This work presents a strategy to track and describe the boundary of an environmental surface using a sequence of incomplete boundary images coming from an UAV with a camera onboard. The algorithm uses all captured ima...
详细信息
This work presents a strategy to track and describe the boundary of an environmental surface using a sequence of incomplete boundary images coming from an UAV with a camera onboard. The algorithm uses all captured images to feed the trajectory, which drives the UAV towards the next point to take the next shot, until the identification is completed. The multiple patterns of the input image make the problem difficult. Our approach orders the points of the image to identify the existent edges, and computes the trajectory as a minimization problem using a multi-objective function that gathers information about the boundary and the polynomial that fit in these edges.
This paper presents a text localization approach for binarized printed document images. Emphasis is given to the feature extraction and feature selection stages. In the former, several document structure elements and ...
详细信息
In harsh industrial environment, industrial wireless networks need high quality performance at real-time, deterministic schedule, reliability and low-power consumption, and so on, or it will bring disastrous consequen...
详细信息
The deployment of wireless technologies for device communication in the industrial control field is a challenging and promising issue mainly due to the increasing flexibility and the mobility. However, with limited re...
详细信息
In video-based surveillance people monitor a wide spatial area through video sensors for anomalous events related to safety and security. The size of the area, the number of video sensors, and the camera's narrow ...
In video-based surveillance people monitor a wide spatial area through video sensors for anomalous events related to safety and security. The size of the area, the number of video sensors, and the camera's narrow field-of-view make this a challenging cognitive task. computer vision researchers have developed a wide range of algorithms to recognize patterns in the video stream (intelligent cameras). These advances create a challenge for human supervision of these intelligent surveillance camera networks. This paper presents a new visualization that has been developed and implemented to integrate video-based computer vision algorithms with control of pan-tilt-zoom cameras in a manner that supports the human supervisory role.
We present an automatic query expansion approach by generalizing the vector space model of information retrieval. In this framework, the images are presented by vectors of weighted concepts similar to the keyword-base...
详细信息
ISBN:
(纸本)9781605584805
We present an automatic query expansion approach by generalizing the vector space model of information retrieval. In this framework, the images are presented by vectors of weighted concepts similar to the keyword-based representation in the text retrieval domain. The concepts comprise of color and texture patches from local image regions in a multi-dimensional feature space. To generate the concept vocabularies and represent the images, statistical model is built by utilizing a multi-class Support Vector Machine (SVM)-based classification technique. For automatic query expansion, the correlations between concepts are analyzed based on the neighborhood proximity between the concepts in encoded images by considering the local feedback information. The experimental results on a photographic image collection demonstrate the effectiveness of the proposed query expansion approaches. Copyright 2009 ACM.
We evolve tactical control for entity groups in a naval real-time strategy game. Since tactical maneuvering involves spatial reasoning, our evolutionary algorithm evolves a set of influence maps that help specify an e...
详细信息
We evolve tactical control for entity groups in a naval real-time strategy game. Since tactical maneuvering involves spatial reasoning, our evolutionary algorithm evolves a set of influence maps that help specify an entity's spatial objectives. The entity then uses the A* route finding algorithm to generate waypoints according to the influence map, and follows them to achieve spatial objectives. Using this representation, our evolutionary algorithm quickly evolves increasingly better capture-the-flag tactics on three increasingly difficult maps. These preliminary results indicate (1) the usefulness of our particular influence map encoding for representing spatially resolved tactics and (2) the potential for using co-evolution to generate increasingly complex and competent tactics in our game. More generally, this work represents another step in our ongoing effort to investigate the co-evolution of competent game players in a real-time, continuous, environment that does not assume complete knowledge of the game state.
This paper gives an overview of some recent advances in topological approaches to analog layout synthesis and in layout-aware analog sizing. The core issue in these approaches is the modeling of layout constraints for...
详细信息
An optical fault monitoring in FTTH-PON using ACS is demonstrated. This device can achieve real-time fault monitoring for protection feeder fiber. In addition, the ACS can distinguish optical fiber fault from the tran...
详细信息
The paper presents an optimization based algorithm for stabilizing retarded systems using a state derivative feedback controller. It is shown that an application of such a controller results in neutral dynamics of the...
详细信息
暂无评论