Search results for "020207 software engineering"

showing 10 items of 475 documents

Emergent behaviors and scalability for multi-agent reinforcement learning-based pedestrian models

2017

This paper analyzes the emergent behaviors of pedestrian groups that learn through the multiagent reinforcement learning model developed in our group. Five scenarios studied in the pedestrian model literature, and with different levels of complexity, were simulated in order to analyze the robustness and the scalability of the model. Firstly, a reduced group of agents must learn by interaction with the environment in each scenario. In this phase, each agent learns its own kinematic controller, that will drive it at a simulation time. Secondly, the number of simulated agents is increased, in each scenario where agents have previously learnt, to test the appearance of emergent macroscopic beha…

Engineeringmedia_common.quotation_subject02 engineering and technologyPedestrianMachine learningcomputer.software_genreConsistency (database systems)Robustness (computer science)0202 electrical engineering electronic engineering information engineeringReinforcement learningQuality (business)Macromedia_commonInformáticaPedestrian simulation and modelingKinematic controllerbusiness.industry020207 software engineeringEmergent behavioursBehavioural simulationHardware and ArchitectureModeling and SimulationScalability020201 artificial intelligence & image processingArtificial intelligencebusinessMulti-agent reinforcement learning (Marl)computerSoftwareSimulation Modelling Practice and Theory
researchProduct

Estimation of the Velocity of a Walking Person in Non-Stationary Indoor Environments from the Received RF Signal

2018

Accurate estimation of the time-variant (TV) velocity, i.e., TV speed and TV direction of motion, of walking persons in indoor environment is of great importance in a variety of wireless indoor applications. This paper presents a novel method for estimating the velocity of a walking person in three-dimensional indoor environments, which are assumed to be equipped with a distributed 3 × 3 multiple-input multiple-output (MIMO) system. The approach estimates the TV speed, TV vertical angle-of-motion (VAOM), and TV horizontal angle-of-motion (HAOM) by fitting the spectrogram of the complex channel gain of a non-stationary indoor channel model to the spectrogram obtained from the received radio …

EstimationComputer sciencebusiness.industryMIMO020206 networking & telecommunications020207 software engineering02 engineering and technologyChannel modelsMotion (physics)Channel gain0202 electrical engineering electronic engineering information engineeringSpectrogramWirelessComputer visionArtificial intelligenceRadio frequencybusiness
researchProduct

FISH: Face Intensity-Shape Histogram representation for automatic face splicing detection

2019

Abstract Tampered images spread nowadays over any visual media influencing our judgement in many aspects of our life. This is particularly critical for face splicing manipulations, where recognizable identities are put out of context. To contrast these activities on a large scale, automatic detectors are required. In this paper, we present a novel method for automatic face splicing detection, based on computer vision, that exploits inconsistencies in the lighting environment estimated from different faces in the scene. Differently from previous approaches, we do not rely on an ideal mathematical model of the lighting environment. Instead, our solution, built upon the concept of histogram-ba…

ExploitComputer scienceLighting environmentContext (language use)02 engineering and technologyImage Forensics Scene level analysis Geometric Constraints Lighting environment Face splicing detectionHistogram0202 electrical engineering electronic engineering information engineeringMedia TechnologyComputer visionElectrical and Electronic EngineeringRepresentation (mathematics)Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniIdeal (set theory)Scene level analysisSettore INF/01 - Informaticabusiness.industryImage forensicContrast (statistics)020207 software engineeringGeometric constraintFace (geometry)Signal Processing020201 artificial intelligence & image processingFace splicing detectionComputer Vision and Pattern RecognitionArtificial intelligencebusinessScale (map)
researchProduct

Perceptually Optimized Image Rendering

2017

We develop a framework for rendering photographic images by directly optimizing their perceptual similarity to the original visual scene. Specifically, over the set of all images that can be rendered on a given display, we minimize the normalized Laplacian pyramid distance (NLPD), a measure of perceptual dissimilarity that is derived from a simple model of the early stages of the human visual system. When rendering images acquired with a higher dynamic range than that of the display, we find that the optimization boosts the contrast of low-contrast features without introducing significant artifacts, yielding results of comparable visual quality to current state-of-the-art methods, but witho…

