Automatic Video Segmentation for Czech TV Broadcast Transcription
|
|
- Lucinda Webb
- 5 years ago
- Views:
Transcription
1 Automatic Video Segmentation or Czech TV Broadcast Transcription Jose Chaloupka Laboratory o Computer Speech Processing, Institute o Inormation Technology and Electronics Technical University o Liberec Liberec, Czech Republic Jose.chaloupka@tul.cz Abstract This contribution deals with the testing and selection o methods and algorithms or the automatic video image (or visual signal) segmentation. The aim o this work has been to select a reliable and ast method or visual signal segmentation, which can be used in the system or audio-visual automatic TV broadcast transcription. Keywords-visual signal segmentation, shot change detection, audio-vsual TV broadcast processing I. ITRODUCTIO Video recordings o TV broadcasts (or movies) are made up o single short shots; a short shot is a sequence o subsequent video images where visual inormation does not change too much or changes very little. We want to ind the time boundaries (shot change) o these short shots in the task o automatic visual signal segmentation. The parts between time boundaries are visual segments which should correspond to the original short shots. We most oten have shot cuts between two subsequent visual segments or a special video eect such as dissolve, ade or wipe is used. The shot cuts and dissolve have been in our TV broadcast video recordings (see ig. ), thereore shot change detection has been solved or these two cases in our work. At present, the segmentation o a visual signal is used mainly or the indexation o audio-visual data (video recording). It is possible to represent each indexed visual segment by a key rame and work only with the key rames in very large audio-visual databases. Visual signal segmentation is urther used in the research area o modern voice technologies, where visual inormation rom visual segments can improve the recognition rate o inormation rom audio signals. We have used visual segmentation in our very large vocabulary speech recognition system or the automatic transcription o Czech broadcasts (system ATT Audio Transcription Toolkit). This system has been being developed in our Laboratory o Computer Speech Processing at the Technical University o Liberec since 004 []. We are using our own recognizer or the automatic continuous speech recognition o the Czech language in the ATT. The speech recognizer works with a vocabulary o more than Czech words and with a Czech language model. The principle o the ATT is as ollows (see ig. ): An input audio signal is preprocessed and parameterized in the irst step. The parameterized signal is segmented into smaller audio segments containing homogenous inormation only e.g. only one speaker speaks, some music plays, silence and so on. Audio segmentation is based on speech/non-speech and speakerchanged detection []. In the next step, a speech act is recognized in the audio speech segments. Our speech recognizer is based on the Hidden Markov Models (HMM) o single Czech phonemes. It is possible to use Speaker Independent (SI) HMM or Gender Dependent (GD) HMM. The recognition accuracy o a speech recognizer is higher i we use GD HMM instead o SI HMM. The identiication accuracy o gender rom a voice reaches more than 99% in our systems; we are, thereore, using GD HMM in our speech recognizer. Another strategy how to improve recognition accuracy is to use Speaker Adaptive (SA) HMM, where HMM are adapted or speciic speakers [3]. Some TV broadcasters, politicians or well-known celebrities and people are very oten in a TV broadcast, it is, thereore, possible to adapt HMM or them. The speakers are then identiied and veriied beore speech recognition in the ATT. Speaker veriication is used ater speaker identiication because it is necessary to ind out whether the identiied speaker has been identiied correctly. The speaker may have been identiied correctlyut he (she) sometimes could not be veriied. Thereore, we have modiied the ATT system [4] or the use o audio-visual speaker identiication instead o audio identiication and subsequent veriication. The visual signal is irst segmented and the visual segments are compared with audio segments according to time boundaries. It can be assumed that the inormation rom an audio segment would be similar (or equivalent) to the inormation in the visual segment i the time boundaries o the audio segment are more or less the same as the time boundaries o the visual segments. For example, the speaker is camera scanned and it is recorded into audio and visual segments. It is, thereore, possible to identiy the speaker rom the audio signal and this inormation is compared with the visual speaker identiication where the speaker is identiied by the detected ace in the video image rom the visual segment. Several dierent methods and algorithms exist or the visual speaker identiication based on //$ IEEE
2 the image o a human ace at present. The method based on the Principle Component Analysis (PCA) is most oten used or the visual speaker (ace) identiication [5]. Audio speaker veriication is not used when the identiied speaker is the same in the visual segment and in the relevant audio segment, the recognition accuracy being slightly higher when the module o audio-visual identiication is incorporated into the ATT. One o the important tasks or the audio-visual speaker identiication in the system o automatic TV broadcast transcription is to ind a reliable algorithm or visual signal segmentation, so several visual segmentation methods have been tested in this work. There are many algorithms and methods or visual signal segmentation [9]ut only the methods and the algorithms that were used in this work are described here. Shot cut: The resulting value o the similarity o two video images rom () may be close to zero even when comparing two completely dierent video images, so it is better to directly compare pixels in two successive video images (): x= y= ( x y) ( x, y) T, () The criterion or the boundary creation o a visual segment in almost all visual segmentation methods is based on comparing the resulting value with a threshold