In energy-intensive industries, such as cement manufacturing, steal production, glass factories or in power plants classical fossil fuels, such as coal or gas, are replaced by more sustainable fuel sources derived fro...
In energy-intensive industries, such as cement manufacturing, steal production, glass factories or in power plants classical fossil fuels, such as coal or gas, are replaced by more sustainable fuel sources derived from biomass and/or waste streams. However, these fuels tend to be quite volatile according to their main mechanical and chemical properties, such as particle size distribution, bulk density, etc. Therefore, real-time characterization methods need to be developed in order to allow an optimized utilization of such fuels in industry. This paper presents a visual approach for the self-acting estimation of the particle size distribution of a given fuel based on monocular image streams. The suggested methodology follows an image segmentation approach based on deeplearning techniques. Due to the lack of ground truth data, an associated methodology for the automatic generation of a synthetic training data set is also presented. Different state-of-the-art segmentation models are implemented and trained on a training database for two different sustainable fuel sources. The performance is carefully validated by using different evaluation metrics. The implementation results showed that the deeplearning approach produced more accurate segmented images compared to conventional imageprocessing techniques.
On 2nd and 3rd October 2020, Storm Alex hit northern Italy and southern France regions with 500 mm of rainfall in about 24 hours. This triggered devastating flash floods and landslides, causing severe damages and 15 f...
详细信息
ISBN:
(纸本)9781665403696
On 2nd and 3rd October 2020, Storm Alex hit northern Italy and southern France regions with 500 mm of rainfall in about 24 hours. This triggered devastating flash floods and landslides, causing severe damages and 15 fatalities. This study presents a landslide inventory map obtained by using a generalized deep-learning model, avoiding human interaction in the workflow by skipping the time-consuming training step. A total of 1,249 landslides have been mapped with this approach in minutes after a suitable post-event satellite image was available for processing. Our results show how deep-learning strategies applied to remote sensing data can help in the aftermath of catastrophic events for the rapid detection and mapping of landslide phenomena.
With the rapid development of mobile Internet and self-media, it is becoming more and more convenient for people to obtain information, and the problem of information overload has increasingly affected people’s sense...
详细信息
Defocus blur detection, as an important pre-processing step of imageprocessing, has attracted more and more attention. Albeit great success has been made, there are still several challenges for accurate defocus blur ...
详细信息
Most face recognition methods employ single-bit binary descriptors for face representation. The information from these methods is lost in the process of quantization from real-valued descriptors to binary descriptors,...
详细信息
Most face recognition methods employ single-bit binary descriptors for face representation. The information from these methods is lost in the process of quantization from real-valued descriptors to binary descriptors, which greatly limits their robustness for face recognition. In this study, we propose a novel weighted feature histogram (WFH) method of multi-scale local patches using multi-bit binary descriptors for face recognition. First, to obtain multi-scale information of the face image, the local patches are extracted using a multi-scale local patch generation (MSLPG) method. Second, with the goal of reducing the quantization information loss of binary descriptors, a novel multi-bit local binary descriptor learning (MBLBDL) method is proposed to extract multi-bit local binary descriptors (MBLBDs). In MBLBDL, a learned mapping matrix and novel multi-bit coding rules are employed to project pixel difference vectors (PDVs) into the MBLBDs in each local patch. Finally, a novel robust weight learning (RWL) method is proposed to learn a set of robust weights for each patch to integrate the MBLBDs into the final face representation. In RWL, a codebook is first constructed by clustering MBLBDs on each local patch to extract a feature histogram. Then, considering that different parts of the face have different degrees of robustness to local changes, a set of weights is learned to concatenate the feature histograms of all local patches into the final representation of a face image. In addition, to further improve the performance for heterogeneous face recognition, a coupled WFH (C-WFH) method is proposed. C-WFH maintains the similarity of the corresponding MBLBDs and feature histograms for a pair of heterogeneous face images by means of a novel coupled feature learning (CFL) method to reduce the modality gap. A series of experiments are conducted on widely used face datasets to analyze the performance of WFH and C-WFH. Extensive experimental results show that WFH and C-
Ground penetrating radar (GPR) has been widely used for detection and localization of reinforced steel bar (rebar) in concrete in a non-destructive way. However, manual interpretation of a large number of GPR images i...
