The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Given a graph structure, different layout algorithms (even different settings of the same algorithm) usually result in different arrangements of vertices, and each layout may reflect certain aspects/parts of the graph more accurately than others. Thus, for high-level graph analysis tasks that rely on the overall arrangement of vertices, drawing conclusions only from one layout is risky. To alleviate...
Steganography has various useful applications. In this paper, a steganographic algorithm with high payload and low change rate is proposed. Three pixels are processed as a unit, the exclusive-or result of the second least significant bits (SLSBs) of the pixels in that unit is regarded as the flag. According to the value of the flag, as well as the Hamming distance between the least significant bits...
In recent years, several encryption schemes have been proposed to protect data from unauthorized access. It is not suitable to use traditional encryption algorithms for image encryption which were proposed for textual data. The encryption schemes used for images are computationally expensive and power hungry, hence not suitable for mobile phone devices. In this paper, an image encryption scheme is...
With the appearance of many devices that everyday captured a large number of images. The rapid access to these huge collections of images and automatically characterizing an activity or an experience from this huge collection of unlabeled and unstructured egocentric data presents major challenges and requires novel and efficient algorithmic solutions. One of the big challenges of egocentric vision...
Software engineering involves a lot of change as code artifacts are not only created once but maintained over time. In the last 25 years, major paradigms of program development have arisen – agile development with refactorings, software product lines, moving sequential code to multicore or cloud, etc. Each is centered on particular kinds of change; their conceptual foundations rely on transformations...
Due to the prevalence of Multi-set high-dimensional data in the era of big data, visualization and visual analysis of multiple sets of high-dimensional data are critical to the discovery of data patterns. Parallel Coordinates Plot (PCP) is mainly used for visual analysis of different attributes of the same set. The classic method for visualization on multi-set high-dimensional data is to use a conventional...
Aèstract-Nowadays, reconstruction of satellite images is one of the important challenges in technology. Sometimes, remote sensing images have dead pixels or pixel missing gives poor visual quality. It is mainly due to the presence of clouds, fogs, or shadows since these images are acquired by sensors at different seasons. The other serious problems in remote sensing images are instrumentation error,...
Interpolation tool plays a vital role in estimating missing values. This classical problem aims to preserve the structural information-edges and textures, in the resultant image. In this process of developing a continuous function, distractions such as blur, noise or other artifacts should not be entertained. This paper provides an overview of commonly used interpolation algorithms. Comparative discussions...
Automatic photo cropping is an important tool for improving visual quality of digital photos without resorting to tedious manual selection. Traditionally, photo cropping is accomplished by determining the best proposal window through visual quality assessment or saliency detection. In essence, the performance of an image cropper highly depends on the ability to correctly rank a number of visually...
In this paper, we discuss proportional data clustering. It emerges In many applications such as document clustering and Image classification using bag of visual words approach. When deploying mixture models for clustering, there Is always a problem of initialization, and It Is common to initialize using K-means algorithm. In proposed work, we present K-means clustering approach using different distance...
The Internet of things (IoT) has become a general trend in the electronic world. In this IoT era, various types of sensors gathering data are placed everywhere, and visual data is one of the most valuable information. While extracting important features from visual images, complex vision algorithms are often processed by high speed computing units like CPU or GPU. However, most IoT devices are mobile,...
This paper presents ParaMeter, an interactive program analysis and visualization system for large traces. Using ParaMeter, a software developer can locate and analyze regions of code that may yield to parallelization efforts and to possibly extract performance from multicore hardware. The key contributions in the paper are (1) a method to use interactive visualization of traces to find and exploit...
In the Web analytics the information delivery and the web usage is optimized and the analysis of data is done. The analytics is the measurement, collection and analysis of webpage data. Page statistics and user metrics are the important factor in most of the web analytics tool. This is the limitation of the existing tools. It does not provide design inputs for the optimization of information. This...
The main focus of this work is on analysis of the Differential Doppler method having a designed algorithm for computing and 2-D visualization of the iso doppler curves for three-positional and two-positional moving stations with a stationary target. This work also describes the effect of the target position and velocity vectors of the moving stations on the shape of the iso doppler curves. Using the...
This paper is devoted to three approaches of the face recognition realized in solving a complex program of visual identification. We described the corresponding algorithms. Graphs and fragments of their program realization are provided, the applicability of the results on the basis of the research is analyzed.
Functional Magnetic Resonance Imaging (fMRI) has been valuable to the current understanding of brain function and pre-operative evaluation of patients. In the recent years, the technique has been increasingly applied to the cases when the subject is at rest, also referred to as the resting-state fMRI. Resting-state fMRI measures spontaneous fluctuations in the blood oxygen level-dependent (BOLD) signal...
A new no-reference image quality assessment(QA) algorithm based on wavelet energy and texture analysis (WETA) is proposed in this paper. The detection of common distortion metrics, like block effects, blurring and noise is the basis of WETA algorithm. The wavelet energy difference is used as macroscopic statistical feature to compensate for the limitation of basic distortion detection, which is obtained...
Object clustering is a very challenging unsupervised learning problem in machine learning and pattern recognition. In this paper, we will study visual object pattern clustering problem by combining the k-means clustering algorithm and the binary sketch templates, which quantify each image by a vector of indicators showing that a sketch at certain location, scale, and orientation exist or not. This...
Based on the research of visual servo, this paper designs a set of high-speed dynamic target acquisition and processing visual system and also applies it to a servo robotic product. The experiment proves that this system had high robustness and instantaneity, which can detect and locate high-speed movement target and obtain its dynamic information, then sends data to the servo control system of the...
Most of applications for halftoning images are designed for a particular halftoning method. Under an automatic system, a pre-processor is needed to recognize the halftoning images and then a suitable technique can be applied to them. In this paper, a novel technique is proposed to recognize the visual patterns by order dither technique. It takes the properties of pixel ordering in the halftoning patterns...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.