T. Such methods are quite reliable in the case o static video shots. However, over-segmentation can be expected i an object (or the camera) is moved. Over-segmentation is understood as one o the expected distributions o the multiple visual segment Dissolve: # rame no # rame no. Figure. Video eects shot cut, dissolve II. VISUAL SIGAL SEGMETATIO METHODS A. Pixel Based Methods The simplest method or visual signal segmentation is based on the comparison o corresponding pixels in two successive video images (, ) [6], or we can determine how likely it is or the corresponding pixels to be identical, possibly to ollow the development o changes in the color values o the corresponding pixels over several consecutive video images. i i+ x= y= x= y= ( x y) ( x, y) T, () where i (x, y) is image unction o a video image i rom a video signal, where a values o image unction can be a RGB color vector, a brightness or other color part rom some color space. X and Y is a dimension (width a height) o video image, is the shit to the next video image (usually ) and T is a threshold which we use or the set o boundaries o visual segment. Figure. The principle o ATT system B. Histogram Based Methods One o the ew global inormation sources which somehow characterize the image, are the image histograms. An image histogram is created rom the requency o single color values in single pixels. We get one image histogram or one video image but dierent video images may have the same image
3 histogram, which may be a disadvantage o this method. However, due to the acquisition o global inormation rom the image histogram are histogram-based visual segmentation methods [7] more robust as compared to pixel-based methods, mainly owing to the low shake or turn o the camera or an object located in the video shot. The simplest calculation can be realized by the dierence o values in the image histograms o two successive video images: V v= H () v H () v T where H i ( are values o a video image histogram. An image histogram is computed rom the brightness or RGB o single pixelsut dierent color parts rom dierent color spaces (HSV Hue, Saturation, Value, YcbCr, ) are used or the computation o image histograms in some urther projects. These color parts can have dierent eect on their own inormation in each video image, thereore in some visual segmentation methods, dierent weights are set or each color part. The intersections o image histograms are searched or image histograms are normalized or a better comparison in other histogram-based segmentation methods. C. Feature Based Methods A video image (matrix o pixels) can be described with eatures which well characterize the video image. A video signal is segmented by the help o these eatures. A boundary o visual segment is set i the eatures rom two successive video images are dierent. The color values o pixels rom video image or values rom image histogram can be eatures but only some smaller group o eatures is acceptable or us in the eature based visual segmentation methods. Useul eatures may be or example image moments, edges, parameters rom some statistic methods, coeicients rom some D transorms and so on. We have developed a eature-based visual segmentation method where eatures are extracted rom the coeicients o the D Discrete Cosine Transorm (DCT) [4]. The principle o the eature extraction and the subsequent visual segmentation is as ollows: A video image is transormed by D DCT: F( u, c( u) c( = x + y + ( x, y) cos uπ cos vπ x= 0 y= 0 where F(u, are DCT coeicients o transormed image (x,y) a c are coeicients: or k = 0 c( k) = (5) otherwise The computation o DCT is relatively ast because there is an algorithm very similar to the FFT algorithm (Fast Fourier Transorm) or the computation o DFT (Discrete Fourier Transorm). The square o DCT coeicients is computed: E ( u, = F( u, (6) (3) (4) P- the highest E coeicients are selected as eatures. The distance between the eatures rom two successive video images is counted in the last step (7). The criterion or shot change detection is very similar to the one in the previous method, where a speciic threshold is used. P p= VP ( p) VP ( p) T where VP i (p) is eature vector rom i video image. The advantage o our method is that the distance between two similar successive video images is several times lower than or two dierent ones. The advantage o this method is similar to the distance between consecutive rames is several times lower than that or two dierent. The disadvantage is that the irst visual eature VPI () is usually several times higher than the others. Thereore, it is good to normalize the eature vector. The logarithm o the eature vector is used in our algorithm. D. Block Based Methods A video image is divided into several parts (blocks) using a block-based visual segmentation method. Visual inormation is compared in the same blocks rom two successive video images. The result o the comparison rom single blocks is then evaluated. We can assign dierent weights to the single blocks. Each block may contribute to the result o the evaluation in a dierent way. The same method can be used or evaluation in blocks such as those described above, where the eatures, the image histograms or the sum o pixel values are computed and compared only in blocks o video images. Another possibility is to count the statistical values in single blocks such as variance and mean [8], the unction L(i) is then calculated or two corresponding blocks L ( i, b) = ( σ + σ )/ + (( μ μ )/ ) ) i i i, b i σ σ i, b i where i,b is the variance and i,b is mean color values in the single blocks b in i video image. Value L(i) is compared with same threshold T b then. L(i, b) = i it is higher than threshold, otherwise L(i) = 0. The criterion or shot change detection is: B b= w L ( i b) T b (7) (8), (9) where B is number o blocks, T is segmentation threshold and w b is weight value or single blocks. It is necessary to properly determine the number and distribution o single blocks in the video image or the blockbased segmentation methods. It is easier to correctly adjust the threshold value T i we choose a suitable number o blocks and their distribution in the video image.
