The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In functional genomics, small interfering RNA (siRNA) can be used to knockdown gene expression. Usually, a target gene has numerous potential siRNAs, but their efficiencies of gene silencing often varies. Thus, for a successful RNA interference (RNAi), selecting the most effective siRNA is a critical step. Despite various computational algorithms have been developed, the efficacy prediction accuracy...
Flexible printed circuit board (FPC) is a popular substrate for packaging integrated circuits (ICs). Detecting the circles rapidly on FPCs by using computer vision is very important to assess the quality of FPCs during its manufacturing. In this paper, a fast circle detection approach based on a threshold segmentation method and a validation check is proposed. In the algorithm, the image is firstly...
Sparse code multiple access (SCMA) is a promising non-orthogonal multiple access scheme to support massive connectivity. In this paper, we propose a novel scheme to analyze the performance of Low-density Parity-check (LDPC) codes in SCMA systems based on density evolution (DE) theory. In particular, we develop the combination method including channel adapter and log-likelihood ratio (LLR) convertor...
The demand for radio spectrum is rapidly increasing for applications such as mobile telephony, digital video broadcasting (DVB), wireless local area networks (WiFi), and wireless sensor networks (ZigBee), and internet of things. Indeed, these resources are becoming increasingly scarce or even nonexistent. This scarcity has led to the concept of Cognitive Radio (CR) communication which has used to...
Nowadays, there are many serious cyber security threats such as viruses, worms and trojans but without a doubt botnets are one of the largest threats. Although there are numerous ways to discover botnets and mitigate their effects, most methods have problems effecting detection, due to their evasive characteristics. Also, the majority of previous research uses only one data source (e.g. network traffic),...
We present our design of a real-time vision-based landing pad detection and pose estimation for many Unmanned Aerial Vehicles(UAV) and implementation on Raspberry Pi. We describe the vision algorithm for precise landing pad detection and recognition and estimate the position and orientation of the UAV relative to the landing pad. The vision algorithm is robust, accurate, and computationally inexpensive...
Learned boundary maps are known to outperform handcrafted ones as a basis for the watershed algorithm. We show, for the first time, how to train watershed computation jointly with boundary map prediction. The estimator for the merging priorities is cast as a neural network that is convolutional (over space) and recurrent (over iterations). The latter allows learning of complex shape priors. The method...
The advances made in the field of IoT in recent years implore us to take a closer look at the security challenges it presents. Due to its ubiquitous nature and high heterogeneity of the connected devices and communication protocols a novel approach must be taken. This papers aim is to make a brief review of the work done in the areas of Negative Selection and Danger Theory and to do a comparative...
Paper is focused on problem of robust feature detector stability and efficiency in case when intensity distribution is uneven over image. Results of feature detector simulation and equations for estimation rate of false alarms and probability of correct detection are presented in paper.
The creation of intrusion detection systems for IoT scenarios presents various challenges. One of them being the need for an implementation of unsupervised learning and decision making in the detection syste1m. The algorithm presented in this paper is capable of definitively identifying a large percentage of possible intrusions as true or false without the need of operator input. Our proposal is based...
This article describes a completely new, fully automatic line detector algorithm that takes advantage of look-up tables to recognize and fit straight line patterns. The algorithm first recognizes any possible 4×4 pixel line patterns among the binary edge pixels and then uses several small look up tables to decide whether the connected patterns form a line or not. It is designed for real time processing...
The Neutrinos Angra (ν-Angra) Experiment aims to construct an antineutrinos detection device capable of monitoring the Angra dos Reis nuclear reactor activity. The proposed system considers a detector operating on the surface, which makes it exposed to a high rate of background noise, mainly due to cosmic rays. Therefore, the veto system has a fundamental role in the experiment viability. This paper...
Vision-based traffic light detection has been widely studied over the past decade. However, it is still a challenging task to build a real-time and robust classifier-based detector without a high dependency on prior knowledge. In this paper, we have a deep look at the design of features and detection mechanism in the domain of traffic light detection; propose a multi-scale and multi-phase detector...
The remote detection, identification and quantification of chemical vapor plumes in the atmosphere are difficult problems that have been addressed using longwave hyperspectral sensors. Chemical detection algorithms compare the sensor's spectral measurements to a library of known chemical signatures to decide whether or not a plume is present. Detection of the chemical plume is an important step in...
Image stitching is an attractive method to merging multiple images. It can produce a wide-angle panoramic photograph while maintaining the quality of the source images. The process is simply performed by overlapping part of the images which contain common scene. Today, panoramic image stitching is widely used in applications such as 360-degree cameras and virtual reality photography. If the stitching...
Visual saliency detection is usually a prerequisite for image processing tasks like object segmentation, object recognition and information compression. In this work, we first present a novel method that combines cognitive-based objectness and image-based saliency to obtain a better saliency map with less negligible background information. Then, by introducing some top-down attention priors, we further...
Stereo correspondence is one of the most important steps in binocular stereovision. It consists feature point extraction and image matching. In order to solve the problems of bad anti-noise performance and low accuracy of image matching in Scale Invariant Feature Transform (SIFT) algorithm, an optimized matching method based on local feature algorithm with Speeded-up Robust Feature (SURF) is proposed...
A novelty detection algorithm inspired by human audio pattern recognition is conceptualized and experimentally tested. Time-domain data obtained from a microphone is processed by applying a short-time FFT, which returns time-frequency patterns. Such patterns are fed to a probabilistic algorithm, which is designed to detect novel signals and identify windows in the frequency domain where such novelties...
3D human motion analysis from a single viewpoint is an extremely challenge computer vision task due to the lack of depth information and complex human movements. To resolve these problems, based on the quantum computing and immune clonal operator, a novel evolution algorithm, called a quantum-behaved clonal algorithm (QBCA), is proposed for 3D human motion analysis. Firstly, a 2D part-based human...
We propose a novel data detection algorithm and a corresponding VLSI design for large multi-user (MU) multiple-input multiple-output (MIMO) wireless receiver. Our algorithm, referred to as ADMIN, performs alternating direction method of multipliers (ADMM)-based infinity norm constrained equalization. ADMIN is an iterative algorithm that outperforms linear detectors if the number of users is small...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.