The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, robustness of star identification and attitude estimation methods that are operating in Lost-in-Space (LIS) mode, under harsh noise conditions of the near space, are analyzed. Despite star extraction, identification and attitude estimation methods that are proposed as solutions for subproblems, there is a lack of study that investigates the effects of errors in the initial stages on...
In this paper, a low computational load based region covariance descriptor (RCD) approach has been proposed. The proposed method is based on using fewer feature vectors on construction of RCD. Number of feature vectors is reduced by utilizing the random pixel decimation pattern. By making use of the proposed method, fast covariance descriptor based object tracking has been carried out. As can be seen...
Glasses detection is one of attractive tasks in image processing since it increases the performance of face recognition systems. In this study, we aimed to detect the glasses on face images automatically. In order to do this, we trained a classifier with Labelled Faces in the Wild Home(LFW) dataset to decide whether a person wear glasses or not on face images. Before classification process, image...
Higher order acoustic sensors rely on the spatial gradients of the acoustic pressure field for achieving high directivity. Two practical methods for realizing higher order acoustic sensors using acoustic vector sensor arrays are presented. The first method relies on short linear arrays of closely spaced 2-D vector sensors. The second method is based on the particle velocity measurements obtained along...
High-quality word representations have been very successful in recent years at improving performance across a variety of NLP tasks. These word representations are the mappings of each word in the vocabulary to a real vector in the Euclidean space. Besides high performance on specific tasks, learned word representations have been shown to perform well on establishing linear relationships among words...
In this paper, a feature combining method which can be used in gender classification has been proposed. This method is based on examinating the importance of the pixel regions on face images. In this study, after the analysing commonly used three feature extraction methods (Local binary patterns, discrete cosine transform, histogram of oriented gradients) dimension reduction is achieved via eliminating...
The capability of avoid obstacles is the one of the key issues in autonomous search-and-rescue robots research area. In this study, the avoiding obstacles capability has been provided to the virtula robots in USARSim environment. The aim is finding the minimum movement when robot faces an obstacle in path. For obstacle avoidance we used an real time path planning method which is called Vector Field...
In this paper, we investigate a new design technique that adopts a modern optimization scheme called the second-order-cone-programming (SOCP) for designing an all-pass (AP) phase-correction-network (PCN). The PCN is required in the digital communications through non-linear phase channel such that the non-linear phase characteristic can be corrected to nearly linear phase. As a consequence, applying...
In this study, it is aimed to follow a visual route by an Unmanned Aerial Vehicle (UAV). The recognition of the predetermined line by using image processing algorithms and the process of following the route by using the method of Tangent Vector Field Guidance (TVFG) have been performed in indoor and outdoor experiments. UAV s following the correct route has been ensured by calculating the deflection...
Nowadays, image processing software has been improved progressively. Image modifications with unnoticed tricks are available via advanced software. There are many image tricky techniques and Copy-Move Forgery is the most extensive. It is called copy-move forgery when duplicated image region is pasted to another location in same image. In this study, image is divided into sub-blocks to detect tricky...
Underwater acoustic vector sensors (AVS) are devices which can measure scalar pressure and three dimensional acceleration or particle velocity with only one sensor. Bearing estimation for the target can be accomplished by these four measured scalar values. Algorithms based on closed-form expressions or beamforming can be carried out for direction finding by using the axial projections of the gradient...
Compressive sensing (CS) has been viewed as a promising technology to greatly improve the communication efficiency of data gathering in wireless sensor networks. However, this new data collection paradigm may bring in new threats but few study has paid attention to prevent information leakage during compressive data gathering. In this paper, we identify two statistical inference attacks and demonstrate...
Edge detection is most popular problem in image analysis. To develop an edge detection method that has efficient computation time, sensing to noise as minimum level and extracting meaningful edges from the image, so that many crowded edge detection algorithms have emerged in this area. The different derivative operators and possible different scales are needed in order to properly determine all meaningful...
The performance of a face recognition system is negatively affected by the accessories used on the face. Like many methods, the recognition performance of the Common Vector Approach (CVA) [1] over occluded images is not at the desired level. In this work, we proposed an extension of the CVA, namely the Modular Common Vector Approach (M-CVA), which improves the recognition performance at the occluded...
The simple and effective control system for shunt active power filter based on the principle of the direct calculation of the three-phase current instantaneous values is proposed. Depending on the application conditions one of the nine control methods optimal for certain quality characteristics can be selected. The MatLab model for considerable active filter with the specified control system is built...
Following the wide use of cloud services, the volume of data stored in the data center has experienced a dramatically growth which makes real-time information retrieval much more difficult than before. Furthermore, text information is usually encrypted before being outsourced to data centers in order to protect users' data privacy. Current techniques to search on encrypted data do not perform well...
Distributed storage systems store redundant data to tolerate failures of storage nodes and lost data should be repaired when storage nodes fail. A class of MDS codes, called minimum-storage regenerating (MSR) codes, has been designed to optimize bandwidth consumption when repairing one single failure. Compared with repairing failures individually, the cooperative repair of multiple failures can help...
Hou et al. have analyzed wireless networks where clients served by an access point require a timely-throughput of packets to be delivered by hard per-packet deadlines and also proved the timely-throughput optimality of certain debt-based policies. However, this is a weak notion of optimality; there might be long time intervals in which a client does not receive any packets, undesirable for real-time...
Opening “prime” spectrum to unlicensed usage can lower the costs for offering wide area wireless services but may also lead to greater congestion due to multiple providers operating in the same band. To mitigate congestion, service providers may invest in more infrastructure or better technology. The costs of such investments must be weighed against the potential gains in revenue, which in turn will...
A method for allocation of periodic signal components, whose shape is not predetermined in advance and set in accordance with the specific type of recognized processes is being proposed. Obtainment of periodic components provides multiple confirmation accumulation of periods contents when signals receiving, thereby increasing its noise immunity. The method is presented by mathematical procedures for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.