共查询到10条相似文献,搜索用时 140 毫秒
1.
In 2003, Maurer et al. (IEEE Trans. Pattern Anal. Mach. Intell. 25:265–270, 2003) published a paper describing an algorithm that computes the exact distance transform in linear time (with respect to image
size) for the rectangular binary images in the k-dimensional space ℝ
k
and distance measured with respect to L
p
-metric for 1≤p≤∞, which includes Euclidean distance L
2. In this paper we discuss this algorithm from theoretical and practical points of view. On the practical side, we concentrate
on its Euclidean distance version, discuss the possible ways of implementing it as signed distance transform, and experimentally
compare implemented algorithms. We also describe the parallelization of these algorithms and discuss the computational time
savings associated with them. All these implementations will be made available as a part of the CAVASS software system developed
and maintained in our group (Grevera et al. in J. Digit. Imaging 20:101–118, 2007). On the theoretical side, we prove that our version of the signed distance transform algorithm, GBDT, returns the exact value of the distance from the geometrically defined object boundary. We provide a complete proof (which was not given of Maurer et al. (IEEE Trans. Pattern Anal. Mach. Intell. 25:265–270, 2003) that all these algorithms work correctly for L
p
-metric with 1<p<∞. We also point out that the precise form of the algorithm from Maurer et al. (IEEE Trans. Pattern Anal. Mach. Intell. 25:265–270,
2003) is not well defined for L
1 and L
∞ metrics. In addition, we show that the algorithm can be used to find, in linear time, the exact value of the diameter of an object, that is, the largest possible distance between any two of its elements. 相似文献
2.
Correspondence establishment is a central problem of stereo vision. In a work Aloimonos and Herve (IEEE Trans Pattern Anal
Mach Intell 12(5):504–510, 1990) presented an algorithm that could reconstruct a single planar surface without establishing
point-to-point correspondences. The work uses images that are taken under a specific stereo configuration. In this paper,
we generalize the algorithm to one for general stereo configuration of the cameras. We further provide an extension of the
algorithm, so that not only distant or planar scene but also multi-surface polyhedral scene can be reconstructed. Experimental
results on a number of real image sets are presented to illustrate the performance of the algorithm. 相似文献
3.
4.
This paper describes a novel structural approach to recognize the human facial features for emotion recognition. Conventionally,
features extracted from facial images are represented by relatively poor representations, such as arrays or sequences, with
a static data structure. In this study, we propose to extract facial expression features vectors as Localized Gabor Features
(LGF) and then transform these feature vectors into FacE Emotion Tree Structures (FEETS) representation. It is an extension
of the Human Face Tree Structures (HFTS) representation presented in (Cho and Wong in Lecture notes in computer science, pp
1245–1254, 2005). This facial representation is able to simulate as human perceiving the real human face and both the entities and relationship
could contribute to the facial expression features. Moreover, a new structural connectionist architecture based on a probabilistic
approach to adaptive processing of data structures is presented. The so-called probabilistic based recursive neural network
(PRNN) model extended from Frasconi et al. (IEEE Trans Neural Netw 9:768–785, 1998) is developed to train and recognize human emotions by generalizing the FEETS representation. For empirical studies, we benchmarked
our emotion recognition approach against other well known classifiers. Using the public domain databases, such as Japanese
Female Facial Expression (JAFFE) (Lyons et al. in IEEE Trans Pattern Anal Mach Intell 21(12):1357–1362, 1999; Lyons et al. in third IEEE international conference on automatic face and gesture recognition, 1998) database and Cohn–Kanade AU-Coded Facial Expression (CMU) Database (Cohn et al. in 7th European conference on facial expression
measurement and meaning, 1997), our proposed system might obtain an accuracy of about 85–95% for subject-dependent and subject-independent conditions.
Moreover, by testing images having artifacts, the proposed model significantly supports the robust capability to perform facial
emotion recognition. 相似文献
5.
Raouf HamdanAuthor VitaeFabrice HeitzAuthor Vitae Laurent ThoravalAuthor Vitae 《Pattern recognition》2003,36(5):1107-1118
Appearance models yield a compact representation of shape, pose and illumination variations. The probabilistic appearance model, introduced by Moghaddam et al. (Proceedings of the International Conference on Computer Vision, Cambridge, MA, June 1995, p. 687; IEEE Trans. Pattern Anal. Mach. Intell. 19 (7) (1997) 696) has recently shown excellent performances in pattern detection and recognition, outperforming most other linear and non-linear approaches. Unfortunately, the complexity of this model remains high. In this paper, we introduce an efficient approximation of this model, which enables fast implementations in statistical estimation-based schemes. Gains in complexity and cpu time of more than 10 have been obtained, without any loss in the quality of the results. 相似文献
6.
