Search results for " computing"

showing 10 items of 2075 documents

Fast prototyping of a SoC-based smart-camera: a real-time fall detection case study

2014

International audience; Smart camera, i.e. cameras that are able to acquire and process images in real-time, is a typical example of the new embedded computer vision systems. A key example of application is automatic fall detection, which can be useful for helping elderly people in daily life. In this paper, we propose a methodology for development and fast-prototyping of a fall detection system based on such a smart camera, which allows to reduce the development time compared to standard approaches. Founded on a supervised classification approach, we propose a HW/SW implementation to detect falls in a home environment using a single camera and an optimized descriptor adapted to real-time t…

Boosting (machine learning)Computer scienceReal-time computing02 engineering and technology[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]HW/SW implementationFast smart camera prototypingComputer graphicsReal-time fall detectionZynq0202 electrical engineering electronic engineering information engineering[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsSmart cameraArchitectureComputingMilieux_MISCELLANEOUS[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processingHome environmentbusiness.industryEfficient algorithm[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]SoC implementation020202 computer hardware & architectureEmbedded systemHardware accelerationBoosting hardware implementation[INFO.INFO-ES]Computer Science [cs]/Embedded Systems020201 artificial intelligence & image processingFall detectionbusiness[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingInformation SystemsJournal of Real-Time Image Processing
researchProduct

Embedded System Study for Real Time Boosting Based Face Detection

2006

This paper describes a study for a real time embedded face detection system. Recently, the boosting based face detection algorithms proposed by [(Viola, P and Jone, M, 2001); (Lienhart, R, et al., 2003)] have gained a lot of attention and are considered as the fastest accurate face detection algorithms today. However, the embedded implementation of such algorithms into hardware is still a challenge, since these algorithms are heavily based on memory access. A sequential implementation model is built showing its lack of regularity in time consuming and speed of detection. We propose a parallel implementation that exploits the parallelism and the pipelining in these algorithms. This implement…

Boosting (machine learning)business.industryComputer scienceEmbedded systemReal-time computingDetectorFace detectionbusinessFacial recognition systemIECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics
researchProduct

Real Time Robust Embedded Face Detection Using High Level Description

2011

Face detection is a fundamental prerequisite step in the process of face recognition. It consists of automatically finding all the faces in an image despite the considerable variations of lighting, background, appearance of people, position/orientation of faces, and their sizes. This type of object detection has the distinction of having a very large intra-class, making it a particularly difficult problem to solve, especially when one wishes to achieve real time processing. A human being has a great ability to analyze images. He can extract the information about it and focus only on areas of interest (the phenomenon of attention). Thereafter he can detect faces in an extremely reliable way.…

Boosting (machine learning)business.industryComputer scienceReal-time computingDetector02 engineering and technologyContent-based image retrievalFacial recognition systemObject detection020202 computer hardware & architecture[INFO.INFO-ES] Computer Science [cs]/Embedded Systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer vision[INFO.INFO-ES]Computer Science [cs]/Embedded SystemsArtificial intelligence[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsbusinessLinear combinationFace detectionImplementation
researchProduct

Target point calculation in the computerized tomography. Comparison of different stereotactic methods

1995

The adaptation of computerized tomography for stereotactic operations requires the transformation of the coordinates of the target point from the CT image space into the stereotactic frame space. Two basic solutions for this transformation are realized in the most of the contemporary stereotactical systems. The indirect geometric method adjusts the frame coordinate system mechanically and identifies its origin in the CT image. There are 6 degrees of freedom: 3 of rotation and 3 of translation which have to be taken into consideration. The second method is a based on direct algebraic coordinate transformation and is independent of the explicite knowledge of the relationship between the image…

Brain Diseasesbusiness.industryCoordinate systemFrame (networking)General MedicineTranslation (geometry)Stereotaxic TechniquesTransformation matrixTransformation (function)Position (vector)HumansMedicineSurgeryPoint (geometry)Computer visionNeurology (clinical)Artificial intelligenceTomography X-Ray ComputedbusinessMathematical ComputingRotation (mathematics)Neurosurgical Review
researchProduct

Class discovery from semi-structured EEG data for affective computing and personalisation

2017

The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link. Many approaches to recognising emotions from metrical data such as EEG signals rely on identifying a very small number of classes and to train a classifier. The interpretation of these classes varies from a single emotion such as stress [24] to features of emotional model such as valence-arousal [4]. There are two major issues here. First classification approach limits the analysis of the data within the selected classes and is also highly dependent on training data/cycles, all of which limits generalisation. Second issue is that it does not exp…

