The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the paper, a high-precision all-digital automatic gain control (AGC) algorithm for broadband real-time spectrum analyzer is proposed, which provides gain to weak signals, after the large signals and out-of-band noise have been filtered out, to ensure that weak signals have sufficient bit resolution, accuracy and quantization noise ratio in the output formatter. The effective mathematical analysis...
Designing a robust and accurate classifier is one of the most important goals in the machine learning society. This issue becomes crucial in the case of multi-class problems. In this research, a new architecture of cascaded classifiers is proposed to handle multi-class tasks. The stages of the proposed cascade are broken into some sub-stages; each contains a number of classifiers. Here, LogitBoost...
Many applications require some type of phase detectors to determine the phase relation between synchronous clocks. The European XFEL timing system [1],[2],[3] utilizes numerous phase detectors to monitor and keep clocks and triggers phase stable.
The development of photon counting detectors enables us to decompose materials in x-ray CT images. The photon counting detection can measure a linear attenuation coefficient of a given energy range, thereby contributing to the material decomposition or identification. In this detection, measured photon counts were affected by statistical noise, making it difficult to obtain accurate measurements of...
The unique capabilities of neutrons to penetrate materials opaque to X-rays and at the same time to interact with hydrogen make neutron radiography a technique of choice for the quantification of hydrogen-containing substances. However, the interaction of neutrons with hydrogen is through scattering, not absorption and unwanted scattered neutrons can be responsible for a considerable fraction of the...
As an important foundation for image-guided technology, image matching technique is the key technology of modern war. This paper proposes a new algorithm of affine invariant detector and descriptor of local invariant feature points, starting from feature point detection and description point of view, making up the traditional feature point extraction defects of small number and types. Meantime, proposes...
Dual-ended readout detector is a promising approach to extract DOI information in PET detector. To guide DOI detector design, a typical dual-ended readout DOI detector module was simulated using GATE. Four different crystal surface treatments including diffuse crystal surface combined with diffuse reflecting films (DD), diffuse crystal surface combined with specular reflecting films (DS), specular...
Image registration is the process of removing the offset between two or more images of the same location from different angles. One of the two images is the master image and the other is the slave image. In this paper an effective algorithm is proposed to align the two images; this algorithm is based on combining both area-based methods and feature-based methods. Cross-correlation function is used...
In recent years accurate algorithms for detecting objects in images have been developed. Among these algorithms, the object detection scheme proposed by Viola and Jones gained great popularity, especially after the release of high-quality face classifiers by the OpenCV group. However, as any other sliding-window based object detector, it is affected by a strong increase in the computational cost as...
In this paper, we propose a structure learning-based scene character detector which is inspired by the observation that characters have their own inherent structures compared with the background. Graphs are extracted from the thinned binary image to represent the topological line structures of scene contents. Then, a graph classifier, namely gBoost classifier, is trained with the intent to seek out...
In this paper we introduce a new person tracking-by-detection approach based on a particle filter. We leverage detection and appearance cues and apply explicit occlusion reasoning. The approach samples efficiently from a large set of available person part-detectors in order to increase runtime performance while retaining accuracy. The tracking approach is evaluated and compared to the state of the...
Scanning Electron Microscope (SEM) image acquisition is mostly affected by the time varying motion of pixel positions in the consecutive images, a phenomenon called drift. In order to perform accurate measurements using SEM, it is necessary to compensate this drift in advance. Most of the existing drift compensation methods were developed using the image correlation technique. In this paper, we present...
Financial market data is intrinsically dynamic, because it is usually generated in a sequential manner. Such dynamics are usually associated with concept drift, which indicates changes in the underlying data distribution. In this paper, we present our current work that extends from our previous work where we applied data stream mining techniques to the prediction of Taiwan Stock Exchange Capitalization...
Content-aware scaling is a method for image retargeting. It has been widely used in image manipulation including tampering. To improve the detection of the forgery in JPEG images, we propose to merge calibrated neighboring joint density and a rich models-based approach that was originally designed for steganalysis. A feature selection algorithm is utilized to reduce the feature dimensionality in the...
At present, registration of the Large size Very High Resolution (VHR) images is one of the important task in remote image analysis. However, until now, it is still rare to find an accurate and robust image registration method, and most of the existing methods are designed for small size images. Among the most popular methods, SIFT is performed well to register VHR images but the calculation procedure...
In central and western regions where the topography is complex, various obstructions such as roads, rivers, and villages interfere the deployment of the mountain seismic line. In this paper, we compared the traditional operators, such as the Robert operator, the Sobel operator, and the Laplacian operator, discovering the defect in accuracy and noise resistance. Then, a computational approach using...
Corner detection is a fundamental step for many computer vision applications to detect the salient image features. Recently, FAST corner detector has been proposed to detect the high repeatable corners with efficient computational time. However, FAST is very sensitive to noise and detects too many unnecessary corners on the noise or texture region. In this paper, we propose a robust corner detector...
We propose MJBlocker, a lightweight and run-time malicious JavaScript Extensions (JSEs) blocker for preventing them from hurting user security. MJBlocker can identify and block malicious JSEs whenever they are executed. It is motivated by the observation that most attack goals of malicious JSEs are accomplished via invoking Cross-Platform Component Object Model (XPCOM) calls, and the XPCOM call sequences...
We present a method to simultaneously track multiple objects which are subject to physical motion and can be evaluated through raw detector responses in video. Due to their two-staged design, popular tracking-by-detection approaches lack precision in the estimated trajectories due to detector inaccuracies, e.g., lighting, deformation or background clutter. Instead of separating the tasks of detection...
In order to do research on code clones, it is necessary to have information about code clones. For example, if the research is to improve clone detection, this information would be used to validate the detectors or provide a benchmark to compare different detectors. Or if the research is on techniques for managing clones, then the information would be used as input to such techniques. Typically, researchers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.