Search results for "Vector"

showing 10 items of 2660 documents

The zitterbewegung interpretation of quantum mechanics as theoretical framework for ultra-dense deuterium and low energy nuclear reactions

2017

This paper introduces a Zitterbewegung model of the electron by applying the principle of Occam's razor to the Maxwell's equations and by introducing a scalar component in the electromagnetic field. The aim is to explain, by using simple and intuitive concepts, the origin of the electric charge and the electromagnetic nature of mass and inertia. The Zitterbewegung model of the electron is also proposed as the best suited theoretical framework to study the structure of Ultra-Dense Deuterium (UDD), the origin of anomalous heat in metal-hydrogen systems and the possibility of existence of "super-chemical" aggregates at Compton scale.

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniAtomic and Molecular Physics and OpticSettore FIS/02 - Fisica Teorica Modelli E Metodi MatematiciMaxwell's equationZitterbewegungWeyl equationSettore ING-IND/32 - Convertitori Macchine E Azionamenti ElettriciCondensed Matter PhysicsElectric chargeElementary particleVector potentialElectron structureLENRNuclear Energy and EngineeringSpace-time algebra (STA)Ultra-dense deuteriumClifford algebra; Compton scale aggregates; Dirac equation; Electric charge; Electron structure; Elementary particles; LENR; Lorenz gauge; Maxwell's equations; Occam's razor; Space-time algebra (STA); Ultra-dense deuterium; Vector potential; Weyl equation; Zitterbewegung; Atomic and Molecular Physics and Optics; Nuclear and High Energy Physics; Nuclear Energy and Engineering; Condensed Matter PhysicsDirac equationClifford algebraCompton scale aggregateOccam's razorLorenz gaugeNuclear and High Energy Physic
researchProduct

Copy–Move Forgery Detection by Matching Triangles of Keypoints

2015

Copy-move forgery is one of the most common types of tampering for digital images. Detection methods generally use block-matching approaches, which first divide the image into overlapping blocks and then extract and compare features to find similar ones, or point-based approaches, in which relevant keypoints are extracted and matched to each other to find similar areas. In this paper, we present a very novel hybrid approach, which compares triangles rather than blocks, or single points. Interest points are extracted from the image, and objects are modeled as a set of connected triangles built onto these points. Triangles are matched according to their shapes (inner angles), their content (c…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer Networks and CommunicationsComputer scienceDelaunay triangulationbusiness.industryFeature vectorSURFFeature extractionScale-invariant feature transformPattern recognitionDelaunay TriangulationDigital Image ForensicVisualizationVertex (geometry)Copy-move ForgeryDigital imageComputer Networks and CommunicationHarriSIFTComputer visionArtificial intelligenceSafety Risk Reliability and QualitybusinessCopy-move Forgery; Delaunay Triangulation; Digital Image Forensics; Harris; SIFT; SURF; Computer Networks and Communications; Safety Risk Reliability and QualityTransformation geometryIEEE Transactions on Information Forensics and Security
researchProduct

Achieving Robustness through Caching and Retransmissions in IEEE 802.15.4-based WSNs

2007

This paper proposes a network-layer protocol for wireless sensor networks based on the IEEE 802.15.4 standard. Our protocol is devised to provide reliable data gathering in latency-constrained applications, and exploits both the flexibility of the IEEE 802.15.4 MAC layer and features of data aggregation techniques, such as implicit acknowledgment of reception. The proposed protocol acts as a routing module and a control entity for the MAC layer and provides reliable communication, while managing power saving and synchronizertion among nodes. Without relying on MAC-layer acknowledgments, the protocol implements caching and network-layer retransmissions, triggered upon detection of a link fai…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniComputer scienceInter-Access Point Protocolbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSEnergy consumptionNetwork allocation vectorWireless sensor networksIEEE 802.1QLogical link controlbusinessWireless sensor networkIEEE 802.15IEEE 802.11r-2008Computer networkIEEE 802.11s2007 16th International Conference on Computer Communications and Networks
researchProduct

A Novel Time Series Kernel for Sequences Generated by LTI Systems

2017

The recent introduction of Hankelets to describe time series relies on the assumption that the time series has been generated by a vector autoregressive model (VAR) of order p. The success of Hankelet-based time series representations prevalently in nearest neighbor classifiers poses questions about if and how this representation can be used in kernel machines without the usual adoption of mid-level representations (such as codebook-based representations). It is also of interest to investigate how this representation relates to probabilistic approaches for time series modeling, and which characteristics of the VAR model a Hankelet can capture. This paper aims at filling these gaps by: deriv…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniDynamic time warpingSeries (mathematics)SVMProbabilistic logic020207 software engineering02 engineering and technologyTime SerieClassificationVector autoregressionSupport vector machineKernelAutoregressive modelKernel (statistics)Similarity (psychology)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAlgorithmMathematics
researchProduct

