Gait is a biometric feature and identification of people from gait captured on video that has become a challenging problem in computer vision. A recognition method based on amplitude spectrum (Fourier spectrum) of fre...
详细信息
ISBN:
(纸本)0769521223
Gait is a biometric feature and identification of people from gait captured on video that has become a challenging problem in computer vision. A recognition method based on amplitude spectrum (Fourier spectrum) of frequency domain is proposed. Fourier spectrum reflects the frequency feature of person's pose in the current frame. After getting the period and key poses through the whole sequence according to the height of centroid and the amplitude value in frequency domain, we extract 5D features from the sequence including four amplitude values corresponding to four key poses image and the proportion of body. Finally, three measures are applied to evaluate our algorithm. Experiments result on USF dataset show that our method is insensitive to many changes condition of background, lighting, clothing, walking speed, segment noise and so on. For we implement gait recognition according to the discriminant analysis, the result to some extent is robust to the variation of viewpoint and cloth and recognition rate is satisfying.
We describe a recently developed DC motor position control experimental setup that can be accessed via the Internet. This setup consists of two primary elements communicating with each other: i) a server consisting of...
详细信息
We describe a recently developed DC motor position control experimental setup that can be accessed via the Internet. This setup consists of two primary elements communicating with each other: i) a server consisting of a low-cost microcontroller, Parallax's 40-pin Basic Stamp 2, interfaced with an embedded Ethernet IC, Cirrus Logic's Crystal CS8900A, and ii) a client computer. The client computer sends/receives data to/from the microcontroller using the user datagram protocol packets. The client computer connects to the server using Java applets that allow the user to command the position of the motor via a graphical user interface. The interface includes a slider for commanding the motor position from 0/spl deg/-360/spl deg/ and text input boxes for tuning the parameters of a position control algorithm "on-the-fly." A plot provides a visual display of the current position of the motor using real-time sensor data sent by the microcontroller. Our microcontroller-based remote control methodology can be readily applied to monitor and control other experimental hardware over the Internet.
In unbundled power markets, stakeholders have different interests and expectations from performance and expansion of the system. This paper presents a new market based approach for transmission expansion planning with...
详细信息
In unbundled power markets, stakeholders have different interests and expectations from performance and expansion of the system. This paper presents a new market based approach for transmission expansion planning with consideration given to the stakeholders' desires using fuzzy decision making. Five groups of stakeholders; power producers, demand customers, system operator, network owners, and regulator, are considered. Competition, reliability, flexibility, network charge and environmental impacts are evaluated from the viewpoint of different stakeholders for selecting the final plan. Some market based criteria are presented to measure stakeholders' desires. The approach is applied to IEEE 30 bus network.
Computer supported protocol-based care aims to aid physicians in the treatment process. The main focus of current research is directed towards the formal methods and representations used "behind the scenes" ...
详细信息
Computer supported protocol-based care aims to aid physicians in the treatment process. The main focus of current research is directed towards the formal methods and representations used "behind the scenes" of such systems. This work on the contrary, is situated at the human end of the human-machine chain. We describe the development of interactive visualization methods to support protocol-based care. We provide multiple simultaneous views to cover different aspects of a complex underlying data structure of treatment plans and patient data. The tightly coupled views use visualization methods well-known to domain experts and are designed to facilitate users' tasks. The views are based on the concepts of clinical algorithm maps and Lifelines which have been extended in order to cope with the powerful and expressive plan representation language Asbru. The user-centered development approach applied for these interactive visualization methods has been guided by user input gathered via a user study, design reviews, and prototype evaluations.
A method is proposed to register visible and infrared face images. The vanishing-point based approach [J.G. Wang and E. Sung, 2001] is applied to the visible image to determine the 3D pose of the human head. Then the ...
详细信息
A method is proposed to register visible and infrared face images. The vanishing-point based approach [J.G. Wang and E. Sung, 2001] is applied to the visible image to determine the 3D pose of the human head. Then the corresponding pose with respect to the infrared camera is computed through the known relationship by calibration between the visible and infrared cameras. By doing so, the skin temperature range within the infrared image can be superimposed over the visible face image. We use the EM strategy to first compute the 3D pose using some initially learned (PCA) model parameters, and then update iteratively the parameters for individual persons and their facial expressions till convergence. The EM technique models data uncertainty using Gaussian mixtures defined over positions and orientation of facial plane. The resulting weighted parameters estimation problem is solved using the Levenberg-Marquardt method. The results on the synthetic data and real images have verified the performance of the approach.
The winner of the 2019 Principles of Distributed computing Doctoral Dissertation Award is Dr. Sepehr Assadi for his dissertation Combinatorial Optimization on Massive Datasets: Streaming, Distributed, and Massively Pa...
