Search results for "InGaN"

showing 10 items of 1214 documents

Restoration and Enhancement of Historical Stereo Photos Through Optical Flow

2021

Restoration of digital visual media acquired from repositories of historical photographic and cinematographic material is of key importance for the preservation, study and transmission of the legacy of past cultures to the coming generations. In this paper, a fully automatic approach to the digital restoration of historical stereo photographs is proposed. The approach exploits the content redundancy in stereo pairs for detecting and fixing scratches, dust, dirt spots and many other defects in the original images, as well as improving contrast and illumination. This is done by estimating the optical flow between the images, and using it to register one view onto the other both geometrically …

Computer sciencemedia_common.quotation_subjectNoise reductionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical flow02 engineering and technologyConsistency (database systems)Image restoration0202 electrical engineering electronic engineering information engineeringRedundancy (engineering)Contrast (vision)Computer visionImage restorationmedia_commonSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - Informaticabusiness.industryOptical flow021001 nanoscience & nanotechnologySensor fusionStereo matchingTransmission (telecommunications)Image denoisingImage enhancementGradient filtering020201 artificial intelligence & image processingArtificial intelligence0210 nano-technologybusiness
researchProduct

Artificial mosaics

2005

Art often provides valuable insight that can be applied to technological innovations, especially in the fields of image processing and computer graphics. In this paper we present a method to transform a raster input image into a good-quality mosaic: an “artificial mosaic.” The creation of mosaics of artistic quality is challenging because the tiles that compose a mosaic, typically small polygons, must be packed tightly and yet must follow and emphasize orientations chosen by the artist. The proposed method can reproduce the colors of the original image and emphasize relevant boundaries by placing tiles along edge directions. No user intervention is needed to detect the boundaries: they are …

Computer sciencemedia_common.quotation_subjectmosaic; non-photorealistic rendering; enhancementComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONMosaic Non photorealistic rendering Distance transform Image processing and enhancementAlong edgeImage processingMosaic (geodemography)computer.file_formatComputer Graphics and Computer-Aided Designnon-photorealistic renderingImage (mathematics)Computer graphicsSimple (abstract algebra)Computer graphics (images)Quality (business)mosaicComputer Vision and Pattern RecognitionRaster graphicsenhancementcomputerSoftwareComputingMethodologies_COMPUTERGRAPHICSmedia_commonThe Visual Computer
researchProduct

Visualization1.mov

2019

movie of the recorded set of single shot slightly off-axis holograms

ComputerApplications_MISCELLANEOUSComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComputingMilieux_MISCELLANEOUSComputingMethodologies_COMPUTERGRAPHICS
researchProduct

Visualization1.mov

2019

movie of the recorded set of single shot slightly off-axis holograms

ComputerApplications_MISCELLANEOUSComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComputingMilieux_MISCELLANEOUSComputingMethodologies_COMPUTERGRAPHICS
researchProduct

How Vulnerable is the Reaction Time Concealed Information Test to Faking?

2021

The reaction time-based Concealed Information Test (RT-CIT) can be used to detect information a suspect wishes to conceal. While it is often argued that it is easily faked, empirical research on its vulnerability to faking is scarce. In three experiments, we tested whether receiving faking instructions enables guilty participants to fake an innocent test outcome in an RT-CIT. In Experiment 1, when not using a response deadline, we found the RT-CIT to be vulnerable to faking (d = 1.06). Experiment 2 showed that when using a response deadline, faking was ineffective (d = −0.25). Critically, Experiment 3 replicated these findings within one between-subject design, showing again a faking effect…

ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS05 social sciencesApplied psychologyVulnerabilityComputingMilieux_LEGALASPECTSOFCOMPUTING050109 social psychologyExperimental and Cognitive PsychologyOutcome (game theory)050105 experimental psychologyTest (assessment)ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSClinical PsychologyEmpirical researchComputingMilieux_COMPUTERSANDSOCIETY0501 psychology and cognitive sciencesSuspectPsychologyApplied PsychologyJournal of Applied Research in Memory and Cognition
researchProduct

Performance evaluation of robust header compression protocol for low data rate networks

2013

Masteroppgave i informasjons- og kommunikasjonsteknologi IKT590 2013 – Universitetet i Agder, Grimstad Mobile Ad hoc networks (MANETs) have limited capacity due to properties of the physical medium for tactical operations. Several traffic types are typical for tactical applications, i.e. transmit frequent short IP packets (e.g., VoIP and friendly force tracking message). The RTP, TCP/UDP and IP headers comprise a significant overhead for these traffic types. Therefore, robust header compression (ROHC) protocol can useful to save the bandwidth for such applications. This thesis work is divided into two tasks. First one is the technological background of the robust header compression (ROHC) p…

ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORY
researchProduct

An optimal energy efficient cooperative retransmission MAC scheme in wireless networks

2011

Accepted version of a paper in the book: 2011 2nd Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE). Published version available from the IEEE: http://dx.doi.org/10.1109/WIRELESSVITAE.2011.5940871 While the benefits of cooperative diversity have been well studied in the literature, cooperative MAC protocol design has also attracted much attention recently. In the single-relay Cooperative Automatic Repeat reQuest (C-ARQ) protocol, the best relay node is selected in a distributed manner by relays using different backoff time before packet retransmission. However, this relay selection scheme does not work efficiently…

ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSVDP::Technology: 500::Information and communication technology: 550::Telecommunication: 552Data_CODINGANDINFORMATIONTHEORY
researchProduct

Optical or Inertial? Evaluation of Two Motion Capture Systems for Studies of Dancing to Electronic Dance Music

2016

What type of motion capture system is best suited for studying dancing to electronic dance music? The paper discusses positive and negative sides of using camera-based and sensor-based motion tracking systems for group studies of dancers. This is exemplified through experiments with a Qualisys infrared motion capture system being used alongside a set of small inertial trackers from Axivity and regular video recordings. The conclusion is that it is possible to fine-tune an infrared tracking system to work satisfactory for group studies of complex body motion in a “club-like” environment. For ecological studies in a real club setting, however, inertial tracking is the most scalable and flexib…

ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION
researchProduct

Video from Would a robot trust you? Developmental robotics model of trust and theory of mind

2019

Short demonstrational video

ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION
researchProduct

Breast Ultra-Sound image segmentation: an optimization approach based on super-pixels and high-level descriptors

2015

International audience; Breast cancer is the second most common cancer and the leading cause of cancer death among women. Medical imaging has become an indispensable tool for its diagnosis and follow up. During the last decade, the medical community has promoted to incorporate Ultra-Sound (US) screening as part of the standard routine. The main reason for using US imaging is its capability to differentiate benign from malignant masses, when compared to other imaging techniques. The increasing usage of US imaging encourages the development of Computer Aided Diagnosis (CAD) systems applied to Breast Ultra-Sound (BUS) images. However accurate delineations of the lesions and structures of the b…

ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONCAD02 engineering and technology[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingBI-RADS lexiconOptimization based Segmentation030218 nuclear medicine & medical imaging03 medical and health sciences0302 clinical medicineBreast cancerCut0202 electrical engineering electronic engineering information engineeringMedical imagingMedicineComputer visionBreast ultrasound[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processingPixelmedicine.diagnostic_testbusiness.industryBreast Ultra-SoundGraph-CutsImage segmentationmedicine.disease3. Good healthComputingMethodologies_PATTERNRECOGNITIONComputer-aided diagnosis020201 artificial intelligence & image processingMachine-Learning based SegmentationArtificial intelligencebusiness[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing
researchProduct