Search results for "image processing"

showing 10 items of 3285 documents

Identification of a β-Dystroglycan Immunoreactive Subcompartment in Photoreceptor Terminals

2005

PURPOSE Mutations in the dystrophin-associated glycoprotein complex (DGC) cause various forms of muscular dystrophy. These diseases are characterized by progressive loss of skeletal muscle tissue and by dysfunctions in the central nervous system (CNS). The CNS deficits include an altered electroretinogram, caused by an impaired synaptic transmission between photoreceptors and their postsynaptic target cells in the outer plexiform layer (OPL). The DGC is concentrated in the OPL but its exact distribution is controversial. Therefore, the precise distribution of beta-dystroglycan, the central component of the DGC, within the OPL of the mature chick retina, was determined. METHODS Double immuno…

Retinal Bipolar Cellsgenetic structuresPresynaptic TerminalsOuter plexiform layerNerve Tissue ProteinsRetinal Horizontal CellsNeurotransmissionRibbon synapseImaging Three-DimensionalGlycoprotein complexImage Processing Computer-AssistedmedicineDystroglycanAnimalsActive zoneDystroglycansFluorescent Antibody Technique IndirectSynaptic ribbonRetinabiologyAnatomyCell CompartmentationCell biologyMicroscopy Electronmedicine.anatomical_structureMicroscopy Fluorescencebiology.proteinsense organsChickensPhotoreceptor Cells VertebrateInvestigative Opthalmology & Visual Science
researchProduct

Exudate Segmentation on Retinal Atlas Space

2013

International audience; Diabetic macular edema is characterized by hard exudates. Presence of such exudates cause vision loss in the affected areas. We present a novel approach of segmenting exudates for screening and follow-ups by building an ethnicity based statistical atlas. The chromatic distribution in such an atlas gives a good measure of probability of the pixels belonging to the healthy retinal pigments or to the abnormalities (like lesions, imaging artifacts etc.) in the retinal fundus image. Post-processing schemes are introduced in this paper for the enhancement of the edges of such exudates for final segmentation and to separate lesion from false positives. A sensitivity(recall)…

Retinal atlas02 engineering and technologyEdge detection03 medical and health scienceschemistry.chemical_compound0302 clinical medicine[ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineeringFalse positive paradoxMedicineSegmentationComputer visionChromatic scaleRiesz transformPixelbusiness.industryAtlas (topology)RetinalImage segmentation[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV]chemistry[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV]Exudate segmentation020201 artificial intelligence & image processingArtificial intelligencebusiness030217 neurology & neurosurgery
researchProduct

On the Robustness of Deep Features for Audio Event Classification in Adverse Environments

2018

Deep features, responses to complex input patterns learned within deep neural networks, have recently shown great performance in image recognition tasks, motivating their use for audio analysis tasks as well. These features provide multiple levels of abstraction which permit to select a sufficiently generalized layer to identify classes not seen during training. The generalization capability of such features is very useful due to the lack of complete labeled audio datasets. However, as opposed to classical hand-crafted features such as Mel-frequency cepstral coefficients (MFCCs), the performance impact of having an acoustically adverse environment has not been evaluated in detail. In this p…

ReverberationNoise measurementComputer scienceSpeech recognitionFeature extraction02 engineering and technologyConvolutional neural network030507 speech-language pathology & audiology03 medical and health sciencesRaw audio formatRobustness (computer science)Audio analyzer0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMel-frequency cepstrum0305 other medical science2018 14th IEEE International Conference on Signal Processing (ICSP)
researchProduct

ISAdetect

2020

Static and dynamic binary analysis techniques are actively used to reverse engineer software's behavior and to detect its vulnerabilities, even when only the binary code is available for analysis. To avoid analysis errors due to misreading op-codes for a wrong CPU architecture, these analysis tools must precisely identify the Instruction Set Architecture (ISA) of the object code under analysis. The variety of CPU architectures that modern security and reverse engineering tools must support is ever increasing due to massive proliferation of IoT devices and the diversity of firmware and malware targeting those devices. Recent studies concluded that falsely identifying the binary code's ISA ca…

Reverse engineeringprosessoritComputer scienceFirmware02 engineering and technologycomputer.file_formatcomputer.software_genrehaittaohjelmatInstruction setObject codeComputer engineering020204 information systemsEndianness0202 electrical engineering electronic engineering information engineeringMalwareesineiden internet020201 artificial intelligence & image processingBinary codeExecutabletietoturvacomputerProceedings of the Tenth ACM Conference on Data and Application Security and Privacy
researchProduct

Structural and Dynamical Complexities of Risk and Catastrophe Systems: an Approach by System Dynamics Modelling

2009

Risk and catastrophe are complex systems. Within the scope of this paper, we focus our attention on structural and dynamic complexities of catastrophes and on the possibility of modelling and simulating its double complexity with a formal and methodological framework: the General Systems Theory and System Dynamics modelling. Then we briefly propose a model of urban catastrophe related to a flood. After we propose some ways of research allowing exceeding the limits related to the modelling.

