61 results on '"Full view"'
Search Results
2. Full-view in vivo skin and blood vessels profile segmentation in photoacoustic imaging based on deep learning
- Author
-
Jaeyeop Choi, Tan Hung Vo, Thi Thu Ha Vu, Chang-Seok Kim, Cao Duong Ly, Van Tu Nguyen, Junghwan Oh, Sudip Mondal, and Sumin Park
- Subjects
Computer science ,QC1-999 ,Full view ,QC221-246 ,Photoacoustic imaging in biomedicine ,Signal ,Segmentation ,In vivo ,Microscopy ,Radiology, Nuclear Medicine and imaging ,High resolution ,business.industry ,Deep learning ,Physics ,Ultrasound ,Acoustics. Sound ,QC350-467 ,Optics. Light ,U-Net ,Atomic and Molecular Physics, and Optics ,Artificial intelligence ,Photoacoustic imaging ,business ,Biomedical engineering ,Research Article - Abstract
Photoacoustic (PA) microscopy allows imaging of the soft biological tissue based on optical absorption contrast and spatial ultrasound resolution. One of the major applications of PA imaging is its characterization of microvasculature. However, the strong PA signal from skin layer overshadowed the subcutaneous blood vessels leading to indirectly reconstruct the PA images in human study. Addressing the present situation, we examined a deep learning (DL) automatic algorithm to achieve high-resolution and high-contrast segmentation for widening PA imaging applications. In this research, we propose a DL model based on modified U-Net for extracting the relationship features between amplitudes of the generated PA signal from skin and underlying vessels. This study illustrates the broader potential of hybrid complex network as an automatic segmentation tool for the in vivo PA imaging. With DL-infused solution, our result outperforms the previous studies with achieved real-time semantic segmentation on large-size high-resolution PA images.
- Published
- 2021
3. Improving the Performance of Multiobjective Genetic Algorithms: An Elitism-Based Approach
- Author
-
Giorgio Guariso and Matteo Sangiorgio
- Subjects
0209 industrial biotechnology ,Mathematical optimization ,education.field_of_study ,Fitness function ,lcsh:T58.5-58.64 ,Computer science ,lcsh:Information technology ,Population ,Pareto principle ,Full view ,Boundary (topology) ,02 engineering and technology ,multiobjective planning ,Maxima and minima ,hypervolume ,020901 industrial engineering & automation ,utopic solution ,elitism ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,education ,Implementation ,Information Systems ,Elitism - Abstract
Today, many complex multiobjective problems are dealt with using genetic algorithms (GAs). They apply the evolution mechanism of a natural population to a &ldquo, numerical&rdquo, population of solutions to optimize a fitness function. GA implementations must find a compromise between the breath of the search (to avoid being trapped into local minima) and its depth (to prevent a rough approximation of the optimal solution). Most algorithms use &ldquo, elitism&rdquo, which allows preserving some of the current best solutions in the successive generations. If the initial population is randomly selected, as in many GA packages, the elite may concentrate in a limited part of the Pareto frontier preventing its complete spanning. A full view of the frontier is possible if one, first, solves the single-objective problems that correspond to the extremes of the Pareto boundary, and then uses such solutions as elite members of the initial population. The paper compares this approach with more conventional initializations by using some classical tests with a variable number of objectives and known analytical solutions. Then we show the results of the proposed algorithm in the optimization of a real-world system, contrasting its performances with those of standard packages.
- Published
- 2020
4. Nothing else matters: Video games create sustained attentional selection away from task-irrelevant features
- Author
-
Paul Cairns, Joe Cutting, and Gustav Kuhn
- Subjects
Linguistics and Language ,Computer science ,05 social sciences ,Full view ,ComputingMilieux_PERSONALCOMPUTING ,Attention: Selective ,Experimental and Cognitive Psychology ,Stimulus (physiology) ,Attention: Interactions with Memory ,Attention: Divided Attention and Inattention ,050105 experimental psychology ,Sensory Systems ,Language and Linguistics ,Article ,Attentional set ,03 medical and health sciences ,0302 clinical medicine ,Video Games ,Immersion (virtual reality) ,Humans ,0501 psychology and cognitive sciences ,Attention ,030217 neurology & neurosurgery ,Cognitive psychology - Abstract
Feature-based attention allocates resources to particular stimulus features and reduces processing and retention of unattended features. We performed four experiments using self-paced video games to investigate whether sustained attentional selection of features could be created without a distractor task requiring continuous processing. Experiments 1 and 2 compared two versions of the game Two Dots, each containing a sequence of images. For the more immersive game post-game recognition of images was very low, but for the less immersive game it was significantly higher. Experiments 3 and 4 found that post-game image recognition was very low if the images were irrelevant to the game task but significantly higher if the images were relevant to the task. We conclude that games create sustained attentional selection away from task-irrelevant features, even if they are in full view, which leads to reduced retention. This reduced retention is due to differences in attentional set rather than a response to limited processing resources. The consistency of this attentional selection is moderated by the level of immersion in the game. We also discuss possible attentional mechanisms for the changes in recognition rates and the implications for applications such as serious games.
- Published
- 2020
5. Hybrid imaging technique of half ROI and full view scan for dose reduction
- Author
-
Hee-Joung Kim and Dohyeon Kim
- Subjects
Hybrid image ,Radon transform ,Computer science ,business.industry ,Full view ,Dose reduction ,Computer vision ,Reconstruction algorithm ,Artificial intelligence ,Imaging technique ,Projection (set theory) ,business ,Rotation (mathematics) - Abstract
Although many studies of iterative based reconstruction algorithm have been performed on dose reduction in medical applications, there is little research on how to approach the systematical acquisition method to reduce the dose. In this study, we proposed a hybrid imaging technique using half ROI and full view scan as a new acquisition method. A prototype of the CT system (TVX-IL1500H, GERI, Korea) was used. The source-to-detector and the source-to-center of rotation distance were 1178 and 905 mm, respectively. A total of 720 projection data were obtained, from which full view CT reconstructed images were obtained as a reference image using a filtered back projection (FBP). Interior ROI CT images were reconstructed using the 720 truncated projection data. Proposed hybrid CT image was reconstructed using 360 truncated and variable number of nontruncated full-size projection data. We set a total of 6 acquisition parameters according to the number of full-size projection data and acquire hybrid images. Dose reduction can be achieved through half ROI and full view scan. As the number of nontruncated full-size projection data on the hybrid image increases, the CNR value increases. FOM values were also derived for each parameter. In conclusion, appropriate acquisition parameter for half ROI and full view scan was derived based on the FOM values.