ISBN:
(纸本)9781450362177
The winner of the 2019 Principles of Distributed computing Doctoral Dissertation Award is Dr. Sepehr Assadi for his dissertation Combinatorial Optimization on Massive Datasets: Streaming, Distributed, and Massively Parallel Computation, written under the supervision of Prof. Sanjeev Khanna at the University of *** thesis resolves a number of long-standing problems in the exciting and still relatively new area of sublinear computation. The area of sublinear computation focuses on design of algorithms that use sublinear space, time, or communication to solve global optimization problems on very large datasets. In addition to addressing a wide range of different problems, comprising graph optimization problems (matching, vertex cover, and connectivity), submodular optimization (set cover and maximum coverage), and resource-constrained optimization (combinatorial auctions and learning), these problems are studied in three different models of computation, namely, streaming algorithms, multiparty communication, and massively parallel computation (MPC). The thesis also reveals interesting relations between these different models, including generic algorithmic and analysis techniques that can be applied in all of *** many fundamental optimization problems, the thesis gives asymptotically matching algorithmic and intractability results, completely resolving several long-standing problems. This is accomplished by using a broad spectrum of mathematical methods in very detailed and intricate proofs. In addition to a wide variety of classic techniques, ranging from graph theory, combinatorics, probability, linear algebra and calculus, it also makes heavy use of communication complexity and information theory, for ***'s dissertation work has been published in a remarkably large number of top-conference papers. It received multiple best paper awards and multiple special issue invitations, as well as two invitations to the Highlights of Algorithms (HALG
Internet-based robotic systems have received much attention in the recent years. A number of design issues are essential for designing this new type of robotic systems. This paper addresses the user interface design a...
ISBN:
(纸本)9783540220077
Internet-based robotic systems have received much attention in the recent years. A number of design issues are essential for designing this new type of robotic systems. This paper addresses the user interface design and control structure selection for general Internet-enabled robots. An Internet based control system for an arm robot has been used as a case study to illustrate these general principles, in which a multimedia based user interface is built and an open-loop control structure is implemented.
A Random Geometric Graph (RGG) in two dimensions is constructed by distributing n nodes independently and uniformly at random in [0, {the square root of}n]~2 and creating edges between every pair of nodes having Eucli...
详细信息
ISBN:
(纸本)9780898717013
A Random Geometric Graph (RGG) in two dimensions is constructed by distributing n nodes independently and uniformly at random in [0, {the square root of}n]~2 and creating edges between every pair of nodes having Euclidean distance at most r, for some prescribed r. We analyze the following randomized broadcast algorithm on RGGs. At the beginning, only one node from the largest connected component of the RGG is informed. Then, in each round, each informed node chooses a neighbor independently and uniformly at random and informs it. We prove that with probability 1 - O(n~(-1)) this algorithm informs every node in the largest connected component of an RGG within O({the square root of}n/r+log n) rounds. This holds for any value of r larger than the critical value for the emergence of a connected component with Ω(n) nodes. In order to prove this result, we show that for any two nodes sufficiently distant from each other in [0, {the square root of}n]~2, the length of the shortest path between them in the RGG, when such a path exists, is only a constant factor larger than the optimum. This result has independent interest and, in particular, gives that the diameter of the largest connected component of an RGG is {direct}({the square root of}/r), which surprisingly has been an open problem so far.
Binary decision diagram (BDD) and Boolean satisfiability (SAT) are two common techniques of logic circuit-based Boolean reasoning. Since circuit-width is a good measure of circuit complexity, in this paper, a circuit-...
详细信息
Binary decision diagram (BDD) and Boolean satisfiability (SAT) are two common techniques of logic circuit-based Boolean reasoning. Since circuit-width is a good measure of circuit complexity, in this paper, a circuit-width based heuristic for Boolean reasoning is presented, it can be used for integrating the BDD-based engine and SAT-based engine, and takes advantages of both engines. Thus this heuristic can avoid the potential memory explosion during constructing the BDDs, and can prevent the time-out phenomenon of SAT techniques. Compared with the previous heuristics, the proposed heuristic can save more computational resources, and can improve the performance of Boolean reasoning algorithms. This heuristic has been applied in combinational circuit test generation successfully. Experimental results show that, the proposed heuristic can be used for the Boolean reasoning with multiple engines efficiently.
This work presents a functionality based model for survivable intelligent transportation system (ITS) control infrastructures. Specifically, a method is shown that allows us to determine the vulnerability of an ITS co...
详细信息
This work presents a functionality based model for survivable intelligent transportation system (ITS) control infrastructures. Specifically, a method is shown that allows us to determine the vulnerability of an ITS communication infrastructure to malicious acts and to derive optimal mitigations. The research is applied to a real ITS currently being implemented in a small town. Results show that significant reductions in vulnerability can be achieved utilizing the principle of redundancy with minimal effort. The method presented is especially suitable to reducing vulnerabilities of existing ITSs as it can be effectively applied after an ITS has been built. Mitigation techniques can be derived based on maximal benefit under consideration cost-benefit ratio.
暂无评论