Advanced search in
Research products
arrow_drop_down
Searching FieldsTerms
Field of Science [Beta]
arrow_drop_down
is
arrow_drop_down
artificial intelligence & image processing
Include:

Filters

661,361 Research products, page 1 of 13,228

50
arrow_drop_down
Relevance
arrow_drop_down
  • Closed Access
    Authors: 
    Mingbao Lin; Rongrong Ji; Shen Chen; Xiaoshuai Sun; Chia-Wen Lin;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    Online image hashing aims to update hash functions on-the-fly along with newly arriving data streams, which has found broad applications in computer vision and beyond. To this end, most existing methods update hash functions simply using discrete labels or pairwise simi...

  • Open Access English
    Authors: 
    Zhenxing Huang; Xinfeng Liu; Rongpin Wang; Mudan Zhang; Xianchun Zeng; Jun Liu; Yang Yongfeng; Xin Liu; Hairong Zheng; Dong Liang; +1 more
    Publisher: Springer Science and Business Media LLC

    The novel coronavirus (COVID-19) pneumonia has become a serious health challenge in countries worldwide. Many radiological findings have shown that X-ray and CT imaging scans are an effective solution to assess disease severity during the early stage of COVID-19. Many a...

  • Closed Access
    Authors: 
    Linss T. Alex; Subranshu Sekhar Dash; R. Sridhar;
    Publisher: Springer Science and Business Media LLC

    This paper investigates the performance of modular dc–dc forward converter in Input Parallel Output Series (IPOS) configuration which is controlled by an effective controller. This IPOS topology facilitates the converter to have high output voltage gain. The role of con...

  • Closed Access
    Authors: 
    Liu, Fang; Jiao, Licheng; Tang, Xu; Yang, Shuyuan; Ma, Wenping; Hou, Biao;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    To detect changed areas in multitemporal polarimetric synthetic aperture radar (SAR) images, this paper presents a novel version of convolutional neural network (CNN), which is named local restricted CNN (LRCNN). CNN with only convolutional layers is employed for change...

  • Authors: 
    Caleb Adams; Jackson Parker; David L. Cotten;
    Publisher: IEEE

    Here we present benchmarks and the expected performance of the SSRLCV (Small Satellite Research Laboratory Computer Vision) library that will be tested in Low Earth Orbit onboard the 6U MOCI (Multiview Onboard Computer Vision) cube satellite. The SSRLCV software library...

  • Publication . Article . Preprint . 2018
    Open Access English
    Authors: 
    Krestinskaya, Olga; James, Alex Pappachen; Chua, Leon Ong;

    The volume, veracity, variability, and velocity of data produced from the ever increasing network of sensors connected to Internet pose challenges for power management, scalability, and sustainability of cloud computing infrastructure. Increasing the data processing cap...

  • Authors: 
    M. Shahrukh; A.A. Usmani; Nidal Rafiuddin;
    Publisher: Institution of Engineering and Technology
  • Open Access
    Authors: 
    Ali Akbari; Maria Trocan; Saeid Sanei; Bertrand Granado;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Countries: United Kingdom, France

    International audience; Joint sparse representation (JSR) model has recently emerged as a powerful technique with wide variety of applications. In this paper, the JSR model is extended to error concealment (EC) application, being effective to recover the original image ...

  • Authors: 
    Haoran Wang; Qingyong Zhang; Yuhao Du; Shixun Wang;
    Publisher: IEEE

    To precisely recognizing traffic police gesture, a two-branch multi-stage convolutional neural network (CNN) and an BP neural network (BPNN) classifier has been adopted to achieve the task of traffic police pose estimation in this paper. We simultaneously detect the hum...

  • Open Access
    Authors: 
    Grzegorz Dudek; Paweł Pełka; Slawek Smyl;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    This work presents a hybrid and hierarchical deep learning model for midterm load forecasting. The model combines exponential smoothing (ETS), advanced long short-term memory (LSTM), and ensembling. ETS extracts dynamically the main components of each individual time se...

  • Authors: 
    Min Wang; Yongbin Wang;
    Publisher: IEEE

    During the process of service aggregation, heterogeneous multilevel interactive process, which contributes to the high security requirement of the access control model. Under the circumstances of service aggregation, in order to adapt the centralized access control betw...

