The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In previous work we demonstrated the use of temporal image sequences to identify broad land use classes [1, 2], relying on analysis at paddock rather than pixel scales. This paper describes a method to spatially segment a time-series stack of imagery to produce paddock units. Results are demonstrated on a significant portion of the Canterbury Plains where over 58,000 paddocks were identified. This...
Vehicle classification and counting play an important role in the intelligent transportation system, as they may serve to improve traffic congestion and safety problems. Therefore, this study has developed a real-time and vision-based vehicle classification and counting system. This will involve establishing Time-Spatial Images (TSI) from input video, removing the shadow portions in TSI through the...
In this study, an object contour extraction using local structure information (LSI) captured by tri-directional spotlight (TDSL) filter is proposed. The proposed TDSL filter is designed by using three directional spotlight filters with overlapping areas in capturing local structure information around a discontinuity along object contour. The TDSL filter for object contour extraction is consisted of...
Automatic character segmentation is the first most fundamental and crucial step for the Optical Character Recognition (OCR) system. Though there have been a lot mature commercial OCR systems for controlled environment, the techniques of OCR are not as popular as expected for the complex uncontrolled environment. The bottleneck is character segmentation from noisy background. In this paper, we propose...
We propose an video synchronization method using hierarchical video shot detection process to match two videos when one of them is modified at unknown locations. The shots include both abrupt and gradual transitions (dissolves and fade-groups). The philosophy of this method is to use a light weight method to pre-process the video to remove those frames which strictly does not comprise a normal scene...
Wetlands are a natural complex formed by the interaction of land and water systems. They play an irreplaceable role in biodiversity conservation, control of global climate change, water purification and mitigation of flood disaster. Thus, extracting information of wetlands has become very important. Recent years the rapid development of high spatial resolution remote sensing technology provides great...
This paper presents a 3-D object localization and tracking technique based on the CAD model and multi-view image captures of the object. From the given projected 2-D pose model in the image, the matching lines between the model contour and the object's edge feature are used for nonlinear 3-D pose computation. The object location information in the real world is then identified. The method presented...
Calorie measurement systems that run on smart phones allow the user to take a picture of the food and measure the number of calories automatically. In order to identify the food accurately in such systems, image segmentation, which partitions an image into different regions, plays an important role. In this paper, we present the implementation of Graph cut segmentation as a means of improving the...
Most of computation time when dealing with a pedestrian detector is spent in the feature computation and then in the multi-scale classification. This second step consists of applying scanning windows at multiple scales. Depending on the number of scales and on the image dimension, this step is slow because a large number of windows is generated. An efficient pruning algorithm able to remove most of...
For improving the accuracy of the traditional maximum entropy threshold segmentation algorithm, an improved maximum entropy segmentation algorithm is proposed. Firstly, it determines the possible range of an optimal segmentation threshold according to a simple statistical method, so as to reduce the interference of the background and magnify the proportion of the target region. Secondly, in a certain...
By applying an edge detection algorithm the silhouettes of objects can be efficiently detected in an image or tracked through multiple frames. Traditional methods of object detection ignore information about an object being tracked. This information can be used to reduce processing time and increase accuracy of object detection. This paper proposes a method that uses this information to provide a...
This work presents a multimodal biometrics system that combines face and fingerprint authentication modules. The proposed face verification module incorporates Gabor Wavelet texture features and face edge features. As for the fingerprint module, a simple algorithm is employed for extracting fingers' Minutia in order to build feature vector for each sample fingerprint. The proposed system can be used...
The correspondence between key points is an important problem in lunar surface image processing, and further lays the foundation for the navigation of a rover and the terrain reconstruction of the lunar surface. However, the problem is still challenging due to the existence of large scale and rotation transformations, reflected view of the same scenery, and different illumination conditions between...
Traditional manual fiber defect detection is inefficient and imprecise when the fiber moves fast, to solve the problem, a real-time optical fiber defect detection system based on machine vision is designed and developed. Detection system by three industrial cameras captures images of 0°, 120°, 240° angle in space which are transmitted to IPC to classify fiber defect. Fiber defects are defined to establish...
Power consumption in programmable devices has become a primary factor in design flow. Among the main concerns of power consumption, application performance, battery life, thermal challenges, or reliability, power consumption is crucial in FPGA designs for powered battery equipment. In this paper, we study the FPGA-based design for Sobel Edge Detection algorithm for low cost fall detector and we present...
Super pixels are a compact and simple representation of images that has been used for many computer vision applications such as object localization, segmentation and depth estimation. While useful as compact representations of images, the time complexity of super pixel algorithms has prevented their use in real-time applications like video processing. Fast super pixel algorithms have been proposed...
Image segmentation in the big data context is a hot topic in the field of image understanding. Contrary to traditional computing paradigm with precise description of problems, Granular Computing (GrC) is studied by utilizing the toleration of imprecise, incomplete, uncertain and mass information to make systems manageable, robust, low-cost and harmonious. Thus it is an efficient measure to simplify...
Currently, the cytogenetic disorder such as the Down syndrome and the Prada william syndrome are a serious public health problem. The chromosome G-band images are applied for the automatic Karyotype analysis because it's easy to created and low cost. In contrast, the common problems of the chromosome images are disentangle such as the overlapping chromosome images. In this paper proposed a hybrid...
A low-complexity algorithm for camera tamper detection is proposed which can detect various types of tamper attacks based on edge information. The performance of the proposed algorithm is evaluated for three types of tamper attacks and shown to achieve acceptable level of accuracy for all types of tamper attacks.
Eye detection is required in many applications in human-computer interaction, which plays an important role in screen control, user recognition and auto-stereoscopic displays. Considering the defects of traditional methods of human-eye detection, an accurate human-eye-detection algorithm has been proposed. This paper proposes a novel technique combining the Adaboost algorithm and a hybrid matching...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.