首页 > 最新文献

Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.最新文献

英文 中文
Hebbian learning based FIR filter for image restoration 基于Hebbian学习的FIR滤波器图像恢复
I. Ahmad, P. Mondal, R. Kanhirodan
Image filtering techniques have potential applications in image processing such as image restoration and image enhancement. The potential of these filters largely depends on the apriori knowledge about the type of noise corrupting the images. This makes the standard filters to be application specific. The widely used proximity based filters help in removing the noise by over-smoothing the edges. On the other hand, sharpening filters enhance the high frequency details making the image non-smooth. In this paper, we have introduced a new finite impulse response (FIR) filter for image restoration where, the filter undergoes a learning procedure. The FIR filter coefficients are adaptively updated based on correlated Hebbian learning. This algorithm exploits the inter pixel correlation in the form of Hebbian learning and hence performs optimal smoothening of the noisy images. The proposed filter uses an iterative process for efficient learning from the neighborhood pixels. Evaluation result shows that the proposed FIR filter is an efficient filter compared to average and Wiener filters for image restoration applications
图像滤波技术在图像恢复和图像增强等图像处理中具有潜在的应用前景。这些滤波器的潜力很大程度上取决于对破坏图像的噪声类型的先验知识。这使得标准过滤器是特定于应用程序的。广泛使用的基于接近的滤波器通过过度平滑边缘来帮助去除噪声。另一方面,锐化滤波器增强了高频细节,使图像不光滑。本文介绍了一种新的用于图像恢复的有限脉冲响应(FIR)滤波器,该滤波器经过一个学习过程。基于相关Hebbian学习自适应更新FIR滤波器系数。该算法以Hebbian学习的形式利用像素间的相关性,从而实现对噪声图像的最佳平滑。该滤波器使用迭代过程从邻域像素进行有效学习。评价结果表明,与平均滤波器和维纳滤波器相比,本文提出的FIR滤波器是一种有效的图像恢复滤波器
{"title":"Hebbian learning based FIR filter for image restoration","authors":"I. Ahmad, P. Mondal, R. Kanhirodan","doi":"10.1109/ISSPIT.2005.1577188","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577188","url":null,"abstract":"Image filtering techniques have potential applications in image processing such as image restoration and image enhancement. The potential of these filters largely depends on the apriori knowledge about the type of noise corrupting the images. This makes the standard filters to be application specific. The widely used proximity based filters help in removing the noise by over-smoothing the edges. On the other hand, sharpening filters enhance the high frequency details making the image non-smooth. In this paper, we have introduced a new finite impulse response (FIR) filter for image restoration where, the filter undergoes a learning procedure. The FIR filter coefficients are adaptively updated based on correlated Hebbian learning. This algorithm exploits the inter pixel correlation in the form of Hebbian learning and hence performs optimal smoothening of the noisy images. The proposed filter uses an iterative process for efficient learning from the neighborhood pixels. Evaluation result shows that the proposed FIR filter is an efficient filter compared to average and Wiener filters for image restoration applications","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126383661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Countering the false positive projection effect in nonlinear asymmetric classification 对抗非线性非对称分类中的假阳性投影效应
Serhiy Kosinov, S. Marchand-Maillet, T. Pun
This work concerns the problem of asymmetric classification and provides the following contributions. First, it introduces the method of KDDA - a kernelized extension of the distance-based discriminant analysis technique that treats data asymmetrically and naturally accommodates indefinite kernels. Second, it demonstrates that KDDA and other asymmetric nonlinear projective approaches, such as BiasMap and KFD are often prone to an adverse condition referred to as the false positive projection effect. Empirical evaluation on both synthetic and real-world data sets is carried out to assess the degree of performance degradation due to false positive projection effect, determine the viability of some schemes for its elimination, and compare the introduced KDDA method with state-of-the-art alternatives, achieving encouraging results
