Active contour models is one of the most popular and successful segmentation methods. In this paper we propose a new geodesic active contour model combination with an external force field which is based on region info...
详细信息
Active contour models is one of the most popular and successful segmentation methods. In this paper we propose a new geodesic active contour model combination with an external force field which is based on region information inside and outside the curves. The external region force based on region information, which can be divided into global information and local information, is incorporated into the geodesic active contour model to drive the curves to Converge to the boundaries of the objects. Our proposed method then is incorporated into the level set foundational to compute the gradient flow. Due to the combination of the geodesic model and region information, our proposed method can get better performance both in synthetic images and real images.
The recent technology of image processing forms the basic principles of research entitled “A Novel Approach for Face recognition and Age estimation using Local Binary pattern, Discriminative approach using Two layere...
详细信息
The recent technology of image processing forms the basic principles of research entitled “A Novel Approach for Face recognition and Age estimation using Local Binary pattern, Discriminative approach using Two layered Back Propagation Network” has been developed to overcome the inconveniences faced by the organizations in recognizing the exact person. The proposed system sustains a high recognition rate in a wide range of resolution levels and it breaks the other alternative methods. Skin patches are also one of the features of our proposed work. We propose a face detection algorithm for different lighting conditions. Human Skin patches is also one of the parameter in the algorithm. The new methods using Local Binary pattern, Discriminative approach, facial algorithm and two layered back propagation algorithm for identifying the face and as well as age estimation. The Texture features and Global features are extracted from the image in different scales. The Gradient Orientation Pyramid can be formed for calculating the Age Progression and Age Estimation. The proposed method having high calculation speed compared with the existing method using Back propagation network with single layer. The dataset are taken from FG-NET and Morph Dataset. The performance comparison has been done using different datasets.
This paper has studied on method of video synopsis based on maximum motion power, the events of interest were obtained by the method of background modeling and target tracking. Then these events had a time-shifting an...
详细信息
Duling is a main concept on distributed control systems. If we have a fair system to decision and job management, this will cause to reach to a reliable industrial system. Especially, in sensitive industries, fairness...
详细信息
Duling is a main concept on distributed control systems. If we have a fair system to decision and job management, this will cause to reach to a reliable industrial system. Especially, in sensitive industries, fairness and reliability is very important. In previous works, several tries happened and many results obtained. In this paper a new approach presented in order to obtain far more reliable distributed industrial controlling systems. Indeed, based on the algorithm considered in methodology section, in this system when unpredicted crash occurs for each machine the whole of the other machines have the capability of offsetting the lack of the crashed machine. It is obvious that the system will be survival under this condition and to verify this approach the MATLAB software can be used.
Common spatial pattern (CSP) is very successful in constructing spatial filters for detecting event-related synchronization and event-related desynchronization. In statistics, a CSP filter can optimally separate the m...
详细信息
ISBN:
(纸本)9783642249549;9783642249556
Common spatial pattern (CSP) is very successful in constructing spatial filters for detecting event-related synchronization and event-related desynchronization. In statistics, a CSP filter can optimally separate the motor-imagery-related components. However, for a single trail, the EEG features extracted after a CSP filter still include features not related to motor imagery. In this study, we introduce a linear dynamical system (LDS) approach to motor-imagery-based brain-computer interface (MI-BCI) to reduce the influence of these unrelated EEC features. This study is conducted on a BCI competition data set, which comprises EEG signals from several subjects performing various movements. Experimental results show that our proposed algorithm with LDS performs better than a traditional algorithm on average. The results reveal a promising direction in the application of LDS-based approach to MI-BCI.
We conduct feature extraction and feature selection of the pattern of traffic signs based on environmental characteristics of the road tunnel, and the color and shape information of traffic signs, then further accompl...
详细信息
We conduct feature extraction and feature selection of the pattern of traffic signs based on environmental characteristics of the road tunnel, and the color and shape information of traffic signs, then further accomplish multi-level classification of traffic signs using decision tree method. The method proposed in this paper based on decision tree classification algorithm can convert a complex multi-class problem into several simple classifications. Experimental results show that the algorithm has good recognition results.
The 39;repetitive data problem39; is pervasive and ubiquitous in the real world, especially in the customer identification problem. Evidences from the experiments with Ripley39;s dataset indicate the 39;repeti...
详细信息
The 'repetitive data problem' is pervasive and ubiquitous in the real world, especially in the customer identification problem. Evidences from the experiments with Ripley's dataset indicate the 'repetitive data' significantly influence the performance of RVM patternrecognition that can be used to figure out what kind of the customers purchase the products. To identify the important customer modes, RVM automatically improves the Confidence Probability of the 'repetitive data'. Correspondingly, the classification boundary changes compared with the dataset without 'repetitive samples'. It is proved that the repetitive data should not be merged simply before the training of RVM.
