In this paper we describe the computer vision system TOROS developed at INETI to automate the volumetric evaluation procedure as the loads of logs enter the paper mill. The method consists of on- line analysis of the ...
详细信息
ISBN:
(纸本)0819412384
In this paper we describe the computer vision system TOROS developed at INETI to automate the volumetric evaluation procedure as the loads of logs enter the paper mill. The method consists of on- line analysis of the images of all the visible sides of the load of wood, assuming that the logs are always stacked the same way, namely across the width of the truck. The lateral images captured by the system contain information about the sectional area of the logs, and the rear image provides the data related to their length. Once a calibration procedure has been applied, the measurements of the gross volume presented to the vision system are evaluated, based on the automatic detection of the contours of regions of wood in all the images considered. The most important feature of this computer vision system is the possibility to provide a measure of the percentage of wood that is really present in the consignment, through the identification of all the spaces between the ends of logs in the lateral images.
In this talk, I report on a large-scale census of algorithm improvement spanning 11 sub-fields of computer science, 57 textbooks and more than 1,100 research *** 113 algorithm problems, we find enormous variation in h...
详细信息
ISBN:
(纸本)9781450391467
In this talk, I report on a large-scale census of algorithm improvement spanning 11 sub-fields of computer science, 57 textbooks and more than 1,100 research *** 113 algorithm problems, we find enormous variation in how fast algorithms have improved. Around half experience little or no improvement. At the other extreme, 13% experience transformative improvements, radically changing how and where they can be used. Overall, we find that, for moderate-sized problems, 30% to 45% of algorithmic problems had improvements comparable or greater than those that users experienced from Moore's Law and other hardware advances.I will also discuss our comparison of the upper bounds and lower bounds for these algorithm problems, where we find that nearly two-thirds are already asymptomatically optimal --- representing a triumph for the field, but also a challenge for future progress.
The introduction of digital pathology is changing the practice of diagnostic anatomic pathology. Digital pathology offers numerous advantages over using a physical slide on a physical microscope, including more discri...
详细信息
Document database preparation is a very time-consuming job and usually requires the involvement of many people. Any database is prone to having errors however carefully it was constructed. To assure the high quality o...
详细信息
ISBN:
(纸本)0819413909
Document database preparation is a very time-consuming job and usually requires the involvement of many people. Any database is prone to having errors however carefully it was constructed. To assure the high quality of the document image database, a carefully planned implementation methodology is absolutely needed. In this paper, an implementation methodology that we employed to produce the UW English Document Image Database I is described. The paper also discusses how to estimate the distribution of errors contained in a database based on a double-data entry/double verification procedure.
Four recently developed applications of image processing to astronomy are presented along with illustrative examples. These applications consist of: Automated location and analysis of star and galaxy images;Geometric ...
详细信息
The research presented in this paper is focused on the development of mathematical foundations and algorithm for locating multiple targets on film images. A locator algorithm with firm mathematical foundations has bee...
详细信息
ISBN:
(纸本)0819415367
The research presented in this paper is focused on the development of mathematical foundations and algorithm for locating multiple targets on film images. A locator algorithm with firm mathematical foundations has been developed to locate multiple targets. The algorithm is based upon the assumption that an image is composed of a mixture of component distributions, stemming from the different background and target regions in the image. Using both a maximum likelihood estimator and iterative clustering algorithm, a locator algorithm was developed to separate the mixture into its major components. Having the components of the mixture, objects are located by classifying the components of mixture and recognizing the targets based upon their size and shape. The algorithm has been tested on a set of images that were selected based upon anticipated difficult situations. The algorithm has demonstrated the ability to locate multiple objects in noisy and cluttered background scenes.
One high-payoff applications of image character recognition (ICR) technology is the automatic processing of business transaction documents. For remittance types of transactions, these documents consist of checks and i...
详细信息
ISBN:
(纸本)0819413909
One high-payoff applications of image character recognition (ICR) technology is the automatic processing of business transaction documents. For remittance types of transactions, these documents consist of checks and invoices. While the general layout of a check is consistent with respect to types of data fields present, there is variability in the locations of the data fields printed on the document. Furthermore, checks are printed using multiple fonts, character sizes, and line spacing on a single document. In contrast, invoice contents and layouts vary widely from business to business. The high degree of layout variability of business documents poses significant problems with respect to data field location and extraction in preparation for ICR. This paper describes an image understanding approach for locating and extracting data fields from various business documents. This approach is shown to be tolerant to image rotation, multiple fonts, multiple character sizes, and line spacing. Actual checks and invoices are processed using the described algorithms. The resulting field isolation and extraction performance, together with the resulting ICR read rates, are statistically analyzed and presented.
This paper describes a system developed for segmenting multiband grayscale images into n-class labeled images at high-throughput rates. This system, which we refer to as the segmentation engine, performs supervised im...
详细信息
ISBN:
(纸本)0819414786
This paper describes a system developed for segmenting multiband grayscale images into n-class labeled images at high-throughput rates. This system, which we refer to as the segmentation engine, performs supervised image segmentation using algorithms based on the statistical pattern recognition paradigm. So-called 'features' are computed for each pixel and the feature vector thus formed is presented to a statistical classifier, which uses feature information to determine the most probable class of the pixel. algorithms are described for the following: features, automatic feature selection, classification and classifier training. While this paper describes the entire system, the algorithmic approach will be emphasized.
This study was undertaken to simulator test and evaluate a complete drowsy driverdetection system. The goal of the study was to recommend optimal specifications for asystem to be further studied in an actual vehicle. ...
详细信息
This study was undertaken to simulator test and evaluate a complete drowsy driver
detection system. The goal of the study was to recommend optimal specifications for a
system to be further studied in an actual vehicle. The system used a set of algorithms
developed from previously collected data and a set of previously optimized advisory
tones, advisory messages, alarm stimuli, and drowsiness countermeasures. Detection
occurred if eye closure or lane excursion exceeded predetermined thresholds. Data were
obtained from six sleep-deprived subjects who drove a motion base automobile simulator
late at night. Each subject was trained in carefully observing lane boundaries, using a
device which sounded an alarm if lane boundaries were exceeded.
The performance aspect of the system dominated the detection process. None of the
algorithms tracked well with the measures they were designed to estimate; correlations
were much lower than expected. The algorithms relied heavily on the positioning of the
vehicle relative to the lane.
There is an increasing interest in the reliability of complex engineering systems, especially in the systems' through-life risk analysis. A complex system, like the civil aircraft engine studied in this paper, con...
详细信息
There is an increasing interest in the reliability of complex engineering systems, especially in the systems' through-life risk analysis. A complex system, like the civil aircraft engine studied in this paper, contains multiple potential failure modes throughout its life that are contributed by various sub-system and component failures going through different deterioration processes. In order to fulfill the requirements of efficient swap and replacement maintenance strategies in the aviation industry, it is important to quantify the individual component risks within a complex system to enable an accurate prediction of spare parts demands. We propose a novel data-driven hybrid-learning algorithm with three building blocks: pre-defined reliability model based on the Weibull distribution, automated unsupervised clustering, and the quality check & output. The algorithm enables the identification of the riskiest sub-systems and the associated reliability models are quantitatively calculated. As all component risks follow the Weibull distribution, the parameters can be obtained. A case study carried out on a fleet of civil aircraft engines shows that the algorithm enables a better understanding of sub-system level risks from system level performance records, improving the efficient execution of the maintenance strategy.
暂无评论