Search results for "Image"

showing 10 items of 6818 documents

Measuring the Spatial and Spectral Performance of WorldView-3

2015

The new WorldView-3 satellite provides a unique combination of very high spatial resolution and super-spectral capabilities. This presentation explores the practical and theoretical usefulness of this platform as compared against other hyperspectral and multispectral sensors.

business.industryComputer scienceMultispectral imageHigh spatial resolutionHyperspectral imagingSatelliteComputer visionArtificial intelligenceEarth remote sensingImage sensorbusinessImage resolutionRemote sensingFourier Transform Spectroscopy and Hyperspectral Imaging and Sounding of the Environment
researchProduct

Robustly correlated key‐medical image for DNA‐chaos based encryption

2021

Abstract Medical images include confidential and sensitive information about patients. Hence, ensuring the security of these images is a crucial requirement. This paper proposes an efficient and secure medical image encryption‐decryption scheme based on deoxyribonucleic acid (DNA), one‐dimensional chaotic maps (tent and logistic maps), and hash functions (SHA‐256 and MD5). The first part of the proposed scheme is the key generation based on the hash functions of the image and its metadata. The key then is highly related and intensely sensitive to the original image. The second part is the rotation and permutation of the first two MSB bit‐plans of the medical image to reduce its black backgr…

business.industryComputer sciencePattern recognitionEncryptionImage (mathematics)CHAOS (operating system)QA76.75-76.765Signal ProcessingPhotographyKey (cryptography)Computer softwareComputer Vision and Pattern RecognitionArtificial intelligenceElectrical and Electronic EngineeringTR1-1050businessSoftwareIET Image Processing
researchProduct

Automatic Detection of Infantile Hemangioma using Convolutional Neural Network Approach

2020

Infantile hemangioma is the most common tumor of childhood. This study proposes an automatic detection as a preliminary step for a further accurate monitoring tool to evaluate the clinical status of hemangioma. For the detection of hemangioma pixels, a convolutional neural network (CNN) was trained on patches of two classes (hemangioma and nonhemangioma) from the train dataset, and then it was used to classify all the pixels of the region of interest from the test dataset. In order to evaluate the results of segmentation obtained with CNN, the region of interest of the test dataset was also segmented using two classical methods of segmentation: fuzzy c-means clustering (FCM) and segmentatio…

business.industryComputer sciencePattern recognitionImage segmentationmedicine.diseaseConvolutional neural networkOtsu's methodHemangiomasymbols.namesakeRegion of interestHistogramsymbolsmedicineSegmentationArtificial intelligencebusinessCluster analysis2020 International Conference on e-Health and Bioengineering (EHB)
researchProduct

Development of a High Granularity Photovoltaic Model That Considers Complex Nonuniform Shadow Conditions and Different Cell Temperatures

2012

In this paper is the development of a high granularity photovoltaic model that considers complex nonuniform shadow conditions and different cell temperatures. The model integrates the nonuniform shading characteristics such as different areas for each cell, different direct and indirect solar irradiations for each cell, and different temperatures. The area of the shadow on the PV module is found using image processing. The bond graph formalism facilitates the representation of the energy exchange between the different parts of the PV module. This complexity justifies the effort to develop a high-granularity tool. The proposed model is validated through experimental tests under shading condi…

business.industryComputer sciencePhotovoltaic systemImage processingMaximum power point trackingRenewable energyComputational scienceSettore ING-INF/04 - AutomaticaShadowGranularitybusinessRepresentation (mathematics)Bond graphHigh granularity photovoltaic model solar cells renewable energies
researchProduct

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct

123D Catch: efficiency, accuracy, constraints and limitations in architectural heritage field

2013

Today, the accurate and detailed reconstruction of geometric models of real objects has become a common process. The diffusion of Image-based 3D modeling techniques, through image-based free, low cost and open source software, have increased drastically in the past few years, especially in the sector of Cultural Heritage (Architecture, Archeology, Urban planning). Nevertheless, web based software (ARC3D, 123D Catch, Hyp3D, my3Dscanner) offer another opportunity respect the desktop systems: they use the power of cloud computing to carry out a semi-automatic data processing. In this way is overcome the considerably slowing-down of the computer of hardware-heavy approaches. Our research inves…

business.industryComputer scienceProcess (engineering)Cloud computingImage-based modeling 3D reconstruction Photogrammetry Computer Vision Architectural Heritage3D modelingIndustrial engineeringField (computer science)Cultural heritagePhotogrammetryUrban planningImage-based modelingSettore ICAR/17 - DisegnoArchitecturebusinessSimulation
researchProduct

