首页 > 最新文献

Image Processing & Communications最新文献

英文 中文
Object recognition algorithm for mobile devices 移动设备对象识别算法
Pub Date : 2013-03-01 DOI: 10.2478/v10248-012-0088-x
R. Kozik, A. Marchewka
Abstract In this paper an object recognition algorithm for mobile devices is presented. The algorithm is based on a hierarchical approach for visual information coding proposed by Riesenhuber and Poggio [1] and later extended by Serre et al. [2]. The proposed method adapts an efficient algorithm to extract the information about local gradients. This allows the algorithm to approximate the behaviour of simple cells layer of Riesenhuber and Poggio model. Moreover, it is also demonstrated that the proposed algorithm can be successfully deployed on a low-cost Android smartphone.
本文提出了一种移动设备目标识别算法。该算法基于Riesenhuber和Poggio[1]提出的视觉信息编码分层方法,后来由Serre等人扩展。该方法采用了一种高效的局部梯度信息提取算法。这使得算法可以近似于Riesenhuber和Poggio模型中简单细胞层的行为。此外,还证明了该算法可以成功部署在低成本的Android智能手机上。
{"title":"Object recognition algorithm for mobile devices","authors":"R. Kozik, A. Marchewka","doi":"10.2478/v10248-012-0088-x","DOIUrl":"https://doi.org/10.2478/v10248-012-0088-x","url":null,"abstract":"Abstract In this paper an object recognition algorithm for mobile devices is presented. The algorithm is based on a hierarchical approach for visual information coding proposed by Riesenhuber and Poggio [1] and later extended by Serre et al. [2]. The proposed method adapts an efficient algorithm to extract the information about local gradients. This allows the algorithm to approximate the behaviour of simple cells layer of Riesenhuber and Poggio model. Moreover, it is also demonstrated that the proposed algorithm can be successfully deployed on a low-cost Android smartphone.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124904685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network anomaly detection based on signal processing techniques 基于信号处理技术的网络异常检测
Pub Date : 2013-03-01 DOI: 10.2478/v10248-012-0071-6
T. Andrysiak, Ł. Saganowski, M. Maszewski
Abstract The article depicts possibility of using Matching Pursuit decomposition in order to recognize unspecified hazards in network traffic. Furthermore, the work aims to present feasible enhancements to the anomaly detection method, as well as their efficiency on the basis of a wide collection of pattern test traces.
摘要本文描述了利用匹配追踪分解来识别网络流量中未指定危险的可能性。此外,该工作的目的是在广泛收集模式测试痕迹的基础上,对异常检测方法及其效率提出可行的改进。
{"title":"Network anomaly detection based on signal processing techniques","authors":"T. Andrysiak, Ł. Saganowski, M. Maszewski","doi":"10.2478/v10248-012-0071-6","DOIUrl":"https://doi.org/10.2478/v10248-012-0071-6","url":null,"abstract":"Abstract The article depicts possibility of using Matching Pursuit decomposition in order to recognize unspecified hazards in network traffic. Furthermore, the work aims to present feasible enhancements to the anomaly detection method, as well as their efficiency on the basis of a wide collection of pattern test traces.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132458988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of the curvature scale space transform to the representation of three-dimensional models 曲率尺度空间变换在三维模型表示中的应用
Pub Date : 2013-03-01 DOI: 10.2478/v10248-012-0087-y
D. Frejlichowski
Abstract In this paper an algorithm for the representation of 3D models is described and experimentally evaluated. Three-dimensional objects are becoming very popular recently and they are processed in various ways - analysed, retrieved, recognised, and so on. Moreover, they are employed in various aplications, such as virtual reality, entertainment, Internet, Computer Aided Design, or even in biometrics or medical imaging. That is why the development of appropriate algorithms for the representation of 3D objects is so important recently. These algorithms - so called 3D shape descriptors - are assumed to be invariant to particular transformations and deformations. One of the possible approaches is based on the projections of a 3D object into planar shapes and representation of them using a 2D shape descriptor. An algorithm realising this idea is described in this paper. Its first stage is based on the rendering of 20 2D projections, from various points of view. Later, the obtained projections are stored in a form of bitmaps and the Curvature Scale Space algorithm is applied for the description of the planar shapes extracted from them. The proposed approach is experimentally compared with several other 3D shape representation methods.
