An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2
|
|
- Myron Shaw
- 5 years ago
- Views:
Transcription
1 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China (* Corresonding Author) 2 Research Deartment of Hisilicon Semiconductor and Comonent Business Deartment, Huawei Technologies, China Abstract Region-of-Interest () location in videos has many ractical usages in video coding field, such as video content analysis and user exerience imrovement. Although -based coding has been studied widely by many researchers to imrove coding efficiency for video contents, the location itself is seldom coded in video. In this aer, we will introduce our roosed location coding tool which has been adoted in surveillance rofile of AVS2 video coding standard (surveillance rofile). Our tool includes three schemes: direct-coding scheme, differential- coding scheme, and reconstructed-coding scheme. We will illustrate the details of these schemes, and erform analysis of their advantages and disadvantages, resectively. I. Introduction and Related Work Region-of-Interest () location for video sequence is of increasing imortance in many alications. For examle, location can hel decide quantization arameters to enhance the resolution of the interest regions. Secifically, in video conference alications, identified s can be used to guarantee the video qualities of the interested region in order to imroving the user exeriences. Various -based coding methods have been develoed. Chai. D et al. [1] extract face region using skin-color ma to obtain location. Chen et al. [2] use robust skin-color detection to obtain osition for the coding. Menser et al. [3] analyze the video contents by face detection and tracking technology, and then aly them to the alication of coding. Hu et al. [4] categories macroblocks inside one into three different region tyes and then erform rate control by allocating more bits to those region tyes that more interesting. However, these methods all treat location as a reference to decide coding arameters, e.g. quantization arameter, for macroblocks, rather than a art of video contents which can be encoded into the. In our analysis, location contains lots of contents relevant to the corresonding video. It can be used as a efficient way that describes the video contents characteristic. Moreover, location records trajectory of the target objects, which is esecially usefully in surveillance videos. Therefore, it is reasonable to encode location into the video. In the following arts of this aer, we will describe our roosed location coding tool which has been adoted in surveillance rofile of AVS2 video coding standard. We will illustrate three coding schemes, which are direct-coding scheme, temoral differential-coding scheme, and reconstructed- coding scheme. Besides, the analysis and comarison of these schemes will also be resented. The rest of the aer is organized as follows: Section II describes the details of the three schemes in our coding method. Section III shows the exeriment results and analyzes the coding erformances of these schemes. The conclusions are drawn in Section IV. II. Details of Our Coding Tool A. Definitions In our design, we assume s in videos can be bounded by rectangles and the locations of s can be described and coded by the corner oints of these bounding rectangles. According to this assumtion, we define location as: R i = { label i, xi, yi, wi, hi } (1) where R i indicates the i-th in one, label i is the index of R i indicating the s with the same roerties, e.g. the same object: a erson, a car, etc., in the whole video sequences, x i and y i are the horizontal and vertical coordinates of the to-left corner ixel of R i, and w i and h i are the width and height of the R i, resectively. With these five arameters, we can uniquely determine the location and the roerty of one in a. Fig. 1 illustrates the arameters in Eqn. (1). Fig. 1 An examle of s and their arameters in one Then, we define the differentiation of two corresonding s as: D = R R' = { x x', y y', w w', h h'} (2) where R and R are two corresonding s in adjacent encoded s. It will be alied in differential-coding scheme and extension scheme. Before describing the schemes in detail, three imortant oints need to be mentioned: 1) s in videos can either be selected manually or be detected by some state-of-art detection techniques [5]. 2) The order of s in a is ordered by their labels indices. In the roosed method, we allocate label indices according to the order of their aearing time. 3) The location will be added to head of each 's. In the following, we will describe the three roosed schemes, resectively.
