The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computer Vision and Machine Learning are the key to develop autonomous robots. While engaged with a IEEE Open Challenge, in which the robots need to recognize a miniature of a cow, we saw a solution in these areas. The main contribution of this paper is the algorithm implemented to identify and follow a known object, the miniature of a cow. We are constructing an application based on Image Processing...
The role of machine vision detection technology as the core component in the surface mount technology devices (SMDs) cannot be denied. Single in-line package chip is an important type in IC chips and its leads forms varies a lot. This paper proposes an efficient method to soft measure single in-line package chips position and orientation. Chip image is taken by the industrial camera in the form of...
In the context of Visualization, Multidimensional Projection techniques are employed to show similarity relations among instances of a multidimensional dataset. Distinct projection techniques use different approaches to perform the dimensionality reduction and, consequently, different metrics are employed to assess projection quality according to similarity and structures preservation. Usually, quality...
Cognition involves dynamic reconfiguration of functional brain networks at sub-second time scale. A precise tracking of these reconfigurations to categorize visual objects remains elusive. Here, we use dense electroencephalography (EEG) data recorded during naming meaningful (tools, animals…) and scrambled objects from 20 healthy subjects. We combine technique for identifying functional brain networks...
Research efforts have been devoted to extraction and visualization of vortices in an unsteady (turbulent) flow. Characterizing the behaviors of the flow, vortices are identifiable as regions using a vortex detector known as the lambda2-criterion. Isosurface visualization renders vortex regions based on a chosen isovalue. However, it is highly challenging to choose one isovalue suitable for visualizing...
The aim of this paper is to investigate the use of oculography signals for the recognition of experts in visual arts. We focused our attention on the number of sight transitions between characteristic image areas (ROIs). In the experiments we used oculographic data recorded at the Department of Experimental Psychology at the Catholic University of Lublin for 29 images and 34 users. The EM method was...
Reliable localization is one of the most important parts of an MAV system. Localization in an indoor GPS-denied environment is a relatively difficult problem. Current vision based algorithms track optical features to calculate odometry. We present a novel localization method which can be applied in an environment having orthogonal sets of equally spaced lines to form a grid. With the help of a monocular...
Clustering techniques have gained great popularity in neuroscience data analysis especially in analysing data from complex experiment paradigm where it is hard to apply traditional model-based method. However, when employing clustering analysis, many clustering algorithms are available nowadays and even with an individual clustering algorithm, choices like parameter settings and distance metrics are...
Pedestrian detection is an important component for safety of autonomous vehicles, as well as for traffic and street surveillance. There are extensive benchmarks on this topic and it has been shown to be a challenging problem when applied on real use-case scenarios. In purely image-based pedestrian detection approaches, the state-of-the-art results have been achieved with convolutional neural networks...
Visualization became one of the solutions in showing the attack on the network. With Visualize the attack, it would be easier in recognizing and conclude the pattern from the complex image visual. The target of DoS attacks can be addressed to the various parts of the network, it can be routing, web, electronic mail or DNS servers (Domain Name System). The purpose of the DoS attacks create a server...
This paper proposes an edge bundling approach applied on parallel coordinates to improve the visualization of cluster information directly from the overview. Lines belonging to a cluster are bundled into a single curve between axes, where the horizontal and vertical positioning of the bundling intersection (known as bundling control points) to encode pertinent information about the cluster in a given...
Eye movement reflects the shift of overt visual attention. Eye movement trajectories from a group of observers can be expressed by a representative scanpath. The representative scan-path can work as a baseline for studies on scanpath prediction as well as provide useful knowledge about group behavior in psychological studies. In this paper, we propose a new framework to summarize a representative...
Force-directed algorithms are devoted to creating network visualization that better meet aesthetic standards but rarely consider interactive requirements, making it difficult to place certain nodes with semantic clustering features together through interactive operations. To solve this problem, we realize the interactive semantic clustering visualization through implicit connection. The key steps...
Rushes videos consist of two types of content: the useless content and the redundant content (retakes). Then, automatic retake detection is more challenging due to the difficulty of eliminating repetitive takes, that are usually have different lengths and motion patterns. To overcome this challenge, previous approaches represent video segments using a longer string which is converted from SIFT matching,...
In this paper, a new method of saliency-based traffic sign detection is presented. On the basis of the visual attention mechanism model, edge and color information are extracted as early visual features, and each feature is computed and normalized to obtain feature maps, conspicuity maps and the saliency map. Then the candidate regions containing traffic signs are determined with self-organizing map...
This paper proposes an approach for improving the efficiency of the unstructured text documents search in the electronic archive of computer-aided design systems by increasing the pertinence and relevance. The authors propose a mathematical description of the presentation of information based on fuzzy sets, the context-aware search terms. There was developed an algorithm for constructing a search...
Data analysis plays an indispensable role in the knowledge discovery process of extracting of interesting patterns or knowledge for understanding various phenomena or wide applications. Visual Data Mining is further presenting implicit but useful knowledge from large data sets using visualization techniques, to create visual images which aid in the understanding of complex, often massive representations...
In this work, a clustering approach to obtain compact topological models of an environment is developed and evaluated. The usefulness of these models is tested by studying their utility to solve the robot localization problem subsequently. Omnidirectional visual information and global appearance descriptors are used both to create and compress the models and to estimate the position of the robot....
The development of computer's application changes our daily life. Online maps application and popularization provide us a more convenience life. As individual users, we usually search for single or several map markers on the Internet. For the existing online map, whether from the positioning accuracy, reaction speed, and operating convenience aspects, it is an advanced system. But for the abundant...
With the development of image processing technology, how to efficiently retrieve the target image from mass images, becomes an urgent problem that needs to be solved. The existing low-level features of images, are lack of semantic information in traditional retrieval. To solve this problem, a method to extract color information by using twice clustering is put forward to improve the image retrieval...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.