Search results for "Algorithm"

showing 10 items of 4887 documents

Automatic object detection in point clouds based on knowledge guided algorithms

2013

The modeling of real-world scenarios through capturing 3D digital data has been proven applicable in a variety of industrial applications, ranging from security, to robotics and to fields in the medical sciences. These different scenarios, along with variable conditions, present a challenge in discovering flexible appropriate solutions. In this paper, we present a novel approach based on a human cognition model to guide processing. Our method turns traditional data-driven processing into a new strategy based on a semantic knowledge system. Robust and adaptive methods for object extraction and identification are modeled in a knowledge domain, which has been created by purely numerical strate…

business.industryComputer sciencePoint cloudRoboticsMachine learningcomputer.software_genreObject (computer science)Data typeObject detectionDomain (software engineering)Knowledge modelingIdentification (information)Artificial intelligencebusinesscomputerAlgorithmVideometrics, Range Imaging, and Applications XII; and Automated Visual Inspection
researchProduct

A Hybrid Algorithm Based on WiFi for Robust and Effective Indoor Positioning

2019

Indoor positioning based on the Wireless Fidelity (WiFi) protocol and the Pedestrian Dead Reckoning (PDR) approach is widely exploited because of the existing WiFi infrastructure in buildings and the advancement of built-in smartphone sensors. In this work, a hybrid algorithm that combines WiFi fingerprinting and PDR to both exploit their advantages as well as limiting the impact of their disadvantages is proposed. Specifically, to build a probability map from noisy Received Signal Strength (RSS), a Gaussian Process (GP) regression is deployed to estimate and construct the RSS fingerprints with incomplete data. Mean and variance of generated points are used to estimate WiFi fingerprinting p…

business.industryComputer scienceRSSReal-time computingComputingMilieux_LEGALASPECTSOFCOMPUTING020206 networking & telecommunications02 engineering and technologycomputer.file_formatHybrid algorithmData setsymbols.namesakeInertial measurement unitDead reckoning0202 electrical engineering electronic engineering information engineeringsymbolsWireless020201 artificial intelligence & image processingbusinessParticle filterVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Gaussian processcomputer2019 19th International Symposium on Communications and Information Technologies (ISCIT)
researchProduct

Fast algorithm for detection of reference spheres in digital panoramic radiography.

2009

In this paper, an algorithm for detection of reference spheres from digital panoramic radiographic images is presented. The proposed algorithm was tested on a database of 107 digital panoramic radiographic images which were used for dental diagnostics. Results show that the proposed method exhibits for detection of reference spheres, a sensitivity of 97.33% and specificity of 93.85%. Performance time differed between 0.55 and 2.36s depending on image size. The aim of this work was to provide a fast ellipse detection algorithm to reduce measuring time on preoperative implant planning by lowering the computational cost.

business.industryComputer scienceRadiographyHealth InformaticsRadiography Dental DigitalEllipseFast algorithmSensitivity and SpecificityComputer Science ApplicationsDental ImplantationSurgery Computer-AssistedPattern recognition (psychology)HumansComputer visionSPHERESArtificial intelligenceSensitivity (control systems)Diagnosis Computer-AssistedbusinessImage resolutionAlgorithmsSoftwareComputers in biology and medicine
researchProduct

Mobile cloud computing educational tool for image/video processing algorithms

2011

This paper shows the importance and benefit of coupling cloud computing with mobile especially due to power limitations that mobile devices exhibit. Moreover, the work done shows that mobile computing can be applied for educational purposes, where a tool for students termed Mobi4Ed is presented. This educational tool aims at exploiting the concept of cloud computing in the context of image and video processing, where students can assess several algorithms in real-time. Two possible system architectures are detailed, where one uses the cellular channel and the other uses the data channel. Consequently, one of the approaches is adopted and a detailed simulation is done where an Android client…

business.industryComputer scienceServerSystems architectureMobile computingCloud computingMobile telephonyVideo processingbusinessAlgorithmMobile deviceMobile cloud computing2011 Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE)
researchProduct

On the Generalizability of Programs Synthesized by Grammar-Guided Genetic Programming

2021

Grammar-guided Genetic Programming is a common approach for program synthesis where the user’s intent is given by a set of input/output examples. For use in real-world software development, the generated programs must work on previously unseen test cases too. Therefore, we study in this work the generalizability of programs synthesized by grammar-guided GP with lexicase selection. As benchmark, we analyze proportionate and tournament selection too. We find that especially for program synthesis problems with a low output cardinality (e.g., a Boolean output) lexicase selection overfits the training cases and does not generalize well to unseen test cases. An analysis using common software metr…

business.industryComputer scienceSoftware developmentGenetic programming02 engineering and technologyMachine learningcomputer.software_genreTournament selectionSoftware metricTest case020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingGeneralizability theoryArtificial intelligencebusinesscomputerSelection (genetic algorithm)Program synthesis
researchProduct