2 B. Direct-Coding Scheme In the direct-coding scheme, we encode the raw location directly without any comression. During the rocedure, we rocess the in each indeently, i.e. we can recover the location in one without any additional of other s. More secifically, we first encode the label index difference between the current and the revious one in a (if it is the first in the sequence in one, the difference will be the same as the label number -1). Then, we encode the four arameters of an (Eqn. (1)) directly into the. We encode the s by the above method until the of the sequence in one. And the above rocess will be reeated for each. The detailed rocess of the direct-coding scheme is shown by Algorithm 1 and Fig. 2 shows an examle of using the direct-coding scheme to encode s in a. Algorithm 1: Direct-coding scheme Inut: location in one (assume that there are totally n s) Outut: Bitstream containing encode n into the ; for i = 1 to n R i = the i-th in the sequence, with arameters {label i, x i, y i, w i, h i }; if (i == 1) d i = label i 1; /*label index difference between the current */ /*and the revious in the current */ d i = label i label i-1 1; encode d i, x i, y i, w i, h i into the sequentially; We can see that this scheme is simle and easy to oerate. It is suitable to encode the location when a few of s need to be encoded in the sequence er. 3 0 (,,,) 1 (199,399,200,) 0 (152,149,150,150) Fig. 2 An coding examle of using the direct-coding scheme: assume that the label of R i is Label i=i. C. Differential-Coding Scheme Although direct-coding scheme can encode location into the, when large quantities of s are required to be encoded, the of the location will become huge and non-negligible, and will add a burden to the video. Therefore, we develoed another scheme, named as differential-coding scheme, to further imrove the coding efficiency. In this scheme, we encode the location with the temoral differential coding idea to reduce the coding redundancy. Since temorally neighboring s has high correlation, by encoding the temoral difference of the corresonding location arameters of one, redundancies can be reduced. The detailed rocess of the differential-coding scheme is shown in Algorithm 2. Algorithm 2: Differential-coding Scheme Inut: location in one (assume n s totally) and the in the revious encoded (assume totally m s) Outut: Bitstream containing if (current is intra-coded ) aly direct-coding scheme /* aly differential-coding scheme */ /* encode old s (normal + disaear) */ j = 1; ski = 0; set flag buffer to null; /* Store flags */ encode n into the ; for i = 1 to m R i = the i-th in the sequence in the revious encoded, with arameters {label i, x i, y i, w i, h i}; R j = the j-th in the sequence in the current, with arameters {label j, x j, y j, w j, h j }; if (label j > label i) /* R j disaears */ ush back flag(0) into flag buffer; /* label j ==label i */ D = (x j, y j, w j, h j ) (x j, y j, w j, h j) if (D == (0,0,0,0)) /* R j has same location */ ush back flag(1) into flag buffer; j = j+1; encode ski, flag buffer, D into the sequentially; j = j+1; ski = 0; /* initialize the arameter */ set flag buffer to null; /* initialize the arameter */ /* Before old s, write remains in the flag buffer */ encode ski, flag buffer into the sequentially; /* encode aeared s */ for i = j to n R i = the i-th in the sequence in the current ; if (i == j) encode x i, y i, w i, h i into the sequentially; d i = label i label i-1 1; encode d i, x i, y i, w i, h i into the sequentially; Several things need to be mentioned about the differential-coding scheme: 1) Since there is no reference for the first in a GOP, we aly direct-coding scheme for the first. 2) We define three tyes of s: the which exists in both the revious encoded and the current (normal ); the which exists in the revious encoded but disaear in the current (disaeared ); and the which newly aear in the current (aeared ). Some examles are shown in Fig. 3. 3) We aly different strategies on different tyes. For a normal which has the same location arameters as its corresonding one in the revious (i.e. D in Eqn. (2) is {0, 0, 0, 0}), we allocate a ski flag to indicate such condition instead of encoding four zeros. For other normal s, we encode the four differential numbers in Eqn. (2). Furthermore, for a disaearing, we allocate a disaear
3 flag to indicate such condition. Similarly, for an aeared, we directly encode the four arameters of the s (i.e. x, y, w, h), since no corresonding in the revious encoded can be used as a reference. 4) In our scheme, aearing s are always allocated with a new label and coded at the of the. Fig. 3 shows an examle of using the differential- coding scheme to encode s in a. Previous encoded (,) 3 Total number of s in the current R 1 (200,400) (200,200) R R 3 R2* disaears in the next Ski: the number of skied s (R 1 and R 2) before the next differential coded (R 3) (-1,-1,0,0) Flag buffer: 1: R 1 has the same location with R 1 ; 0: R 2 disaear Current encoded (,) (152,149) R 1 (199,399) R 3 location arameters (osition difference between R 3 and R 3 ) R Ski 200 R 3 R4 aears newly in the current (152,149,150,150) R 4 location arameters (absolute osition of R 4) Fig. 3 An coding examle of using the differential-coding scheme: assume that the label of R i is Label i=i. the reconstructed (i.e., the reconstructed from the current encoded ). Then, the actual locations will be differentiated with these redicted locations and the location difference