本文描述了一种三维模型表示算法,并进行了实验验证。三维物体最近变得非常流行,它们被以各种方式处理——分析、检索、识别等等。此外,它们被用于各种应用,如虚拟现实,娱乐,互联网,计算机辅助设计,甚至生物识别或医学成像。这就是为什么最近开发合适的3D对象表示算法如此重要的原因。这些算法——即所谓的3D形状描述符——被认为对特定的变换和变形是不变的。一种可能的方法是基于3D对象到平面形状的投影,并使用2D形状描述符表示它们。本文描述了一种实现这一思想的算法。它的第一阶段是基于20个2D投影的渲染,从不同的角度。然后,将得到的投影以位图的形式存储,并应用曲率尺度空间算法对提取的平面形状进行描述。将该方法与其他几种三维形状表示方法进行了实验比较。
{"title":"Application of the curvature scale space transform to the representation of three-dimensional models","authors":"D. Frejlichowski","doi":"10.2478/v10248-012-0087-y","DOIUrl":"https://doi.org/10.2478/v10248-012-0087-y","url":null,"abstract":"Abstract In this paper an algorithm for the representation of 3D models is described and experimentally evaluated. Three-dimensional objects are becoming very popular recently and they are processed in various ways - analysed, retrieved, recognised, and so on. Moreover, they are employed in various aplications, such as virtual reality, entertainment, Internet, Computer Aided Design, or even in biometrics or medical imaging. That is why the development of appropriate algorithms for the representation of 3D objects is so important recently. These algorithms - so called 3D shape descriptors - are assumed to be invariant to particular transformations and deformations. One of the possible approaches is based on the projections of a 3D object into planar shapes and representation of them using a 2D shape descriptor. An algorithm realising this idea is described in this paper. Its first stage is based on the rendering of 20 2D projections, from various points of view. Later, the obtained projections are stored in a form of bitmaps and the Curvature Scale Space algorithm is applied for the description of the planar shapes extracted from them. The proposed approach is experimentally compared with several other 3D shape representation methods.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"96 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132782287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of wimax admission control algorithms in mobile voip scenarios with batch arrivals and nbldpc fec 具有批量到达和无流量的移动voip场景下wimax准入控制算法的评估
Pub Date : 2013-03-01 DOI: 10.2478/v10248-012-0072-5
A. Flizikowski, Marcin Przybyszewski, W. Holubowicz
Abstract This paper presents results of assessing quality of VoIP conversations in WiMAX networks using the nbLDPC (non-binary Low- Density Parity-Check) FEC in mobility scenarios that are based on the real world terrain charactristics around simulated BS. System under test (SUT) is instrumented with three Call Admission Control (CAC) mechanisms (namely EMAC, ARAC and nsc-ARAC). These algorithms are evaluated against controlling the VBR traffic that comes with burst arrivals. The first algorithm relies on calculating simple exponential weighted moving average (EWMA) of the overall resource consumption whereas the other two ARAC algorithms perform calculations discerning between the new, the ongoing and the finishing connections thus providing more accurate resource estimations (but the ARAC tracks the history of requests as well). In order to evaluate their performance authors rely on a cell-level based simulation environment that relies on the cooperative use of well known simulators - ns2 and Matlab. Previous work in the field is enhanced by improving the fidelity of proposed IEEE 802.16 simulator. Authors demonstrate the influence of increasing number of arrivals per one batch as well as testing the "zero hour" scenario (system saturation). In order to include nbLDPC codes in SUT’s mobile channels, a method called Link-To-System interface (L2S) has been implemented.
