The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a novel data cube model, viz., SurvCube, for the multi-dimensional indexing and retrieval of surveillance videos. The proposed method provides the multi-dimensional analysis of interesting objects in surveillance videos according to the chronological view, events and locations by means of data cube structure. By employing the OLAP operation on the surveillance videos, it is able to provides...
Neural interfaces with the peripheral nervous system have been developed to provide a direct communication pathway between peripheral nerves and prosthetic limbs. This study reports a regenerated peripheral nervous system which can control the reinnervated muscles and interpret neurological signals. The acquired bioelectrical signals can be used for the interpretation of mind which will be used to...
In this paper, we present a fully-automatic human segmentation method without iteration in video sequences. To segment human body accurately, we adopt coarse-to-fine approach using human detection and background subtraction. HoG-based method is used to detect human ROI. Background subtraction is used to subtract subject image in human ROI and skeleton image. The human ROI, the subject image, and the...
We present a fast and light-weight face recognition algorithm using local feature points for mobile device. To recognize face accurately, we adopt Gabor-LBP histogram and SIFT-based local feature point. Gabor-LBP histogram is used to represent the local texture and shape of face images. SIFT-based local feature point is used to select some regions which have high probability to contain more important...
The Internet connection of cluster systems can provide the various and convenient services and can also increase the possibility of the external attacks. The malicious cracking causes the threat about the cluster system operating environment and can weaken the reliability toward the services of the cluster system base. Especially for most of huge web services based on cluster system like Internet...
This paper is on the study of anonymous PKI (public key infrastructure) framework using pseudonym - is generated by using IKE (Internet key exchange) protocol based on the DH (Diffie-Hellman) key exchange algorithm between user and PCA (Privacy CA) - and this is designed to cooperate with existing PKI. We use IKE protocol for creating pseudonym against replay attack and use RSA-based PKI certificate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.