- Published
- 2020
- Full Text
- View/download PDF
6. Additive Manufacturing of 3D Biomodels as Adjuvant in Intracranial Aneurysm Clipping
- Author
-
Percy Nohama, André Giacomelli Leal, and Mauren Abreu de Souza
- Subjects
medicine.medical_specialty ,Manufacturing technology ,Computer science ,0206 medical engineering ,Biomedical Engineering ,Full view ,Medicine (miscellaneous) ,Bioengineering ,02 engineering and technology ,General Medicine ,030204 cardiovascular system & hematology ,020601 biomedical engineering ,Biomaterials ,03 medical and health sciences ,DICOM ,0302 clinical medicine ,Microsurgical clipping ,Aneurysm clipping ,Surgical anatomy ,Surgery procedure ,medicine ,Radiology ,Radiation treatment planning - Abstract
One of the main difficulties in intracranial aneurysms (IA) surgery refers to the choice of the appropriate clip(s) to be implanted. Although the imaging exams currently available ensure visualization of IA's morphology, they do not bring an accurate reference positioning for the surgeon in executing the surgery procedure nor efficiently contribute to planning the surgery. Unfortunately, for IA's largely inaccessible regions, there is not an efficient method of treatment planning. Therefore, we propose a novel method that allows the generation of a 3D biomodel of the IA region under investigation using additive manufacturing technology (AM). Thus, a physical copy of the IA is produced and offers the surgeon a full view of the anatomy of that region of the brain. The aim of this study is the creation of a flexible 3D physical model (elastomer) through the AM technique, in order to allow the clip selection prior to the surgery. DICOM angio-CT images from eight patients who underwent IA surgery were transformed into STL format and then built on a 3D printer. Preoperative surgical clip selection was performed and then compared with those used in surgery. At the end of the study, all 3D IA biomodels were reproduced for microsurgical clipping selection and it was possible to predict the metal clip to be used in the surgery. In addition, the proposed methodology helps to clarify the surgical anatomy and to avoid excessive manipulation of the intracranial arteries and prolonged surgical time. The major advantage of this technology is that the surgeon can closely study complex cerebrovascular anatomy from any perspective using realistic 3D biomodels, which can be handheld, allowing simulation of intraoperative situations and anticipation of surgical challenges.
- Published
- 2018
- Full Text
- View/download PDF
7. Error analysis of optical system for full-view and high-precision three-dimensional measuring instrument
- Author
-
He Lei, Guo Xinmin, Pan Xin, Zhang Jianlong, Yang Zhen, and Kang Weimin
- Subjects
Computer science ,Error analysis ,business.industry ,Full view ,Measuring instrument ,Computer vision ,Artificial intelligence ,business ,Atomic and Molecular Physics, and Optics - Published
- 2018
- Full Text
- View/download PDF
8. Multi-Stage CPI Stacks
- Author
-
Wim Heirman, Kristof Du Bois, Ibrahim Hur, and Stijn Eyerman
- Subjects
Multi-core processor ,Hardware_MEMORYSTRUCTURES ,Computer science ,Full view ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,02 engineering and technology ,020202 computer hardware & architecture ,Pipeline transport ,Multi stage ,Stack (abstract data type) ,Computer engineering ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Instruction pipeline - Abstract
CPI stacks are an intuitive way to visualize processor core performance bottlenecks. However, they often do not provide a full view on all bottlenecks, because stall events can occur concurrently. Typically one of the events is selected, which means information about the non-chosen stall events is lost. Furthermore, we show that there is no single correct CPI stack: stall penalties can be hidden, can overlap or can cause second-order effects, making total CPI more complex than just a sum of components. Instead of showing a single CPI stack, we propose to measure multiple CPI stacks during program execution: a CPI stack at each stage of the processor pipeline. This representation reveals all performance bottlenecks and provides a more complete view on the performance of an application. Multi-stage CPI stacks are easy to collect, which means that they can be included in a simulator with negligible slowdown, and that they can be included in the core hardware with limited overhead.
- Published
- 2018
- Full Text
- View/download PDF
9. Body Part Labelling with Minkowski Networks
- Author
-
Steven Mills, Joseph Cahill-Lane, and Stuart Duncan
- Subjects
Training set ,Computer science ,business.industry ,Full view ,Point cloud ,Small sample ,Pattern recognition ,02 engineering and technology ,010501 environmental sciences ,Skeleton (category theory) ,01 natural sciences ,Labelling ,Minkowski space ,0202 electrical engineering, electronic engineering, information engineering ,Deep neural networks ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,0105 earth and related environmental sciences - Abstract
Labelling body parts in depth images is useful for a wide variety of tasks. Many approaches use skeleton-based labelling, which is not robust when there is a partial view of the figure. In this work we show that Minkowski networks, which have recently been developed for 3D point cloud labelling of scenes, can be used to label point clouds with body part categories, achieving 85.6% accuracy with a full view of the figure, and 82.1% with partial views. These results are limited by a small sample size of our training data, but there is evidence that some of these ‘misclassifications’ may be correcting mistakes in the reference labelling. Overall, we demonstrate that Minkowski networks are effective for body part labelling in point clouds, and are robust to occlusion.
- Published
- 2019
- Full Text
- View/download PDF
10. Streaming Route Assignment for Connected Autonomous Vehicles (Systems Paper)
- Author
-
Kotagiri Ramamohanarao, Egemen Tanin, Sadegh Motallebi, Jianzhong Qi, and Hairuo Xie
- Subjects
050210 logistics & transportation ,Route assignment ,Computer science ,05 social sciences ,Real-time computing ,Full view ,020302 automobile design & engineering ,02 engineering and technology ,Plan (drawing) ,Competitor analysis ,Advanced Traffic Management System ,0203 mechanical engineering ,0502 economics and business ,Management system ,Traffic optimization ,Information system - Abstract
In the coming era of connected autonomous vehicles, data-driven traffic optimization will reach its full potential. By collecting highly detailed real-time traffic data from sensors and vehicles, a traffic management system will have the full view of the entire road network, allowing it to plan traffic in a virtual world that replicates the real road network. This will bring significant innovations to transport-domain applications. We prototype a traffic management system that can perform traffic optimization with connected autonomous vehicles. We propose two route assignment algorithms that aim to reduce traffic delays by reducing intersecting routes. The proposed algorithms and two state-of-the-art route assignment algorithms are implemented in the prototype system. We evaluate the algorithms with both synthetic and real road networks. The experimental results show that the proposed algorithms outperform competitors in terms of the travel times of the routes.
- Published
- 2019
- Full Text
- View/download PDF
11. An efficient approximate algorithm for achieving (k − !) barrier coverage in camera wireless sensor networks
- Author
-
Chu Minh Thang, Vu Trung Nghia, Dang Lam San, Vu Le Loi, Nguyen Thi My Binh, and Huynh Thi Thanh Binh
- Subjects
Computer science ,Path (graph theory) ,Full view ,Camera sensor networks ,Partition (number theory) ,Wireless camera sensor networks ,Academic community ,Image sensor ,Algorithm ,Wireless sensor network - Abstract
Barrier coverage problems in wireless camera sensor networks (WCSNs) have drawn the attention by academic community because of their huge potential applications. Various versions of barrier coverage under WCSNs have been studied such as minimal exposure path, strong/weak barrier, 1/k barrier, full view barrier problems. In this paper, based on new (k−ω) coverage model, we study how to achieve (k −ω) barrier coverage problem under uniform random deployment scheme (hereinafter A(k − ω)BC problem). This problem aims to juggle whether any given camera sensor networks is (k − ω) barrier coverage. A camera sensor network is called (k − ω) barrier coverage if any crossing path is (k − ω) coverage. The A(k − ω)BC problem is useful because it can make balance of the number of camera sensors used and the information retrieved by the camera sensors. Furthermore, this problem is vital for design and applications for camera sensor networks when camera sensor nodes were deployed randomly. Thus, we formulate the A(k − ω)BC problem and then proposed an efficient method named Dynamic Partition for solving this problem . An extensive experiments were conducted on random instances, and the results indicated that the proposed algorithm can achieve high quality and stable solutions in real-time execution.
