Proceedings of the 2nd International Conference on Vision, Image and Signal Processing最新文献

筛选
英文 中文
A General Lane Detection Algorithm Based on Semantic Segmentation 基于语义分割的通用车道检测算法
Renrong Shao, Baojian Qian, Jun Guo
{"title":"A General Lane Detection Algorithm Based on Semantic Segmentation","authors":"Renrong Shao, Baojian Qian, Jun Guo","doi":"10.1145/3271553.3271555","DOIUrl":"https://doi.org/10.1145/3271553.3271555","url":null,"abstract":"With the development of artificial intelligent (AI), more and more fields are embracing the AI technology. Intelligent driving is one of the these fields. The environment perception is the fundamental of intelligent driving while lane detection is one of important part of environment perception. Traditional lane detection methods are based on the features of road edge which is only suited on the road with clear car lanes. In this paper, we propose a lane detection method based on semantic segmentation in which includes two stages for lane detection. In the first stage, we use SegNet which is a deep convolutional neural network to recognize the drivable area. Then, we use edge-extracting algorithm to find features of road edge. Based on the extracting edge features, we use cubic curve to fit lane. The experimental results show that our method has a good generalization. It can achieve a good result in both urban roads and rural roads.","PeriodicalId":414782,"journal":{"name":"Proceedings of the 2nd International Conference on Vision, Image and Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133837273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Super Position and Visual Acuity for Motion Detection and Tracking 运动检测与跟踪的神经超定位与视觉敏锐度
Andrew P. Sacco, D. Arutyunov, A. Gonzalez, W. McKinley, A. Kundu
{"title":"Neural Super Position and Visual Acuity for Motion Detection and Tracking","authors":"Andrew P. Sacco, D. Arutyunov, A. Gonzalez, W. McKinley, A. Kundu","doi":"10.1145/3271553.3271601","DOIUrl":"https://doi.org/10.1145/3271553.3271601","url":null,"abstract":"This paper describes a visible passive/LIDAR superposition based navigation and tracking camera array for applications across many fields. This problem has three components: 1) design of a camera array for image acquisition over a wide field of view, 2) design and implementation using low-cost components, and 3) a new multi-tier target tracking algorithm. In the camera array, each camera channel has a standard field of view while the composite camera array field of coverage is wide enough to capture targets moving in three-dimensional space covering up to 4π steradians. Image information is collected by multiple camera channels of the full camera array over the entire field of coverage with multiple images collected at any instant of time. Such collection greatly helps long-term tracking which is a challenging task especially in an unknown environment due to the loss of image information from objects leaving a camera's field of view. Most tracking algorithms work on images taken by sensors not related to the algorithm. In this paper, the image array and tracking algorithm development and implementation are jointly developed for optimal performance by exploiting the data from multiple camera geometries. We describe the tracking algorithm and a simulation experiment to demonstrate how such imagery helps tracking in a noisy environment.","PeriodicalId":414782,"journal":{"name":"Proceedings of the 2nd International Conference on Vision, Image and Signal Processing","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122826765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restoration and Digital Super-Resolution for Infrared Microscopy Imaging 红外显微成像的恢复和数字超分辨率
Guillermo Machuca, S. Torres, Anselmo Jara, Laura A. Viafora, Pablo Gutiérrez
{"title":"Restoration and Digital Super-Resolution for Infrared Microscopy Imaging","authors":"Guillermo Machuca, S. Torres, Anselmo Jara, Laura A. Viafora, Pablo Gutiérrez","doi":"10.1145/3271553.3271607","DOIUrl":"https://doi.org/10.1145/3271553.3271607","url":null,"abstract":"In this paper, we propose a unified method to reduce infrared optoelectronic imaging degradations and perform digital superresolution from a sequence of infrared microscopy images. The proposed method combines two regulators highlighting the spatial features of the scene, maintaining fine texture image details and better preserving sharp edges. Further, the method compensates the presence of fixed-pattern noise and used a deconvolution filter to reduce blurring. The method is implemented on a built-in mid-wave infrared microscopy imaging system. The results show a significant reduction in the imaging nonuniformity and blur, achieving better digital resolution identifying more details of the different scene object thermal patterns.","PeriodicalId":414782,"journal":{"name":"Proceedings of the 2nd International Conference on Vision, Image and Signal Processing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116650213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting Gait Characteristics from Micro-Doppler Features 基于微多普勒特征的步态特征提取
B. Ayhan, C. Kwan, Chao Lu
