Search results for " image processing."
showing 10 items of 2265 documents
Acoustic Detection of Moving Vehicles
2018
This chapter outlines a robust algorithm to detect the arrival of a vehicle of arbitrary type when other noises are present. It is done via analysis of its acoustic signature against an existing database of recorded and processed acoustic signals. To achieve it with minimum number of false alarms, a construction of a training database of acoustic signatures of signals emitted by vehicles using the distribution of the energies among blocks of wavelet packet coefficients (waveband spectra, see Sect. 4.6) is combined with a procedure of random search for a near-optimal footprint (RSNOFP). The number of false alarms in the detection is minimized even under severe conditions such as: signals emi…
Maximum Lifetime of the Wireless Sensor Network and the Gossip Problem
2018
In the gossip problem each node of the graph G possesses a unique piece of information - the gossip message. A sequence of one-way or two-way communications between pair of nodes is made to spread the messages so that any node of the graph knows all the gossips. The question is, what is the minimum number of calls between pairs of nodes needed to exchange all gossip messages? The solution to the two-way communication gossip problem is that \(2N-4\) calls (\(N\ge 4\)) suffice if and only if the graph contains a four cycle subgraph. For one-way communication problem the classical results states that in a strongly connected graph \(2N-2\) calls (\(N\ge 4\)) suffice. In this paper we consider t…
Adaptive Threshold, Wavelet and Hilbert Transform for QRS Detection in Electrocardiogram Signals
2017
This paper combines Hilbert and Wavelet transforms and an adaptive threshold technique to detect the QRS complex of electrocardiogram signals. The method is performed in a window framework. First, the Wavelet transform is applied to the ECG signal to remove noise. Next, the Hilbert transform is applied to detect dominant peak points in the signal. Finally, the adaptive threshold technique is applied to detect R-peaks, Q, and S points. The performance of the algorithm is evaluated against the MIT-BIH arrhythmia database, and the numerical results indicated significant detection accuracy.
Manifold Learning with High Dimensional Model Representations
2020
Manifold learning methods are very efficient methods for hyperspectral image (HSI) analysis but, unless specifically designed, they cannot provide an explicit embedding map readily applicable to out-of-sample data. A common assumption to deal with the problem is that the transformation between the high input dimensional space and the (typically low) latent space is linear. This is a particularly strong assumption, especially when dealing with hyperspectral images due to the well-known nonlinear nature of the data. To address this problem, a manifold learning method based on High Dimensional Model Representation (HDMR) is proposed, which enables to present a nonlinear embedding function to p…
Cluster Aggregation for Analyzing Event-Related Potentials
2017
Topographic analysis are references independent for Event-Related Potentials (ERPs), and thus render statistically unambiguous results. This drives us to develop an effective clustering approach to finding temporal samples possessing similar topographies for analysing the temporal-spatial ERPs data. The previous study called CARTOOL used single clustering method to cluster ERP data. Indeed, given a clustering method, the quality of clustering varies with data and the number of clusters, motivating us to implement and compare multiple clustering algorithms via using multiple similarity measurements. By finding the minimum distance among the various clustering methods and selecting the most s…
Adoption of Constrained Application Protocol
2016
Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…
Line reconstruction using prior knowledge in single non-central view
2016
International audience; Line projections in non-central systems contain more geometric information than in central systems. The four degrees of freedom of the 3D line are mapped to the line-image and the 3D line can be theoretically recovered from 4 projecting rays (i.e. line-image points) from a single non-central view. In practice, extraction of line-images is consid- erably more difficult and the resulting reconstruction is imprecise and sensitive to noise. In this paper we present a minimal solution to recover the geometry of the 3D line from only three line-image points when the line is parallel to a given plane. A second minimal solution allows to recover the 3D line from two points w…
Convolutional Neural Network for Blind Mesh Visual Quality Assessment Using 3D Visual Saliency
2018
In this work, we propose a convolutional neural network (CNN) framework to estimate the perceived visual quality of 3D meshes without having access to the reference. The proposed CNN architecture is fed by small patches selected carefully according to their level of saliency. To do so, the visual saliency of the 3D mesh is computed, then we render 2D projections from the 3D mesh and its corresponding 3D saliency map. Afterward, the obtained views are split to obtain 2D small patches that pass through a saliency filter to select the most relevant patches. Experiments are conducted on two MVQ assessment databases, and the results show that the trained CNN achieves good rates in terms of corre…
Study of transmission parameters under controlled multipath environment using Rasp Pi3
2018
The evaluation of QoS in mobile multipath environments is an interesting topic in modern communications. The use of Raspberry Pi as a low cost microcomputer board developed in the United Kingdom by the Raspberry Pi Foundation can be helpful in onsite deployments. The Pi3 model has integrated WiFi and Bluetooth connectivity and also 4 USB ports to expand the device with all kinds of peripheral. Under the premise of offering the power of a computer at low prices, this device is one of the most affordable ways to have a particularly efficient and dynamic hardware accessible at a low price to develop a Wireless Sensor Netwok (WSN). The use of the Raspberry Pi3 permits the development of a power…
Evaluation of SLA-based decision strategies for VM scheduling in cloud data centers
2016
Service level agreements (SLAs) gain more and more importance in the area of cloud computing. An SLA is a contract between a customer and a cloud service provider (CSP) in which the CSP guarantees functional and non-functional quality of service parameters for cloud services. Since CSPs have to pay for the hardware used as well as penalties for violating SLAs, they are eager to fulfill these agreements while at the same time optimizing the utilization of their resources.In this paper we examine SLA-aware VM scheduling strategies for cloud data centers. The service level objectives considered are resource usage and availability. The sample resources are CPU and RAM. They can be overprovision…