The proceedings contain 34 papers. The special focus in this conference is on Modelling Foundations and Applications. The topics include: Preventing Information Loss in Incremental Model Synchronization by Reusing Ele...
ISBN:
(纸本)9783642214691
The proceedings contain 34 papers. The special focus in this conference is on Modelling Foundations and Applications. The topics include: Preventing Information Loss in Incremental Model Synchronization by Reusing Elements;An MDE-Based Approach for Solving Configuration Problems: An Application to the Eclipse Platform;incremental Updates for View-Based Textual Modelling;easing Model Transformation Learning with Automatically Aligned Examples;Code Generation for UML 2 Activity Diagrams: Towards a Comprehensive Model-Driven Development Approach;tractable Model Transformation Testing;Extending SysML with AADL Concepts for Comprehensive System Architecture Modeling;analyzing Variability: Capturing Semantic Ripple Effects;Integrating Design and Runtime Variability Support into a System ADL;contracts for Model Execution Verification;Domain-Specific Model Verification with QVT;A SysML Profile for Development and Early Validation of TLM 2.0 Models;taming the Confusion of Languages;table-Driven Detection and Resolution of Operation-Based Merge Conflicts with Mirador;Improving Naming and Grouping in UML;aspect-Oriented Model Development at Different Levels of Abstraction;MBSDI 2011 3rdinternational Workshop on Model-Based Software and Data Integration;MELO 2011 - 1st Workshop on Model-Driven Engineering, Logic and Optimization;the Third Workshop on Behaviour Modelling - Foundations and Applications;Process-Centred Approaches for Model-Driven Engineering (PMDE) - First Edition;A FUML-Based Distributed Execution machine for Enacting Software Process Models;Thirdinternational Workshop on Model-Driven Product Line Engineering (MDPLE 2011);agile Development with Domain Specific Languages;Incremental Evaluation of Model Queries over EMF Models: A Tutorial on EMF-IncQuery;integrated Model Management with Epsilon;creating Domain-Specific Modelling Languages That Work: Hands-On;Incremental Security Verification for Evolving UMLsec models.
Basically, Differential Fault Analysis (DFA) against ciphers consists of two stages: fault induction and fault exploitation. Success rate of the latter strongly depends upon the availability of the required type of so...
详细信息
Basically, Differential Fault Analysis (DFA) against ciphers consists of two stages: fault induction and fault exploitation. Success rate of the latter strongly depends upon the availability of the required type of some faulty ciphertexts, which typically assumes that adversaries have precise control over the location, timing and/or even the type of the fault induced. In view of this, there seems to be a technical gap between these two stages. In this paper, by amplifying the fault propagation pattern inherent in block ciphers, we propose an algorithmic method to narrow this gap, or to relax the underlying assumption. Our method provides a faulty ciphertext filtering process between two basic stages in DFA. This additional process equips adversaries with the capabilities to deterministically decide whether or not one faulty ciphertext is relevant to a specific DFA, before or without performing DFA itself. We take AES as a concrete case of study and conduct theoretical analysis and simulation experiments as well, the results of which strongly demonstrate the validity and power of our proposed filtering method.
Electronic warfare is a military action whose objective is to control the electromagnetic spectrum. To accomplish this objective, both offensive electronic attack (EA) and electronic protection (EP) actions are requir...
详细信息
Electronic warfare is a military action whose objective is to control the electromagnetic spectrum. To accomplish this objective, both offensive electronic attack (EA) and electronic protection (EP) actions are required. In addition electronic warfare support (ES) actions are essential to supply the intelligence and threat recognition that allow implementation of both EA and EP. Commanders must prepare to operate weapons systems in an intensive and non-permissive electromagnetic environment. Mission accomplishment requires awareness, dynamic planning, and flexibility at all levels of war. The Information System is a rescue in this critical task. It has been proposed to develop the EW Intelligent Information System that deals with processing of electronic warfare, communications, radar, war missions etc. In this work, design and implementation of such an intelligent system is offered. Using artificial intelligence, this system aims at achieving the best performance with a friendly system in spite of the existence of hostile actions. This system deals with different sources of data. It helps visualize mission scenarios, decides the mission suitability and the best EA and ES methods accordingly. This work handles a nonlinear optimization problem with multiple variables and constraints. Closed form and exact solutions of such problems are computationally difficult. Therefore, the paper proposes the use of artificial intelligence mainly the fuzzy logic and neural networks approach to tackle this problem. Traditionally, large databases of information require complex problem solving techniques. However, the use of AI provides a simple yet computationally manageable solution for this issue.
暂无评论