Search results for " pattern"

showing 10 items of 2245 documents

No-reference mesh visual quality assessment via ensemble of convolutional neural networks and compact multi-linear pooling

2020

Abstract Blind or No reference quality evaluation is a challenging issue since it is done without access to the original content. In this work, we propose a method based on deep learning for the mesh visual quality assessment without reference. For a given 3D model, we first compute its mesh saliency. Then, we extract views from the 3D mesh and the corresponding mesh saliency. After that, the views are split into small patches that are filtered using a saliency threshold. Only the salient patches are selected and used as input data. After that, three pre-trained deep convolutional neural networks are employed for feature learning: VGG, AlexNet, and ResNet. Each network is fine-tuned and pro…

business.industryComputer scienceDeep learningFeature vectorPoolingPattern recognition02 engineering and technology01 natural sciencesConvolutional neural networkResidual neural networkArtificial IntelligenceFeature (computer vision)0103 physical sciencesSignal Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligence010306 general physicsbusinessFeature learningSoftwarePattern Recognition
researchProduct

Improving distance based image retrieval using non-dominated sorting genetic algorithm

2015

Image retrieval is formulated as a multiobjective optimization problem.A multiobjective genetic algorithm is hybridized with distance based search.A parameter balances exploration (genetic search) or exploitation (nearest neighbors).Extensive comparative experimentation illustrate and assess the proposed methodology. Relevance feedback has been adopted as a standard in Content Based Image Retrieval (CBIR). One major difficulty that algorithms have to face is to achieve and adequate balance between the exploitation of already known areas of interest and the exploration of the feature space to find other relevant areas. In this paper, we evaluate different ways to combine two existing relevan…

business.industryComputer scienceFeature vectorSortingRelevance feedbackContext (language use)Machine learningcomputer.software_genreContent-based image retrievalMulti-objective optimizationArtificial IntelligenceSignal ProcessingGenetic algorithmComputer Vision and Pattern RecognitionData miningArtificial intelligencebusinessImage retrievalcomputerSoftwarePattern Recognition Letters
researchProduct

Depth sensing using coherence mapping

2010

A method for depth sensing based on sensing the visibility associated with the coherence function of a laser source is presented. The setup is based on an electronic speckle pattern interferometric (ESPI) setup, where the object depth is encoded into the amplitude of the interference pattern without the need for depth scanning. After performing phase-shifting method, the object three-dimensional (3-D) shape is reconstructed by means as a range image from the visibility of the image set of interferograms and where each gray level represents a given object depth. Experimental results validate the proposed approach for reflective diffuse objects at different measurement distances.

business.industryComputer scienceLaser sourceAtomic and Molecular Physics and OpticsElectronic Optical and Magnetic MaterialsGray levelSpeckle patternInterferometryOpticsAmplitudeElectronic speckle pattern interferometryCoherence (signal processing)Speckle imagingElectrical and Electronic EngineeringPhysical and Theoretical ChemistrybusinessOptics Communications
researchProduct

Hybrid optical-digital method for local-displacement analysis by use of a phase-space representation.

2010

A method for evaluating the local deformation or displacement of an object in speckle metrology is described. The local displacements of the object in one direction are digitally coded in a one-dimensional specklegram. By optically performing the local spectrum of this pattern, one simultaneously achieves information about the local displacement and its spatial position. The good performance of this technique is demonstrated with computer-generated test signals.

business.industryComputer scienceMaterials Science (miscellaneous)Industrial and Manufacturing EngineeringDisplacement (vector)MetrologySpeckle patternOpticsInterference (communication)Position (vector)Phase spaceSpatial frequencySpeckle imagingBusiness and International ManagementbusinessApplied optics
researchProduct

SmartSpectra: Applying multispectral imaging to industrial environments

2005

SmartSpectra is a smart multispectral system for industrial, environmental, and commercial applications where the use of spectral information beyond the visible range is needed. The SmartSpectra system provides six spectral bands in the range 400-1000nm. The bands are configurable in terms of central wavelength and bandwidth by using electronic tunable filters. SmartSpectra consists of a multispectral sensor and the software that controls the system and simplifies the acquisition process. A first prototype called Autonomous Tunable Filter System is already available. This paper describes the SmartSpectra system, demonstrates its performance in the estimation of chlorophyll in plant leaves, …

business.industryComputer scienceMultispectral imageBandwidth (signal processing)Image processingSpectral bandsFilter systemSoftwareSignal ProcessingVisible rangeComputer visionComputer Vision and Pattern RecognitionArtificial intelligenceElectrical and Electronic EngineeringbusinessComputer hardwareReal-Time Imaging
researchProduct

