Learn More
A new method to up-sample low-resolution depth maps to high quality and high resolution is proposed. Range sensors such as time-of-flight cameras yield low-resolution depth maps and the output includes heavy noise at the edges of objects. Recently, many techniques have been proposed to up-sample low-resolution depth maps. However, there is no effective(More)
The identification of an appropriate multivariate copula for capturing the dependence structure in multivariate data is not straightforward. The reason is because standard multivariate copulas (such as the multivariate Gaussian, Student-t, and exchangeable Archimedean copulas) lack flexibility to model dependence and have other limitations, such as(More)
Existing range-based localization algorithms are superior only when a high accuracy node-to-node measured distance exists. This assumption is actually difficult to satisfy with current ranging techniques used in tiny sensor nodes. Meanwhile, range-free localization algorithms work independently of ranging error but can only produce limited node accuracy. In(More)
A fusion system, which collects air-tracks from distributed radars and eliminates duplicated tracks, is required to get a Single Integrated Air Picture (SIAP) for the wide surveillance area. We are developing a distributed radar system which consists of numerous mobile radars to cover wide surveillance area. Two-tier fusion system, which is the well-known(More)
In recent years, the volume of educational contents has been explosively increased thanks to the rapid development of multimedia technologies. Furthermore, the development of smart devices has made various educational institutes use them as effective learning tools. Since more and more educational contents become available not only at school zone but at a(More)
Today, although the password authentication is used widely, since users write their password directly on screen and tend to make their password easy to remember, they may be vulnerable to several attacks such as brute-force, guessing, replay, and shoulder surfing. Although many authentication schemes were proposed to improve the usability and security, they(More)