4 III. EXPERIMETS Seven methods or visual signal segmentation have been tested in our experiments: M_PB a pixel-based segmentation method (equation ), M_PB a pixel-based segmentation method (equation ), M3_HB a histogrambased segmentation method (equation 3), M4_FB a DCT visual-based segmentation method, M5_BB a block-based segmentation method where video image has been divided into 4 blocks ( x ); the segmentation evaluation has been computed by equation, M6_BB a block based segmentation method 6 blocks (4 x 4) and the segmentation evaluation has been computed just like in the previous method, M7_BB a block based segmentation method 6 blocks (4 x 4) computation by equations 8, (00:05:44) 870 (00:05:48) 884 (00:05:53) 885 (00:05:53) 8844 (00:05:54) 8874 (00:05:55) 8875 (00:05:55) 8893 (00:05:56) 8909 (00:05:56) 89 (00:05:56) 946 (00:06:06) 9380 (00:06:5) # rame no. (hour:minute:second) Figure 3. The sample o short visual signal A database with almost hours o video recordings o Czech TV broadcast news has been used or the automatic threshold setting or single segmentation methods. The boundaries (shot changes) o single visual segments have been ound and set manually in this database or urther evaluation where the threshold has been changed in an interval or each segmentation method. The resulting threshold has been selected according to the highest value o the Visual Segmentation Rate - VSR (0). The single segmentation methods (with a set threshold) have been tested in the next step using another database COST78 [0], where video recordings o TV broadcasts rom 3 Czech TV stations are included ( hour). The shot changes o visual segments have also been set manually in this database; the reliability (VSR) o single segmentations methods can, thereoree evaluated. CS IS VSR = 00 [%] (0) S where S is the number o all manually selected shot changes, CS is the number o correctly recognized shot changes, IS is the number o shot changes which were detected in addition. Figure 4. The result rom visual signal segmentation methods: a) M_PB) M_PB, c) M3_HB, d) M4_FB, e) M5_BB, ) M6_BB, g) Mt_BB
5 The best testing method has been a DCT eatures-based visual segmentation method with the VSR o 7,3%. The result rom the visual segmentation methods or a short visual signal (igure 3.) is shown in igure 4. The y-axis (the segmentation value) is normalized to the interval rom 0 to 00 or a better comparisonut another interval is used in the last method because the segmentation value is almost zero between two similar video images and it is highly variable or the detected shot change. Only one video eect (dissolve) has been (used) in our video recordingsut it has not been necessary to prepare a special algorithm or tackling shot change detection in this eect because all segmentation methods detected the shot change in the dissolve video eect. IV. COCLUSIO AD FUTURE WORK The utilization o several methods or visual signal segmentation has been tested in this work - two pixel-based, one histogram-based, one eature-based and three block-based visual segmentation methods have been used in the experiments. The best result has been reached by the eaturebased visual segmentation method, where visual eatures are computed rom the DCT coeicients. The advantage o this method is that it is possible to ind a robust segmentation threshold or reliable visual signal segmentation. The DCT visual eatures-based segmentation method is used in our experiments with our system or automatic TV broadcast transcription. We would like to improve our visual segmentation method in the near uture and add some algorithms or solving the visual segmentation task, where several special video eects (ade, wipe,..) are used in the video recordings. ACKOWLEDGMET The research reported in this paper was partly supported by the grant (TACR) no. TA0004 and by the Czech Science Foundation (GACR) through the project no. 0/08/0707. REFERECES [] ouza, J., ejedlová, D., Žánský, J., Koloren, J.: Very Large Vocabulary Speech Recognition System or Automatic Transcription o Czech Broadcast. In: Proc. o ICSLP 004, Jeju Island, Korea, pp , ISS 5-44x, 004 [] Žánský, J.: BISEG: An Eicient Speaker-based Segmentation Technique. In: International Conerence on Spoken Language Processing Interspeech 006 ICSLP 006, September, 006, Pittsburgh, USA, pp. 8-85, ISS [3] erva, P., ouza, J., Silovský, J.: Two-Step Unsupervised Speaker Adaptation Based on Speaker and Gender Recognition and HMM Combination. In: International Conerence on Spoken Language Processing Interspeech 006 ICSLP 006, September, 006, Pittsburgh, USA, pp , ISS [4] Chaloupka, J.: Visual Speech Segmentation and Speaker Recognition or Transcription o TV ews. In: Proc. o International Conerence on Spoken Language Processing Interspeech 006 ICSLP 006, Pittsburgh, USA, pp , ISS , 006 [5] Chan, L., H., Salleh, S., H., Ting, C., M.: PCA, LDA and neural network or ace identiication, In: IEEE Conerence on Industrial Electronics and Applications, ICIEA 009, art. no , pp , 009 [6] agasaka, A., Tanaka, Y.: Automatic video indexing and ull-video search or object appearances. In: IFIP Working Conerence on Visual Database Systems, Hungary, pp. 3-7, 99 [7] Tonomura, Y., Abe, S.: Content oriented visual interace using video icons or visual database systems. In: Journal o Visual Languages and Computing, pp , 990 [8] Kasturi, R., Jain, R., C.: Dynamic Vision, In: Computer vision: principles, editors: Kasturi a Jain, IEEE Computer Society Press, USA, pp , 99 [9] Laevre, S., Holler, J., Vincent,.: A review o real-time segmentation o uncompressed video sequences or content-based search and retrieval, In: Real-Time Imaging 9, pp , 003 [0] Vandecatseye et al.: The COST78 pan-european broadcast newsdatabase. in Proc. o LREC 004, Lisbon, Portugal, May 004
CS485/685 Computer Vision Spring 2012 Dr. George Bebis Programming Assignment 2 Due Date: 3/27/2012
CS8/68 Computer Vision Spring 0 Dr. George Bebis Programming Assignment Due Date: /7/0 In this assignment, you will implement an algorithm or normalizing ace image using SVD. Face normalization is a required
More informationROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION
ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION Phuong-Trinh Pham-Ngoc, Quang-Linh Huynh Department o Biomedical Engineering, Faculty o Applied Science, Hochiminh University o Technology,
More informationClassification Method for Colored Natural Textures Using Gabor Filtering
Classiication Method or Colored Natural Textures Using Gabor Filtering Leena Lepistö 1, Iivari Kunttu 1, Jorma Autio 2, and Ari Visa 1, 1 Tampere University o Technology Institute o Signal Processing P.
