The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Heart rate of a human body can be measured considering the change of blood volume in fingertip using microcontroller based methods. In this paper, a low cost and portable method is proposed and implemented to measure heart rate from fingertip using the microphone port of a computer. The method detects the volume change of blood by an optical sensor based on infrared technology. The noisy output signal...
Bullet mark comparison is one of the key techniques in the discovery of evidences in gun related cases. A bullet mark comparison method base on statistical method was presented in this paper. First the bullet marks data are gathered according to generally used equipment. Then set up frame for the bullet and analysis some kinds of error types existing in measurement. There are many coarse data that...
This paper is about a method to extract changed areas in images from different viewpoints using image processing techniques. It approximates or even outperforms previously proposed schemes with regard to inexpensive, descriptive and efficient, and a much faster image comparison method that can be computed and compared. A recent report on discolouration of world heritage Sigiri frescoes revealed that...
When capturing images from the microscope imaging system, the images captured are blur and the information in the images is lost due to noise interference in the collection process. The process of microscopy imaging and the algorithm of microscope image denoising based on wavelet transform are discussed in this paper. Spectrum value and noise variance are used to evaluate the denoising effect. The...
In this study, we test anomaly based Denial of Service (DoS) detection approaches on networks with different utilization profiles. In the experiments, we use operational background traffic and performed Distributed DoS attackswithout disturbing the operational network. Experiment results indicate that the detection approach's detection performance is inversely proportional to network utilization and...
Search log records can enhance the quality and delivery of internet information services to the end user. Analysing and exploring the search log can explore the user's behaviour. When these search logs are published it must ensure privacy of the users at the same time it should exhibit better utility. The existing ZEALOUS algorithm uses a two threshold framework to provide probabilistic differential...
Noise removing algorithms of spatial domain and various other domains find much useful in real time noise removal techniques such as medical imaging and satellite imaging applications. The order of noise and performance measures to be analyzed decides the type of denoising algorithm. The intensity based image denoising procedures and image fractal based denoising procedures are providing wider applications...
Edge is the boundary between an object and the background, and identifies the boundary between overlapping and non-over lapping objects. This means that if the edges in an image can be identified accurately, all of the objects can be located and basic properties such as area, perimeter, and shape can be measured. Here fuzzy logic based image processing is used for accurate and noise free edge detection...
Properties and performances of associative memories, based on Complex-valued Synergetic Computer (CVSC), are explored in this paper. In the proposed CVSC, the state vectors, prototype vectors and order parameters are encoded by complex values. This CVSC is extended from the conventional Synergetic Computer (RVSC) in which the order parameters produce real values in processing real-valued input and...
Most of the algorithms for evaluating image scrambling degree depend on the plain image and they cannot achieve blind evaluation. This paper indicates that the ideal scrambled image is similar to the uniform noise in spatial domain, advances a definition of ideal image scrambling which is independent of the plain image and designs a new evaluating index. In frequency domain, the gray relational degree,...
We present a Sketch-Based Interface that allows non-expert users to create an animation from just pencil and paper. The interface works as a fast mockup tool for creating animations - turning the user's freehand 2D sketches into 3D animations. To facilitate animation construction in offline or computer-scarce scenarios, special emphasis is placed on paper-based instead of tablet-based sketches. The...
Uses CAPTCHA in web page can to a certain extent, to resist the attacks from network. But many sites using the CAPTCHA is based on the English or the digital characters, and only adopts a simple deformation treatment, safety not guaranteed. The Chinese CAPTCHA in upper case characters, and adding noise, deformation processing, the machine automatically recognizes the very difficult. The experiment...
A sequential adaptive compressed sensing procedure for signal support recovery is proposed and analyzed. The procedure is based on the principle of distilled sensing, and makes used of sparse sensing matrices to perform sketching observations able to quickly identify irrelevant signal components. It is shown that adaptive compressed sensing enables recovery of weaker sparse signals than those that...
Computer electromagnetic radiation Trojan arouses concern gradually due to its particularity in route of transmission. Currently, technologies for preventing electromagnetic radiation are mainly divided into two types of software and hardware. Hardware has a high cost and limited range of application, while most of current software protection mechanism is in theoretical research stage with quite complex...
Recently, the document information managed in companies tend to be more complex and various. Specification documents are used for the technical transfer and inheritance of manufactures and services. However, the description and the meaning of the component words in specifications are often inconsistent or multiple, because a specification document is made by the persons in charge of various parts...
This thesis makes analysis through digital image processing, in which methods such as Median Filtering Noise Reduction, Sectoring Threshold Segmentation, Logical Values Match and so on are put into use to process the digital image data of barcode and to implement its fast identification. Automatic identification technology of barcode has the advantage of low cost and has been being widely used in...
This paper deals with a post-processing phase of automatic transcription of spoken documents stored in the large Czech Radio audio archive (containing hundreds of thousands of recordings). The ultimate goal of the project is to transcribe them and to allow public access to their content. In this paper we focus on methods and algorithms for unsupervised post-processing of automatically recognized recordings...
The Air Force Institute of Technology (AFIT) has developed an ultrawideband (UWB) random noise radar (RNR) that operates in the UHF band. The large fractional bandwidth and lack of phase coherency within the AFIT RNR necessitate an alternative to classical Doppler processing for velocity estimation. A time-domain approach to simultaneous range and velocity processing has been implemented in the AFIT...
We live in an era where billions of computers are interconnected. In the very near future, not only computers but also many different digital devices and other physical objects will be seamlessly connected to each other and be able to communicate with little or no human intervention. These interconnected objects are called smart devices, and this concept is called Internet of Things. In this paper,...
There are several techniques for image recognition. Among those methods, application of soft computing models on digital image has been considered to be an approach for a better result. The main objective of the present work is to provide a new approach for image recognition using Artificial Neural Networks. Initially an original gray scale intensity image has been taken for transformation. The Input...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.