Search results for "methodologies"

showing 10 items of 2106 documents

Augmented Mirror: Interactive Augmented Reality System Based on Kinect

2011

Part 1: Long and Short Papers; International audience; In this paper we present a virtual character controlled by an actor in real time, who talks with an audience through an augmented mirror. The application, which integrates video images, the avatar and other virtual objects within an Augmented Reality system, has been implemented using a mixture of technologies: two kinect systems for motion capture, depth map and real images, a gyroscope to detect head movements, and control algorithms to manage avatar emotions.

Augmented Realitybusiness.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION020207 software engineering02 engineering and technologyVirtual CharactersComputer-mediated realityReal imageMotion captureMixed realityDepth mapMotion CaptureComputer graphics (images)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionAugmented reality[INFO]Computer Science [cs]Artificial intelligencebusiness
researchProduct

A Comparative Study on Fuzzy-Clustering-Based Lip Region Segmentation Methods

2011

As the first step of many lip-reading or visual speaker authentication systems, lip region segmentation is of vital importance. And fuzzy clustering based methods have been widely used in lip segmentation. In this paper, four fuzzy clustering based lip segmentation methods have been elaborated with their underlying rationale. Experiments have been carried out evaluate their performance comparatively. From the experimental results, SFCM has the best efficiency and FCMST has the best segmentation accuracy.

AuthenticationFuzzy clusteringComputer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONPattern recognitionstomatognathic diseasesComputingMethodologies_PATTERNRECOGNITIONstomatognathic systemSegmentationArtificial intelligencebusinessSpatial analysisTemporal information
researchProduct

Optical security and encryption with totally incoherent light

2001

We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.

AuthenticationHigh securitybusiness.industryComputer scienceMultispectral imageComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical securityEncryptionAtomic and Molecular Physics and OpticsOptical encryptionDiffractive lensOpticsComputer Science::MultimediabusinessOptical processorComputer Science::DatabasesComputer Science::Cryptography and SecurityOptics Letters
researchProduct

Sequential Lip Region Segmentation Using Fuzzy Clustering with Spatial and Temporal Information

2012

For many visual speech recognition and visual speaker authentication systems, lip region extraction is of vital important. In order to segment the lip region accurately and robustly from a lip sequence, a new fuzzy-clustering based algorithm is proposed. In the proposed method, a new dissimilarity measure is introduced to take all the color, spatial and temporal information into consideration. An iterative optimization method is employed to derive the optimal lip region membership map and the final segmentation result. From the experimental results, it is observed that the proposed algorithm can provide superior results compared with other traditional methods.

AuthenticationSequenceFuzzy clusteringComputer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONScale-space segmentationPattern recognitionMeasure (mathematics)ComputingMethodologies_PATTERNRECOGNITIONSegmentationArtificial intelligencebusinessTemporal information
researchProduct

Automation of Optimized Gabor Filter Parameter Selection for Road Cracks Detection

2016

International audience; Automated systems for road crack detection are extremely important in road maintenance for vehicle safety and traveler's comfort. Emerging cracks in roads need to be detected and accordingly repaired as early as possible to avoid further damage thus reducing rehabilitation cost. In this paper, a robust method for Gabor filter parameters optimization for automatic road crack detection is discussed. Gabor filter has been used in previous literature for similar applications. However, there is a need for automatic selection of optimized Gabor filter parameters due to variation in texture of roads and cracks. The problem of change of background, which in fact is road text…

Automated detectionGenetic Algorithm[ INFO ] Computer Science [cs]:Pavement Cracks[INFO]Computer Science [cs]ComputingMethodologies_GENERAL[INFO] Computer Science [cs]Gabor FiltersParameter Selection
researchProduct

LogDet divergence-based metric learning with triplet constraints and its applications.

2014

How to select and weigh features has always been a difficult problem in many image processing and pattern recognition applications. A data-dependent distance measure can address this problem to a certain extent, and therefore an accurate and efficient metric learning becomes necessary. In this paper, we propose a LogDet divergence-based metric learning with triplet constraints (LDMLT) approach, which can learn Mahalanobis distance metric accurately and efficiently. First of all, we demonstrate the good properties of triplet constraints and apply it in LogDet divergence-based metric learning model. Then, to deal with high-dimensional data, we apply a compressed representation method to learn…