More informationResearch on Image Splicing Based on Weighted POISSON Fusion
Research on Image Splicing Based on Weighted POISSO Fusion Dan Li, Ling Yuan*, Song Hu, Zeqi Wang School o Computer Science & Technology HuaZhong University o Science & Technology Wuhan, 430074, China
More informationChapter 3 Image Enhancement in the Spatial Domain
Chapter 3 Image Enhancement in the Spatial Domain Yinghua He School o Computer Science and Technology Tianjin University Image enhancement approaches Spatial domain image plane itsel Spatial domain methods
More information2. Recommended Design Flow
2. Recommended Design Flow This chapter describes the Altera-recommended design low or successully implementing external memory interaces in Altera devices. Altera recommends that you create an example
More informationDigital Image Processing. Image Enhancement in the Spatial Domain (Chapter 4)
Digital Image Processing Image Enhancement in the Spatial Domain (Chapter 4) Objective The principal objective o enhancement is to process an images so that the result is more suitable than the original
More information2 DETERMINING THE VANISHING POINT LOCA- TIONS
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL.??, NO.??, DATE 1 Equidistant Fish-Eye Calibration and Rectiication by Vanishing Point Extraction Abstract In this paper we describe
More informationTHE FINANCIAL CALCULATOR
Starter Kit CHAPTER 3 Stalla Seminars THE FINANCIAL CALCULATOR In accordance with the AIMR calculator policy in eect at the time o this writing, CFA candidates are permitted to use one o two approved calculators
More informationSkill Sets Chapter 5 Functions
Skill Sets Chapter 5 Functions No. Skills Examples o questions involving the skills. Sketch the graph o the (Lecture Notes Example (b)) unction according to the g : x x x, domain. x, x - Students tend
More informationMATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM
UDC 681.3.06 MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM V.K. Pogrebnoy TPU Institute «Cybernetic centre» E-mail: vk@ad.cctpu.edu.ru Matrix algorithm o solving graph cutting problem has been suggested.
More informationFacial Expression Recognition based on Affine Moment Invariants
IJCSI International Journal o Computer Science Issues, Vol. 9, Issue 6, No, November 0 ISSN (Online): 694-084 www.ijcsi.org 388 Facial Expression Recognition based on Aine Moment Invariants Renuka Londhe
More informationMAPI Computer Vision. Multiple View Geometry
MAPI Computer Vision Multiple View Geometry Geometry o Multiple Views 2- and 3- view geometry p p Kpˆ [ K R t]p Geometry o Multiple Views 2- and 3- view geometry Epipolar Geometry The epipolar geometry
More information9.8 Graphing Rational Functions
9. Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm P where P and Q are polynomials. Q An eample o a simple rational unction
More informationA Cylindrical Surface Model to Rectify the Bound Document Image
A Cylindrical Surace Model to Rectiy the Bound Document Image Huaigu Cao, Xiaoqing Ding, Changsong Liu Department o Electronic Engineering, Tsinghua University State Key Laboratory o Intelligent Technology
More informationAutomated Modelization of Dynamic Systems
Automated Modelization o Dynamic Systems Ivan Perl, Aleksandr Penskoi ITMO University Saint-Petersburg, Russia ivan.perl, aleksandr.penskoi@corp.imo.ru Abstract Nowadays, dierent kinds o modelling settled
More informationObject Tracking with Dynamic Feature Graph
Object Tracking with Dynamic Feature Graph Feng Tang and Hai Tao Department o Computer Engineering, University o Caliornia, Santa Cruz {tang,tao}@soe.ucsc.edu Abstract Two major problems or model-based
More informationBinary Morphological Model in Refining Local Fitting Active Contour in Segmenting Weak/Missing Edges
0 International Conerence on Advanced Computer Science Applications and Technologies Binary Morphological Model in Reining Local Fitting Active Contour in Segmenting Weak/Missing Edges Norshaliza Kamaruddin,
More informationFoveated Wavelet Image Quality Index *
Foveated Wavelet Image Quality Index * Zhou Wang a, Alan C. Bovik a, and Ligang Lu b a Laboratory or Image and Video Engineering (LIVE), Dept. o Electrical and Computer Engineering The University o Texas
More informationStudy and Analysis of Edge Detection and Implementation of Fuzzy Set. Theory Based Edge Detection Technique in Digital Images
Study and Analysis o Edge Detection and Implementation o Fuzzy Set Theory Based Edge Detection Technique in Digital Images Anju K S Assistant Proessor, Department o Computer Science Baselios Mathews II
More informationRoad Sign Analysis Using Multisensory Data
Road Sign Analysis Using Multisensory Data R.J. López-Sastre, S. Lauente-Arroyo, P. Gil-Jiménez, P. Siegmann, and S. Maldonado-Bascón University o Alcalá, Department o Signal Theory and Communications
More informationFace Recognition using Hough Peaks extracted from the significant blocks of the Gradient Image
Face Recognition using Hough Peaks extracted rom the signiicant blocks o the Gradient Image Arindam Kar 1, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu 1 Indian Statistical
More information521466S Machine Vision Exercise #1 Camera models
52466S Machine Vision Exercise # Camera models. Pinhole camera. The perspective projection equations or a pinhole camera are x n = x c, = y c, where x n = [x n, ] are the normalized image coordinates,
More informationAn Analytic Model for Embedded Machine Vision: Architecture and Performance Exploration
419 An Analytic Model or Embedded Machine Vision: Architecture and Perormance Exploration Chan Kit Wai, Prahlad Vadakkepat, Tan Kok Kiong Department o Electrical and Computer Engineering, 4 Engineering
More informationUsing VCS with the Quartus II Software
Using VCS with the Quartus II Sotware December 2002, ver. 1.0 Application Note 239 Introduction As the design complexity o FPGAs continues to rise, veriication engineers are inding it increasingly diicult
More informationA Review of Evaluation of Optimal Binarization Technique for Character Segmentation in Historical Manuscripts
010 Third International Conerence on Knowledge Discovery and Data Mining A Review o Evaluation o Optimal Binarization Technique or Character Segmentation in Historical Manuscripts Chun Che Fung and Rapeeporn
More informationEMBEDDED DIGITAL IMAGE CORRELATION IN A FULL-FIELD DISPLACEMENT SENSOR. A Thesis. Presented to. The Graduate Faculty of The University of Akron
EMBEDDED DIGITAL IMAGE CORRELATIO I A FULL-FIELD DIPLACEMET EOR A Thesis Presented to The Graduate Faculty o The University o Akron In Partial Fulillment o the Requirements or the Degree Master o cience
More informationWhat is Clustering? Clustering. Characterizing Cluster Methods. Clusters. Cluster Validity. Basic Clustering Methodology
Clustering Unsupervised learning Generating classes Distance/similarity measures Agglomerative methods Divisive methods Data Clustering 1 What is Clustering? Form o unsupervised learning - no inormation
More informationThe Graph of an Equation Graph the following by using a table of values and plotting points.
