The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The open data policy, the availability of high resolution imagery and the capability to cover fast-growing economies are among the main advantages of CBERS. Unfortunately, data produced by this satellite suffer of geographic misplacement, forcing to apply pre-processing techniques to stabilize the imagery. This paper introduces a feature-based technique developed to pre-process CBERS imagery over...
In this paper, an automatic approach is presented to detect/extract buildings from spaceborne TomoSAR point clouds. The approach is systematic and allows robust detection of both tall and low height buildings and is, therefore, well suited for urban monitoring of larger areas from space. The presented approach is illustrated and validated by examples using TomoSAR point clouds generated from a stack...
In many circumstances the limitation for use of video cameras is energy. The energy needed for compression and transmission of video is substantial, and is linear with the number of transmitted frames. Time-lapse photography, a drastic reduction of transmitted frame rate, is an obvious solution, say by transmitting one frame every several minutes. The temporal resolution of the video is lost. Can...
In real world as dependence on World Wide Web applications increasing day by day they transformed vulnerable to security attacks. Out of all the different attacks the SQL Injection Attacks are the most common. In this paper we propose SQL injection vulnerability prevention by decision tree classification technique. The proposed model make use famous decision tree classification model to prevent the...
Steganography is a concept of hiding information in order for data to remain safe and unhandled by eve droppers. In this paper we are demonstrating a way to transmit data from sender to receiver without being handled by eve through a new technique of steganography. We are using an audio file for hiding our data as audio are very less judged to changes made to them. Audio files in wav form are represented...
This paper presents a novel method of the low-level data hiding for the cultural heritage watermarking and authentication. Method involves the algorithm for robust and blind embedding the data bits into a geometrical structure of three-dimensional (3D) mesh models and the data protection algorithm. In the first step the vector of the stabile vertex is selected using powerful vertex extraction algorithm,...
Rules inferring the memberships to single decision classes have been induced in rough set approaches and used to build a classifier system. Rules inferring the memberships to unions of multiple decision classes can be also induced in the same manner. In this paper, we show the classifier system with rules about the union of multiple decision classes has an advantage in the accuracy of classification...
Outlier detection is a primary step in many data mining and analysis applications, including healthcare and medical research. This paper presents a general method to identify outliers in multivariate time series based on a Voronoi diagram, which we call Multivariate Voronoi Outlier Detection (MVOD). The approach copes with outliers in a multivariate framework, via designing and extracting effective...
In this paper, a novel data hiding scheme, 3D unseen visible watermarking (UVW) based on depth no-synthesis-error (D-NOSE) model is proposed. The proposed method has the ability to detect which region of a depth map is suitable for watermark embedding and calculate optimal variation of pixel values for watermarking. The watermark is embedded into the suitable region by modifying the depth map with...
Time series is a ubiquitous form of data and the analytics of time series is attracting increasing interest recently. In the context of time series data mining, similarity measure has the fundamental importance because many data mining techniques depend on it. Dynamic time warping (DTW) is considered to be the most popular similarity measure for time series and it is alignment-based. However, it has...
A data fusion approach based on eigenvalues and eigenvectors of relation matrix of multi-sensor is proposed. Features of relation matrix are extracted and the information of relation matrix is fully utilized by eigenvalues and eigenvectors of relation matrix. This approach overcomes the problem of influenced by expert experience in threshold settings by the optimal sensor group selected through fusion...
In order to verify natural language assertions from a specification automatically, they need to be translated into formal representations. This process is error-prone and can lead to a product that does not meet the initial intentions.We automate this process by first partitioning all assertions into subsets based on sentence similarity and then providing a translation template for each subset which...
The explosive growth of big data poses a processing challenge for predictive systems in terms of both data size and its dimensionality. Generating features from text often leads to many thousands of sparse features rarely taking non-zero values. In this work we propose a very fast and robust feature selection method that is optimised with the Naive Bayes classifier. The method takes advantage of the...
Digital video watermarking is a technique developed to help in copyright protection of video files. Digital video files can be easily copied and shared among many people on the Internet. So, it's extremely necessary to protect the copyright and ownership right of the video files with the help of digital watermarking. In this paper, we are presenting the comparative study of different video watermarking...
With the rapid development of software technology and open source projects, software industry becomes more and more threatened by software piracy. As an excellent detection technique of software piracy, software birthmark, which can describe the unique characteristic of a program, has obtained more and more attention. In this paper, we propose a software birthmark called SCDG-DDGB (System Call Dependence...
Protection of medical images using watermarking is an imperative area of research. In telemedicine, medical images are exchanged between distant places through unsecure networks like internet for diagnosis purpose. During this transfer, medical images may be tampered intentionally or accidentally. The medical practitioner has to check the integrity of Region of Interest (ROI) in the received medical...
We previously proposed the artificial fiber (AF) patterns in order to be able to hide information in printed documents. AF pattern uses the features of the medium (e.g., paper). It has features of rotational invariance, low visibility of the hidden information. But it still suffered extraction threshold instability when using a camera to extract the information. This problem has now been overcome...
A Method based on a mathematical model has been developed for simulating the basic characteristics of artificial fiber patterns using only a PC. Artificial fiber patterns enable information to be hidden in the background of printed matter with almost no visible noise. Measurement of the intensity ratio for artificial fiber patterns created using the method demonstrated that the properties of the paper...
The human brain receives images from the natural world and understands scenes, places and events quickly, outperforming the most advanced artificial vision system. Most of surfaces are textured in real life. Thus, In this paper, a novel texture analysis method has been proposed. The texture can be seen as a visual representation of complex patterns that lead to cognitive understanding of the environment...
This paper is to discuss optimal positioning of sampling pulse for extraction of vital information from signal at critical points using clock-less sampling by online analysis of signal. Using this concept sampling pulses are generated which are less than or equal to minimum Nyquist rate for capturing only critical points without any prior knowledge of signal. This method of sampling technique is applicable...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.