A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Balancing Specialization, Generalization, and Compression for Detection and Tracking
[article]
2019
arXiv
pre-print
We propose a method for specializing deep detectors and trackers to restricted settings. ...
To this end, we propose a novel loss that balances compression and acceleration of a deep learning model vs. loss of generalization capabilities. ...
Model specialization vs. generalization. We propose a loss that optimizes the balance between specialization, generalization, and compression of our detection and tracking models. 2. ...
arXiv:1909.11348v1
fatcat:wyeiokps2nhwxbzdkdagsnvylm
Target-Aware Deep Feature Compression for Power Intelligent Inspection Tracking
2022
Journal of Electrical and Computer Engineering
This paper presents a target-aware deep feature compression for power intelligent inspection tracking. ...
Based on this, the deep feature compression model is combined with Siamese tracking framework to achieve real-time and robust tracking. ...
Inspired by the previously mentioned work, we proposed a target perception deep feature compression method for intelligent detection target tracking. ...
doi:10.1155/2022/3161551
fatcat:qvx6bdj3qjdi7oqepvbazg5gli
A Novel Deep Neural Network that Uses Space-Time Features for Tracking and Recognizing a Moving Object
2017
Journal of Artificial Intelligence and Soft Computing Research
A noise balanced learning method is used to fast train the recognizer with real-world images, giving rise to a simple and yet powerful robotic eye, with a slender neural processor that vigorously tracks ...
This loop gives rise to an emergent tracking behavior which creates a self-maintain flow of compressed space-time data. ...
The final result is a slender and yet powerful robotic eye controller that operates with high data compression and vigorously tracks and recognizes the chosen object under generic situations. ...
doi:10.1515/jaiscr-2017-0009
fatcat:tzqvym7qwfeahfdrugi4wusl6e
Advances in Pattern Recognition Algorithms, Architectures, and Devices
2004
Optical Engineering: The Journal of SPIE
Over the last decade, tremendous advances have been made in the general area of pattern recognition techniques, devices, and algorithms. ...
We have had the distinct pleasure of witnessing this remarkable growth as evidenced through their dissemination in the previous Optical Engineering special sections we have jointly edited- ...
The proposed tracking algorithm is based on the general framework of spatiotemporal segmentation followed by temporal tracking, and is capable of tracking both moving and stationary objects while accommodating ...
doi:10.1117/1.1787532
fatcat:ofrtnkbdvrca7oim436irhccrq
Special issue on real-time color image processing
2015
Journal of Real-Time Image Processing
The special issue continues with three articles on tracking. In ' 'Color Tracking with Contextual Switching,'' Laguzet et al. ...
The special issue continues with three articles on detection. ...
doi:10.1007/s11554-015-0506-6
fatcat:yc65ssxd3vdflasgshooc66yb4
Real-Time and Robust Compressive Background Subtraction for Embedded Camera Networks
2016
IEEE Transactions on Mobile Computing
Finally, we demonstrated the feasibility of the proposed method by the implementation and evaluation of an end-to-end real-time embedded camera network target tracking application. ...
For a background subtraction method to be useful in embedded camera networks, it must be both accurate and computationally efficient because of the resource constraints on embedded platforms. ...
The value of m is chosen to be 8 for CS-MoG-Balance, CS-MoG-Unbalance, PCA-MoG, DCT-MoG, RS-MoG and Mean-MoG. We first evaluate the accuracy of the foreground block detections. ...
doi:10.1109/tmc.2015.2418775
fatcat:qydrttdbofdippczstc33mnk7a
Threat Detection and Investigation with System-level Provenance Graphs: A Survey
[article]
2020
arXiv
pre-print
In this paper, we firstly introduce the basic concepts about system-level provenance graph and proposed typical system architecture for provenance graph-based threat detection and investigation. ...
Security practitioners urgently need better tools to describe and modelling attacks for defence. ...
techniques try compressing provenance logs via web graph compression algorithm [51] or detecting common subgraphs and compressing them [52] . ...
arXiv:2006.01722v3
fatcat:ofx2geac3rggvo5kz3zenbmpvq
Information Mining from Multimedia Databases
2006
EURASIP Journal on Advances in Signal Processing
In the next paper, Fonseca and Nesvadba introduce a new technique for face detection and tracking in the compressed domain. ...
