The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Robust and precise face tracking under unconstrained imaging conditions is still a challenging task. Recently, the Constrained Local Model (CLM) framework has proven to be very powerful to track frontal and near frontal facial movements. In this paper, we introduce a Pose-Adaptive CLM which is able to accurately track large 3D head rotations. This model relies on two main parts: (1) an adaptive 3D...
Gathering experimental data to test computer methods developed during a research is a hard work. Nowadays, some databases have been stored online that can be freely downloaded, however there is not a wide range of databases yet and not all pathologies are covered. Researchers with low resources are in need of more data they can consult for free. To cope with this we present an on-line portal containing...
In this paper, a novel steganography technique to embed secret message in a grayscale image has been proposed. Pixels belonging to edges of the cover image are used as the embedding locations. The edge selection approach is data adaptive that means, numbers of pixels belonging to edges are selected on the basis of payload to be embedded. The embedding approach is designed to provide better security...
In this paper, the problem of long-term tracking an object in video sequences is addressed by means of online model learning. LK (Lucas — Kanade) algorithm is adopted in the tracker, and the object model is updated by online learning. In each frame, the object is described by the location and the scale. When the LK tracker fails to track the object chosen in the first frame, the online model is started...
Spatio-temporal interesting points feature is a key technology for a wide class of computer vision approaches to recognize human actions. In this paper, a novel bio-inspired model based spatio-temporal interesting points (BIM-STIP) framework is proposed. Different from traditional STIP framework, the introduction of bio-inspired model provides a biological theory for interest points detection and...
Telemedicine or mHealth systems can improve the quality of life of patients who need to be monitored continuously. Not only will it allow them to stay at their own home with a higher level of mobility but also maintaining or even improving the accuracy of the diagnostic. Remote monitoring can enable information about the health status of all patients to be passed to the medical staff continuously...
In a recent article we have introduced and used the complex fractional wavelet for QRS complex detection in ECG signal. This complex fractional wavelet is derived from the Cole-Cole distribution which is widely used in the modeling of dielectrics by a fractional power pole. This work presents an extension of QRS detection scheme using the complex Morlet wavelet function. It consists of using the real...
The Belle II experiment will start physics data taking in 2016 at the SuperKEKB factory to search for new physics beyond the Standard Model from flavor physics channels. A network distributed data acquisition (DAQ) system was developed for huge data size from the Belle II detector. In order to manage the distributed systems, software control and monitoring systems for the DAQ subsystems were newly...
In this work human action recognition problem was discussed in video sequences. Solution of the problem was studied in three stages. Firstly, points of interest were detected with preproccesing and these points which are called cuboids were declared in small windows, then feature extraction was performed and finally, human action is decided by using classification. Features extraction is not only...
In this paper, we address the problem of small pulmonary nodule detection on digital tomosynthesis (DT) scans. We propose efficient, domain-specific filters for the enhancement and classification of bright, rounded structures in three-dimensional volumes. First, 61 DT slices per scan are reconstructed from the DT projections by filtered backprojection (FBP). Next, nodule candidates are searched slice-wise...
In this paper, we introduce a set of new visual representations for complex systems. These visual representations allow for the efficient description of systems that encapsulate a variety of components that can be merged together to form ensembles. These ensemble methods can outperform individual approaches. The whole operation of such systems can be better interpreted using visual tools. Thus, we...
In this paper we present CAT Record - a real time computer forensics agent that records computer activity for subsequent forensic investigation on a Windows computer system as actions are taking place on a system. This approach is different from the traditional post-mortem approach of examining a hard disk since activities are being recorded as they are happening. The prototype agent included six...
The high-energy side of peaks in alpha spectra, e.g. 241Am, as measured with a silicon detector has structure caused mainly by alpha-conversion electron and to some extent alpha-gamma coincidences. We compare GEANT4 simulation results to 241Am alpha spectroscopy measurements with a passivated implanted planar silicon detector. A discrepancy between the measurements and simulations suggest that the...
The NA62 experiment at CERN will study the very rare decay, K+ π+ννbar. To reject the K+ π+ πo background, the detector must be hermetic to photons with a single-photon inefficiency of 10−5 for energies above 1 GeV. Three detectors will cover the experiment acceptance: the Liquid Krypton calorimeter from the NA48 experiment, the Large Angle Veto (LAV), and the Small Angle Calorimeter (SAC). The LAV...
The Data Quality Monitoring Software proved to be a central tool in the Compact Muon Solenoid experiment. Its flexibility allowed its integration in several environments: online, for real-time detector monitoring; offline, for the final, fine-grained data certification. The usage of the Data Quality Monitoring software in the different environments and its integration in the Compact Muon Solenoid...
More and more system started using AOP(Aspect Oriented Programming), Aspect Oriented Programming is more and more important, but the problem of loss of join points has not a good solution. This paper for the use of spring framework system log generation business design a joint point detector, to traverse all join points, and in the database maintenance join point's state.
This paper presents an application for simulation and generation of signals from semiconductor radiation detectors which can be used in testing and calibrating of the processing circuitry within radiation measurement apparatus. The proposed application acts as a virtual semiconductor radiation sensor, generating the specific pulse signals delivered by the sensor processing circuitry in case of a radiation...
Local Binary Pattern (LBP) feature has attracted increasing interest in pedestrian detection tasks, but it requires high dimensionality to gain promising performance. To address this problem, we make three main contributions. First, Center-Symmetric Local Binary Patterns (CSLBP) feature is introduced to pedestrian detection. It's the first time to extract CSLBP operator in an approach similar to basic...
The face recognition community has finally started paying more attention to the long-neglected problem of spoofing attacks and the number of countermeasures is gradually increasing. Fairly good results have been reported on the publicly available databases but it is reasonable to assume that there exists no superior anti-spoofing technique due to the varying nature of attack scenarios and acquisition...
In recent years, several methods have been proposed for content-based retrieval from manuscripts, mostly based on character or word similarity. In this paper, we present a new segmentation-free method, called Harris Corner Matching (HCM), which accepts an arbitrary writing pattern as a model and allows to retrieve similar patterns from a possibly large database. Retrieval is performed in two steps...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.