Search results for "Embedded"

showing 10 items of 412 documents

Fast prototyping of a SoC-based smart-camera: a real-time fall detection case study

2014

International audience; Smart camera, i.e. cameras that are able to acquire and process images in real-time, is a typical example of the new embedded computer vision systems. A key example of application is automatic fall detection, which can be useful for helping elderly people in daily life. In this paper, we propose a methodology for development and fast-prototyping of a fall detection system based on such a smart camera, which allows to reduce the development time compared to standard approaches. Founded on a supervised classification approach, we propose a HW/SW implementation to detect falls in a home environment using a single camera and an optimized descriptor adapted to real-time t…

Boosting (machine learning)Computer scienceReal-time computing02 engineering and technology[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]HW/SW implementationFast smart camera prototypingComputer graphicsReal-time fall detectionZynq0202 electrical engineering electronic engineering information engineering[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsSmart cameraArchitectureComputingMilieux_MISCELLANEOUS[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processingHome environmentbusiness.industryEfficient algorithm[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]SoC implementation020202 computer hardware & architectureEmbedded systemHardware accelerationBoosting hardware implementation[INFO.INFO-ES]Computer Science [cs]/Embedded Systems020201 artificial intelligence & image processingFall detectionbusiness[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingInformation SystemsJournal of Real-Time Image Processing
researchProduct

Embedded System Study for Real Time Boosting Based Face Detection

2006

This paper describes a study for a real time embedded face detection system. Recently, the boosting based face detection algorithms proposed by [(Viola, P and Jone, M, 2001); (Lienhart, R, et al., 2003)] have gained a lot of attention and are considered as the fastest accurate face detection algorithms today. However, the embedded implementation of such algorithms into hardware is still a challenge, since these algorithms are heavily based on memory access. A sequential implementation model is built showing its lack of regularity in time consuming and speed of detection. We propose a parallel implementation that exploits the parallelism and the pipelining in these algorithms. This implement…

Boosting (machine learning)business.industryComputer scienceEmbedded systemReal-time computingDetectorFace detectionbusinessFacial recognition systemIECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics
researchProduct

Real Time Robust Embedded Face Detection Using High Level Description

2011

Face detection is a fundamental prerequisite step in the process of face recognition. It consists of automatically finding all the faces in an image despite the considerable variations of lighting, background, appearance of people, position/orientation of faces, and their sizes. This type of object detection has the distinction of having a very large intra-class, making it a particularly difficult problem to solve, especially when one wishes to achieve real time processing. A human being has a great ability to analyze images. He can extract the information about it and focus only on areas of interest (the phenomenon of attention). Thereafter he can detect faces in an extremely reliable way.…

Boosting (machine learning)business.industryComputer scienceReal-time computingDetector02 engineering and technologyContent-based image retrievalFacial recognition systemObject detection020202 computer hardware & architecture[INFO.INFO-ES] Computer Science [cs]/Embedded Systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer vision[INFO.INFO-ES]Computer Science [cs]/Embedded SystemsArtificial intelligence[ INFO.INFO-ES ] Computer Science [cs]/Embedded SystemsbusinessLinear combinationFace detectionImplementation
researchProduct

Combinatorial Transforms : Application in Lossless Image Compression

2011

International audience; Common image compression standards are usually based on frequency transform such as Discrete Cosine Transform. We present a different approach for lossless image compression, which is based on a combinatorial transform. The main transform is Burrows Wheeler Transform (BWT) which tends to reorder symbols according to their following context. It becomes one of promising compression approach based on context modeling. BWT was initially applied for text compression software such as BZIP2 nevertheless it has been recently applied to the image compression field. Compression schemes based on the Burrows Wheeler Transform have been usually lossless; therefore we implement th…

Burrows Wheeler transformACM[INFO.INFO-ES]Computer Science [cs]/Embedded SystemsData_CODINGANDINFORMATIONTHEORY[ INFO.INFO-ES ] Computer Science [cs]/Embedded Systemsimage compressioncombinatorial[INFO.INFO-ES] Computer Science [cs]/Embedded Systems
researchProduct

Low‐cost, High‐Capability, Embedded Systems for CNC Education and Research

2015

Teaching of CNC and CAD/CAM technologies has recently taken a great importance, due to their development, to the great number of solutions available on the market, and to the frequent updates. Nevertheless, one of the most urgent need is to improve the quality of education coping with a rapidly growing number of students. Nowadays, in comparison to the past, many Open-Source technical solutions, both hardware and software, are available to realise easily and cheaply some scaled-down prototypes of numerical control machine tools: these are able to work perfectly and can be employed as a learning method. This paper shows some past experiences regarding the development of some degree thesis wo…

CNC Open Source Embedded systemsSettore ING-IND/16 - Tecnologie E Sistemi Di Lavorazione
researchProduct

