The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Blur plays an key part in evaluating of camera image quality. It leads to decrease of high frequency information and accordingly changes the image energy. Recent researches in quaternion singular value decomposition show that the quaternion's singular values and associated vectors can capture the distortion of color images, and thus singular values can be utilized to assess the sharpness of camera...
Code smells represent well known symptoms of problems at code level, and architectural smells can be seen as their counterpart at architecture level. If identified in a system, they are usually considered more critical than code smells, for their effect on maintainability issues. In this paper, we introduce a tool for the detection of architectural smells that could have an impact on the stability...
We present a progressive method of applying easy-to-hard grouping technique that applies increasingly sophisticated feature descriptors and classifiers on reducing number of image samples from each of the iteratively generated clusters. The primary goal of the proposed approach is to design a cost effective face clustering method to deploy on low-power devices like Mobile phones, while handling various...
In this paper we propose a new adaptive learning framework that classifies learner's based on individual preferences in terms of understanding and processing information. This framework generates learner's learning style based on Felder Silverman learning style model and suggest learning content based on learning style. The paper outlines how the system allows instructors to monitor learner's learning...
The U.S. Department of Energy (U.S. DOE) Global Energy Storage Database (GESDB) is an openly accessible archive of electrical energy storage projects across the electric grid infrastructure and a global repository of relevant policies. The data included in the archive has been fully validated. The GESDB represents a dynamic catalogue with a continuously updated dataset. This is essentially a global...
ERP to cloud integration is a widely debated topic, especially in the — so popular nowadays — cloud and mobility context. This article introduces a cloud based field service management solution that integrates with ERP back offices. To increase commercial adoption and obtain ERP vendor independence, a generic integration application is proposed, that abstracts communication complexity, decreases prototyping...
In biometric score level fusion, the scores are often assumed to be independent to simplify the fusion algorithm. In some cases, the “average” performance under this independence assumption is surprisingly successful, even competing with a fusion that incorporates dependence. We present two main contributions in score level fusion: (i) proposing a new method of measuring the performance of a fusion...
Vision is the most important sense for humans and because of this human vision system we are able to see the 3D world around us with great clarity and are able to find out depth of each and every object. Many Active and Passive depth estimation techniques have been proposed which are capable of estimating depth of real world scene among which one of the passive method, stereo vision has been proven...
The aim of this study is to construct a system for pre-processing a text, including tokenization and correction of statements from social network, in order to adapt them for further extraction of information and sentiment analysis. Correction algorithm uses dictionary methods, statistical methods and rules-based approach. The system was tested on 50 statements including different kinds of errors....
The OSN's (On-line Social Networks) have reached an incredible popularity in modern Internet. Those systems have been present in the daily lives of countless people helping them to share personal experiences, expectations and opinions. So high popularity has made of such networks complex systems. To understand the operation and phenomena that occur in such networks, there are metrics and models that...
Single-criteria decision making queries can be answered using simple SQL queries, however a multi-criteria decision making problems are often not answered by normal SQL queries. In order to solve these types of queries we may need to use co-operative query languages etc. However using additional query based system incurs extra cost. Moreover, if the criteria in a query are complementary to each other...
In this paper, we analyze the effect of boosting in image quality assessment through multi-method fusion. On the contrary of existing studies that propose a single quality estimator, we investigate the generalizability of multi-method fusion as a framework. In addition to support vector machines that are commonly used in the multi-method fusion studies, we propose using neural networks in the boosting...
Person reidentification is a problem of recognizing a person across non-overlapping camera views. Pose variations, illumination conditions, low resolution images, and occlusion are the main challenges encountered in reidentification. Due to the uncontrolled environment in which the videos are captured, people could appear in different poses and due to which the appearance of a person could vary significantly...
With the increasing size of digital libraries (DLs) it has become a challenge to identify author names correctly and assign publications to them. The situation becomes more critical when different persons share the same name (homonym problem) or when the names of authors are presented in several different ways (synonym problem). This paper focuses on homonym names in the computer science bibliography...
We present COVERAGE — a novel database containing copy-move forged images and their originals with similar but genuine objects. COVERAGE is designed to highlight and address tamper detection ambiguity of popular methods, caused by self-similarity within natural images. In COVERAGE, forged-original pairs are annotated with (i) the duplicated and forged region masks, and (ii) the tampering factor/similarity...
This paper presents local structure tensor (LST) based methods for extracting the anisotropy and orientation information characterizing a textured image sample. A Log-Euclidean (LE) multivariate Gaussian model is proposed for representing the marginal distribution of the LST field of a texture. An extended model is considered as well for describing its spatial dependencies. The potential of these...
Depth-Image-Based-Rendering (DIBR) is fundamental in free-viewpoint 3D video, which has been widely used to generate synthesized views from multi-view images. The majority of DIBR algorithms cause disoccluded regions, which are the areas invisible in original views but emerge in synthesized views. The quality of synthesized images is mainly contaminated by distortions in these disoccluded regions...
Omnidirectional cameras are commonly used in computer vision and robotics. Their main advantage is their wide field of view which allows them to acquire a 360 degree view of the scene with only one sensor and a single shot. However, few studies have investigated the human detection problem using this kind of cameras. In this paper, we propose to extend the conventional approach for human detection...
Anthropology studies show that genetic features are inherited by children from their parents resulting in visual resemblance between them. This paper presents a novel SIFT flow based genetic Fisher vector feature (SF-GFVF) which enhances the facial genetic features for kinship verification. The proposed SF-GFVF feature is derived by applying a novel similarity enhancement method based on SIFT flow...
Saliency models provide heatmaps highlighting the probability of each pixel to attract human gaze. To define image's important regions, features maps are extracted. The rarity, surprise or contrast are computed leading to conspicuity maps, showing important regions of each feature map. The final saliency map is obtained by merging these maps. The fusion process is usually a linear combination of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.