The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Use of the graph theory tools in image processing field is growing up with each passing day. Graph theory makes the operations easier for image processing applications, and can represent digital image components completely. In image segmentation processes, the graph theory tools are also used widely. These kinds of image segmentation processes are called graph-based image segmentation. In many image...
Biometrics has been widely used in the last decades for security purposes and for increasing the confidence of people in the new informational systems. The present paper presents a new analysis and encoding method of dorsal hand vein patterns, for biometric recognition. Two multiresolution approaches, Discrete Wavelet Transform and Riesz Wavelet Transform, are firstly applied to extract directional...
In this paper, the concept named SocialStegDisc was introduced. This concept is as an application of the original idea of StegHash method which uses multimedia files as a carrier of hidden information and connects them logically with a mechanism of hashtags. SocialStegDisc is a new kind of mass-storage characterized by unlimited space and provides the set of operations on files: creation, reading,...
This paper presents a technique of adaptive digital predistortion (DPD) with a memory effect for linearization a high power amplifier (HPA). The proposed predistortion linearizer is based on Look-Up tables (LUTs) with linear interpolation and adaptive segmentation. Simulation results with a lab signal of 40W dual-band HPA with memory effect show that the proposed technique achieves a better performance...
In this work, vibration signals of a faulty induction motor are analyzed to establish an intelligent fault diagnosis system using Adaptive Neuro-Fuzzy Inference System (ANFIS). Firstly, signal spectra of individual motor fault models are obtained. Subsequently, representative characteristic frequency spectra are identified, and the correlation between the motor fault types and their corresponding...
This paper introduces the implementation of steganography method called Steglbiza, which uses tempo modulation as hidden message carrier. With the use of Python scripting language, a bit string was encoded and decoded using WAV and MP3 files. Once the message was hidden into a music files, an internet radio was created to evaluate broadcast possibilities. No dedicated music or signal processing equipment...
This study describes a new method for musical steganography utilizing the MIDI format. MIDI is a standard music technology protocol that is used around the world to create music and make it available for listening. Since no publicly available method for MIDI steganography has been found (even though there are a few methods described in the literature), the study investigates how a new algorithm for...
The basic tool in fundus treatment is laser coagulation, when a series of metered microscopic thermal wounds — laser coagulates — are applied in edema on the eye's retina. Currently available software packages are focused first on the use of the specified template (pattern) for coagulate location. Effects of the pattern application are caused by irregular coagulate location by reason of high variability...
There has been a great interest in the systems that predict clinical labels from the brain images automatically for the last decade since it is a very important task that helps clinicians for decision making. In this study, clinical labels of the structural brain magnetic resonance (MR) images are predicted automatically using the random forests ensemble method. Morphological measurements like volume...
The aim of this paper is to compare two different types of filter for the diving video processing. The two filters are a boolean filter and a fuzzy filter. These filters are applied for improving the diving video analysis aimed to introduce quantitative tools and diving performance measurement and therefore to improve training. The aim of the filter is to identify the athlete in the video to further...
Monitoring the development of embryos in In vitro fertilization (IVF) clinical procedures is essential to prevent missing crucial events, so embryos should be kept a couple of days in a Time-Lapse. Time-Lapse is a heating incubator with an embedded camera. The captured images by these devices are usually influenced by many several different kinds of factors. This paper employs a robust, fault tolerant...
The quality of service is one of challenges posed by the Cloud Computing. This issue plays an important role in making the Cloud services acceptable to customers, denotes the levels of performance, reliability, and availability offered by Cloud services. Literature has reported many implementations for measuring and ensuring QoS in Cloud Computing systems to achieve better results and meet the needs...
In this work, we analyze the usefulness of the normalized compression distance (NCD) as a similarity measure to bird species identification through audio samples. As a first approach we review the effect of different compression methods from 7z and CompLearn Toolkit, over subsets of bird audio samples obtained from the xeno-canto database. The performance of each compression method was measured applying...
One of the most important problems in radar detection design is the maintaining of Constant False Alarm (CFAR). In the context of non coherent detection for high resolution radars with low grazing angle, we propose a new decision rule that achieves the CFAR property with respect to a class of clutter models. This paper demonstrates that the new proposed detector is CFAR and robust under the assumption...
Various channels can be denoted by sparse channels and many algorithms have been proposed to exploit their sparsity. In this paper, we propose a mixed algorithm based on Greedy and LS algorithms for sparse channel estimation. Analyses of the proposed and commonly used algorithms in terms of performance and complexity are performed considering the channel's sparsity, the length of training sequence...
In this paper, we propose a novel pre-processing method for the direction-of-arrival (DOA) estimation of multiple sources in multipath environments. In such environments, radio signals impinging on an antenna array can be either uncorrelated, partially correlated or fully correlated (or coherent signals). The proposed pre-processing technique consists of receiving the radio signals at different time...
Human machine interaction fieldhas potentialapplications in different domainssuch as medicine therapies for vulnerable persons. Thus, allowing the machine to identify and understand emotional states is one of the primordial stages for affective interactivity with Humans. Recent studies have proved that physiological signals contribute to recognize the emotion. In this paper, we aim to classify the...
The Root Raised Cosine digital filter is a widely used pulse-shaping FIR filter in digital baseband communication systems. The design parameters of the filter implementation are strongly bound to the overall performance of the communication system. In this paper, we focus on a design analysis of the filter taking into account the filter band attenuation, the oversampling symbol interpolation, the...
This paper describes three methods for multiple fundamental frequencies estimation based on the multi-scale product analysis. The three methods use the autocorrelation of the multi-scale product analysis for the target pitch estimation. For the intrusion pitch, each one has its techniques. The first one uses the classic comb filtering. The second method employs the rectangular comb filter followed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.