is...
In recent years, due to the increment in the image editing software applications and the easiness of using these, the probability of malicious changes on the images has also increased. Copy-move forgery is one of the most widely applied modification types on the images. In case of that the copied region is rotated before being pasted, forgery detection becomes difficult. Many researchers try on proposing...
Robust scale calculation is a challenging problem in visual object tracking. Most state-of-the-art trackers fail to handle large scale variations in complex image sequences. This paper propose a novel approach for robust scale calculation in a tracking-by-detection framework. The proposed approach divides the target into four patches and computes the scale factor by finding the maximum response position...
The Steered Response Power using the Phase Transform weight (SRP-PHAT) has been shown to be robust in noisy and reverberant conditions. Also, volume contraction has been applied effectively to trap the global maximum for densely-hilly 3-D spaces like the SRP. However, previous methods have suffered from the presence of peaks representing multiple talkers in close proximity as is likely in a conversational...
This Keyword queries provide fluent access to data over big databases, but there is problem of low and poor ranking quality or priority problem of obtaining results after querying .To satisfy the user it is necessary to identify the queries that have low ranking quality. In this paper, we are creating a framework to calculate the ratio of degree of difficulty of keyword query on the big databases...
This paper proposes a novel optimization method for digital images watermarking in the Discrete Wavelet Transform (DWT) domain. Digital image watermarking has proved its efficiency in protecting illegal authentication of data. The visibility factor of the watermark is the significant parameter that helps in improving the perceptual transparency and robustness of digital watermarking system. The swap...
To make the tampered image more deceivable, rotation and scaling of the duplicated image region, as simple and common image forgery techniques, are often employed. In this paper, a novel approach of copy-move location is presented for copy-move forgery which combines with the keypoint-based method and the block-based method. For a tampered image, we use the split-half recursion matching strategy to...
Adaptive beamforming algorithm performance decreases sharply with the increase of array errors. Beamforming algorithm based on diagonal loading is a simple and effective method for improving robustness. But it is difficult to determine the optimal diagonal loading factor, and the fixed load value does not change with the array error, reduce the loading effect. To solve the above problems, this paper...
We consider in this work the Distributed Channel State Information (DCSI) Broadcast Channel (BC) setting, in which the various Transmitters (TXs) compute elements of the precoder based on their individual estimates of the global multiuser channel matrix. Previous works relative to the DCSI setting assume the estimation errors at different TXs to be uncorrelated, while we consider in contrast in this...
The problem of estimating causal relationships from purely observational data is studied in this paper. We observe samples from a pair of random variables (X,Y) and wish to estimate whether X causes Y or Y causes X. Any joint distribution can be factored as pX,Y = pX pY|X = pY pX|Y and therefore the “causal” direction cannot be inferred from the joint distribution without further assumptions. In this...
Reducing false arrhythmia alarms in the intensive care unit is the objective of the PhysioNet/Computing in Cardiology Challenge 2015. In this paper, an approach is presented that analyzes multimodal cardiac signals in terms of their beat-to-beat intervals as well as their average rhythmicity. Based on this analysis, several features in time and frequency domain are extracted and used for subsequent...
Device-to-device (D2D) proximity services has been one of the key topics in Release 12 of 3GPP LTE and most of its technical specifications were recently concluded. Among them, synchronization procedure is a crucial step required for devices to proceed with any further operation such as discovery and communication. Once the devices are synchronized, other operations can be initiated. Technical details...
Local binary pattern (LBP) is a simple yet powerful texture descriptor modeling the relationship of pixels to their local neighborhood. By considering multiple neighborhood radii, multi-scale LBP (MS-LBP) is derived. For MS-LBP generation, different scales LBP histograms are first extracted separately, and then combined in concatenate or joint way, resulting in a one-dimensional or multi-dimensional...
Most previous studies on cooperative communications assume that the relays operate normally and are trustworthy. However, this assumption may not always be true in practice. Accordingly, this study proposes a robust cooperative communication scheme in the physical layer for combating relay misbehavior. Two models for cooperative communications are considered, namely with direct path (WDP) and without...
This paper addresses the problem of automated vehicle tracking and recognition from aerial image sequences. Motivated by its successes in the existing literature we focus on the use of linear appearance subspaces to describe multi-view object appearance and highlight the challenges involved in their application as a part of a practical system. A working solution which includes steps for data extraction...
From an investigation of the statistical model likelihood ratio test-based voice activity detection(VAD), it was discovered that there existed false alarm problem in detecting the non verbal vocalization signal. In this paper, an improved statistical model-based VAD method is proposed for noise adverse environments, which employs reserved coefficient in the decision rule. The reserved coefficient...
Spectrum Sensing (SS) is one of the fundamental mechanisms required by a Cognitive Radio (CR). Among several SS techniques, cyclostationary feature detection is considered as an important technique due to its robustness against noise variance uncertainty and its capability to distinguish among different systems on the basis of their cyclostationary features. However, one of the main limitations of...
Some audio watermark applications, specifically the second screen, are subject to harsh environment, such as high attenuation and interference during the transmission of the stego signal from speaker of the primary screen to microphone of the second screen. Autocorrelation domain embedded audio watermarking systems are a promising algorithm since the watermark signal is highly correlated to the host...
Coprime sampling has been shown to be an effective deterministic sub-Nyquist sampling scheme for estimating the power spectrum of wide sense stationary signals without any loss of information. In contrast to the existing results in coprime sampling which only assume an ideal setting, this paper considers both additive perturbation on the sampled signal, as well as sampling jitter, and analyzes their...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.