After the Great East Japan Earthquake on 11 March 2011, there are many activities to cope with the disaster and future disasters. This paper discusses examples of disaster recovery activities, using Information and Co...
详细信息
ISBN:
(纸本)9781479932115
After the Great East Japan Earthquake on 11 March 2011, there are many activities to cope with the disaster and future disasters. This paper discusses examples of disaster recovery activities, using Information and Communication technology (ICT) around us in Japan.
Cloud security being the main hindrance in adoption of cloud computing has some most vulnerable security concerns as: virtualization, data and storage. Here, to provide virtualization security, the components of virtu...
详细信息
Cloud security being the main hindrance in adoption of cloud computing has some most vulnerable security concerns as: virtualization, data and storage. Here, to provide virtualization security, the components of virtualization (such as hypervisors, virtual machines, and virtual machine images) must be secured using some improvised security mechanisms. Amongst all components, Virtual machine images (VM images) are considered to be the fundamental of whole cloud security. Hence must be secured from every possible attack. In this paper, a security protocol is proposed to mainly protect the VM images from two of the possible attacks. One is the channel attack like man-in-the-middle attack (MITM attack) and second is the attack by a malicious executing environment. It is using a concept of symmetric key's component distribution providing an integrity based confidentiality and self-protection. This protection is based on an encapsulated mobile agent. Here one key component is generated and distributed in a secure manner and the other key component is derived by host platform itself using its own available resource configuration information. In order to verify the validity of this approach in overcoming different kind of security attacks, BAN logic based formal representation is presented.
In this paper, we propose a novel method for hand segmentation. To improve the robustness to the wide range of hand appearances and illuminations, we segment the hand area with a superpixels based method instead of a ...
详细信息
In this paper, we propose a novel method for hand segmentation. To improve the robustness to the wide range of hand appearances and illuminations, we segment the hand area with a superpixels based method instead of a general color model. With the exploitation of the distribution of hand pixels in color space, a distance metric learning stage is designed to promote the segmentation performance. This stage makes the points in hand areas more concentrate and pulls away from the points of background in color space. The comparisons with several widely used algorithms are made on both public available and our own datasets. The experimental results show the superior performance of our method.
In this study, a video enhancement method based on high dynamic range processing was proposed. This method can enhance images that have backlighting problems and are underexposed or overexposed to improve visibility. ...
详细信息
In this study, a video enhancement method based on high dynamic range processing was proposed. This method can enhance images that have backlighting problems and are underexposed or overexposed to improve visibility. The proposed method comprises pre-processing, illumination judgment, tone mapping, and color restoration. Initially, a small segment of an image is used to calculate an average luminance value. Next, the average luminance of each segment of the image and the reference average previously calculated are used to judge and classify the illumination of the image to facilitate the subsequent selection and setting of a tone mapping curve. Finally, these classification results are used for tone mapping to restore color and increase visibility. The main feature of this method is that two equations are used to form an S-curve function for enhancing images. This advantage enables new tone mapping curves to replace conventional exponential and logarithmic operations. Therefore, computational complexity can be substantially reduced, rendering this method appropriate for real-time digital video recording systems.
The capability of a technique to reconstruct a tomographic image of flaws existence on gas pipeline via reverse ultrasonic tomography is presented. The ultrasonic tomography system is developed to monitor flaws circum...
详细信息
The capability of a technique to reconstruct a tomographic image of flaws existence on gas pipeline via reverse ultrasonic tomography is presented. The ultrasonic tomography system is developed to monitor flaws circumferentially on pipeline with contactless measurement of distance from sensors to the pipe. In oil and gas industry, the applications of ultrasonic tomography technique for flaw detection in pipeline are limited as this technology is still in its infancy. The design of the ultrasonic tomography system consists of ultrasonic sensing system, data acquisition and image reconstruction system. A reflection mode of ultrasonic sensor is used where the output ultrasonic signal reflected from the pipe to the sensor is acquired. The collected data will be used in image reconstruction system to visualize the image. In image reconstruction process, a linear back projection algorithm is used in order to reconstruct the image of the pipe profile with flaws existence. The back projection algorithm is derived by the mathematical relationship of forward and inverse problem. This reconstruction algorithm is implemented in Matlab software to analyze the performance of the technique for different projection and arrays. Through the simulated result, the reconstructed imagebased on four projections is found to be less smeared compared to the imagebased on two projections. The effect of aliasing on the image is also reduced as the number of projection is increased. Several images of pipe with flaws existence are reconstructed based on four projections, with 7 × 7 arrays of pixels and twenty-eight of ultrasonic sensors.
