Filters








90 Hits in 4.8 sec

ITU MSPR TRECVID 2010 Video Copy Detection System

Sezer Kutluk, Bilge Günsel
2010 TREC Video Retrieval Evaluation  
Video fingerprint generation module takes the factorization matrices generated by NMF as its input and converts them to binary hashes by differencial coding [1, 2] .  ...  In this paper we describe the system designed by the ITU MSPR Group for content based video fingerprinting as applied to the TRECVID 2010 Content Based Copy Detection (CBCD) benchmark.  ...  Acknowledgements This research is supported by The Scientific and Technological Research Council of Turkey (TÜBİTAK) EEEAG under the project number 109E063.  ... 
dblp:conf/trecvid/KutlukG10 fatcat:6rqftw63era6boar4745tkuecm

Spherical torus-based video hashing for near-duplicate video detection

Xiushan Nie, Yane Chai, Ju Liu, Jiande Sun, Yilong Yin
2016 Science China Information Sciences  
Acknowledgements This work was supported by the NSFC Joint Fund with Guangdong under Key Project (Grant No.  ...  Frame-based hashing methods are the primary type of video hashing [1, 2] , in which each frame or key frame of a video is regarded as an image.  ...  In this study, a video hashing algorithm was proposed based on spherical torus and NMF.  ... 
doi:10.1007/s11432-016-5528-6 fatcat:ezgcowijnvadzp2c25fnok4rem

Self-organizing maps with dynamic learning for signal reconstruction

Jeongho Cho, António R.C. Paiva, Sung-Phil Kim, Justin C. Sanchez, José C. Príncipe
2007 Neural Networks  
In addition, the sparseness of these bases can help infer correlations between cortical firing patterns and behavior.  ...  We propose the use of nonnegative matrix factorization (NMF) as a model-independent methodology to analyze neural activity.  ...  This work was supported by the DARPA project no. N66001-02-C-8022. Authors should follow the EURASIP JASP manuscript format described at http://www.hindawi.com/journals/asp/.  ... 
doi:10.1016/j.neunet.2006.12.002 pmid:17234384 fatcat:6rgcvycsm5dlxe5himx66aoice

An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT

Xudong Lv, Z. Jane Wang
2009 EURASIP Journal on Information Security  
Thirdly, we propose a new concept, namely, content-based fingerprint, as an extension of image hashing by combining different hashes.  ...  Dimension reduction techniques, such as singular value decomposition (SVD) and nonnegative matrix factorization (NMF), have been successfully applied in image hashing by retaining the essential features  ...  selecting the highest one among P f Table 2 : 2 Identification accuracy for manipulated images by NMF-NMF-SQ (NMF) hashing, FJLT hashing, and content-Based fingerprinting (CBF) based on FJLT and RI-FJLT  ... 
doi:10.1155/2009/859859 fatcat:o2wbnnbcfnd5vlat4rcyqg2riy

An Extended Image Hashing Concept: Content-Based Fingerprinting Using FJLT

Xudong Lv, ZJane Wang
2009 EURASIP Journal on Information Security  
Thirdly, we propose a new concept, namely, content-based fingerprint, as an extension of image hashing by combining different hashes.  ...  Dimension reduction techniques, such as singular value decomposition (SVD) and nonnegative matrix factorization (NMF), have been successfully applied in image hashing by retaining the essential features  ...  selecting the highest one among P f Table 2 : 2 Identification accuracy for manipulated images by NMF-NMF-SQ (NMF) hashing, FJLT hashing, and content-Based fingerprinting (CBF) based on FJLT and RI-FJLT  ... 
doi:10.1186/1687-417x-2009-859859 fatcat:uussz5utejhmnkeltt4gk74o6y

Dimensionality reduction of visual features for efficient retrieval and classification

Petros T. Boufounos, Hassan Mansour, Shantanu Rane, Anthony Vetro
2016 APSIPA Transactions on Signal and Information Processing  
The second method is a low-rank matrix factorization applied to a sequence of visual features, which exploits the temporal redundancy among feature vectors associated with each frame in a video.  ...  The NMF approach essentially clusters the features (or embeddings) of a given image or video signal.  ...  We choose the reference video sequences 1 : Coastguard, Bus, Soccer, Football, Hall Monitor, and Stefan, each composed of CIF resolution (352 × 288 pixels) video frames.  ... 
doi:10.1017/atsip.2016.14 fatcat:ef7k657n7ndtzoehs3474zdpdu

Note Onset Detection via Nonnegative Factorization of Magnitude Spectrum

Wenwu Wang, Yuhui Luo, Jonathon A. Chambers, Saeid Sanei
2008 EURASIP Journal on Advances in Signal Processing  
spectra using nonnegative matrix factorization (NMF).  ...  In contrast to most commonly used conventional approaches, the proposed method features new detection functions constructed from the linear temporal bases that are obtained from the decomposition of musical  ...  However, it is worth noting that a sampleaccurate onset detection may be obtained by preselecting just those frames (and their surrounding frames) in which the onsets are detected and by processing these  ... 
doi:10.1155/2008/231367 fatcat:2cobbowiijesfmrpny2c33b2ru

Dark-TRACER: Early Detection Framework for Malware Activity Based on Anomalous Spatiotemporal Patterns

Chansu Han, Jun'ichi Takeuchi, Takeshi Takahashi, Daisuke Inoue
2022 IEEE Access  
Indiscriminate scanning activities by malware to spread their infections often show similar spatiotemporal patterns, and such trends are also observed on the darknet.  ...  Our previous studies proposed algorithms that automatically estimate and detect anomalous spatiotemporal patterns of darknet traffic in real time by employing three independent machine learning methods  ...  As a fingerprint, or key identifier, of Mirai, it is commonly known that the sequence number matches the destination IP address in the SYN packet [22] , [23] .  ... 
doi:10.1109/access.2022.3145966 fatcat:nx24apdwdje6dkqhfy6yupzuni

