Stereo matching techniques aim at reconstructing depth information from a pair of images. The use of stereo matching algorithms in embedded systems is very challenging due to the complexity of state-of-the-art algorit...
详细信息
Stereo matching techniques aim at reconstructing depth information from a pair of images. The use of stereo matching algorithms in embedded systems is very challenging due to the complexity of state-of-the-art algorithms. Most stereo matching algorithms are made of three different parts; the cost construction, the cost aggregation and the disparity selection. This paper focuses on comparing the efficiency of different cost construction methods implemented on a Digital Signal Processor (DSP) C6678 platform. Three cost construction algorithms based on census, Sum of Absolute Differences (SAD) and Mutual Information (MI) have been compared in terms of output quality and execution time. Each method has its own specificity discussed in this paper. The SAD is the simplest one and is used as reference in this paper. The census has a good output quality, and the MI is faster.
In this paper the application for generation of HDR image based on two consecutive images (underexposed and overexposed) for Android mobile operating system is presented. The implemented software preserves a lot of im...
详细信息
ISBN:
(纸本)9781509026616
In this paper the application for generation of HDR image based on two consecutive images (underexposed and overexposed) for Android mobile operating system is presented. The implemented software preserves a lot of image details and maintains a low execution time. These features are particularly important for pictures taken using mobile devices in emergency situations. Such photos may constitute evidence that a threat occurred, was properly recognized, or someone committed a crime. HDR images can be also used in mobile systems for supporting pedestrians or drivers. Obtained results indicate on a high effectiveness of the presented solution.
The proceedings contain 72 papers. The special focus in this conference is on Soft Computing Techniques for Advanced Computing, algorithms, Advanced imageprocessing Methodologies and Next Generation Optical systems. ...
ISBN:
(纸本)9788132225379
The proceedings contain 72 papers. The special focus in this conference is on Soft Computing Techniques for Advanced Computing, algorithms, Advanced imageprocessing Methodologies and Next Generation Optical systems. The topics include: Fuzzy logic based UPFC controller for voltage stability and reactive control of a stand-alone hybrid system;APSO based weighting matrices selection of LQR applied to tracking control of SIMO system;application of fuzzy soft multi sets in decision-making problems;plant leaf recognition using ridge filter and curvelet transform with neuro-fuzzy classifier;recognition of repetition and prolongation in stuttered speech using Ann;hybrid model with fusion approach to enhance the efficiency of keystroke dynamics authentication;multi-label classifier for emotion recognition from music;a study on cloud based SOA suite for electronic healthcare records integration;protecting the apache hadoop clusters with hadoop authentication process using kerberos;image analysis for efficient surface defect detection of orange fruits;local Gabor wavelet-based feature extraction and evaluation;human interaction recognition using improved spatio-temporal features;common coupled fixed point results in fuzzy metric spaces using JCLR property;comparative analysis on optic cup and optic disc segmentation for glaucoma diagnosis;an improved reversible data hiding technique based on histogram Bin shifting;a novel approach towards detection and identification of stages of breast cancer;implementation and comparative study of image fusion methods in frequency domain and iris recognition using textural edgeness features.
Urinary Tract Infections (UTIs) are very common in women, babies and the elderly. The most frequent cause is a bacterium, called Escherichia coli, which usually lives in the digestive system and in the bowel. Infectio...
详细信息
The paper presents analysis and comparison of complexity of selected algorithms of motion estimation used in video compression. With the use of own, highly optimized software implementation the authors explored comple...
详细信息
ISBN:
(纸本)9781467395564
The paper presents analysis and comparison of complexity of selected algorithms of motion estimation used in video compression. With the use of own, highly optimized software implementation the authors explored complexity of the methods applied in the framework of the new High Efficiency Video Compression (HEVC) technology. The influence of many different factors on motion estimation complexity has been deeply studied, including the implementation technique, type of the algorithm, number of processor threads used, kind of metric of blocks similarity. The results obtained allowed to formulate guidelines and conclusions that may be useful for future implementation of motion estimation algorithms in context of HEVC encoders.
Face detection and recognition mechanisms are widely used in many multimedia and security devices. The concept is called face detection and there are significant numbers of studies into face recognition, particularly ...