Calculus Preparation - Section 1 Graphs and Models Success in math as well as Calculus is to use a multiple perspective -- graphical, analytical, and numerical. Thanks to Rene Descartes we can represent
More informationA SAR IMAGE REGISTRATION METHOD BASED ON SIFT ALGORITHM
A SAR IMAGE REGISTRATION METHOD BASED ON SIFT ALGORITHM W. Lu a,b, X. Yue b,c, Y. Zhao b,c, C. Han b,c, * a College o Resources and Environment, University o Chinese Academy o Sciences, Beijing, 100149,
More information5.2 Properties of Rational functions
5. Properties o Rational unctions A rational unction is a unction o the orm n n1 polynomial p an an 1 a1 a0 k k1 polynomial q bk bk 1 b1 b0 Eample 3 5 1 The domain o a rational unction is the set o all
More informationNeighbourhood Operations
Neighbourhood Operations Neighbourhood operations simply operate on a larger neighbourhood o piels than point operations Origin Neighbourhoods are mostly a rectangle around a central piel Any size rectangle
More informationGesture Recognition using a Probabilistic Framework for Pose Matching
Gesture Recognition using a Probabilistic Framework or Pose Matching Ahmed Elgammal Vinay Shet Yaser Yacoob Larry S. Davis Computer Vision Laboratory University o Maryland College Park MD 20742 USA elgammalvinayyaserlsd
More informationFace Detection for Automatic Avatar Creation by using Deformable Template and GA
Face Detection or Automatic Avatar Creation by using Deormable Template and GA Tae-Young Park*, Ja-Yong Lee **, and Hoon Kang *** * School o lectrical and lectronics ngineering, Chung-Ang University, Seoul,
More informationMotion based 3D Target Tracking with Interacting Multiple Linear Dynamic Models
Motion based 3D Target Tracking with Interacting Multiple Linear Dynamic Models Zhen Jia and Arjuna Balasuriya School o EEE, Nanyang Technological University, Singapore jiazhen@pmail.ntu.edu.sg, earjuna@ntu.edu.sg
More information10. SOPC Builder Component Development Walkthrough
10. SOPC Builder Component Development Walkthrough QII54007-9.0.0 Introduction This chapter describes the parts o a custom SOPC Builder component and guides you through the process o creating an example
More informationFig. 3.1: Interpolation schemes for forward mapping (left) and inverse mapping (right, Jähne, 1997).
Eicken, GEOS 69 - Geoscience Image Processing Applications, Lecture Notes - 17-3. Spatial transorms 3.1. Geometric operations (Reading: Castleman, 1996, pp. 115-138) - a geometric operation is deined as
More informationA Requirement Specification Language for Configuration Dynamics of Multiagent Systems
A Requirement Speciication Language or Coniguration Dynamics o Multiagent Systems Mehdi Dastani, Catholijn M. Jonker, Jan Treur* Vrije Universiteit Amsterdam, Department o Artiicial Intelligence, De Boelelaan
More informationIndex Mapping based Hybrid DWT-DCT Watermarking Technique for Copyright Protection of Videos Files
15 Online International Conerence on Green Engineering and Technologies (IC-GET) Index Mapping based Hybrid DWT-DCT Watermarking Technique or Copyright Protection o Videos Files Alavi Kunhu, Nisi K, Sadeena
More informationA Novel Accurate Genetic Algorithm for Multivariable Systems
World Applied Sciences Journal 5 (): 137-14, 008 ISSN 1818-495 IDOSI Publications, 008 A Novel Accurate Genetic Algorithm or Multivariable Systems Abdorreza Alavi Gharahbagh and Vahid Abolghasemi Department
More informationCompressed Sensing Image Reconstruction Based on Discrete Shearlet Transform
Sensors & Transducers 04 by IFSA Publishing, S. L. http://www.sensorsportal.com Compressed Sensing Image Reconstruction Based on Discrete Shearlet Transorm Shanshan Peng School o Inormation Science and
More informationUNIT #2 TRANSFORMATIONS OF FUNCTIONS
Name: Date: UNIT # TRANSFORMATIONS OF FUNCTIONS Part I Questions. The quadratic unction ollowing does,, () has a turning point at have a turning point? 7, 3, 5 5, 8. I g 7 3, then at which o the The structure
More informationA Classification System and Analysis for Aspect-Oriented Programs
A Classiication System and Analysis or Aspect-Oriented Programs Martin Rinard, Alexandru Sălcianu, and Suhabe Bugrara Massachusetts Institute o Technology Cambridge, MA 02139 ABSTRACT We present a new
More informationControl and Data Fusion e-journal: CADFEJL Vol. 1, No. 2, pp , Mar-Apr 2017.