An Educational Guide through the FMP Notebooks for Teaching and Learning Fundamentals of Music Processing

Meinard Müller
2021 Signals  
All components, including the introductions of MIR scenarios, illustrations, sound examples, technical concepts, mathematical details, and code examples, are integrated into a unified framework based on  ...  consist of more than 100 individual notebooks, this collection discusses well-established topics in music information retrieval (MIR) such as beat tracking, chord recognition, music synchronization, audio fingerprinting  ...  Many results and insights, achieved in close collaboration with my PhD students funded by the DFG, have become part of notebooks. Finally,  ... 
doi:10.3390/signals2020018 doaj:1d470fbf86c24cd391bdf9d10cfb3dd2 fatcat:orfaj3gpq5hdzpozv5x4xu7bg4

Computational Methods for Neuron Segmentation in Two-Photon Calcium Imaging Data: A Survey

Waseem Abbas, David Masip
2022 Applied Sciences  
The contributions of the paper are three-fold: we provide an overview of the main algorithms taxonomized in three categories (signal processing, matrix factorization and machine learning-based approaches  ...  In NMF, the matrix factorization framework is solved in a constrained manner by borrowing one key fact from the physics behind neural florescence i.e., the factorized matrices for spatial footprint and  ...  The first video is a one-photon video, collected by the lab of Ilana Witten (https: //wittenlab.org/, accessed on 2 July 2022) at the Princeton Neuroscience Institute, with 3000 frames of size 205 × 226  ... 
doi:10.3390/app12146876 fatcat:kd2lfcwjgjchnaqchzxf4e4xii

A framework for cyber surveillance of unlawful activities for critical infrastructure using computational grids

Vaclav Snasel, Ajith Abraham, Khalid Saeed, Hameed Al-Qaheri
2010 2010 Sixth International Conference on Information Assurance and Security  
The framework uses a computational grid based environment, which is capable of distributed data mining and real time surveillance.  ...  Non-negative matrix and tensor factorization (NMF) is a recently developed technique for finding parts-based, linear representations of non-negative data.  ...  We suggest different methods, based on exchange of key information to secure subsequent communication and data transfer.  ... 
doi:10.1109/isias.2010.5604080 dblp:conf/IEEEias/SnaselASA10 fatcat:ayiumpybnfevjfmjt7x7yxlkx4

Audio Signal Processing Using Time-Frequency Approaches: Coding, Classification, Fingerprinting, and Watermarking

K Umapathy, B Ghoraani, S Krishnan
2010 EURASIP Journal on Advances in Signal Processing  
A TF-based audio coding scheme with novel psychoacoustics model, music classification, audio classification of environmental sounds, audio fingerprinting, and audio watermarking will be presented to demonstrate  ...  In this digital era, compression, intelligent indexing for content-based retrieval, classification, and protection of digital audio content are few of the areas that encapsulate a majority of the audio  ...  In multimedia fingerprinting, the main objective is to establish the perceptual equality of two multimedia objects: not by comparing the objects themselves, but by comparing the associated fingerprints  ... 
doi:10.1155/2010/451695 fatcat:u2smg3zf7fedne5e5ankvmepee

Perceptual Image Hashing Based on Weber Local Binary Pattern and Color Angle Representation

Chuan Qin, Yecen Hu, Heng Yao, Xintao Duan, Liping Gao
2019 IEEE Access  
This paper proposes an efficient scheme for generating image hashing by combining the local texture and color angle features.  ...  Based on the comparisons with the state-of-the-art schemes, receiver operating characteristic curves and integrated histograms of normalized distances show the superiority of our scheme in terms of robustness  ...  [17] proposed a method for video copy retrieval by applying speeded up robust features (SURF). The local features are extracted using SURF in each divided block, in a frame-by-frame manner.  ... 
doi:10.1109/access.2019.2908029 fatcat:4fehjmqr45gi7cs6gmfp32kk3u

Effective Crowd Anomaly Detection Through Spatio-temporal Texture Analysis

Yu Hao, Zhi-Jie Xu, Ying Liu, Jing Wang, Jiu-Lun Fan
2018 International Journal of Automation and Computing  
This algorithm is able to effectively extract video textures with abundant crowd motion details. It is through adopting Gaborfiltered textures with the highest information entropy values.  ...  Secondly, a novel scheme for defining crowd motion patterns (signatures) is devised to identify abnormal behaviors in the crowd by employing an enhanced gray level co-occurrence matrix model.  ...  Acknowledgements This research is funded by Chinese National Natural Science Foundation (No. 61671377) and Shaanxi Smart City Technology Project of Xianyang (No. 2017k01-25-5).  ... 
doi:10.1007/s11633-018-1141-z fatcat:pdvkpa4w75anfdr5mnm3bfasya

Underwater Direction of Arrival Estimation using Wideband Arrays of Opportunity

Elizaveta Dubrovinskaya, Paolo Casari
2019 OCEANS 2019 - Marseille  
He believed in me to allow me to work independently while providing all the possible support and was by my side when needed.  ...  This is akin to a classical fingerprint-based localization approach, where the fingerprint is defined as the value of (4.4).  ...  Fingerprint or Matched field processing (MFP). MFP or similar fingerprint- based localization are often used in terrestrial WSN, e.g. based on millimeter-wave signals [41] or acoustic signals [42].  ... 
doi:10.1109/oceanse.2019.8867262 fatcat:p7yu5imvs5cdlbhju2vhfgl6ze
« Previous Showing results 1 — 15 out of 90 results