Tracing and tracking of the peripheral devices help in terms of manufacturing and providing services to the users. However, most of the current systems which are suggested by Food and Drug Administration (FDA) are loT...
详细信息
作者:
Zaman, Muhammad ShahriarVictor Biswas, Richard
Faculty of Science and Technology Department of Computer Science and Engineering Dhaka1229 Bangladesh
Faculty of Engineering Department of Electrical and Electronic Engineering 408/1 Kuratoli Dhaka1229 Bangladesh
Deafness is an unfortunate issue of our society impairing many people. Around 3 million people in Bangladesh suffer from partial or complete deafness. One key challenge for these individuals is communicating with regu...
详细信息
This paper generalizes a shape recovery method for specular surfaces. We have use linear lights that generate planes of ray to highlight a rotating object so that its specular surfaces are computed from continuous ima...
详细信息
作者:
Selamat, AliLim, Pei-Geok
Department of Software Engineering Faculty of Computer Science and Information System Malaysia
The rapid growth of computer technologies and the advent of the World Wide Web have increased the amount and the complexity of multimedia information. A content-based image retrieval (CBIR) system has been developed a...
详细信息
ISBN:
(纸本)9781424438853
The rapid growth of computer technologies and the advent of the World Wide Web have increased the amount and the complexity of multimedia information. A content-based image retrieval (CBIR) system has been developed as an efficient image retrieval tool, whereby the user can provide their query to the system to allow it to retrieve the user's desired image from the image database. However, the traditional relevance feedback of CBIR has some limitations that will decrease the performance of the CBIR system, such as the imbalance of training-set problem, classification problem, limited information from user problem, and insufficient training-set problem. Therefore, in this study, we proposed an enhanced relevance-feedback method to support the user query based on the representative image selection and weight ranking of the images retrieved. The support vector machine (SVM) has been used to support the learning process to reduce the semantic gap between the user and the CBIR system. From these experiments, the proposed learning method has enabled users to improve their search results based on the performance of CBIR system. In addition, the experiments also proved that by solving the imbalance training set issue, the performance of CBIR could be improved.
Differential balancing theory for nonlinear model reduction relies on differential controllability and observability functions. In this paper, we further investigate them from two different perspectives. First, we est...
详细信息
The experiment of decoy state QKD has been reported using commercial QKD system based on a standard bi-directional Plug & Play set-up. By making simple modifications to a commercial quantum key distribution system...
详细信息
The use of several machine learning regression models for the prediction of power costs is explored in this work. The following models are taken into consideration: Gradient Boosting, Adaboosting, Lgbmregressor, Catab...
详细信息
The current Medium Access Control (MAC) protocol of the Wireless Access in Vehicular Environments (WAVE) system does not consider time utilization of CCH and SCH. In this paper, we present a novel mechanism to extend ...
详细信息
Radioactive materials are an attractive target for terrorist or criminal groups, because they can be used throughout the world in applications including agriculture, industry, medicine, scientific research, transport,...
详细信息
This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data...
详细信息
This paper is concerned with a vital topic in image processing:color image forgery detection. The development of computing capabilitieshas led to a breakthrough in hacking and forgery attacks on signal, image,and data communicated over networks. Hence, there is an urgent need fordeveloping efficient image forgery detection algorithms. Two main types offorgery are considered in this paper: splicing and copy-move. Splicing isperformed by inserting a part of an image into another image. On the otherhand, copy-move forgery is performed by copying a part of the image intoanother position in the same image. The proposed approach for splicingdetection is based on the assumption that illumination between the originaland tampered images is different. To detect the difference between the originaland tampered images, the homomorphic transform separates the illuminationcomponent from the reflectance component. The illumination histogramderivative is used for detecting the difference in illumination, and henceforgery detection is accomplished. Prior to performing the forgery detectionprocess, some pre-processing techniques, including histogram equalization,histogram matching, high-pass filtering, homomorphic enhancement, andsingle image super-resolution, are introduced to reinforce the details andchanges between the original and embedded sections. The proposed approachfor copy-move forgery detection is performed with the Speeded Up RobustFeatures (SURF) algorithm, which extracts feature points and feature vectors. Searching for the copied partition is accomplished through matchingwith Euclidian distance and hierarchical clustering. In addition, some preprocessing methods are used with the SURF algorithm, such as histogramequalization and single-mage super-resolution. Simulation results proved thefeasibility and the robustness of the pre-processing step in homomorphicdetection and SURF detection algorithms for splicing and copy-move forgerydetection, respectively.
暂无评论