Control and Data Fusion e-journal: CADFEJL Vol., No., pp. 7-39, Mar-Apr 07. mplementation and Validation o Visual and nrared mage Fusion Techniques in C#.NET Environment B. Hela Saraswathi and VPS Naidu
More informationLesson 11. Media Retrieval. Information Retrieval. Image Retrieval. Video Retrieval. Audio Retrieval
Lesson 11 Media Retrieval Information Retrieval Image Retrieval Video Retrieval Audio Retrieval Information Retrieval Retrieval = Query + Search Informational Retrieval: Get required information from database/web
More informationITU - Telecommunication Standardization Sector. G.fast: Far-end crosstalk in twisted pair cabling; measurements and modelling ABSTRACT
ITU - Telecommunication Standardization Sector STUDY GROUP 15 Temporary Document 11RV-22 Original: English Richmond, VA. - 3-1 Nov. 211 Question: 4/15 SOURCE 1 : TNO TITLE: G.ast: Far-end crosstalk in
More informationSUPER RESOLUTION IMAGE BY EDGE-CONSTRAINED CURVE FITTING IN THE THRESHOLD DECOMPOSITION DOMAIN
SUPER RESOLUTION IMAGE BY EDGE-CONSTRAINED CURVE FITTING IN THE THRESHOLD DECOMPOSITION DOMAIN Tsz Chun Ho and Bing Zeng Department o Electronic and Computer Engineering The Hong Kong University o Science
More informationLarger K-maps. So far we have only discussed 2 and 3-variable K-maps. We can now create a 4-variable map in the
EET 3 Chapter 3 7/3/2 PAGE - 23 Larger K-maps The -variable K-map So ar we have only discussed 2 and 3-variable K-maps. We can now create a -variable map in the same way that we created the 3-variable
More informationMorphological Image Processing for Road Anomalies Detection Using 2D Images and Video Data
Morphological Image Processing or Road Anomalies Detection Using 2D Images and Video Data Alexandra Dalia Danilescu Faculty o Electronics, Telecommunications and Inormation Technology The Technical University
More informationAn object-based approach to plenoptic videos. Proceedings - Ieee International Symposium On Circuits And Systems, 2005, p.
Title An object-based approach to plenoptic videos Author(s) Gan, ZF; Chan, SC; Ng, KT; Shum, HY Citation Proceedings - Ieee International Symposium On Circuits And Systems, 2005, p. 3435-3438 Issued Date
More informationMethod estimating reflection coefficients of adaptive lattice filter and its application to system identification
Acoust. Sci. & Tech. 28, 2 (27) PAPER #27 The Acoustical Society o Japan Method estimating relection coeicients o adaptive lattice ilter and its application to system identiication Kensaku Fujii 1;, Masaaki
More informationA Research on Moving Human Body Detection Based on the Depth Images of Kinect
Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com A Research on Moving Human Body Detection Based on the Depth Images o Kinect * Xi an Zhu, Jiaqi Huo Institute o Inormation
More informationComputer Data Analysis and Plotting
Phys 122 February 6, 2006 quark%//~bland/docs/manuals/ph122/pcintro/pcintro.doc Computer Data Analysis and Plotting In this lab we will use Microsot EXCEL to do our calculations. This program has been
More informationComputer Data Analysis and Use of Excel
Computer Data Analysis and Use o Excel I. Theory In this lab we will use Microsot EXCEL to do our calculations and error analysis. This program was written primarily or use by the business community, so
More information2. Getting Started with the Graphical User Interface
February 2011 NII52017-10.1.0 2. Getting Started with the Graphical User Interace NII52017-10.1.0 The Nios II Sotware Build Tools (SBT) or Eclipse is a set o plugins based on the popular Eclipse ramework
More informationfoldr CS 5010 Program Design Paradigms Lesson 5.4
oldr CS 5010 Program Design Paradigms Lesson 5.4 Mitchell Wand, 2012-2014 This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License. 1 Introduction In this lesson,
More informationOptics Quiz #2 April 30, 2014
.71 - Optics Quiz # April 3, 14 Problem 1. Billet s Split Lens Setup I the ield L(x) is placed against a lens with ocal length and pupil unction P(x), the ield (X) on the X-axis placed a distance behind
More informationSensors & Transducers 2016 by IFSA Publishing, S. L.
Sensors & ransducers 06 by IFSA Publishing, S. L. http://www.sensorsportal.com Polynomial Regression echniques or Environmental Data Recovery in Wireless Sensor Networks Kohei Ohba, Yoshihiro Yoneda, Koji
More informationImproving Alignment of Faces for Recognition
Improving Alignment o Faces or Recognition Md. Kamrul Hasan Département de génie inormatique et génie logiciel École Polytechnique de Montréal, Québec, Canada md-kamrul.hasan@polymtl.ca Christopher J.