详细信息
ISBN:
(纸本)9781467389419
Face detection and recognition mechanisms are widely used in many multimedia and security devices. The concept is called face detection and there are significant numbers of studies into face recognition, particularly for imageprocessing and computer vision. However, there remain significant challenges in the existing systems due to limitations behind algorithms. Viola Jones and Cascade Classifier are considered the best algorithms from among existing systems. They can detect faces in unconstrained Crowd Scene with half and full face detection methods. However, limitations of these systems are affecting accuracy and processing time. This project presents a propose solution called VJaC (Viola Jones and Cascade). It is based on the study of current systems, features and limitations. This system considered three main factors, processing time, accuracy and training. These factors are tested on different sample images, and compared with current systems.
Sophisticated computational imaging algorithms require both high performance and good energy-efficiency when executed on mobile devices. Recent trend has been to exploit the abundant data-level parallelism found in ge...
详细信息
ISBN:
(纸本)9781509010950
Sophisticated computational imaging algorithms require both high performance and good energy-efficiency when executed on mobile devices. Recent trend has been to exploit the abundant data-level parallelism found in general purpose programmable GPUs. However, for low-power mobile use cases, generic GPUs consume excessive amounts of power. This paper proposes a programmable computational imaging processor with 16-bit half-precision SIMD floating point vector processing capabilities combined with power efficiency of an exposed datapath. In comparison to traditional VLIW architectures with similar computational resources, the exposed datapath reduces the register file traffic and complexity. These and the specific optimizations enabled by the explicit programming model enable extremely good power-performance. When synthesized on a 28nm ASIC technology, the accelerator consumes 71mW of power while running a state-of-the-art denoising algorithm, and occupies only 0.2mm(2) of chip area. For the algorithm, energy usage per frame is 7mJ, which is 10x less than the best found GPU-based implementation.
This paper proposes an efficient method to improve image quality based on Context-based enhancement techniques, particularly towards real-time applications in dedicated hardware systems. The main idea is that all the ...
详细信息
ISBN:
(纸本)9781467380171
This paper proposes an efficient method to improve image quality based on Context-based enhancement techniques, particularly towards real-time applications in dedicated hardware systems. The main idea is that all the important information of a low-quality an image are combined with a high-quality daytime background image at the same scene to output an image with improved quality, and thus main objects of the low-quality input images can be recognized more easily. In comparison, almost all current context-based enhancement techniques have processed with complex algorithms, thereby being time-consuming and hard to perform in real-time processing when applying into high-resolution images/videos. The developed technique here outperforms these original methods, which is demonstrated by without complex formulas (such as DST and IDST), whereas not only still keeping all the important information of the low-quality nighttime input images, but also limiting problems often existing in context fusion techniques, such as ghosting, haloing and artifact effects. The experimental results demonstrate that our approach has been efficient and gained a better quality of output images in comparison with the results of the Denighting method [8].
The proceedings contain 46 papers. The special focus in this conference is on Swarm Intelligence and Its Applications. The topics include: Improving the searching capacity of evolved bat algorithm by the periodic sign...
ISBN:
(纸本)9783319232034
The proceedings contain 46 papers. The special focus in this conference is on Swarm Intelligence and Its Applications. The topics include: Improving the searching capacity of evolved bat algorithm by the periodic signal;evolved bat algorithm with increase-wave strategy;a new digital image compression method using chrestenson transform;intelligent algorithms and their application in electrical impedance tomography;design of multifunctional communication card based on reflective memory;computation of large-scale electric field in free space;an investigation on maximum entropy estimation based on chrestenson transform;a niching genetic algorithm including an inbreeding mechanism for multimodal problems;robust reversible colour image digital watermarking using offset coefficient technique;analysis of movement effectiveness in badminton strokes with accelerometers;a simple and non-invasive measurement method important for conserving large animals underwater;characterization of malware detection on android application;enhancement of preventing application layer based on DDOS attacks by using hidden semi-Markov model;private cloud deployment model for academic environment using cloudstack;two methods for color constancy based on the color correlation matrix;machine learning techniques for myanmar word-sense disambiguation;a graph representative structure for detecting automorphic graphs;a method of wavelength selection of multispectral image for the separation of tumor region;analysis of signal variation based on path loss in LTE network.;automatic response analyzer with multiple choices in classroom using imageprocessing and cards and design and implementation of real time vision system for recognizing features of lane boundary.
Computer vision and image analysis have taken advantage of five decades of intense development. The complexity of the algorithms in this field can now benefit from dramatically increasing computational power to offer ...
详细信息
ISBN:
(纸本)9781509030859
Computer vision and image analysis have taken advantage of five decades of intense development. The complexity of the algorithms in this field can now benefit from dramatically increasing computational power to offer viable applications going from embedded systems to cloud computing. This special session proposes three papers dealing with the implementation of computer vision and image analysis applications on embedded systems.
暂无评论