这项工作涉及不对称分类问题,并提供以下贡献。首先,它介绍了KDDA方法——一种基于距离的判别分析技术的核化扩展,它对数据进行不对称处理,自然地适应不确定的核。其次,它表明KDDA和其他非对称非线性投影方法,如BiasMap和KFD,往往容易出现一种被称为假阳性投影效应的不利条件。对合成数据集和真实数据集进行了经验评估,以评估由于假阳性投影效应而导致的性能下降程度,确定某些方案的消除可行性,并将引入的KDDA方法与最先进的替代方案进行比较,取得了令人鼓舞的结果
{"title":"Countering the false positive projection effect in nonlinear asymmetric classification","authors":"Serhiy Kosinov, S. Marchand-Maillet, T. Pun","doi":"10.1109/ISSPIT.2005.1577180","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577180","url":null,"abstract":"This work concerns the problem of asymmetric classification and provides the following contributions. First, it introduces the method of KDDA - a kernelized extension of the distance-based discriminant analysis technique that treats data asymmetrically and naturally accommodates indefinite kernels. Second, it demonstrates that KDDA and other asymmetric nonlinear projective approaches, such as BiasMap and KFD are often prone to an adverse condition referred to as the false positive projection effect. Empirical evaluation on both synthetic and real-world data sets is carried out to assess the degree of performance degradation due to false positive projection effect, determine the viability of some schemes for its elimination, and compare the introduced KDDA method with state-of-the-art alternatives, achieving encouraging results","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130631020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Motion blur identification in noisy images using fuzzy sets 基于模糊集的噪声图像运动模糊识别
M. Moghaddam, M. Jamzad
Motion blur is one of the most common blurs that degrades images. Restoration of such images are highly dependent to estimation of motion blur parameters. Many researchers have developed algorithms to estimate linear motion blur parameters. These algorithms are different in their performance, time complexity, precision and their robustness in noisy environments. In this paper we have presented a novel algorithm to estimate linear motion blur parameters such as direction and extend by using Radon transform to find direction and fuzzy set concepts to find its extend. The most benefit of this algorithm is its robustness and precision in noisy images. Our method was tested on a wide range of different type of standard images that were degraded with different directions (between 0deg and 180deg) and different motion lengths (between 10 to 50 pixel). Experimental results showed in average SNR > 22 db that is highly satisfactory
动态模糊是导致图像退化的最常见的模糊之一。这些图像的恢复高度依赖于运动模糊参数的估计。许多研究者已经开发了估计线性运动模糊参数的算法。这些算法在性能、时间复杂度、精度和噪声环境下的鲁棒性等方面存在差异。本文提出了一种利用Radon变换求方向和模糊集概念求扩展的线性运动模糊参数估计算法。该算法最大的优点是对噪声图像的鲁棒性和精度。我们的方法在不同方向(0°和180°之间)和不同运动长度(10到50像素之间)退化的各种不同类型的标准图像上进行了测试。实验结果表明,平均信噪比> 22 db,非常令人满意
{"title":"Motion blur identification in noisy images using fuzzy sets","authors":"M. Moghaddam, M. Jamzad","doi":"10.1109/ISSPIT.2005.1577212","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577212","url":null,"abstract":"Motion blur is one of the most common blurs that degrades images. Restoration of such images are highly dependent to estimation of motion blur parameters. Many researchers have developed algorithms to estimate linear motion blur parameters. These algorithms are different in their performance, time complexity, precision and their robustness in noisy environments. In this paper we have presented a novel algorithm to estimate linear motion blur parameters such as direction and extend by using Radon transform to find direction and fuzzy set concepts to find its extend. The most benefit of this algorithm is its robustness and precision in noisy images. Our method was tested on a wide range of different type of standard images that were degraded with different directions (between 0deg and 180deg) and different motion lengths (between 10 to 50 pixel). Experimental results showed in average SNR > 22 db that is highly satisfactory","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132053151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Issues in initializing security 初始化安全性的问题
N. Asokan, Lauri Tarkkala
