Search results for " Software"
showing 10 items of 1178 documents
Model Driven Architecture (MDA)
2003
Benchmarking non-photorealistic rendering of portraits
2017
We present a set of images for helping NPR practitioners evaluate their image-based portrait stylisation algorithms. Using a standard set both facilitates comparisons with other methods and helps ensure that presented results are representative. We give two levels of difficulty, each consisting of 20 images selected systematically so as to provide good coverage of several possible portrait characteristics. We applied three existing portrait-specific stylisation algorithms, two general-purpose stylisation algorithms, and one general learning based stylisation algorithm to the first level of the benchmark, corresponding to the type of constrained images that have often been used in portrait-s…
Combination Of Handcrafted And Deep Learning-Based Features For 3d Mesh Quality Assessment
2020
We propose in this paper a novel objective method to evaluate the perceived visual quality of 3D meshes. The proposed method in no-reference, it relies only on the distorted mesh for the quality estimation. It is based on a pre-trained convolutional neural network (i.e VGG to extract features from the distorted mesh) and handcrafted features extracted directly from the 3D mesh (i.e curvature and dihedral angle). A General Regression Neural Network (GRNN) is used to learn the statistical parameters of the feature vectors and estimate the quality score. Experimental results from for subjective databases (LIRIS masking, LIRIS/EPFL generalpurpose, UWB compression and LEETA simplification) and c…
Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes
2018
By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.
Encouraging students’ problem posing through importing visual images into mathematical software
2017
New Areas of Application of Comparable Corpora
2019
This chapter describes several approaches of using comparable corpora beyond the area of MT for under-resourced languages, which is the primary focus of the ACCURAT project. Section 7.1, which is based on Rapp and Zock (Automatic dictionary expansion using non-parallel corpora. In: A. Fink, B. Lausen, W. Seidel, & A. Ultsch (Eds.) Advances in Data Analysis, Data Handling and Business Intelligence. Proceedings of the 32nd Annual Meeting of the GfKl, 2008. Springer, Heidelberg, 2010), addresses the task of creating resources for bilingual dictionaries using a seed lexicon; Sect. 7.2 (based on Rapp et al., Identifying word translations from comparable documents without a seed lexicon. Proceedi…
LifeRescue: A web based application for emergency responders during fire emergency response
2016
In order to respond to any kind of building fire emergencies, first-responders have to use lot of time to get access to the emergency data such as location of the victims who are still inside the building, location of the hazardous material, location of the resources and location of the exits in order to perform search and rescue. However, search is possibly one of the most dangerous activities on the fire ground. Sometimes the visibility is zero and the environment is really hot. Because of the limited operating time in the building, the key to successful search is how quickly emergency responders can get access to the emergency related information in order to save victims and the property…
High Level Modeling and Hardware Implementation of Image Processing Algorithms Using XSG
2019
International audience; Design of Systems-on-Chip has become very common especially with the remarkable advances in the field of high-level system modeling. In recent years, Matlab also offers a Simulink interface for the design of hardware systems. From a high-level specification, Matlab provides self-generation of HDL codes and/or FPGA configuration codes while providing other benefits of easy simulation. In addition, a large part of the Systems-on-Chip use at least one image processing algorithm and at the same time border detection is one of the most used algorithms. This paper presents a study and a hardware implementation of various algorithms of borders detection realized under Xilin…
Further Results on Modeling, Analysis, and Control Synthesis for Offshore Wind Turbine Systems
2014
Renewable energy is a hot topic all over the world. Nowadays, there are several sustainable renewable power solutions out there; hydro, wind, solar, wave, and biomass to name a few. Most countries have a tendency to want to become greener. In the past, all new wind parks were installed onshore. During the last decade, more and more wind parks were installed offshore, in shallow water. This chapter investigates a comparative study on the modeling, analysis, and control synthesis for the offshore wind turbine systems. More specifically, an \( {\mathcal{H}}_{\infty } \) static output-feedback control design with constrained information is designed. Constrained information indicates that a rema…
The Computer Control Software for MAMI
1980
The computer control system of the Mainz Microtron is designed to keep track with the modular and step-by-step construction of the three accelerator stages. The system is up to now based on two loosely coupled HP1000 minicomputers, interfaced via CAMAC to the accelerator components and to the operator desk. The control software is divided into several layers of portable processes distributed to both computers. Communication between the processes, access to the data bank and the routing of CAMAC interrupts are handled via a message system which operates with symbolic addresses.