Search results for " Pattern recognition"

showing 10 items of 1050 documents

Temporal expectation and spectral expectation operate in distinct fashion on neuronal populations

2013

The formation of temporal expectation (i.e., the prediction of ‘when’) is of prime importance to sensory processing. It can modulate sensory processing at early processing stages probably via the entrainment of low-frequency neuronal oscillations in the brain. However, sensory predictions involve not only temporal expectation but also spectral expectation (i.e., the prediction of ‘what’). Here we investigated how temporal expectation may interrelate with spectral expectation by explicitly setting up temporal expectation and spectral expectation in a target detection task. We found that temporal expectation and spectral expectation interacted on reaction time (RT). RT was shorter when target…

AdultMaleSignal Detection PsychologicalCognitive NeuroscienceExperimental and Cognitive PsychologySensory systemElectroencephalographyta3112050105 experimental psychology03 medical and health sciencesBehavioral Neuroscience[SCCO]Cognitive science0302 clinical medicineReaction TimemedicineHumansAttention0501 psychology and cognitive sciencesta515Analysis of VarianceBrain MappingCommunicationmedicine.diagnostic_testbusiness.industrySpectrum Analysis[SCCO.NEUR]Cognitive science/Neuroscience05 social sciencesBrainSensory SystemsHealthy VolunteersOphthalmologyAcoustic StimulationEvoked Potentials AuditoryFemaleComputer Vision and Pattern RecognitionPsychologybusinessEntrainment (chronobiology)Neuroscience030217 neurology & neurosurgeryPsychoacoustics
researchProduct

Having a Drink with Tchaikovsky: The Crossmodal Influence of Background Music on the Taste of Beverages.

2018

Abstract Previous research has shown that auditory cues can influence the flavor of food and drink. For instance, wine tastes better when preferred music is played. We have investigated whether a music background can modify judgments of the specific flavor pattern of a beverage, as opposed to mere preference. This was indeed the case. We explored the nature of this crosstalk between auditory and gustatory perception, and hypothesized that the ‘flavor’ of the background music carries over to the perceived flavor (i.e., descriptive and evaluative aspects) of beverages. First, we collected ratings of the subjective flavor of different music pieces. Then we used a between-subjects design to cro…

AdultMaleTasteCognitive NeuroscienceEmotionsExperimental and Cognitive PsychologyPilot Projects050105 experimental psychologyBeverages03 medical and health sciencesYoung Adult0302 clinical medicineHumans0501 psychology and cognitive sciencesFlavorAgedCrossmodal05 social sciencesTaste PerceptionMiddle AgedSensory SystemsPreferenceOphthalmologyAcoustic StimulationTasteFemaleComputer Vision and Pattern RecognitionPsychology030217 neurology & neurosurgeryMusicCognitive psychologyMultisensory research
researchProduct

A robust aerial image registration method using Gaussian mixture models

2014

Aerial image registration is one of the bases in many aerospace applications, such as aerial reconnaissance and aerial mapping. In this paper, we propose a novel aerial image registration algorithm which is based on Gaussian mixture models. First of all, considering the characters of the aerial images, the work uses a shape feature detector which computes the boundaries of regions with nearly the same gray-value to extract invariant feature. Then, a Gaussian mixture models (GMM) based image registration model is built and solved to estimate the transformation matrix between two aerial images. Furthermore, the proposed method is applied on real aerial images, and the results demonstrate the …

Aerial surveyComputer sciencebusiness.industryFeature detectorCognitive NeuroscienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage registrationComputerApplications_COMPUTERSINOTHERSYSTEMSPattern recognitionComputer Science Applications1707 Computer Vision and Pattern RecognitionMixture modelAerial images; Feature detector; Gaussian mixture models; Image registration; Computer Science Applications1707 Computer Vision and Pattern Recognition; Cognitive Neuroscience; Artificial IntelligenceComputer Science ApplicationsComputer Science::RoboticsComputer Science::Systems and ControlArtificial IntelligenceComputer Science::Computer Vision and Pattern RecognitionAerial imagesComputer visionAerial reconnaissanceArtificial intelligenceGaussian mixture modelsbusinessAerial imageImage registration
researchProduct

