The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses the problem of shape classification and proposes a method able to exploit peculiarities of both, local and global shape descriptors. In the proposed shape classification framework, the silhouettes of symbols are firstly described through Bags of Shape Contexts. This shape signature is used to solve correspondence problem between points of two shapes. The obtained correspondences...
We present a new approach to compute the graph edit distance between two attributed graphs which is based on a formal connection between the graph edit distance problem and that of finding a dominant set in an auxiliary edge-weighted “association” graph. Experiments performed on various data sets show that with the proposed approach we are able to improve on state-of-the-art algorithms.
In this paper, we address the problem of representing objects using contours for the purpose of recognition. We propose a novel segmentation method for integrating a new contour matching energy into level set based segmentation schemes. The contour matching energy is represented by major components of Elliptic Fourier shape descriptors and serves as a shape prior to guide the curve evolution. The...
With the urgent demand in information security, biometric feature-based verification systems have been extensively explored in many application domains. However, the efficacy of existing biometric-based systems is unsatisfactory and there are still a lot of difficult problems to be solved. Among many existing biometric features, palmprint has been regarded as a unique and useful biometric feature...
Automation of HEp-2 cell pattern classification would drastically improve the accuracy and throughput of diagnostic services for many auto-immune diseases, but it has proven difficult to reach a sufficient level of precision. Correct diagnosis relies on a subtle assessment of texture type in microscopic images of indirect immunofluorescence (IIF), which so far has eluded reliable replication through...
This paper describes a method for person reidentification across multiple non-overlapping cameras using both gait and color features. Because a single color feature is insufficient to distinguish persons with similar color clothes, a spatio-temporal histogram of oriented gradients is employed as a gradient-based shape and motion gait feature to discriminate such persons in conjunction with a background...
In this paper, we present a new three-dimensional (3D) tangent estimator by extending the two-dimensional (2D) λ-maximal segment tangent (λ-MST) estimator, which has very good theoretical and practical behaviors. We show that our proposed estimator keeps the same time complexity, accuracy and experimental asymptotic behaviors as the original 2D one.
Multiple Instance Learning (MIL) is concerned with learning from sets (bags) of objects (instances), where the individual instance labels are ambiguous. In MIL it is often assumed that positive bags contain at least one instance from a so-called concept in instance space. However, there are many MIL problems that do not fit this formulation well, and hence cause traditional MIL algorithms, which focus...
Despite their high stability and compactness, affine moment invariants have received a relatively little attention in action recognition literature. In this paper, we introduce an approach for activity recognition, based on affine moment invariants. In the proposed approach, a compact computationally-efficient shape descriptor is developed by using affine moment invariants. Affine moment invariants...
Most computer vision methods deal with the single object recognition problem. If an object is so small that little features can be used to support recognition procedure, the relationship between multi-objects could be helpful. In many cases, small objects are likely to be arranged by some regular shapes. To recognize these arrays, the paper presents a spatial topology detection algorithm. We call...
The fingerspelling recognition by hand shape is an important step for developing a human-computer interaction system. A method of fingerspelling recognition by hand shape using higher-order local auto-correlation(HLAC) features is proposed. From the experimental results, the proposed method is promising. And to redeuce image resolution and to thresholding an image are shown to be effective. In this...
The contour analysis and identification are the important aspects in visual surveillance research. The paper proposes a fuzzy identification method of contours. First, according to the description of a contour based on the chain-code method, the proposed method utilizes the statistical features of contours including the chain-code entropy and chain-code space distribution entropies, from which the...
Content-based image retrieval (CBIR) has got an intense interest and seen considerable progress over the last decade. But most of the time it is only applied in laboratory. One important reason for this is the diversity of images. Different practical situations call for different taxonomy definitions of images, and lead to very different solutions. At present, and even in the foreseeable future, a...
In this paper we start with a family of boundary based shape measures IN(γ) = ∫γ(x(s)2 + y(s)2)N ds, N = 1, 2, …, defined for every curve γ given in an arc-length parametrisation x = x(s), y = y(s), s ∈ [0, 1] and placed such that the centroid of γ and the origin coincide. We prove IN(γ) ≤ 4−N, for all N = 1, 2, … which implies that the sequence IN(γ) converges quickly to 0 and, therefore the first...
There is advancement in every day for image classification starting from object classification to remote sensing image. Plant classification from their part is one of the most current research works going in the area of image processing. The proposed work is a new approach for bamboo species classification from their Culm sheath by using Central moment. Automated recognition of bamboo has not yet...
In this paper we present a solution to locate the Data Matrix Codes dotted on different materials in different orientations. Starting from the parameters of the industrial camera of the recognition system and knowing the real world size of the Data Matrix pattern, the proposed method can find the exact position and the orientation of the Data Matrix pattern in an image. In order to be independent...
Terahertz (THz) radiation can penetrate nonmetallic materials and nonpolar materials, and has low photon energy, therefore THz imaging has drawn more attention. The moment function of an image has wide applications on pattern recognition and target classification. The paper has applied image segmentation to Continuous-Wave THz point-to-point scanning reflecting image depending on Otsu's method. The...
During the last ten years computer vision techniques have shown a great potential in solving the problem of automatic fire detection. Vision-based fire detection offers many advantages over the conventional methods that use smoke and heat detectors. This paper presents a novel approach for fire detection by modeling the structure of spatial of fire, this structure is considered in terms of the color...
The main disadvantage of traditional global thresholding techniques is that they do not have an ability to exploit information of the characteristics of target images that they threshold. In this paper, we propose a new approach based on combination of modified p-tile and edge detection algorithms to have more accurate object segmentation. Using our proposed method, it is shown that almost all of...
The last two decades has seen a rapid increase in the application of AIS (Artificial Immune Systems) modeled after the human immune system to a wide range of areas including network intrusion detection, job shop scheduling, classification, pattern recognition, and robot control. JPL (Jet Propulsion Laboratory) has developed an integrated pattern recognition/classification system called AISLE (Artificial...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.