The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposed about comparison of the animal recognition processed on the real world objects and the modeled 3D objects. The object classification consists of the three main steps - feature extraction, training classifier and image evaluation. Feature description is based on locale visual descriptors like SIFT or SURF. Support Vector Machine (SVM) in combination with the bags of visual keypoints...
Benchmark datasets and their corresponding evaluation protocols are commonly used by the computer vision community, in a variety of application domains, to assess the performance of existing systems. Even though text detection and recognition in video has seen much progress in recent years, relatively little work has been done to propose standardized annotations and evaluation protocols especially...
Anomaly detection through finding outlier measurements is an important issue for monitoring application using a large databases gathered by Wireless Sensor Network (WSN) like medicine and military. In this paper, we evaluate a detection of outliers based on the distance between the current measurement and its neighbors. Our detailed evaluation supports a synthetic database generated with random values...
We propose a language based on relational algebra extended by intervals for detecting high-level surveillance events from a video stream. The operators we introduce for describing temporal constraints are based on the well-known Allen's interval relationships. The semantics of our language are clearly defined and we illustrate its usefulness by expressing typical events in it and showing the promising...
The electrocardiogram (ECG) is the most common non-invasive test possessing a significant clinical value to cardiac disease diagnostic. In this paper, we developed a robust ECG delineation algorithm based on Ensemble Empirical Mode Decomposition (EEMD) which has very interesting properties on pseudo periodic signals. The proposed algorithm consists to identify an optimum and appropriate set of IMFs...
A near-duplicate video clustering algorithm based on multiple complementary video signatures is proposed in this work. We use three kinds of frame descriptors: RGB histogram, color name histogram, and ternary pattern. Then, we convert each kind of frame descriptors for a video into a video signature based on the bag-of-visual-words scheme. Consequently, we have three signatures to represent the video...
We present a novel approach to recovering the qualitative 3-D part structure from a single 2-D image. We do not assume any knowledge of the objects contained in the scene, but rather assume that they are composed from a user-defined vocabulary of qualitative 3-D volumetric part categories input to the system. Given a set of 2-D part hypotheses recovered from an image, representing projections of the...
Face recognition is non-invasive due to various challenges like illumination variation, pose variation and limitation of 2D images from most of the image capturing technologies. In this paper three novel techniques are proposed namely Binary Artificial Bee Colony (BABC), horizontal feature extraction and feature gallery expansion. BABC is a binary version of Artificial Bee Colony (ABC) which is employed...
Recent disasters reveal that current emergency plans are not enough robust to treat this situations. Doing real life simulacrums to test some aspects of the emergency plans causes the stagnation of the normal work in the organizations and they carry high costs. Simulation tools are a affordable way to deal with these tests. In this work, we use P-DEVS to test the communication system in a nuclear...
This paper proposes a new algorithm for jammer detection in wide-band (WB) cognitive radio networks. We consider a WB which comprises of multiple fixed length narrow-band sub-bands (SB). These SBs are occupied by narrow-band signals which can be legitimate users or a jammer. To reduce the overhead of the analog-to-digital conversion (ADC), compressed sensing (CS) is performed first. CS allows us to...
By extending the basic idea of FAST it is possible to create a detector that can operate directly on a RGB color image and on it detect a higher number of features. The higher number of points and the simplification of the metric put us in the position to impose an additional condition on the keypoints. In order to do so we picked up a problem of FAST and defined a condition for similar points. This...
In a recent paper published in the IEEE TIFS, we proposed an edit detection method based on the instantaneous variations of the Electrical Network Frequency (ENF). In this work we modify the detection criteria of that method by taking advantage of the typical pattern of ENF variations elicited by audio edits. We describe the implemented modifications and directly confront the performance of both methods...
Most common approach to detect security vulnerabilities is to scan code using vulnerability scanning software. This is either static analysis or dynamic analysis. Both approaches, when performed independently, have their own pros and cons. In order to protect software from attackers, vulnerabilities should be removed as early as possible. Detection of vulnerabilities in an application before its deployment...
In this paper a bottom-up approach for detecting and recognizing objects in complex scenes is presented. In contrast to top-down methods, no prior knowledge about the objects is required beforehand. Instead, two different views on the data are computed: First, a GIST descriptor is used for clustering scenes with a similar global appearance which produces a set of Proto-Scenes. Second, a visual attention...
The problem of sparse wideband spectrum sensing (WBSS) of multiple primary users (PUs) is considered in this paper. Assuming all PUs have a similar brick-type spectrum, we can employ sub-Nyquist sampling for the wideband signal, while still being able to identify the activities of all PUs. First, we estimate the Welch power spectral density (PSD) of the aliased signal, and then apply the multi-scale...
The European X-ray Free Electron Laser is a high-intensity X-ray light source currently being constructed in the Hamburg region that will provide spatially coherent X-rays in the energy range between 0.25 keV–25 keV. The machine will deliver 10 trains/s, consisting of up to 2700 pulses, with a 4.5 MHz repetition rate. The LPD, DSSC and AGIPD detectors are being developed to provide high dynamic range...
Predicting the outcome of an action can help a robot detect failures in advance, and schedule action replanning before an error occurs. We propose using an interactive physics based simulator with the aim of collecting realistic data to be used for learning. We then show how we save and query for specific information from the data more effectively. The data from the simulation is used to learn a failure...
Augmented reality is becoming the future of e-commerce, throw their mobile devices, customers have access to all kind of information, going from weather, news papers, shops and so on. Today's mobiles devices are so powerful to the point that they can be used as a platform of virtual try-on systems. Over this paper we present a virtual eye glasses try-on system based on augmented reality and LBP for...
Research in traffic light recognition (TLR) has stagnated compared to related computer vision areas, such as pedestrian detection and and traffic sign recognition. We focus on the detection sub-problem, since this is the most challenging problem and solving this is the key to a successful TLR system. This is done by looking at four detectors from different author groups and their reported results...
This paper proposes an improved step detection approach for smartphones. The improvements consist in a new fuzzy-logic (FL) algorithm for user's step detection using accelerometer data. The proposed method exploits ranges of features reported in reference data on basic gait parameters. We also formulate robust defuzzification-rules related to future outputs. Furthermore, we compared the performances...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.