A recently proposed argument to explain the improved performance of the eight-point algorithm that results from using normalized
data (Chojnacki, W., et al. in IEEE Trans. Pattern Anal. Mach. Intell. 25(9):1172–1177, 2003) relies upon adoption of a certain model for statistical data distribution. Under this model, the cost function that underlies
the algorithm operating on the normalized data is statistically more advantageous than the cost function that underpins the
algorithm using unnormalized data. Here we extend this explanation by introducing a more refined, structured model for data
distribution. Under the extended model, the normalized eight-point algorithm turns out to be approximately consistent in a
statistical sense. The proposed extension provides a link between the existing statistical rationalization of the normalized
eight-point algorithm and the approach of Mühlich and Mester for enhancing total least squares estimation methods via equilibration.
The paper forms part of a wider effort to rationalize and interrelate foundational methods in vision parameter estimation. 相似文献
7.
Tak-Wah Lam Lap-Kei Lee Isaac K. K. To Prudence W. H. Wong 《Journal of Scheduling》2012,15(1):105-116
Energy usage has been an important concern in recent research on online scheduling. In this paper, we study the tradeoff between
flow time and energy (Albers and Fujiwara in ACM Trans. Algorithms 3(4), 2007; Bansal et al. in Proceedings of ACM-SIAM Symposium on Discrete Algorithms, pp. 805–813, 2007b, Bansal et al. in Proceedings of International Colloquium on Automata, Languages and Programming, pp. 409–420, 2008; Lam et al. in Proceedings of European Symposium on Algorithms, pp. 647–659, 2008b) in the multi-processor setting. Our main result is an enhanced analysis of a simple non-migratory online algorithm called
CRR (classified round robin) on m≥2 processors, showing that its flow time plus energy is within O(1) times of the optimal non-migratory offline algorithm, when the maximum allowable speed is slightly relaxed. The result
still holds even if the comparison is made against the optimal migratory offline algorithm. This improves previous analysis
that CRR is O(log P)-competitive where P is the ratio of the maximum job size to the minimum job size. 相似文献
8.
《国际计算机数学杂志》2012,89(5):892-904
In this paper, the global robust stability of uncertain recurrent neural networks with Markovian jumping parameters which are represented by the Takagi–Sugeno fuzzy model is considered. A novel linear matrix inequality-based stability criterion is obtained by using Lyapunov functional theory to guarantee the asymptotic stability of uncertain fuzzy recurrent neural networks with Markovian jumping parameters. Finally, numerical examples are given to demonstrate the correctness of the theoretical results. Our results are also compared with results discussed in Arik [On the global asymptotic stability of delayed cellular neural networks, IEEE Trans. Circ. Syst. I 47 (2000), pp. 571–574], Cao [Global stability conditions for delayed CNNs, IEEE Trans. Circ. Syst. I 48 (2001), pp. 1330–1333] and Lou and Cui [Delay-dependent stochastic stability of delayed Hopfield neural networks with Markovian jump parameters, J. Math. Anal. Appl. 328 (2007), pp. 316–326] to show the effectiveness and conservativeness. 相似文献
9.
We examine how to induce selfish heterogeneous users in a multicommodity network to reach an equilibrium that minimizes the
social cost. In the absence of centralized coordination, we use the classical method of imposing appropriate taxes (tolls)
on the edges of the network. We significantly generalize previous work (Yang and Huang in Transp. Res. Part B 38:1–15, [2004]; Karakostas and Kolliopoulos in Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science, pp. 268–276,
[2004]; Fleischer et al. in Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science, pp. 277–285, [2004]) by allowing user demands to be elastic. In this setting the demand of a user is not fixed a priori but it is a function of the routing cost experienced, a most natural
assumption in traffic and data networks.
Research supported by MITACS and a NSERC Discovery grant. 相似文献
10.
Distributed authorization is an essential issue in computer security. Recent research shows that trust management is a promising
approach for the authorization in distributed environments. There are two key issues for a trust management system: how to
design an expressive high-level policy language and how to solve the compliance-checking problem (Blaze et al. in Proceedings
of the Symposium on Security and Privacy, pp. 164–173, 1996; Proceedings of 2nd International Conference on Financial Cryptography
(FC’98). LNCS, vol.1465, pp. 254–274, 1998), where ordinary logic programming has been used to formalize various distributed
authorization policies (Li et al. in Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 114–130, 2002; ACM
Trans. Inf. Syst. Secur. (TISSEC) 6(1):128–171, 2003). In this paper, we employ Answer Set Programming to deal with many complex
issues associated with the distributed authorization along the trust management approach. In particular, we propose a formal
authorization language providing its semantics through Answer Set Programming. Using language , we cannot only express nonmonotonic delegation policies which have not been considered in previous approaches, but also
represent the delegation with depth, separation of duty, and positive and negative authorizations. We also investigate basic
computational properties related to our approach. Through two case studies. we further illustrate the application of our approach
in distributed environments. 相似文献