will be encoded and transmitted. At the decoder side, after reconstruction of the current, the same object detection algorithms are used to derive redicted regions. These redicted locations will be combined with the decoded location differences to recover the actual locations. Since the number of redicted s may not be the same as the actual ones, in order to recisely recover regions, we assign actual with its closest redicted and encode their differences. Furthermore, considering that multile actual s may corresond to one redicted, we also encode the number of the actual s in the. That is, we will encode in the of each redicted art the number of actual s associated with it, followed by the label number and location differences of each actual. A coding examle of reconstructed-coding scheme is shown in Fig. 5, and the above oint will be illustrated visually in the meantime. Algorithm 3 shows the detailed rocess of the reconstructed-coding scheme. D. An Exted Scheme: Reconstructed-Coding Scheme In the differential-coding scheme, we only use the temoral correlation among s for reducing coding redundancy. In ractice, since many s in a can be estimated by object detection and recognition algorithms [5], the location can be further comressed by utilizing the rediction of these algorithms. Therefore, we also roose an exted reconstructedcoding scheme to further reduce coding redundancy. Please notice that this scheme has not been included in coding method in AVS2 standard. The work of the reconstructed-coding scheme is described by Fig. 4. More secifically, at the side, after then encoding of the current, we aly object detection algorithms to derive redicted regions from (52,49,50, 50) (-1,-1,0,0) Fig. 5 An coding examle of using the reconstructed-coding scheme: assume that the label of Label i=i. Inut video of video contents of video constents reconstructed s in current encoded location s in reconstructed reconstructed of outut of location decoder s in current encoded s in reconstructed Fig. 4 The work of Reconstructed-Coding Scheme decoder
4 Algorithm 3: Reconstructed-coding scheme Inut: location in one (assume n s totally) and the in the reconstructed (assume m s totally) Outut: Bitstream containing encode m into the ; ski = 0; for i = 1 to m (the number of redicted s) R r i = the i-th redicted in the reconstructed, with arameters {label r i, x r i, y r i, w r i, h r i}; k = the number of actual s in the current associated with R r i; encode k and all the labels of the actual s associated with R r i into the sequentially; foreach actual s associated with R r i (R l, l=1,2,,k, with arameters {label r i, x r i, y r i, w r i, h r i}) D = (x l, y l, w l, h l ) (x r i, y r i, w r i, h r i); if (D == (0,0,0,0)) /* R l and R r i have the same location */ encode ski, D into the (in order); ski = 0; /* initialize the arameter */ E. Syntax in the Bitstream In our tool, we use binary (0 and 1) to encode flags, use universal variable length coding (UVLC) [6] to encode difference, and use fixed length coding (FLC) label values and absolute osition of s. The coded is added in front of the s of a. Fig. 6 shows an examle of the created by our differential-coding scheme. We test the coding erformance on AVS2 surveillance rofile s common test sequences where s are re-defined for each sequence. Besides, the object detection algorithm in [5] is utilized to achieve redicted regions in the reconstructed-coding scheme. Some tested video s and the s are illustrated in Fig. 7. In the first exeriment, we erform tests of the direct-coding scheme and the differential-coding scheme with different video sequences under various quantization arameters (QPs). The exeriment results are shown in Table 1. Since fix quantization arameter is used in each exeriment, the PSNR values are the same for different methods and thus only bit rates are listed in Table 1. From Table 1, we can see that if we use the direct-coding scheme, the bit rate is high due to the large number of bits in coding locations. The overhead becomes obvious when the number of s is large. Considering that large number may exist frequently in many alications such as surveillance and video conference, it is desirable to reduce location signaling bits. Comaratively, the bit rates by the differential method are substantially reduced by utilizing the temoral correlation among s. Comared to the direct coding method, the differential method can achieve 2.5% bitrate reduction on average, and u to 6% bitrate reduction. Fig. 8 Some examle video s and the s in the second exeriment (-1,-1,0,0) 0 (152,149,150,150) Fig. 6 An examle of the for differential-coding scheme III. Exerimental Results In this section, we show exeriments results of the three coding schemes described in Section II. In the exeriments, we use AVS2 RD6.1 as the test latform [7]. The icture coding structure is Hierarchical-B (one P with seven B). The details of test conditions can be found at [9]. In the second exeriment, we further erform exeriments of the exted reconstructed-coding scheme. The number of encoded s for each video sequence is s. Table 2 shows the results of the reconstructed-coding scheme on some video sequences as in Fig. 8. In order to ease comarison, we also include the corresonding results of the direct-coding and the differential-coding schemes in Table 2. From Table 2, we can see that the reconstructedcoding scheme can also reduce bit rate by utilizing the redicted regions. Moreover, comaring