- Published
- 2019
- Full Text
- View/download PDF
12. Understanding CARD Tricks in Apoptosomes
- Author
-
Qi Qiao, Li Wang, and Hao Wu
- Subjects
Models, Molecular ,0301 basic medicine ,Structure (mathematical logic) ,Computer science ,Full view ,Apoptosis ,Nanotechnology ,Crystallography, X-Ray ,Data science ,Article ,Caspase 9 ,Protein Structure, Secondary ,Enzyme Activation ,03 medical and health sciences ,Apoptotic Protease-Activating Factor 1 ,030104 developmental biology ,Protein Domains ,Structural Biology ,Apoptosomes ,Scattering, Small Angle ,Humans ,Protein Multimerization ,Architecture ,Molecular Biology ,Protein Binding - Abstract
Death domain (DD)-fold assemblies play a crucial role in regulating the signaling to cell survival or death. Here we report the crystal structure of the caspase recruitment domain (CARD)-CARD disk of the human apoptosome. The structure surprisingly reveals that three 1:1 Apaf-1:procaspase-9 CARD protomers form a novel helical DD-fold assembly on the heptameric wheel-like platform of the apoptosome. The small-angle X-ray scattering and multi-angle light scattering data also support that three protomers could form an oligomeric complex similar to the crystal structure. Interestingly, the quasi-equivalent environment of CARDs could generate different quaternary CARD assemblies. We also found that the type II interaction is conserved in all DD-fold complexes, whereas the type I interaction is found only in the helical DD-fold assemblies. This study provides crucial insights into the caspase activation mechanism, which is tightly controlled by a sophisticated and highly evolved CARD assembly on the apoptosome, and also enables better understanding of the intricate DD-fold assembly.
- Published
- 2017
- Full Text
- View/download PDF
13. How Technology to Promote Learning Performance -An Empirical Study Based on Three Classes
- Author
-
Hang Hu
- Subjects
Dilemma ,Empirical research ,Resource (project management) ,Computer science ,Psychology of learning ,Full view ,Mathematics education ,Cognition ,Constructivist teaching methods ,Focus (linguistics) - Abstract
This research is based on the view that technology is the learner's way of life, and starts from the dilemma and problem of technology promoting learning. Using CTCL Research Paradigm that is based on Cognitive and Brain Science, Learning Psychology. and Constructivist Learning Theory, and using Learner-Centered Design based on the four variables of learning content, resource characterization, learning sequence and learning mode, this paper presents an empirical study on the three classes of G, M, and L. From the data analysis and discussion, three conclusions on technology for learning can be summarized. First is about whether the technology can promote learning. Second is about how technology could promote learning and should focus on learning content, learning resources, learning activities, etc. Third is about how the CTCL research paradigm provides an experimental way to focus on learning and provide a full view to technical effectiveness.
- Published
- 2018
- Full Text
- View/download PDF
14. Rapid generation of full view image based on multi-camera
- Author
-
Zhao-Kun Guo, Wei Li, and Wen-Xian Zeng
- Subjects
business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Full view ,Scale-invariant feature transform ,Multi camera ,RANSAC ,Image (mathematics) ,Transformation matrix ,Transformation (function) ,Computer vision ,Artificial intelligence ,business ,Image based - Abstract
In order to obtain the full view image, proposing a fast method of generating full view images based on camera. the method based on multi-camera equipment and the spherical transform of the camera image acquisition using sphere transformation model. the improved SIFT algorithm is used to extract keypoints and match keypoints, and then calculating the transformation matrix based on the keypoints that filtered. finally, according to the projection matrix and transform matrix of each image, the images of subsequent cameras are spliced together. Using this method to generate full view images. the speed is fast and real-time.
- Published
- 2018
- Full Text
- View/download PDF
15. Wireless Mesh Communication Technologies and Protocols for a Full-View Camera Sensor Network Used in Maritime Surveillance
- Author
-
Hamada Alshaer, Peng-Yong Kong, Mohamed Manoufali, and Shihab Jimaa
- Subjects
Oil exploration ,Wireless mesh network ,Operation safety ,Computer science ,Container (abstract data type) ,Camera sensor networks ,Full view ,Computer security ,computer.software_genre ,Crude oil ,computer ,Telecommunications network ,GeneralLiterature_MISCELLANEOUS - Abstract
Maritime oil exploration and transportation has increased more steeply due to the expansion of the world crude oil and natural gas production. The probability of oilrig pollution, burning, and explosion continues to rise. All these factors stimulate a greater danger for vessels, oil operation safety, and maritime environment. The continuous surveillance of the offshore oil fields and container vessels is essential to secure the production flow, avoid trespassing, and prevent vandalism from intruders and pirates. However, developing a large-scale camera sensor network (CSN) for a maritime surveillance is a challenging problem due to the environment complexity and network connectivity. Maritime wireless mesh networks (MWMNs) are envisaged to provide network connectivity in maritime environment and enable users to access the terrestrial communication networks. The high cost and low data-rate of satellite and other legacy maritime communication technologies and systems deployed in MWMNs pose a major limitation to establishing reliable and affordable maritime communications.
- Published
- 2018
- Full Text
- View/download PDF
16. Interpreting Indoor Scene from a Single Full-View Image
- Author
-
Shigang Li and Hanchao Jia
- Subjects
Computer science ,business.industry ,Full view ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Image (mathematics) - Published
- 2015
- Full Text
- View/download PDF
17. Maximizing full-view target coverage in camera sensor networks
- Author
-
Cailin Dong, Ling Guo, Ying Yu, Yi Hong, and Jinglan Jia
- Subjects
Computer Networks and Communications ,Computer science ,010401 analytical chemistry ,Real-time computing ,Full view ,Approximation algorithm ,020206 networking & telecommunications ,02 engineering and technology ,01 natural sciences ,0104 chemical sciences ,Scheduling (computing) ,Hardware and Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Camera sensor networks ,Image sensor ,Software - Abstract
Traditional target coverage only ensures monitoring of targets. However, as people’s security awareness increases, the requirement for target coverage also increases from monitoring to identification. Thus full-view coverage model is proposed to guarantee that any facing direction of a target could be covered. Based on this coverage model, we study the maximum full-view target coverage problem in camera sensor networks, where each camera sensor has P working directions, aiming at maximizing the number of full-view covered targets by scheduling the working directions of camera sensors. To solve this problem, we design a ( 1 − 1 e ) -approximation algorithm based on pipage rounding and an efficient heuristic algorithm. Finally, simulation results are presented to demonstrate the performance of our algorithms.
