The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses a specific example of nonperiodic translation symmetry and presents an algorithm to automatically detect multiple poles, or their shadows, in aerial imagery by looking for consistent and overlapping regions of self-similarity across a non-urban scene. The algorithm does not rely on having a pole template or knowing its exact size. For each image patch, similar regions (or blobs)...
Color and texture have been proven to be very discriminant attributes in image analysis across many works. This paper proposes a color texture analysis method based on the graph theory, in which we convert the texture in question into an undirected weighted graph and explore the shortest paths between four pairs of pixels according to different scales and orientations of the image. Basically, we extend...
This paper reports an image-based localization for automated vehicle. The proposed method utilizes a mono-camera and a low-cost velocity and inertial sensor to estimate the vehicle pose. Image template matching is applied to provide a correlation distribution between the captured image and a vector structured digital map. A probability of the vehicle pose is then updated using the obtained correlation...
Botnets are a growing threat to the security of data and services on a global level. They exploit vulnerabilities in networks and host machines to harvest sensitive information, or make use of network resources such as memory or bandwidth in cyber-crime campaigns. Bot programs by nature are largely automated and systematic, and this is often used to detect them. In this paper, we extend upon existing...
In this paper, we study the influence from the sentiment of regular tweets on retweeting. We propose a method to calculate the sentiment score for each tweet and each Twitter user. This method enables us to place the tweets and retweets into the same time period to explore the sentiment factor. We adopt the correlation coefficient between the sentiment scores of regular tweets and those of retweets...
Elevators are the means that people often use in everyday life. From the past until nowadays many elevators have been used in many areas. Elevator systems with the formation of high-rise buildings in recent years has become more important. Early diagnosis of faults that may occur in the elevator system is very important. In this study, an approach has been proposed to monitor and detect faults on...
News videos store a huge amount of information and are a source of historical archives. The amount of news data is growing rapidly and unpredictably, hence video indexing on news videos is a tedious job. Manual indexing even though effective, it is slow and most expensive for a massive volume of data. Content Based Indexing and Retrieval (CBIR) is a solution for this problem. Textual modality based...
In an infrared tracking measurement system, using inter-image subtraction and position detection method to achieve the goal of automatic capture, using centroid tracking, correlation tracking and edge tracking related goals of automatic tracking, the test of this method with good results in actual use, which provide technical reference for the development and use of infrared tracking measurement system.
Contour detection is a fundamental problem in computer vision. However, there is still a considerable disparity between detection results and actual contours. To detect object-level contours on the basis of comprehensive analysis of potential edges, we present a deep-learning-based approach with a conditional random fields (CRF) model. We obtain the initial edgemap with a VGGNet-based model, and establish...
Free view point video (FVV), which offers immersive experience to users with multiple views, is one of the new trends in advanced visual media. These new viewpoints are traditionally synthesized via depth image-based rendering(DIBR) and geometric distortions are therefore observed. Mid-level contours descriptors are capable of evaluating such edges incoherence among the synthesized images which common...
The probabilistic patch-based similarity measure (PPBSM) is a deeply studied and widely used method for synthetic aperture radar (SAR) image processing and understanding. Considering its performance limitation, we propose a preliminary exploration of integrating the spatial correlation information into the PPBSM, and design a refined method for SAR image change detection.
Saliency detection is an important problem in many computer vision applications. As a kind of popular method, graph based manifold ranking (GMR) has been successfully used in saliency detection problem. In traditional GMR saliency detection, it involves two main stages, i.e., ranking with background queries and ranking with foreground queries. However, in GMR method, these two stages are conducted...
In recent years, shrinking size in integrated circuits has imposed a big challenge in maintaining the reliability in conventional computing. Stochastic computing has been seen as a reliable, low-cost, and low-power alternative to overcome such issues. Stochastic Computing (SC) computes data in the form of bit streams of 1s and 0s. Therefore, SC outperforms conventional computing in terms of tolerance...
We present LS-ELAS, a line segment extension to the ELAS algorithm, which increases the performance and robustness. LS-ELAS is a binocular dense stereo matching algorithm, which computes the disparities in constant time for most of the pixels in the image and in linear time for a small subset of the pixels (support points). Our approach is based on line segments to determine the support points instead...
Network log message (e.g., syslog) is valuable information to detect unexpected or anomalous behavior in a large scale network. However, pinpointing failures and their causes is not an easy problem because of a huge amount of system log data in daily operation. In this study, we propose a method extracting failures and their causes from network syslog data. The main idea of the method relies on causal...
In this paper, we propose an efficient algorithm for sharpness improvement of license plates based on image fusion, and the use of multiple images of the same vehicle in different positions of the road using information redundancy. This algorithm was used on the radar project led by MAScIR that enables to estimate the speed of vehicles, extract the license plates and improve their contrast through...
Brain connectivity is increasingly being studied using connectomes. Typical structural connectome definitions do not directly take white matter pathology into account. Presumably, pathology impedes signal transmission along fibres, leading to a reduction in function. In order to directly study disconnection and localize pathology within the connectome, we present the disconnectome, which only considers...
In this paper, we propose a novel image interpolation algorithm suitable for general scale enlargement. Different from previous AR-based interpolation algorithms which employ predetermined reference configuration to predict pixel values, we consider the context information when building AR models. Optimal references are selected by incorporating nonlocal-based correlation coefficient and the indicator...
Hardware Trojan (HT) detection methods based on the side channel analysis deeply suffer from the process variations. In order to suppress the effect of the variations, we devise a method that smartly selects two highly correlated paths for each interconnect (edge) that is suspected to have an HT on it. First path is the shortest one passing through the suspected edge and the second one is a path that...
Gate formation for 28nm node is LELE (2 times Litho, 2 times etch process) approach, which is different from traditional poly LE (Litho-Etch) process. Poly line and poly LEC (line end cut) formed during the second Litho etch process. It is great challenge to get appropriate LEC CD (Critical Dimension), meanwhile balance LEC position to achieve residue & pitting defect free. This paper introduces...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.