Search results for "Embedded"
showing 10 items of 412 documents
Fast prototyping of a SoC-based smart-camera: a real-time fall detection case study
2014
International audience; Smart camera, i.e. cameras that are able to acquire and process images in real-time, is a typical example of the new embedded computer vision systems. A key example of application is automatic fall detection, which can be useful for helping elderly people in daily life. In this paper, we propose a methodology for development and fast-prototyping of a fall detection system based on such a smart camera, which allows to reduce the development time compared to standard approaches. Founded on a supervised classification approach, we propose a HW/SW implementation to detect falls in a home environment using a single camera and an optimized descriptor adapted to real-time t…
Embedded System Study for Real Time Boosting Based Face Detection
2006
This paper describes a study for a real time embedded face detection system. Recently, the boosting based face detection algorithms proposed by [(Viola, P and Jone, M, 2001); (Lienhart, R, et al., 2003)] have gained a lot of attention and are considered as the fastest accurate face detection algorithms today. However, the embedded implementation of such algorithms into hardware is still a challenge, since these algorithms are heavily based on memory access. A sequential implementation model is built showing its lack of regularity in time consuming and speed of detection. We propose a parallel implementation that exploits the parallelism and the pipelining in these algorithms. This implement…
Real Time Robust Embedded Face Detection Using High Level Description
2011
Face detection is a fundamental prerequisite step in the process of face recognition. It consists of automatically finding all the faces in an image despite the considerable variations of lighting, background, appearance of people, position/orientation of faces, and their sizes. This type of object detection has the distinction of having a very large intra-class, making it a particularly difficult problem to solve, especially when one wishes to achieve real time processing. A human being has a great ability to analyze images. He can extract the information about it and focus only on areas of interest (the phenomenon of attention). Thereafter he can detect faces in an extremely reliable way.…
Combinatorial Transforms : Application in Lossless Image Compression
2011
International audience; Common image compression standards are usually based on frequency transform such as Discrete Cosine Transform. We present a different approach for lossless image compression, which is based on a combinatorial transform. The main transform is Burrows Wheeler Transform (BWT) which tends to reorder symbols according to their following context. It becomes one of promising compression approach based on context modeling. BWT was initially applied for text compression software such as BZIP2 nevertheless it has been recently applied to the image compression field. Compression schemes based on the Burrows Wheeler Transform have been usually lossless; therefore we implement th…
Low‐cost, High‐Capability, Embedded Systems for CNC Education and Research
2015
Teaching of CNC and CAD/CAM technologies has recently taken a great importance, due to their development, to the great number of solutions available on the market, and to the frequent updates. Nevertheless, one of the most urgent need is to improve the quality of education coping with a rapidly growing number of students. Nowadays, in comparison to the past, many Open-Source technical solutions, both hardware and software, are available to realise easily and cheaply some scaled-down prototypes of numerical control machine tools: these are able to work perfectly and can be employed as a learning method. This paper shows some past experiences regarding the development of some degree thesis wo…
On relationship types, their strength, and reward crowdfunding backer behavior
2023
ispartof: JOURNAL OF BUSINESS RESEARCH vol:154 status: published
Wireless MAC processors: programming MAC protocols on commodity hardware
2012
Programmable wireless platforms aim at responding to the quest for wireless access flexibility and adaptability. This paper introduces the notion of wireless MAC processors. Instead of implementing a specific MAC protocol stack, Wireless MAC processors do support a set of Medium Access Control “commands” which can be run-time composed (programmed) through software-defined state machines, thus providing the desired MAC protocol operation. We clearly distinguish from related work in this area as, unlike other works which rely on dedicated DSPs or programmable hardware platforms, we experimentally prove the feasibility of the wireless MAC processor concept over ultra-cheap commodity WLAN hardw…
Klientelistische Korruptions-Netzwerke – Konzeptionelle und empirische Ansätze
2014
Corruption is widespread all over the world. It is seen as a serious problem for wealth, equality, democracy and development. In many countries, corruption is not a deviant behaviour but the norm, generally practised by actors; hence corruption is an informal institution. Despite this, a consensual definition of corruption is nowhere in sight. One way of approaching corruption might be to study forms of corruption. A form or variant often mentioned is corruption networks, or clientelism. In this paper, clientelism is analysed in order to proceed further towards an understanding of corruption. With this perspective, corruption is not seen as a deviant behaviour but the social embeddedness of…
Taking historical embeddedness seriously : Three historical approaches to advance strategy process and practice research
2016
International audience; Despite the proliferation of strategy process and practice research, we lack understanding of the historical embeddedness of strategic processes and practices. In this paper, we present three historical approaches with the potential to remedy this deficiency. First, realist history can contribute to a better understanding of the historical embeddedness of strategic processes; in particular, comparative historical analysis can explicate the historical conditions, mechanisms, and causality in strategic processes. Second, interpretative history can add to our knowledge of the historical embeddedness of strategic practices, and microhistory can specifically help to under…
A grid representation for distributed virtual environments
2004
Fast Internet connections and the widespread use of high performance graphic cards are making Distributed Virtual Environments (DVE) very common nowadays. The architecture and behavior of these systems are very similar to new grid computing applications where concepts such as sharing and high scalability are extremely exploited. However, there are several key issues in these systems that should still be improved in order to design a scalable and cost-effective DVE system. One of these key issues is the partitioning problem. This problem consists of efficiently assigning clients (3-D avatars) to the arbiters (servers) in the system. As an alternative to the ad-hoc heuristic proposed in the l…