We have simplified the published procedure (5) for measuring sweat rates in individual human sweat glands. Sweat secretion rates were obtained from sweat drops secreted on the forearm by multiple individual glands. We computed a ratio between CFTR-dependent (by intradermal microinjection of a β adrenergic cocktail) and CFTR-independent (by methacoline as cholinergic stimulus) sweat secretion rates.
View Article and Find Full Text PDFVideo content is routinely acquired and distributed in a digital compressed format. In many cases, the same video content is encoded multiple times. This is the typical scenario that arises when a video, originally encoded directly by the acquisition device, is then re-encoded, either after an editing operation, or when uploaded to a sharing website.
View Article and Find Full Text PDFTransform coding is routinely used for lossy compression of discrete sources with memory. The input signal is divided into N-dimensional vectors, which are transformed by means of a linear mapping. Then, transform coefficients are quantized and entropy coded.
View Article and Find Full Text PDFIEEE Trans Image Process
November 2015
Binary local features represent an effective alternative to real-valued descriptors, leading to comparable results for many visual analysis tasks while being characterized by significantly lower computational complexity and memory requirements. When dealing with large collections, a more compact representation based on global features is often preferred, which can be obtained from local features by means of, e.g.
View Article and Find Full Text PDFVisual features are successfully exploited in several applications (e.g., visual search, object recognition and tracking, etc.
View Article and Find Full Text PDFIn the last decade, the increased possibility to produce, edit, and disseminate multimedia contents has not been adequately balanced by similar advances in protecting these contents from unauthorized diffusion of forged copies. When the goal is to detect whether or not a digital content has been tampered with in order to alter its semantics, the use of multimedia hashes turns out to be an effective solution to offer proof of legitimacy and to possibly identify the introduced tampering. We propose an image hashing algorithm based on compressive sensing principles, which solves both the authentication and the tampering identification problems.
View Article and Find Full Text PDFIEEE Trans Image Process
July 2008
Consider the problem of transmitting multiple video streams to fulfill a constant bandwidth constraint. The available bit budget needs to be distributed across the sequences in order to meet some optimality criteria. For example, one might want to minimize the average distortion or, alternatively, minimize the distortion variance, in order to keep almost constant quality among the encoded sequences.
View Article and Find Full Text PDF