Search results for " Pattern recognition"

showing 10 items of 1050 documents

SDN@home: A Method for Controlling Future Wireless Home Networks

2016

Recent advances in wireless networking technologies are leading toward the proliferation of novel home network applications. However, the landscape of emerging scenarios is fragmented due to their varying technological requirements and the heterogeneity of current wireless technologies. We argue that the development of flexible software-defined wireless architectures, including such efforts as the wireless MAC processor, coupled with SDN concepts, will enable the support of both emerging and future home applications. In this article, we first identify problems with managing current home networks composed of separate network segments governed by different technologies. Second, we point out t…

Computer Networks and CommunicationsWireless ad hoc networkComputer science02 engineering and technology03 medical and health sciences0302 clinical medicineHome automation0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic EngineeringNetwork architectureResidential gatewaySettore ING-INF/03 - TelecomunicazioniWireless networkbusiness.industryComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsWireless WANService providerNetworking hardwareComputer Science ApplicationsWireless site surveyKey distribution in wireless sensor networksComputer Networks and CommunicationSoftware-defined networkingbusinessTelecommunicationsHeterogeneous networkMunicipal wireless network030215 immunologyComputer network
researchProduct

Spectral clustering to model deformations for fast multimodal prostate registration

2012

International audience; This paper proposes a method to learn deformation parameters off-line for fast multimodal registration of ultrasound and magnetic resonance prostate images during ultrasound guided needle biopsy. The method is based on a learning phase where deformation models are built from the deformation parameters of a splinebased non-linear diffeomorphism between training ultrasound and magnetic resonance prostate images using spectral clustering. Deformation models comprising of the eigen-modes of each cluster in a Gaussian space are applied on a test magnetic resonance image to register with the test ultrasound prostate image. The deformation model with the least registration …

Computer Science::Graphics[ INFO.INFO-IM ] Computer Science [cs]/Medical ImagingComputer Science::Computer Vision and Pattern RecognitionPhysics::Medical Physics[INFO.INFO-IM]Computer Science [cs]/Medical Imaging[INFO.INFO-IM] Computer Science [cs]/Medical Imaging
researchProduct

SVM approximation for real-time image segmentation by using an improved hyperrectangles-based method

2003

A real-time implementation of an approximation of the support vector machine (SVM) decision rule is proposed. This method is based on an improvement of a supervised classification method using hyperrectangles, which is useful for real-time image segmentation. The final decision combines the accuracy of the SVM learning algorithm and the speed of a hyperrectangles-based method. We review the principles of the classification methods and we evaluate the hardware implementation cost of each method. We present the combination algorithm, which consists of rejecting ambiguities in the learning set using SVM decision, before using the learning step of the hyperrectangles-based method. We present re…

Computer Science::Machine LearningComputer sciencebusiness.industryGaussianCombination algorithmImage processingPattern recognitionImage segmentationDecision ruleMachine learningcomputer.software_genreSupport vector machinesymbols.namesakeSignal ProcessingsymbolsComputer Vision and Pattern RecognitionArtificial intelligenceElectrical and Electronic EngineeringField-programmable gate arraybusinesscomputerIndustrial inspectionReal-Time Imaging
researchProduct

Restoration of Videos Degraded by Local Isoplanatism Effects in the Near-Infrared Domain

2008

When observing a scene horizontally at a long distance in the near-infrared domain, degradations due to atmospheric turbulence often occur. In our previous work, we presented two hybrid methods to restore videos degraded by such local perturbations. These restoration algorithms take advantages of a space-time Wiener filter and a space-time regularization by the Laplacian operator. Wiener and Laplacian regularization results are mixed differently depending on the distance between the current pixel and the nearest edge point. It was shown that a gradation between Wiener and Laplacian areas improves results quality, so that only the algorithm using a gradation will be used in this article. In …

Computer engineering. Computer hardwareComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONRegularization (mathematics)Image (mathematics)Local degradationAdaptive restorationTK7885-7895symbols.namesakeSegmentationComputer visionPixelbusiness.industryWiener filterAtmospheric turbulenceImage and Video ProcessingVideo SurveillanceQA75.5-76.95Video processingElectronic computers. Computer sciencesymbolsGradationComputer Vision and Pattern RecognitionArtificial intelligenceAutomatic segmentationbusinessLaplace operatorSoftwareELCVIA: electronic letters on computer vision and image analysis
researchProduct

Non-Model Based Method for an Automation of 3D Acquisition and Post-Processing

2008

Most of the automation for 3D acquisition concerns objects with simple shape, like mechanical parts. For cultural heritage artefacts, the process is more complex, and it doesn't exist general solution nowadays. This paper presents a method to generate a complete 3D model of cultural heritage artefacts. In a first step, MVC is used to solve the view planning problem. Then, holes remaining in 3D model are detected, and their features are calculated to finish acquisition. Different post-processing are applied on each view to increase quality of the 3D model. This procedure has been tested with simulated scanner, before being implemented on a motion system with five degrees of freedom.