FOS: Computer and information sciencesComputer Science - Artificial IntelligenceImage qualityComputer scienceComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern RecognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processing02 engineering and technologyLuminanceRendering (computer graphics)Computer Science - GraphicsOptics0202 electrical engineering electronic engineering information engineeringComputer visionPower functionComputingMethodologies_COMPUTERGRAPHICSbusiness.industryDynamic range020207 software engineeringAtomic and Molecular Physics and OpticsGraphics (cs.GR)Electronic Optical and Magnetic MaterialsArtificial Intelligence (cs.AI)Human visual system model020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessImage compression
researchProduct

Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform

2018

In this paper, a robust blind image watermarking method is proposed for copyright protection of digital images. This hybrid method relies on combining two well-known transforms that are the discrete Fourier transform (DFT) and the discrete cosine transform (DCT). The motivation behind this combination is to enhance the imperceptibility and the robustness. The imperceptibility requirement is achieved by using magnitudes of DFT coefficients while the robustness improvement is ensured by applying DCT to the DFT coefficients magnitude. The watermark is embedded by modifying the coefficients of the middle band of the DCT using a secret key. The security of the proposed method is enhanced by appl…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer Networks and CommunicationsComputer scienceMultiple Watermarking02 engineering and technologyDiscrete Fourier transformImage (mathematics)Digital imageDiscrete Fourier transform (DFT)SchemeRobustness (computer science)Quantization0202 electrical engineering electronic engineering information engineeringMedia TechnologyDiscrete cosine transformHybrid method[INFO]Computer Science [cs]Digital watermarkingDiscrete cosine transform (DCT)DistanceImage watermarking020207 software engineeringWatermarkMultimedia (cs.MM)Hardware and ArchitectureMedical ImagesEmbedding020201 artificial intelligence & image processingArnold transformWavelet DomainSvdCryptography and Security (cs.CR)AlgorithmCopyright protectionSoftwareComputer Science - Multimedia
researchProduct

A Robust Blind 3-D Mesh Watermarking Technique Based on SCS Quantization and Mesh Saliency for Copyright Protection

2019

Due to the recent demand of 3-D meshes in a wide range of applications such as video games, medical imaging, film special effect making, computer-aided design (CAD), among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased in the last decade. Nowadays, the majority of robust 3-D watermarking approaches have mainly focused on the robustness against attacks while the imperceptibility of these techniques is still a serious challenge. In this context, a blind robust 3-D mesh watermarking method based on mesh saliency and scalar Costa scheme (SCS) for Copyright protection is proposed. The watermark is embedded by quantifying the vertex n…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer science[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingQuantization (signal processing)Data_MISCELLANEOUS020207 software engineeringWatermark02 engineering and technologyGraphics (cs.GR)Computer Science - Graphics[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingComputer engineering0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPolygon meshVertex normalQuantization (image processing)Digital watermarkingCryptography and Security (cs.CR)ComputingMilieux_MISCELLANEOUSSmoothing
researchProduct

Sequentializing Parameterized Programs

2012

We exhibit assertion-preserving (reachability preserving) transformations from parameterized concurrent shared-memory programs, under a k-round scheduling of processes, to sequential programs. The salient feature of the sequential program is that it tracks the local variables of only one thread at any point, and uses only O(k) copies of shared variables (it does not use extra counters, not even one counter to keep track of the number of threads). Sequentialization is achieved using the concept of a linear interface that captures the effect an unbounded block of processes have on the shared state in a k-round schedule. Our transformation utilizes linear interfaces to sequentialize the progra…

