The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we discuss a method to construct a radio environment map (REM) in an environment with multiple primary users (PUs). The REM provides statistical information about the PU activity at each location. It enables the secondary user to access the licensed band dynamically. We derive the measurement architecture based on the “crowd-sourcing” scheme to gather large-scale measurement data with...
Detection of corner is the most essential process in a large number of computer vision and image processing applications. We have mentioned a number of popular contour-based corner detectors in our paper. Among all these detectors chord to triangular arm angle (CTAA) has been demonstrated as the most dominant corner detector in terms of average repeatability. We introduce a new effective method to...
We present a method to remove salt-and-pepper noise for single images. The method consists of two stages, noise detection and noise removal. In the first stage, a detector identifies corrupted pixels; in the second stage, an algorithm employs a nonlinear isotropic diffusion to suppression noise, which diffusion is only for those corrupted pixels. We apply our method to a test set containing five images...
Goal: Mammography is the most effective technique for breast cancer screening, and the detection of abnormalities plays a vital role in Computer Aided Detection (CAD) system. This paper proposes a detection method for abnormal mammograms based on improved saliency detection. Methods: The proposed method comprises three main steps: firstly, enhance abnormal mammograms using dual morphological top-hat...
The performance of an object detection system relies heavily on two components: an object model to capture the compositional relationship among the object body and its parts, and a feature representation to describe object appearance. In this work, we present an empirical study of combining two state-of-the-art such components: Deformable Part Model (DPM), a proven effective and flexible part-based...
This paper considers the recovery of group sparse signals over a multi-agent network, where the measurements are subject to sparse errors. We first investigate the robust group LASSO model and its centralized algorithm based on the alternating direction method of multipliers (ADMM), which requires a central fusion center to compute a global row-support detector. To implement it in a decentralized...
Numerous trackers have been proposed in recent years with considerable success. But few trackers can cope with all scenarios without failures. It is very difficult to design a tracker robust enough to keep off tracking failure. As failure is inevitable, we propose a framework to correct tracker, verify failure, predict object position and re-detect object. The original model of the first frame is...
Simultaneous Localization and Mapping (SLAM) requires both rotation and scale invariant features. Few algorithms have been developed with rotation and scale invariant features with few limitations. Thus, an algorithm has been proposed to address rotation and scaling invariance. Proposed algorithm Harris-FAST interest point detector is a fusion of Harris and FAST interest point detectors. The detector...
Unsupervised anomaly detection algorithms search for outliers and then predict that these outliers are the anomalies. When deployed, however, these algorithms are often criticized for high false positive and high false negative rates. One cause of poor performance is that not all outliers are anomalies and not all anomalies are outliers. In this paper, we describe an Active Anomaly Discovery (AAD)...
In the original algorithm for grey correlation analysis, the detected edge is comparatively rough and the thresholds need determining in advance. Thus, an adaptive edge detection method based on grey correlation analysis is proposed, in which the basic principle of the original algorithm for grey correlation analysis is used to get adaptively automatic threshold according to the mean value of the...
This paper studies attackers with control objectives and explicit detection constraints against cyber-physical systems. The cyber-physical system is equipped with a Kalman filter and an attack detector that uses the innovations process of the Kalman filter. The attacker performs an integrity attack on the actuators and sensors of the system with the aim of moving the system to a target state under...
Traffic state estimation plays a significant role in intelligent transportation systems. For a specific road, traffic state varies at different times of a day. Therefore, to estimate real-time traffic state is difficult. This paper presents a probabilistic approach for traffic state estimation. In this approach, traffic state distribution and data point distribution are used to describe the pattern...
Hand activity is a critical monitoring component in understanding a driver's behavior within the car. Current vision-based hand detection algorithms perform poorly in naturalistic settings, due to various challenges such as global illumination changes and constant hand deformation and occlusion. To achieve a more accurate and robust hand detection system, this paper presents a hierarchical context-aware...
In this paper we present an efficient motion adaptive de-interlacing algorithm. The motion detection method and the intra-field interpolation are two main factors that affect the efficiency of motion adaptive de-interlacing. To improve the accuracy of motion detection, five consecutive interlaced fields are used and we also introduce a Gaussian filter to eliminate the affection of noise. The adaptive...
In this paper, the decision-level data fusion techniques are extended to the multiuser detection (MUD) field. Then a novel MUD algorithm that is the combine application decision-level fusion criterion (CA-DFC) based MUD algorithm is proposed for DS-UWB communication systems. In CA-DFC based method, the combine detectors can make decisions among the preliminary decisions from sub-optimal detectors...
Motion Detection is major task in every application of computer vision such as video surveillance. Background Subtraction (BS) algorithms have been employed for several years to find a moving objects in a scene. BS has been used in video surveillance due to its simplicity and the fact that cameras are stationary in a video surveillance systems. The present paper introduce a new approach to motion...
The problem of detecting an unknown signal embedded in white Gaussian noise is addressed. The detector based on Wilcoxon signed-rank test is proposed as the solution for this problem. The detector analyses the spectrum of a received signal. Detection capability of this detector has been evaluated via mathematical modeling. Comparison with other prevalent detectors has been done.
Future applications running on many-core processors with tens to hundreds of cores on a chip will require an efficient inter-core communication strategy to achieve high performance. Photonic Networks-on-Chip (PNoCs) have emerged as a promising alternative to the conventional metal based networks-on-chip due to their advantages in bandwidth density, power efficiency and propagation speed. However,...
This work details the design and characterization of a low-cost, portable and highly sensitive fluorescence detection system intended for use in a compact and disposable point-of-care (POC) device. The detection device leverages time integration to improve the signal to noise ratio (SNR) compared to instantaneous measurements. It also eliminates complicated focusing optics and electronics typically...
Corners are salient features in two dimensional images. Compared to other approaches, contour-based corner detectors have been reported to be more effective. We analysed two state-of-the-art contour-based corner detectors, Chord-to-Point Distance Accumulation (CPDA) and very recently developed Curve to Chord Ratio (CCR). Both of these detectors use multiple parameters which are manually or experimentally...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.