Search results for "methodologies"

showing 10 items of 2106 documents

Facial animation by reverse morphing on a sequence of real images: application to film and video production

2000

Research on facial animation is as vast as the many interests and needs that can be found in the general public, television or film production. For Mac Guff Ligne, a company specialized in the fabrication of special effects and computer generated images, the needs and the constraints on such a topic are very big. Morphing is often used in facial animation, and consists in mixing several expression models. As we will discover, the advantages in using morphing are numerous, but the animation workload remains long and time-consuming. Our goal is to propose a fast and reliable animation tool that is based on the same morphing technique with which the graphic artists are familiar. Our method is …

business.industryComputer scienceFacial motion captureComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONAnimationMotion captureGeneralLiterature_MISCELLANEOUSComputer graphics (images)Interactive skeleton-driven simulationSkeletal animationComputer visionArtificial intelligenceElectrical and Electronic EngineeringPhysically based animationbusinessComputer facial animationComputer animationComputingMethodologies_COMPUTERGRAPHICSAnnales Des Télécommunications
researchProduct

Features extraction on complex images

2005

The accessibility of inexpensive and powerful computers has allowed true digital holography to be used for industrial inspection using microscopy. This technique allows the capture of a complex image (i.e., one containing magnitude and phase), and the reconstruction of the phase and magnitude information. Digital holograms give a new dimension to texture analysis, since the topology information can be used as an additional way to extract features. This new technique can be used to extend previous work on the image segmentation of patterned wafers for defect detection. The paper presents a comparison between the features obtained using Gabor filtering on complex images under illumination and…

business.industryComputer scienceFeature extractionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONHolographyFilter (signal processing)Image segmentationIterative reconstructionlaw.inventionImage texturelawDigital holographic microscopyComputer visionArtificial intelligencebusinessDigital holographyFeature detection (computer vision)
researchProduct

Correlation-Based and Contextual Merit-Based Ensemble Feature Selection

2001

Recent research has proved the benefits of using an ensemble of diverse and accurate base classifiers for classification problems. In this paper the focus is on producing diverse ensembles with the aid of three feature selection heuristics based on two approaches: correlation and contextual merit -based ones. We have developed an algorithm and experimented with it to evaluate and compare the three feature selection heuristics on ten data sets from UCI Repository. On average, simple correlation-based ensemble has the superiority in accuracy. The contextual merit -based heuristics seem to include too many features in the initial ensembles and iterations were most successful with it.

business.industryComputer scienceFeature selectionMachine learningcomputer.software_genreBase (topology)CorrelationComputingMethodologies_PATTERNRECOGNITIONArtificial intelligenceHeuristicsbusinessFocus (optics)Simple correlationcomputer
researchProduct

Distance-based relevance feedback using a hybrid interactive genetic algorithm for image retrieval

2011

Content-based image retrieval (CBIR) systems aim to provide a means to find pictures in large repositories without using any other information except the own content of the images, which is usually represented as a feature vector extracted from low-level descriptors. This paper describes a CBIR algorithm which combines relevance feedback, evolutionary computation concepts and distance-based learning in an attempt to reduce the existing gap between the high level semantic content of the images and the information provided by their low-level descriptors. In particular, a framework which is independent from the particular features used is presented. The effect of different crossover strategies…

business.industryComputer scienceFeature vectorCrossoverComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONRelevance feedbackInteractive evolutionary computationPattern recognitionEvolutionary computationGenetic algorithmVisual WordArtificial intelligencebusinessImage retrievalSoftwareApplied Soft Computing
researchProduct

Innovative modelling techniques in computer vision

1996

Abstract The paper is concerned with two of main research activities currently carried on at the Computer Science and Artificial Intelligence lab of DIE. The first part deals with hybrid artificial vision models, intended to provide object recognition and classification capabilities to an autonomous intelligen system. In this framework, a system recovering 3-D shape information from grey-level images of a scene, building a geometric representation of the scene in terms of superquadrics at the geometric level, and reasoning about the scene at the symbolic level is described. In the second part, attention is focused on automatic indexing of image databases. JACOB, a prototypal system allowing…

business.industryComputer scienceGeometric representationComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONCognitive neuroscience of visual object recognitionAstronomy and AstrophysicsImage (mathematics)Artificial visionSalientAutomatic indexingSuperquadricsComputer visionArtificial intelligencebusiness
researchProduct

