We propose in this paper an object-based method for on-the-fly extraction of key frames summarizing the salient visual content of videos. This method is based on spatial segmentation of each frame in order to detect t...
详细信息
We propose in this paper an object-based method for on-the-fly extraction of key frames summarizing the salient visual content of videos. This method is based on spatial segmentation of each frame in order to detect the important ***, key frame detection is facing a much more semantic criterion so that each key frame presents an important event such as the appearance and the disappearance of relevant objects. Realized experiments on challenging videos demonstrate the efficiency of the proposed method, which is able to catch the semantic content of a video shot, while preventing redundancy of the extracted key frames and maintaining minimum requirements in terms of memory space.
A study on the use of two different distance measures,Euclidean distance and divergence distance,for FCM is conducted for an image classification problem in this *** FCM algorithm which uses Euclidean distance measure...
详细信息
A study on the use of two different distance measures,Euclidean distance and divergence distance,for FCM is conducted for an image classification problem in this *** FCM algorithm which uses Euclidean distance measure utilizes only mean information from an image block for its feature while FCM algorithm with divergence utilizes both of variance and mean *** a set of Caltech databaseshow that Divergence-based FCM gives higher accuracy when compared with some conventional algorithms with Euclidean distance.
The use of Radio Frequency Identification(RFID) technology is seeing increasing use in all areas of industry. Companies and government agencies have implemented RFID solutions to make their inventory controlsystems m...
详细信息
The use of Radio Frequency Identification(RFID) technology is seeing increasing use in all areas of industry. Companies and government agencies have implemented RFID solutions to make their inventory controlsystems more efficient. In the healthcare industry the technology is being used to saves patient lives by preventing medical misidentification, and mistreatment, to monitor medical equipment assets, and to track the administration of medication. In spite of all the benefits that RFID can provide to industry, there are glaring security concerns that come with its use. The paper will identify the security risks inherent in RFID technology and propose a framework to make smart tagged cards more secure using active tags and prevent the ability to clone tags or sniff data between the tag and reader. The proposed framework is specific to the tag and reader communication layer.
Most of the patter search algorithms in literature are mostly string based and do not concentrate on finding sequential patterns with constraints in a given *** in query languages such as SQL or MySQL,the select claus...
详细信息
Most of the patter search algorithms in literature are mostly string based and do not concentrate on finding sequential patterns with constraints in a given *** in query languages such as SQL or MySQL,the select clause does not allow the use of the non-aggregate functions as part of query *** objective of this work is to propose a pattern mining algorithm which may be embedded into SQL or MySQL Query languages so that we can search for presence of sequential pattern in the *** algorithm makes use of sliding sequential patterns with three look-ahead elements in the event of any mismatch.
This paper proposes a software processing scheme for small-sized UAV in its landing area discovery using its single onboard camera and machine learning algorithms. The two-stage processing procedure was proposed. In f...
详细信息
This paper proposes a software processing scheme for small-sized UAV in its landing area discovery using its single onboard camera and machine learning algorithms. The two-stage processing procedure was proposed. In first stage a similarity based textured area identification method was adopted to find the possible landing areas. Afterwards, in second stage, these results were refined and evaluated by using some machine learning algorithms. The UAV can then take use of these results as its emergency landing target options. The software scheme we designed implemented the whole process but still allow the developers to embed their own algorithms to make better results. Our preliminary research has disclosed that this software and application are useful and can provide great convenience and efficiency.
The research paper involves modeling of semi-active suspension system using quarter car model in Simulink *** order to modulate the damping coefficient value, fuzzy logic controller is modeled using Fuzzy Tool Box. Th...
详细信息
The research paper involves modeling of semi-active suspension system using quarter car model in Simulink *** order to modulate the damping coefficient value, fuzzy logic controller is modeled using Fuzzy Tool Box. Three different damping coefficient limits are selected for analyzing the response of system in terms of ride comfort. Road disturbance profile comprising a combination of two sinusoidal curves is modeled and the three semi-active suspension systems are simulated. Suspension displacement and velocity parameters are selected as the indicators of ride *** results manifest supremacy of the system having damping coefficient limit of 4000 N s/m. The optimized system performs well fulfilling the requirements of minimum percentage overshoot and rapid stabilizing time.
Fault recognition for Wind Turbine Generator's(WTG) mechanical system is a fundamental task of Condition Monitoring System and depends on the time-frequency feature of the monitored signals. A recognition method b...
详细信息
Fault recognition for Wind Turbine Generator's(WTG) mechanical system is a fundamental task of Condition Monitoring System and depends on the time-frequency feature of the monitored signals. A recognition method by matching the Hilbert-Huang Spectrum(HHS) of the vibration signal is proposed. Fault recognition is formulated as an aligning process that shifts the vibration's HHS to match the pre-defined fault pattern using ICP. Given that the duration and initial frequency feature of the HHS may lead to different aligning results, iteration parameters with multiple time-scales and positions are set. In simulations, a mechanical fault is identified and the effectiveness is compared.
In this paper, we present a new method for analysis of cardiac sound signals containing murmurs using constrained tunable-Q wavelet transform(TQWT). The fundamental heart sounds(FHS) and murmurs are separately reconst...
详细信息
In this paper, we present a new method for analysis of cardiac sound signals containing murmurs using constrained tunable-Q wavelet transform(TQWT). The fundamental heart sounds(FHS) and murmurs are separately reconstructed by suitably constraining TQWT. The segmentation of reconstructed murmurs into heart beat cycles is achieved using cardiac sound characteristic wave-form(CSCW) of reconstructed FHS. The frequency domain based approximate entropy,spectral entropy, Lempel-Ziv complexity, and time domain Shannon entropy are computed for each segmented heart beat cycles for least squares support vector machine(LS-SVM) based classification. The experimental results are included to show the effectiveness of the proposed method.
Being a vital element for the different domains such as communication system, authentication, and payment, multiple attackers manipulate the Card fraudulently in order to access to the services offered by this one. Sm...
详细信息
Being a vital element for the different domains such as communication system, authentication, and payment, multiple attackers manipulate the Card fraudulently in order to access to the services offered by this one. Smartcards are often the target of software and hardware attacks. The most recent attacks are based on fault injection which modifies the application behavior. By disrupting the Java Card operation, the fault attack modifies the compiled code intended to be executed in order to meet what the attacker wants instead of the initial program. So, to tackle this problem, we suggest two classification and detection methods based on artificial intelligence, especially the neural and Bayesian networks. Then,we compare between the obtained results of these two methods in terms of the detection rate.
Renography is a radionuclide technique introduced in medicine since the early sixties in the daily practice. It allows measuring the function of each kidney separately in case of unilateral or bilateral uro-nephrologi...
详细信息
Renography is a radionuclide technique introduced in medicine since the early sixties in the daily practice. It allows measuring the function of each kidney separately in case of unilateral or bilateral uro-nephrological disease. A new system for analysis of Renography is presented in this paper. Our system aims to show a fully automated method for drawing the renal regions of interest based on a multi-agent system that incorporates spatio-temporal interest points detection on scintigraphic images by using the HOG3D descriptor to initialize agents. We used both types of agents, namely supervisor agents and explorator agents, they communicate among themselves and they inspire in their behavior from the Fast Marching method. Our system was tested on many real patients' cases and we have obtained encouraging results. Clinical validation showed a constant agreement between the approach presented and manual segmentation by professionals in the nuclear medicine.
暂无评论