More informationUnsupervised Learning of Probabilistic Models for Robot Navigation
Unsupervised Learning o Probabilistic Models or Robot Navigation Sven Koenig Reid G. Simmons School o Computer Science, Carnegie Mellon University Pittsburgh, PA 15213-3891 Abstract Navigation methods
More informationIntelligent Hands Free Speech based SMS System on Android
Intelligent Hands Free Speech based SMS System on Android Gulbakshee Dharmale 1, Dr. Vilas Thakare 3, Dr. Dipti D. Patil 2 1,3 Computer Science Dept., SGB Amravati University, Amravati, INDIA. 2 Computer
More informationMOVING CAMERA ROTATION ESTIMATION USING HORIZON LINE FEATURES MOTION FIELD
MOVING CAMERA ROTATION ESTIMATION USING HORION LINE FEATURES MOTION FIELD S. Nedevschi, T. Marita, R. Danescu, F. Oniga, C. Pocol Computer Science Department Technical University o Cluj-Napoca Cluj-Napoca,
More informationRealtime Depth Estimation and Obstacle Detection from Monocular Video
Realtime Depth Estimation and Obstacle Detection rom Monocular Video Andreas Wedel 1,2,UweFranke 1, Jens Klappstein 1, Thomas Brox 2, and Daniel Cremers 2 1 DaimlerChrysler Research and Technology, REI/AI,
More informationReflection and Refraction
Relection and Reraction Object To determine ocal lengths o lenses and mirrors and to determine the index o reraction o glass. Apparatus Lenses, optical bench, mirrors, light source, screen, plastic or
More informationNoninvasive optical tomographic imaging by speckle ensemble
Invited Paper Noninvasive optical tomographic imaging by speckle ensemble Joseph Rosen and David Abookasis Ben-Gurion University o the Negev Department o Electrical and Computer Engineering P. O. Box 653,
More informationMath 1314 Lesson 24 Maxima and Minima of Functions of Several Variables
Math 1314 Lesson 4 Maxima and Minima o Functions o Several Variables We learned to ind the maxima and minima o a unction o a single variable earlier in the course. We had a second derivative test to determine
More informationReducing the Bandwidth of a Sparse Matrix with Tabu Search
Reducing the Bandwidth o a Sparse Matrix with Tabu Search Raael Martí a, Manuel Laguna b, Fred Glover b and Vicente Campos a a b Dpto. de Estadística e Investigación Operativa, Facultad de Matemáticas,
More informationAC : DEVELOPMENT OF A ROBOTIC PLATFORM FOR TEACH- ING MODEL-BASED DESIGN TECHNIQUES IN DYNAMICS AND CON- TROL PROGRAM
AC 011-714: DEVELOPMENT OF A ROBOTIC PLATFORM FOR TEACH- ING MODEL-BASED DESIGN TECHNIQUES IN DYNAMICS AND CON- TROL PROGRAM Bingen Yang, University o Southern Caliornia Dr. Bingen Yang is Proessor o Aerospace
More informationDepartment of Computer Science & Engineering. The Chinese University of Hong Kong Final Year Project LYU0102
Department of Computer Science & Engineering The Chinese University of Hong Kong LYU0102 Supervised by Prof. LYU, Rung Tsong Michael Group Members: Chan Pik Wah Ngai Cheuk Han Prepared by Chan Pik Wah
More informationA fast and area-efficient FPGA-based architecture for high accuracy logarithm approximation
A ast and area-eicient FPGA-based architecture or high accuracy logarithm approximation Dimitris Bariamis, Dimitris Maroulis, Dimitris K. Iakovidis Department o Inormatics and Telecommunications University
More informationKeysight Technologies Specifying Calibration Standards and Kits for Keysight Vector Network Analyzers. Application Note
Keysight Technologies Speciying Calibration Standards and Kits or Keysight Vector Network Analyzers Application Note Introduction Measurement errors in network analysis can be separated into two categories:
More informationCamera Calibration Using Two Concentric Circles
Camera Calibration Using Two Concentric Circles Francisco Abad, Emilio Camahort, and Roberto Vivó Universidad Politécnica de Valencia, Camino de Vera s/n, Valencia 4601, Spain {jabad, camahort, rvivo}@dsic.upv.es,
More informationDSP Design Flow User Guide
DSP Design Flow User Guide 101 Innovation Drive San Jose, CA 95134 www.altera.com Document Date: June 2009 Copyright 2009 Altera Corporation. All rights reserved. Altera, The Programmable Solutions Company,
More informationCharacterizing the network behavior of P2P traffic
Characterizing the network behavior o PP traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera
More informationAutomatic Creation and Application of Texture Patterns to 3D Polygon Maps
Automatic Creation and Application o Texture Patterns to 3D Polygon Maps Kim Oliver Rinnewitz 1, Thomas Wiemann 1, Kai Lingemann 2 and Joachim Hertzberg 1,2 Abstract Textured polygon meshes are becoming
More informationAn Introduction to Pattern Recognition
An Introduction to Pattern Recognition Speaker : Wei lun Chao Advisor : Prof. Jian-jiun Ding DISP Lab Graduate Institute of Communication Engineering 1 Abstract Not a new research field Wide range included
More informationA MULTI-LEVEL IMAGE DESCRIPTION MODEL SCHEME BASED ON DIGITAL TOPOLOGY
In: Stilla U et al (Eds) PIA7. International Archives o Photogrammetry, Remote Sensing and Spatial Inormation Sciences, 36 (3/W49B) A MULTI-LEVEL IMAGE DESCRIPTION MODEL SCHEME BASED ON DIGITAL TOPOLOG
More informationSection II. Nios II Software Development
Section II. Nios II Sotware Development This section o the Embedded Design Handbook describes how to most eectively use the Altera tools or embedded system sotware development, and recommends design styles
More informationFully Automatic Methodology for Human Action Recognition Incorporating Dynamic Information
Fully Automatic Methodology for Human Action Recognition Incorporating Dynamic Information Ana González, Marcos Ortega Hortas, and Manuel G. Penedo University of A Coruña, VARPA group, A Coruña 15071,
More informationAn Approach for Performance Evaluation of Batch-sequential and Parallel Architectural Styles
An Approach or Perormance Evaluation o Batch-sequential and Parallel Architectural Styles Golnaz Aghaee Ghazvini MSc student, Young Research Club, Njaabad Branch, Esahan, Iran Aghaee.golnaz@sco.iaun.ac.ir
