Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Real-time human detection in crowded and dynamic environments poses a significant challenge, due to complex background, occlusion and different human poses. In this paper, we propose a two-staged approach using color and depth data taken by an RGB-D camera. The first stage is to find plausible head-top locations quickly in depth image. The second stage is to extract effective discrimination features...
Trigger and data acquisition systems (TDAQ) of High Energy Physics (HEP) experiments intensively use time measurements for calibration of signals and synchronization between their different elements. Typically, electronics systems for time measurement are designed using a classical mixed-signal approach, while all-digital architectures are nowadays being explored and studied by state-of-art research...
The emerging fifth generation (5G) wireless access network, aiming at providing ubiquitous and high data rate connectivity, is envisaged to deploy large number of base stations with higher density and smaller sizes, where inter-cell interference (ICI) becomes a critical problem. Frequency quadrature amplitude modulation (FQAM) has been shown to reduce the ICI at the cell edge therefore achieve a higher...
In this paper, we propose a novel and practical system for robust online face tracking in surveillance videos. The proposed system has two contributions: 1) sustained high performance for long-term tracking even when faces come in and out of the view frequently, and 2) extremely low complexity which allows for real-time deployment on various platforms. These advantages are achieved by designing a...
Feature extraction from each scale of an image pyramid to construct a feature pyramid is considered as a computational bottleneck for many object detectors. In this paper, we present a novel technique for the approximation of feature pyramids in the 2D discrete cosine transform (2DDCT) domain. The proposed method is based on a feature resampling technique in the 2DDCT domain, and exploits the effect...
In radar detector performance analysis, it is known there exist targets that do not follow commonly used radar cross-section (RCS) fluctuation models such as the Swerling models. With advances in computational power, the full RCS distributions of many targets can be computed using electromagnetic (EM) simulations. However, these simulated RCS distributions are not fully exploited by radar designers...
In this paper, we propose an automatic method of facial expressions recognition in static images using the high dimensional Local Binary Patterns (LBP). In this research some existing algorithms for face detection, facial landmarks localization, face normalization and recognition were combined and adopted for facial expressions classification. The novelty of the contribution lies in the application...
In this paper, the comparison of a novel key-point image descriptors such as DAISY, BRISK, A-KAZE and LATCH with the well-known SIFT and SURF descriptors are tested and compared for the stereo matching algorithm. The main idea of this paper is to present an independent, comparative study and some of the benefits and drawbacks of these most popular image descriptors on stereo images. These descriptors...
The paper introduces to the digitization and features extraction processes of large volume of imaging documents and stored as images using mechanisms of big data and cloud technology. So, layout analysis, image representation, feature extraction and transformation huge amount of the prepared document images are presented in this paper. Accordingly, an efficient way reliable and highly clustering functionality...
Near-earth heritage spaceflight missions and contemporary large observatories such as the NASA Hubble Space Telescope (HST), future James Web Space Telescope (JWST), or planetary fly-by (Cassini with its 12 instruments) and orbiting deep space observatories like the Mars Reconnaissance Orbiter (MRO) have carried large electronics subsystems. The Kepler cosmology observatory 95 mega pixels focal plane...
The detection of vascular bifurcation in X-ray images is important for several medical applications. They are used as landmarks for image registration, vessel segmentation and tracking. Although many bifurcation extraction methods have been proposed in recent years, very few work deals with coronary bifurcation in X-ray images. In this paper, we present a new bifurcation detector based on the multiscale...
We propose a pixel similarity based Betacam dropout detection method. Proposed method aims at detecting errors, having vertically similar pattern without considering sequential frame when archiving a tape-based content to a file-based system. Moreover, this method works along with a real-time instant Quality Control(QC) system with less false-alarm.
Combining multiple observation views has proven beneficial for pedestrian tracking. In this paper, we present a methodology for tracking pedestrians in an uncalibrated multi-view camera network. Using a set of color and infrared cameras, we can accurately tracking pedestrians for a general scene configuration. We design an algorithmic framework that can be generalized to an arbitrary number of cameras...
While Cryptography is the science of secure communication, Steganography is the art of covert communication. Steganography has a long history, but modern steganography uses digital carriers such as electronic text, disk space, network packets, digital audio and images to hide secrets. Steganalysis, the countermeasure to steganography, is designed to detect and analyse the hidden data disseminated...
Existing studies suggest the vulnerability of fingerprint verification system against spoof attacks. A spoofing attack occurs when an adversary mimics the biometric trait of another individual for illegitimate access and advantages. Liveness detection algorithms aim to detect live fingerprint samples from the fake artifact. A variety of materials, such as latex, gelatine and silicone, can be used...
Recently, steganalysis based on hypothesis test theory becomes a focus. However, the correlation between adjacent pixels is not exploited and this is obviously not reasonable. In this paper, a new detector for least significant bit matching (LSBM) steganography is proposed with the consideration of pixel correlation. The cover pixels are modeled by multivariate Gaussian distribution and a new detector...
A near-duplicate video clustering algorithm based on multiple complementary video signatures is proposed in this work. We use three kinds of frame descriptors: RGB histogram, color name histogram, and ternary pattern. Then, we convert each kind of frame descriptors for a video into a video signature based on the bag-of-visual-words scheme. Consequently, we have three signatures to represent the video...
Vision-based registration methods for augmented reality systems recently have been the subject of intensive research due to their potential to accurately align virtual objects with the real world. The drawbacks of these vision-based approaches, however, are their high computational cost and lack of robustness. Motion blur and partial occlusion are considered two of the most critical problems that...
Object tracking is one of the major fundamental challenging problems in computer vision applications due to difficulties in tracking of objects can arises due to intrinsic and extrinsic factors like deformation, camera motion, motion blur and occlusion. This paper proposes a literature review on several state -- of -- the-art object detection and tracking algorithms in order to reduce the tracking...
Detecting texts of multiorientation has been studied for long, yet it remains a challenging task because of the complex background and diversity of texts. For the results to be accurate, it will make use of a classification scheme using random forest classifier. Text detection becomes more challenging if the input image is a blurred one. So we make use of a blind image deblurring method for image...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.