The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes to incorporate the perceptual quality criteria into a single-channel audio source decomposition method. Unlike the existing methods, the proposed method applies a perceptually weighted Clustered Non-negative Matrix Factorization (PW-CNMF) on magnitude spectrogram of the mixed signal. CNMF decomposes an audio mixture into an additive parts based representation where the parts usually...
Today, data security in digital environment (such as text, image and video files) is revealed by development technology. Steganography and Cryptology are very important to save and hide data. Cryptology saves the message contents and steganography hides the message presence. In this study, an application of fuzzy logic (FL)-based image steganography was performed. First, the hidden messages were encrypted...
As computing power of today's computer enhances rapidly, secure encryption is getting harder and the need for powerful secure encryption methods becomes inevitable. To avoid brute-force attacks it is necessary to have a larger key space, which makes the chaotic systems more attractive. In order to sufficiently apply confusion and diffusion rules for an image data with any entropy structure, a two-dimensional...
As it is known that separation of regional and regional fields on gravity and magnetic prospecting method is an important issue. The goal is determination of properties and real depth of structures with minimum error. In this study signal-noise ratio is increased in selection depth and it is possible of monitoring of residual structures by using HYSA method. Here, HYSA method was applied on magnetic...
Visual saliency has been studied extensively in the past decades through perceptual studies using eye tracking technologies and 2D displays. Visual saliency algorithms have been successfully developed to mimick the human ability to quickly spot informative local areas in images. This paper proposes to investigate the extension of visual saliency algorithms to media displayed in 3D. We show first that...
Clustered communication technology plays an important role for supporting machine-to-machine (M2M) wireless networks with a large number of node. In this paper we investigate clustering to optimize data rate. We consider a scenario, all nodes are distributed in a circular cell and base station is at the center of this cell. In cellular network, clustering yields on channel usage and power control...
In this report, an innovative virtual tourism application that designed to work on mobile devices and that uses location based technology is being presented. Users of the application will be able to display older pictures of historical places and monuments in place of the pictures they have been taking which will be placed together by algorithms that work on pixel level. Combining the old pictures...
In this paper an eye localization algorithm which uses elliptical Gabor filters and local minima to detect eye pupils on a face image is proposed. First, face is detected in a given image. Then this face image is converted into gray-scale. Finally eye pupils are localized using elliptical Gabor filters and local minimum points. The method is tested on our combined data set using images form "ScFace",...
Today, breast cancer is one of the most frequently seen cancer types. Analyses of breast cells characteristics have great importance in diagnosis, treatment and following of this disease. In this study, classification of 699 instances of breast cancer data that is available in UCI is performed through two different types of artificial neural network algorithm. In the literature, numerous algorithms...
In this study a new approach that is used for plotting raster based image files, is proposed. Proposed method is tested on the prototype plotter which is designed as a Cartesian-robot architecture. Work list is produced by the proposed edge tracking algorithm on the canny edge detector based images. Outputs are generated from the work list as a converted atomic move commands which can be interpreted...
In this work, a new methodology is proposed for probability mass assignment to be used in Dempster-Shafer approach. The approach is developed for the cases where the prior and the current information are represented by probability density functions. Masses are assigned by comparing the prior and the current probability density functions which are assumed to be Gaussian. The proposed method is tested...
In this paper, we study and compare performance of joint transmit/receive antenna selection in MIMO-OFDM WLANs using dual polarized stacked circular microstrip antennas (SMP-SCP-ULA). At receiver side we use a flexible two-step selection algorithm (TSSA) and variable per-tone selection algorithm at transmitter side. The support of high data-rate MIMO spatial multiplexing communication in OFDM WLAN...
In this paper, a new sparse adaptive filtering algorithm is proposed. The proposed algorithm introduces a log-sum penalty term into the cost function of a mixed norm leaky least-mean-square (NLLMS) algorithm. The cost function of the NLLMS algorithm is expressed in terms of sum of exponentials with a leakage factor. As a result of the log-sum penalty, the performance of the proposed algorithm is high...
In this paper, an embedded hardware architecture for low bit depth representation based motion estimation method is proposed. The proposed hardware architecture can easily be integrated to the microprocessor systems thanks to the industry standard interface. Thus, the developed core has a structure that can be easily utilized as a sub component of state of the art video coding systems. Furthermore,...
Automatic segmentation of nanoparticles and determination of their shapes and sizes from transmission electron microscopy images are crucial for material analysis. Manual segmentation of nanoparticles produces subjective results and it is time-consuming. In this study, a new method is proposed for the automatic segmentation of the nanoparticles. First, background and foreground detection is employed...
In this work, a hardware implementation of differential evolution algorithm (DEA) on field-programmable gate array (FPGA) is realized. The implementation of DEA on FPGA is carried out to find minimum value of an equation with two unknowns. This study is a preparatory work for the training of neural networks with DEA on FPGA which is more complicated.
Kruskal's minimum spanning tree algorithm is a graph algorithm which constructs the tree with the minimum total edge length. The starting node of the tree generated by Kruskal's algorithm is not important. This is an advantage in diffusion tensor fiber analysis. In this study, a tractography approach, which does not depend on user selection, independent from a starting node, covers the whole region...
In this paper, a new approach for image edge detection using wavelet based ant colony optimization (ACO) is proposed. The proposed approach applies discrete wavelet transform (DWT) on the image. ACO is applied to the generated four subbands (Approximation, horizontal, vertical, and diagonal) separately for edge detection. After obtaining edges from the 4 subbands, inverse DWT is applied to fuse the...
In this study, it was studied on a path tracking method which is based on fuzzy logic, PI and P control for 4-wheeled differential drive autonomous mobile robots. Major problem is to force the mobile robot which is assumed to be located on a static map, to track a path that was planned by planning algorithms on the same map. Therefore, a mobile robot simulator was developed regarding a real mobile...
In recent years information security and information privacy have been more important with an increment of technology. Different techniques of stenography and cryptography are used for sending information to recipient due to safety communication channel. Lots of algorithms have been developed as a result of these techniques. In this work the message to be sent is divided into consecutive two main...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.