The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Future autonomous service robots are intended to operate in open and complex environments. This in turn implies complications ensuring safe operation. The tenor of few available investigations is the need for dynamically assessing operational risks. Furthermore, a new kind of hazards being implicated by the robot's capability to manipulate the environment occurs: hazardous environmental object interactions...
The aim of this work is to highlight the paramount importance of the availability of an electromagnetic model for the design of system based on electromagnetic radiation for search and rescue operation of humans buried under different materials as debris, and snowslide. In this contribution the monitoring of the breathing activity of a man buried into a homogeneous lossy medium has been analyzed....
Automated characterization of human actions plays an important role in video indexing and retrieval for many applications. Action change detection is considered among the most necessary element to ensure a good video description. However, it is quite challenging to achieve detection without prior knowledge or training. Usually humans are practicing different actions in the same video and their silhouettes...
Since depth measuring devices for real-world scenarios became available in the recent past, the use of 3d data now comes more in focus of human action recognition. Due to the increased amount of data it seems to be advisable to model the trajectory of every landmark in the context of all other landmarks which is commonly done by dimensionality reduction techniques like PCA. In this paper we present...
This work compares the learning of linear evaluation functions using preference learning versus least squares temporal difference learning, LSTD(λ), from samples of game trajectories. The game trajectories are taken from human competitions held by the French Othello Federation1. The raw board positions are used to create a linear evaluation function to illustrate the key difference between the two...
Over the past decades, video games have become increasingly popular and complex. Virtual worlds have gone a long way since the first arcades and so have the artificial intelligence (AI) techniques used to control agents in these growing environments. Tasks such as world exploration, constrained pathfinding or team tactics and coordination just to name a few are now default requirements for contemporary...
We investigate the use of human metrology for the prediction of certain soft biometrics, viz. gender and weight. In particular, we consider geometric measurements from the head, and those from the remaining parts of the human body, and analyze their potential in predicting gender and weight. For gender prediction, the proposed model results in a 0.7% misclassification rate using both body and head...
We propose a new method for audio-visual sensor fusion and apply it to automatic aggression detection. While a variety of definitions of aggression exist, in this paper we see it as any kind of behavior that has a disturbing effect on others. We have collected multi- and unimodal assessments by humans, who have given aggression scores on a 3 point scale. There are no trivial fusion algorithms to predict...
Detection and classification of significant human motions are important tasks when analyzing a video that records human activities. Among various human motions, we consider that repetitious motions are specially important since they are usually results of activities with clear intentions. In this paper, we propose and evaluate a method that detects video segments that contain repetitious motions,...
Human tracking is an important vision task in video surveillance and perceptual human-computer interfaces. This paper presents a novel algorithm for region-based human tracking using color and depth features. We propose an adaptive autoregressive logarithmic search (ARLS) to estimate the target position, and use depth information to further reduce the false alarm rate. The new ARLS algorithm is evaluated...
The efficient browsing and retrieval of videos is a fundamental part of current multimedia systems especially on mobile devices. One way to provide enjoyable video browsing to the users is by providing summaries of the videos whereby the users can have a clue of the contents of the video before watching the video itself. In this paper, we propose a key frame extraction based video summarization technique...
In this article, which is a report of work in progress, we explore the principles of Bayesian causal analysis broadly along the lines formulated by Judea Pearl and other researchers. We apply these principles in the context of human behaviour modelling and aim at developing intelligent data analysis methods for large scale data sets, more specifically for logs from realistic simulations of human behaviour...
Several concepts from traditional research on Artificial Intelligence (AI) need to be trained before they can be used. For example, when applied to a computer game, its AI framework has to “learn” how the game should be played. However, such trainings may not be trivial due to the often complex game world environments. This paper presents a novel training approach for game AI frameworks where, instead...
Pedestrian detection is an important part of intelligent transportation systems. In the literature, Histogram of Oriented Gradients (HOG) detector for pedestrian detection is known for its good performance, but there are still some false detections appearing in the cases with flat area or clustered background. To deal with these problems, in this research work we develop a new feature which is based...
When human locomotion is used to interact with virtual or augmented environments, the system's immersion could be improved by providing reliable information about the user's walking intention. Such a prediction can be derived from tracking data to determine the future walking direction. This paper analyses how tracking data relates to navigation decisions from an egocentric view in order to achieve...
In this paper, an approach for semantic compositionbased on space projection operations over basic geometriclexical representations is proposed. Syntactic bi-grams arehere projected in the so called Support Subspace, aimed atemphasizing the semantic features shared by the compoundword. Empirical results are discussed over two tasks: a finegrainedsimilarity estimation task over syntactically typedword...
Efficient wireless sensor nodes have significantly motivated the usage of wireless sensor networks for intrusion detection and surveillance. A passive wireless surveillance network has the ability to detect humans by analyzing only the variations of the signal strength with respect to distance and alignment between nodes. When a human passes through an area covered by radio network, his/her body interferes...
Human gait is the main activity of daily life. Gait can be used for applications like human identification (in medical field etc). Since gait can be perceived from a distance it can be used for human identification. Gait recognition means identifying the person with his/her gait. Human identification using gait can be used in surveillance. A method is proposed for gait recognition using a technique...
Sentence fragment has a wide range of applications, such as short text mining, flow diagram search based on label similarity and so on. Existing methods aren't entirely appropriate for measuring similarity between sentence fragments since they were originally designed for complete sentences or long texts. So we pay more attention to proper nouns which carry important information in sentence fragments...
Obfuscation methods were proposed for protecting programs from cracking. These methods convert program into incomprehensible one, such as change symbol names from meaningful to meaningless. As a result, secret information in the program can be hidden. However, obfuscation methods are not evaluated sufficiently. This paper evaluates incomprehensibility of the obfuscated programs using queue based virtual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.