Learn More
Motion vectors are used in digital video compression for the purpose of reducing file size, primarily by providing an estimate of a frame of interest as a motion-offset version of a reference frame or frames. Despite the name, a motion vector is not in and of itself a trace of object motion, but rather an index to a similar image block. The computational(More)
Within the expanding paradigm of medical imaging and wireless communications there is increasing demand for transmitting diagnostic medical imagery over error-prone wireless communication channels such as those encountered in cellular phone technology. Medical images must be compressed with minimal file size to minimize transmission time and robustly coded(More)
The choice of Quantization Table in a JPEG image has previously been shown to be an effective discriminator of digital image cameras by manufacturer and model series. When a photograph is recompressed for transmission or storage, however, the image undergoes a secondary stage of quantization. It is possible, however to identify primary quantization(More)
Three hundred and fifty-two patients with alcoholic hepatitis were evaluated for protein-calorie malnutrition (PCM). In order to facilitate data analysis of nutritional status, a PCM score was calculated for each patient using eight nutritional parameters. The PCM score correlated significantly with mortality, clinical severity of the liver disease, and(More)
We consider the analysis of surveillance video footage containing occasional activities of potential interest interspersed with long periods of no motion. Such evidence is problematic for three reasons: firstly, it takes up a great deal of storage capacity with little evidential value; secondly, human review of such surveillance is extremely time-consuming(More)
— Wireless ad hoc networks provide a useful communications infrastructure for the mobile battlefield. In this paper we apply and develop passive radio frequency signal strength monitoring and packet transmission time profiling techniques, to characterise and reconstruct an encrypted wireless network's topology. We show that by using signal strength(More)