Computer engineering. Computer hardwareEngineering drawingScannerScanners automationComputer sciencemedia_common.quotation_subjectBéns del patrimoni culturalDegrees of freedom (mechanics)TK7885-7895Adquisició de 3DSimple (abstract algebra)view planningAutomatització de ScannersView planningQuality (business)scanners automationmedia_commonbusiness.industryAutomatización de ScannersProcess (computing)Adquisición de 3Dcultural heritage artefactsQA75.5-76.95Bienes del patrimonio culturalPlanificación de VistaAutomationCultural heritageElectronic computers. Computer scienceCultural heritage artefactsComputer Vision and Pattern RecognitionPlanificació de Vistabusiness3D acquisitionSoftwareMotion systemELCVIA Electronic Letters on Computer Vision and Image Analysis
researchProduct

Complex networks : application for texture characterization and classification

2008

This article describes a new method and approch of texture characterization. Using complex network representation of an image, classical and derived (hierarchical) measurements, we presente how to have good performance in texture classification. Image is represented by a complex networks : one pixel as a node. Node degree and clustering coefficient, using with traditionnal and extended hierarchical measurements, are used to characterize ”organisation” of textures.

Computer engineering. Computer hardwareTexture compressionComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComplex networksImage processingTexture (geology)TK7885-7895Image textureImage processingAnàlisi de texturaProcesamiento de imágenestexture analysisClustering coefficientAnálisis de texturaRedes complejasPixelbusiness.industryNode (networking)Pattern recognitionProcessament d'imatgescomplex networksQA75.5-76.95Xarxes complexesComplex networkTexture analysisElectronic computers. Computer scienceComputer Science::Computer Vision and Pattern RecognitionComputer Vision and Pattern RecognitionArtificial intelligencebusinessSoftwareELCVIA: electronic letters on computer vision and image analysis
researchProduct

Deep multimodal fusion for semantic image segmentation: A survey

2021

International audience; Recent advances in deep learning have shown excellent performance in various scene understanding tasks. However, in some complex environments or under challenging conditions, it is necessary to employ multiple modalities that provide complementary information on the same scene. A variety of studies have demonstrated that deep multimodal fusion for semantic image segmentation achieves significant performance improvement. These fusion approaches take the benefits of multiple information sources and generate an optimal joint prediction automatically. This paper describes the essential background concepts of deep multimodal fusion and the relevant applications in compute…

Computer science02 engineering and technologyMachine learningcomputer.software_genre0202 electrical engineering electronic engineering information engineeringImage fusionSegmentationmutimodal fusionImage segmentationImage fusionHeuristicbusiness.industryDeep learning[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Deep learning020207 software engineeringImage segmentationSemantic segmentationVariety (cybernetics)Multi-modal[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]Signal ProcessingBenchmark (computing)020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencePerformance improvementbusinesscomputerImage and Vision Computing
researchProduct

Machine Learning Techniques for Intrusion Detection: A Comparative Analysis

2016

International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…

Computer scienceAnomaly-based intrusion detection system02 engineering and technologyIntrusion detection systemIDSMachine learningcomputer.software_genre[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI]Machine LearningResource (project management)Component (UML)0202 electrical engineering electronic engineering information engineeringROCSet (psychology)[ INFO.INFO-AI ] Computer Science [cs]/Artificial Intelligence [cs.AI]False Positivebusiness.industryACM[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunicationsPrecisionObject (computer science)True PositiveOutlier020201 artificial intelligence & image processingThe InternetArtificial intelligenceData miningbusinesscomputer
researchProduct

Efficient linear fusion of partial estimators

2018

Abstract Many signal processing applications require performing statistical inference on large datasets, where computational and/or memory restrictions become an issue. In this big data setting, computing an exact global centralized estimator is often either unfeasible or impractical. Hence, several authors have considered distributed inference approaches, where the data are divided among multiple workers (cores, machines or a combination of both). The computations are then performed in parallel and the resulting partial estimators are finally combined to approximate the intractable global estimator. In this paper, we focus on the scenario where no communication exists among the workers, de…

Computer scienceBayesian probabilityInferenceAsymptotic distribution02 engineering and technology01 natural sciences010104 statistics & probability[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingArtificial Intelligence0202 electrical engineering electronic engineering information engineeringStatistical inferenceFusion rules0101 mathematicsElectrical and Electronic EngineeringComputingMilieux_MISCELLANEOUSMinimum mean square errorApplied MathematicsConstrained optimizationEstimator020206 networking & telecommunicationsComputational Theory and MathematicsSignal ProcessingComputer Vision and Pattern RecognitionStatistics Probability and Uncertainty[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingAlgorithmDigital Signal Processing
researchProduct

Real Time Image Rotation Using Dynamic Reconfiguration

2002

Abstract Field programmable gate array (FPGA) components are widely used nowdays to implement various algorithms, such as digital filtering, in real time. The emergence of dynamically reconfigurable FPGAs made it possible to reduce the number of necessary resources to carry out an image-processing task (tasks chain). In this article, an image-processing application, image rotation, that exploits the FPGAs dynamic reconfiguration method is presented. This paper shows that the choice of an implementation, static or dynamic reconfiguration, depends on the nature of the application. A comparison is carried out between the dynamic and the static reconfiguration using two criteria: cost and perfo…

Computer scienceBlock diagramControl reconfigurationImage processingTask (computing)Computer engineeringSignal ProcessingComputer Vision and Pattern RecognitionElectrical and Electronic EngineeringField-programmable gate arrayDynamic methodReal-time operating systemImage restorationSimulationReal-Time Imaging
researchProduct