The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We introduce a known-key scenario for steganalysis and propose an approach to construct highly accurate quantitative detectors within it. As an example we construct a quantitative detector based on the well-known SPAM-features and apply it to steganalysis of non-distorted bitmap images with LSB-matching. While the state-of-the-art methods aiming at solving this problem allow to detect payloads up...
This paper discusses the circuit comparison of the electrocardiogram (ECG) heart rate detector for wearable biomedical devices. In this work, the QRS complex is used to calculate heart rate, representing the main component of the ECG signal. In order to achieve a high level of accuracy by the detector, the measured ECG signal must be free of noise. Typically, such noise originates from power line...
In this paper, the problem of long-term tracking an object in video sequences is addressed by means of online model learning. LK (Lucas — Kanade) algorithm is adopted in the tracker, and the object model is updated by online learning. In each frame, the object is described by the location and the scale. When the LK tracker fails to track the object chosen in the first frame, the online model is started...
Visually perceiving human motion at semantic level is an important however challenging problem in multimedia area. In this work, we propose a novel approach to map the low-level responses from visual detection to semantically sensitive description to human actions. The feature map is triggered by the output of deformable part model detection, in which the critical information about body parts configuration...
Traditional supervised target detection methods need target spectra as prior knowledge. When the target spectra can only be acquired from the lab or field, they may be very different from the real target spectra obtained from images, which results in low accuracy of these target detection methods. In order to solve this problem, a new preprocessing method used for target detection in hyperspectral...
Using the life detector to identify the human's life characteristic and locate the target position rapidly and accurately are to realize the fundamental guarantee of the search and rescue personnel quickly and effectively at the scene of the fire, earthquake, etc. This paper mainly aimed at how to use Taylor algorithm to achieve the goal of positioning after detected the life signal, we put forward...
When we apply AdaBoost in pedestrian detection, a large number of examples are needed to train a detector. Except for designing features, a reasonable utilization of training examples is also significant to the detection accuracy and training time. In this paper, we propose a new method, named Weight-Loss Control Sampling (WLCS), to deal with the negative training examples by improving the training...
The paper presents an optimized multimodal biometric system for identification applications. This solution is based on innovative and computational-efficient biometric data hierarchical classifiers (with detection and discrimination stages) and also with a post-classification fusion. The detection-based classification is very suitable for applications with several security levels in which the end-users...
In this paper, an ultra-low-power area-efficient 12-bit extended counting analog-to-digital conversion (EC-ADC) is presented. A double-sampling configuration for incremental ΣΔ modulators is proposed to halve the clock frequency of EC-ADC for the same conversion accuracy and rate. A class-AB operational transconductance amplifier (OTA) for low power EC-ADC is developed. The proposed architecture has...
Ground penetrating radar (GPR) needs precise antenna positioning system for soil sections imaging. In the GPR located on wheeled vehicle or flying platform the data about its position are most often generated by standard measure devices like survey wheels or GPS. These solutions are useless for the light handheld systems especially in the hard terrain. In the paper a new method for precise positioning...
Real time spike detection is the first critical step to develop spike-sorting for brain-IC interface applications. For implantable VLSI implementation, spike detection hardware must consume low power and at the same time ensure high true positive probability while having as few false alarms as possible. Currently, Nonlinear Energy Operator (NEO) and absolute thresholding are the two most widely used...
Telemedicine or mHealth systems can improve the quality of life of patients who need to be monitored continuously. Not only will it allow them to stay at their own home with a higher level of mobility but also maintaining or even improving the accuracy of the diagnostic. Remote monitoring can enable information about the health status of all patients to be passed to the medical staff continuously...
For pedestrian detection in ADAS, using multiple classifiers generally performs better than using a single classifier in terms of accuracy since the classifiers can be made to complement one another. On the other hand, such a pedestrian detector needs to be tuned dynamically to the variation of real-world environment such as different poses of pedestrians and variable background. Thus the system is...
Most of computation time when dealing with a pedestrian detector is spent in the feature computation and then in the multi-scale classification. This second step consists of applying scanning windows at multiple scales. Depending on the number of scales and on the image dimension, this step is slow because a large number of windows is generated. An efficient pruning algorithm able to remove most of...
This paper proposes a novel human detection and validation methodology to help the visually impaired navigate in indoor environments. We used two-stage multiscale cascade object detectors with Haar features, to detect upper body parts at different poses. The resulting detections are validated by scaling them down to their annotated size and performing a multiscale window search of possible face poses...
In this paper, we study the performance of detectors in a diffusive molecular communication environment where steady uniform flow is present. We derive the expected number of information molecules to be observed in a passive spherical receiver, and determine the impact of flow on the assumption that the concentration of molecules throughout the receiver is uniform. Simulation results show the impact...
In this work, we present a novel method for accurate affine transformation estimation of image regions. We illustrate the benefits of using such a method in a point matching mechanism that enables locating large amount of point matches with high geometric precision and low rate of false matches. Recent publications have shown that considering the affine transformation model of local regions, is extremely...
Radiation thermometry is one of the important ways to obtain target temperature, which mainly includes dual-waveband colorimetric temperature measurement. The precision is limited by atmospheric transmittance and the air path radiation when infrared signature of a target measured in the atmosphere. To increase the precision, a correction-based dual-waveband color comparison thermometric method is...
Despite the concern of privacy, the method of Floating Car Data (FCD) is clearly one of the cheapest methods to provide real-time or near real-time traffic information. The method has become more affordable with the proliferation of smart-phones and with the existing infrastructure of the wireless network. In conjunction with the virtual trip lines (VTL), the FCD method can mimic the traditional traffic...
Stylometry is a method for identifying anonymous authors of anonymous texts by analyzing their writing style. While stylometric methods have produced impressive results in previous experiments, we wanted to explore their performance on a challenging dataset of particular interest to the security research community. Analysis of underground forums can provide key information about who controls a given...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.