Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 80, Issue 10Apr 2021
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISSN:1380-7501
Reflects downloads up to 23 Jan 2025Bibliometrics
research-article
Fault diagnosis method of rolling bearings based on VMD and MDSVM
Abstract

Rolling bearings are one of the most vulnerable parts in rotating machines. This paper presents a novel approach to identify the rolling bearings fault based on variational mode decomposition (VMD) and Mahalanobis distance support vector machine (...

research-article
A novel fusion approach in the extraction of kernel descriptor with improved effectiveness and efficiency
Abstract

Image representation using feature descriptors is crucial. A number of histogram-based descriptors are widely used for this purpose. However, histogram-based descriptors have certain limitations and kernel descriptors (KDES) are proven to overcome ...

research-article
Face detection in still images under occlusion and non-uniform illumination
Abstract

Face detection is important part of face recognition system. In face recognition, face detection is taken not so seriously. Face detection is taken for granted; primarily focus is on face recognition. Also, many challenges associated with face ...

research-article
A robust Plenoptic image watermarking method using graph-based transform
Abstract

Numerous methods have been introduced for digital images watermarking. But there are fewer studies on plenoptic images. This image has more information (such as depth) and costs more than regular digital images. So, protecting the ownership of ...

research-article
XOR-based visual secret sharing scheme using pixel vectorization
Abstract

The XOR operation has improved the recovery effect of the visual secret sharing schemes. Various visual secret sharing schemes based on XOR operation are available in the literature with some limitations, e.g. direct non-applicability of the ...

research-article
Q-learning and LSTM based deep active learning strategy for malware defense in industrial IoT applications
Abstract

Edge devices are extensively used as intermediaries between the device and the service layer in an industrial Internet of things (IIoT) environment. These devices are quite vulnerable to malware attacks. Existing studies have worked on designing ...

research-article
A novel approach for data hiding based on combined application of discrete cosine transform and coupled chaotic map
Abstract

In the recent years chaotic map and Discrete Cosine transform (DCT) have surfaced to become an important field in data hiding methods. In this proposed work, a randomly high embedding chaotic value differencing method (RCVD) based on combined ...

research-article
Survey of non-intrusive face spoof detection methods
Abstract

Biometrics are distinct physiological characteristics used to describe individuals. Compared to the traditional access control methods such as passwords and Person Identification Numbers (PIN) which can be forgotten and shared easily, biometrics ...

research-article
Delayed outputs fractional-order hyperchaotic systems synchronization for images encryption
Abstract

Communication networks, play a major role in keeping us connected and sharing the details of our lives with each other. The main driver of multimedia data transmission is to enhance security protection of this multimedia data (speech, image and ...

research-article
Countries flags detection based on local context network and color features
Abstract

Countries flags are characterized by a combination of special colors. Building an automatic country flag detector is a hard task because of many challenges like deformation and difference in point of view. Motivated by the unique feature of the ...

research-article
MES-Net: a new network for retinal image segmentation
Abstract

Glaucoma, diabetic retinopathy, and other eye diseases have seriously threatened people’s visual health. Whether it is clinical diagnosis or computer-aided diagnosis, the accurate segmentation of the retinal tissues and lesion areas (optic disc (...

research-article
An efficient wavelet-based image fusion for brain tumor detection and segmentation over PET and MRI image
Abstract

A brain tumor is an abnormal growth of cells, reproducing themselves in an uncontrolled manner. In a medical diagnosis system, the accurate detection of location and size plays a very important role in the diagnosis of brain tumors. Magnetic ...

research-article
Robust multimodal biometric authentication on IoT device through ear shape and arm gesture
Abstract

Nowadays, authentication is required for both physical access to buildings and internal access to computers and systems. Biometrics are one of the emerging technologies used to protect these highly sensitive structures. However, biometric systems ...

research-article
Feature extraction of finger-vein patterns based on boosting evolutionary algorithm and its application for loT identity and access management
Abstract

With billions of devices being connected, how to make sure that our information stays secure is becoming a hot topic of IoT. Traditional approaches to personal authentication are inadequate and ineffective in the IoT era. Finger vein technology is ...

research-article
MIMVOGUE: modeling Indian music using a variable order gapped HMM
Abstract

