Filters








343 Hits in 4.3 sec

Fast Camouflaged Object Detection via Edge-based Reversible Re-calibration Network [article]

Ge-Peng Ji, Lei Zhu, Mingchen Zhuge, Keren Fu
2021 arXiv   pre-print
Inspired by the biological visual perception process when a human observer discovers camouflaged objects, this paper proposes a novel edge-based reversible re-calibration network called ERRNet.  ...  Our model is characterized by two innovative designs, namely Selective Edge Aggregation (SEA) and Reversible Re-calibration Unit (RRU), which aim to model the visual perception behaviour and achieve effective  ...  Conclusion In this work, we propose an Edge-based Reversible Re-calibration Network and Semantic prior) at both low-and high-level layers.  ... 
arXiv:2111.03216v1 fatcat:nytfe5n3j5er5c7ybiw5fxybdu

2021 Index IEEE Transactions on Circuits and Systems II: Express Briefs Vol. 68

2021 IEEE Transactions on Circuits and Systems - II - Express Briefs  
., TCSII Dec. 2021 3518-3521 E Edge detection NS-MD: Near-Sensor Motion Detection With Energy Harvesting Image Sensor for Always-On Visual Perception.  ...  Reconfigurable Convolutional Neural Network Accelerator for Object Recognition Applications.  ... 
doi:10.1109/tcsii.2022.3144928 fatcat:bm53w7gva5bthholfhhiq4yg3a

Sensory Metrics of Neuromechanical Trust

William Softky, Criscillia Benford
2017 Neural Computation  
attention through frequent discontinuities and enhanced coherence will decalibrate a brain's representation of its world over the long term by violating the implicit statistical contract for which self-calibration  ...  These same fast/slow trade-offs affect self-calibration.  ...  For example, the high-contrast visual contours found in camouflage, or lures, exploit a viewer's automatic, low-level assumption that high-contrast contours correspond to object borders.  ... 
doi:10.1162/neco_a_00988 pmid:28599118 fatcat:qk3crvisnbc53l27gwql7i4orq

Decision making via semi-supervised machine learning techniques [article]

Eftychios Protopapadakis
2016 arXiv   pre-print
The primary objective is the extraction of robust inference rules. Decision support systems (DSSs) who utilize SSL have significant advantages.  ...  Such applications fields are: (a) industrial assembly lines monitoring, (b) sea border surveillance, (c) elders' falls detection, (d) transportation tunnels inspection, (e) concrete foundation piles defect  ...  The procedure consists of selecting as the next sample (candidate object) the one that is most distant from those already selected objects (calibration objects).  ... 
arXiv:1606.09022v1 fatcat:zzghg6tsijgszaduo7il2rixly

D1.1 - State of the Art Analysis

Danilo Ardagna
2021 Zenodo  
The deliverable starts with an overview of AI applications and edge computing market trends.  ...  Then, the deliverable provides a background on AI applications design, also considering some advanced design trends (e.g., Network Architecture Search, Federated Learning, Deep Neural Networks partitioning  ...  [Dube2019] proposed AI www.ai-sprint-project.eu Gauge, a framework based on ML where models are continuously calibrated by processing job traces.  ... 
doi:10.5281/zenodo.6372377 fatcat:f6ldfuwivbcltew4smiiwphfty

2021 Index IEEE Photonics Journal Vol. 13

2021 IEEE Photonics Journal  
Article numbers are based on specified topic areas and corresponding codes associated with the publication.  ...  ., +, JPHOT April 2021 6800513 E Edge detection Advanced Color Edge Detection Using Clifford Algebra in Satellite Images.  ...  ., +, JPHOT Aug. 2021 7300308 Rapid Detection of Camouflaged Artificial Target Based on Polarization Imaging and Deep Learning.  ... 
doi:10.1109/jphot.2022.3149205 fatcat:xzfdp6eoijffzkqb7biyaptzua

Image statistics

Erik Reinhard, Tania Pouli, Douglas Cunningham
2010 ACM SIGGRAPH 2010 Courses on - SIGGRAPH '10  
Face Detection Viola & Jones use a small set of waveletlike features to detect faces An application area where wavelets have found extensive use is object detection.  ...  P., OREN M., POGGIO T.: A general framework for object detection. In Sixth International Conference on Computer Vision, (1998) • VIOLA P., JONES M.: Robust real-time object detection.  ...  In other words, the color of the light sources in a particular viewing environment are to a large extent ignored, so that human vision is fairly good at detecting surface colors.  ... 
doi:10.1145/1837101.1837107 dblp:conf/siggraph/ReinhardPC10 fatcat:6fr7cn2htjc6za6hxlbzu7mcga