Brain modelingComputer scienceFeature extraction02 engineering and technologyElectroencephalographyMachine learningcomputer.software_genrePersonalizationCorrelationDEAP03 medical and health sciences0302 clinical medicine0202 electrical engineering electronic engineering information engineeringmedicineCluster analysisAffective computingmedicine.diagnostic_testbusiness.industryElectroencephalographySelf-organizing feature mapsFeature extraction020201 artificial intelligence & image processingArtificial intelligenceEmotion recognitionbusinessClassifier (UML)computer030217 neurology & neurosurgery
researchProduct

Personalized multimedia touristic services for hybrid broadcast/broadband mobile receivers

2010

This paper presents the topology of a multimedia tourism service that targets mobile devices equipped with broadband and either multicast or broadcast access capabilities. Multicast / Broadcast access is used to handle the delivery of multimedia data to many simultaneous users in the service area. The solution adopted is based on existing standards for mobile TV services, but introducing features that enable the provision of generic multimedia services on top of mobile hybrid broadband and broadcast networks. Furthermore, this paper shows how to use standardized interfaces originally defined for interactive mobile TV broadcasting to build personalized mobile multimedia services that do not …

Broadband networksComputer scienceMobile televisionMobile computingBroadcastingcomputer.software_genreMultimedia Broadcast Multicast ServiceMobile stationBroadbandMedia TechnologyMobile paymentMobile searchElectrical and Electronic EngineeringMultimediaMulticastbusiness.industryIMT AdvancedMobile broadbandMobile QoSDigital multimedia broadcastingMobile telephonyWeb servicebusinesscomputerMobile deviceComputer network2010 Digest of Technical Papers International Conference on Consumer Electronics (ICCE)
researchProduct

Detecting faulty wireless sensor nodes through Stochastic classification

2011

In many distributed systems, the possibility to adapt the behavior of the involved resources in response to unforeseen failures is an important requirement in order to significantly reduce the costs of management. Autonomous detection of faulty entities, however, is often a challenging task, especially when no direct human intervention is possible, as is the case for many scenarios involving Wireless Sensor Networks (WSNs), which usually operate in inaccessible and hostile environments. This paper presents an unsupervised approach for identifying faulty sensor nodes within a WSN. The proposed algorithm uses a probabilistic approach based on Markov Random Fields, requiring exclusively an ana…

Brooks–Iyengar algorithmComputer scienceDistributed computingReal-time computingProbabilistic logicMarkov processMarkov Random Fieldsymbols.namesakeKey distribution in wireless sensor networksWireless Sensor Networks.Autonomic ComputingSensor nodesymbolsOverhead (computing)Algorithm designWireless sensor network2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
researchProduct

Asynchronous Runtime Verification of Business Processes

2015

The authors propose a runtime verification mechanism for business processes. This mechanism allows verifying the correctness of business process execution and it runs in parallel with the base processes affecting them insignificantly. The authors have identified the case where the use of business process runtime verification is helpful and applicable. The verification mechanism monitors the business process execution and verifies compliance with the base process description. The verification mechanism prototype was developed and tested in real business processes, as well as limits of runtime verification overhead were evaluated.

Business Process Model and NotationHigh-level verificationFunctional verificationbusiness.industryComputer scienceDistributed computingRuntime verificationVerificationBusiness process modelingSoftware engineeringbusinessSoftware verificationIntelligent verification2015 7th International Conference on Computational Intelligence, Communication Systems and Networks
researchProduct

Embedded neural network system for microorganisms growth analysis

2020

This study presents autonomous system for microorganisms’ growth analysis in laboratory environment. As shown in previous research, laser speckle analysis allows detecting submicron changes of substrate with growing bacteria. By using neural networks for speckle analysis, it is possible to develop autonomous system, that can evaluate microorganisms’ growth by using cheap optics and electronics elements. System includes embedded processing module, CMOS camera, 670nm laser diode and optionally WiFi module for connecting to external image storage system. Due to small size, system could be fully placed in laboratory incubator with constant humidity and temperature. By using laser diode, Petri d…

CMOS sensorLaser diodeArtificial neural networkComputer sciencebusiness.industryReal-time computingENCODElaw.inventionSpeckle patternlawComputer data storageElectronicsAutonomous system (mathematics)businessSaratov Fall Meeting 2019: Optical and Nano-Technologies for Biology and Medicine
researchProduct

Examination of robust D-stability of TCP-DCR protocol

2012

This paper presents non-linear mathematical model of a computer network with a part of wireless network. The article contains an analysis of the stability of the network based on TCP-DCR, which is a modification of the traditional TCP. Block diagram of the network model was converted to a form in order to investigate the D-stability using the method of the space of uncertain parameters. Robust D-stability is calculated for constant delays values.

CUBIC TCPD-stabilityTCP accelerationWireless networkComputer scienceReal-time computingTCP tuningBlock diagramTopologyStability (probability)Computer Science::Networking and Internet Architecturecomputer networksTCP-DCR protocolBIC TCPNetwork modelTheoretical and Applied Informatics
researchProduct