摘要本文介绍了在基于模拟BS周围的真实世界地形特征的移动场景中,使用nbLDPC(非二进制低密度奇偶校验)FEC评估WiMAX网络中VoIP会话质量的结果。被测系统采用三种呼叫接纳控制(CAC)机制(即EMAC、ARAC和nsc-ARAC)。这些算法是针对控制突发到达的VBR流量进行评估的。第一种算法依赖于计算总体资源消耗的简单指数加权移动平均(EWMA),而另外两种ARAC算法执行区分新连接、正在进行连接和结束连接的计算,从而提供更准确的资源估计(但ARAC也跟踪请求的历史记录)。为了评估它们的性能,作者依赖于基于单元级的仿真环境,该环境依赖于众所周知的模拟器ns2和Matlab的协同使用。通过改进所提出的IEEE 802.16模拟器的保真度,增强了先前在该领域的工作。作者演示了每批到货数量增加的影响,并测试了“零时”情景(系统饱和)。为了在SUT的移动信道中包含nbLDPC码,实现了一种称为链路到系统接口(L2S)的方法。
{"title":"Evaluation of wimax admission control algorithms in mobile voip scenarios with batch arrivals and nbldpc fec","authors":"A. Flizikowski, Marcin Przybyszewski, W. Holubowicz","doi":"10.2478/v10248-012-0072-5","DOIUrl":"https://doi.org/10.2478/v10248-012-0072-5","url":null,"abstract":"Abstract This paper presents results of assessing quality of VoIP conversations in WiMAX networks using the nbLDPC (non-binary Low- Density Parity-Check) FEC in mobility scenarios that are based on the real world terrain charactristics around simulated BS. System under test (SUT) is instrumented with three Call Admission Control (CAC) mechanisms (namely EMAC, ARAC and nsc-ARAC). These algorithms are evaluated against controlling the VBR traffic that comes with burst arrivals. The first algorithm relies on calculating simple exponential weighted moving average (EWMA) of the overall resource consumption whereas the other two ARAC algorithms perform calculations discerning between the new, the ongoing and the finishing connections thus providing more accurate resource estimations (but the ARAC tracks the history of requests as well). In order to evaluate their performance authors rely on a cell-level based simulation environment that relies on the cooperative use of well known simulators - ns2 and Matlab. Previous work in the field is enhanced by improving the fidelity of proposed IEEE 802.16 simulator. Authors demonstrate the influence of increasing number of arrivals per one batch as well as testing the \"zero hour\" scenario (system saturation). In order to include nbLDPC codes in SUT’s mobile channels, a method called Link-To-System interface (L2S) has been implemented.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"24 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125672365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital processing methods of images and signals in electromagnetic infiltration process 电磁渗透过程中图像和信号的数字化处理方法
Pub Date : 2013-03-01 DOI: 10.2478/v10248-012-0070-7
I. Kubiak
Abstract The article contains information about the capabilities of electromagnetic infiltration process in case of occurrence of strong interfering signals. As a methods supporting infiltration process used method of digital processing of signals and images in the form of histogram transformations, global and local thresholding of signal amplitudes and logical filters. The material presented in the article shows that risk can arise if the uncontrolled use of the computer. Risks that could decide our safety and security of our data. obtained images. Manipulation of histograms, threshold amplitudes of the emission signal correlated with the classified signals or logical filters highlight the weakness of the security used at the source. The presence of strong interfering signals such as vertical and horizontal synchronization signals blocking measurement receivers, do not prevent the reproduction of classified information. Opportunities of the electromagnetic infiltration in situations of weak compromising emissions occurs are presented in the article.
摘要本文介绍了在强干扰信号出现的情况下电磁渗透过程的能力。作为一种支持浸润过程的方法,采用了直方图变换、信号幅度的全局和局部阈值分割以及逻辑滤波等形式对信号和图像进行数字处理的方法。文章中提供的材料表明,如果不加控制地使用计算机,可能会产生风险。这些风险可能会决定我们的安全和数据的安全性。获得的图像。直方图的操作,与分类信号或逻辑滤波器相关的发射信号的阈值幅度突出了在源处使用的安全性的弱点。存在的强干扰信号如垂直和水平同步信号阻塞测量接收机,不妨碍机密信息的再现。提出了在弱妥协发射情况下电磁渗透的机会。
{"title":"Digital processing methods of images and signals in electromagnetic infiltration process","authors":"I. Kubiak","doi":"10.2478/v10248-012-0070-7","DOIUrl":"https://doi.org/10.2478/v10248-012-0070-7","url":null,"abstract":"Abstract The article contains information about the capabilities of electromagnetic infiltration process in case of occurrence of strong interfering signals. As a methods supporting infiltration process used method of digital processing of signals and images in the form of histogram transformations, global and local thresholding of signal amplitudes and logical filters. The material presented in the article shows that risk can arise if the uncontrolled use of the computer. Risks that could decide our safety and security of our data. obtained images. Manipulation of histograms, threshold amplitudes of the emission signal correlated with the classified signals or logical filters highlight the weakness of the security used at the source. The presence of strong interfering signals such as vertical and horizontal synchronization signals blocking measurement receivers, do not prevent the reproduction of classified information. Opportunities of the electromagnetic infiltration in situations of weak compromising emissions occurs are presented in the article.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129077424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Uncertainty-tolerant scheduling strategies for grid computing: knowledge-based techniques with bio-inspired learning 网格计算的不确定性容忍调度策略:基于知识的生物启发学习技术
Pub Date : 2013-03-01 DOI: 10.2478/v10248-012-0073-4
S. García-Galán, R. Pérez de Prado, J. E. Muñoz Expósito
Abstract Nowadays, diverse areas in science as high energy physics, astronomy or climate research are increasingly relying on experimental studies addressed with hard computing simulations that cannot be faced with traditional distributed systems. In this context, grid computing has emerged as the new generation computing platform based on the large-scale cooperation of resources. Furthermore, the use of grid computing has also been extended to several technology, engineering or economy areas such as financial services and construction engineering that demand high computer capabilities. Nevertheless, a major issue in the sharing of resources is the scheduling problem in a high-dynamic and uncertain environment where resources may become available, inactive or reserved over time according to local policies or systems failures. In this paper, a review of scheduling strategies dealing with uncertainty in systems information by the application of techniques such as fuzzy logic, neural networks or evolutionary algorithms is presented. Furthermore, this work is centered on the study of scheduling strategies based on fuzzy rulebased systems given their flexibility and ability to adapt to changes in grid systems. These knowledge-based strategies are founded on a fuzzy characterization of the system state and the application of the scheduler knowledge in the form of fuzzy rules to cope with the imprecise environment. Obtaining good rules also arises as a challenging problem. Hence, the main learning methods that allow the improvement and adaptation of the expert schedulers are introduced.