The development of multimedia systems, which can handle voice and video, is fast growing. image and video capacity are the essential components of a multimedia system. Representing digital video requires large amount ...
详细信息
The development of multimedia systems, which can handle voice and video, is fast growing. image and video capacity are the essential components of a multimedia system. Representing digital video requires large amount of data, thus, video compression is necessary. In this paper, the Hybrid MC/DCT video codec standard is examined and a video compression algorithm based on the present standard is implemented. The application of Hybrid codec is done with efficiency in mind to provide the least compromise between the computational speed and compression ratio. To make such implementation practicable, the heart of its compression algorithm; the discrete cosine transform, quantization and variable length coding are analyzed carefully. The techniques such as motion compensated prediction which do not considerably reduce image quality, however improve coding efficiency are incorporated in the code. Initially, we briefly review the compression standards; then the hybrid codec technique for the moving pictures is investigated.
In the present paper we have focused our efforts in de-noising/despeckling methods for ultrasound images based on a novel multi -- transducer architecture. Frequency compounding schemes have been implemented and teste...
详细信息
In the present paper we have focused our efforts in de-noising/despeckling methods for ultrasound images based on a novel multi -- transducer architecture. Frequency compounding schemes have been implemented and tested in two different images and the results are compared with the state of the art software based methods for ultrasound image despeckling. signal -- to -- noise ratio, SNR, peak -- signal -- to -- noise ratio, PSNR, mean square error, MSE, and the mutual information measures were used to assess the performance of each method. Furthermore, a general scheme for ultrasound image processing based on the notion of sup resolution technique that combines multiple low resolution, LR, images of the same scene to produce one high resolution, HR, image, used in camera technology, is proposed. The nature of the system's architecture has made possible the use of simple but effective compounding techniques for speckle reduction while at the same time sup resolution approach may produce ultrasound images of better quality and higher resolution. Last but not least, the article provides an insight to the major problems and drawbacks of ultrasound imaging systems and how the proposed architecture is capable of effectively dealing with these problems.
Steganography is define as the process of hiding information in a multimedia carrier. Its ultimate objectives are undetectability and robustness of the hidden data. Least significant bit technique is one of the popula...
详细信息
Steganography is define as the process of hiding information in a multimedia carrier. Its ultimate objectives are undetectability and robustness of the hidden data. Least significant bit technique is one of the popular techniques in steganography. Least significant bits of cover are altered by the secret data bits. Changing the LSB's of pixels in smooth regions in the cover image at lower embedding rate will forms the poor visual quality and asymmetry into the stegos. Instead of using smooth regions, edge regions from the cover are selected for data embedding purpose. This novel approach of steganography expand the LSB matching revisited image steganography and propose a new scheme which can select the embedding regions according to the size of secret message and the difference between two consecutive pixels in the cover image. In case of lower embedding rates, only sharper edge regions are used while keeping the other smoother regions as they are. This novel scheme can enhance the security significantly compared with typical LSB based approaches as well as their edge adaptive ones, such as pixel value differencing based approaches, while maintaining excellent visual quality of stego images at the same time.
This paper conceptually proposes a context-aware recommendation system that gives optimal information for users based on 1) a content-basedimage retrieval (CBIR) mechanism to search the similar images aiming to extra...
详细信息
ISBN:
(纸本)9781479932115
This paper conceptually proposes a context-aware recommendation system that gives optimal information for users based on 1) a content-basedimage retrieval (CBIR) mechanism to search the similar images aiming to extract the detailed information to the text-inexpressible images 2) the contextual information of such similar images searched from the Web, and 3) user's dynamic context or situation considering time-variant factors as well as space factors. It is expected to increase the precision or optimality of recommendation by matching and fusing the context of similar images obtained by CBIR with textual and signal information about user's situation or dynamic context.
The 2D or 3D displacement measurement is required in the vibration testing for the scenic technology because of the complex loading conditions. However, there is no convenient 2D displacement measurement. In this rese...
详细信息
ISBN:
(纸本)9781479932115
The 2D or 3D displacement measurement is required in the vibration testing for the scenic technology because of the complex loading conditions. However, there is no convenient 2D displacement measurement. In this research, 2D displacement measurement with real time image processing is developed. The target of camera image is a lattice pattern drawn on the paper sheet.
暂无评论