the asynchronous event stream of event camera output overcomes exposure problems caused by dramatic changes in ambient light and motion blur caused by high-speed motion, which are common challenges with traditional ca...
详细信息
ISBN:
(纸本)9798400708305
the asynchronous event stream of event camera output overcomes exposure problems caused by dramatic changes in ambient light and motion blur caused by high-speed motion, which are common challenges with traditional cameras. Withthe increasing number of events per second delivered by event cameras, a faster feature extraction method is necessary to process large amounts of events to take advantage of event cameras for various computer vision tasks. We propose UCED-Detector, an event frame-based corner event detector that can detect features in event streams at three times the speed of the SOTA method. Firstly, we use events captured in the past to remove noise events from the current event stream. the events in the circular mask around the event to be detected are then constructed as event pairs and mark the events whose timestamps are one threshold larger than the other event in the event pair. Finally, the marked adjacent events are connected into arcs, and whether the event to be detected is a feature corner event is judged according to the arc length. To evaluate the performance of our proposed approach, we conducted extensive experiments on datasets of event cameras. the results show that our method reduces the detection time to one-third of the SOTA method and reduces the average processing time per event from 0.15 milliseconds to 0.04 milliseconds.
In the Internet of things (IoT) space, the ability to determine a user's location is critical to improving everyday convenience through services such as navigation and tracking. How to accomplish the task of obtai...
详细信息
Command and control network is the nerve center of the whole combat network. the characteristics of command information system and complex network map to each other. Complex network technology provides the possibility...
详细信息
To complement the existing experimental paradigm of motor imagery, an active brain-computer interface (BCI) experimental paradigm based on the sequential encoding of speech imagery and motor imagery is proposed. At th...
详细信息
Spaceborne Radar plays an essential role in the military. In hostile situations, synthetic aperture radar (SAR) is subject to deliberate interference by people. In this paper, we introduce narrowband interference and ...
详细信息
Examination is a preliminary process for evaluating our knowledge. While objective examinations consist of multiple-choice questions, which are easy to evaluate using simple methods, whereas subjective examinations, w...
详细信息
Integrating cyber and physical elements in smart grids amplifies susceptibility to false data injection attacks (FDIAs), jeopardizing home automation and energy infrastructure. Traditional security strategies often un...
详细信息
In this paper, we consider localization using multi-station TDOA, aiming at the invalidation of localization caused by the irrationality of the sensor distribution, proposed a new robust localization algorithm based o...
详细信息
In the actual industry, the causes of track circuit failures vary, but the input data collected may be similar. Aiming at this phenomenon, this paper adopts a hierarchical fuzzy decision tree algorithm to analyze the ...
详细信息
In recent times, there has been a notable advancement in deepfake techniques and the accessibility of extensive, cost-free databases. Consequently, even folks lacking technological expertise can now edit or produce vi...
详细信息
暂无评论