More informationA Study of Low-resolution Safety Helmet Image Recognition Combining Statistical Features with Artificial Neural Network
A Study o Low-resolution Saety Helmet Image Recognition Combining Statistical Features with Artiicial Neural Network Xinhua JIANG, Heru XUE *, Lina ZHANG, Yanqing ZHOU College o Computer and Inormation
More informationAUTOMATING THE DESIGN OF SOUND SYNTHESIS TECHNIQUES USING EVOLUTIONARY METHODS. Ricardo A. Garcia *
AUTOMATING THE DESIGN OF SOUND SYNTHESIS TECHNIQUES USING EVOLUTIONARY METHODS Ricardo A. Garcia * MIT Media Lab Machine Listening Group 20 Ames St., E5-49, Cambridge, MA 0239 rago@media.mit.edu ABSTRACT
More informationReview for Exam I, EE552 2/2009
Gonale & Woods Review or Eam I, EE55 /009 Elements o Visual Perception Image Formation in the Ee and relation to a photographic camera). Brightness Adaption and Discrimination. Light and the Electromagnetic
More informationCS 161: Design and Analysis of Algorithms
CS 161: Design and Analysis o Algorithms Announcements Homework 3, problem 3 removed Greedy Algorithms 4: Human Encoding/Set Cover Human Encoding Set Cover Alphabets and Strings Alphabet = inite set o
More informationUnsupervised learning in Vision
Chapter 7 Unsupervised learning in Vision The fields of Computer Vision and Machine Learning complement each other in a very natural way: the aim of the former is to extract useful information from visual
More informationMulti-Scale Retinal Vessel Segmentation Using Hessian Matrix Enhancement
Multi-Scale Retinal Vessel Segmentation Using Hessian Matrix Enhancement Ning Cui 1, Xiaoting Liu, Song Yang 3 1,,3 Electronic and Inormation Engineering College, Tianjin Polytechnic University,Tianjin,China
More informationModeling and Calibration of the Galvanometric Laser Scanning Three- Dimensional Measurement System
Nanomanuacturing and Metrology (8) :8 9 https://doi.org/./s48-8-- (45689().,-volV)(45689().,-volV) ORIGINAL ARTICLES Modeling and Calibration o the Galvanometric Laser Scanning Three- Dimensional Measurement
More informationVideo shot segmentation using late fusion technique
Video shot segmentation using late fusion technique by C. Krishna Mohan, N. Dhananjaya, B.Yegnanarayana in Proc. Seventh International Conference on Machine Learning and Applications, 2008, San Diego,
More informationHAND-GESTURE BASED FILM RESTORATION
HAND-GESTURE BASED FILM RESTORATION Attila Licsár University of Veszprém, Department of Image Processing and Neurocomputing,H-8200 Veszprém, Egyetem u. 0, Hungary Email: licsara@freemail.hu Tamás Szirányi
More informationKANGAL REPORT
Individual Penalty Based Constraint handling Using a Hybrid Bi-Objective and Penalty Function Approach Rituparna Datta Kalyanmoy Deb Mechanical Engineering IIT Kanpur, India KANGAL REPORT 2013005 Abstract
More information3-D TERRAIN RECONSTRUCTION WITH AERIAL PHOTOGRAPHY
3-D TERRAIN RECONSTRUCTION WITH AERIAL PHOTOGRAPHY Bin-Yih Juang ( 莊斌鎰 ) 1, and Chiou-Shann Fuh ( 傅楸善 ) 3 1 Ph. D candidate o Dept. o Mechanical Engineering National Taiwan University, Taipei, Taiwan Instructor
More informationA SHOT BOUNDARY DETECTION TECHNIQUE BASED ON LOCAL COLOR MOMENTS IN YC B C R COLOR SPACE
A SHOT BOUNDARY DETECTION TECHNIQUE BASED ON LOCAL COLOR MOMENTS IN YC B C R COLOR SPACE S.A.Angadi 1 and Vilas Naik 2 1 Department of Computer Science Engineering, Basaveshwar Engineering College,Bagalkot
More informationThe Plenoptic Camera as a wavefront sensor for the European Solar Telescope (EST)
The Plenoptic Camera as a waveront sensor or the European Solar Telescope (EST) Luis F. Rodríguez-Ramos* a, Yolanda Martín a, José J. íaz a, J. Piqueras a, J. M. Rodríguez-Ramos b a Institute o Astrophysics
More information2. Design Planning with the Quartus II Software
November 2013 QII51016-13.1.0 2. Design Planning with the Quartus II Sotware QII51016-13.1.0 This chapter discusses key FPGA design planning considerations, provides recommendations, and describes various
More informationRelaxing the 3L algorithm for an accurate implicit polynomial fitting
Relaxing the 3L algorithm or an accurate implicit polynomial itting Mohammad Rouhani Computer Vision Center Ediici O, Campus UAB 08193 Bellaterra, Barcelona, Spain rouhani@cvc.uab.es Angel D. Sappa Computer
More informationES 240: Scientific and Engineering Computation. a function f(x) that can be written as a finite series of power functions like
Polynomial Deinition a unction () that can be written as a inite series o power unctions like n is a polynomial o order n n ( ) = A polynomial is represented by coeicient vector rom highest power. p=[3-5
More informationTHE KEY OF BULK WAREHOUSE GRAIN QUANTITY RECOGNITION Rectangular Benchmark Image Recognition
THE KEY OF BULK WAREHOUSE GRAIN QUANTITY RECOGNITION Rectangular Benchmark Image Recognition Ying Lin * Yang Fu College o management Chong Qing Jiao Tong Universit Chongqing China 400074 School o Electronic
More informationA Method of Sign Language Gesture Recognition Based on Contour Feature
Proceedings o the World Congress on Engineering and Computer Science 014 Vol I WCECS 014, -4 October, 014, San Francisco, USA A Method o Sign Language Gesture Recognition Based on Contour Feature Jingzhong
More informationMessage authentication
Message authentication -- Reminder on hash unctions -- MAC unctions hash based block cipher based -- Digital signatures (c) Levente Buttyán (buttyan@crysys.hu) Hash unctions a hash unction is a unction
More informationResearch Article Evaluation of Beef Marbling Grade Based on Advanced Watershed Algorithm and Neural Network
Advance Journal o Food Science and Technology 6(2): 206-2, 204 DOI:0.9026/ajst.6. ISSN: 2042-4868; e-issn: 2042-4876 204 Maxwell Scientiic Publication Corp. Submitted: September 8, 203 Accepted: November
More information