如今,在高能物理、天文学或气候研究等不同的科学领域,越来越多地依赖于传统分布式系统无法面对的硬计算模拟实验研究。在此背景下,网格计算作为基于资源大规模协同的新一代计算平台应运而生。此外,网格计算的使用也已经扩展到一些技术、工程或经济领域,如金融服务和建筑工程,这些领域需要很高的计算机能力。然而,资源共享中的一个主要问题是高动态和不确定环境中的调度问题,在这种环境中,资源可能随着时间的推移根据本地策略或系统故障变为可用、不活动或保留。本文综述了应用模糊逻辑、神经网络和进化算法等技术处理系统信息不确定性的调度策略。此外,本工作的重点是研究基于模糊规则系统的调度策略,因为它们具有灵活性和适应网格系统变化的能力。这些基于知识的策略是建立在系统状态的模糊表征和以模糊规则形式应用调度知识来应对不精确环境的基础上的。获得好的规则也是一个具有挑战性的问题。因此,介绍了允许专家调度器改进和适应的主要学习方法。
{"title":"Uncertainty-tolerant scheduling strategies for grid computing: knowledge-based techniques with bio-inspired learning","authors":"S. García-Galán, R. Pérez de Prado, J. E. Muñoz Expósito","doi":"10.2478/v10248-012-0073-4","DOIUrl":"https://doi.org/10.2478/v10248-012-0073-4","url":null,"abstract":"Abstract Nowadays, diverse areas in science as high energy physics, astronomy or climate research are increasingly relying on experimental studies addressed with hard computing simulations that cannot be faced with traditional distributed systems. In this context, grid computing has emerged as the new generation computing platform based on the large-scale cooperation of resources. Furthermore, the use of grid computing has also been extended to several technology, engineering or economy areas such as financial services and construction engineering that demand high computer capabilities. Nevertheless, a major issue in the sharing of resources is the scheduling problem in a high-dynamic and uncertain environment where resources may become available, inactive or reserved over time according to local policies or systems failures. In this paper, a review of scheduling strategies dealing with uncertainty in systems information by the application of techniques such as fuzzy logic, neural networks or evolutionary algorithms is presented. Furthermore, this work is centered on the study of scheduling strategies based on fuzzy rulebased systems given their flexibility and ability to adapt to changes in grid systems. These knowledge-based strategies are founded on a fuzzy characterization of the system state and the application of the scheduler knowledge in the form of fuzzy rules to cope with the imprecise environment. Obtaining good rules also arises as a challenging problem. Hence, the main learning methods that allow the improvement and adaptation of the expert schedulers are introduced.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121694582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Long-Memory Dependence Statistical Models for DDoS Attacks Detection 基于长内存依赖性的DDoS攻击检测统计模型
Pub Date : 1900-01-01 DOI: 10.1515/ipc-2015-0042
T. Andrysiak, Ł. Saganowski, M. Maszewski, Piotr Grad
Abstract DDoS attacks detection method based on modelling the variability with the use of conditional average and variance in examined time series is proposed in this article. Variability predictions of the analyzed network traffic are realized by estimated statistical models with long-memory dependence ARFIMA, Adaptive ARFIMA, FIGARCH and Adaptive FIGARCH. We propose simple parameter estimation models with the use of maximum likelihood function. Selection of sparingly parameterized form of the models is realized by means of information criteria representing a compromise between brevity of representation and the extent of the prediction error. In the described method we propose using statistical relations between the forecasted and analyzed network traffic in order to detect abnormal behavior possibly being a result of a network attack. Performed experiments confirmed effectiveness of the analyzed method and cogency of the statistical models.