Real-time 3D movements analysis for a medical device intended for maintaining functional independence in aged adults at home

2016

We propose in this manuscript a realtime3D movement analysis system for inhomefunctionalabilities assessment in aged adults. As a first step, the purpose is to maintain the functionalindependence of this population and to allow an earlier detection of a motor decompensation inorder to facilitate a rehabilitation process. To quantify the equilibrium quality of a subject, webuilt a system using the Kinect sensor in order to analyze a simple clinical test validated in geriatricrehabilitation: the Timed Up and Go (TUG). Three experiments conducted in heterogeneousenvironments (laboratory, day hospital and home) showed good measurement reliability of theidentified parameters. In particular, they…

Analyse des mouvements 3D en temps réelElderly persons[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Evaluation automatique des capacités fonctionnellesNote de contrôle moteur[INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Segmentation des personnesExtraction des paramètres spatiotemporelsTimed Up and GoPersonnes âgéesFragilité motriceDétection de la région de peauDétection de la position assise
researchProduct

The cryogenic anticoincidence detector for ATHENA-XMS: preliminary results from the new prototype

2012

ATHENA has been the re-scoped IXO mission, and one of the foreseen focal plane instrument was the X-ray Microcalorimeter Spectrometer (XMS) working in the energy range 0.3-10 keV, which was a kilo-pixel array based on TES (Transition Edge Sensor) detectors. The need of an anticoincidence (AC) detector is legitimated by the results performed with GEANT4 simulations about the impact of the non x-ray background onto XMS at L2 orbit (REQ. < 0.02 cts/cm2/s/keV). Our consortium has both developed and tested several samples, with increasing area, in order to match the large area of the XMS (64 mm2). Here we show the preliminary results from the last prototype. The results achieved in this work off…

Anticoincidence detectorLow temperature DetectorAnticoincidence detectorsAstrophysicsOrbital mechanicslaw.inventionOpticslawElectronicOptical and Magnetic MaterialsElectrical and Electronic EngineeringAnticoincidence detectors; High Energy Astrophysics; Low temperature Detectors; TES; Electronic Optical and Magnetic Materials; Condensed Matter Physics; Computer Science Applications1707 Computer Vision and Pattern Recognition; Applied Mathematics; Electrical and Electronic EngineeringPhysicsLow temperature DetectorsSpectrometerbusiness.industryApplied MathematicsElectronic Optical and Magnetic MaterialBolometerDetectorComputer Science Applications1707 Computer Vision and Pattern RecognitionCondensed Matter PhysicsApplied MathematicCardinal pointMillimeterSatelliteTransition edge sensorHigh Energy AstrophysicbusinessTESHigh Energy AstrophysicsSPIE Proceedings
researchProduct

Comparison and multiresolution analysis of irregular meshes with appearance attributes

2004

We present in this dissertation a method to compare and to analyse irregular meshes with appearance attributes. First, we propose a mesh comparison method using a new attribute deviation metric. Considered meshes contain geometric and appearance attributes (e.g. color, texture,temperature). The proposed deviation assessment allows the computation of local attribute differences between two meshes. We present an application of this method to mesh simplification algorithm quality assessment.Then we propose two multiresolution analysis schemes for irregular meshes with appearance attributes. First, a mesh is decomposed in a discret number of levels of detail. We introduce a surface geometry rel…

Appearance attributesIrregular meshes[INFO.INFO-GR] Computer Science [cs]/Graphics [cs.GR][INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]analyse multirésolutionattributs d’apparenceMesh comparisondébruitage adaptatif[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG][INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR][INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-CG] Computer Science [cs]/Computational Geometry [cs.CG]visualisation dépendante des détailscomparaison de maillagesMultiresolution analysismaillages irréguliers
researchProduct

