The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Movement variability has been typically thought as detrimental, but it also plays a positive role for perception and action. One positive aspect is that it allows exploring different task solutions. Using a virtual throwing task [1], we examined how participants explore task solutions as they become more skilled. Naive subjects practiced 240 throws a day for 11 days — one group (N=13) had an easy...
Information about error via visual feedback presents important information to promote motor learning. Amplifying error information has shown to be beneficial but the mechanism(s) behind such benefits have not been elucidated. We used a virtual throwing task and model-based system identification to test the hypothesis that performance improvement could not only be attained by an increase in feedback...
Underwater imaging system has been widely applied in varieties and it is desired to recover underwater image using image processing techniques. In this paper, we proposed a fourth order P_Laplace underwater image restoration method based on MSG. Although the fourth order P_Laplace method has been proved that it could effectively reduce the gradient effect, the bright spot effect and color distortion...
While rhythmically bouncing a ball with a racket appears to be a simple task, it requires precise perceptually-guided coordination between racket and ball to be successful. In this task, subjects manipulate a real table tennis racket to rhythmically bounce a virtual ball to a target height in a 2D virtual environment. Stability analyses of the mathematical model of a bouncing ball showed that dynamic...
To minimize slice excitation leakage to adjacent slices, interleaved slice acquisition is nowadays performed regularly in fMRI scanners. In interleaved slice acquisition, the number of slices skipped between two consecutive slice acquisitions is often referred to as the ‘interleave parameter’ the loss of this parameter can be catastrophic for the analysis of fMRI data. In this article we present a...
We propose a new T2 mapping method to improve the CS reconstruction based on the theory of structured sparse representation. The proposed method learns the PCA sub-dictionaries for adaptive sparse representation and suppresses the sparse coding noise to obtain good reconstructions. Experimental results demonstrate that the proposed method capable of delivering state-of-the-art performance at CS reconstruction...
In recent works it has been recognized that alpha stable distributions are convenient characterizations of some noise properties in the power line. They naturally include in their formulation both background noise and impulsive components. The intended applications of this modeling approach are twofold. First, it allows to better understand the statistical properties of the noise. Second, it allows...
Noise is fatal to image compression performance because it can be both annoying for the observer and consumes excessive bandwidth when the imagery is transmitted. Some noise, in addition to some numerical redundancy, is removed during the quantization process, but in some circumstances the removed information is easily perceived by the observer, leading to annoying visual artifacts. Perceptual quantization...
Steganography is the art of hiding information, which prevents the detection of hidden messages. It is derived from a Greek word technically meaning "Covered Writing". Comparing with cryptography, we can say that cryptography is a method where the message is not understood whereas steganography is a method where the message is not visible. Steganography can help us transcend the limitations...
Image deprivation usually occurs when certain image losses the stored information due to conversion or digitalization that decreases the quality of the image. Variation in brightness of color information in images is usually called as noise. Image usually subjects to noise of many types. The principle of Fourier transformation is used so as to decompose the image into sine and cosine components for...
Multi-oriented dehazing in video frames is not as easy as degraded of captions or graphics or air light, which usually appears in any location or any images and has high contrast, compared to its background. Images frames are frequently despoiled by full of atmosphere haze, a phenomenon due to the particles in the air that disperse light. Haze induces a loss of contrast, its visual effect is blurring...
In today's world peoples are clicking lots of pictures and also trying to preserve there past pictures, but as the time passes that pictures got damaged. To restore that damages like scratches, overlaid text or graphics can be remove by using technique called Image Inpainting. Images Inpainting is a set of techniques for making undetectable modifications to images. Applications of image inpainting...
In this paper, a novel technique is proposed based on fuzzy logic reasoning for edge detection in medical Magnetic Resonance (MR) brain image. The MR image is segmented into regions using 2×2 binary matrices. In our proposed work, it is possible to detect the edge without determining the threshold values. The ranges of values are mapped by the edge pixels distinct from each other. The Fuzzy Inference...
With today's increase in the usage of wireless devices and spectrum allocation, radio spectrum is becoming scarce and it is used partially. This has evolved a concept called the Cognitive radio to exploit the presence of these spectrum holes which utilizes cooperative spectrum sensing concept for primary user detection. This spectrum sensing concept has a drawback that an intruder can capture these...
Sigma-Delta modulators are commonly used in applications that require high resolution. In this paper a IV second order sigma delta ADC is presented. In this paper over sampling concept is used to address the problem of power dissipation and noise in ADCs. A second order sigma delta modulator is implemented using CMOS 130nm technology. Oversampling ratio is 128 and total power dissipation is found...
UWB(Ultra Wide Band) is a radio technology that transmits information spread over a large bandwidth. These systems share the radio frequency spectrum with narrowband signals and also provide high data rates, greater bandwidth and improved channel capacity. Hence it has attracted a lot of interest in researchers worldwide. The various design challenges include channel estimation and interference mitigation...
Today handwritten character recognition is one of the challenging computational processes. To the best of our knowledge, little work has been done in the area of tamil handwritten character recognition and they experimented with their own database. The main objective of this project is to get better the recognition ratewhile compared with the previous approaches for offline tamil handwritten character...
We propose a method for recovering the parameters of periodic signals with finite rate of innovation sampled using a raised cosine pulse. We show that the proposed method exhibits the same numerical stability as existing methods of its type, and we investigate the effect of oversampling on the performance of our method in the presence of noise. Our method can also be applied to non-periodic signals...
Analysis of handwritten document images is one of the key areas of research in image processing domain. The objective of the analysis is to recognize the text components in an image and extract the intended information. However, inscription of handwriting usually would be on documents with rule lines, since they act as guide lines to the writer to ensure the writing remains straight and is of uniform...
We report on a quantum key distribution (QKD) experiment where a client with an on-chip polarisation rotator can access a server through a telecom-fibre link. Large resources such as photon source and detectors are situated at server-side. We employ a reference frame independent QKD protocol for polarisation qubits and show that it overcomes detrimental effects of drifting fibre birefringence in a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.