摘要本文提出了一种基于条件平均和方差对被检测时间序列的可变性建模的DDoS攻击检测方法。通过长记忆依赖性ARFIMA、自适应ARFIMA、FIGARCH和自适应FIGARCH估计统计模型实现了网络流量的变异性预测。我们提出了使用极大似然函数的简单参数估计模型。模型的参数化形式的选择是通过信息标准来实现的,这些信息标准代表了表示的简洁性和预测误差的程度之间的折衷。在所描述的方法中,我们提出利用预测和分析的网络流量之间的统计关系来检测可能是网络攻击的结果的异常行为。通过实验验证了分析方法的有效性和统计模型的正确性。
{"title":"Long-Memory Dependence Statistical Models for DDoS Attacks Detection","authors":"T. Andrysiak, Ł. Saganowski, M. Maszewski, Piotr Grad","doi":"10.1515/ipc-2015-0042","DOIUrl":"https://doi.org/10.1515/ipc-2015-0042","url":null,"abstract":"Abstract DDoS attacks detection method based on modelling the variability with the use of conditional average and variance in examined time series is proposed in this article. Variability predictions of the analyzed network traffic are realized by estimated statistical models with long-memory dependence ARFIMA, Adaptive ARFIMA, FIGARCH and Adaptive FIGARCH. We propose simple parameter estimation models with the use of maximum likelihood function. Selection of sparingly parameterized form of the models is realized by means of information criteria representing a compromise between brevity of representation and the extent of the prediction error. In the described method we propose using statistical relations between the forecasted and analyzed network traffic in order to detect abnormal behavior possibly being a result of a network attack. Performed experiments confirmed effectiveness of the analyzed method and cogency of the statistical models.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130982819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Application of Distributed Multi-Node, Multi-GPU Heterogeneous System for Acceleration of Image Reconstruction in Electrical Capacitance Tomography 分布式多节点、多gpu异构系统在电容层析成像图像加速重建中的应用分析
Pub Date : 1900-01-01 DOI: 10.1515/ipc-2015-0035
M. Majchrowicz, Paweł Kapusta, L. Jackowska-Strumillo, D. Sankowski
Abstract 3D ECT provides a lot of challenging computational issues that have been reported in the past by many researchers. Image reconstruction using deterministic methods requires execution of many basic operations of linear algebra, such as matrix transposition, multiplication, addition and subtraction. In order to reach real-time reconstruction a 3D ECT computational subsystem has to be able to transform capacitance data into image in fractions of seconds. By assuming, that many of the computations can be performed in parallel using modern, fast graphics processor and by altering the algorithms time to achieve high quality image reconstruction will be shortened significantly. The research conducted while analysing ECT algorithms has also shown that, although dynamic development of GPU computational capabilities and its recent application for image reconstruction in ECT has significantly improved calculations time, in modern systems a single GPU is not enough to perform many tasks. Distributed Multi-GPU solutions can reduce reconstruction time to only a fraction of what was possible on pure CPU systems. Nevertheless performed tests clearly illustrate the need for developing a new distributed platform, which would be able to fully utilize the potential of the hardware. It has to take into account specific nature of computations in Multi-GPU systems.
