Search results for "Software"

showing 10 items of 7396 documents

No-reference mesh visual quality assessment via ensemble of convolutional neural networks and compact multi-linear pooling

2020

Abstract Blind or No reference quality evaluation is a challenging issue since it is done without access to the original content. In this work, we propose a method based on deep learning for the mesh visual quality assessment without reference. For a given 3D model, we first compute its mesh saliency. Then, we extract views from the 3D mesh and the corresponding mesh saliency. After that, the views are split into small patches that are filtered using a saliency threshold. Only the salient patches are selected and used as input data. After that, three pre-trained deep convolutional neural networks are employed for feature learning: VGG, AlexNet, and ResNet. Each network is fine-tuned and pro…

business.industryComputer scienceDeep learningFeature vectorPoolingPattern recognition02 engineering and technology01 natural sciencesConvolutional neural networkResidual neural networkArtificial IntelligenceFeature (computer vision)0103 physical sciencesSignal Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligence010306 general physicsbusinessFeature learningSoftwarePattern Recognition
researchProduct

Design Space Exploration for a Custom VLIW Architecture: Direct Photo Printer Hardware Setting Using VEX Compiler

2008

Increasingly more computing power is demanded for contemporary applications such as multimedia, 3D visualization, and telecommunication. This paper presents a design space exploration (DSE) experience for an embedded VLIW processor that allows finding out the best architecture for given application. The proposed method has been implemented and tested using an image processing chain for direct photo printer. Our results show a considerable improvement in hardware cost and performance. After the best architecture is identified, we applied a technique to optimize the code in VEX system that uses ?inlining? function in order to reduce execution time.

business.industryComputer scienceDesign space explorationOptimizing compilerImage processingcomputer.software_genreSpace explorationVisualizationInstruction setComputer architectureVery long instruction wordEmbedded systemCompilerbusinesscomputerComputer hardware2008 IEEE International Conference on Signal Image Technology and Internet Based Systems
researchProduct

Defending Surveillance Sensor Networks Against Data-Injection Attacks Via Trusted Nodes

2018

By injecting false data through compromised sensors, an adversary can drive the probability of detection in a sensor network-based spatial field surveillance system to arbitrarily low values. As a countermeasure, a small subset of sensors may be secured. Leveraging the theory of Matched Subspace Detection, we propose and evaluate several detectors that add robustness to attacks when such trusted nodes are available. Our results reveal the performance-security tradeoff of these schemes and can be used to determine the number of trusted nodes required for a given performance target.

business.industryComputer scienceDetector020206 networking & telecommunications020207 software engineering02 engineering and technologyAdversaryRobustness (computer science)Injection attacks0202 electrical engineering electronic engineering information engineeringbusinessWireless sensor networkSubspace topologyComputer Science::Cryptography and SecurityComputer network
researchProduct

Fallzahlplanung in referenzkontrollierten Diagnosestudien

2002

Purpose: A tutorial illustration of a flexible approach to determine the sample size in reference-controlled diagnostic trials. Materials and Methods: Assuming the usual setting of a new diagnostic method to be compared with a reference method, the emphasis is on the sensitivity of the new method in comparison with the reference method, using a binary outcome (positive versus negative) for both methods. Based on the confidence interval of the sensitivity, a simple but flexible procedure for determining the sample size is described, which incorporates clinically interpretable information. The procedure is illustrated by the fictious planning of a trial to assess the diagnostic value of MRI v…

business.industryComputer scienceDiagnostic TrialMachine learningcomputer.software_genreOutcome (probability)Confidence intervalClinical trialSample size determinationRange (statistics)A priori and a posterioriRadiology Nuclear Medicine and imagingSensitivity (control systems)Artificial intelligencebusinesscomputerRöFo - Fortschritte auf dem Gebiet der Röntgenstrahlen und der bildgebenden Verfahren
researchProduct

Impact of Storage Acquisition Intervals on the Cost-Efficiency of the Private vs. Public Storage

