... temporal integration of zoom/translation
Phase 3: camera motion description
Camera motion classification and description
Figure 1: System architecture for camera motion classification and
description.
frames ... Guironnet et al. 3
Video stream
Phase 1: motion parameter extraction
Phase 2: camera motion classification
Stage 1: combination based on heuristic rules
Stage...
... ground and
aircraft when the aircraft takeoffsorisabouttoland.It
is assumed that the LOS and scattered components arrive
directly in front of the aircraft and the beamwidth of the
scattered components ... interference
characterization of OFDM and FrFT-MC systems.
A practical interference analysis and implementation
of AFT-MC system is given for aeronautical and land-
mobile satel...
... applications such as cell-
phone tracking. Recently, an interesting application of speech
watermarking has appeared in air trafficcontrol[11]. The
air traffic control relies on voice communication ... Stankovi
´
c, T. Thayaparan, and M. Dakovi
´
c, “Signal decom-
position by using the S-method with application to the
analysis of HF radar signals in sea-clutter,” IEEE Transactions
on Signal...
... statistical
information.
We illustrate our approach on an example of face
image database retrieval task. The face database problem is
selected because of the existence of standardized datasets and
evaluation ... 2030–2035, Montreal,
Canada, July-August 2005.
[19] J. Roure and M. Faundez-Zanuy, “Face recognition with small
and large size databases,” in Proceedings of the 39th Annual...
... evolution case,” Journal of Optimization Theory and
Applications, vol. 69, no. 2, pp. 373–396, 1991.
[3] R. Ahmad, Q. H. Ansari, and S. S. Irfan, “Generalized variational inclusions and generalized ... varia-
tional inclusions,” Applied Mathematics and Computation, vol. 145, no. 2-3, pp. 795–803, 2003.
[6] A. Hassouni and A. Moudafi, A perturbed algorithm for variational inclusion...
... have similar computational
structures, none of them appears to have a substantial speed
advantage [21]. As a practical matter, highly optimized real-
input FFT libraries are available from many ... two nonzero entries per row and column)
that allows an iterative calculation of H
N
x,foranyx ∈ R
N
.
Since the matrices are sparse and orthogonal, the factoriza-
tion of H
N
generates a...
... International
Symposium on Circuits and Systems, vol. 2, pp. II1–II4,
Vancouver, Canada, May 2004.
[21] A. K. Jain and U. Uludag, “Hiding biometric data,” IEEE
Transactions on Pattern Analysis and ... and they are released based on
some alternative authentication mechanism (e.g., password).
However, several passwords are simple and they can be easily
guessed (esp ecially b...
... (e.g., AC (4, 4) in Figure 7(d))canbepartly
nonstationary and require just a partial reconstruction with
Hermite coefficients.
The total number of stationary, partly nonstationary, and
nonstationary ...
2
2
2
2
2
2
2
2
2
2
2
2
Figure 1: An illustration of stationary and nonstationary blocks in
a sequence of frames (box 1-stationary block, box 2-nonstationary
block).
3. Video Analys...
... acquisition cameras and
camcorders,” US patent 6067399, Sony Corporation, May
2000.
[3] J. Wada, K. Kaiyama, K. Ikoma, and H. Kogane, “Moni-
tor camera system and method of displaying picture from
monitor ... employ a similar approach. Data hiding has been
used in various applications such as copyright protection,
authentication, fingerprinting, and error concealment. Each
applicat...
... of videos. Bennett
and McMillan [21] presented the adaptive spatio-temporal
accumulation (ASTA) filter that adapts from temporal bilat-
eral filter to spatial bilateral filter based on a tone-mapping
objective ... Chang and W R. Wu, “Image contrast enhancement
based on a histogram transformation of local standard
deviation,” IEEE Transactions on Medical Imaging, vol. 17, no.
4,...