  • Authors: 
    Yan Li; Gauthier Lafruit;
    Publisher: IEEE

    The paper presents a robust approach to compute disparities on sparse sampled light field images based on Epipolar-Plane Image (EPI) analysis. The Relative Gradient is leveraged as a kernel density function to cope with radiometric changes in non-Lambertian scenes. To a...

  • Closed Access
    Authors: 
    Manman Yuan; Weiping Wang; Zhen Wang; Xiong Luo; Jürgen Kurths;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    This article solves the exponential synchronization issue of memristor-based complex-valued neural networks (MCVNNs) with time-varying uncertainties via feedback control. Compared with the traditional control methods, a more practical and general control scheme with the...

  • Open Access
    Authors: 
    Hao Hu; Jiaoman Du; Xiang Li; Changjing Shang; Qiang Shen;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    Reasonable risk models in hazardous material transportation are of practical significance, for safeguarding the lives and properties, protecting the natural environment, and facilitating sustainable development. The existing risk models can be classified into summation ...

  • Authors: 
    Shubin Zhao;
    Publisher: IEEE

    Finding time-sensitive objects in time and precisely locating them in real time is the basis of successful operations. This paper analyzes the characteristics of images from space-based platforms such as satellites, and images from aerial platforms such as UAVs, and the...

  • Publication . Conference object . 2017
    Authors: 
    Xing Liu; Ying Chen; Chun-Jian Hua;
    Publisher: IEEE

    To solve the problem of poor robustness and low effectiveness of visual tracking in complex scenes, a novel target tracking algorithm based on adaptive observation weight is proposed in this paper. First of all, a weighted observation model is established by linear visu...

  • Closed Access
    Authors: 
    Xiuli Wang; Ming Yang; Lalit Gupta; Yang Bai;
    Publisher: Springer International Publishing

    Laser spot is widely used in numerous fields such as pointing during presentations, guiding robots in human machine interaction (HCI), and guiding munitions to targets in military, etc.. The interest of this paper is to develop an effective method for laser spot detecti...

  • Closed Access
    Authors: 
    Runmei Li; Shujing Xu;
    Publisher: Springer Science and Business Media LLC

    In this paper, Decomposed Fuzzy Systems (DFS) structure is applied to design single intersection signal fuzzy controller. The DFS structure is to decompose each fuzzy variable into layers of fuzzy systems and each layer is to characterize one traditional fuzzy set. DFS ...

  • Publication . Conference object . 2016
    Authors: 
    P.Regnath Franco; K. Thirumoorthy; K. Muneeswaran;
    Publisher: IEEE

    We propose a novel idea for the preparation of slides automatically from the documents which reduce the time consumption and efforts of the presenter. The proposed method uses Support Vector Regression to predict the importance of the sentences and Integer Linear Progra...

  • Closed Access
    Authors: 
    Abdolreza Asadi Ghanbari; Hossein Alaei;
    Publisher: Springer Science and Business Media LLC

    In crisis management, Threat Evaluation (TE) and Resource Allocation (RA) are two key components. To build an automated system in this area after modelling Threat Evaluation and Resource Allocation processes, solving these models and finding the optimal solution are fur...

  • Open Access
    Authors: 
    Yan Zhao; Shoujin Wang; Yan Wang; Hongwei Liu;
    Publisher: Springer Science and Business Media LLC

    Recommender systems have played an increasingly important role in providing users with tailored suggestions based on their preferences. However, the conventional offline recommender systems cannot handle the ubiquitous data stream well. To address this issue, Streaming ...

  • Publication . Article . Other literature type . Conference object . 2018
    Open Access
    Authors: 
    Ilwoo Lyu; Jonathan Perdomo; Gabriel S. Yapuncich; Beatriz Paniagua; Doug M. Boyer; Martin Styner;
    Publisher: SPIE

    We present a group-wise shape correspondence method for analyzing variable and complex objects in a population study. The proposed method begins with the standard spherical harmonics (SPHARM) point distribution models (PDM) with their spherical mappings. In case of comp...

  • Open Access
    Authors: 
    Mustafa A. Kocak; David Ramirez; Elza Erkip; Dennis Shasha;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Project: NSF | Prospecting for Resources... (1412232), NSF | A Systems Approach to the... (1158273), NSF | NeTS: Medium: Massive Mob... (1302336), NSF | NutriNet: A Network Inspi... (1339362)

    SafePredict is a novel meta-algorithm that works with any base prediction algorithm for online data to guarantee an arbitrarily chosen correctness rate, $1-\epsilon$, by allowing refusals. Allowing refusals means that the meta-algorithm may refuse to emit a prediction p...