详细信息
Ground penetrating radar (GPR) has been widely used for detection and localization of reinforced steel bar (rebar) in concrete in a non-destructive way. However, manual interpretation of a large number of GPR images is time-consuming, and the results highly depend on practitioner experience and the available priori information. This paper proposes an automatic detection and localization method using deeplearning and migration. Firstly, a Single Shot Multibox Detector (SSD) model is established to identify regions of interest containing hyperbolas in a GPR image. This deeplearning model is trained using a real GPR dataset, which contains 13,026 rebar targets in 3992 images, collected on residential buildings under construction. Secondly, each target region is migrated and transformed into a binary image to locate the rebar. After the binarization, the apex of the focused cluster is obtained and used to estimate both the horizontal position and the depth of the rebar. The testing results show that the detection accuracy of the proposed artificial intelligence method is 90.9%. The computation time needed for processing a GPR image with a size of 300 x 300 pixels is only 0.47 s. The depth estimation error in a laboratory experiment is < 1.5 mm (5%), and the lateral position error is < 0.7 cm. Therefore, it is concluded that the proposed method can automatically detect the rebar from GPR images in realtime when a handheld GPR system is operated at a walking speed and the depth estimation accuracy is acceptable in practice.
Modern-era largely depends on deeplearning (DL) in a lot of applications. Medical images Diagnosis is one of the important fields nowadays because it is related to human life. But this DL requires large datasets as w...
详细信息
With the application of artificial intelligence more and more widely, the target detection of artificial intelligence "eyes" is becoming more and more important, which can give the machine the ability to det...
详细信息
We propose a watermarking method for protecting the Intellectual Property (IP) of Generative Adversarial Networks (GANs). The aim is to watermark the GAN model so that any image generated by the GAN contains an invisi...
详细信息
ISBN:
(数字)9798350309676
ISBN:
(纸本)9798350309676
We propose a watermarking method for protecting the Intellectual Property (IP) of Generative Adversarial Networks (GANs). The aim is to watermark the GAN model so that any image generated by the GAN contains an invisible watermark (signature), whose presence inside the image can be checked at a later stage for ownership verification. To achieve this goal, a pre-trained CNN watermarking decoding block is inserted at the output of the generator. The generator loss is then modified by including a watermark loss term, to ensure that the prescribed watermark can be extracted from the generated images. The watermark is embedded via fine-tuning, with reduced time complexity. Results show that our method can effectively embed an invisible watermark inside the generated images. Moreover, our method is a general one and can work with different GAN architectures, different tasks, and different resolutions of the output image. We also demonstrate the good robustness performance of the embedded watermark against several post-processing, among them, JPEG compression, noise addition, blurring, and color transformations.
With the development of the Internet of Things, the application of computer vision on mobile phones is becoming more and more extensive and people have higher and higher requirements for the timeliness of the recognit...
详细信息
With the development of the Internet of Things, the application of computer vision on mobile phones is becoming more and more extensive and people have higher and higher requirements for the timeliness of the recognition results returned and the processing capabilities of the mobile phone for image recognition. However, the processing capability and storage capability of the user terminal equipment cannot meet the needs of identifying and storing a large number of pictures, and the data transmission process will cause high energy consumption of the terminal equipment. At the same time, multisource deep transfer learning has outstanding performance in computer vision and image classification. However, due to the huge amount of calculation of the deep network model, it is impossible to use the existing excellent network model to realize image recognition and classification on the mobile terminal. In order to solve the abovementioned problems, we propose a multisource mobile transfer learning algorithm based on dynamic model compression, this algorithm considers the realization of multisource transfer learning computing in the case of multiple mobile device computing source domains, and the method also guarantees data privacy and security for each device (origin domain). Meanwhile, extensive experiments show that our method can achieve remarkable results in popular image classification datasets.
暂无评论