15 research outputs found

    Marker hiding methods: Applications in augmented reality

    Get PDF
    © 2015 Taylor & Francis Group, LLC.In augmented reality, the markers are noticeable by their simple design of a rectangular image with black and white areas that disturb the reality of the overall view. As the markerless techniques are not usually robust enough, hiding the markers has a valuable usage, which many researchers have focused on. Categorizing the marker hiding methods is the main motivation of this study, which explains each of them in detail and discusses the advantages and shortcomings of each. The main ideas, enhancements, and future works of the well-known techniques are also comprehensively summarized and analyzed in depth. The main goal of this study is to provide researchers who are interested in markerless or hiding-marker methods an easier approach for choosing the method that is best suited to their aims. This work reviews the different methods that hide the augmented reality marker by using information from its surrounding area. These methods have considerable differences in their smooth continuation of the textures that hide the marker area as well as their performance to hide the augmented reality marker in real time. It is also hoped that our analysis helps researchers find solutions to the drawbacks of each method. © 201

    Topology Analysis of Wireless Sensor Networks for Sandstorm Monitoring

    Get PDF
    Sandstorms are serious natural disasters, which are commonly seen in the Middle East, Northern Africa, and Northern China.In these regions, sandstorms have caused massive damages to the natural environment, national economy, and human health. To avoid such damages, it is necessary to effectively monitor the origin and development of sandstorms. To this end, wireless sensor networks (WSNs) can be deployed in the regions where sandstorms generally originate so that sensor nodes can collaboratively perform sandstorm monitoring and rapidly convey the observations to remote administration center. Despite the potential advantages, the deployment of WSNs in the vicinity of sandstorms faces many unique challenges, such as the temporally buried sensors and increased path loss during sandstorms. Consequently, the WSNs may experience frequent disconnections during the sandstorms. This further leads to dynamically changing topology. In this paper, a topology analysis of the WSNs for sandstorm monitoring is performed. Four types of channels a sensor can utilize during sandstorms are analyzed, which include air-to-air channel, air-to-sand channel, sand-to-air channel, and sand-to-sand channel. Based on the channel model solutions, a percolation-based connectivity analysis is performed. It is shown that if the sensors are buried in low depth, allowing sensor to use multiple types of channels improves network connectivity. Accordingly, much smaller sensor density is required compared to the case, where only terrestrial air channels are used. Through this topology analysis a WSN architecture can be deployed for very efficient sandstorm monitoring

    Topology Analysis of Wireless Sensor Networks for Sandstorm Monitoring

    Get PDF
    Sandstorms are serious natural disasters, which are commonly seen in the Middle East, Northern Africa, and Northern China.In these regions, sandstorms have caused massive damages to the natural environment, national economy, and human health. To avoid such damages, it is necessary to effectively monitor the origin and development of sandstorms. To this end, wireless sensor networks (WSNs) can be deployed in the regions where sandstorms generally originate so that sensor nodes can collaboratively perform sandstorm monitoring and rapidly convey the observations to remote administration center. Despite the potential advantages, the deployment of WSNs in the vicinity of sandstorms faces many unique challenges, such as the temporally buried sensors and increased path loss during sandstorms. Consequently, the WSNs may experience frequent disconnections during the sandstorms. This further leads to dynamically changing topology. In this paper, a topology analysis of the WSNs for sandstorm monitoring is performed. Four types of channels a sensor can utilize during sandstorms are analyzed, which include air-to-air channel, air-to-sand channel, sand-to-air channel, and sand-to-sand channel. Based on the channel model solutions, a percolation-based connectivity analysis is performed. It is shown that if the sensors are buried in low depth, allowing sensor to use multiple types of channels improves network connectivity. Accordingly, much smaller sensor density is required compared to the case, where only terrestrial air channels are used. Through this topology analysis a WSN architecture can be deployed for very efficient sandstorm monitoring

    Phase-preserving approach in denoising computed tomography medical images

    No full text
    The denoising procedure attenuates the image noise while preserving its edges and fine details. In computed tomography (CT), images are degraded by additive white Gaussian noise because of different acquisition and system errors. Due to noise existence, specialists may encounter certain difficulties to analyse or extract the useful information from noisy images. This article presents a novel implementation of the phase-preserving algorithm to denoise CT images. The phase preserving is a powerful noise reduction algorithm, but it tends to remove specific details from the processed images supposing them as noise. Therefore, a Wiener filter that uses 2D Gaussian point spread function is used along with a modified version of the latter algorithm to reduce the noise and conserve the minor medical details. The performance of the proposed approach is assessed on naturally and synthetically degraded CT images using the universal image quality indexand peak signal-to-noise ratio accuracy metrics. Results show major improvement not only in noise attenuation but also in preserving the small details

    BorderSense: Border Patrol through Advanced Wireless Sensor Networks

    No full text
    The conventional border patrol systems suffer from intensive human involvement. Recently, unmanned border patrol systems employ high-tech devices, such as unmanned aerial vehicles, unattended ground sensors, and surveillance towers equipped with camera sensors. However, any single technique encounters inextricable problems, such as high false alarm rate and line-of-sight-constraints. There lacks a coherent system that coordinates various technologies to improve the system accuracy. In this paper, the concept of BorderSense, a hybrid wireless sensor network architecture for border patrol systems, is introduced. BorderSense utilizes the most advanced sensor network technologies, including the wireless multimedia sensor networks and the wireless underground sensor networks. The framework to deploy and operate BorderSense is developed. Based on the framework, research challenges and open research issues are discusse

    Performance Evaluation Study of Intrusion Detection Systems.

    Get PDF
    With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Network Intrusion Detection / Prevention Systems NIDS. Today, number of open sources and commercial Intrusion Detection Systems are available to match enterprises requirements but the performance of these Intrusion Detection Systems is still the main concern. In this paper, we have tested and analyzed the performance of the well know IDS system Snort and the new coming IDS system Suricata. Both Snort and Suricata were implemented on three different platforms (ESXi virtual server, Linux 2.6 and FreeBSD) to simulate a real environment. Finally, in our results and analysis a comparison of the performance of the two IDS systems is provided along with some recommendations as to what and when will be the ideal environment for Snort and Suricata
    corecore