The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focus on classification of coastal landform. The study area is locate in QinZhou, Guangxi Zhuang Autonomous Region, China, using GF-1 image. In view of complex coastal landform, the current study firstly transforming RGB model to CIE LAB model, dividing image based on colour gradient, then conducting Gabor filtering and PCA transformation to develop texons and generating texton histogram...
In this paper, a novel image encryption algorithm based on bit-level Arnold transform and hyper chaotic maps is proposed. To commence, the scheme decomposes the original grayscale image into 8 binary images. Then we use chaos to generate sequences to shift the images before manipulating Arnold transform. Finally, the hyper chaotic map is adopted to produce pseudorandom sequences to diffuse the binary...
A deoxyribonucleic acid (DNA) microarray is a powerful tool that is widely used in genetics to monitor the expression levels of thousands of genes in parallel. Gridding, segmentation and intensity extraction is the process of gene expression. In the process of gene expression, gridding process information leading to dig their own DNA and provide coordinates for each point. Gridding can be implemented...
This paper applies the forest height inversion approach developed in [1] along with the automatic mosaicking algorithm described in [2], and generates a state mosaic map for the US state of New Hampshire (NH) by utilizing the spaceborne repeat-pass ALOS/PALSAR InSAR correlation magnitude data and the airborne lidar data from NH GRANIT database over the White Mountain National Forest (WMNF). Since...
This paper presents a time-to-digital converter (TDC) architecture to measure the timing difference between single-event two pulses with fine time resolution. Its features are as follows: (i) The architecture is based on stochastic process and statistics theory. (ii) It exploiting the stochastic variation in CMOS process for fine time resolution so that MOSFETs with minimum sizes are utilized. (iii)...
Depth map provides rich information and it can be utilized in object tracking to handle some challenging problems in conventional RGB tracking such as occlusions and model drift. In this paper, we present a tracker that provides an effective real-time target tracking method based on a binocular camera. The proposed tracker is an extension of the popular KCF algorithm that leverages a circulant structure...
In this paper, a new image encryption algorithm has been introduced. The algorithm includes the Lorenz system in order to produce a chaotic data and uses it to mask the images for the secure encryption. Both the high sensitivity to the initial conditions and unpredictability have increased the capability of encrypting the images. The algorithm has been tested by different methods in order to evaluate...
The content of Earth Observation archives continues to explosively grow generating the need to extract valuable knowledge from these repositories. A traditional approach for remote sensing image retrieval is to compute the similarity between the user's query and the archive using a query by example system. Additionally, effective data mining involves the user into data exploration, making use of his...
Resting-state functional magnetic resonance imaging (fMRI) has revealed aberrant brain functional networks in individuals with generalized tonic-clonic seizure (GTCS). Little is known, however, about these changes in functional hubs across different frequency bands. In this study, we applied a data-driven method named complementary ensemble empirical mode decomposition (CEEMD) to decompose the whole...
Network analysis based on anatomical covariance (cortical thickness) has been gaining increasing popularity in the last decade. However, there has not been a systematic study of the impact of nodal sizes and edge definitions on predictive performance among various network studies. In order to obtain a clear understanding of relative performance, there is a need for systematic comparison. In this study,...
Nowadays, the uses of reusable materials can be seen everywhere. Plastic material is one of the most popular recycled products, particularly plastic bottles made of PET (Polyethylene Terephthalate) and non-PET. Classification of plastic bottle types is necessary and is the first step for plastic bottles recycling processes. Thus, this paper presents multiple correlation method for classifying types...
Color transfer algorithms alter the color appearance in the source image by borrowing colors from the target image. In this paper, we present a simple yet effective generalized color transfer algorithm, taking into consideration the influences contributed from both the source and target images. We introduce the Gaussian membership function as our first color similarity measurement. This function aims...
Interactive image segmentation is able to extract the user-specified foreground objects from the whole image, which remains to be a challenging problem in image processing and computer vision. The traditional pixel-based interactive segmentation is time-consuming and neglects the neighbor information, which is hard to achieve efficient and accurate results. To address this problem, a novel region-based...
Resource allocation efficiency and energy consumption are among the top concerns to today's Cloud data center. Finding the optimal point where users' multiple job requests can be accomplished timely with minimum electricity and hardware cost is one of the key factors for system designers and managers to optimize the system configurations. Understanding the characteristics of the distribution of user...
With the development of multimedia technology and the explosive growth of video data, content-based video copy detection has attracted considerable attentions in the multimedia and the computer vision community. However, most video copy detection methods only focus on the contents of key frames and ignore their temporal context information. In this paper, we proposed to express the temporal context...
Image forgery detection is always a challenging task especially when it comes to the blind image forgery detection techniques which do not contain any water marks or signatures. Copy move forgery is a popular blind image forgery detection technique which is widely used by forgers for performing easy and efficient forgery. A copy-move forgery followed by rotation and scaling of the forged part is even...
In the present scenario when all data is in network, cloud or some data center, security and protection of data is a major concern. Encryption is one of the techniques used for this purpose. Image encryption is applied for protecting images from different kinds of attacks. Image Encryption is possible by a kind of transposition in color images or 3D images by displacing the rgb components of the color...
In the study on sports image classification, the characteristics of human pose increasingly raise concerns of researchers. However, the same posture for human may be resulted from different scenes and scene objects that express diverse action states and meanings. Thus, combination of human pose and event scenes shall be considered so as to improve performance of sports image classification. In recent...
The paper presents two systems to recognize five facial expressions (anger, surprise, joy, sadness and neutral) and gives a performance review on them. Both systems are developed on the same facial features extraction process which is histograms of oriented gradients extraction. Vectors of facial features are classified by the systems using the following proposed methods: template matching method...
Categorisation of huge amount of data on the multimedia platform is a crucial task. In this work, we propose a novel approach to address the subtle problem of selfie detection for image database segregation on the web, given rapid rise in the number of selfies being clicked. A Convolutional Neural Network (CNN) is modeled to learn a synergy feature in the common subspace of head and shoulder orientation,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.