2012

The volume of worldwide digital content has increased nine-fold within the last five years, and this immense growth is predicted to continue in foreseeable future reaching 8ZB already by 2015. Traditionally, in order to cope with the growing demand for storage capacity, organizations proactively built and managed their private storage facilities. Recently, with the proliferation of public cloud infrastructure offerings, many organizations, instead, welcomed the alternative of outsourcing their storage needs to the providers of public cloud storage services. The comparative cost-efficiency of these two alternatives depends on a number of factors, among which are e.g. the prices of the public…

business.industryComputer scienceDigital contentmedia_common.quotation_subjectcost modelCloud computingProvisioningEnvironmental economicsInformation repositoryComputer securitycomputer.software_genreOutsourcingstorage servicesService (economics)Converged storageacquisition intervalbusinessCloud storagecomputerverkkotallennusmedia_common2012 IEEE Fifth International Conference on Cloud Computing
researchProduct

Psychological Influence of Double-Bind Situations in Human-Agent Interaction

2007

This paper presents a new approach to integrate artificial intelligence in virtual environments. The system presented deals in a separated way the visualization and intelligence modules, applying in this last case a distributed approach (multi-agent systems) so that scalable applications may be built. Therefore, it is necessary to define agent architectures that allow agents to be integrated in the VW. Thus, a designer is abstracted from the peculiarities of interacting with a virtual environment. There is a first prototype of the framework using JADE as the supporting multi-agent systems platform.

business.industryComputer scienceDistributed computingMulti-agent systemJADE (programming language)Virtual realitycomputer.software_genreVisualizationData visualizationSoftware agentVirtual machineScalabilitybusinesscomputercomputer.programming_language2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'07)
researchProduct

Do we need metamodels AND ontologies for engineering platforms?

2006

In this paper we show how the joint use of metamodeling and ontologies allows to describe domain knowledge for a complex domain. Ontologies are used as stabilized descriptions of a business domain while metamodels allow a fine description of the domain (to be constructed in the initial phases of modeling). We propose to use an ontology for early categorization, i.e., as a "natural" complement of the formal system that is induced by the metamodel.

business.industryComputer scienceDomain modelcomputer.software_genreBusiness domainMetamodelingDomain (software engineering)Feature-oriented domain analysisUpper ontologyDomain engineeringIDEF5Data miningSoftware engineeringbusinesscomputerProceedings of the 2006 international workshop on Global integrated model management
researchProduct

The Application of Optimal Topic Sequence in Adaptive e-Learning Systems

2016

In an adaptive e-learning system an opportunity to choose a course topic sequence is given to ensure personalization. The topic sequence can be obtained from three sources: teacher-offered topic sequence that is based on teacher’s pedagogical experience; learner’s free choice that is based on indicated links between topics, and, finally, the optimal topic sequence acquisition method described in this article. The optimal topic sequence is based on previous learners’ experience. With the help of the optimal topic sequence method, data about previous learners’ course topic sequence and course results are obtained. After the data analysis the optimal topic sequence for the specific course is o…

business.industryComputer scienceE-learning (theory)ComputingMilieux_COMPUTERSANDEDUCATIONArtificial intelligencecomputer.software_genrebusinesscomputerNatural language processingSequence (medicine)Test (assessment)Personalization
researchProduct

A Pattern Recognition Approach for Peak Prediction of Electrical Consumption

2014

Predicting and mitigating demand peaks in electrical networks has become a prevalent research topic. Demand peaks pose a particular challenge to energy companies because these are difficult to foresee and require the net to support abnormally high consumption levels. In smart energy grids, time-differentiated pricing policies that increase the energy cost for the consumers during peak periods, and load balancing are examples of simple techniques for peak regulation. In this paper, we tackle the task of predicting power peaks prior to their actual occurrence in the context of a pilot Norwegian smart grid network.

business.industryComputer scienceEnergy costLoad balancing (electrical power)The InternetSmart grid networkData miningEnergy consumptionbusinesscomputer.software_genrecomputerReliability engineering
researchProduct

A real-time auto calibration technique for stereo camera

2020

Calibration of the internal and external parameters of a stereo vision camera is a well-known research problem in the computer vision. Usually, to get accurate 3D results the camera should be manua...

business.industryComputer scienceEpipolar geometryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONGeneral EngineeringComputer Science ApplicationsStereopsisComputer visionArtificial intelligenceFundamental matrix (computer vision)businessAuto calibrationStereo cameraSoftwareInternational Journal of Computer Aided Engineering and Technology
researchProduct