Cooperative Medium Access Control in Wireless Networks: The Two-Hop Case

2009

Cooperative communication has been recently proposed as a powerful means to improve network performance in wireless networks. However, most existing work focuses solely on one-hop source-destination cooperation. In this paper, we propose a novel cooperative MAC mechanism that is specially designed for two-hop cooperation communications where the source node and the destination node cannot hear each other directly. In this case, cooperative communication is operated in a two-hop manner and transmit-diversity is achieved by the reception of the same data packet forwarded through multiple relays towards a single destination. The proposed scheme employs an efficient relay selection algorithm to…

business.industryComputer scienceWireless networkNetwork packetDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAccess controlCooperative diversitylaw.inventionTransmit diversityRelaylawComputer Science::Networking and Internet ArchitectureNetwork performancebusinessSelection algorithmComputer Science::Information TheoryComputer network2009 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications
researchProduct

Damage identification by Lévy ant colony optimization

2010

This paper deals with the identification of incipient damage in structural elements by non-destructive test based on experimentally measured structural dynamical response. By applycation of the Hilbert transform to the recorded signal the so-called phase of the analytical signal is recovered and a proper functional is constructed in such a way that its global minimum gives a measure of the damage level, meant as stiffness reduction. Minimization is achieved by applying a modified Ant Colony Optimization (ACO) for continuous variables, inspired by the ants’ forageing behavior. The modification consists in the application of a new perturbation operator, based on alpha stable Lévy distribution…

business.industryComputer sciencedamage identification optimization levy acorAnt colony optimization algorithmsIdentification (biology)Pattern recognitionArtificial intelligenceSettore ICAR/08 - Scienza Delle Costruzionibusiness
researchProduct

Saliency Based Aesthetic Cut of Digital Images

2013

Aesthetic cut of photos is a process well known to professional photographers. It consists of cutting the original photo to remove less relevant parts close to the borders leaving in this way the interesting subjects in a position that is perceived by the observer as more pleasant. In this paper we propose a saliency based technique to automatically perform aesthetic cut in images. We use a standard method to estimate the saliency map and propose some post processing on the map to make it more suitable for our scope. We then apply a greedy algorithm to determine the cut (i.e. the most important part of the original image) both in the cases of free and fixed aspect ratio. Experimental result…

business.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONObserver (special relativity)Image editingcomputer.software_genreDigital imageRetargetingAesthetic cut image editing saliency.Saliency mapComputer visionArtificial intelligencebusinessGreedy algorithmcomputerMathematics
researchProduct

Diversity in search strategies for ensemble feature selection

2005

Ensembles of learnt models constitute one of the main current directions in machine learning and data mining. Ensembles allow us to achieve higher accuracy, which is often not achievable with single models. It was shown theoretically and experimentally that in order for an ensemble to be effective, it should consist of base classifiers that have diversity in their predictions. One technique, which proved to be effective for constructing an ensemble of diverse base classifiers, is the use of different feature subsets, or so-called ensemble feature selection. Many ensemble feature selection strategies incorporate diversity as an objective in the search for the best collection of feature subse…

business.industryContext (language use)Feature selectionMachine learningcomputer.software_genreEnsemble learningMeasure (mathematics)Random subspace methodEnsembles of classifiersComputingMethodologies_PATTERNRECOGNITIONHardware and ArchitectureFeature (computer vision)Signal ProcessingArtificial intelligenceData miningbusinesscomputerSoftwareSelection (genetic algorithm)Information SystemsMathematics
researchProduct

Could growth hormone play a role in Peutz Jeghers syndrome?

2013

Convincing experimental data suggest that the growth hormone (GH)/insulin-like growth factor-1(IGF-1) axis plays an important role in cancer development and behaviour. Epidemiological studies have supported an association with cancer, but not with tumour induction per se, although this is a distinction that is important mechanistically but not clinically [1]. We report the case of a 17-year-old man with delayed growth of pituitary origin, treated with growth hormone, in whom a diagnosis of Peutz-Jeghers syndrome (PJS) was subsequently made, and in whom, during the endoscopic follow-up, the number of polyps reduced dramatically, thus suggesting a role for GH in eliciting this disease.

business.industryDwarfismPeutz–Jeghers syndromeGeneral MedicineBioinformaticsmedicine.diseaseGrowth hormoneSettore MED/13 - EndocrinologiaSettore MED/03 - Genetica MedicaMutation (genetic algorithm)MedicinePeutz Jeghers syndromebusinessGrowth hormoneMedical Hypotheses
researchProduct