the reconstructed-coding and differential-coding schemes, we can see that both schemes have their own advantages. If the object detection algorithm is accurate and the redicted s are close to their corresonding actual s, the reconstructed-coding scheme can achieve better results than the differential-coding scheme. Otherwise, the differential-coding scheme creates better erformance. Furthermore, we can also see that when the QP value increases, the erformance of the reconstructed-coding schemes will be decreased since the qualities of the reconstructed s decrease with larger QPs. However, we believe that the effect from QP arameters can be further reduced by utilizing more sohisticated detection techniques [8]. IV. Conclusion Fig. 7 Some examle video s and the s of our exerimental videos (standard AVS video) In this aer, we introduce a coding tool for encoding locations in AVS2 standard. The coding tool has three
5 Table 1 Exeriments on the schemes in the coding tool seq. encoded Bit Rate 30Hz resolution / QP s Original Direct-coding Differential-coding (+1.18%) (+0.25%) BQquare x240 2~ (+2.46%) (+0.52%) (+4.96%) (+1.05%) (+10.11%) (+2.14%) (+0.05%) (+0.01%) Traffic x ~ (+0.08%) (+0.01%) (+0.15%) (+0.02%) (+0.35%) (+0.06%) (+1.62%) (+0.30%) Crossroad x576 30~ (+3.47%) (+0.65%) (+7.93%) (+1.49%) (+17.47%) (+3.28%) (+0.90%) (+0.22%) Office x576 7~ (+1.77%) (+0.43%) (+3.49%) (+0.85%) (+6.92%) (+1.69%) (+0.59%) (+0.15%) Intersection x ~ (+1.12%) (+0.28%) (+2.19%) (+0.56%) (+4.52%) (+1.15%) Table 2 Exeriments on three otional schemes (We encode s for each video sequence) seq. QP resolution / Bit Rate 30Hz Original Direct-coding Differential-coding Reconstructed-coding I ~ (+0.65%) (+0.29%) (+0.25%) I ~ (+4.61%) (+1.93%) (+1.85%) I ~ (+12.82%) 38.16(+6.63%) 38.37(+7.22%) II ~ (+0.76%) (+0.47%) (+0.52%) II ~ (+6.27%) (+2.69%) (+2.75%) II ~ (+13.88%) 40.72(+8.25%) 40.89(+8.68%) III ~ (+6.34%) (+2.54%) (+2.38%) IV ~ (+14.38%) (+7.17%) (+7.62%) V ~ (+26.12%) (+12.26%) (+11.89%) VI ~ (+24.76%) (+10.47%) (+11.21%) different coding schemes which encode locations directly, by using temoral, and by using redicted from object detection algorithms. Exerimental results shows that utilizing temoral and rediction can effectively reduced the overhead for encoding regions. Further work will include combining the schemes of differential-coding and reconstructed-coding such that the coding erformance can be further imroved. Acknowledgements This aer is suorted in art by the following grants: National Science Foundation of China (No , and 61102), the Chinese national 973 roject (2010CB731401), the SMC grant of SJTU, and Shanghai Pujiang Program (12PJ ). References [1] D. Chai, K.N. Ngan, "Face segmentation using skin-color ma in videohone alications," IEEE Trans. Circuits and Systems for Video Technology, vol.9, no.4, , 1999 [2] M.-J.. Chen, M.-C. Chi, C.-T. Hsu and J.-W. Chen, Video Coding Based on H.263+ with Robust Skin-color Detection Technique, IEEE Trans. Consumer Electronics, vol. 49, , [3] B. Menser and M. Brunig, Face Detection and Tracking for Video Coding Alications, IEEE Int l Conf. Signal, Systems and Comuters, vol. 1, , [4] H.-M. Hu, B. Li, W. Lin, W. Li and M.-T. Sun, Region-Based Rate Control for H.264/AVC for Low Bit-Rate Alications, IEEE Trans. Circuits and Systems for Video Technology, vol. 22, , [5] P. Viola and M. Jones, Robust Real-Time Object Detection, Int l J. Comuter Vision, vol. 57, no. 2, , 2004 [6] Y. Itoh, N. Cheung, Universal variable length code for DCT coding IEEE Int l Conf. Image Processing, vol. 1, , 2000 [7] RD6.1,ft:// /incoming/video_codec/AVS2_P2/RD6.1.zi [8] J. Wu, J. M. Rehg, CENTRIST: A Visual Descritor for Scene Categorization IEEE Trans. Pattern Analysis and Machine Intelligence, vol.33, , [9] AVS-N2021, Common test conditions on AVS2-P2 surveillance rofile, December, 2012, Shenzhen, 47 th AVS meeting
Improved Image Super-Resolution by Support Vector Regression
Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort
More informationEE678 Application Presentation Content Based Image Retrieval Using Wavelets
EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective
More informationA Novel Iris Segmentation Method for Hand-Held Capture Device
A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,
More informationarxiv: v1 [cs.mm] 18 Jan 2016
Lossless Intra Coding in with 3-ta Filters Saeed R. Alvar a, Fatih Kamisli a a Deartment of Electrical and Electronics Engineering, Middle East Technical University, Turkey arxiv:1601.04473v1 [cs.mm] 18
More informationA Model-Adaptable MOSFET Parameter Extraction System
A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313
More informationLearning Motion Patterns in Crowded Scenes Using Motion Flow Field
Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical
More informationDecoding-Workload-Aware Video Encoding
Decoding-Workload-Aware Video Encoding Yicheng Huang, Guangming Hong, Vu An Tran and Ye Wang Deartment of Comuter Science ational University of Singaore Law Link, Singaore 117590 Reulic of Singaore {huangyic,
More informationRobust Motion Estimation for Video Sequences Based on Phase-Only Correlation
Robust Motion Estimation for Video Sequences Based on Phase-Only Correlation Loy Hui Chien and Takafumi Aoki Graduate School of Information Sciences Tohoku University Aoba-yama 5, Sendai, 98-8579, Jaan
More informationAUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.
inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.