Initialization of security in a system must correctly capture the underlying prior context of trust assumptions. Technical security mechanisms like security protocols and cryptographic algorithms cannot be effective unless the initialization is done properly. We identify three sources of difficulty in initializing security: (1) basing initialization on real-world identities is expensive, (2) some usage scenarios require new types of indexical prior contexts, and (3) in certain systems, there may not be any real world prior context to link to. We provide an overview of these difficulties and how some recent research work is attempting to address them
系统中安全性的初始化必须正确地捕获信任假设的基础上下文。除非正确地进行初始化,否则安全协议和加密算法等技术安全机制无法有效。我们确定了初始化安全性的三个困难来源:(1)基于真实身份的初始化是昂贵的,(2)一些使用场景需要新型的索引先验上下文,以及(3)在某些系统中,可能没有任何真实世界的先验上下文可以链接。我们提供了这些困难的概述,以及一些最近的研究工作是如何试图解决这些问题的
{"title":"Issues in initializing security","authors":"N. Asokan, Lauri Tarkkala","doi":"10.1109/ISSPIT.2005.1577141","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577141","url":null,"abstract":"Initialization of security in a system must correctly capture the underlying prior context of trust assumptions. Technical security mechanisms like security protocols and cryptographic algorithms cannot be effective unless the initialization is done properly. We identify three sources of difficulty in initializing security: (1) basing initialization on real-world identities is expensive, (2) some usage scenarios require new types of indexical prior contexts, and (3) in certain systems, there may not be any real world prior context to link to. We provide an overview of these difficulties and how some recent research work is attempting to address them","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131871732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Cryptography: algorithms and standards 密码学:算法和标准
A. Desoky
Recent years have witnessed an increasing interest in the subject of cryptography. A typical cryptography discussion includes encryption, decryption, and attack algorithms for a number of symmetric (or single key) and asymmetric (or two-key) techniques. Performance evaluation of these techniques deals with algorithm complexity and security. The central idea of cryptography is to develop and implement an invertible transform function over the space of coded information. Classical algorithms have survived for many years, but other ideas are coming quickly forward because of the advancement in computer technology. To design and understand cryptography we need to know the fundamentals of information coding, number theory, and some simple probabilistic models, as well as fast computational algorithms for integer arithmetic. This tutorial presents various cryptography techniques in a unified way, including classical and recent algorithms. Some software implementations are given for the purpose of illustration.
近年来,人们对密码学的兴趣日益浓厚。典型的密码学讨论包括针对许多对称(或单密钥)和非对称(或双密钥)技术的加密、解密和攻击算法。这些技术的性能评估涉及到算法的复杂性和安全性。密码学的核心思想是在编码信息的空间上发展和实现一个可逆的变换函数。经典的算法已经存在了很多年,但由于计算机技术的进步,其他的想法也在迅速涌现。为了设计和理解密码学,我们需要了解信息编码、数论和一些简单的概率模型的基础知识,以及整数运算的快速计算算法。本教程以统一的方式介绍各种加密技术,包括经典算法和最新算法。为了说明的目的,给出了一些软件实现。
{"title":"Cryptography: algorithms and standards","authors":"A. Desoky","doi":"10.1109/ISSPIT.2005.1577223","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577223","url":null,"abstract":"Recent years have witnessed an increasing interest in the subject of cryptography. A typical cryptography discussion includes encryption, decryption, and attack algorithms for a number of symmetric (or single key) and asymmetric (or two-key) techniques. Performance evaluation of these techniques deals with algorithm complexity and security. The central idea of cryptography is to develop and implement an invertible transform function over the space of coded information. Classical algorithms have survived for many years, but other ideas are coming quickly forward because of the advancement in computer technology. To design and understand cryptography we need to know the fundamentals of information coding, number theory, and some simple probabilistic models, as well as fast computational algorithms for integer arithmetic. This tutorial presents various cryptography techniques in a unified way, including classical and recent algorithms. Some software implementations are given for the purpose of illustration.","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"03 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131935956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Adjacent channel power ratio analysis for an OFDM signal OFDM信号的相邻信道功率比分析