- Published
- 2019
- Full Text
- View/download PDF
18. Sequential Summarization: A Full View of Twitter Trending Topics
- Author
-
You Ouyang, Wenjie Li, Dehong Gao, Renxian Zhang, and Xiaoyan Cai
- Subjects
Sequence ,Information retrieval ,Acoustics and Ultrasonics ,Computer science ,Full view ,Novelty ,Snippet ,Automatic summarization ,Data science ,Task (project management) ,Computational Mathematics ,Order (exchange) ,Multi-document summarization ,Computer Science (miscellaneous) ,Electrical and Electronic Engineering - Abstract
As an information delivering platform, Twitter collects millions of tweets every day. However, some users, especially new users, often find it difficult to understand trending topics in Twitter when confronting the overwhelming and unorganized tweets. Existing work has attempted to provide a short snippet to explain a topic, but this only provides limited benefits and cannot satisfy the users' expectations. In this paper, we propose a new summarization task, namely sequential summarization, which aims to provide a serial of chronologically ordered short sub-summaries for a trending topic in order to provide a complete story about the development of the topic while retaining the order of information presentation. Different from the traditional summarization task, the numbers of sub-summaries for different topics are not fixed. Two approaches, i.e., stream-based and semantic-based approaches, are developed to detect the important subtopics within a trending topic. Then a short sub-summary is generated for each subtopic. In addition, we propose three new measures to evaluate the position-aware coverage, sequential novelty and sequence correlation of the system-generated summaries. The experimental results based on the proposed evaluation criteria have demonstrated the effectiveness of the proposed approaches.
- Published
- 2014
- Full Text
- View/download PDF
19. DISAGREE: disagreement-based querying in wireless sensor networks
- Author
-
Javier Gomez, Miguel Lopez-Guerrero, and Martha Montes-de-Oca
- Subjects
business.industry ,Computer science ,Full view ,Assertion ,computer.software_genre ,Network simulation ,Key distribution in wireless sensor networks ,Data acquisition ,Redundancy (engineering) ,Data mining ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Spatial analysis ,computer ,Computer network - Abstract
Traditional data acquisition methods for wireless sensor networks (WSNs) require all sensor nodes to transmit at least once to the sink node to obtain a full view of the network. In this paper we present Disagree, a different data acquisition method to retrieve data in WSNs that works in the opposite way as compared with traditional methods. In Disagree, only nodes that do not satisfy an assertion are required to transmit data back to the sink node in order to obtain a complete view of the network. We show that this behavior is the base of an energy-efficient way to gather all data. An important feature of Disagree is that it saves energy at the sensor level by exploiting data correlation. Rather than requesting explicit data readings from all sensor nodes, Disagree estimates the readings from sensor nodes that did not respond to the assertion. As a result of this policy, Disagree can obtain a view of the sensing field with different levels of resolution involving the transmission of only a subset of the sensor nodes by exploiting spatial data redundancy. We implemented Disagree in NS-2 network simulator and results indicate Disagree can significantly reduce the percentage of nodes replying to queries compared with flat and a cluster head based approaches.
- Published
- 2013
- Full Text
- View/download PDF
20. A review on satellite image mosaicing
- Author
-
Hinal Fifadra and Deval Parikh
- Subjects
Computer science ,business.industry ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Full view ,Scale-invariant feature transform ,Single frame ,Robustness (computer science) ,Satellite image ,Medical imaging ,Computer vision ,Satellite ,Artificial intelligence ,business - Abstract
For viewing the complete image sent by the satellite to the earth image mosaicing is must. It integrates the different images sent, in a single frame for the full view of that big image. In this paper, we have mentioned two methods of satellite image mosaicing. These methods are EsiReg using SIFT algorithm and other method using SURF algorithm. There is also a brief comparison of these two methods. We have also proposed an automated method called SIGMA and its advantages over the other two.
- Published
- 2017
- Full Text
- View/download PDF
21. Route design for community patrol by aircraft
- Author
-
Da Liu and Houjun Yang
- Subjects
Basis (linear algebra) ,Computer science ,Real-time computing ,Boustrophedon ,Full view ,Rectangle ,MATLAB ,Grid ,Full coverage ,computer ,computer.programming_language - Abstract
The paper mainly focuses on the route design for community patrol by aircraft. On the basis of the surrounding condition, the aircraft will first build a model of the surrounding environment, grid the model next, and rectangle irregular barriers in the model. Based on Boustrophedon, the paper has raised a new strategy for gridding the surrounding environment. Under the new strategy, the overall environment will be divided into few patches. By covering all the patches, we will secure a full view of the surrounding environment. With the contribution of MATLAB, the aircraft has achieved experimental simulation over the whole area, as such, the whole environment has ensured a full coverage.
- Published
- 2017
- Full Text
- View/download PDF
22. Toward Optimal Orientation Scheduling for Full-View Coverage in Camera Sensor Networks
- Author
-
Jiming Chen, Qi Zhang, and Shibo He
- Subjects
Schedule ,Computer science ,business.industry ,010401 analytical chemistry ,Real-time computing ,Full view ,020206 networking & telecommunications ,02 engineering and technology ,01 natural sciences ,0104 chemical sciences ,Scheduling (computing) ,0202 electrical engineering, electronic engineering, information engineering ,Camera sensor networks ,Computer vision ,Artificial intelligence ,Image sensor ,business - Abstract
In this paper, we study full-view coverage in camera sensor networks, by exploiting their limited mobility of orientation rotation. We focus on the fairness based coverage maximization problem, i.e., how to schedule the orientations of the camera sensors to maximize the minimum accumulated full-view coverage time of target points. To solve this problem, we first try to reduce the space dimension of orientation search by dividing the orientation space into a set of discrete regions. We select the minimum number of sensing regions that camera sensors should rotate to in order to ensure the full-view coverage of all target points. Next, we attempt to understand the relationship of full-view coverage among the target points, which are spatially coupled. Based on results in these two steps, we devise an algorithm to solve the problem based on "largest demand first serve" principle. We provide extensive simulations to demonstrate the desired performance of the proposed algorithms.
- Published
- 2016
- Full Text
- View/download PDF
23. An application research of colorimetric temperature measuring in steel billet of heating furnace
- Author
-
Jian Chao Qin, Liyan Cai, Jian Zheng, and Ming Gao
- Subjects
Computer science ,Control system ,Black box ,Metallurgy ,Full view ,Process (computing) ,Mechanical engineering ,Furnace temperature ,Tracking (particle physics) ,Temperature measurement ,Heating furnace - Abstract
At present, there is a common usage of adhering temperature recorder like black box to the surface of steel billet in the iron and steel Industry. After the heating process we can get the data and then analyze the heating process and establish a heating model of it. However, it's not easy to upmost the controlling in the practical application, this article use the full view real-time monitoring technology by applying a heat tracking precision instrument to monitor the temperature of the surface of inner steel billet, so we can get billet surface temperature distribution data through real-time online monitor and handle the image of the surface, then send the temperature distribution to the optimized control system and realize optimization control of the furnace temperature.