AutomatedData InterpretationBiometryFeature extractionhigh dimensional datametric learningPattern RecognitionFacial recognition systemSensitivity and SpecificityMatrix decompositionPattern Recognition Automatedcompressed representationComputer-AssistedArtificial Intelligencecompressed representation; high dimensional data; LogDet divergence; metric learning; triplet constraint; Artificial Intelligence; Biometry; Data Interpretation Statistical; Face; Humans; Image Enhancement; Image Interpretation Computer-Assisted; Pattern Recognition Automated; Photography; Reproducibility of Results; Sensitivity and Specificity; Algorithms; Facial Expression; Software; Medicine (all); Computer Graphics and Computer-Aided DesignImage Interpretation Computer-AssistedPhotographyHumansDivergence (statistics)Image retrievalImage InterpretationMathematicsMahalanobis distancebusiness.industryLogDet divergenceMedicine (all)Reproducibility of ResultsPattern recognitionStatisticalImage EnhancementComputer Graphics and Computer-Aided DesignFacial ExpressionComputingMethodologies_PATTERNRECOGNITIONComputer Science::Computer Vision and Pattern RecognitionData Interpretation StatisticalFaceMetric (mathematics)Pattern recognition (psychology)Artificial intelligencetriplet constraintbusinessSoftwareAlgorithmsIEEE transactions on image processing : a publication of the IEEE Signal Processing Society
researchProduct

Automatic subgenre classification of heavy metal music

2011

Automatic genre classification of music has been of interest for researchers over a decade. Many success-ful methods and machine learning algorithms have been developed achieving reasonably good results. This thesis explores automatic sub-genre classification problem of one of the most popular meta-genres, heavy metal. To the best of my knowledge this is the first attempt to study the issue. Besides attempting automatic classification, the thesis investigates sub-genre taxonomy of heavy metal music, highlighting the historical origins and the most prominent musical features of its sub-genres. For classification, an algorithm proposed in (Barbedo & Lopes, 2007) was modified and implemented i…

Automatic genre classificationComputingMethodologies_PATTERNRECOGNITIONheavy rockmusiikkigenretheavy metalsubgenreluokitukset
researchProduct

Prey-predator strategies in a multiagent system

2006

This paper describes the prey-predator multiagent system which can be considered as an abstraction of more complex real-world models. Both the prey and the predators are considered as autonomous agents with their own behaviors and perception of the environment. In particular, we propose a simulator which lets study different strategies such as cooperation and individualism. An extensive experiment has been carried out in order to prove the effectiveness of the latter.

Autonomous agentLarge scale systemSettore INF/01 - InformaticaComputer sciencebusiness.industrymedia_common.quotation_subjectMulti-agent systemAutonomous agentReal-world systemcomputer.software_genreComputingMethodologies_ARTIFICIALINTELLIGENCEAgent-based social simulationPredationIntelligent agentPerceptionPrey-predator strategiePrey predatorArtificial intelligencebusinesscomputerMulti agent systemsmedia_commonAbstraction (linguistics)
researchProduct

High temperature solid-catalized transesterification for biodiesel production

2010

Biodiesel has become more attractive recently because of its environmental benefits and the fact that it is made from renewable resources. Biodiesel is a mixture of monoalkyl esters of long chain fatty acids derived from renewable feed stock like vegetable oils and animal fats, mainly made of fatty acid glycerides. It is produced by transesterification processes in which oil or fat are reacted with a monohydric alcohol in the presence of a catalyst. The transesterification process is affected by reaction conditions, alcohol to oil molar ratio, type of alcohol, type and amount of catalysts, temperature and purity of reactants. Heterogeneous acid catalysts are quite efficient in promoting the…

BIODIESELsolid-catalized transesterificationlcsh:Computer engineering. Computer hardwareSettore ING-IND/25 - Impianti ChimiciComputingMethodologies_DOCUMENTANDTEXTPROCESSINGlcsh:TP155-156lcsh:TK7885-7895lcsh:Chemical engineeringComputingMilieux_MISCELLANEOUSbiodiesel transesterificationComputingMethodologies_COMPUTERGRAPHICS
researchProduct

Background subtraction for aerial surveillance conditions

2014

International audience; The first step in a surveillance system is to create a representation of the environment. Background subtraction is widely used algorithm to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monitoring. Set up a background model on moving platforms (intelligent cars, UAVs, etc.) is a challenging task due camera motion when images are acquired. In this paper, we propose a method to support instabilities caused by aerial images fusing spatial and temporal information about image motion. We used frame difference as first approximation, then age of pixels is …

Background subtractionPixelbusiness.industryComputer science[SPI] Engineering Sciences [physics]ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONMotion (physics)Image (mathematics)[SPI]Engineering Sciences [physics]Motion estimationOutlierComputer visionArtificial intelligencebusinessRepresentation (mathematics)Aerial imageComputingMilieux_MISCELLANEOUS
researchProduct