{"title":"Extracting Gait Characteristics from Micro-Doppler Features","authors":"B. Ayhan, C. Kwan, Chao Lu","doi":"10.1145/3271553.3271583","DOIUrl":"https://doi.org/10.1145/3271553.3271583","url":null,"abstract":"One possible enhancement in through-the-wall surveillance (TWS) applications with respect to human subject detection is to extract gait characteristics such as torso speed, and arm and leg swing motions from the micro-Doppler features. These gait characteristics can then be imposed on top of animated human objects for visualization. As a result, the visualization with the animated objects will be more convincing and realistic. This paper summarizes our results in this area. A systematic methodology is presented first, followed by some validation experiments using a human walking simulation model. Finally, experimental data were used to extract gait characteristics.","PeriodicalId":414782,"journal":{"name":"Proceedings of the 2nd International Conference on Vision, Image and Signal Processing","volume":"988 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116226304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Flexible Security Guard Scheduling to Satisfy Defensive Power by Tabu-Search Algorithm 基于禁忌搜索算法的满足防御能力的灵活调度
Sicong Tan, Yilan Luo
{"title":"Flexible Security Guard Scheduling to Satisfy Defensive Power by Tabu-Search Algorithm","authors":"Sicong Tan, Yilan Luo","doi":"10.1145/3271553.3271586","DOIUrl":"https://doi.org/10.1145/3271553.3271586","url":null,"abstract":"Many security guards are needed to guarantee defensive power in top grade communities, in banks or in the other security places. Security guards pay attention to workload, specially, night work and overwork. But security guard companies are facing many challenges such as how to raise defend capability and how to reduce human cost. These challenges are interrelated with security guards scheduling problems. So security guards scheduling problem become a very important problem. In this paper, how to solve the actual security guards scheduling problem for security guard companies is key point. In this paper, a novel scheduling model for twenty four hours (three shifts) is proposed to guarantee defensive power and to balance workload. A new Tabu-Search approach is proposed in this paper to solve security guards scheduling problem. This paper shows that it is very flexible and accurate to find near-optimal solutions in very short time. The computational results demonstrate the robustness of Tabu-Search approach. A detail discussion of the results indicates that management objectives are satisfied, defensive power as strong guarantee on service.","PeriodicalId":414782,"journal":{"name":"Proceedings of the 2nd International Conference on Vision, Image and Signal Processing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114847314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lightweight Cipher Aware Countermeasure Using Random Number Masks and Its Evaluation 基于随机数掩码的轻量级密码感知对策及其评价
M. Yoshikawa, Y. Nozaki
{"title":"Lightweight Cipher Aware Countermeasure Using Random Number Masks and Its Evaluation","authors":"M. Yoshikawa, Y. Nozaki","doi":"10.1145/3271553.3271595","DOIUrl":"https://doi.org/10.1145/3271553.3271595","url":null,"abstract":"Recent advancements in the Internet of Things (IoT) technology has left built-in devices vulnerable to interference from external networks. Power analysis attacks against cryptographic circuits are of particular concern, as they operate by illegally analyzing confidential information via power consumption of a cryptographic circuit. In response to these threats, many researchers have turned to lightweight ciphers, which can be embedded in small-scale circuits, coupled with countermeasures to increase built-in device security, even against power analysis attacks. However, while researchers have examined the efficacy of embedding lightweight ciphers in circuits, neither cost nor tamper resistance have been considered in detail. To use lightweight ciphers and improve tamper resistance in the future, it is necessary to investigate the relationship between the cost of embedding a lightweight cipher with a countermeasure against power analysis in a circuit and the tamper resistance of the cipher. Accordingly, the present study determined the tamper resistance of TWINE, a typical lightweight cipher, both with and without a countermeasure; costs were calculated for embedding the cipher with and without a countermeasure as well.","PeriodicalId":414782,"journal":{"name":"Proceedings of the 2nd International Conference on Vision, Image and Signal Processing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125553669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic 3D Prostate Image Segmentation via Patch-based Density Constraints Clustering 基于补丁的密度约束聚类自动三维前列腺图像分割
Yao Yao, S. Gou, Yang Guang
{"title":"Automatic 3D Prostate Image Segmentation via Patch-based Density Constraints Clustering","authors":"Yao Yao, S. Gou, Yang Guang","doi":"10.1145/3271553.3271571","DOIUrl":"https://doi.org/10.1145/3271553.3271571","url":null,"abstract":"Currently methods on prostate segmentation barely solve the problems about the low prostate CT contrast, high edge ambiguity, surrounding adhesion tissues and especially the tumor motion. To effectively manage those problems in prostate treatment using CT guided radiotherapy, automated segmentation needs to be performed. In this paper, an automatic 3D prostate image segmentation via Patch-based density constraints clustering (PDCC) is developed. The main contributions of this method lie in the following three strategies: 1) compared with only using pixel intensity information, Superpixel-based 3D patch includes more structure contexts to deal with low contrast problem in prostate CT images. 2) Compacting and extracting discriminative information in the each patch with 3D gray-gradient cooccurrence matrix are used to distinguish tiny texture difference between prostate and non-prostate. 