Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Traversable region detection is important for autonomous visual navigation of mobile robots. Only short range traversable regions can be detected using traditional methods based on stereo vision because of the limited image resolution and baseline of stereo vision. In this paper, we propose a novel method to detect long range traversable regions without using any supervised or self-supervised learning...
Many monitoring and diagnostics algorithms are based on analyzing the spectra of signals, such as vibrations, electrical currents and voltages, torques, etc. Often the analysis involves determining exact peak locations and looking at relations between various peak groups, such as harmonic trains or sidebands. These relationships can be more telling than the actual peak locations. Manual examination...
The need to know the exact placement of a certain sensor or smart meter in a network is indispensable for all sorts of applications. From the network operator's enterprise application down to local control applications using real-time measurements for active integration of renewables. Available data from the communication systems of these metering systems, as well as measurements from these sensors...
Security is one of the key aspects in medical application that used to protect the medical image from unauthorized access. In this paper a two level secured medical image encryption scheme is proposed based on permutation and diffusion using Arnold cat map and combined key sequence of Logistic map and Tent map. Entire image encryption process is divided into permutation and diffusion. In permutation...
The sensors of a typical digital camera are broad-band, i.e. they cover most of the visible spectrum. This means that the images from the RGB channels are highly correlated. Specifically, if a luminance edge appears in one channel then it is highly likely an edge in the other two. This paper presents a parameterless diffusion algorithm that explores the correlation between the colour channels to remove...
Local binary pattern (LBP) is a simple yet powerful texture descriptor modeling the relationship of pixels to their local neighborhood. By considering multiple neighborhood radii, multi-scale LBP (MS-LBP) is derived. For MS-LBP generation, different scales LBP histograms are first extracted separately, and then combined in concatenate or joint way, resulting in a one-dimensional or multi-dimensional...
The necessary number of propagation scenarios in a generic channel model can be argued from different perspectives. When ensuring proper reproduction of channel sounding experiments, the model should reproduce the statistics of the measurements. In this context, the quantification of the distance between reference scenarios of WINNER/ITU-R model [1] enables the controlled reduction of the number of...
Automatically segmenting the salient object based on the saliency information frequently fails on the non-uniform motion blurred images. We propose a novel saliency-based object segmentation method with a self-expansion mechanism to deal with this problem in this paper. Firstly, to improve the initial localization accuracy for expansion, we integrate a modified local autocorrelation congruency into...
Intensity-based pointwise algorithms for 2D evaluation of activity in optical metrology with dynamic speckle analysis are studied. They are applied to a temporal sequence of correlated speckle patterns formed at laser illumination of the object surface. A new algorithm is proposed that provides the same quality of the 2D activity map but at less computational effort.
In this paper, we propose a theoretically new and effective feature for SAR image classification. The new feature combines traditional gray level co-occurrence matrix (GLCM) textural feature and the recent multilevel local pattern histogram (MLPH) feature. It can not only describe intrinsic property of land-cover/land-use surfaces, corresponding to textural information, but it also captures both local...
Correlation of pixels is the most important information used for image steganalysis. Current methods often consider some special types of relationships among neighboring pixels. In this paper, we propose a general descriptor to consider the correlation of pixels comprehensively. We consider the correlation of pixels in an adjacency pattern as a local correlation pattern (LCP). The LCP descriptor is...
Reduced-reference (RR) image quality assessment (IQA) method aims to accurately measure quality with part of the reference data. The challenge for RR IQA is how to effectively represent the visual content of an image with limited data for quality measurement. Inspired by the orientation selectivity (OS) mechanism in the primary visual cortex, we introduce an OS based visual pattern (OSVP) to extract...
This paper studies rigorous statistical techniques for modelling long term reliability of demand and supply of electrical power given uncertain variability in the generation and availability of wind power and conventional generation. In doing so, we take care to validate statistical assumptions, using historical observations, as well as our intuition about the actual underlying real-world statistical...
In this paper, we evaluate the generalization power of deep features (ConvNets) in two new scenarios: aerial and remote sensing image classification. We evaluate experimentally ConvNets trained for recognizing everyday objects for the classification of aerial and remote sensing images. ConvNets obtained the best results for aerial images, while for remote sensing, they performed well but were outperformed...
While hand trajectory has been successfully modeled for single arm reaching movement, few works have considered the bimanual reaching movement and no study has modeled the dyadic reaching movement. In a bimanual task, both hands belong to the same person, while in a dyadic task each hand belongs to a different person. In this paper, we study both bimanual and dyadic reaching movements and show that...
Prediction-error expansion (PEE) is an efficient technique for reversible data hiding (RDH). Instead of expanding the highest histogram bins in conventional PEE, in this paper, to better utilize the image redundancy, we propose a new PEE-based RDH scheme with an advisable expansion strategy utilizing referential prediction-errors. For each pixel, we first calculate its prediction-error and use its...
Pattern classification or clustering plays important role in a wide variety of applications in different areas like psychology and other social sciences, biology and medical sciences, pattern recognition and data mining. A lot of algorithms for supervised or unsupervised classification have been developed so far in order to achieve high classification accuracy with lower computational cost. However,...
The algorithms for computerized identification are used in different applications: from quality inspection up to complex security systems. The purpose of this paper is to investigate and present the results of applying methods for automated identification and classification of labeled chemicals. Also, a new method based on the histogram matching is investigated and compared to the known ones.
Exact recovery of a sparse solution for an underdetermined system of linear equations implies full search among all possible subsets of the dictionary, which is computationally intractable, while ℓ1 minimization will do the job when a Restricted Isometry Property holds for the dictionary. Yet, practical sparse recovery algorithms may fail to recover the vector of coefficients even when the dictionary...
Transmission of important data like text, images, video, etc over the internet is increases now days hence it's necessary to use of secure methods for multimedia data. Image encryption is most secure than other multimedia components encryption because some inherent properties such as higher data capacity and high similarity between pixels. The older encryption techniques such as AES, DES, RTS are...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.