- Published
- 2016
- Full Text
- View/download PDF
24. Achieving Full-View Barrier Coverage with Mobile Camera Sensors
- Author
-
Shenghui Zhao, Xiaolan Liu, Yuanyuan Fan, and Bin Yang
- Subjects
Computer science ,business.industry ,010401 analytical chemistry ,Real-time computing ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Full view ,020206 networking & telecommunications ,02 engineering and technology ,01 natural sciences ,0104 chemical sciences ,Embedded system ,0202 electrical engineering, electronic engineering, information engineering ,Mobile camera ,Image sensor ,business ,Wireless sensor network - Abstract
Barrier coverage is a critical issue in wireless sensor networks for many practical applications, e.g., national border monitoring, security surveillance and intruder detection, etc. Its aim is to detect intruders that attempt to cross the protected region. Available works mainly focused on the barrier coverage of static directional sensors (e.g., cameras), which leads to a waste of redundant camera sensors with limited coverage area and sensing angles. In this paper, we study how to achieve full-view barrier coverage with mobile camera sensors. We first deploy mobile camera sensors to form full-view barrier coverage in a random environment. Then we propose a novel full-view barrier covered model to select mobile camera sensors. Finally, we analyze and optimize the number of camera sensors required for this specific model. Extensive simulation results are provided to illustrate that our proposed solution outperforms others in terms of minimum number of camera sensors.
- Published
- 2016
- Full Text
- View/download PDF
25. Experiment on Tele-immersive Communication with Tiled Display Wall over Wide Area Network
- Author
-
Yoshitaka Shibata and Yasuo Ebara
- Subjects
Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Full view ,General Medicine ,law.invention ,Visualization ,Projector ,Transmission (telecommunications) ,Wide area ,law ,Wide area network ,Computer graphics (images) ,Computer vision ,Artificial intelligence ,Scale (map) ,business ,Observation data - Abstract
In order to support advanced remote collaborative works via WAN, sharing various visual contents between remote sites and displaying the existence of remote participants by transmission of high-quality video streaming in real scene is important. However, the display specification of large-scale screen system such as commercial projector and wide-area monitor to display these visual contents is low-resolution, and displaying of real video streaming with sufficient quality is difficult. In this paper, we have constructed tele-immersive environment with tiled display wall to realize dis- playing real video streaming and visual contents by high-resolution. In addition, we have tried the construction of the envi- ronment to display more high-quality video streaming on tiled display wall by transmitting multi-video streaming which captured by two cameras in remote site. By using the environment, we have conducted some experiments on tele-immersive communication on JGN2plus network which is a nationwide scale WAN. From experimental results, we have showed that these video streaming have been displayed wide area of remote site more high-quality than magnified view of video by a single small camera. Moreover, we have tried realistic display processing of ultra resolution astronomi- cal observation image and movie data to display in full view visualization contents with ultra resolution which is difficult to display on a usual PC. As these results, we have enabled to observe the entire image of observation data all over tiled dis- play wall.
- Published
- 2012
- Full Text
- View/download PDF
26. Google Books and WorldCat: a comparison of their content
- Author
-
Xiaotian Chen
- Subjects
Information retrieval ,Computer science ,Search engine indexing ,Full view ,Library and Information Sciences ,Snippet ,Digital library ,Library catalog ,Computer Science Applications ,World Wide Web ,Link rate ,Google Penguin ,Information Systems ,Google Panda - Abstract
PurposeThe purpose of this paper is to compare Google Books with WorldCat and to assess some other functionalities of Google Books.Design/methodology/approachOver 500 random samples generated from WorldCat were searched on Google Books. The search results were used to compare the coverage between Google Books and WorldCat, to estimate the successful link rate to a local library catalogue, the percentage available as full view, snippet, and preview on Google Books, and other services of Google Books.FindingsGoogle Books can retrieve almost all the books catalogued in WorldCat. Its “Find in a library” link to a local library catalogue works 75 percent of the time. Fewer than 10 percent of Google Books items have free full views, and about 15 percent have snippets and previews, respectively. Previews are much more useful than snippets. Google Books probably indexes books that it does not possess in digital form, in addition to indexing all the books that it has acquired in digital form.Originality/valueNo previous empirical studies of this kind have been found. This study assesses Google Books' coverage and services with quantitative measures.
- Published
- 2012
- Full Text
- View/download PDF
27. The polarization compass dominates over idiothetic cues in path integration of desert ants
- Author
-
Fleur Lebhardt, Julja Koch, and Bernhard Ronacher
- Subjects
Physiology ,Computer science ,media_common.quotation_subject ,Full view ,Walking ,Polarizing filter ,Aquatic Science ,Homing Behavior ,Orientation ,Compass ,Path integration ,Animals ,Computer vision ,Molecular Biology ,Ecology, Evolution, Behavior and Systematics ,media_common ,Communication ,biology ,Ants ,business.industry ,Proprioception ,Polarization (waves) ,biology.organism_classification ,Sky ,Cataglyphis ,Space Perception ,Insect Science ,Sunlight ,Animal Science and Zoology ,Idiothetic ,Artificial intelligence ,Cues ,Desert Climate ,business - Abstract
SUMMARY Desert ants, Cataglyphis, use the sky's pattern of polarized light as a compass reference for navigation. However, they do not fully exploit the complexity of this pattern, rather – as proposed previously – they assess their walking direction by means of an approximate solution based on a simplified internal template. Approximate rules are error-prone. We therefore asked whether the ants use additional cues to improve the accuracy of directional decisions, and focused on ‘idiothetic’ cues, i.e. cues based on information from proprioceptors. We trained ants in a channel system that was covered with a polarization filter, providing only a single e-vector direction as a directional ‘celestial’ cue. Then we observed their homebound runs on a test field, allowing full view of the sky. In crucial experiments, the ants were exposed to a cue conflict, in which sky compass and idiothetic information disagreed, by training them in a straight channel that provided a change in e-vector direction. The results indicated that the polarization information completely dominates over idiothetic cues. Two path segments with different e-vector orientations are combined linearly to a summed home vector. Our data provide additional evidence that Cataglyphis uses a simplified internal template to derive directional information from the sky's polarization pattern.