The computer-assisted music composition is an active research area since mid-1900. In this paper, we have applied the VOGUE model for designing musical sequence of bandish notations of raga Bhairav, a classical Indian music. Variable Order and ...

research-article
Robust automated graph regularized discriminative non-negative matrix factorization
Abstract

Non-negative matrix factorization (NMF) and its variants have been widely employed in clustering and classification task. However, the existing methods do not consider robustness, adaptive graph learning and discrimination information at the same ...

research-article
A comprehensive review on soil classification using deep learning and computer vision techniques
Abstract

Soil classification is one of the major affairs and emanating topics in a large number of countries. The population of the world is rising at a majorly rapid pace and along with the increase in population, the demand for food surges actively. ...

research-article
A robust digital watermarking method for depth-image-based rendering 3D video
Abstract

Depth-image-based rendering (DIBR) has become an accessible rendering technology for 3D video. A variety of digital watermarking methods have been proposed to protect the copyright of DIBR 3D video works. However, the robustness and ...

research-article
Realtime flicker removal for fast video streaming and detection of moving objects
Abstract

High-speed cameras are used in computer vision systems to track balls, shuttlecocks, or players in many different sports. Collected information is used for statistics, as coaches’ and players’ aids to improve technique and tactics or as referees’ ...

research-article
Person re-identification based on activation guided identity and attribute classification model
Abstract

Attribute features can be exploited as high-level semantic features to help the model better express person characteristics and improve person re-identification (re-ID) performance. In this paper, a novel activation guided identity and attribute ...

research-article
Dragonfly algorithm: a comprehensive survey of its results, variants, and applications
Abstract

This paper thoroughly introduces a comprehensive review of the so-called Dragonfly algorithm (DA) and highlights its main characteristics. DA is considered one of the promising swarm optimization algorithms because it successfully applied in a ...

research-article
Medical image segmentation algorithm based on multilayer boundary perception-self attention deep learning model
Abstract

Traditional medical image segmentation methods have problems such as low segmentation accuracy and low adaptive ability. Therefore, many scholars have proposed a medical image segmentation method based on deep learning, which has achieved good ...

research-article
Image encryption with one-time password mechanism and pseudo-features
Abstract

An image encryption algorithm based on chaotic sequence and permutation matrix is presented in this paper, with the ability to create pseudo-features and realize one-time password mechanism. Firstly, the original image and the matrix which ...

research-article
Deep learning based search engine for biomedical images using convolutional neural networks
Abstract

The development of efficient search engine queries for biomedical images, especially in case of query-mismatch is still defined as an ill-posed problem. Vector-space model is found to be useful for handling the query-mismatch issue. However, ...

research-article
Underwater image enhancement using contrast limited adaptive histogram equalization and layered difference representation
Abstract

Underwater images, which have low contrast and visibility as a result of selective attenuation based on the wavelength of the light passing through water, needs some corrections to extract meaningful information from them. In this paper, we aim to ...

research-article
Filling cavities in point clouds representing human body surface using Bezier patches
Abstract

In this paper we introduce a cavity reconstructing algorithm for 3D surface scans (CRASS) developed for filling cavities in point clouds representing human body surfaces. The presented method uses Bezier patches to reconstruct missing data. The ...

research-article
A sparse representation denoising algorithm for finger-vein image based on dictionary learning
Abstract

As an important method of biometric authentication, finger-vein recognition utilizes the unique finger-vein patterns to identify individuals at a high level of accuracy and safety. However, noise components, inherent in finger-vein images, pose a ...

research-article
Traffic-light sign recognition using capsule network
Abstract

Automated driving gradually emerges as a real reality, but it still has to face various challenges, including sophisticated and volatile traffic conditions, human operating faults, etc. Amongst them, accurate understanding of traffic signs by ...

research-article
An improved partial image encryption scheme based on lifting wavelet transform, wide range Beta chaotic map and Latin square
Abstract

In this paper, an improved image cryptography method based on lifting wavelet transform, Latin square and wide range Beta chaotic map, is proposed. This scheme tends to encrypt solely the requisite components of the sensitive data in Lifting-...

research-article
Presentation attack detection system for fake Iris: a review
Abstract

The real-time solicitations of biometric systems have been extensively used for several things with the growing necessities of higher security level. There are numerous biometric traits used for person identification. In recent years, iris ...

Comments