User Activity Recognition via Kinect in an Ambient Intelligence Scenario

2014

The availability of an ever-increasing kind of cheap, unobtrusive, sensing devices has stressed the need for new approaches to merge raw measurements in order to realize what is happening in the monitored environment. Ambient Intelligence (AmI) techniques exploit information about the environment state to adapt the environment itself to the users’ preferences. Even if traditional sensors allow a rough understanding of the users’ preferences, ad-hoc sensors are required to obtain a deeper comprehension of users’ habits and activities. In this paper we propose a framework to recognize users’ activities via a depth and RGB camera device, namely the Microsoft Kinect. The proposed approach takes…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniEngineeringKinectAmbient intelligenceAmbient IntelligenceExploitbusiness.industryUser ProfilingActivity Recognitioncomputer.software_genreActivity recognitionSupport vector machineHuman–computer interactionData miningCluster analysisbusinessMerge (version control)computerIERI Procedia
researchProduct

Human Activity Recognition Process Using 3-D Posture Data

2015

In this paper, we present a method for recognizing human activities using information sensed by an RGB-D camera, namely the Microsoft Kinect. Our approach is based on the estimation of some relevant joints of the human body by means of the Kinect; three different machine learning techniques, i.e., K-means clustering, support vector machines, and hidden Markov models, are combined to detect the postures involved while performing an activity, to classify them, and to model each activity as a spatiotemporal evolution of known postures. Experiments were performed on Kinect Activity Recognition Dataset, a new dataset, and on CAD-60, a public dataset. Experimental results show that our solution o…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniImage fusionMarkov chainComputer Networks and CommunicationsComputer sciencebusiness.industryMaximum-entropy Markov modelFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONHuman Factors and ErgonomicsPattern recognitionComputer Science ApplicationsHuman-Computer InteractionActivity recognitionSupport vector machineHuman activity recognition kinect ambient intelligenceArtificial IntelligenceControl and Systems EngineeringSignal ProcessingComputer visionArtificial intelligenceCluster analysisHidden Markov modelbusinessIEEE Transactions on Human-Machine Systems
researchProduct

Super-resolution-based magnification of endothelium cells from biomicroscope videos of the cornea

2018

We present a practical, robust, and effective pipeline to compute a high-resolution (HR) image of the corneal endothelium starting from a low-resolution (LR) video sequence obtained with a general purpose slit lamp biomicroscope. An image quality typical of dedicated and more expensive confocal microscopes is achieved via software magnification by exploiting information redundancy in the video sequence. In particular, the HR image is generated from the best LR frames, obtained by identifying the most suitable endothelium video subsequence using a support vector machine-based learning approach, followed by a robust graph-based frame registration. Results on long, real sequences show that the…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniImage fusionSettore INF/01 - InformaticaImage qualityComputer sciencebusiness.industryFrame (networking)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage registrationMagnificationsuper-resolutionImage segmentationAtomic and Molecular Physics and Opticsslit lamp biomicroscope image enhancementComputer Science ApplicationsSupport vector machinecorneal endotheliumSoftwaremachine learningComputer visionimage mosaicingArtificial intelligenceElectrical and Electronic Engineeringbusiness
researchProduct

Springs-based Simulation for Image Retargeting

2011

In this paper an efficient method for image retargeting is pro- posed. It relies onto a mechanical model based on springs network. Each pixel displacement (compression or expan- sion) is given by the network response, according to the springs stiffness. The properties of the springs are deter- mined as function of the visual relevance of the pixels. Such model does not require any optimization, since its so- lution is obtained simply from a linear system of equations, allowing real-time application even for large images. The approach is fully automatic, though can be improved by interactively providing cues such as geometric constraints and/or manual relevant object labeling. The results pr…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniImage resizing Image retargeting simu- lation linear algebra visual saliencyPixelComputer sciencebusiness.industryStiffnessImage processingSystem of linear equationsDisplacement (vector)VisualizationSeam carvingmedicineComputer visionArtificial intelligencemedicine.symptombusiness
researchProduct

Bayesian Network Based Classification of Mammography Structured Reports

2013

In modern medical domain, documents are created directly in electronic form and stored on huge databases containing documents, text in integral form and images. Retrieving right informations from these servers is challenging and, sometimes, this is very time consuming. Current medical technology do not provide a smart methodology classification of such documents based on their content. In this work the radiological structured reports are analysed classified and assigning an appropriate label. The text classifier is used to label a mammographic structured report. The experimental data are real clinical report coming from a hospital server. Analysing the structured report content, the classif…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniInformation retrievalmedicine.diagnostic_testStructured support vector machineComputer scienceExperimental dataBayesian networkReport ClassificationBayes' theoremComputingMethodologies_PATTERNRECOGNITIONRobustness (computer science)ServerBayesian NetworkmedicineMammographyClassifier (UML)Mammography
researchProduct

A Multimodal People Recognition System for an Intelligent Environment

2011

In this paper, a multimodal system for recognizing people in intelligent environments is presented. Users are identified and tracked by detecting and recognizing voices and faces through cameras and microphones spread around the environment. This multimodal approach has been chosen to develop a flexible and cheap though reliable system, implemented through consumer electronics. Voice features are extracted through a short time spectrum analysis, while face features are extracted using the eigenfaces technique. The recognition task is achieved through the use of some Support Vector Machines, one per modality, that learn and classify the features of each person, while bindings between modalit…

Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniModality (human–computer interaction)Intelligent EnviromentMultimodal Recognition SystemComputer sciencebusiness.industrySupport vector machineSoftwareEigenfaceMiddlewareLearning ruleIntelligent environmentComputer visionArtificial intelligencebusiness
researchProduct