More informationFace Recognition Using Legendre Moments
Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,
More informationAUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY
AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com
More informationWavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces
Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,
More informationSwift Template Matching Based on Equivalent Histogram
Swift emlate Matching ased on Equivalent istogram Wangsheng Yu, Xiaohua ian, Zhiqiang ou * elecommunications Engineering Institute Air Force Engineering University Xi an, PR China *corresonding author:
More informationSingle character type identification
Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition
More informationPrivacy Preserving Moving KNN Queries
Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,
More informationMining Association rules with Dynamic and Collective Support Thresholds
Mining Association rules with Dynamic and Collective Suort Thresholds C S Kanimozhi Selvi and A Tamilarasi Abstract Mining association rules is an imortant task in data mining. It discovers the hidden,
More informationEfficient Sequence Generator Mining and its Application in Classification
Efficient Sequence Generator Mining and its Alication in Classification Chuancong Gao, Jianyong Wang 2, Yukai He 3 and Lizhu Zhou 4 Tsinghua University, Beijing 0084, China {gaocc07, heyk05 3 }@mails.tsinghua.edu.cn,
More informationWeight Co-occurrence based Integrated Color and Intensity Matrix for CBIR
Weight Co-occurrence based Integrated Color and Intensity Matrix for CBIR Megha Agarwal, 2R.P. Maheshwari Indian Institute of Technology Roorkee 247667, Uttarakhand, India meghagarwal29@gmail.com, 2rmaheshwari@gmail.com
More informationEfficient Parallel Hierarchical Clustering
Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore
More informationA DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans
Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment
More informationEnsemble Learning Based on Parametric Triangular Norms
Send Orders for Rerints to rerints@benthamscience.ae The Oen Automation and Control Systems Journal, 2014, 6, 997-1003 997 Ensemble Learning Based on Parametric Triangular Norms Oen Access Pengtao Jia
More informationFace Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern
Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,
More informationAUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH
AUTOMATIC 3D SURFACE RECONSTRUCTION BY COMBINING STEREOVISION WITH THE SLIT-SCANNER APPROACH A. Prokos 1, G. Karras 1, E. Petsa 2 1 Deartment of Surveying, National Technical University of Athens (NTUA),
More informationA Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems
A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,
More informationVehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments
Proceedings of 0 4th International Conference on Machine Learning and Comuting IPCSIT vol. 5 (0) (0) IACSIT Press, Singaore Vehicle Logo Recognition Using Modest AdaBoost and Radial Tchebichef Moments
More informationImproved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties
Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal
More information521493S Computer Graphics Exercise 3 (Chapters 6-8)
521493S Comuter Grahics Exercise 3 (Chaters 6-8) 1 Most grahics systems and APIs use the simle lighting and reflection models that we introduced for olygon rendering Describe the ways in which each of
More informationA Study of Protocols for Low-Latency Video Transport over the Internet
A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis
More informationInteractive Image Segmentation
Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).
More informationModel-Based Annotation of Online Handwritten Datasets
Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information
More informationTexture Mapping with Vector Graphics: A Nested Mipmapping Solution
Texture Maing with Vector Grahics: A Nested Mimaing Solution Wei Zhang Yonggao Yang Song Xing Det. of Comuter Science Det. of Comuter Science Det. of Information Systems Prairie View A&M University Prairie
More informationSPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation
To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y
More informationPattern Recognition Letters
Pattern Recognition Letters 30 (2009) 114 122 Contents lists available at ScienceDirect Pattern Recognition Letters journal homeage: www.elsevier.com/locate/atrec A stroke filter and its alication to text
More informationCALCULATION METHOD OF MILLING CONTACT AREA FOR BALL-END MILLING TOOL WITH TOOL INCLINATION ANGLE
U.P.B. Sci. Bull., Series D, Vol. 76, Iss. 3, 214 ISSN 1454-2358 CALCULATION METHOD OF MILLING CONTACT AREA FOR BALL-END MILLING TOOL WITH TOOL INCLINATION ANGLE Yishu HAO 1, Guoqing TANG 2, Meng ZHANG
More informationCENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE
CENTRAL AND PARALLEL PROJECTIONS OF REGULAR SURFACES: GEOMETRIC CONSTRUCTIONS USING 3D MODELING SOFTWARE Petra Surynková Charles University in Prague, Faculty of Mathematics and Physics, Sokolovská 83,
More informationIMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model
IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,
More informationA New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism
A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute
More informationAn Efficient VLSI Architecture for Adaptive Rank Order Filter for Image Noise Removal
International Journal of Information and Electronics Engineering, Vol. 1, No. 1, July 011 An Efficient VLSI Architecture for Adative Rank Order Filter for Image Noise Removal M. C Hanumantharaju, M. Ravishankar,
More informationLeak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method
ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,
More informationEfficient Processing of Top-k Dominating Queries on Multi-Dimensional Data
Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of
More informationDepth Estimation for 2D to 3D Football Video Conversion
International Research Journal of Alied and Basic Sciences 2013 Available online at www.irjabs.com ISSN 2251-838X / Vol, 6 (4): 475-480 Science Exlorer ublications Deth Estimation for 2D to 3D Football
More informationPHOTOGRAMMETRIC TECHNIQUES FOR ROAD SURFACE ANALYSIS
The International Archives of the Photogrammetry, Remote Sensing and Satial Information Sciences, Volume XLI-B5, 6 XXIII ISPRS Congress, 9 July 6, Prague, Czech Reublic PHOTOGRAMMETRIC TECHNIQUES FOR ROAD
More informationA Texture Based Matching Approach for Automated Assembly of Puzzles
A Texture Based Matching Aroach for Automated Assembly of Puzzles Mahmut amil Saırolu 1, Aytül Erçil Sabancı University 1 msagiroglu@su.sabanciuniv.edu, aytulercil@sabanciuniv.edu Abstract The uzzle assembly
More informationSpace-efficient Region Filling in Raster Graphics
"The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich
More informationPivot Selection for Dimension Reduction Using Annealing by Increasing Resampling *
ivot Selection for Dimension Reduction Using Annealing by Increasing Resamling * Yasunobu Imamura 1, Naoya Higuchi 1, Tetsuji Kuboyama 2, Kouichi Hirata 1 and Takeshi Shinohara 1 1 Kyushu Institute of
More informationSource Coding and express these numbers in a binary system using M log
Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is
More informationAn Efficient Video Program Delivery algorithm in Tree Networks*
3rd International Symosium on Parallel Architectures, Algorithms and Programming An Efficient Video Program Delivery algorithm in Tree Networks* Fenghang Yin 1 Hong Shen 1,2,** 1 Deartment of Comuter Science,
More informationSkip List Based Authenticated Data Structure in DAS Paradigm
009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge
More informationShort Papers. Symmetry Detection by Generalized Complex (GC) Moments: A Close-Form Solution 1 INTRODUCTION
466 IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE VOL 2 NO 5 MAY 999 Short Paers Symmetry Detection by Generalized Comlex (GC) Moments: A Close-Form Solution Dinggang Shen Horace HS I
More informationMatlab Virtual Reality Simulations for optimizations and rapid prototyping of flexible lines systems
Matlab Virtual Reality Simulations for otimizations and raid rototying of flexible lines systems VAMVU PETRE, BARBU CAMELIA, POP MARIA Deartment of Automation, Comuters, Electrical Engineering and Energetics
More informationHardware-Accelerated Formal Verification
Hardare-Accelerated Formal Verification Hiroaki Yoshida, Satoshi Morishita 3 Masahiro Fujita,. VLSI Design and Education Center (VDEC), University of Tokyo. CREST, Jaan Science and Technology Agency 3.
More informationSensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network
1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann
More informationSemi-Supervised Learning Based Object Detection in Aerial Imagery
Semi-Suervised Learning Based Obect Detection in Aerial Imagery Jian Yao Zhongfei (Mark) Zhang Deartment of Comuter Science, State University of ew York at Binghamton, Y 13905, USA yao@binghamton.edu Zhongfei@cs.binghamton.edu
More informationIdentity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScript Objects
Identity-sensitive Points-to Analysis for the Dynamic Behavior of JavaScrit Objects Shiyi Wei and Barbara G. Ryder Deartment of Comuter Science, Virginia Tech, Blacksburg, VA, USA. {wei,ryder}@cs.vt.edu
More informationThe Research on Curling Track Empty Value Fill Algorithm Based on Similar Forecast
Research Journal of Alied Sciences, Engineering and Technology 6(8): 1472-1478, 2013 ISSN: 2040-7459; e-issn: 2040-7467 Maxwell Scientific Organization, 2013 Submitted: October 31, 2012 Acceted: January
More informationSubmission. Verifying Properties Using Sequential ATPG
Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel
More information10. Parallel Methods for Data Sorting
10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3
More informationFigure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201
200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle
More informationMULTI-CAMERA SURVEILLANCE WITH VISUAL TAGGING AND GENERIC CAMERA PLACEMENT. Jian Zhao and Sen-ching S. Cheung
MULTI-CAMERA SURVEILLANCE WITH VISUAL TAGGING AND GENERIC CAMERA PLACEMENT Jian Zhao and Sen-ching S. Cheung University of Kentucky Center for Visualization and Virtual Environment 1 Quality Street, Suite
More informationJournal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article. Robot vision system design and implementation based on Open CV
Available online www.jocr.com Journal of Chemical and Pharmaceutical Research, 3, 5():68-689 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 Robot vision system design and imlementation based on Oen
More informationExtracting Optimal Paths from Roadmaps for Motion Planning
