The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the classical fractal graph - Koch curve was generated with unitary regulation of L system in visual C++, and the regular fractal graphs, fractal trees and handkerchief curves which have typical fractal characteristics were generated by changing the elements of generation. The unitary regulation of L system is intuitively expressed by computer language, it can not only help to understand...
Conventional approaches to image annotation tackle the problem based on the low-level visual information. Considering the importance of the information on the constrained interaction among the objects in a real world scene, contextual information has been utilized to recognize scene and object categories. In this paper, we propose a Bayesian approach to region-based image annotation, which integrates...
Edited video recordings, such as talk-shows and sitcoms, often include Audio-Visual clusters: frequent repetitions of closely related acoustic and visual content. For example during a political debate, every time that a given participant holds the conversational floor, her/his voice tends to co-occur with camera views (i.e. shots) showing her/his portrait. Differently from the previous Audio-Visual...
The rapid development of networks such as internet, intranet, wireless communication etc., and multimedia techniques has emphasized on the need for copyright protection, authentication and identification and secret sharing of information. Visual cryptography is a secret sharing scheme where a secret binary image (SI) is encoded into n shares of random binary patterns. If the shares are xeroxed onto...
In this paper, we propose a spatiotemporal salient objects-based approach for video retrieval. The spatiotemporal salient object is defined as the region sequence which is spatial salient and temporal continuous at the same time. As attention analysis is an effective mechanism for salient information selection, it provides a practical approach to narrow the semantic gap. Most existing methods extract...
There is an emerging focus on real-time data stream analysis on mobile devices. A wide range of data stream processing applications are targeted to run on mobile handheld devices with limited computational capabilities such as patient monitoring, driver monitoring, providing real-time analysis and visualization for emergency and disaster management, real-time optimization for courier pick-up and delivery...
Rich media application enables plenty of interactive, information-rich services to enhance end user's viewing experience. In current standards released for such service, only one rendering space is defined to handle multiple types of content belonging to the same service. However, a new trend is to assign more than one terminal device to render rich media application in a cooperative way inside a...
We propose a robust background subtraction method for multi-view images, which is essential for realizing free viewpoint video where an accurate 3D model is required. Most of the conventional methods determine background using only visual information from a single camera image, and the precise silhouette cannot be obtained. Our method employs an approach of integrating multi-view images taken by multiple...
High definition video over IP based networks (IPTV) has become a mainstay in today's consumer environment. In most applications, encoders conforming to the H.264/AVC standard are used. But even within one standard, often a wide range of coding tools are available that can deliver a vastly different visual quality. Therefore we evaluate in this contribution different coding technologies, using different...
Lipreading is applied to synthesize speech for the speech-impaired people. To get a higher recognition result, data fusion with weighting coefficients at feature level is used to integrate the lip information from different kinds of lip features. Experiments are carried out based on HMM with different states and Gaussian mixture component in a small database for speaker-dependent case. Experiment...
Free viewpoint video enables the visualisation of a scene from arbitrary viewpoints and directions. However, this flexibility in video rendering provides a challenge in 3D media for achieving spatial synchronicity between the audio and video objects. When the viewpoint is changed, its effect on the perceived audio scene should be considered to avoid mismatches in the perceived positions of audiovisual...
Most quality models for stereoscopic presentations are dedicated to measuring quality degradation caused by compression artefacts. However, non-compression distortions induced during acquisition and presentation usually have significant influence on 3D viewing experience. In this paper, we propose an objective metric for viewing experience assessment by taking camera baseline and binocular distortion...
In many applications it is necessary to be able to classify images in a database accurately and with acceptable speed. The main problem is to assign different images to right categories. The later problem becomes more challenging while dealing with large databases with many categories and subcategories. In this paper we propose a novel classification method based on an adopted hierarchical Dirichlet...
In this paper we propose two alternatives to overcome the natural asynchrony of modalities in Audio-Visual Speech Recognition. We first investigate the use of asynchronous statistical models based on Dynamic Bayesian Networks with different levels of asynchrony. We show that audio-visual models should consider asynchrony within word boundaries and not at phoneme level. The second approach to the problem...
Summary form only given. This talk gives an overview of an effort on deploying news event extraction technology for border security intelligence gathering and real-time situation monitoring for Frontex, the European Agency for the Management of Operational Cooperation at the External Borders of the Member Stated of the European Union. In particular, a hybrid multilingual event extraction system has...
As the number of pages on the web is permanently increasing, there is a need to classify pages into categories to facilitate indexing or searching them. In the method proposed here, we use both textual and visual information to find a suitable representation of web page content. In this paper, several term weights, based on TF or TF-IDF weighting are proposed. Modification is based on visual areas,...
Researched and developed the software system of Information Management and Decision Support System of the hidden danger troubleshooting of Coal Mine. By using the technology of collaborative software to realize fast circulation of information, dynamic tracking, rapid feedback, and closed-loop management of transaction processing for the hidden danger, and by applying the technology of data mining,...
Nowadays, online social networks host more and more applications in order to provide their users with the possibility of finding everything they need on a single platform. The number and diversity of interactions that take place over time between users and applications within these platforms make these environments very good candidates for learning various types of information about users' interests...
In this paper, we used X-Means clustering algorithm, incorporated data images from a so-called Iterative Data Image Rotated Bar Graph (iDIRBrG) method (formerly referred as BC method) and used Vector Fusion Visualization to achieve better traffic data analysis results compared to our previous work by improving how data signatures are constructed from the raw data set. By doing so, we effectively identify...
Large amount of social (communication) data have been generated in many applications for personal communication purpose. However, these data have not been used well currently. In this paper, we will introduce a methodology to collect and analyze those personal data, and by this for extracting social networks from the data. A system architecture will also be presented and implemented to show how the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.