Based on the extracted motion vector field, these algorithms can infer the correct camera motion, allow motion detection within a limited region of interest for the purpose of object tracking, and perform ...
In the next paper, Fonseca and Nesvadba introduce a new technique for face detection and tracking in the compressed domain. ...
doi:10.1155/asp/2006/49073
fatcat:louxnv5c5bggrdeyvjw6qavi4m
IEEE Access Special Section Editorial: Mission-Critical Sensors and Sensor Networks (MC-SSN)
2021
IEEE Access
Algorithms are sought for fused and/or coherent cross-platform radio frequency (RF) sensing. ...
This Special Section on mission-critical sensors and sensor networks aimed to publish the most recent results in theories and methods of sensor design, networking, sensing, information management, and ...
once (YOLO) for WCB detection. ...
doi:10.1109/access.2021.3068830
fatcat:mcmdtikg2vfqvokgu7pnm6xofq
Distributed Information Compression for Target Tracking in Cluster-Based Wireless Sensor Networks
2016
Sensors
The simulation results show that compared to conventional schemes, the proposed data processing scheme has a balanced system performance in terms of tracking accuracy, data size for transmission and energy ...
A two-level hierarchical network topology is adopted for energy-efficient target tracking with information compression. ...
Thus, a hybrid static/dynamic clustering scheme is applied to achieve distributed target detection and tracking. ...
doi:10.3390/s16060937
pmid:27338417
pmcid:PMC4934362
fatcat:y3jdh4mkyndb3ozfjcp5vrpm3e
Special Section on Distributed Camera Networks: Sensing, Processing, Communication, and Implementation
2010
IEEE Transactions on Image Processing
Kathy Jackson, for their leadership and support of this Special Section. ...
Optimization is achieved by minimizing the power-rate-distortion characteristics of the video sensor, thus, relying on adaptive sensing to reach an optimal balance between sensing, compression, and transmission ...
doi:10.1109/tip.2010.2063650
pmid:20865818
fatcat:omnidlz3nvcojlebyqdxq3cadm
Data encoding efficiency in binary strip detector readout
2014
Journal of Instrumentation
Different level efficiencies are defined to include context information and engineering properties needed for reliable transmission, such as DC-balance. ...
A prescription to calculate the minimum number of bits needed for binary strip detector readout is presented. ...
Grillo and J. Agricola for helpful comments. ...
doi:10.1088/1748-0221/9/04/p04021
fatcat:tsvpd7pwa5bphkpwunwt2njbte
The Future of Hyperspectral Imaging
2019
Journal of Imaging
Papers showing advances on more general topics include video approach for HSI dynamic scenes, localization of plant diseases, new methods for the lossless compression of HSI data, the fusing of multiple ...
multiband images, and mixed modes of laser HSI imaging for sorting and quality controls. ...
Acknowledgments: The Guest Editor would like to acknowledge the time and contributions of the authors (both successful and unsuccessful) who prepared papers for this Special Issue. ...
doi:10.3390/jimaging5110084
pmid:34460507
fatcat:7hsqcmc3rvdkvejemmvp45mwzm
Real Time Motion Detection using Dynamic Camera
2015
International Journal of Computer Applications
Nowadays, security of valuable and secret assets is very important for large organisation companies. ...
High level surveillance system for security is implemented to overcome this limitations and errors. ...
CAMERA MOTION ESTIMATION In voting based mechanism image processing technique is used for motion estimation and edge detection. Image is necessary in tracking, detecting and recognition applications. ...
doi:10.5120/19990-1651
fatcat:oocilojyjbg2hbq7wgm3zdotlu
Page 4408 of Psychological Abstracts Vol. 88, Issue 11
[page]
2001
Psychological Abstracts
Thresholds for the detection of sinusoidal amplitude modulation (AM) of a sinusoidal carrier were measured using a 3-alternative forced-choice 3-down 1-up procedure tracking the 79.4% point on the psychometric ...
For low modulation rates, modulation detection thresholds for the hearing-impaired Ss tested at 80 dB SPL. ...
« Previous
Showing results 1 — 15 out of 43,153 results