The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Image search engines commonly employ the Bag Of Features (BOF) method to represent each database image with a feature vector and retrieve the best candidate using a measure of similarity to a query image vector. The BOF vector, which specifies the occurrence frequency of features, is used with Soft Assignment (SA) to find the most similar candidates which are further analyzed using geometric information...
In this paper, we propose a method for image selection using Web image search for automatic video biography authoring. In the proposed method, images are selected from the image search results considering their visual contents for inclusion in the video biography. Through evaluation, we confirmed the effectiveness of the proposed image selection method compared to a baseline method which simply selects...
SIFT flow adopts SIFT descriptor to find correspondence between two images. However, SIFT flow is not robust to scale and rotation for dense corresponding matching. In this paper, we propose moment-based dense correspondence matching which is robust to image variation. First, we apply Zernike moments to SIFT descriptor, i.e. Moments of Gradients (MoG). Then, we combine SIFT flow with MoG for dense...
We present a novel and configurable synthetic data generator for evolving region trajectories that emulates certain characteristics of a given input dataset, such as the spatial position, velocity, lifespan, and geometry shape and size. This tool aims to facilitate faster prototyping and evaluation of new spatiotemporal data mining algorithms that operate on a specific type of trajectory data, of...
Person re-identification is best known as the problem of associating a single person that is observed from one or more disjoint cameras. The existing literature has mainly addressed such an issue, neglecting the fact that people usually move in groups, like in crowded scenarios. We believe that the additional information carried by neighboring individuals provides a relevant visual context that can...
The paper deals with algorithmic issues of the process of separating periods in the pulsed signal of the radial artery. The periodization algorithm is a set of various procedures for processing an impulse signal that can confidently allocate periods in a signal. It precedes the rest of the analysis stages. The procedures used in the algorithm are described. The expediency of their application is discussed...
Mid-level representations are used to map sets of local features into one global representation for a given media descriptor. In visual pattern recognition tasks, Bag-of-Words (BoW) is one popular strategy, among many methods available in literature, due mainly by the simplicity in concept and implementation. Despite the overall good results achieved by BoW in many tasks, the method is unstable in...
This paper is devoted to investigation of features that will be the most appropriate for description of high resolution satellite imagery. We developed an image description model which is based on the distribution of image object classes. Proposed model could be used for image similarity estimation.
In visually searching for a target symbol out of a number of alternatives, which may include not only symbols from the Latin alphabets but also Arabic, Greek, Chinese, Japanese, Greek, and Russian letters and numerals, and mathematical symbols, the time required to find the target, i.e., the response time, follows Hick's law, which states that the response time is proportional to the logarithm of...
Video scene detection, the task of temporally dividing a video into its semantic sections, is an important process for effective analysis of heterogeneous video content. With the increased amount of video available for consumption, video scene detection becomes more and more important by providing means for effective video summarization, search and retrieval, browsing, and video understanding. We...
Instead of using HOG feature on cells or blocks, the extraction of HOG features on corner points is proposed for multiple object visual tracking system in which single or multiple moving objects could be classified. Background subtraction and extraction of corner feature are applied to track and classify the moving objects. Firstly, moving objects will be detected in the form of regions from background...
Together with the technology advancement, Computer Vision plays an important role in enhancing smart computing systems to help people overcome obstacles in their daily lives. One of the common troublesome problems is human memorization ability, especially memorizing things such as personal items. It is annoying for people to waste their time finding lost items manually by recall or notes. This motivates...
The usage areas of biometric systems are becoming widespread in today's technology. Face recognition systems among biometric systems; Ease of use, reliability, cost, etc., the preference between public institutions, commercial enterprises and researchers is increasing. In this study, it is suggested that students should use face recognition system instead of traditional methods of absenteeism in education...
Despite of the ultra-wideband (UWB) system's robustness against multipath in cluttered environments, a number of challenges remain before UWB localization can be implemented. In particular, non-line-of-sight (NLOS) propagation is especially critical for high-resolution localization systems because non-negligibly positive biases will be introduced in distance measurements, thus degrading the localization...
This paper aims to develop an effective flower classification approach using the technology of feature extraction. With this regard, a fused descriptor based on Pyramid Histogram of Visual Words (PHOW) is used to extract the color, texture and contour information of flower image. Secondly, Dictionary Learning and Locality-constrained Linear Coding (LLC) are operated on PHOW feature and then images...
The present paper describes a dual approach using pseudo-3D vision for Machine-Awareness in indoor environment. Provided by color and depth cameras of the a Kinect system, the aforementioned duality presents an appealing solution for robots' 3D-vision. Placing the human-robot and in a more general way the human-machine interactions as a key outcome of the expected visual Machine-Awareness, the proposed...
This paper presents the evaluation of visual features for the proposed two eye detection method applied to thermal images. The use of two eye region is due to its distinctive pattern and to overcome the issue of blurred and noisy characteristic in the thermal image. Comparative performance analysis on three different features which includes Haar, Histogram of Oriented Gradients (HoG) and Local Binary...
Easy access to high speed communication network and sharing of information via social media, has led to large amount of multimedia content seamlessly available to end user. Searching for similar images or video clips within a collection of videos is a common activity. This paper proposes a retrieval approach for similar video clip based on dense descriptor called serial walk local descriptor. The...
Histogram equalization is the simplest method of image enhancement. Mean brightness and contrast are important parameters of an image. Artifacts are generated if the original mean brightness of an image is not preserved. A high contrast provides good visual quality. Contrast can be increased by increasing entropy of the image. Entropy can be maximized by making the image histogram as flat as possible...
Detecting potential aerial threats like drones with computer vision is at the paramount of interest for the protection of critical locations. This type of a system should prevent efficiently the false alarms caused by non-malign objects such as birds, which intrude the image plane. In this paper, we propose an improved version of a previously presented Speeded-up Robust Feature Transform (SURF) based...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.