- Published
- 2012
- Full Text
- View/download PDF
28. Tracking Feature Points of Fisheye Full-View Image by Normalized Image Patch
- Author
-
Xuebin Qin and Shigang Li
- Subjects
Computer science ,business.industry ,Full view ,Pattern recognition ,Kalman filter ,Tracking (particle physics) ,Fast tracking ,Image (mathematics) ,Feature (computer vision) ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Feature detection (computer vision) - Published
- 2012
- Full Text
- View/download PDF
29. Cognitive Understanding of Object Permanence in Mandrills (Mandrillus sphinx, L.)
- Author
-
Stefanie M. Zimmer, Maren Schwenke, Ralf Wanker, Anna Gabel, Carsten Lucass, and Christina Bietz
- Subjects
Object permanence ,biology ,Computer science ,business.industry ,Full view ,Cognition ,Displacement (linguistics) ,Object (philosophy) ,General Biochemistry, Genetics and Molecular Biology ,Mandrillus sphinx ,Colored ,biology.animal ,Container (abstract data type) ,Computer vision ,Artificial intelligence ,General Agricultural and Biological Sciences ,business - Abstract
Object permanence tests are a standard procedure to test the cognitive ability to mentally follow a hidden object. To test this capacity in mandrills, we used visible and color-tracking with invisible displacement tests. During visible displacement the object was hidden and moved within its container in full view of the tested individual. During color-tracking with invisible displacement the object was hidden in a colored container, also in full view, but then moved within its container out of view. The tested mandrills were successful in the visible but not in the color-tracking with invisible displacement tests. They did not use the color as a cue for the correct container. One of the animals memorized the position of the container, in which the reward was dropped before the invisible displacement. We assume that the capacity of solving invisible displacement tests has evolved after the evolutionary separation of mandrills and apes.
- Published
- 2009
- Full Text
- View/download PDF
30. Research on the New Full View Detection Equipment of Bridge Superstructure
- Author
-
Jinbo Song
- Subjects
Ccd camera ,Computer science ,business.industry ,Computer graphics (images) ,Full view ,Robot ,Computer vision ,Artificial intelligence ,business - Published
- 2016
- Full Text
- View/download PDF
31. Prototyping a Panoptic Camera by means of High Level Synthesis: Demo
- Author
-
Stéphane Mancini, Sylvain Guy, Torella, Lucie, Techniques of Informatics and Microelectronics for integrated systems Architecture (TIMA), Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP)-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes (UGA), Techniques de l'Informatique et de la Microélectronique pour l'Architecture des systèmes intégrés (TIMA), and Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP )-Centre National de la Recherche Scientifique (CNRS)-Université Grenoble Alpes [2016-2019] (UGA [2016-2019])
- Subjects
Computer science ,business.industry ,[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH] ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Full view ,Set (abstract data type) ,Image stitching ,[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH] ,PACS 8542 ,Computer graphics (images) ,High-level synthesis ,Computer vision ,Artificial intelligence ,business ,ComputingMilieux_MISCELLANEOUS - Abstract
A panoptic camera allows to acquire a full 360 degree view of a scene by stitching images from a set of cameras [1, 3, 2, 5]. The images from the cameras are acquired at different positions and orientations to form a full view image. Stitching is performed by mixing and transforming the different images according to non-linear mapping equations. There are two kinds of stitching algorithms
- Published
- 2016
32. Survey on role of Memristor in electronics
- Author
-
M. Micheal Priyanka and T. Ravi
- Subjects
Hardware_MEMORYSTRUCTURES ,business.industry ,Computer science ,Electrical engineering ,Full view ,Potential candidate ,Semiconductor device ,Memristor ,law.invention ,Non-volatile memory ,Power consumption ,law ,Logic gate ,Electronics ,business - Abstract
Semiconductor devices are scale down to micro meter to Nano meter range; nonvolatile memory technologies are approaching their physical limits. One such device is Memristor. Memristors is having rapid growth during the past some years. Compared with transistor-related memory technology, memristors viewed as potential candidate for future memory devices due to their compact size and less power consumption. This survey will tell about the memristor's operation, functionality, characteristics, types of memristor, fabrication methods of memristor and etc. This will helps to know about the full view of the memristor.
- Published
- 2015
- Full Text
- View/download PDF
33. The Need for a Full View Integrated Approach
- Author
-
Xin Xie
- Subjects
Computer science ,Systems engineering ,Full view ,Integrated approach - Published
- 2015
- Full Text
- View/download PDF
34. The AISL head orientation database and preliminary evaluations
- Author
-
Bima Sena Bayu Dewantara and Jun Miura
- Subjects
Database ,business.industry ,Computer science ,Orientation (computer vision) ,Head (linguistics) ,Full view ,Interval (mathematics) ,computer.software_genre ,Straight ahead ,Classification methods ,Computer vision ,Artificial intelligence ,business ,computer ,Strengths and weaknesses - Abstract
In this paper, we describe the acquisition procedure and contents of a head orientation database, called as AISL head orientation database. The primary goals of creating the AISL head orientation database includes the following: (1) providing a new challenge of the head orientation database that is sufficient to simulate the impact of background changes in real applications; (2) helping the development of the state of the art techniques for estimating head orientation in real applications; and (3) covering multiple races which include Indonesian, Japanese, Latin of American and Netherland people. This database consists of 6,480 images of the full view the head of 20 persons. A turntable system equipped with two Kinect cameras is utilized to simultaneously capture 36 images with interval 10°. Each subject is asked to look straight ahead, up and down to obtain 324 images in three shots and three times of background change. We also discuss the preliminary evaluation based on the AISL database and present the performance of two state-of-the-art appearance-based head pose classification methods to do the following: (1) evaluate the difficulty of the database for classifying or estimating head orientation; (2) preference evaluation results for researchers using the database; and (3) identify the strengths and weaknesses of the commonly used methods.
- Published
- 2015
- Full Text
- View/download PDF
35. Western scrub-jays ( Aphelocoma californica ) use cognitive strategies to protect their caches from thieving conspecifics
- Author
-
Joanna M. Dally, Nathan J. Emery, and Nicola S. Clayton
- Subjects
Male ,Communication ,Hardware_MEMORYSTRUCTURES ,biology ,Computer science ,business.industry ,Full view ,Experimental and Cognitive Psychology ,Feeding Behavior ,biology.organism_classification ,Computer security ,computer.software_genre ,Aphelocoma ,Birds ,Food ,Memory ,Animals ,Female ,Cache ,business ,computer ,Ecology, Evolution, Behavior and Systematics - Abstract
Food caching birds hide food and recover the caches when supplies are less abundant. There is, however, a risk to this strategy because the caches are susceptible to pilfering by others. Corvids use a number of different strategies to reduce possible cache theft. Scrub-jays with previous experience of pilfering other's caches cached worms in two visuospatially distinct caching trays either in private or in the presence of a conspecific. When these storers had cached in private, they subsequently observed both trays out of reach of a conspecific. When these storers had cached in the presence of a conspecific, they subsequently watched the observer pilfering from one of the trays while the other tray was placed in full view, but out of reach. The storers were then allowed to recover the remaining caches 3 h later. Jays cached more worms when they were observed during caching. At the time of recovery, they re-cached more than if they had cached in private, selectively re-caching outside of the trays in sites unbeknown to potential thieves. In addition, after a single pilfering trial, the jays switched their recovery strategy from predominantly checking their caches (i.e. returning to a cache site to see whether the food remained there) to predominantly eating them. Re-caching remained constant across the three trials. These results suggest that scrub-jays use flexible, cognitive caching and recovery strategies to aid in reducing potential future pilfering of caches by conspecifics.