S. Ragusa, J. Palicot, C. Roland, C. Lereau
The nonlinear power amplification of multi-carriers signals generates a lot of perturbations. Among them the power increase in the adjacent channels is studied in this paper. This phenomenon is characterized by the adjacent channel power ratio (ACPR) parameter. The analysis we perform in this paper allows us to find a general expression of ACPR versus the number of signal's sub-carriers, N. Then, we propose a new ACPR definition which permits to better characterize the increase of the shoulders (spectral regrowth). Another interest of our derivation is that we can find the parameters a1 and a3 of the amplifier's polynomial model for a desired ACPR
多载波信号的非线性功率放大会产生大量的扰动。其中,本文对相邻信道的功率增加进行了研究。这种现象的特征是相邻信道功率比(ACPR)参数。我们在本文中进行的分析使我们能够找到ACPR与信号子载波数量n的一般表达式,然后,我们提出了一个新的ACPR定义,它可以更好地表征肩部的增加(频谱再生)。我们推导的另一个有趣之处是,我们可以找到放大器的多项式模型的参数a1和a3,用于期望的ACPR
{"title":"Adjacent channel power ratio analysis for an OFDM signal","authors":"S. Ragusa, J. Palicot, C. Roland, C. Lereau","doi":"10.1109/ISSPIT.2005.1577147","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577147","url":null,"abstract":"The nonlinear power amplification of multi-carriers signals generates a lot of perturbations. Among them the power increase in the adjacent channels is studied in this paper. This phenomenon is characterized by the adjacent channel power ratio (ACPR) parameter. The analysis we perform in this paper allows us to find a general expression of ACPR versus the number of signal's sub-carriers, N. Then, we propose a new ACPR definition which permits to better characterize the increase of the shoulders (spectral regrowth). Another interest of our derivation is that we can find the parameters a1 and a3 of the amplifier's polynomial model for a desired ACPR","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132627366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multi-user detector for MC-CDMA using nonorthogonal wavelet neural networks 基于非正交小波神经网络的MC-CDMA多用户检测器
H. Senevirathna, K. Yamashita
Multi-user detection in a fading channel environment is a challenging problem in mobile communication systems like multicarrier code-division multiple access (MC-CDMA). In this paper we propose a multi-user detector using a nonorthogonal wavelet neural network. The proposed method operates in frequency domain to detect multi-users in a frequency selective fading channel environment. Kalman filter algorithm is used to estimate the parameters of the neural network adaptively. Nonorthogonal bases have a good resolution when constructing a wavelet network than orthogonal basis. It is due to the difficulty of obtaining an analytical solution to generate orthogonal basis to constrict a wavelet network with better resolution. The performance of the proposed detector shows the ability of adaptive multi-user detection in a Rayleigh fading channel
在多载波码分多址(MC-CDMA)等移动通信系统中,衰落信道环境下的多用户检测是一个具有挑战性的问题。本文提出了一种基于非正交小波神经网络的多用户检测器。该方法在频率选择衰落信道环境下进行多用户检测。采用卡尔曼滤波算法自适应估计神经网络的参数。在构造小波网络时,非正交基比正交基具有更好的分辨率。由于难以得到解析解来生成正交基来构造具有较好分辨率的小波网络。该检测器的性能表明了在瑞利衰落信道下自适应多用户检测的能力
{"title":"Multi-user detector for MC-CDMA using nonorthogonal wavelet neural networks","authors":"H. Senevirathna, K. Yamashita","doi":"10.1109/ISSPIT.2005.1577113","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577113","url":null,"abstract":"Multi-user detection in a fading channel environment is a challenging problem in mobile communication systems like multicarrier code-division multiple access (MC-CDMA). In this paper we propose a multi-user detector using a nonorthogonal wavelet neural network. The proposed method operates in frequency domain to detect multi-users in a frequency selective fading channel environment. Kalman filter algorithm is used to estimate the parameters of the neural network adaptively. Nonorthogonal bases have a good resolution when constructing a wavelet network than orthogonal basis. It is due to the difficulty of obtaining an analytical solution to generate orthogonal basis to constrict a wavelet network with better resolution. The performance of the proposed detector shows the ability of adaptive multi-user detection in a Rayleigh fading channel","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129212070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Effect of measurement error on the capacity of a MIMO wireless system 测量误差对MIMO无线系统容量的影响
