The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problems of reconfiguration of CAD system architecture are analyzed. The concepts of adaptive architecture of Computer-Aided Design system are represented. System of basic operating units of the CAD process is offered.
Prostate Cancer (PCa) is highly prevalent and is the second most common cause of cancer-related deaths in men. Multiparametric MRI (mpMRI) is robust in detecting PCa. We developed a weakly supervised computer-aided detection (CAD) system that uses biopsy points to learn to identify PCa on mpMRI. Our CAD system, which is based on a deep convolutional neural network architecture, yielded an area under...
In this paper we present a symbolic planning framework that is integrated into a 3D simulation environment using the concept of Digital Twins for just-in-time planning of intelligent multi-robot systems with improved execution times. Instructions can be given to the system at any time and plans with potentially dozens of actions are generated and executed in rapid succession. The framework uses spacial...
Feature-based modeling is very popular in generating the shape and history of a product in a three-dimensional (3D) CAD system. In the previous studies, features are the basic unit of the models. It often needs to traverse most of the features or even all of the features to extract the information of the models. In this paper, topological entities are divided into 6 levels according to the topological...
To ensure safety in the construction of important metallic components for roadworthiness, it is necessary to check every component thoroughly using non-destructive testing. In last decades, X-ray testing has been adopted as the principal non-destructive testing method to identify defects within a component which are undetectable to the naked eye. Nowadays, modern computer vision techniques, such as...
Recently, a study using virtual reality in order to provide an effective self-directed training experience has been actively pursued. Especially, in case of dangerous safety education, it is difficult to conduct practical training, so education using virtual reality technology is emerging as an alternative. This paper presents to virtual reality simulator model, and in particular, in reality, experience...
Building 3D tunnel model is one of the important work in underground mining management, the methods to build 3D tunnel model by secondary development of commercial software or using OpenGL are not convenient and efficient. After analyzing the structure of DXF file, a method that building 3D tunnel model based on DXF file is proposed. On the basis of designing the tunnel section type and parameters,...
In recent years due to the update of relevant graphical technologies acquiring of 3D reconstructed images from 2D views is getting attention exponentially. Many researchers have therefore tried to develop robust as well as efficient methods to reconstruct 3D models from images. In this paper, we have proposed a method for reconstructing 3D view from multiple images. This approach is based on images...
In this paper we present a novel approach for 3D facial expression recognition based on a registration method. The used registration method, called the Coherent Point Drift (CPD), is applied to estimate complex non-linear and nonrigid transformation between 3D facial surfaces. The computed transformation allows to recover shape deformations that are induced by facial expression variations. Machine...
Coronary artery disease is the leading cause of death in the world. In this research, we propose an algorithm based on the machine learning techniques to predict the risk of coronary artery atherosclerosis. A ridge expectation maximization imputation (REMI) technique is proposed to estimate the missing values in the atherosclerosis databases. A conditional likelihood maximization method is used to...
An automatic lookup tool, which matches and retrieves similar floorplans from a large repository of digitized architectural floorplans can prove to be of immense help for the architects while designing new projects. In this paper, we have proposed a framework for the matching and retrieval of similar architectural floorplans under the query by example paradigm. We propose a room layout segmentation...
Inferring scene depth from a single monocular image is an essential component in several computer vision applications such as 3D modeling and robotics. This process is an ill-posed problem. To tackle this challenging problem, previous efforts have been focusing on exploiting only global or local depth aware properties. We propose a model that incorporates both of them to obtain significantly more...
The convergence of the Internet of Things (IoT) and interactive systems will enable future interactive environments which transcend physical and virtual reality. Embedded Things provide sensors and actuators to virtualize the physical environment, while Interactive Things extend the virtualized environment with modalities for human interaction, ranging from tangible and wearable interfaces to immersive...
The gesture recognition has raised attention in computer vision owing to its many applications. However, video-based large-scale gesture recognition still faces many challenges, since many factors like background may disturb the accuracy. To achieve gesture recognition with large-scale videos, we propose a method based on RGB-D data. To learn gesture details better, the inputs are expanded into 32-frame...
Input data management is a time-consuming and costly for Discrete Event Simulation (DES) projects. According to research studies, the input data phase constitutes, on the average, can account for over a third of the time of an entire simulation project. This paper presents a newly developed Open Source (OS) tool, called the Knowledge Extraction (KE) tool that automates the input data management in...
Modular construction has been a widely used method for industrial construction in Alberta. Heavy piperack modules are prefabricated and assembled offsite and transported to site for installation, which minimizes the impact of Alberta's harsh weather and improves efficiency. Such projects are large in scale, ranging from hundreds of modules to thousands; because of this, project planning often requires...
In this paper, a complete indoor navigation assistance system for visually impaired people is introduced. Different multimedia technologies are integrated in a single system in order to provide a precise, safe and friendly navigation service. First, the environment is modeled and represented. After that, the user location is determined by combining Wi-Fi and vision information. This combination offers...
3D face recognition holds great promise in achieving robustness to pose, expressions and occlusions. However, 3D face recognition algorithms are still far behind their 2D counterparts due to the lack of large-scale datasets. We present a model based algorithm for 3D face recognition and test its performance by combining two large public datasets of 3D faces. We propose a Fully Convolutional Deep Network...
Image-Based Rendering (IBR) allows good-quality free-viewpoint navigation in urban scenes, but suffers from artifacts on poorly reconstructed objects, e.g., reflective surfaces such as cars. To alleviate this problem, we propose a method that automatically identifies stock 3D models, aligns them in the 3D scene and performs morphing to better capture image contours. We do this by first adapting learning-based...
Customs continue to use a wide range of technology in protecting against terrorism and the movement of illicit trade and prohibited imports. The throughput of scanned vehicles and cargo increases and just keeps on growing. Therefore, the need of automated algorithms to help screening officers in inspection, examination or surveillance of vehicles and containers is crucial. In this context, the successful...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.