Extracting Otimal Paths from Roadmas for Motion Planning Jinsuck Kim Roger A. Pearce Nancy M. Amato Deartment of Comuter Science Texas A&M University College Station, TX 843 jinsuckk,ra231,amato @cs.tamu.edu
More informationUsing Standard AADL for COMPASS
Using Standard AADL for COMPASS (noll@cs.rwth-aachen.de) AADL Standards Meeting Aachen, Germany; July 5 8, 06 Overview Introduction SLIM Language Udates COMPASS Develoment Roadma Fault Injections Parametric
More informationApplying the fuzzy preference relation to the software selection
Proceedings of the 007 WSEAS International Conference on Comuter Engineering and Alications, Gold Coast, Australia, January 17-19, 007 83 Alying the fuzzy reference relation to the software selection TIEN-CHIN
More informationPower Savings in Embedded Processors through Decode Filter Cache
Power Savings in Embedded Processors through Decode Filter Cache Weiyu Tang Rajesh Guta Alexandru Nicolau Deartment of Information and Comuter Science University of California, Irvine Irvine, CA 92697-3425
More informationInvariant Descriptors and Classifiers Combination for Recognition of Isolated Printed Tifinagh Characters
IJACSA Secial Issue on Selected aers from Third international symosium on Automatic Amazigh rocessing (SITACAM 3) Invariant Descritors and Classifiers Combination for Recognition of Isolated rinted Tifinagh
More informationEarthenware Reconstruction Based on the Shape Similarity among Potsherds
Original Paer Forma, 16, 77 90, 2001 Earthenware Reconstruction Based on the Shae Similarity among Potsherds Masayoshi KANOH 1, Shohei KATO 2 and Hidenori ITOH 1 1 Nagoya Institute of Technology, Gokiso-cho,
More informationSensitivity of multi-product two-stage economic lotsizing models and their dependency on change-over and product cost ratio s
Sensitivity two stage EOQ model 1 Sensitivity of multi-roduct two-stage economic lotsizing models and their deendency on change-over and roduct cost ratio s Frank Van den broecke, El-Houssaine Aghezzaf,
More informationImprove Precategorized Collection Retrieval by Using Supervised Term Weighting Schemes Λ
Imrove Precategorized Collection Retrieval by Using Suervised Term Weighting Schemes Λ Ying Zhao and George Karyis University of Minnesota, Deartment of Comuter Science Minneaolis, MN 55455 Abstract The
More informationReal Time Compression of Triangle Mesh Connectivity
Real Time Comression of Triangle Mesh Connectivity Stefan Gumhold, Wolfgang Straßer WSI/GRIS University of Tübingen Abstract In this aer we introduce a new comressed reresentation for the connectivity
More informationUsing Kullback-Leibler Divergence to Model Opponents in Poker
Comuter Poker and Imerfect Information: Paers from the I-14 Worksho Using Kullback-Leibler Divergence to Model Oonents in Poker Jiajia Zhang 1, Xuan Wang, Lin Yao 3, Jingeng Li 1, Xuedong Shen 1 1 Intelligence
More informationIntroduction to Image Compresion
ENEE63 Fall 2 Lecture-7 Introduction to Image Comresion htt://www.ece.umd.edu/class/enee63/ minwu@eng.umd.edu M. Wu: ENEE63 Digital Image Processing (Fall') Min Wu Electrical & Comuter Engineering Univ.
More informationAn Indexing Framework for Structured P2P Systems
An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University
More informationA 2D Random Walk Mobility Model for Location Management Studies in Wireless Networks Abstract: I. Introduction
A D Random Walk Mobility Model for Location Management Studies in Wireless Networks Kuo Hsing Chiang, RMIT University, Melbourne, Australia Nirmala Shenoy, Information Technology Deartment, RIT, Rochester,
More informationOptimization of Collective Communication Operations in MPICH
To be ublished in the International Journal of High Performance Comuting Alications, 5. c Sage Publications. Otimization of Collective Communication Oerations in MPICH Rajeev Thakur Rolf Rabenseifner William
More informationMultidimensional Service Weight Sequence Mining based on Cloud Service Utilization in Jyaguchi
Proceedings of the International MultiConference of Engineers and Comuter Scientists 2013 Vol I, Multidimensional Service Weight Sequence Mining based on Cloud Service Utilization in Jyaguchi Shree Krishna
More informationLearning Robust Locality Preserving Projection via p-order Minimization
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence Learning Robust Locality Preserving Projection via -Order Minimization Hua Wang, Feiing Nie, Heng Huang Deartment of Electrical
More informationAN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY
AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science
More informationProcess and Measurement System Capability Analysis
Process and Measurement System aability Analysis Process caability is the uniformity of the rocess. Variability is a measure of the uniformity of outut. Assume that a rocess involves a quality characteristic
More informationEFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION
ISSN 76-459 Int j simul model 6 (7), 4-3 Original scientific aer EFFICIENT STOCHASTIC GRADIENT SEARCH FOR AUTOMATIC IMAGE REGISTRATION Li, Q.; Sato, I. & Murakami, Y. GSJ/AIST - National Institute of Advanced
More informationImplementations of Partial Document Ranking Using. Inverted Files. Wai Yee Peter Wong. Dik Lun Lee
Imlementations of Partial Document Ranking Using Inverted Files Wai Yee Peter Wong Dik Lun Lee Deartment of Comuter and Information Science, Ohio State University, 36 Neil Ave, Columbus, Ohio 4321, U.S.A.