P. Chambers, C. Downing, H. Baher
A multiple-input/multiple-output (MIMO) communications system model is described with reference to antenna measurements from a microwave network analyser. Results are presented which indicate the effect of a measurement error in a MIMO communications system. These results offer an indication of the degree of measurement accuracy required for a MIMO communications system to be a viable alternative to a conventional antenna communications system
参考微波网络分析仪的天线测量,描述了一个多输入/多输出(MIMO)通信系统模型。给出了测量误差对MIMO通信系统的影响。这些结果提供了MIMO通信系统作为传统天线通信系统的可行替代方案所需的测量精度程度的指示
{"title":"Effect of measurement error on the capacity of a MIMO wireless system","authors":"P. Chambers, C. Downing, H. Baher","doi":"10.1109/ISSPIT.2005.1577077","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577077","url":null,"abstract":"A multiple-input/multiple-output (MIMO) communications system model is described with reference to antenna measurements from a microwave network analyser. Results are presented which indicate the effect of a measurement error in a MIMO communications system. These results offer an indication of the degree of measurement accuracy required for a MIMO communications system to be a viable alternative to a conventional antenna communications system","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123843851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Estimating articulated human pose from video using shape context 利用形状上下文估计视频中清晰的人体姿势
Qu Xian-jie, Wang Zhao-qi, Xia Shi-hong, Liao Jin-tao
Recovery of 3D body pose is a fundamental problem for human motion analysis in many applications such as motion capture, vision interface, visual surveillance, and gesture recognition. In this paper, we present a new image-based approach to infer 3D human structure parameters from uncalibrated video. The estimation is example based. First, we acquire a special motion database through an off-line motion capture process. Second, given an uncalibrated motion video, we abstract the viewpoint and then the silhouettes database associated with 3D poses is built by projecting each data of the 3D motion database into 2D plane. Next, with the image silhouettes, the unknown structure parameters are inferred by performing a similarity search in the silhouettes database. We pay more attention on how to retrieving 3D body pose by matching 2D silhouette based on shape context. Through a lot of experiments, the results we got are really satisfying. To accelerate the process of calculating the distance in shape context, we use PCA (principal components analysis) to reduce the computation of complexity. We use trampoline sport, which is an example of complex human motion, to demonstrate the effectiveness of our approach and compare the results with those obtained with Hu moments method
在运动捕捉、视觉界面、视觉监控和手势识别等许多应用中,人体三维姿态的恢复是人体运动分析的一个基本问题。在本文中,我们提出了一种新的基于图像的方法,从未校准的视频中推断出三维人体结构参数。估计是基于实例的。首先,我们通过离线动作捕捉过程获得一个特殊的动作数据库。其次,给定一个未标定的运动视频,抽象视点,然后通过将三维运动数据库的每个数据投影到二维平面上,建立与三维姿态相关的轮廓数据库;接下来,利用图像轮廓,通过在轮廓数据库中执行相似性搜索来推断未知的结构参数。我们主要研究如何基于形状上下文匹配二维轮廓来获取三维人体姿态。通过大量的实验,我们得到了令人满意的结果。为了加快形状上下文中距离的计算过程,我们使用主成分分析(PCA)来降低计算复杂度。以蹦床运动为例,验证了该方法的有效性,并与胡矩法的结果进行了比较
