The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The design of CDMA sequence families using quadratic functions dates back to Gold sequences from the 1960s. Since then there have been a number of different such designs with good correlation properties, some optimal and some near-optimal, and the term “Gold-like” is usually used to denote such sequences. In this paper we use the concept of plateaued functions, not necessarily quadratic, in order...
simultaneously multiple objects matching under 2D affine transformations (six parameters or degree of freedom) is key, yet not resolved problem in computer vision. This paper proposes an optimized and efficient pattern matching method by maximizing the Normalized Cross Correlation (NCC) coefficient measure based on Multi-swarms Particle Swarm Optimization (MPSO). PSO is a kind of stochastic optimized...
In-loop filters are widely employed in video coding standards to improve coding efficiency by reducing quantization noise. However, only local spatial correlation of video frames is exploited in existing in-loop filters, which limits the improvement of video coding efficiency. In this paper, a higher order transform domain filter (HOTDF) is proposed to further reduce quantization noise. The filter...
One of the most widely studied techniques in software testing researchis mutation testing - a technique for evaluating the quality of testsuites. Despite over four decades of academic advances in thistechnique, mutation testing has not found its way to mainstreamdevelopment. The key issue with mutation testing is its highcomputational cost: it requires running the test suite against notjust the program...
In this study, a web application is presented for detecting locations with content-based similarity on high resolution orthoimagery via histogram matching methods. For this application, a web interface utilizing Bing Maps for determining query image w as constructed via ‘Python Flask Micro Web Framework’. This web interface uses the center location of the Bing Maps extent, and the image closest to...
Multiple sclerosis (MS) interrupts communication between the brain and other parts of the body causing functional deterioration. Gait impairment is a common finding in MS, one caused by several neurological symptoms. We perform an event-specific analysis to study the variable impact of MS on gait components. Our results show that the mid-swing to heel strike (HS) phase of a gait cycle is the most...
Multisubject analysis helps to jointly analyze themedical data from multiple subjects, to make insightful inferences. Multi set canonical correlation analysis (MCCA), which extends the application of canonical correlation analysis to more than two datasets, is one such statistical technique to perform multisubject analysis. MCCA aims to compute optimal data transformations such that overall correlation...
Research in time series (TS) knowledge discovery in general, and in similarity search in particular has been very active in recent years, due to the number of application domains that are progressively requiring to work with large amounts of high dimensional TS data. Unfortunately, for many practical applications, the high dimensionality in such frameworks makes it difficult to uncover important patterns...
Ultrasound speckle tracking provides a robust motion estimation of fine tissue displacements along the beam direction. Extensions to 2-D have been proposed in recent years. Due to relatively coarse lateral sampling, several solutions relied on lateral interpolation in order to achieve subsample accuracy. We introduce a new multi-dimensional speckle tracking method (MDST) with subsample accuracy in...
In this paper, we propose a simple user-assisted method for the recovery of repeating patterns in time and frequency which can occur in audio mixtures. Here, the user selects a region in a log-frequency spectrogram from which they seek to recover the underlying pattern, such as a repeating chord masked by a cough. Cross-correlation is then performed between the selected region and the spectrogram,...
When a line graph is symmetric, the associated graph Fourier transform has a fast implementation. In this paper, we extend this idea to the 2D non-separable case, where the graph of interest is a square-shaped grid. We investigate a number of symmetry types for 2D grids. Then, for each type of symmetry we derive a block-diagonalization form of the graph Laplacian matrix, based on which fast implementations...
Text proposal has been gaining interest in recent years due to the great success of object proposal in categoriesindependent object localization. In this paper, we present a novel text-specific proposal technique that provides superior bounding boxes for accurate text localization in scenes. The proposed technique, which we call Text Edge Box (TEB), uses a binary edge map, a gradient map and an orientation...
In this paper, we investigate the cryptographic properties of stream cipher and generalities of Walsh-Hadamard transform. Boolean functions play a great significance role in the design of stream cipher. It composes several LFSR (Linear feedback shift register) and a non-filtering Function which produces the output. Predominant cryptographic properties for constructing non filtering function are balancedness,...
Tiny target detections, especially power line detection, have received great attention due to its critical role in ensuring the flight safety of low-flying unmanned aerial vehicles (UAVs). In this paper, an accurate and robust power line detection method is proposed, wherein background noise is mitigated by an embedded convolution neural network (CNN) classifier before conducting the final power line...
Time series classification is an important task in data mining that has been traditionally addressed with the use of similarity-based classifiers. The 1-NN DTW is typically considered the most accurate model for temporal data. Nevertheless, some authors have recently proposed ingenious alternatives to the 1-NN DTW by using diversity of time series representation or by using DTW for feature extraction...
Visible Light Communication (VLC) is a promising technique for high-speed, low-cost wireless services with the rapid development and wide deployment of Light-Emitting Diodes (LEDs). However, the broadcast nature of the VLC makes eavesdroppers easily intercept the light communication in various settings, e.g., offices, conference rooms and airport lobbies. Although previous work put forward physical...
In this paper, a novel adequate and concise information extraction approach is explored to provide a promising alternative for manifesting the intrinsic structure of the cyclostationary signals, such as communication signals. A novel graph-based signal representation is proposed to interpret the spectral correlation function into a graph and its adjacency matrix. This graph can represent the proposed...
It is crucial for Internet company to provide highly reliable web-based services. The web-based services always have many components running in the large-scale infrastructure with complex interactions. As an indispensable part of high reliability, the diagnosis remains to be a thorny problem. With the growth of system scale and complexity, it becomes even more difficult. In this paper, we propose...
Multi-source image fusion has been the hotspot of research in recent years, in order to make the fusion results more consistent with human vision and computer processing, many classical algorithms have been proposed, such as contourlet transform, non-subsampled contourlet transform (NSCT)and so on. On this basis, this paper proposes an improved fusion method of infrared and visible images based on...
The restoration of motion-blurred image is one of important subjects of image restoration. This paper mainly researched on the restoration methods for motion-blurred image based on estimated motion blurring angle and motion blurring length. First, the motion blurring angle is estimated by Hough transform algorithm. In order to reduce the impact of concrete structure on the detection, the edge detection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.