Risk analysisGeneral Systems TheoryScope (project management)Management scienceComputer science[SHS.GEO] Humanities and Social Sciences/Geography05 social sciencesComplex system[SHS.GEO]Humanities and Social Sciences/GeographyComplexity02 engineering and technologyDynamic modelling[ SHS.GEO ] Humanities and Social Sciences/GeographySystem dynamicsSystems theoryRisk analysis. Catastrophe050501 criminology0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingDynamic modelling0505 law
researchProduct

Assessing supply chain risks in the automotive industry through a modified MCDM-based FMECA

2020

Supply chains are complex networks that receive assiduous attention in the literature. Like any complex network, a supply chain is subject to a wide variety of risks that can result in significant economic losses and negative impacts in terms of image and prestige for companies. In circumstances of aggressive competition among companies, effective management of supply chain risks (SCRs) is crucial, and is currently a very active field of research. Failure Mode, Effects and Criticality Analysis (FMECA) has been recently extended to SCR identification and prioritization, aiming at reducing potential losses caused by lack of risk control. This article has a twofold objective. First, SCR assess…

Risk analysisSupply chain risk managementcriticality and risk analysisComputer scienceAHPSupply chain09.- Desarrollar infraestructuras resilientes promover la industrialización inclusiva y sostenible y fomentar la innovaciónAutomotive industryAnalytic hierarchy processBioengineeringcriticality and risk analysi02 engineering and technologylcsh:Chemical technologySystems engineeringlcsh:Chemistry0502 economics and businessSettore ING-IND/17 - Impianti Industriali Meccanici0202 electrical engineering electronic engineering information engineeringChemical Engineering (miscellaneous)lcsh:TP1-1185systems engineeringbusiness.industryProcess Chemistry and Technology05 social sciencesCriticality and risk analysisFuzzy DEMATELSupply chainMultiple-criteria decision analysis12.- Garantizar las pautas de consumo y de producción sosteniblesFailure mode effects and criticality analysislcsh:QD1-999Risk analysis (engineering)020201 artificial intelligence & image processingMATEMATICA APLICADAbusinessFailure mode and effects analysis050203 business & managementFMECA
researchProduct

A Risk Scenario for Small Businesses in Hurricane Sandy Type Disasters

2017

Risk scenario060106 history of social sciencesbusiness.industryComputer scienceEnvironmental resource management0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing0601 history and archaeologyCross impact analysis06 humanities and the arts02 engineering and technologyBusiness continuity planningbusinessProceedings of the 50th Hawaii International Conference on System Sciences (2017)
researchProduct

Analysis of the Relationship between Energy Absorbing Components and Vehicle Crash Response

2016

Risk0209 industrial biotechnologyComputer science02 engineering and technologyPollutionAutomotive engineeringIndustrial and Manufacturing EngineeringAutomotive Engineering; Safety Risk Reliability and Quality; Pollution; Industrial and Manufacturing Engineering020901 industrial engineering & automationEnergy absorbingReliability and QualityAutomotive Engineering0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSafetyMotor vehicle crash
researchProduct

A vision-based fully automated approach to robust image cropping detection

2020

Abstract The definition of valid and robust methodologies for assessing the authenticity of digital information is nowadays critical to contrast social manipulation through the media. A key research topic in multimedia forensics is the development of methods for detecting tampered content in large image collections without any human intervention. This paper introduces AMARCORD (Automatic Manhattan-scene AsymmetRically CrOpped imageRy Detector), a fully automated detector for exposing evidences of asymmetrical image cropping on Manhattan-World scenes. The proposed solution estimates and exploits the camera principal point, i.e., a physical feature extracted directly from the image content th…

Robust computer visionExploitComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONRobust statisticsImage processing02 engineering and technologyCropping detectionMultimedia forensicRobustness (computer science)0202 electrical engineering electronic engineering information engineeringMultimedia Forensics Robust Computer Vision Cropping Detection Image Content AnalysisComputer visionElectrical and Electronic EngineeringSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSettore INF/01 - InformaticaVision basedbusiness.industryDetectorImage content analysi020206 networking & telecommunicationsFully automatedSignal Processing020201 artificial intelligence & image processingComputer Vision and Pattern RecognitionArtificial intelligencebusinessCroppingSoftwareSignal Processing: Image Communication
researchProduct

Future directions in Agile research: Alignment and divergence between research and practice

2017

Editorial article Since the publication of Agile Manifesto in 2001, agile methods have transited from a grass- root initiative among enthusiastic advocates and developers to a mainstream software development approach adopted by both small and large companies worldwide. Meanwhile research on agile methods has grown rapidly and steadily into an established research area, evidenced by dedicated conferences (e.g., XP conference series, research track of previous Agile Conference series), special issues and sections in top Information Systems and Software Engineering journals. However, practitioners and consultants have largely driven the advancement in agile field, and agile research has lagged…

Root (linguistics)EngineeringDivergence (linguistics)business.industrySoftware development020207 software engineering02 engineering and technologyField (computer science)Agile manifesto0202 electrical engineering electronic engineering information engineeringInformation systemMainstream020201 artificial intelligence & image processingEngineering ethicsbusinessSoftwareAgile software developmentJournal of Software: Evolution and Process
researchProduct