Current Issue : April - June Volume : 2015 Issue Number : 2 Articles : 6 Articles
This paper presents an image-based artistic rendering algorithm for the automatic Pointillism style. At first, ellipse dot locations are\nrandomly generated based on a source image; then dot orientations are precalculated with help of a direction map; a saliency map\nof the source image decides long and short radius of the ellipse dot. At last, the rendering runs layer-by-layer from large size dots\nto small size dots so as to reserve the detailed parts of the image. Although only ellipse dot shape is adopted, the final Pointillism\nstyle performs well because of variable characteristics of the dot....
With the integration of mobile computing and cloud computing, more diverse services can be provided to the users, supporting the\nmobility feature of mobile computing along with the power of cloud computing. This new paradigm still faces challenges, especially\nin terms of performance.When it comes to multimedia data communication, thin clients (such as smart phones and tablets) suffer\nbecause of performance and power constraints. Previously done studies have trivially addressed this problem. Therefore, in our\npaper, we present a framework in which thick clients (laptop or desktop computers) are incorporated into mobile cloud paradigm\nwith attention paid to user mobility. Its objective is to optimize the distribution of multimedia content between the cloud and the\nthin clients. Our work comes up with both numerical analysis and simulation to justify the validity and the effectiveness of the\nproposal approach....
Thesupport for region of interest (ROI) browsing, which allows dropping background part of video bitstreams, is a desirable feature\nfor video applications. With the help of the slice group technique provided by H.264/SVC, rectangular ROI areas can be encoded\ninto separate ROI slices. Additionally, by imposing certain constraints on motion estimation, ROI part of the bitstream can be\ndecoded without background slices of the same layer. However, due to the additional spatial and temporal constraints applied to\nthe encoder, overall coding efficiency would be significantly decreased. In this paper, a rate-distortion optimized (RDO) encoding\nscheme is proposed to improve the coding efficiency of ROI slices.When background slices are discarded, the proposed method uses\nbase layer information to generate the prediction signal of the enhancement layer.Thus, the temporal constraints can be loosened\nduring the encoding process. To do it in this way, the possible mismatch between generated reference frames and original ones\nis also considered during rate-distortion optimization so that a reasonable trade-off between coding efficiency and decoding drift\ncan be made. Besides, a new Lagrange multiplier derivation method is developed for further coding performance improvement.\nExperimental results demonstrate that the proposed method achieves significant bitrate saving compared to existing methods....
A robust gray image encryption scheme using chaotic logistic map and artificial neural network (ANN) is introduced. In the\nproposed method, an external secret key is used to derive the initial conditions for the logistic chaotic maps which are employed\nto generate weights and biases matrices of the multi layer per ceptron (MLP). During the learning process with the back propagation\nalgorithm, ANN determines the weight matrix of the connections. The plain image is divided into four sub images which are used\nfor the first diffusion stage. The sub images obtained previously are divided into the square sub image blocks. In the next stage,\ndifferent initial conditions are employed to generate a key stream which will be used for permutation and diffusion of the sub image\nblocks. Some security analyses such as entropy analysis, statistical analysis, and key sensitivity analysis are given to demonstrate\nthe key space of the proposed algorithm which is large enough to make brute force attacks in feasible. Computing validation using\nexperimental data with several gray images has been carried out with detailed numerical analysis, in order to validate the high\nsecurity of the proposed encryption scheme....
This paper presents results of a research project ââ?¬Å?dUcaleââ?¬Â that experiments ICT solutions for the museum of Palazzo Ducale\n(Urbino). In this project, the famed painting the ââ?¬Å?Citta Idealeââ?¬Â becomes a case to exemplify a specific approach to the digital\nmediation of cultural heritage. An augmented reality (AR) mobile application, able to enhance the museum visit experience, is\npresented. The computing technologies involved in the project (websites, desktop and social applications, mobile software, and\nAR) constitute a persuasive environment for the artwork knowledge. The overall goal of our research is to provide to cultural\ninstitutions best practices efficiently on low budgets. Therefore, we present a low cost method for high-resolution acquisition of\npaintings; the image is used as a base in AR approach. The proposed methodology consists of an improved SIFT extractor for real\ntime image. The other novelty of this work is the multi point probabilistic layer. Experimental results demonstrated the robustness\nof the proposed approach with extensive use of the AR application in front of the ââ?¬Å?Citta Idealeââ?¬Â painting. To prove the usability of\nthe application and to ensure a good user experience, we also carried out several users tests in the real scenario....
A new construction method of system reliability was proposed in this paper based on network and relevant failure. Taking the\ncomponent units as the nodes and the interaction relationships between the nodes as the side lines, a new directional network\nreliability model with certain network topology characteristics was constructed. It can indicate the complex topology relationship,\ninteraction mechanism, and the trans mission mechanism of failure affect between mechanical integration and electrical integration\nof system components. Compared with the traditional research methods, the relevant failure was considered during this process.\nThrough the application of the fault data in the bogie system of high-speed train, it was shown that a new network reliability model\nwhich considered the relevant failure can be constructed by the method proposed in this paper and the result can be more accurate,\nespecially for the complex mechanical and electrical integration systems....
Loading....