3D ECT提供了许多具有挑战性的计算问题,这些问题在过去已经被许多研究人员报道过。用确定性方法重建图像需要执行许多线性代数的基本运算,如矩阵的变换、乘法、加法和减法。为了实现实时重建,三维ECT计算子系统必须能够在几秒钟内将电容数据转换为图像。假设许多计算可以使用现代、快速的图形处理器并行执行,并且通过改变算法来实现高质量图像重建的时间将大大缩短。在分析ECT算法的同时进行的研究也表明,尽管GPU计算能力的动态发展及其最近在ECT中图像重建的应用显著改善了计算时间,但在现代系统中,单个GPU不足以执行许多任务。分布式多gpu解决方案可以将重建时间减少到纯CPU系统的一小部分。然而,进行的测试清楚地表明,需要开发一种新的分布式平台,这种平台将能够充分利用硬件的潜力。它必须考虑到多gpu系统中计算的特定性质。
{"title":"Analysis of Application of Distributed Multi-Node, Multi-GPU Heterogeneous System for Acceleration of Image Reconstruction in Electrical Capacitance Tomography","authors":"M. Majchrowicz, Paweł Kapusta, L. Jackowska-Strumillo, D. Sankowski","doi":"10.1515/ipc-2015-0035","DOIUrl":"https://doi.org/10.1515/ipc-2015-0035","url":null,"abstract":"Abstract 3D ECT provides a lot of challenging computational issues that have been reported in the past by many researchers. Image reconstruction using deterministic methods requires execution of many basic operations of linear algebra, such as matrix transposition, multiplication, addition and subtraction. In order to reach real-time reconstruction a 3D ECT computational subsystem has to be able to transform capacitance data into image in fractions of seconds. By assuming, that many of the computations can be performed in parallel using modern, fast graphics processor and by altering the algorithms time to achieve high quality image reconstruction will be shortened significantly. The research conducted while analysing ECT algorithms has also shown that, although dynamic development of GPU computational capabilities and its recent application for image reconstruction in ECT has significantly improved calculations time, in modern systems a single GPU is not enough to perform many tasks. Distributed Multi-GPU solutions can reduce reconstruction time to only a fraction of what was possible on pure CPU systems. Nevertheless performed tests clearly illustrate the need for developing a new distributed platform, which would be able to fully utilize the potential of the hardware. It has to take into account specific nature of computations in Multi-GPU systems.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131568060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
History Dependent Viterbi Algorithm for Navigation Purposes of Line Following Robot 线路跟踪机器人导航的历史依赖Viterbi算法
Pub Date : 1900-01-01 DOI: 10.1515/ipc-2015-0039
G. Matczak, P. Mazurek
Abstract Line following robots are applied in numerous applications and the best performance could be obtained if the forward looking camera is applied. Variable light and line conditions influence the line estimation and quality of the robot navigation. Proposed History Dependent Viterbi Algorithm and Viterbi Algorithm are compared. Obtained results using Monte Carlo tests show improved performance of the proposed algorithm for assumed model.
摘要直线跟踪机器人的应用非常广泛,采用前视摄像头可以获得最佳的跟踪性能。光照和线路条件的变化会影响机器人导航的线路估计和质量。比较了提出的历史依赖Viterbi算法和Viterbi算法。通过蒙特卡罗测试得到的结果表明,该算法对假设模型的性能有所提高。
{"title":"History Dependent Viterbi Algorithm for Navigation Purposes of Line Following Robot","authors":"G. Matczak, P. Mazurek","doi":"10.1515/ipc-2015-0039","DOIUrl":"https://doi.org/10.1515/ipc-2015-0039","url":null,"abstract":"Abstract Line following robots are applied in numerous applications and the best performance could be obtained if the forward looking camera is applied. Variable light and line conditions influence the line estimation and quality of the robot navigation. Proposed History Dependent Viterbi Algorithm and Viterbi Algorithm are compared. Obtained results using Monte Carlo tests show improved performance of the proposed algorithm for assumed model.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130996575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The night vision distance measurement method dedicated for mobile robots 专用于移动机器人的夜视距离测量方法
Pub Date : 1900-01-01 DOI: 10.1515/ipc-2015-0041
Jarosław Fastowicz, P. Lech
Abstract The paper presents a vision based visual servoing system and active laser triangulation method for distance measurement. The proposed hybrid system is dedicated to mobile robot operating in difficult lighting conditions. The problems caused by the use of the video system in extremely underexposured 3D scene have been discussed and two devices performing the distance measurement together with an analysis measurements have been analyzed.
提出了一种基于视觉的视觉伺服系统和主动激光三角测量测距方法。所提出的混合系统专门用于在困难照明条件下操作的移动机器人。讨论了在极度欠曝光的三维场景中使用视频系统所引起的问题,并分析了两种设备进行距离测量和分析测量。
{"title":"The night vision distance measurement method dedicated for mobile robots","authors":"Jarosław Fastowicz, P. Lech","doi":"10.1515/ipc-2015-0041","DOIUrl":"https://doi.org/10.1515/ipc-2015-0041","url":null,"abstract":"Abstract The paper presents a vision based visual servoing system and active laser triangulation method for distance measurement. The proposed hybrid system is dedicated to mobile robot operating in difficult lighting conditions. The problems caused by the use of the video system in extremely underexposured 3D scene have been discussed and two devices performing the distance measurement together with an analysis measurements have been analyzed.","PeriodicalId":271906,"journal":{"name":"Image Processing & Communications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127858028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Image Processing & Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1