Advanced Search
Displaying 21-30 on page 3 of 2215. Per Page  
  • Visibility Enhancement of Scene Images Degraded by Foggy Weather Condition: An Application to Video Surveillance
  • Abstract In recent years, video surveillance application played a significant role in our daily lives. Images taken during foggy and haze weather conditions for video surveillance application lose their authenticity and hence reduces the visibility. The reason behind visibility enhancement of foggy and haze images is to help numerous computer and machine vision applications such as satellite imagery, object detection, target killing, and surveillance. To remove fog and enhance visibility, a number of visibility enhancement algorithms and methods have been proposed in the past. However, these techniques suffer from several limitations that place strong obstacles to the real world outdoor computer…
  • More
  •   Views:28       Downloads:13        Download PDF
  • Machine Learning-Based Two-Stage Data Selection Scheme for Long-Term Influenza Forecasting
  • Abstract One popular strategy to reduce the enormous number of illnesses and deaths from a seasonal influenza pandemic is to obtain the influenza vaccine on time. Usually, vaccine production preparation must be done at least six months in advance, and accurate long-term influenza forecasting is essential for this. Although diverse machine learning models have been proposed for influenza forecasting, they focus on short-term forecasting, and their performance is too dependent on input variables. For a country’s long-term influenza forecasting, typical surveillance data are known to be more effective than diverse external data on the Internet. We propose a two-stage data selection…
  • More
  •   Views:27       Downloads:12        Download PDF
  • Real-Time Dense Reconstruction of Indoor Scene
  • Abstract Real-time dense reconstruction of indoor scenes is of great research value for the application and development of service robots, augmented reality, cultural relics conservation and other fields. ORB-SLAM2 method is one of the excellent open source algorithms in visual SLAM system, which is often used in indoor scene reconstruction. However, it is time-consuming and can only build sparse scene map by using ORB features to solve camera pose. In view of the shortcomings of ORB-SLAM2 method, this article proposes an improved ORB-SLAM2 solution, which uses a direct method based on light intensity to solve the camera pose. It can greatly…
  • More
  •   Views:18       Downloads:14        Download PDF
  • Development of Social Media Analytics System for Emergency Event Detection and Crisis Management
  • Abstract Social media platforms have proven to be effective for information gathering during emergency events caused by natural or human-made disasters. Emergency response authorities, law enforcement agencies, and the public can use this information to gain situational awareness and improve disaster response. In case of emergencies, rapid responses are needed to address victims’ requests for help. The research community has developed many social media platforms and used them effectively for emergency response and coordination in the past. However, most of the present deployments of platforms in crisis management are not automated, and their operational success largely depends on experts who analyze…
  • More
  •   Views:20       Downloads:14        Download PDF
  • Enhancements of SDR-Based FPGA System for V2X-VLC Communications
  • Abstract This pilot study focuses on a real measurements and enhancements of a software defined radio-based system for vehicle-to everything visible light communication (SDR-V2X-VLC). The presented system is based on a novel adaptive optimization of the feed-forward software defined equalization (FFSDE) methods of the least mean squares (LMS), normalized LMS (NLMS) and QR decomposition-based recursive least squares (QR-RLS) algorithms. Individual parameters of adaptive equalizations are adjusted in real-time to reach the best possible results. Experiments were carried out on a conventional LED Octavia III taillight drafted directly from production line and universal software radio peripherals (USRP) from National Instruments. The transmitting/receiving…
  • More
  •   Views:32       Downloads:14        Download PDF
  • Kernel Search-Framework for Dynamic Controller Placement in Software-Defined Network
  • Abstract In software-defined networking (SDN) networks, unlike traditional networks, the control plane is located separately in a device or program. One of the most critical problems in these networks is a controller placement problem, which has a significant impact on the network’s overall performance. This paper attempts to provide a solution to this problem aiming to reduce the operational cost of the network and improve their survivability and load balancing. The researchers have proposed a suitable framework called kernel search introducing integer programming formulations to address the controller placement problem. It demonstrates through careful computational studies that the formulations can design…
  • More
  •   Views:22       Downloads:14        Download PDF
  • Gait Recognition via Cross Walking Condition Constraint
  • Abstract Gait recognition is a biometric technique that captures human walking pattern using gait silhouettes as input and can be used for long-term recognition. Recently proposed video-based methods achieve high performance. However, gait covariates or walking conditions, i.e., bag carrying and clothing, make the recognition of intra-class gait samples hard. Advanced methods simply use triplet loss for metric learning, which does not take the gait covariates into account. For alleviating the adverse influence of gait covariates, we propose cross walking condition constraint to explicitly consider the gait covariates. Specifically, this approach designs center-based and pair-wise loss functions to decrease discrepancy of…
  • More
  •   Views:16       Downloads:10        Download PDF
  • Energy-Efficient Deployment of Water Quality Sensor Networks
  • Abstract Water quality sensor networks are promising tools for the exploration of oceans. Some key areas need to be monitored effectively. Water quality sensors are deployed randomly or uniformly, however, and understanding how to deploy sensor nodes reasonably and realize effective monitoring of key areas on the basis of monitoring the whole area is an urgent problem to be solved. Additionally, energy is limited in water quality sensor networks. When moving sensor nodes, we should extend the life cycle of the sensor networks as much as possible. In this study, sensor nodes in non-key monitored areas are moved to key areas.…
  • More
  •   Views:17       Downloads:13        Download PDF
  • Describe the Mathematical Model for Exchanging Waves Between Bacterial and Cellular DNA
  • Abstract In this article, we have shown that bacterial DNA could act like some coils which interact with coil-like DNA of host cells. By decreasing the separating distance between two bacterial cellular DNA, the interaction potential, entropy, and the number of microstates of the system grow. Moreover, the system gives its energy to the medium and the temperature of the host body grows. This could be seen as fever in diseases. By emitting some special waves and changing the temperature of the medium, the effects of bacterial waves could be reduced and bacterial diseases could be controlled. Many investigators have shown…
  • More
  •   Views:16       Downloads:10        Download PDF
  • A Secure Rotation Invariant LBP Feature Computation in Cloud Environment
  • Abstract In the era of big data, outsourcing massive data to a remote cloud server is a promising approach. Outsourcing storage and computation services can reduce storage costs and computational burdens. However, public cloud storage brings about new privacy and security concerns since the cloud servers can be shared by multiple users. Privacy-preserving feature extraction techniques are an effective solution to this issue. Because the Rotation Invariant Local Binary Pattern (RILBP) has been widely used in various image processing fields, we propose a new privacy-preserving outsourcing computation of RILBP over encrypted images in this paper (called PPRILBP). To protect image content,…
  • More
  •   Views:18       Downloads:12        Download PDF
Displaying 21-30 on page 3 of 2215. Per Page