Robustly correlated key‐medical image for DNA‐chaos based encryption

2021

Abstract Medical images include confidential and sensitive information about patients. Hence, ensuring the security of these images is a crucial requirement. This paper proposes an efficient and secure medical image encryption‐decryption scheme based on deoxyribonucleic acid (DNA), one‐dimensional chaotic maps (tent and logistic maps), and hash functions (SHA‐256 and MD5). The first part of the proposed scheme is the key generation based on the hash functions of the image and its metadata. The key then is highly related and intensely sensitive to the original image. The second part is the rotation and permutation of the first two MSB bit‐plans of the medical image to reduce its black backgr…

business.industryComputer sciencePattern recognitionEncryptionImage (mathematics)CHAOS (operating system)QA76.75-76.765Signal ProcessingPhotographyKey (cryptography)Computer softwareComputer Vision and Pattern RecognitionArtificial intelligenceElectrical and Electronic EngineeringTR1-1050businessSoftwareIET Image Processing
researchProduct

Trends in pattern recognition

1993

Aims of this paper are to present a short history of pattern recognition, its current areas of interest and future developments. The term pattern recognition is vague, its related topics including the study of sensorial stimuli, the analysis of physical phenomena and models of reasoning. Here we concentrate our attention on visual patterns and the machines that have been realized in order perform automatic pattern recognition. Some theoretical approaches will be also reviewed.

business.industryComputer sciencePhysical phenomenaPattern recognition (psychology)Visual patternsPattern recognitionArtificial intelligencebusinessTerm (time)
researchProduct

Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks

2017

With the emergence of cloud computing, many attacks, including Distributed Denial-of-Service (DDoS) attacks, have changed their direction towards cloud environment. In particular, DDoS attacks have changed in scale, methods, and targets and become more complex by using advantages provided by cloud computing. Modern cloud computing environments can benefit from moving towards Software-Defined Networking (SDN) technology, which allows network engineers and administrators to respond quickly to the changing business requirements. In this paper, we propose an approach for detecting application-layer DDoS attacks in cloud environment with SDN. The algorithm is applied to statistics extracted from…

business.industryComputer scienceProbabilistic logic020206 networking & telecommunicationsDenial-of-service attackCloud computing02 engineering and technologyEncryptionApplication layeranomaly detectionDDoS attackSDNprobabilistic model0202 electrical engineering electronic engineering information engineeringbehavior pattern020201 artificial intelligence & image processingAnomaly detectionCluster analysisbusinessSoftware-defined networkingComputer networkclustering
researchProduct

Analysis of the Effect of Human Presence on a Wireless Sensor Network

2011

Wireless Sensor Networks (WSNs) are gaining an increasing industry wide adoption. However, there remain major challenges such as network dimensioning and node placement especially in Built Environment Networks (BENs). Decisions on the node placement, orientation, and the number of nodes to cover the area of interest are usually ad-hoc. Ray tracing tools are traditionally employed to predict RF signal propagation; however, such tools are primarily intended for outdoor environments. RF signal propagation varies greatly indoors due to building materials and infrastructure, obstacles, node placement, antenna orientation and human presence. Because of the complexity of signal prediction, these f…

business.industryComputer scienceSettore ING-INF/03 - TelecomunicazioniRSSReal-time computingcomputer.file_formatRadio propagationKey distribution in wireless sensor networksBuilt Environment Networks (BENs) Human Presence Node Placement Radiation Patterns Wireless Sensor Networks (WSNs)Ray tracing (graphics)Radio frequencyTransceiverbusinessWireless sensor networkcomputerDimensioningSoftwareComputer network
researchProduct

Blind Robust 3-D Mesh Watermarking Based on Mesh Saliency and QIM Quantization for Copyright Protection

2019

International audience; Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermark-ing techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real issue. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and Quantization Index Modulation (QIM) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex norms of the 3-D mesh using QIM scheme since it offe…

business.industryComputer scienceWatermark robustness[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingData_MISCELLANEOUS[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineeringQuantization index modulationWatermark02 engineering and technologyVertex (geometry)[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessQuantization (image processing)Digital watermarkingSmoothingComputingMilieux_MISCELLANEOUS
researchProduct