- Published
- 2004
- Full Text
- View/download PDF
36. Integration Using Yammer Rest APIs
- Author
-
Pathik Rawal and Pryank Rohilla
- Subjects
World Wide Web ,Open graph ,Rest (physics) ,Computer science ,Full view - Abstract
In Chapter 5, we explained how to use Yammer Open Graph API to bring information stored in different business applications into Yammer and allow users to discover data from other applications and see the full view in a structured manner. This is all good, but it provides only one-way integration—from your business applications to Yammer. What if you want to integrate Yammer data into your business applications and make your applications more social and able to share content? The Yammer REST APIs provide this capability.
- Published
- 2015
- Full Text
- View/download PDF
37. Collaborative Position Patterns for Pairs Working with Shared Tiled-Wall Display using Mobile Devices
- Author
-
Razan Jaber, Ragaad AlTarawneh, Shah Rukh Humayoun, and Achim Ebert
- Subjects
Focus (computing) ,Multimedia ,Position (vector) ,Human–computer interaction ,Computer science ,Full view ,computer.software_genre ,Mobile device ,computer - Abstract
Recent advances in smart mobile devices (e.g., smartphones and tablets) encourage researchers to utilize them in collaborative environments as a medium of interaction with large shared interactive wall displays. Such collaborative setups have additional advantages over the previous ones, e.g., users' freedom to move around the environment, full view of the whole screen, etc. In this work, we focus on finding different possible collaborative position patterns for pairs of users working in a collaborative setup, equipped with a shared interactive tiled-wall display and multiple mobile devices. For this, we observed users in a controlled study with 36 participants, who performed the collaborative test in 18 pairs.
- Published
- 2015
- Full Text
- View/download PDF
38. Full-view barrier coverage with rotatable camera sensors
- Author
-
Yang Gui, Guihai Chen, Xiaofeng Gao, and Fan Wu
- Subjects
business.industry ,Computer science ,Orientation (computer vision) ,Visual sensor network ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Full view ,Wireless ,Computer vision ,Artificial intelligence ,Smart camera ,Image sensor ,business ,Wireless sensor network - Abstract
Camera sensors can collect visual information from regions of interest (RoI) and provide more information to classify the intruder. In practice, randomly deployed camera sensors can not guarantee that the barrier is full-view covered, and lead to a waste of sensing resources. Our work takes the first attempt to explore the deployment strategy to achieve full-view barrier coverage with rotatable camera sensors. We propose a method to select camera sensors from an existing and arbitrary deployment and determine their orientation to obtain a full-view barrier coverage. Our simulation results demonstrate that our algorithm outperforms existing algorithms for fixed directional camera sensors in saving the number of camera sensors.
- Published
- 2014
- Full Text
- View/download PDF
39. Hiding in Full View
- Author
-
Natalie Pollard
- Subjects
Information retrieval ,Computer science ,Full view - Published
- 2014
- Full Text
- View/download PDF
40. Usability in a New DCS Interface
- Author
-
Miguel Ramón González-Castro and Manuel Pérez Cota
- Subjects
Operator (computer programming) ,Human–computer interaction ,Manufacturing process ,Computer science ,business.industry ,Interface (computing) ,Process (computing) ,Full view ,Information quality ,Usability ,Distributed control system ,business - Abstract
The current operating displays of DCS (Distributed Control System) are designed for 2D environments. This limits the full awareness situation of the industrial process, since it is distributed across multiple operator displays and requires the operator to navigate among them. This inspired the idea of creating a single operation DCS display, in a 2.5D/3D environment that allows a full view of the entire manufacturing process. This increases the amount and quality of information that is given to the operator and prevents unnecessary operation navigation between displays.
- Published
- 2013
- Full Text
- View/download PDF
41. Full-View Coverage Algorithm in Camera Sensor Networks with Random Deployment
- Author
-
Yali Si, Lin Wang, Wenyuan Liu, and Juanjuan Liu
- Subjects
Target surface ,Software deployment ,Computer science ,Distributed algorithm ,business.industry ,Real-time computing ,Full view ,Camera sensor networks ,business ,Greedy algorithm ,Wireless sensor network ,Scheduling (computing) ,Computer network - Abstract
The full-view coverage ensures that the positive images of targets are obtained. In existing works, the topics only focus on whether a region is full-view covered or not, which needs too many nodes, and is less flexible for the change of surveillance environment. Therefore, full-view coverage for the targets is highlighted in this paper. Firstly, we derive the optimal observation angle between the sensing direction of nodes and the vector of target surface. We also prove that the full-view coverage is a NPC problem. Then the centralized and the distributed algorithms are proposed to maximize the number of full-view covered targets by scheduling the sensing directions of some sensors in the network. Simulation results show that local adjusting of the directional nodes will increase the full-view coverage for the global monitored objects in the condition of random deployment.
- Published
- 2013
- Full Text
- View/download PDF
42. Efficient Panorama Mosaicing Based on Enhanced-FAST and Graph Cuts
- Author
-
Xun Wang, Jie Sun, and Hao-Yu Peng
- Subjects
Panorama ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Full view ,Fast algorithm ,Cut ,Image alignment ,Image noise ,Computer vision ,Artificial intelligence ,business ,Merge (version control) ,Laplace operator - Abstract
This paper presents an efficient and accurate method for creating full view panoramas. A new feature points detection algorithm called Enhanced- FAST is proposed to accurately align images and a graph cuts algorithm is used to merge two adjacent images seamlessly. Based on the FAST algorithm, the Enhanced-FAST algorithm smoothes and extends the sampling area making the feature points detection more insensitive to noise. Our graph cuts algorithm uses image Laplacian to compute the edge weights which can find an optimized seam even under different lighting. Experiments and comparisons show that our method is efficient and robust to image noise and lighting changing
- Published
- 2012
- Full Text
- View/download PDF
43. Vision of the crowds
- Author
-
László Böszörményi
- Subjects
Multimedia ,Computer science ,business.industry ,Event (computing) ,Full view ,computer.software_genre ,Data science ,nobody ,Paraphrase ,Crowds ,Artificial intelligence ,Set (psychology) ,business ,computer - Abstract
Vision of the Crowds is a paraphrase of the well-known notion Wisdom of the Crowds. In the latter, instead of using an ontology-based, top-down approach, we create knowledge rather bottom-up, relying on the knowledge of the members of a certain community. Well-known applications of this approach are cooperative tagging of photos or filtering spams. In the case of Vision of the Crowds, we do not insist on creating new knowledge; a new, cooperative view may also suffice for many purposes. Take as an example an open-air sport event, which happens on different locations over several hours or days. Many thousands of visitors make audio-visual recordings. Nobody has a full view of the event, but we have a large amount of partial views. The challenge is to provide concepts and tools with the help of which such partial views can be shared and automatically summarized corresponding to different intentions of the viewers. The talk describes a set of ideas and presents some first results of realizing the idea of the Vision of the Crowds. Beside general considerations, two particular applications will be introduced, in the area of medicine (in particular endoscopic videos) and traffic
- Published
- 2011
- Full Text
- View/download PDF
44. Design of Panoramic Mosaic Surveillance Platform in Severe Circumstance
- Author
-
Feng Ji, Junchan Du, and Yu Liu
- Subjects
Optical imaging ,Data collection ,Fiber structure ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Full view ,Mosaic (geodemography) ,Image segmentation ,Special case ,Computer security ,computer.software_genre ,computer ,Task (project management) - Abstract
In the mine, open field or a severe surveillance environment, it is limited to take both full view images of circumstance. The use of computers and data collection card to achieve surveillance task is fairly dangerous and unreliable. To counter such special case, this paper analyzes the optical structure principles of panoramic mosaic. The advantages and disadvantages of phase correlation methodology are also discussed. It also proposes the concept of establishing the surveillance platform. Finally we present the evaluation results, showing that this panoramic mosaic surveillance platform can satisfy the rugged environment.