More informationMultipoint Filtering with Local Polynomial Approximation and Range Guidance
Multioint Filtering with Local Polynomial Aroximation and Range Guidance Xiao Tan, Changming Sun, and Tuan D. Pham The University of New South Wales, Canberra, ACT 2600, Australia CSIRO Comutational Informatics,
More informationDetection of Occluded Face Image using Mean Based Weight Matrix and Support Vector Machine
Journal of Comuter Science 8 (7): 1184-1190, 2012 ISSN 1549-3636 2012 Science Publications Detection of Occluded Face Image using Mean Based Weight Matrix and Suort Vector Machine 1 G. Nirmala Priya and
More informationNumerical Methods for Particle Tracing in Vector Fields
On-Line Visualization Notes Numerical Methods for Particle Tracing in Vector Fields Kenneth I. Joy Visualization and Grahics Research Laboratory Deartment of Comuter Science University of California, Davis
More informationStatistical Detection for Network Flooding Attacks
Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Email: cschao@fcu.edu.tw Abstract In order to meet
More informationGrouping of Patches in Progressive Radiosity
Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate
More informationResearch on Inverse Dynamics and Trajectory Planning for the 3-PTT Parallel Machine Tool
06 International Conference on aterials, Information, echanical, Electronic and Comuter Engineering (IECE 06 ISBN: 978--60595-40- Research on Inverse Dynamics and rajectory Planning for the 3-P Parallel
More informationStereo Disparity Estimation in Moment Space
Stereo Disarity Estimation in oment Sace Angeline Pang Faculty of Information Technology, ultimedia University, 63 Cyberjaya, alaysia. angeline.ang@mmu.edu.my R. ukundan Deartment of Comuter Science, University
More informationEquality-Based Translation Validator for LLVM
Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented
More informationSKIN CANCER LESION CLASSIFICATION USING LBP BASED HYBRID CLASSIFIER
DOI: htt://dx.doi.org/10.26483/ijarcs.v8i7.4469 Volume 8, No. 7, July August 2017 International Journal of Advanced Research in Comuter Science RESEARCH PAPER Available Online at www.ijarcs.info ISSN No.
More informationFast Shape-based Road Sign Detection for a Driver Assistance System
Fast Shae-based Road Sign Detection for a Driver Assistance System Gareth Loy Comuter Vision and Active Percetion Laboratory Royal Institute of Technology (KTH) Stockholm, Sweden Email: gareth@nada.kth.se
More informationAn accurate and fast point-to-plane registration technique
Pattern Recognition Letters 24 (23) 2967 2976 www.elsevier.com/locate/atrec An accurate and fast oint-to-lane registration technique Soon-Yong Park *, Murali Subbarao Deartment of Electrical and Comuter
More informationShuigeng Zhou. May 18, 2016 School of Computer Science Fudan University
Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions
More informationObject tracking mask-based NLUT on GPUs for real-time generation of holographic videos of three-dimensional scenes
Object tracking mask-based NLUT on GPUs for real-time generation of holograhic videos of three-dimensional scenes Min-Woo Kwon 1, Seung-Cheol Kim 1, Sung-Eui Yoon 2, Yo-Sung Ho 3, Eun-Soo Kim 1,* 1 HoloDigilog
More informationDetecting Video Events Based on Action Recognition in Complex Scenes Using Spatio-Temporal Descriptor
Detecting Video Events Based on Action Recognition in Comlex Scenes Using Satio-Temoral Descritor Guangyu Zhu, Ming Yang 2, Kai Yu 2, Wei Xu 2, Yihong Gong 2 National Laboratory of Pattern Recognition,
More informationOMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications
OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture
More informationSelecting Discriminative Binary Patterns for a Local Feature
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 3 Sofia 015 rint ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-015-0044 Selecting Discriminative Binary atterns
More informationA Morphological LiDAR Points Cloud Filtering Method based on GPGPU
A Morhological LiDAR Points Cloud Filtering Method based on GPGPU Shuo Li 1, Hui Wang 1, Qiuhe Ma 1 and Xuan Zha 2 1 Zhengzhou Institute of Surveying & Maing, No.66, Longhai Middle Road, Zhengzhou, China
More informationA CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH
A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu
More informationAn improved algorithm for Hausdorff Voronoi diagram for non-crossing sets
An imroved algorithm for Hausdorff Voronoi diagram for non-crossing sets Frank Dehne, Anil Maheshwari and Ryan Taylor May 26, 2006 Abstract We resent an imroved algorithm for building a Hausdorff Voronoi
More informationUse of Multivariate Statistical Analysis in the Modelling of Chromatographic Processes
Use of Multivariate Statistical Analysis in the Modelling of Chromatograhic Processes Simon Edwards-Parton 1, Nigel itchener-hooker 1, Nina hornhill 2, Daniel Bracewell 1, John Lidell 3 Abstract his aer
More information