Current pose estimation methods make unrealistic assumptions regarding the body postures. Here, we seek to propose a general scheme which does not make assumptions regarding the relative position of body parts. Practi...
详细信息
In this paper,the distributed optimization problem is investigated under a second-order multi-agent *** the proposed algorithm,each agent solves the optimization via local computation and information exchange with its...
详细信息
ISBN:
(纸本)9781509046584
In this paper,the distributed optimization problem is investigated under a second-order multi-agent *** the proposed algorithm,each agent solves the optimization via local computation and information exchange with its neighbors through the communication ***,in comparison with the existing second-order distributed optimization algorithms,the proposed algorithm is much simpler due to one coupled information exchange among the agents is *** achieve the optimization,the distributed algorithm is proposed based on the consensus method and the gradient *** optimal solution of the problem is thus obtained with the design of Lyapunov function and the help of LaSallel's Invariance Principle.A numerical simulation example and comparison of proposed algorithm with existing works are presented to illustrate the effectiveness of the theoretical result.
This paper presents optimized connection searching method based on region filling algorithms. The proposed method is optimized using the heuristic and is intended for maze-solving. In specific cases, the proposed algo...
详细信息
ISBN:
(纸本)9781538618011
This paper presents optimized connection searching method based on region filling algorithms. The proposed method is optimized using the heuristic and is intended for maze-solving. In specific cases, the proposed algorithm performs better than variants which do not use heuristic and it depends on the maze structure and position of the starting and ending pixel.
In present scenario whole world is moving towards digital communication for fast and better communication. But in this a problem arises with security i.e. when we have to transmit information (either data or image) ov...
详细信息
ISBN:
(纸本)9781509047611;9781509047604
In present scenario whole world is moving towards digital communication for fast and better communication. But in this a problem arises with security i.e. when we have to transmit information (either data or image) over internet or to store information at any random location then its security is very important. To protect our information from hackers we use a technique i.e. Encryption. In this paper we use image as information and use different types of encryption techniques to encrypt it and protect it from hackers. After that we find various parameters from each image encryption technique and then compare each technique's parameters from one another. After that we search for the best result and then proceed forward with that technique for future scope.
Infrared signal processingalgorithms and architectures are important for the development of a high performance infrared imaging systems. Infrared signal processing deals with two types of processing sensor signal pro...
详细信息
ISBN:
(纸本)9781538632444
Infrared signal processingalgorithms and architectures are important for the development of a high performance infrared imaging systems. Infrared signal processing deals with two types of processing sensor signal processing and infrared imageprocessing for contrast enhancement and target detection. The sensor signal processing primarily deals with non uniformity correction for infrared sensors. Assessing the quality of the Infrared video frame is a complex and firm process since human's opinion is affected by physical and psychological parameters. Infrared Video frame quality assessment plays an important role in the field of video processing. Structural Similarity Index has become a standard among image quality metrics. It is a framework for quality assessment based on the degradation of structural information of video frame. In this paper SSIM values are computed and compared for Infrared video frames by applying different edge detection approaches by using different color models to assess the quality of the frames. Experimental results comparisons demonstrate the effectiveness of the proposed method.
By a car license plate recognition, we mean a software system processingimages and providing an alphanumeric transcription of car plates included in an image. We divide the task into four sub-tasks: license plate loc...
详细信息
ISBN:
(纸本)9781509049189
By a car license plate recognition, we mean a software system processingimages and providing an alphanumeric transcription of car plates included in an image. We divide the task into four sub-tasks: license plate localization, license plate extraction, characters segmentation and characters recognition. All four sub-tasks are discussed in the context of standard approaches and own solution based on a chain of standard and soft computing imageprocessingalgorithms is presented. In this chain, the F-transform approximate pattern matching algorithm plays the crucial role. For the solution, we presented recognition ability for a dataset which includes 500 images with difficult conditions.
One of the key technologies of the large-size electronic whiteboard is pen locating, but most existing technologies have their weaknesses. In this paper, a pen locating algorithm and its prototype are proposed. Using ...