On relationship types, their strength, and reward crowdfunding backer behavior

2023

ispartof: JOURNAL OF BUSINESS RESEARCH vol:154 status: published

CROWDMarketingBehaviorNetwork tiesRelationshipSocial SciencesSUCCESSCREATORSTie strengthPLATFORMSINFORMATION ASYMMETRYINVESTORSSocial capitalPROJECTSBusiness & EconomicsTIESVDP::Samfunnsvitenskap: 200BusinessSOCIAL NETWORKSCrowdfundingEMBEDDEDNESSJournal of Business Research
researchProduct

Wireless MAC processors: programming MAC protocols on commodity hardware

2012

Programmable wireless platforms aim at responding to the quest for wireless access flexibility and adaptability. This paper introduces the notion of wireless MAC processors. Instead of implementing a specific MAC protocol stack, Wireless MAC processors do support a set of Medium Access Control “commands” which can be run-time composed (programmed) through software-defined state machines, thus providing the desired MAC protocol operation. We clearly distinguish from related work in this area as, unlike other works which rely on dedicated DSPs or programmable hardware platforms, we experimentally prove the feasibility of the wireless MAC processor concept over ultra-cheap commodity WLAN hardw…

Chipsetbusiness.industryFirmwareComputer scienceSettore ING-INF/03 - TelecomunicazioniComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReconfigurabilityNetwork interfacecomputer.software_genreWLAN 802.11 reconfigurabilityProtocol stackCognitive radioprogrammable MACEmbedded systemWireless lancognitive radio overlay software modules running on the host computer.WirelessbusinesscomputerWireless distribution systemComputer network
researchProduct

Klientelistische Korruptions-Netzwerke – Konzeptionelle und empirische Ansätze

2014

Corruption is widespread all over the world. It is seen as a serious problem for wealth, equality, democracy and development. In many countries, corruption is not a deviant behaviour but the norm, generally practised by actors; hence corruption is an informal institution. Despite this, a consensual definition of corruption is nowhere in sight. One way of approaching corruption might be to study forms of corruption. A form or variant often mentioned is corruption networks, or clientelism. In this paper, clientelism is analysed in order to proceed further towards an understanding of corruption. With this perspective, corruption is not seen as a deviant behaviour but the social embeddedness of…

ClientelismEmbeddednessOrder (exchange)Corruptionmedia_common.quotation_subjectField (Bourdieu)Political scienceEthnographyInstitutionPositive economicsDemocracyLinguisticsmedia_common
researchProduct

Taking historical embeddedness seriously : Three historical approaches to advance strategy process and practice research

2016

International audience; Despite the proliferation of strategy process and practice research, we lack understanding of the historical embeddedness of strategic processes and practices. In this paper, we present three historical approaches with the potential to remedy this deficiency. First, realist history can contribute to a better understanding of the historical embeddedness of strategic processes; in particular, comparative historical analysis can explicate the historical conditions, mechanisms, and causality in strategic processes. Second, interpretative history can add to our knowledge of the historical embeddedness of strategic practices, and microhistory can specifically help to under…

Comparative historyEmbeddednessProcess (engineering)Strategy and ManagementAgency (philosophy)Microhistorystrategy processPractice research060104 historyPower (social and political)discourse theorycomparative historystrategy implementationpractise theoryManagement of Technology and Innovation0502 economics and business0601 history and archaeologyta615processSociologySocial sciencegenealogymicrohistory[SHS.ECO] Humanities and Social Sciences/Economics and Financeta51205 social sciences06 humanities and the arts[SHS.ECO]Humanities and Social Sciences/Economics and FinanceGeneral Business Management and AccountingCausalitypracticestrategy-as-practiceEpistemologyembeddedness[SHS.GESTION]Humanities and Social Sciences/Business administrationdiscoursestrategy[SHS.GESTION] Humanities and Social Sciences/Business administration050203 business & management
researchProduct

A grid representation for distributed virtual environments

2004

Fast Internet connections and the widespread use of high performance graphic cards are making Distributed Virtual Environments (DVE) very common nowadays. The architecture and behavior of these systems are very similar to new grid computing applications where concepts such as sharing and high scalability are extremely exploited. However, there are several key issues in these systems that should still be improved in order to design a scalable and cost-effective DVE system. One of these key issues is the partitioning problem. This problem consists of efficiently assigning clients (3-D avatars) to the arbiters (servers) in the system. As an alternative to the ad-hoc heuristic proposed in the l…

Computació en núvolRealitat virtualbusiness.industryHeuristic (computer science)Computer scienceDistributed computingEvolutionary algorithmcomputer.software_genreGridInteractive programmingVirtual realityClient-server systemsGrid computingServerEmbedded systemScalabilityGrid computingSystems architecturePerformance evaluationHeuristicsbusinessOpen systemscomputerArquitectura client-servidor (Informàtica):Informàtica::Arquitectura de computadors [Àrees temàtiques de la UPC]
researchProduct