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2015 Budget Estimates

Department Of Defense Comptroller's Office
2014 Zenodo  
capabilities (e.g. the Systems-Based Neurotechnology for Emerging Therapies (SUBNETS)) and better data management.  ...  improve diagnosis and care of wounded warriors with post-traumatic brain injury, stress, or loss of memory (i.e. the Restoring Active Memory (RAM) funding opportunity), as well as new neurotechnology-based  ...  Title: Content-Based Mobile Edge Networking (CBMEN) Description: The CBMEN program's goal is to provide tactical warfighters operating at the edge with interactive, on-demand access to relevant information  ... 
doi:10.5281/zenodo.1215345 fatcat:fjzhmynqjbaafk67q2ckcblj2m

3-D vision and figure-ground separation by visual cortex

Stephen Grossberg
1994 Perception & Psychophysics  
Phenomena such as 3-D pop-out from a 2-D picture, Da Vinci stereopsis, 3-D neon color spreading, completion of partially occluded objects, and figure-ground reversals are analyzed.  ...  A neural network theory of three-dimensional (3-D)vision, called FACADE theory, is described. The theory proposes a solution of the classical figure-ground problem for biological vision.  ...  These interactions are thus part of the object-based attention system.  ... 
doi:10.3758/bf03206880 pmid:8036093 fatcat:uqq2uzf3gneovlnyma673g4dcq

Taking the Temperature of Sports Arenas [article]

Rikke Gade
2014 Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet  
based on symmetric edges, histogram analysis and size of the object.  ...  Object-based methods detect either entire objects or major parts in case of a part-based model.  ...  Based on heatmaps, the first method relied only on the position of people. The second method were based on features extracted from tracklets. Five sports types were classified in each work.  ... 
doi:10.5278/vbn.phd.engsci.00070 fatcat:qudgoqzxc5bavfyib5wfwkiu5y

Defense Advanced Research Projects Agency (Darpa) Fiscal Year 2016 Budget Estimates

Department Of Defense Comptroller's Office
2015 Zenodo  
This capability enables ground-based detection of un-cued objects in deep space for purposes such as asteroid detection and space defense missions.  ...  Title: Content-Based Mobile Edge Networking (CBMEN) Description: The CBMEN program's goal was to provide tactical warfighters operating at the edge with interactive, on-demand access to relevant information  ... 
doi:10.5281/zenodo.1215366 fatcat:cqn5tyfixjanzp5x3tgfkpedri

Addressing Security and Privacy Challenges in Internet of Things [article]

Arsalan Mosenia
2018 arXiv   pre-print
Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a holistic and transformative approach for providing numerous services.  ...  Several recent research studies have demonstrated that launching security/privacy attacks against IoT-enabled systems, in particular wearable medical sensor (WMS)-based systems, may lead to catastrophic  ...  Camouflage: In this type of attack, the attacker inserts a counterfeit edge node or attacks an authorized node in order to hide at the edge level.  ... 
arXiv:1807.06724v1 fatcat:f45cytbjkjgyjiytvr2ygdcsze

Malware characteristics and threats on the internet ecosystem

Zhongqiang Chen, Mema Roussopoulos, Zhanyan Liang, Yuan Zhang, Zhongrong Chen, Alex Delis
2012 Journal of Systems and Software  
Instead, we generate attributes of malware strains via a tokenization process and select the attributes used according to their projected information gain.  ...  The learning and generalization capabilities of the framework also help detect and categorize zero-day attacks.  ...  In general, file compression may help deter reverse engineering and elude detection by pattern-based anti-malware devices.  ... 
doi:10.1016/j.jss.2012.02.015 fatcat:6dvcm2i7ojf7foe7gcrskwoopa

Modern approaches to augmented reality

Oliver Bimber, Ramesh Raskar
2007 ACM SIGGRAPH 2007 courses on - SIGGRAPH '07  
Furthermore, it presents techniques for projector based augmentation of geometrically complex and textured display surfaces, and (along with optical combination) methods for achieving consistent illumination  ...  Instead of connecting the rendering nodes via an all-purpose network, they can be connected to a specific display subsystem.  ...  Rendering the virtual objects from multiple perspectives results in multiple radiance maps that can be merged and alpha blended during re-mapping them via multi-texturing onto the virtual geometry (as  ... 
doi:10.1145/1281500.1281628 dblp:conf/siggraph/BimberR07 fatcat:f2qbm6fwv5a4vlrefdrt5gmgxm

Modern approaches to augmented reality

Oliver Bimber
2006 ACM SIGGRAPH 2006 Courses on - SIGGRAPH '06  
Furthermore, it presents techniques for projector based augmentation of geometrically complex and textured display surfaces, and (along with optical combination) methods for achieving consistent illumination  ...  Instead of connecting the rendering nodes via an all-purpose network, they can be connected to a specific display subsystem.  ...  Rendering the virtual objects from multiple perspectives results in multiple radiance maps that can be merged and alpha blended during re-mapping them via multi-texturing onto the virtual geometry (as  ... 
doi:10.1145/1185657.1185797 dblp:conf/siggraph/Bimber06 fatcat:j4wsg26gbneu3d32hclrpvvdrm
« Previous Showing results 1 — 15 out of 343 results