نتایج جستجو برای: the shadow

تعداد نتایج: 16054280  

2008
Michael Schwarz Marc Stamminger

Recently, several soft shadow mapping algorithms have been introduced which extract micro-occluders from a shadow map and backproject them on the light source to approximately determine light visibility. To maintain real-time frame rates, these algorithms often have to resort to coarser levels of a multi-resolution shadow map representation which can lead to visible quality degradations. In par...

2003
Elena Salvador Andrea Cavallaro Touradj Ebrahimi

Shadow segmentation is a critical issue for systems aiming at extracting, tracking or recognizing objects in a given scene. Shadows can in fact modify the shape and colour of objects and therefore affect scene analysis and interpretation systems in many applications, such as video database search and retrieval, as well as video analysis in applications such as video surveillance. We present a s...

2015
A .Mydheen Jasmine S.Allwin Devaraj

High resolution satellite images may contain shadows due to the limitations of imaging circumstances and presence of tall-standing objects. These shadows cause problems in the exploitation of such images. This paper proposes a complete processing chain to mitigate these shadow effects. This processing chain has two parts. A shadow detection part bases on image imposing and a pixel restoration p...

1995
Harish Patil Charles N. Fischer

Efficient Run-time Monitoring Using Shadow Processing Harish Patil* and Charles Fischer University of Wisconsin —Madison** Abstract General purpose multiprocessors are becoming increasingly common. We propose using pairs of processors, one running an ordinary application program and the other monitoring the application’s execution. We call the processor doing the monitoring a “shadow processor,...

2007
Stelios Sidiroglou Angelos D. Keromytis

We investigate the use of hybrid techniques as a defensive mechanism against targeted attacks and introduce Shadow Honeypots, a novel hybrid architecture that combines the best features of honeypots and anomaly detection. At a high level, we use a variety of anomaly detectors to monitor all traffic to a protected network/service. Traffic that is considered anomalous is processed by a “shadow ho...

2017
Wei Li Lorenzo Katin-Grazzini Xianbin Gu Xiaojing Wang Rania El-Tanbouly Huseyin Yer Chandra Thammina John Inguagiato Karl Guillard Richard J. McAvoy Jill Wegrzyn Tingting Gu Yi Li

The molecular basis behind shade tolerance in plants is not fully understood. Previously, we have shown that a connection may exist between shade tolerance and dwarfism, however, the mechanism connecting these phenotypes is not well understood. In order to clarify this connection, we analyzed the transcriptome of a previously identified shade-tolerant mutant of perennial ryegrass (Lolium perenn...

Journal: :Remote Sensing 2016
Alireza Safdarinezhad Mehdi Mokhtarzade Mohammad Javad Valadan Zoej

The automatic registration of LiDAR data and optical images, which are heterogeneous data sources, has been a major research challenge in recent years. In this paper, a novel hierarchical method is proposed in which the least amount of interaction of a skilled operator is required. Thereby, two shadow extraction schemes, one from LiDAR and the other from high-resolution satellite images, were u...

2010
Christopher James Hargreaves Howard Chivers

Hidden encrypted volumes can cause problems in digital investigations since they provide criminal suspects with a range of opportunities for deceptive antiforensics and a countermeasure to legislation written to force suspects to reveal decryption keys. This paper describes how hidden encrypted volumes can be detected, and their size estimated. The paper shows how multiple copies of an encrypte...

2014
Yongzhen Ke Fan Qin Weidong Min Guiling Zhang

We propose two tampered image detection methods based on consistency of shadow. The first method is based on texture consistency of shadow for the first kind of splicing image, in which the shadow as well as main body is copied and pasted from another image. The suspicious region including shadow and nonshadow is first selected. Then texture features of the shadow region and the nonshadow regio...

2005
Clément Fredembach Graham D. Finlayson

For some computer vision tasks, the presence of shadows in images can cause problems. For example, object tracks can be lost as an object crosses over a shadow boundary. Recently, it has been shown that it is possible to remove shadows from images. Assuming that the location of the shadows are known, shadow-free images are obtained in three steps. First, the image is differentiated. Second, the...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید