Search results for "ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION"

showing 10 items of 982 documents

A Deep Learning Approach for Automated Fault Detection on Solar Modules Using Image Composites

2021

Aerial inspection of solar modules is becoming increasingly popular in automatizing operations and maintenance in large-scale photovoltaic power plants. Current practices are typically time-consuming as they make use of manual acquisitions and analysis of thousands of images to scan for faults and anomalies in the modules. In this paper, we explore and evaluate the use of computer vision and deep learning methods for automating the analysis of fault detection and classification in large scale photovoltaic module installations. We use convolutional neural networks to analyze thermal and visible color images acquired by cameras mounted on unmanned aerial vehicles. We generate composite images…

Computer sciencebusiness.industryDeep learningPhotovoltaic systemComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processingFault (power engineering)Convolutional neural networkFault detection and isolationFeature (computer vision)HistogramComputer visionArtificial intelligencebusiness2021 IEEE 48th Photovoltaic Specialists Conference (PVSC)
researchProduct

Hand Detection and Tracking Using the Skeleton of the Blob for Medical Rehabilitation Applications

2012

This article presents an image processing application for hand detection and tracking using the 4-connected skeleton of the segmentation mask. The system has been designed to be used with techniques of virtual reality to develop an interactive application for phantom limb pain reduction in therapeutic treatments. One of the major contributions is the design of a fast and accurate skeleton extractor, that has proven to be faster than those available in the literature. The skeleton allows the system to precisely detect the position of all the interest points of the hand (namely the fingers and the hand center). The system, composed of both the hand detector and tracker, and the virtual realit…

Computer sciencebusiness.industryDetectorComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processingVirtual realitySkeleton (category theory)Tracking (particle physics)Reduction (complexity)Virtual imageComputer graphics (images)SegmentationComputer visionArtificial intelligencebusiness
researchProduct

Texture Classification with Generalized Fourier Descriptors in Dimensionality Reduction Context: An Overview Exploration

2008

In the context of texture classification, this article explores the capacity and the performance of some combinations of feature extraction, linear and nonlinear dimensionality reduction techniques and several kinds of classification methods. The performances are evaluated and compared in term of classification error. In order to test our texture classification protocol, the experiment carried out images from two different sources, the well known Brodatz database and our leaf texture images database.

Computer sciencebusiness.industryDimensionality reductionFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONNonlinear dimensionality reductionPattern recognitionContext (language use)Texture (geology)Term (time)symbols.namesakeFourier transformsymbolsArtificial intelligencebusiness
researchProduct

An Alternative to Medial Axis for the 3D Reconstruction of Unorganized Set of Points Using Implicit Surfaces

2006

Rebuilding three-dimensional objects represented by a set of points is a classical problem in computer graphics. Multiple applications like medical imaging or industrial techniques require finding shape from scattered data. Therefore, the reconstruction of a set of points that represents a shape has been widely studied, depending on data source and reconstruction's objectives. This purpose of this paper is to provide an automatic reconstruction from an unorganized cloud describing an unknown shape in order to provide a solution that will allow to compute the object's volume and to deform it with constant volume. The main idea in this paper consists in filling the object's interior with an e…

Computer sciencebusiness.industryEquipotential surface3D reconstructionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONMetaballsObject (computer science)Computer graphicsSet (abstract data type)Medial axisComputer visionArtificial intelligencebusinessConstant (mathematics)ComputingMethodologies_COMPUTERGRAPHICS
researchProduct

Fast Image Mosaicing for Panoramic Face Recognition

2006

In this article, we present some development results of a system that performs mosaicing (or mosaicking) of panoramic faces. Our objective is to study the feasibility of panoramic face construction in real-time. To do so, we built a simple acquisition system composed of 5 standard cameras which, together, can take simultaneously 5 views of a face at different angles. Then, we chose an easily hardware-achievable algorithm, consisting of successive linear transformations, in order to compose a panoramic face from these 5 views. The method has been tested on a relatively large number of faces. In order to validate our system of panoramic face mosaicing, we also conducted a preliminary study on…

Computer sciencebusiness.industryFast Fourier transformImage mosaickingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONFacial recognition systemImage (mathematics)Artificial IntelligenceArtificial visionFace (geometry)Principal component analysisMedia TechnologyComputer visionArtificial intelligenceElectrical and Electronic EngineeringbusinessJournal of Multimedia
researchProduct

Three-domain image representation for personal photo album management

2010

In this paper we present a novel approach for personal photo album management. Pictures are analyzed and described in three representation spaces, namely, faces, background and time of capture. Faces are automatically detected and rectified using a probabilistic feature extraction technique. Face representation is then produced by computing PCA (Principal Component Analysis). Backgrounds are represented with low-level visual features based on RGB histogram and Gabor filter bank. Temporal data is obtained through the extraction of EXIF (Exchangeable image file format) data. Each image in the collection is then automatically organized using a mean-shift clustering technique. While many system…

Computer sciencebusiness.industryFeature extractionCBIR - Content Based Image Retrieval automatic image annotation personal photo album managementComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processingcomputer.file_formatGabor filterAutomatic image annotationHistogramFace (geometry)RGB color modelComputer visionArtificial intelligenceImage file formatsImage sensorCluster analysisbusinesscomputer
researchProduct

Comprehensive Experimental Analysis of Handcrafted Descriptors for Face Recognition

2018

Over the past few decades, LBP descriptor, which shown its high robustness in extracting discriminative features from an image, has been successfully applied in diverse challenging computer vision applications including face recognition. The efficiency and usability of the LBP operator and its success in various real world applications has inspired the development of much new powerful LBP variants. Indeed, after the appearance of the LBP operator, several renowned extensions and modifications of LBP have been proposed in the literature to the point that it can be difficult to recognize their respective LBP-related strategies, strengths and weaknesses according to a given application, and th…

Computer sciencebusiness.industryFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020206 networking & telecommunicationsUsability02 engineering and technologyMachine learningcomputer.software_genreFacial recognition systemDiscriminative modelRobustness (computer science)0202 electrical engineering electronic engineering information engineeringTask analysis020201 artificial intelligence & image processingArtificial intelligencebusinesscomputerFERETStrengths and weaknesses2018 International Symposium on Advanced Electrical and Communication Technologies (ISAECT)
researchProduct

Bag of words representation and SVM classifier for timber knots detection on color images

2015

Knots as well as their density have a huge impact on the mechanical properties of wood boards. This paper addresses the issue of their automatic detection. An image processing pipeline which associates low level processing (contrast enhancement, thresholding, mathematical morphology) with bag-of-words approach is developed. We propose a SVM classification based on features obtained by SURF descriptors on RGB images, followed by a dictionary created using the bag-of-words approach. Our method was tested on color images from two different datasets with a total number of 640 knots. The mean recall (true positive) rate achieved was (92%) and (97%) for a single dictionary (built only on samples …

Computer sciencebusiness.industryFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processingPattern recognitionMathematical morphologyThresholdingSupport vector machineComputingMethodologies_PATTERNRECOGNITIONBag-of-words modelHistogramRGB color modelComputer visionArtificial intelligencebusiness2015 14th IAPR International Conference on Machine Vision Applications (MVA)
researchProduct

Parallel implementation on DSPs of a face detection algorithm

2002

In order to localize the face in an image, our approach consists of approximating the face oval shape with an ellipse and to compute coordinates of the center of the ellipse. For this purpose, we explore a new version of the Hough transformation: the fuzzy generalized Hough transformation. To reduce the computation time, we present also a parallel implementation of the algorithm on 2 digital signal processors and we show that an acceleration of a factor of 1.62 has been obtained.

Computer sciencebusiness.industryFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONParallel algorithmEllipseFacial recognition systemEdge detectionHough transformlaw.inventionObject-class detectionlawFace (geometry)Computer visionArtificial intelligenceFace detectionbusiness
researchProduct

An Unsupervised Method for Suspicious Regions Detection in Mammogram Images

2015

Over the past years many researchers proposed biomedical imaging methods for computer-aided detection and classification of suspicious regions in mammograms. Mammogram interpretation is performed by radiologists by visual inspection. The large volume of mammograms to be analyzed makes such readings labour intensive and often inaccurate. For this purpose, in this paper we propose a new unsupervised method to automatically detect suspicious regions in mammogram images. The method consists mainly of two steps: preprocessing; feature extraction and selection. Preprocessing steps allow to separate background region from the breast profile region. In greater detail, gray levels mapping transform …

Computer sciencebusiness.industryFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPattern recognitionMammograms Breast Cancer Suspicious Regions SURF Biomedical Imaging Mapping Histogram Specifications.Visual inspectionHistogramMedical imagingPreprocessorComputer visionArtificial intelligenceskin and connective tissue diseasesbusiness
researchProduct