Randomized Hough Transform for Ellipse Detection with Result Clustering

2005

Our research is focused on the development of robust machine vision algorithms for pattern recognition. We want to provide robotic systems the ability to understand more on the external real world. In this paper, we describe a method for detecting ellipses in real world images using the randomized Hough transform with result clustering. A preprocessing phase is used in which real world images are transformed - noise reduction, greyscale transform, edge detection and final binarization - in order to be processed by the actual ellipse detector. The ellipse detector filters out false ellipses that may interfere with the final results. Due to the fact that usually more "virtual" ellipses are de…

business.industryComputer scienceMachine visionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPattern recognitionEllipseGrayscaleEdge detectionHough transformlaw.inventionRandomized Hough transformlawPattern recognition (psychology)Artificial intelligencebusinessCluster analysisEUROCON 2005 - The International Conference on "Computer as a Tool"
researchProduct

Introducing the Concept of Hyperactivity in Multi Agent Systems

2013

International audience; Software Agents are no longer the simple communication gateways for devices to interconnect using one or more networks. With Multi Agent Systems contributing in a wide spectrum of intelligent systems, the Agents are in a more proactive role than just being responsible for passing messages between their respective base systems. Agent Relation Charts and the Hyperactive Transaction Model in general is one of the recent attempts of developing a multi-view design model for Multi Agent Systems. The model has made a clear distinction in the regular and intelligent activities of an agent. Based on these differences, the agents are classified into three main categories named…

business.industryComputer scienceMulti-agent systemAutonomous agentIntelligent decision support system020207 software engineering02 engineering and technologycomputer.software_genreComputingMethodologies_ARTIFICIALINTELLIGENCEAgent-based social simulationIntelligent agent[INFO.INFO-TI] Computer Science [cs]/Image Processing [eess.IV]Belief–desire–intention software modelSoftware agentHuman–computer interaction[INFO.INFO-TI]Computer Science [cs]/Image Processing [eess.IV][ INFO.INFO-TI ] Computer Science [cs]/Image Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingArtificial intelligencebusinessAgent architecturecomputer
researchProduct

Energy Efficient Optimization for Solar-Powered UAV Communications System

2021

In this work, we explore the energy efficiency optimization for a solar-powered unmanned aerial vehicle (UAV) communications system. We consider a scenario where a number of ground users (GUs) connect with a solar-powered multi-antenna UAV over a wireless link. First, we are able to derive the relations between the uplink data rate and heading angle of UAV and transmission power of GUs. In addition, the harvested energy from solar light is also affected by UAV’s angle. Accordingly, with the objective to maximize the energy efficiency that is related to uplink data rate and energy consumption, we propose to dynamically adjust the UAV trajectory and gesture, by optimizing its velocity, accele…

business.industryComputer scienceReal-time computingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONComputerApplications_COMPUTERSINOTHERSYSTEMSEnergy consumptionCommunications systemComputer Science::Multiagent SystemsComputer Science::RoboticsTransmission (telecommunications)Computer Science::Systems and ControlTelecommunications linkTrajectoryWirelessComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinessEnergy (signal processing)Efficient energy use2021 IEEE International Conference on Communications Workshops (ICC Workshops)
researchProduct

The methodology for active testing of electronic devices under the radiations

2018

The methodology, developed for active testing of electronic devices under the radiations, is presented. The test set-up includes a gamma-ray facility, the hardware board/fixtures and the software tools purposely designed and realized. The methodology is so wide-ranging to allow us the verification of different classes of electronic devices, even if only application examples for static random access memory modules are reported.

business.industryComputer scienceSettore ING-IND/20 - Misure E Strumentazione NucleariTesting methodologies Electronic Devices Total Ionizing Dose Single Event Effects Gamma rays.Electrical engineeringelectronic devicetotal ionizing dosesingle event effectNuclear Energy and Engineeringtesting methodologygamma raylcsh:QC770-798lcsh:Nuclear and particle physics. Atomic energy. RadioactivityElectronicsSafety Risk Reliability and QualitybusinessNuclear Technology and Radiation Protection
researchProduct

Evaluating Classifiers for Mobile-Masquerader Detection

2006

As a result of the impersonation of a user of a mobile terminal, sensitive information kept locally or accessible over the network can be abused. The means of masquerader detection are therefore needed to detect the cases of impersonation. In this paper, the problem of mobile-masquerader detection is considered as a problem of classifying the user behaviour as originating from the legitimate user or someone else. Different behavioural characteristics are analysed by designated one-class classifiers whose classifications are combined. The paper focuses on selecting the classifiers for mobile-masquerader detection. The selection process is conducted in two phases. First, the classification ac…

business.industryComputer scienceSmall numberLinear classifierPattern recognitionMachine learningcomputer.software_genreRandom subspace methodInformation sensitivityComputingMethodologies_PATTERNRECOGNITIONArtificial intelligencebusinesscomputerClassifier (UML)
researchProduct