FOS: Computer and information sciencesComputer Science - Logic in Computer ScienceScheduleComputer scienceD.2.4;F.3.1Interface (computing)Parameterized complexitymodel-checking02 engineering and technologyThread (computing)computer.software_genrelcsh:QA75.5-76.95parameterized programsComputer Science - Software Engineeringsoftware verification0202 electrical engineering electronic engineering information engineeringBlock (data storage)Programming languagelcsh:MathematicsD.2.4Local variable020207 software engineeringlcsh:QA1-939Logic in Computer Science (cs.LO)Software Engineering (cs.SE)Transformation (function)model-checking; software verification; parameterized programs020201 artificial intelligence & image processinglcsh:Electronic computers. Computer scienceState (computer science)F.3.1computerElectronic Proceedings in Theoretical Computer Science
researchProduct

A General Framework for Complex Network-Based Image Segmentation

2019

International audience; With the recent advances in complex networks theory, graph-based techniques for image segmentation has attracted great attention recently. In order to segment the image into meaningful connected components, this paper proposes an image segmentation general framework using complex networks based community detection algorithms. If we consider regions as communities, using community detection algorithms directly can lead to an over-segmented image. To address this problem, we start by splitting the image into small regions using an initial segmentation. The obtained regions are used for building the complex network. To produce meaningful connected components and detect …

FOS: Computer and information sciencesComputer Science - Machine LearningComputer Networks and CommunicationsComputer scienceComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern RecognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONMachine Learning (stat.ML)02 engineering and technologyMachine Learning (cs.LG)Statistics - Machine Learning0202 electrical engineering electronic engineering information engineeringMedia TechnologySegmentationConnected componentbusiness.industrySimilarity matrix[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineeringPattern recognitionImage segmentationComplex networkHardware and ArchitectureComputer Science::Computer Vision and Pattern RecognitionGraph (abstract data type)020201 artificial intelligence & image processingArtificial intelligencebusinessSoftware
researchProduct

Deep Non-Line-of-Sight Reconstruction

2020

The recent years have seen a surge of interest in methods for imaging beyond the direct line of sight. The most prominent techniques rely on time-resolved optical impulse responses, obtained by illuminating a diffuse wall with an ultrashort light pulse and observing multi-bounce indirect reflections with an ultrafast time-resolved imager. Reconstruction of geometry from such data, however, is a complex non-linear inverse problem that comes with substantial computational demands. In this paper, we employ convolutional feed-forward networks for solving the reconstruction problem efficiently while maintaining good reconstruction quality. Specifically, we devise a tailored autoencoder architect…

FOS: Computer and information sciencesComputer Science - Machine Learningbusiness.industryComputer scienceComputer Vision and Pattern Recognition (cs.CV)Image and Video Processing (eess.IV)Computer Science - Computer Vision and Pattern RecognitionNonlinear optics020207 software engineering02 engineering and technologyIterative reconstructionInverse problemElectrical Engineering and Systems Science - Image and Video ProcessingAutoencoderRendering (computer graphics)Machine Learning (cs.LG)Non-line-of-sight propagation0202 electrical engineering electronic engineering information engineeringFOS: Electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusiness
researchProduct

SHARP 2020: The 1st Shape Recovery from Partial Textured 3D Scans Challenge Results

2020

The SHApe Recovery from Partial textured 3D scans challenge, SHARP 2020, is the first edition of a challenge fostering and benchmarking methods for recovering complete textured 3D scans from raw incomplete data. SHARP 2020 is organised as a workshop in conjunction with ECCV 2020. There are two complementary challenges, the first one on 3D human scans, and the second one on generic objects. Challenge 1 is further split into two tracks, focusing, first, on large body and clothing regions, and, second, on fine body details. A novel evaluation metric is proposed to quantify jointly the shape reconstruction, the texture reconstruction and the amount of completed data. Additionally, two unique da…

FOS: Computer and information sciencesComputer sciencebusiness.industryComputer Vision and Pattern Recognition (cs.CV)Computer Science - Computer Vision and Pattern Recognition[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020207 software engineering02 engineering and technologyTask (project management)Conjunction (grammar)[INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Metric (mathematics)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusiness
researchProduct