{"title":"Estimating articulated human pose from video using shape context","authors":"Qu Xian-jie, Wang Zhao-qi, Xia Shi-hong, Liao Jin-tao","doi":"10.1109/ISSPIT.2005.1577162","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577162","url":null,"abstract":"Recovery of 3D body pose is a fundamental problem for human motion analysis in many applications such as motion capture, vision interface, visual surveillance, and gesture recognition. In this paper, we present a new image-based approach to infer 3D human structure parameters from uncalibrated video. The estimation is example based. First, we acquire a special motion database through an off-line motion capture process. Second, given an uncalibrated motion video, we abstract the viewpoint and then the silhouettes database associated with 3D poses is built by projecting each data of the 3D motion database into 2D plane. Next, with the image silhouettes, the unknown structure parameters are inferred by performing a similarity search in the silhouettes database. We pay more attention on how to retrieving 3D body pose by matching 2D silhouette based on shape context. Through a lot of experiments, the results we got are really satisfying. To accelerate the process of calculating the distance in shape context, we use PCA (principal components analysis) to reduce the computation of complexity. We use trampoline sport, which is an example of complex human motion, to demonstrate the effectiveness of our approach and compare the results with those obtained with Hu moments method","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121365794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Toward a processor core for real-time capable autonomic systems 向着能够实时运行的自主系统的处理器核心发展
S. Uhrig, S. Maier, T. Ungerer
This paper proposes a processor core that allows to support the autonomic computing principles in embedded hard-real-time systems. The simultaneous multithreaded CAR-core processor features hardware-integrated scheduling schemes that isolate the hard-real-time thread from non-real-time threads. It is binary compatible with Infineon's TriCore processor and designed as IP core for a system-on-chip. The challenge for the processor design is to implement simultaneous multithreading such that a thread cannot influence the timing behavior of another thread in order to allow predictable thread execution times. Therefore new instruction issue and data memory access techniques are proposed. The autonomic computing requirements shall be implemented by autonomic managers running as helper threads in own thread slots concurrent to the real-time application. The autonomic manager threads monitor the application and decide if self-configuration, self-healing, self-optimization, or self-protection must be triggered
本文提出了一种支持嵌入式硬实时系统自主计算原理的处理器核心。同时多线程car核心处理器具有硬件集成调度方案,将硬实时线程与非实时线程隔离开来。它与英飞凌的TriCore处理器二进制兼容,并设计为片上系统的IP核。处理器设计面临的挑战是实现同步多线程,这样一个线程就不能影响另一个线程的计时行为,从而允许可预测的线程执行时间。因此,提出了新的指令发布和数据存储访问技术。自主计算需求应由自主管理器实现,这些管理器作为helper线程运行在与实时应用程序并发的自己的线程槽中。自主管理器线程监视应用程序,并决定是否必须触发自我配置、自我修复、自我优化或自我保护
{"title":"Toward a processor core for real-time capable autonomic systems","authors":"S. Uhrig, S. Maier, T. Ungerer","doi":"10.1109/ISSPIT.2005.1577063","DOIUrl":"https://doi.org/10.1109/ISSPIT.2005.1577063","url":null,"abstract":"This paper proposes a processor core that allows to support the autonomic computing principles in embedded hard-real-time systems. The simultaneous multithreaded CAR-core processor features hardware-integrated scheduling schemes that isolate the hard-real-time thread from non-real-time threads. It is binary compatible with Infineon's TriCore processor and designed as IP core for a system-on-chip. The challenge for the processor design is to implement simultaneous multithreading such that a thread cannot influence the timing behavior of another thread in order to allow predictable thread execution times. Therefore new instruction issue and data memory access techniques are proposed. The autonomic computing requirements shall be implemented by autonomic managers running as helper threads in own thread slots concurrent to the real-time application. The autonomic manager threads monitor the application and decide if self-configuration, self-healing, self-optimization, or self-protection must be triggered","PeriodicalId":421826,"journal":{"name":"Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122382086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
期刊
Proceedings of the Fifth IEEE International Symposium on Signal Processing and Information Technology, 2005.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1