In many multi-camera surveillance systems, there is a need to identify whether a captured person have emerged before over the network of cameras. This is the person re-identification problem. In this paper, we propose...
详细信息
In order to detect moving object from UAV aerial images motion analysis has started to get attention in recent years where motion of the objects along with moving camera needs to be estimated and compensated by using ...
详细信息
ISBN:
(纸本)9783319029573;9783319029580
In order to detect moving object from UAV aerial images motion analysis has started to get attention in recent years where motion of the objects along with moving camera needs to be estimated and compensated by using detection algorithm. Moving object detection from UAV aerial images based on motion analysis involves modeling the pixel value changes over time. Moving object detection with moving cameras from UAV aerial images is still an unsolved issue due to not considering irregular motion of camera and improper estimation of noise, object motion changes and finally unfixed moving object direction. This paper presents a low complexity based motion analysis framework for moving object detection along with camera motion estimation by considering motion change of moving object and unfixed moving object direction. Based on the experimental results it is expected that proposed motion vector estimation performs well for both invariant motion and invariant moving object direction.
Face recognition technique nowadays is emerging as the most significant and challenging aspects in terms of security for identification of images in various fields viz. banking, police records, biometric etc. other th...
详细信息
ISBN:
(纸本)9781467345279
Face recognition technique nowadays is emerging as the most significant and challenging aspects in terms of security for identification of images in various fields viz. banking, police records, biometric etc. other than an individual's thumb and documented identification proofs. Till date for efficient net banking to be initiated, one has to provide the appropriate user name and password for purpose of authentication. This project introduces a vehicle to take a step forward in easy and more reliable authentication of an individual by providing Face Image along with User Name and Password to the system. In this an individual's face is identified by biometric authentication support with which, only a person whose account is, can access it. However while transferring this sensitive data of user image, from client machine to bank server it has to be protected from hackers and intruders from manhandling it, hence it is transferred using covert communication called Wavelet Decomposition based steganography. As face images are affected by different expressions, poses, occlusions, illuminations and aging over a period of time and it differs from the same person than those from different ones is the main difficult task in face recognition. Whenever image information is jointly co-ordinated in three aspects viz. image space, scale and orientation domains they carry much higher clues than seen in each domain individually. In the proposed method combination of Local Binary pattern (LBP) and Gabor features are used to increase the face recognition performance significantly to compare individual's face presentations. Hence face recognition and representation of Gabor faces are done using E-GV-LBP and CMI-LDA based feature recognition method. Gabor faces uses space, scale and orientation to support accurate face recognition, making net banking easier, authentic, reliable and user friendly.
In most action recognition tasks, the target videos are of different temporal length and an action may be repeated several times in one video. As a result, encoding the distribution of video feature points that are fa...
详细信息
ISBN:
(纸本)9781479905607
In most action recognition tasks, the target videos are of different temporal length and an action may be repeated several times in one video. As a result, encoding the distribution of video feature points that are far away from each other or are detected from different occurrences of the action into the video representation is inappropriate. It is better that sub video shots containing different occurrences of the action are detected and encoded respectively. In this paper, a novel video representation framework in which video shots are detected efficiently by clustering feature points according to their temporal locations in the video is proposed. Moreover, shot representations are generated based on a variation of the spatial-temporal pyramid matching method using max-pooling and sparse coding of video features. The video can finally be presented by max-pooling shot representations again and be classified using a linear SVM. This framework is evaluated on the KTH and the UCF sports human action datasets and promising performances are obtained compared to state-of-the-art methods.
Local Binary pattern (LBP) feature has attracted increasing interest in pedestrian detection tasks, but it requires high dimensionality to gain promising performance. To address this problem, we make three main contri...
详细信息
ISBN:
(纸本)9781479905607
Local Binary pattern (LBP) feature has attracted increasing interest in pedestrian detection tasks, but it requires high dimensionality to gain promising performance. To address this problem, we make three main contributions. First, Center-Symmetric Local Binary patterns (CSLBP) feature is introduced to pedestrian detection. It's the first time to extract CSLBP operator in an approach similar to basic LBP operator. Second, we propose the operator combining CSLBP 1,8 pattern and uniform LBP 1,8 pattern, named combined-LBP descriptor for convenience. Third, the combined-LBP operator is applied to various color spaces. Experiments on INRIA pedestrian database show that combined-LBP operator based pedestrian detector achieve state of art performance with miss rate of 6.04% at FPPW=10 -4 in gray-scale image, and the proposed operator in oRGB color space obtain superior result with miss rate of 2.75% at FPPW=10 -4 .
This work presents a novel image appearance description method based on the highly popular local binary pattern (LBP) texture features. The key idea consists of introducing a dense sampling encoding strategy for extra...
详细信息
Intelligent Information Processing System has successful application in informationization of traditional industry. Exact addressing the stock case39;s ailment type and roots as quickly as possible has been the weig...
详细信息
Intelligent Information Processing System has successful application in informationization of traditional industry. Exact addressing the stock case's ailment type and roots as quickly as possible has been the weight of developing information technology for veterinary. In order to assist human veterinarian expert diagnose animal ailment, this work proposes a machine diagnosing model based on KNN ailment-similarity-degree patternrecognition. The project crew devises 3 similarity distance measuring methods including Lee distance and Jaro distance, which are addressed to the uncertainty factor vector pattern and fuzzy membership pattern. In addition, the software architecture of the machine diagnosing model and diagnosing algorithm is constructed in detail. Field experimental statistics demonstrate that compared with the individual human veterinary expert, the proposed model achieve a preferable accuracy rate of diagnosis over 80%, and low a rate of misdiagnosis obviously, which is an alternate of existent ones with great potential.
Unit testing is a critical step in the development lifecycle of business processes for ensuring product reliability and dependability. Although plenty of unit testing approaches for WS-BPEL have been proposed, only a ...
详细信息
Dimensionality reduction from an information system is a problem of eliminating unimportant attributes from the original set of attributes while avoiding loss of information in data mining process. In this process, a ...
详细信息
ISBN:
(纸本)9783319029573;9783319029580
Dimensionality reduction from an information system is a problem of eliminating unimportant attributes from the original set of attributes while avoiding loss of information in data mining process. In this process, a subset of attributes that is highly correlated with decision attributes is selected. In this paper, performance of the great deluge algorithm for rough set attribute reduction is investigated by comparing the method with other available approaches in the literature in terms of cardinality of obtained reducts (subsets), time required to obtain reducts, number of calculating dependency degree functions, number of rules generated by reducts, and the accuracy of the classification. An interactive interface is initially developed that user can easily select the parameters for reduction. This user interface is developed toward visual data mining. The carried out model has been tested on the standard datasets available in the UCI machine learning repository. Experimental results show the effectiveness of the method especially with relation to the time and accuracy of the classification using generated rules. The method outperformed other approaches in M-of-N, Exactly, and LED datasets with achieving 100% accuracy.
暂无评论