Search results for " Normal"

showing 10 items of 336 documents

La Escuela Normal de Maestros de Tarragona : apuntes para una monografía histórica / reunidos por Alejandro de Tudela

1897

Escoles normals Tarragona (Catalunya) Història
researchProduct

Determinantes de la elección de centro educativo por parte de los padres

2003

El objetivo de este trabajo es analizar si las condiciones socioeconómicas de las fami- lias tienen una influencia significativa en la elección de centro educativo por parte de los padres.

Escoles normalsElecció socialEducacióEconometria
researchProduct

A robust blind 3-D mesh watermarking based on wavelet transform for copyright protection

2019

Nowadays, three-dimensional meshes have been extensively used in several applications such as, industrial, medical, computer-aided design (CAD) and entertainment due to the processing capability improvement of computers and the development of the network infrastructure. Unfortunately, like digital images and videos, 3-D meshes can be easily modified, duplicated and redistributed by unauthorized users. Digital watermarking came up while trying to solve this problem. In this paper, we propose a blind robust watermarking scheme for three-dimensional semiregular meshes for Copyright protection. The watermark is embedded by modifying the norm of the wavelet coefficient vectors associated with th…

FOS: Computer and information sciences0209 industrial biotechnologyComputer sciencevideo watermarking02 engineering and technologyWatermarkingimage watermarking020901 industrial engineering & automationWaveletcopy protectionvectorsRobustness (computer science)Computer Science::Multimedia0202 electrical engineering electronic engineering information engineeringwavelet coefficient vectorsControlled IndexingComputer visionPolygon meshQuantization (image processing)RobustnessDigital watermarkingComputingMilieux_MISCELLANEOUSComputer Science::Cryptography and SecurityQuantization (signal)digital watermarkingbusiness.industrycopyrightedge normal normsWavelet transformunauthorized usersWatermarkThree-dimensional meshesMultimedia (cs.MM)mesh generationwavelet transformssynchronizing primitives3D semiregular meshesSolid modelingrobust blind 3D mesh watermarking020201 artificial intelligence & image processingArtificial intelligenceLaplacian smoothingbusinessCopyright protection[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingComputer Science - Multimediaimage resolutionDigital images
researchProduct

Color image quality assessment measure using multivariate generalized Gaussian distribution

2014

This paper deals with color image quality assessment in the reduced-reference framework based on natural scenes statistics. In this context, we propose to model the statistics of the steer able pyramid coefficients by a Multivariate Generalized Gaussian distribution (MGGD). This model allows taking into account the high correlation between the components of the RGB color space. For each selected scale and orientation, we extract a parameter matrix from the three color components sub bands. In order to quantify the visual degradation, we use a closed-form of Kullback-Leibler Divergence (KLD) between two MGGDs. Using "TID 2008" benchmark, the proposed measure has been compared with the most i…

FOS: Computer and information sciencesColor histogramColor imagebusiness.industryComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern RecognitionPattern recognitionColor spaceRGB color spacesymbols.namesakesymbolsPyramid (image processing)Artificial intelligencebusinessDivergence (statistics)Gaussian processGeneralized normal distributionMathematics
researchProduct

A Robust Blind 3-D Mesh Watermarking Technique Based on SCS Quantization and Mesh Saliency for Copyright Protection

2019

Due to the recent demand of 3-D meshes in a wide range of applications such as video games, medical imaging, film special effect making, computer-aided design (CAD), among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased in the last decade. Nowadays, the majority of robust 3-D watermarking approaches have mainly focused on the robustness against attacks while the imperceptibility of these techniques is still a serious challenge. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and scalar Costa scheme (SCS) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex n…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer science[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingQuantization (signal processing)Data_MISCELLANEOUS020207 software engineeringWatermark02 engineering and technologyGraphics (cs.GR)Computer Science - Graphics[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingComputer engineering0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPolygon meshVertex normalQuantization (image processing)Digital watermarkingCryptography and Security (cs.CR)ComputingMilieux_MISCELLANEOUSSmoothing
researchProduct

Unsupervised Anomaly and Change Detection With Multivariate Gaussianization

2022

Anomaly detection (AD) is a field of intense research in remote sensing (RS) image processing. Identifying low probability events in RS images is a challenging problem given the high dimensionality of the data, especially when no (or little) information about the anomaly is available a priori. While a plenty of methods are available, the vast majority of them do not scale well to large datasets and require the choice of some (very often critical) hyperparameters. Therefore, unsupervised and computationally efficient detection methods become strictly necessary, especially now with the data deluge problem. In this article, we propose an unsupervised method for detecting anomalies and changes …

FOS: Computer and information sciencesComputer Science - Machine LearningMultivariate statisticsComputer sciencebusiness.industryComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern RecognitionFOS: Physical sciencesImage processingPattern recognitionMultivariate normal distributionComputational Physics (physics.comp-ph)Machine Learning (cs.LG)Methodology (stat.ME)Transformation (function)Robustness (computer science)General Earth and Planetary SciencesAnomaly detectionArtificial intelligenceElectrical and Electronic EngineeringbusinessPhysics - Computational PhysicsStatistics - MethodologyChange detectionCurse of dimensionalityIEEE Transactions on Geoscience and Remote Sensing
researchProduct

Generating a Gray code for prefix normal words in amortized polylogarithmic time per word

2020

A prefix normal word is a binary word with the property that no substring has more $1$s than the prefix of the same length. By proving that the set of prefix normal words is a bubble language, we can exhaustively list all prefix normal words of length $n$ as a combinatorial Gray code, where successive strings differ by at most two swaps or bit flips. This Gray code can be generated in $\Oh(\log^2 n)$ amortized time per word, while the best generation algorithm hitherto has $\Oh(n)$ running time per word. We also present a membership tester for prefix normal words, as well as a novel characterization of bubble languages.