A Hardware and Secure Pseudorandom Generator for Constrained Devices

2018

Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular, generating strong cryptographic keys on such resource-constrained device depends on a lightweight and cryptographically secure random number generator. In this research work, we have introduced a new hardware chaos-based pseudorandom number generator, which is mainly based on the deletion of an Hamilton cycle within the $N$ -cube (or on the vectorial negation), plus one single permutation. We have rigorously proven the chaotic behavior and cryptographically secure property of the whole proposal: the mid-term eff…

Applied cryptography; Chaotic circuits; Constrained devices; Discrete dynamical systems; FPGA; Lightweight Cryptography; Random number generators; Statistical tests; Control and Systems Engineering; Information Systems; Computer Science Applications1707 Computer Vision and Pattern Recognition; Electrical and Electronic EngineeringHardware security moduleComputer scienceRandom number generationCryptography[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technologyPseudorandom generatorConstrained devicesLightweight CryptographyChaotic circuits[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]PermutationRandom number generatorsStatistical tests0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringField-programmable gate arrayThroughput (business)FPGAPseudorandom number generatorGenerator (category theory)business.industry020208 electrical & electronic engineeringComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsDiscrete dynamical systems[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationComputer Science ApplicationsApplied cryptography[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Control and Systems EngineeringKey (cryptography)[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessComputer hardwareInformation SystemsIEEE Transactions on Industrial Informatics
researchProduct

Reliable polygonal approximations of imaged real objects through dominant point detection

1998

Abstract The problem of dominant point detection is posed, taking into account what usually happens in practice. The algorithms found in the literature often prove their performance with laboratory contours, but the shapes in real images present noise, quantization, and high inter and intra-shape variability. These effects are analyzed and solutions to them are proposed. We will also focus on the conditions for an efficient (few points) and precise (low error) dominant point extraction that preserves the original shape. A measurement of the committed error (optimization error, E 0 ) that takes into account both aspects is defined for studying this feature.

Approximations of πQuantization (signal processing)Corner detectionImage processingCurvatureReal imageEdge detectionArtificial IntelligenceSignal ProcessingPolygonComputer Vision and Pattern RecognitionAlgorithmSoftwareMathematicsPattern Recognition
researchProduct

An offline/real-time artifact rejection strategy to improve the classification of multi-channel evoked potentials

2008

The primary goal of this paper is to improve the classification of multi-channel evoked potentials (EPs) by introducing a temporal domain artifact detection strategy and using this strategy to (a) evaluate how the performance of classifiers is affected by artifacts and (b) show how the performance can be improved by detecting and rejecting artifacts in offline and real-time classification experiments. Using a pattern recognition approach, an artifact is defined in this study as any signal that may lead to inaccurate classifier parameter estimation and inaccurate testing. The temporal domain artifact detection tests include: a within-channel standard deviation (STD) test that can detect sign…

Artifact rejectionArtificial IntelligenceEstimation theoryComputer scienceSpeech recognitionSignal ProcessingInformation processingDetection theoryComputer Vision and Pattern RecognitionEvoked potentialClassifier (UML)SoftwareStandard deviationPattern Recognition
researchProduct

User grouping and power allocation in NOMA systems: a novel semi-supervised reinforcement learning-based solution

2022

Author's accepted manuscript In this paper, we present a pioneering solution to the problem of user grouping and power allocation in non-orthogonal multiple access (NOMA) systems. The problem is highly pertinent because NOMA is a well-recognized technique for future mobile radio systems. The salient and difcult issues associated with NOMA systems involve the task of grouping users together into the prespecifed time slots, which are augmented with the question of determining how much power should be allocated to the respective users. This problem is, in and of itself, NP-hard. Our solution is the frst reported reinforcement learning (RL)-based solution, which attempts to resolve parts of thi…

Artificial IntelligenceComputer Vision and Pattern RecognitionVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550
researchProduct