Search results for "Image"
showing 10 items of 6818 documents
Measuring the Spatial and Spectral Performance of WorldView-3
2015
The new WorldView-3 satellite provides a unique combination of very high spatial resolution and super-spectral capabilities. This presentation explores the practical and theoretical usefulness of this platform as compared against other hyperspectral and multispectral sensors.
Robustly correlated key‐medical image for DNA‐chaos based encryption
2021
Abstract Medical images include confidential and sensitive information about patients. Hence, ensuring the security of these images is a crucial requirement. This paper proposes an efficient and secure medical image encryption‐decryption scheme based on deoxyribonucleic acid (DNA), one‐dimensional chaotic maps (tent and logistic maps), and hash functions (SHA‐256 and MD5). The first part of the proposed scheme is the key generation based on the hash functions of the image and its metadata. The key then is highly related and intensely sensitive to the original image. The second part is the rotation and permutation of the first two MSB bit‐plans of the medical image to reduce its black backgr…
Automatic Detection of Infantile Hemangioma using Convolutional Neural Network Approach
2020
Infantile hemangioma is the most common tumor of childhood. This study proposes an automatic detection as a preliminary step for a further accurate monitoring tool to evaluate the clinical status of hemangioma. For the detection of hemangioma pixels, a convolutional neural network (CNN) was trained on patches of two classes (hemangioma and nonhemangioma) from the train dataset, and then it was used to classify all the pixels of the region of interest from the test dataset. In order to evaluate the results of segmentation obtained with CNN, the region of interest of the test dataset was also segmented using two classical methods of segmentation: fuzzy c-means clustering (FCM) and segmentatio…
Development of a High Granularity Photovoltaic Model That Considers Complex Nonuniform Shadow Conditions and Different Cell Temperatures
2012
In this paper is the development of a high granularity photovoltaic model that considers complex nonuniform shadow conditions and different cell temperatures. The model integrates the nonuniform shading characteristics such as different areas for each cell, different direct and indirect solar irradiations for each cell, and different temperatures. The area of the shadow on the PV module is found using image processing. The bond graph formalism facilitates the representation of the energy exchange between the different parts of the PV module. This complexity justifies the effort to develop a high-granularity tool. The proposed model is validated through experimental tests under shading condi…
Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks
2017
With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…
123D Catch: efficiency, accuracy, constraints and limitations in architectural heritage field
2013
Today, the accurate and detailed reconstruction of geometric models of real objects has become a common process. The diffusion of Image-based 3D modeling techniques, through image-based free, low cost and open source software, have increased drastically in the past few years, especially in the sector of Cultural Heritage (Architecture, Archeology, Urban planning). Nevertheless, web based software (ARC3D, 123D Catch, Hyp3D, my3Dscanner) offer another opportunity respect the desktop systems: they use the power of cloud computing to carry out a semi-automatic data processing. In this way is overcome the considerably slowing-down of the computer of hardware-heavy approaches. Our research inves…
The Influence of Requirements in Software Model Development in an Industrial Environment
2017
Textual description of requirements is a specification technique that is widely used in industry, where time is key for success. How requirements are specified textually greatly depends on human factors. In order to study how requirements processing is affected by the level of detail in textual descriptions, this paper compares enriched textual requirements specifications with non-enriched ones. To do this, we have conducted an experiment in industry with 19 engineers of CAF (Construcciones y Auxiliares de Ferrocarril), which is a supplier of railway solutions. The experiment is a crossover design that analyzes efficiency, effectiveness, and perceived difficulty starting from a written spec…
Service level guarantee framework for IoT environments
2017
Nowadays, providing IoT environments with service level guarantee is a challenging task. We propose a framework for IoT service level guarantee thanks to several specific Service Level Agreements (SLAs) for IoT environments. We specify different SLAs for each entity contributing in our IoT architecture in order to conclude a global SLA called IoT-SLA (iSLA). These different SLAs enable IoT service provision with Quality of Service (QoS) guarantee. Achieving this guarantee requires several communications and interactions between the components of the proposed IoT architecture. These interactions allow an IoT Service Provider (IoT-SP) to conclude the iSLA with an IoT Client (IoT-C). We specif…
A Hybrid Algorithm Based on WiFi for Robust and Effective Indoor Positioning
2019
Indoor positioning based on the Wireless Fidelity (WiFi) protocol and the Pedestrian Dead Reckoning (PDR) approach is widely exploited because of the existing WiFi infrastructure in buildings and the advancement of built-in smartphone sensors. In this work, a hybrid algorithm that combines WiFi fingerprinting and PDR to both exploit their advantages as well as limiting the impact of their disadvantages is proposed. Specifically, to build a probability map from noisy Received Signal Strength (RSS), a Gaussian Process (GP) regression is deployed to estimate and construct the RSS fingerprints with incomplete data. Mean and variance of generated points are used to estimate WiFi fingerprinting p…
Fast algorithm for detection of reference spheres in digital panoramic radiography.
2009
In this paper, an algorithm for detection of reference spheres from digital panoramic radiographic images is presented. The proposed algorithm was tested on a database of 107 digital panoramic radiographic images which were used for dental diagnostics. Results show that the proposed method exhibits for detection of reference spheres, a sensitivity of 97.33% and specificity of 93.85%. Performance time differed between 0.55 and 2.36s depending on image size. The aim of this work was to provide a fast ellipse detection algorithm to reduce measuring time on preoperative implant planning by lowering the computational cost.