FOS: Computer and information sciencesGeneral Computer ScienceFormal Languages and Automata Theory (cs.FL)Property (programming)combinatorial Gray codeComputer Science - Formal Languages and Automata TheoryData_CODINGANDINFORMATIONTHEORY0102 computer and information sciences02 engineering and technologyCharacterization (mathematics)01 natural sciencesTheoretical Computer ScienceCombinatoricsSet (abstract data type)Gray codeComputer Science - Data Structures and Algorithms0202 electrical engineering electronic engineering information engineeringData Structures and Algorithms (cs.DS)MathematicsAmortized analysisSettore INF/01 - Informaticaprefix normal wordsSubstringcombinatorial generationPrefixjumbled pattern matching010201 computation theory & mathematics020201 artificial intelligence & image processingbinary languagesprefix normal words binary languages combinatorial Gray code combinatorial generation jumbled pattern matchingWord (computer architecture)Theoretical Computer Science
researchProduct

Randomized Rx For Target Detection

2018

This work tackles the target detection problem through the well-known global RX method. The RX method models the clutter as a multivariate Gaussian distribution, and has been extended to nonlinear distributions using kernel methods. While the kernel RX can cope with complex clutters, it requires a considerable amount of computational resources as the number of clutter pixels gets larger. Here we propose random Fourier features to approximate the Gaussian kernel in kernel RX and consequently our development keep the accuracy of the nonlinearity while reducing the computational cost which is now controlled by an hyperparameter. Results over both synthetic and real-world image target detection…

FOS: Computer and information sciencesHyperparameter020301 aerospace & aeronauticsComputer Science - Machine LearningComputer scienceComputer Vision and Pattern Recognition (cs.CV)0211 other engineering and technologiesComputer Science - Computer Vision and Pattern RecognitionMultivariate normal distribution02 engineering and technologyObject detectionMachine Learning (cs.LG)symbols.namesakeKernel (linear algebra)Kernel method0203 mechanical engineeringKernel (statistics)Gaussian functionsymbolsClutterAnomaly detectionAlgorithm021101 geological & geomatics engineering
researchProduct

On prefix normal words and prefix normal forms

2016

A $1$-prefix normal word is a binary word with the property that no factor has more $1$s than the prefix of the same length; a $0$-prefix normal word is defined analogously. These words arise in the context of indexed binary jumbled pattern matching, where the aim is to decide whether a word has a factor with a given number of $1$s and $0$s (a given Parikh vector). Each binary word has an associated set of Parikh vectors of the factors of the word. Using prefix normal words, we provide a characterization of the equivalence class of binary words having the same set of Parikh vectors of their factors. We prove that the language of prefix normal words is not context-free and is strictly contai…

FOS: Computer and information sciencesPrefix codePrefix normal wordPre-necklaceDiscrete Mathematics (cs.DM)General Computer ScienceFormal Languages and Automata Theory (cs.FL)Binary numberComputer Science - Formal Languages and Automata TheoryContext (language use)Binary languageLyndon words0102 computer and information sciences02 engineering and technologyPrefix grammarprefix normal formsKraft's inequalityCharacterization (mathematics)Lyndon word01 natural sciencesPrefix normal formenumerationTheoretical Computer ScienceFOS: Mathematics0202 electrical engineering electronic engineering information engineeringMathematics - CombinatoricsMathematicsDiscrete mathematicsprefix normal words prefix normal forms binary languages binary jumbled pattern matching pre-necklaces Lyndon words enumerationbinary jumbled pattern matchingSettore INF/01 - InformaticaComputer Science (all)pre-necklacesComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)prefix normal wordsPrefix010201 computation theory & mathematics020201 artificial intelligence & image processingCombinatorics (math.CO)binary languagesComputer Science::Formal Languages and Automata TheoryWord (group theory)Computer Science - Discrete MathematicsTheoretical Computer Science
researchProduct

Binary jumbled string matching for highly run-length compressible texts

2012

The Binary Jumbled String Matching problem is defined as: Given a string $s$ over $\{a,b\}$ of length $n$ and a query $(x,y)$, with $x,y$ non-negative integers, decide whether $s$ has a substring $t$ with exactly $x$ $a$'s and $y$ $b$'s. Previous solutions created an index of size O(n) in a pre-processing step, which was then used to answer queries in constant time. The fastest algorithms for construction of this index have running time $O(n^2/\log n)$ [Burcsi et al., FUN 2010; Moosa and Rahman, IPL 2010], or $O(n^2/\log^2 n)$ in the word-RAM model [Moosa and Rahman, JDA 2012]. We propose an index constructed directly from the run-length encoding of $s$. The construction time of our index i…

FOS: Computer and information sciencesString algorithmsStructure (category theory)Binary numberG.2.1Data_CODINGANDINFORMATIONTHEORY0102 computer and information sciences02 engineering and technologyString searching algorithm01 natural sciencesComputer Science - Information RetrievalTheoretical Computer ScienceCombinatoricsdata structuresSimple (abstract algebra)Computer Science - Data Structures and AlgorithmsString algorithms; jumbled pattern matching; prefix normal form; data structures0202 electrical engineering electronic engineering information engineeringParikh vectorData Structures and Algorithms (cs.DS)Run-length encodingMathematics68W32 68P05 68P20String (computer science)prefix normal formSubstringComputer Science Applicationsjumbled pattern matching010201 computation theory & mathematicsData structureSignal ProcessingRun-length encoding020201 artificial intelligence & image processingConstant (mathematics)Information Retrieval (cs.IR)Information SystemsInformation Processing Letters
researchProduct