The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates different multi-scale approaches in terms of feature extraction for classification of interfero-metric SAR (InSAR) and previously defined phase gradient InSAR (PGInSAR) images. For this purpose, the scale-space image representation approach is implemented together with the two partial derivative based structure matrices, namely the Hessian matrix and second moment matrix. Their...
Exemplar-based methods have shown their potential in synthesizing novel but visually plausible contents for image super-resolution (SR), by using the implicit knowledge conveyed by the exemplar database. In practice, however, it is common that unwanted artifacts and low quality results are produced due to the using of inappropriate exemplars. How are the “right” exemplars defined and identified? This...
Which parts of an image evoke emotions in an observer? To answer this question, we introduce a novel problem in computer vision — predicting an Emotion Stimuli Map (ESM), which describes pixel-wise contribution to evoked emotions. Building a new image database, EmotionROI, as a benchmark for predicting the ESM, we find that the regions selected by saliency and objectness detection do not correctly...
Automatic kinship verification from face images aims at verifying whether two persons have a kin relation or not by only comparing their visual facial similarities. This is an emerging topic in face analysis and computer vision. Automatic kinship verification is useful in many applications such as finding missing children, image annotation, and social media analysis. In the recent years, there has...
Heart transplantation (HT) is a life saving procedure, but a limited donor supply forces the surgeons to prioritize the recipients. The understanding of factors that predict mortality could help the doctors with this task. The objective of this study is to find locally optimal feature sets to predict survival of HT patients for different time periods. To this end, we applied logistic regression together...
Network security management is a big challenge for network administrators due to increasing vulnerabilities. Vulnerabilities are the weakness of the network and allow malicious attackers access to resources controlled by an organization. To keep networks secure network administrators should be aware of all vulnerabilities through which an attacker can gain access. In this paper, we have considered...
In this work, we describe a novel method based on waveform morphology for detecting artifacts in photoplethysmography (PPG) signals and, thus, improve reliability of PPG. By considering inter-individual and measure condition variability, specific parameters are estimated for each record. We introduce a novel metric for comparing pulses, which is the derivative of the correlation coefficient. Then,...
Image Structure Similarity (SSIM) and its extended versions have been successfully used in image quality assessment. In this paper, we propose a similarity metric to evaluate image quality by extracting image sparse structure from natural scene image. A sparse dictionary trained on the data contains the basic elements for representing sparse structures, and it is insensitive to different databases...
This review examines recent methodological approaches for the evaluation of child-robot interaction in learning settings. The main aims are to map existing work from a user-centered perspective, to identify possible trends related to evaluation methods for child-robot interaction, and to discuss potential future directions. We present a systematic review of existing studies, which have been thematically...
Existing quality assessment methods of contrast-distorted images have excellent performance by obtaining information of reference images. However, in actual life, there are not any reference images. To deal with this problem, we propose a simple yet promising no-reference quality assessment algorithm based on the human perception features for contrast-distorted images. First, human visual perception...
Clustering is a fundamental tool for data analysis. Typically, all attributes of the data are used for clustering. However, if a set of attributes can be divided into meaningful subsets, it may be effective to cluster the data for each subset. In this paper, we propose a method for dividing the set of elements of feature vectors into meaningful subsets. Considering the dependencies between the elements,...
Multispectral image fusion has attracted much attention in the area of computer vision based image processing for remote sensing, industrial automation, surveillance, medical and defense applications. The process carried out in image fusion is combining useful information stated on different channels related to the same scene. Since the proposed image fusion technique greatly improve the performance...
Nowadays, when someone wants to make a payment with a smartcard, the user has to enter a pin code to be identified. Only biometrics is able to authenticate a user; yet biometric information is sensitive. To ensure the security and privacy of biometric data, OCC (On-Card-Comparison) has been proposed. This approach consists in storing biometric data in a secure zone on a smartcard and computing the...
This article proposes a new quality assessment method of fingerprint, represented by only a set of minutiae points. The proposed quality metric is modeled with the convex-hull and Delaunay triangulation of the minutiae points. The validity of this quality metric is verified on several Fingerprint Verification Competition (FVC) databases by referring to an image-based metric from the state of the art...
For large directed graphs ranking vertices is an algorithmic as well as a computational challenge. Also it is a cornerstone problem in fields so diverse such as online social media, combinatorial optimization, deep learning, econometrics, and computational neuroscience. Gell-point centrality metric is a common case of structural vertex ranking which can be efficiently computed through power method...
Lung cancer is the leading cause of cancer death in the United States. It usually exhibits its presence with the formation of pulmonary nodules. Nodules are round or oval-shaped growth present in the lung. Computed Tomography (CT) scans are used by radiologists to detect such nodules. Computer Aided Detection (CAD) of such nodules would aid in providing a second opinion to the radiologists and would...
We cast the classic problem of achieving k-anonymity for a given database as a problem in algebraic topology. Using techniques from this field of mathematics, we propose a framework for k-anonymity that brings new insights and algorithms to anonymize a database. We focus on the simpler case when the data lies in a metric space which is instrumental in introducing the main ideas and notation. Specifically,...
Incremental planning is performed periodically to decide how a backbone optical network has to be updated to serve the forecast traffic during the next planning period. Based on reliable traffic prediction, new equipment is installed and its capacity is ready to be used. Nonetheless, due among others to the introduction of new services, exact prediction is not usually available, which leads to install...
This paper presents an approach to model melodies (and music pieces in general) as networks. Notes of a melody can be seen as nodes of a network that are connected whenever these are played in sequence. This creates a directed graph. By using complex network theory, it is possible to extract some main metrics, typical of networks, that characterize the piece. Using this framework, we provide an analysis...
Research in human visual perception has found that the sense of natural scences cannot be conveyed only through lines and edges. It also needs the knowledge of texture regions within the image, which can be obtained through the analysis of higher derivatives. Inspired by the research from neuroscience that high order derivatives can capture the details of image structure, we propose a novel simple...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.