The Influence of Requirements in Software Model Development in an Industrial Environment

2017

Textual description of requirements is a specification technique that is widely used in industry, where time is key for success. How requirements are specified textually greatly depends on human factors. In order to study how requirements processing is affected by the level of detail in textual descriptions, this paper compares enriched textual requirements specifications with non-enriched ones. To do this, we have conducted an experiment in industry with 19 engineers of CAF (Construcciones y Auxiliares de Ferrocarril), which is a supplier of railway solutions. The experiment is a crossover design that analyzes efficiency, effectiveness, and perceived difficulty starting from a written spec…

business.industryComputer scienceProcess (engineering)Level of detail (writing)020207 software engineering02 engineering and technologyElectronic mailSoftware0202 electrical engineering electronic engineering information engineeringKey (cryptography)020201 artificial intelligence & image processingSoftware requirementsSoftware engineeringbusinessSoftware measurementNatural language2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
researchProduct

Service level guarantee framework for IoT environments

2017

Nowadays, providing IoT environments with service level guarantee is a challenging task. We propose a framework for IoT service level guarantee thanks to several specific Service Level Agreements (SLAs) for IoT environments. We specify different SLAs for each entity contributing in our IoT architecture in order to conclude a global SLA called IoT-SLA (iSLA). These different SLAs enable IoT service provision with Quality of Service (QoS) guarantee. Achieving this guarantee requires several communications and interactions between the components of the proposed IoT architecture. These interactions allow an IoT Service Provider (IoT-SP) to conclude the iSLA with an IoT Client (IoT-C). We specif…

business.industryComputer scienceQuality of service020206 networking & telecommunications02 engineering and technologyService providerTask (project management)Order (business)Service level0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessInternet of ThingsComputer networkProceedings of the 1st International Conference on Internet of Things and Machine Learning
researchProduct

A Hybrid Algorithm Based on WiFi for Robust and Effective Indoor Positioning

2019

Indoor positioning based on the Wireless Fidelity (WiFi) protocol and the Pedestrian Dead Reckoning (PDR) approach is widely exploited because of the existing WiFi infrastructure in buildings and the advancement of built-in smartphone sensors. In this work, a hybrid algorithm that combines WiFi fingerprinting and PDR to both exploit their advantages as well as limiting the impact of their disadvantages is proposed. Specifically, to build a probability map from noisy Received Signal Strength (RSS), a Gaussian Process (GP) regression is deployed to estimate and construct the RSS fingerprints with incomplete data. Mean and variance of generated points are used to estimate WiFi fingerprinting p…

business.industryComputer scienceRSSReal-time computingComputingMilieux_LEGALASPECTSOFCOMPUTING020206 networking & telecommunications02 engineering and technologycomputer.file_formatHybrid algorithmData setsymbols.namesakeInertial measurement unitDead reckoning0202 electrical engineering electronic engineering information engineeringsymbolsWireless020201 artificial intelligence & image processingbusinessParticle filterVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Gaussian processcomputer2019 19th International Symposium on Communications and Information Technologies (ISCIT)
researchProduct

Fast algorithm for detection of reference spheres in digital panoramic radiography.

2009

In this paper, an algorithm for detection of reference spheres from digital panoramic radiographic images is presented. The proposed algorithm was tested on a database of 107 digital panoramic radiographic images which were used for dental diagnostics. Results show that the proposed method exhibits for detection of reference spheres, a sensitivity of 97.33% and specificity of 93.85%. Performance time differed between 0.55 and 2.36s depending on image size. The aim of this work was to provide a fast ellipse detection algorithm to reduce measuring time on preoperative implant planning by lowering the computational cost.

business.industryComputer scienceRadiographyHealth InformaticsRadiography Dental DigitalEllipseFast algorithmSensitivity and SpecificityComputer Science ApplicationsDental ImplantationSurgery Computer-AssistedPattern recognition (psychology)HumansComputer visionSPHERESArtificial intelligenceSensitivity (control systems)Diagnosis Computer-AssistedbusinessImage resolutionAlgorithmsSoftwareComputers in biology and medicine
researchProduct