- Published
- 2010
- Full Text
- View/download PDF
45. Notice of Retraction: Study on the Instructional Process of Cultivating the Undergraduates' Innovative and Practical Ability Instructional Process in E-Commerce English Teaching
- Author
-
Liu Xiaojie, Hao Zhongchao, and Zhang Min
- Subjects
Knowledge management ,ComputingMilieux_THECOMPUTINGPROFESSION ,Notice ,business.industry ,Computer science ,Process (engineering) ,Educational technology ,Full view ,E-commerce ,Engineering management ,Vocational education ,ComputingMilieux_COMPUTERSANDEDUCATION ,Resource management ,business ,Natural language - Abstract
Adapting for the requirement of personnel cultivation in high vocational institute, so to Cultivate undergraduates' innovative and practical ability, and to train their practical application ability, this paper is annotated deep into three aspects, the necessity of the instructional process optimized, how to optimize the instructional process and the implementation terms for optimizing instructional process. Then it promulgates the nature of teaching reform in E-commerce English instruction and the full view of practical process. It can be provided as the study reference on instructional process for achieving educational objectives by the educators in high vocational institutes.
- Published
- 2010
- Full Text
- View/download PDF
46. Design of teleconference camera based on SOPC
- Author
-
Junchan Du, Yuanyuan Shang, and Sen Ma
- Subjects
Conference room ,Pixel ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Full view ,Teleconference ,Lecture hall ,Whole systems ,Computer graphics (images) ,Face (geometry) ,Computer vision ,Artificial intelligence ,business ,Field-programmable gate array - Abstract
It is unreliable to take both full view images of a conference room and face images of speakers, in most conference room, lecture hall or auditorium of the teleconference systems. This paper, countered such special surroundings which maintained more audiences and scatted positions, analyzes the principles of mosaic camera and discusses the advantages of phase correlation methodology. Besides, the idea of mosaic teleconference camera is proposed and the implementation of the whole system is presented. Finally, we shows the evaluation results and it can substantiate the requirement.
- Published
- 2009
- Full Text
- View/download PDF
47. Reliability-based generation and view synthesis in layered depth video
- Author
-
Klaus-Robert Müller, Thomas Wiegand, K. Dix, Aljosa Smolic, and Peter Kauff
- Subjects
Computer science ,business.industry ,Feature extraction ,Full view ,020206 networking & telecommunications ,02 engineering and technology ,Residual ,Stereo display ,Object detection ,Rendering (computer graphics) ,View synthesis ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business ,Image resolution - Abstract
In this paper, a system for video rendering on multiscopic 3D displays is considered where the data is represented as layered depth video (LDV). This representation consists of one full or central video with associated per-pixel depth and additional residual layers. Thus, only one full view with additional residual data needs to be transmitted. The LDV data is used at the receiver to generate all intermediate views for the display. The paper presents the LDV layer extraction as well as the view synthesis, using a scene reliability-driven approach. Here, unreliable image regions are detected and in contrast to previous approaches the residual data is enlarged to reduce artifacts in unreliable areas during rendering. To provide maximum data coverage, the residual data remains at its original positions and will not be projected towards the central view. The view synthesis process also uses this reliability analysis to provide higher quality intermediate views than previous approaches. As a final result, high quality intermediate views for an existing 9-view auto-stereoscopic display are presented, which prove the suitability of the LDV approach for advanced 3D video (3DV) systems.
- Published
- 2008
- Full Text
- View/download PDF
48. P4A-1 Automated Contour Tracking For High Frame-Rate, Full-View Myocardial Elastography In Vivo
- Author
-
Elisa E. Konofagou and Jianwen Luo
- Subjects
medicine.medical_specialty ,medicine.diagnostic_test ,Cardiac cycle ,Computer science ,Full view ,Left Ventricles ,Visualization ,medicine.anatomical_structure ,Region of interest ,Ventricle ,Medical imaging ,medicine ,Elastography ,Radiology ,High frame rate ,Biomedical engineering - Abstract
Using a retrospective ECG-gating technique, an extremely high frame rate (up to 8 kHz) was previously shown achievable for full-view (12times12 mm2) myocardial elastography in murine left ventricles. The purpose in this paper was to isolate the left ventricle from other structures for better displacement and strain visualization. In-vivo experiments were performed in anesthetized normal and infarcted mice. After manual selection of 40-50 points in the first frame of the cine-loop (corresponding to the R-wave), the myocardial contour was automatically tracked across the entire LV and throughout the full cardiac cycle, which correctly segmented the myocardial region of interest (ROI) for better interpretation. High precision of the displacement estimation, due to high frequency (30 MHz) and high frame rate (up to 8 kHz) available with this system, allowed for automated tracking of a manually-initialized myocardial contour over an entire cardiac cycle. The method of manually- initialized, automated contour tracking can further enhance the capability of the elastographic technique with minimal user intervention.
- Published
- 2007
- Full Text
- View/download PDF
49. Section 7: Packages
- Author
-
Pascal Leroy, Robert A. Duff, Erhard Ploedereder, Randall L. Brukardt, and S. Tucker Taft
- Subjects
Engineering drawing ,Computer science ,Section (archaeology) ,Full view ,Finalization - Abstract
7.1 Package Specifications and Declarations 7.2 Package Bodies 7.3 Private Types and Private Extensions 7.3.1 Private Operations 7.4 Deferred Constants 7.5 Limited Types 7.6 User-Defined Assignment and Finalization 7.6.1 Completion and Finalization
- Published
- 2007
- Full Text
- View/download PDF
50. Annex K (informative): Language-Defined Attributes
- Author
-
Erhard Ploedereder, Pascal Leroy, Randall L. Brukardt, S. Tucker Taft, and Robert A. Duff
- Subjects
business.industry ,Computer science ,Full view ,Array data type ,Artificial intelligence ,business ,computer.software_genre ,computer ,Natural language processing - Published
- 2007
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.