-
Chapter and Conference Paper
Generating Cyclic 2-Gray Codes for Fibonacci q-Decreasing Words
We present a two-stage algorithm for generating cyclic 2-Gray codes for q-decreasing words. In the first step, a simple recursive algorithm is used to generate a cyclic 2-Gray code for q-run constrained words, wh...
-
Chapter and Conference Paper
A Noise Convolution Network for Tampering Detection
The vulnerability of digital images to tampering is an ongoing information security issue in the multimedia field. Thus, identifying tampered digital images and locating the tampered regions in the images can ...
-
Chapter and Conference Paper
Real-Time Traffic Monitoring and Status Detection with a Multi-vehicle Tracking System
With live street videos posted online, the Macao Government provides means to the general public to assess the latest road traffic conditions. After reviewing over these videos, a person may decide to change t...
-
Chapter and Conference Paper
Robust Pedestrian Detection: Faster Deployments with Fusion of Models
Pedestrian detection has a wide range of real-world critical applications including security and management of emergency scenarios. In critical applications, detection recall and precision are both essential ...