Branding/Logomark minus Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 no author result Created with Sketch. Icon/Back Created with Sketch. Match!
  • References (31)
  • Citations (0)
Cite
References31
Newest
Published on Mar 1, 2019in Signal, Image and Video Processing 1.89
Huanjie Tao2
Estimated H-index: 2
(SEU: Southeast University),
Xiaobo Lu5
Estimated H-index: 5
(SEU: Southeast University)
Existing smoky vehicle detection methods and related smoke detection methods still have high false alarm rates. To solve this issue, this paper presents a contour-based smoky vehicle detection method for alarm systems. In this method, the hybrid background estimation method and some rules are adopted to detect vehicle objects. Three groups of artificial features based on the contour of the vehicle object are designed and extracted to distinguish between smoky vehicles and non-smoky vehicles. Mor...
Published on Oct 1, 2018in IEEE Transactions on Industrial Electronics 7.50
Bin Gao19
Estimated H-index: 19
(University of Electronic Science and Technology of China),
Peng Lu2
Estimated H-index: 2
(University of Electronic Science and Technology of China)
+ 3 AuthorsMartin Johnston10
Estimated H-index: 10
(Newcastle University)
A novel unsupervised sparse component extraction algorithm is proposed for detecting micro defects while employing a thermography imaging system. The proposed approach is developed using the variational Bayesian framework. This enables a fully automated determination of the model parameters and bypasses the need for human intervention in manually selecting the appropriate image contrast frames. An internal subsparse grouping mechanism and adaptive fine-tuning strategy have been built to control ...
Published on Oct 1, 2018in Signal, Image and Video Processing 1.89
Artur Jordao2
Estimated H-index: 2
(UFMG: Universidade Federal de Minas Gerais),
Leonardo A. B. Tôrres17
Estimated H-index: 17
(UFMG: Universidade Federal de Minas Gerais),
William Robson Schwartz18
Estimated H-index: 18
(UFMG: Universidade Federal de Minas Gerais)
An increasing number of works have investigated the use of convolutional neural network (ConvNets) approaches to perform human activity recognition (HAR) based on wearable sensor data. These approaches present state-of-the-art results in HAR, outperforming traditional approaches, such as handcrafted methods and 1D convolutions. Motivated by this, in this work we propose a set of methods to enhance ConvNets for HAR. First, we propose a data augmentation which enables the ConvNets to learn more ad...
Published on Oct 1, 2017in Signal, Image and Video Processing 1.89
Md. Hadiuzzaman5
Estimated H-index: 5
(BUET: Bangladesh University of Engineering and Technology),
Nazmul Haque2
Estimated H-index: 2
(BUET: Bangladesh University of Engineering and Technology)
+ 3 AuthorsTony Z. Qiu13
Estimated H-index: 13
(U of A: University of Alberta)
This paper endeavors to develop a new background estimation model for foreground segmentation using traditional background subtraction technique. Particularly, incorporation of luminance- and pollution-controlling parameters enables the model to address illumination variation and tail backs from vehicles, respectively. To classify each foreground pixel, a new heuristic dynamic threshold-difference function is proposed for determining individual threshold. Moreover, newly presented Positive Negat...
Published on Aug 15, 2017in IEEE Sensors Journal 3.08
Peng Lu2
Estimated H-index: 2
(University of Electronic Science and Technology of China),
Bin Gao19
Estimated H-index: 19
(University of Electronic Science and Technology of China)
+ 2 AuthorsGui Yun Tian40
Estimated H-index: 40
(Newcastle University)
Induction thermography has been applied as an emerging non-destructive testing and evaluation technique for a wide range of conductive materials. The infrared vision sensing acquired image sequences contain valuable information in both spatial and time domain. However, automatic and precisely extracting defect pattern from thermal video remains a challenge. In order to accurately find anomalous patterns for defect detection and further quantitative nondestructive evaluation, we propose an automa...
Published on Mar 1, 2017in Signal, Image and Video Processing 1.89
Mehdi Semsarzadeh6
Estimated H-index: 6
(U of O: University of Ottawa),
Hoda Roodaki3
Estimated H-index: 3
(KNTU: K.N.Toosi University of Technology)
+ 2 AuthorsShervin Shirmohammadi23
Estimated H-index: 23
(U of O: University of Ottawa)
Due to the power limitations of mobile devices, high-quality video decoding is still a main concern, because it quickly drains battery. In this paper, an H.264/AVC receiver aware encoder has been designed that (1) takes into account all of the decoder modules of a receiver, unlike existing RAEs that only consider some of these modules and are therefore sub optimal, and (2) is independent of decoder implementations and platforms. Furthermore, a decoder complexity controller has been proposed that...
Published on Feb 1, 2017in Computer Science Review
Thierry Bouwmans9
Estimated H-index: 9
,
Andrews Sobral12
Estimated H-index: 12
+ 2 AuthorsEl-hadi Zahzah12
Estimated H-index: 12
Background/foreground separation is the first step in video surveillance system to detect moving objects. Recent research on problem formulations based on decomposition into low-rank plus sparse matrices shows a suitable framework to separate moving objects from the background. The most representative problem formulation is the Robust Principal Component Analysis (RPCA) solved via Principal Component Pursuit (PCP) which decomposes a data matrix into a low-rank matrix and a sparse matrix. However...
Published on Feb 1, 2017in IEEE Transactions on Consumer Electronics 2.08
Yang Shi2
Estimated H-index: 2
(Tongji University),
Xiaoping Wang2
Estimated H-index: 2
(Tongji University),
Hongfei Fan2
Estimated H-index: 2
(Tongji University)
Wearable devices can be potentially captured or accessed in an unauthorized manner because of their physical nature. In such cases, they are in white-box attack contexts, where the adversary may have total visibility on the implementation of the built-in cryptosystem, with full control over its execution platform. Dealing with white-box attacks on wearable devices is undoubtedly a challenge. To serve as a countermeasure against threats in such contexts, we propose a lightweight encryption scheme...
Published on Jan 1, 2017in Signal, Image and Video Processing 1.89
T. Soumya2
Estimated H-index: 2
,
Sabu M. Thampi10
Estimated H-index: 10
(Indian Institute of Information Technology and Management, Kerala)
Night video enhancement techniques are widely used for identifying suspicious activities captured by night visual surveillance systems. However, artificial light sources present in the surroundings deteriorate the visual quality of the video captured during night. This non-uniform illumination reduces the object identification and tracking capability of a real-time visual security system. Thus, a uniform enhancement technique is insufficient for handling such uneven illumination. In this paper, ...
Published on Feb 1, 2016in Signal, Image and Video Processing 1.89
Majid Khan17
Estimated H-index: 17
(National University of Computer and Emerging Sciences),
Tariq Shah21
Estimated H-index: 21
(QAU: Quaid-i-Azam University),
Syeda Iram Batool5
Estimated H-index: 5
(QAU: Quaid-i-Azam University)
A Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) is a program that can generate and grade tests that humans can pass but current computer programs cannot. The humans can read distorted text as the one shown below, but current computer programs cannot. We have proposed a novel chaos-based CAPTCHA. We have utilized our proposed S-box and used chaotic iterative relation to select a completely random CAPTCHA for the security of web portal and other user interfac...
Cited By0
Newest