3) Density constraints clustering algorithm focus on a higher density than their neighbors' points with relatively small distance to cope with two nearby organs touch together. Further, clusters are recognized regardless of their shape and of the dimensionality of the space in which they are embedded. The proposed method has been evaluated on 10 patients' prostate CT image database where each patient includes 50 treatment images, and several state-of-the-art prostate CT segmentation algorithms with various evaluation metrics have been as comparisons. Experimental results demonstrate that the proposed method achieves higher segmentation accuracy and lower average surface distance.","PeriodicalId":414782,"journal":{"name":"Proceedings of the 2nd International Conference on Vision, Image and Signal Processing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Location Estimating Method of Buried Victims in Collapsing Area Using Wi-Fi Signals 基于Wi-Fi信号的塌陷区遇难者位置估计方法
Sumin Ahn, Gunwoo Lee, Dongsoo Han
{"title":"A Location Estimating Method of Buried Victims in Collapsing Area Using Wi-Fi Signals","authors":"Sumin Ahn, Gunwoo Lee, Dongsoo Han","doi":"10.1145/3271553.3275240","DOIUrl":"https://doi.org/10.1145/3271553.3275240","url":null,"abstract":"When urban areas are hit by a disaster such as an earthquake, subway and tunnel-collapsing causes severe damages to both people and property. Especially it requires a lot of manpower and time to rescue the buried persons in the scene of accident. Moreover, secondary damage can occur during the rescue operation by additional collapses. To detect buried victims in disaster situation, technologies that utilize images, sounds and radio signals are mainly used. However, they still require close access to the collapse site and the detection range of them is limited to small area. Because a rescuer has to look around a wide disaster scene, there is a difficulty in finding buried victims by missing Golden Time. To resolve this problem, in this paper we propose a stochastic method to estimate the location of buried persons in collapsing area using Wi-Fi signals. We assume that every victim in the disaster site has a smartphone. The method utilize only a few number of Wi-Fi signal receivers equipped on drones to make it available to detect victims' Wi-Fi signals in disaster situations. Our method can contribute to life protection technologies by providing the locations of buried persons for a quick rescue in case of a disaster.","PeriodicalId":414782,"journal":{"name":"Proceedings of the 2nd International Conference on Vision, Image and Signal Processing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116542375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Software Implementation of ZUC Stream Cipher ZUC流密码的高效软件实现
Kuai Yu, Naijie Gu, Junjie Su, Qilin Bai
{"title":"Efficient Software Implementation of ZUC Stream Cipher","authors":"Kuai Yu, Naijie Gu, Junjie Su, Qilin Bai","doi":"10.1145/3271553.3271580","DOIUrl":"https://doi.org/10.1145/3271553.3271580","url":null,"abstract":"ZUC stream cipher is the first stream cipher developed independently by Chinese cryptologists as an international standard. The fast implementation of encryption algorithm is an important issue in cryptography application. At present, the research on ZUC stream cipher is mainly based on hardware implementation, and there are many efficient hardware implementations of ZUC stream cipher, but there are few efficient software implementations at present. This paper presents an efficient software design and implementation of ZUC stream cipher. Firstly, we propose the delayed modular, sliding window, and S-box optimizations to reduce the computational cost without modifying the calculation result of ZUC stream cipher. Secondly, single instruction multiple data instructions, reducing the times of memory access, loop unrolling optimization and other code optimization methods can improve the speed of encryption and decryption. Finally, we design and implementation a genetic algorithm to find the optimal sequence of optimizations in compiler. Experiments show that compared with the implementation of ZUC stream cipher given in the official document, these methods can give 102% performance improvement.","PeriodicalId":414782,"journal":{"name":"Proceedings of the 2nd International Conference on Vision, Image and Signal Processing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134030794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Target Localization Framework in MIMO Radar Using Bandwidth Synthesis Technique and Direction of Arrival (DOA) Information 基于带宽合成技术和DOA信息的MIMO雷达目标定位框架
B. Ayhan, C. Kwan
{"title":"A Target Localization Framework in MIMO Radar Using Bandwidth Synthesis Technique and Direction of Arrival (DOA) Information","authors":"B. Ayhan, C. Kwan","doi":"10.1145/3271553.3271560","DOIUrl":"https://doi.org/10.1145/3271553.3271560","url":null,"abstract":"This paper presents a target localization framework for MIMO radar configurations. The framework uses the Elliptic Curve Intersection (ECI) method for target localization and incorporates a bandwidth synthesis technique to improve the range resolution. Extensive simulations clearly demonstrated the efficacy of the introduced framework. Because the ECI method has the problem of generating ghost targets, as a remedy to this limitation, a solution which utilizes the DOA information has been introduced as well.","PeriodicalId":414782,"journal":{"name":"Proceedings of the 2nd International Conference on Vision, Image and Signal Processing","volume":"757 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116118161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信