Currently, most content basedimage retrieval (CBIR) systems operate on all images, without sorting images into different types or categories. Different images have different characteristics, and thus often require di...
详细信息
Currently, most content basedimage retrieval (CBIR) systems operate on all images, without sorting images into different types or categories. Different images have different characteristics, and thus often require different analysis techniques and query types. Additionally, placing an image into a category can help the user to navigate retrieval results more effectively. To categorise an image, firstly the dominant region needs to be extracted using multi level colour segmentation. based on the region's features of colour, texture, shape and relation between regions, the image is then categorised. Users are presented with retrieval results sorted into different categories, where dominant region extraction allows object based retrieval to be performed
Emotion recognition in artificial intelligence is a challenging factor. Recent years have seen a rise in interest in emotion analysis based on EEG signals due to many factors, including the availability of huge EEG da...
详细信息
Relevance feedback technique has been one of the most active research areas in the field of content-basedimage retrieval. In this paper, we use Gaussian mixture model to represent the user's target distribution, ...
详细信息
ISBN:
(纸本)0780381858
Relevance feedback technique has been one of the most active research areas in the field of content-basedimage retrieval. In this paper, we use Gaussian mixture model to represent the user's target distribution, which can further narrow down the gap between high-level semantic and low-level features. Furthermore, we present a novel approach to estimate the distribution parameters based on the expectation maximization algorithm. Because current image retrieval systems are incapable of capturing user's inconsistent intentions, we propose a framework to resolve user's conflict feedback. Experimental results show that our system can gradually improve its retrieval performance through accumulated user interactions.
With the widespread use of new technologies such as mobile internet, cloud computing, and internet of Things in power systems, the number of terminal devices in power systems has increased dramatically, and the ensuin...
详细信息
With the widespread use of new technologies such as mobile internet, cloud computing, and internet of Things in power systems, the number of terminal devices in power systems has increased dramatically, and the ensuing security vulnerabilities have increased, making terminal devices increasingly vulnerable to cyber attacks such as ransomware viruses. In this paper, we focus on the security of terminal devices in power systems and realize security monitoring of power terminals by collecting power consumption side channel information of power terminal devices in normal and abnormal states, using training device abnormality identification models using supervised learning algorithms with some time-domain frequency-domain feature information of power consumption as power consumption features of the devices.
An image sensor architecture with an alternative image scan method, based on Morton (Z) order, is presented. This scan, compared to the conventional row (raster) scan, enables faster and efficient mean (average) compu...
详细信息
An image sensor architecture with an alternative image scan method, based on Morton (Z) order, is presented. This scan, compared to the conventional row (raster) scan, enables faster and efficient mean (average) computation of square image blocks. Digital averaging is used and the pixel data is read out with either the original resolution, a 2/spl times/2 or a 4/spl times/4 block averaging. A test chip of 128/spl times/128 array has been implemented in 0.35 /spl mu/m CMOS technology, has 15% fill factor, is operated by a 3.3V supply and dissipates 30mW at video rate.
Nowadays, Video Compression has gaining important because of its application in different field like internet. So, there is different algorithm used to achieve the compression of Video. Video Compression algorithms co...
详细信息
Nowadays, Video Compression has gaining important because of its application in different field like internet. So, there is different algorithm used to achieve the compression of Video. Video Compression algorithms combine Spatial image compression and Temporal motion compression. The sequence of frames contains Spatial and Temporal redundancies that Video Compression algorithms attempt to eliminate or code in smaller size. In this paper, We present a design of Binary motion vector technique with Pruning Discrete Wavelet Transform for the compression of AVI video. Here, Binary motion vector technique used for searching the Best matching block. This technique requires less candidates block than other motion vector technique. Pruning based DWT uses thresholding which will enhance the compression ratio with desirable Peak signal to Noise ratio. This algorithm will be going to simulate on XilinxISE13.1 and implement on SPARTEN3 FPGA.
This paper presents a method for extracting a non-rigid moving object from a video sequence. In order to actualize object extraction with minimal user interaction, we combine alpha matting and seed-line tracking. In t...
详细信息
ISBN:
(纸本)9781509045204
This paper presents a method for extracting a non-rigid moving object from a video sequence. In order to actualize object extraction with minimal user interaction, we combine alpha matting and seed-line tracking. In the proposed method, the object region is separated from background based on seed lines given by user as a cue, and then the seed lines are automatically tracked to the next frames to actualize automatic object extraction from the frame sequence. With the alpha matting, the boundary of the object region in each frame is refined. The experimental results have shown that by the seed-line tracking user input can be significantly reduced and that the boundary refinement by alpha matting works effectively.
Building defects are a regular occurring in constructions all over. There is a need to identify the type of defect present and accordingly take the necessary steps for correcting the defect. This paper focuses on the ...
详细信息
ISBN:
(纸本)9781538638330
Building defects are a regular occurring in constructions all over. There is a need to identify the type of defect present and accordingly take the necessary steps for correcting the defect. This paper focuses on the various construction defects that take place on different types of walling systems for buildings. A major problem is the lack of knowledge regarding the construction concepts in the residents of the building. The study undertook tackles this problem using image Processing and identifying various defects in an android app. This study is conducted on the walls of K-Block, Nirma University. The defects are observed and monitored through this study. The collected images are analysed and proper intimations can be pursued. based on the recordings, various types of building defects were identified and proper gradations were given. Work is under process to monitor a house in the Virtual World, and create a visualiser of degradation of the house over the years.
Carbon monoxide brings great harms to people dailys life. In addition, it's a very toxic gas undetectable by humans, it occurs when a device burns a fuel such as gas, wood, oil and its derivatives, etc. and spread...
详细信息
ISBN:
(纸本)9781728131573
Carbon monoxide brings great harms to people dailys life. In addition, it's a very toxic gas undetectable by humans, it occurs when a device burns a fuel such as gas, wood, oil and its derivatives, etc. and spreads very quickly inside the homes. This paper presents the design and implementation of IoT prototype for the detection of carbon monoxide based on the WeMos D1 mini board programmed by Arduino IDE software to prevent asphyxiation accidents. IoT technology gives us great capabilities for the development of Web applications that connect the real world to the digital world. In this prototype, we used the MQ-2 gas sensor for detection. When the gas concentration exceeds a first threshold, the system triggers the fan and if the detected value exceeds a second threshold greater than the first, it immediately alerts the users by sending alerts in the form of notifications via the Pushbullet platform.
image compression methods provide users the option to reduce the size of image data and significant amount of time for transmission of images. A perceptually lossless coder is desired to generate perceptually high qua...
详细信息
ISBN:
(纸本)9781424409822;1424409829
image compression methods provide users the option to reduce the size of image data and significant amount of time for transmission of images. A perceptually lossless coder is desired to generate perceptually high quality image with higher compression ratio. In this paper, a prototype of the scalable image coder based on the just noticeable distortion (JND) profile with subband discrete cosine transform (SBDCT) is built in the personal digital assistant (PDA). The coding scheme based on JND profile and SBDCT provides computational scalability, decodable by any current JPEG-compliance decoder and therefore permitting easy integration with any current JPEG- compliance imagesystems. To further evaluate this prototype, simulations in Pocket PC emulator and the actual implementation of the coder in PDA is carried out.
暂无评论