详细信息
One of the key technologies of the large-size electronic whiteboard is pen locating, but most existing technologies have their weaknesses. In this paper, a pen locating algorithm and its prototype are proposed. Using Spatial-based watermark embedding method, the pen-locating algorithm generates watermarked blocks by embedding watermark information into the background image on the screen. The pen detects the watermarked blocks on the screen and when the watermarked blocks are detected, the pen can be located through the analysis of the image block location and the distance between the pen and the image block. The algorithm is tested by simulation and the locating error of the prototype system is 1.7 pixels approximately.
The study of substances with a crystal structure is a complex multi-step process. The key step in the crystalline substance analysis is the unit cell parameter estimation. The estimation of the crystal lattice unit ce...
The study of substances with a crystal structure is a complex multi-step process. The key step in the crystalline substance analysis is the unit cell parameter estimation. The estimation of the crystal lattice unit cell parameters is a particular problem that involves the search of the crystal lattice model's parameters according to the information which can be extracted from the substance. In these recent times, the most accurate information about the substance structure can be obtained with the electron microscope whose linear resolution is high enough to observe the atomic structure of a substance. The problem of parameter estimation in this case means the reconstruction of the three-dimensional crystal lattice with 2-dimentional images received by an electron microscope, and the estimation of the crystal lattice unit cell parameters by reconstructed lattice. In the previous papers the crystal lattice parametric identification algorithms based on solving the local optimization problem were presented. However, the analysis of a large crystal lattice database requires a lot of computations. In this paper, a high-performance crystal lattices parametric identification algorithm using the CUDA technology is proposed. The investigation of the algorithm effectiveness is carried out on the GPU GeForce NVidia GTX 1070 Ti. With data dimension more than 32 translations the acceleration is higher than 70. The algorithm runs more efficiently at the use of a large number of CUDA-blocks.
Security is an important issue during communication and data transmission. There are many ways to provide security. One method to ensure security is the use of cryptographic algorithms such as DES, AES, RC5, Blowfish ...
详细信息
ISBN:
(纸本)9781509047611;9781509047604
Security is an important issue during communication and data transmission. There are many ways to provide security. One method to ensure security is the use of cryptographic algorithms such as DES, AES, RC5, Blowfish etc. Cryptography is a method used for encoding the data which may be hacked by the unauthorized person. In this paper FPGA based design and implementation of Blowfish algorithm has been proposed. For RTL coding VHDL has been used and Virtex-5XC5VLX50T FPGA device used as a reconfigurable platform for implementation of Blowfish algorithm. The aim of this system is to evaluate performance of Blowfish algorithm on reconfigurable platform in terms of power consumption and throughput. For testing purpose image data and ECG data has been used as plaintext.
Summary form only given. Digital imageprocessing refers to the set of algorithms used to transform, filter, enhance, modify, analyze, distort, fuse, etc., digital images. Most of these algorithms are designed to mimi...
详细信息
ISBN:
(纸本)9781509042548
Summary form only given. Digital imageprocessing refers to the set of algorithms used to transform, filter, enhance, modify, analyze, distort, fuse, etc., digital images. Most of these algorithms are designed to mimic an underlying physical operation defined in the continuous illumination domain and formerly achieved via optical or electronic filters or through manipulations, including painting, cutting, moving or pasting of image patches. It also allows more sophisticated transformations (associated to more or less complex algorithms) which would be impossible to process by analog means. It may be quite hard to completely transpose an operation from the continuous to the discrete domain. Such a transposition usually relies on methods that ensure a kind of interplay between continuous and discrete domains. The interplay between the continuous and the discrete domain usually involves a convolution with a point spread function, when the measurement model is supposed to be linear, while the interplay between the discrete and the continuous domain is ensured by interpolation or more generally approximation methods, which also involve a convolution with a reconstruction kernel. Performing a precise identification of the point spread function of an imager is usually pretty challenging. Moreover, modeling the imaging process by a point spread function could be considered as an approximation of a more complex (and not shift-invariant) phenomenon (e.g. radial distortion or chromatic aberrations).
暂无评论