The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
It is greatly significant to detect harmonic accurately and effectively for improving the quality of electric energy in the power system. Actually, much noise exists in signal besides harmonics, inter-harmonics, so the key is how to detect harmonic signals from the complex power system. According to the analysis of harmonic and noise, a new method is proposed in the paper to detect harmonic based...
This paper deals with mechanical fault diagnosis in three-phase induction motor from radial vibration measurement. The Hilbert pattern of the 50 Hz mono-component signal extracted from the steady state vibration signature is analyzed and found to contain useful information needed for diagnosing different mechanicals faults. Since Hilbert transform can only be applied to a mono-component signal, Kaiser...
A review of HEVC/H.265 main characteristics and some tendencies of video coding standard evolution are given. Some ideas how to improve the efficiency of video coding method are presented. The importance of proper video quality assessment for user friendly video codecs design is emphasized.
This paper presents performance analysis of a new robust S transform to process signals corrupted by the impulsive noise. Performances of the standard and the robust S transforms are compared in the impulsive noise and the additive white Gaussian noise respectively, showing that the proposed robust S transform can achieve better performance for signals in impulsive noises. Moreover, compared with...
In public e-mail systems, it is possible to solicit annotation help from users to train spam detection models. For example, we can occasionally ask a selected user to annotate whether a randomly selected message destined for their inbox is spam or not spam. Unfortunately, it is also possible that the user being solicited is an internal threat and has malicious intent. Similar to an adversary, such...
Automatic power line recognition from cluttered background is an important and challenging task for a vision based unmanned aerial vehicles (UAVs) power line inspection system. In this paper, we propose a power line recognition method based on liner object enhancement and parallel lines constraint. A new double-side filter is proposed to enhance the power lines, and then the radon transform is used...
The restoration of motion blurred images is a hot shot in the field of image processing. In this paper, The degradation model of motion blurred images is clarified, and the estimation of the PSF parameter as well as its algorithm is presented. Frequency spectrum and Radon transition are used for the length and angle calculation, then Wiener filtering and Inverse filtering are used for recovering the...
This paper proposes restoration of an image using filters before an image quality assessment is performed. Image noising is being done to a quality image by addition of impulse noise in different variances. There are two methods of image restoration namely; adaptive median filter and improved median filter. These filters are used to perform impulse noise removal function. Then the quality assessment...
This paper presents a method to hide information in audio based on CPT scheme. The proposed method is done by modifying CPT scheme used for hiding data in binary image. We do not use two matrices as key for embedding and extracting process to reduce the processing time. To ensure the security, we use Arnold transform to scramble the secret message. Experimental results show that the proposed method...
This paper introduces a copy-move image forgery detection method based on local binary patterns (LBP) and neighborhood clustering. In the proposed method, an image is first decomposed into three color components. LBP histograms are then calculated from overlapping blocks from each component. The histogram distance between the blocks is calculated and the block-pairs having the minimal distance are...
Vertical line arrays (VLAs) deployed below the critical depth in deep ocean environments have been shown to have lower levels of distant shipping noise [1]. In addition, acoustic energy from nearby targets travels via the Reliable Acoustic Path (RAP), and thus has an enhanced signal level. The combination of these two factors produces a favorable detection scenario. However, nearby surface ship interference...
This paper shows that the FBP algorithm is able to provide a solution to a weighted least-squares problem. Therefore, the projection noise model can be included in the FBP reconstruction. Bayesian information can also be incorporated in the FBP reconstruction.
In view of the selection of structuring elements problem in morphological filters, this paper presents a new method to generate structuring elements for spatially-variant (SV) morphology. This method takes the theory of amoeba morphology as a foundation and does distance transform from soft boundary to inner hard center in predefined neighborhood through a metric according to the gradient criteria...
The feature selection process aims to select a subset of relevant features to be used in model construction, reducing data dimensionality by removing irrelevant and redundant features. Although effective feature selection methods to support single-label learning are abound, this is not the case for multi-label learning. Furthermore, most of the multi-label feature selection methods proposed initially...
In this paper, we propose the development of a system for generating disparity maps using rectified images, one technique that is booming in depth perception systems in computer vision. For this reason, in this project, is made a brief explanation process associated with mating techniques for stereo vision. For this project, we explore correlation algorithms, such as sum of absolute differences and...
We prove the multiple messages semantically security of the somewhat homomorphic private-key scheme presented by van Dijk et al. And convert it into a public-key scheme by using Ron Rothblum's transformation. The initial noise in the scheme is more smaller than that in Coron's. And can also convert it into a FHE in the ways described by van Dijk.
Active noise control accuracy depends on how much destructive interference exists between the primary noise and the noise (anti noise) generated by secondary source. In this paper firstly multilayer perceptron (MLP) neural network is designed and trained with extracted features of noise signals for classification and then Empirical Mode Decomposition (EMD) is used for active noise control. The noise...
In this paper we propose a greedy method combined with the Moreau-Yosida regularization of the Poisson likelihood in order to restore images corrupted by Poisson noise. The regularization provides us with a data fidelity term with nice properties which we minimize under sparsity constraints. To do so, we use a greedy method based on a generalization of the well-known CoSaMP algorithm. We introduce...
In this paper we introduce an algorithm to analyze the human iris, long-range iris recognition software has been developed to be more user-friendliness and create an economic way to the identification. Our algorithm centralized on pupil detection, and by using estimated ranges we omit the other regions to create more efficient search space. The final decision on iris region detection provides by Hough...
Line detection in gray-scale images is a low-level processing which has many applications such as road detection in remote images and vessel detection in medical images. An efficient primitive connection-based algorithm for detecting line segments is proposed. Canny operator is used to detect edges in a digital image and all the edges are tracked to form series of edge point chains by a 4-neighbor-priority...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.