  • Authors: 
    Zunshi Liu; Huabin Wang; He Xuesheng; Liang Tao;
    Publisher: IEEE

    The existing temporal convolution model does not take full advantage of the characteristics of the low level network, and there is noise in the input 2D joint sequence. Therefore, a temporal convolution model based on intermediate supervision is proposed to estimate 3D ...

  • Authors: 
    Takahiro Sasaki; James R. Leger;
    Publisher: SPIE

    A full description of light propagation in the ray regime is provided by the plenoptic function, where both the location and angle of each ray is known. In this paper, we investigate the utility of plenoptic data for extracting information from a scene where the light f...

  • Authors: 
    Alberto Broggi; Alessandro Cionini; F. Ghidini; Paolo Zani;
    Publisher: IEEE

    Video sensors based on CMOS technology represent the vast majority of the adopted solutions for image acquisition systems equipped in unmanned vehicles and Advanced Driver Assistance Systems. These sensors typically employ a rolling shutter readout scheme, which causes ...

  • Open Access
    Authors: 
    Jian Du; Hongxu Hou; Jing Wu; Zhipeng Shen; Jinting Li; Hongbin Wang;
    Publisher: Atlantis Press
  • Publication . Conference object . 2021
    Authors: 
    Yi-Lin Tu; Wei-Yang Lin; Yao-Cheng Lin;
    Publisher: IEEE

    In the recent years, image-based plant phenotyping has become an active research area. It can help investigating the complex association between genomes and phenotypic traits. However, traditional plant phenotyping involves manual measurement of plant traits and is quit...

  • Closed Access
    Authors: 
    Zheng, Heliang; Fu, Jianlong; Zha, Zheng-Jun; Luo, Jiebo; Mei, Tao;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    We investigate the localization of subtle yet discriminative parts for fine-grained image recognition. Based on the observation that such parts typically exist within a hierarchical structure (e.g., from a coarse-scale “head” to a fine-scale “eye” when recognizing bird ...

  • Closed Access
    Authors: 
    Zhong-Qiu Zhao; Zhen-Wei Hao; Run Su; Xindong Wu;
    Publisher: Springer International Publishing

    In this paper, we present a novel image super-resolution framework based on neighbor embedding, which belongs to the family of learning-based super-resolution methods. Instead of relying on extrinsic set of training images, image pairs are generated by learning self-sim...

  • Closed Access
    Authors: 
    Li Li; Weiming Zhang; Kejiang Chen; Nenghai Yu;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    Side channel steganalysis refers to detecting a steganographer in social websites via behavior analysis. In this paper, we first design a side channel steganalysis based on the correlation between image sequences of social users, which aims to find out the behaviorally ...

  • Authors: 
    Zhou Shiyu; Liu Xiqing; Yuanbing Tian; Bin Fu; Xiuyan Xia; Ge Jin;
    Publisher: IEEE

    Based human visual speed perception characteristic, a video quanlity assessment(VQA) algorithm is introduced in the paper. Natural video statistics features extraction and weighting factors are incorporated in the scheme. In the VQA, considering the impact both video co...

  • Closed Access
    Authors: 
    Zhang, Yingjun; Qin, Jiahu; Shi, Peng; Kang, Yu;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Project: ARC | Discovery Projects - Gran... (DP170102644)

    An intuitionistic fuzzy cognitive map (IFCM) is an extension of a fuzzy cognitive map (FCM) that forms a graph-oriented fuzzy map describing both causal relationships between pairs of concepts and the states of concepts via intuitionistic fuzzy sets (IFSs). In contrast ...

  • Open Access
    Authors: 
    Ke Tang; Shengcai Liu; Peng Yang; Xin Yao;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    Generalization, i.e., the ability of solving problem instances that are not available during the system design and development phase, is a critical goal for intelligent systems. A typical way to achieve good generalization is to learn a model from vast data. In the cont...

  • Publication . Article . 2020
    Closed Access
    Authors: 
    Han Fang; Dongdong Chen; Qidong Huang; Jie Zhang; Zehua Ma; Weiming Zhang; Nenghai Yu;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    Traditional watermarking algorithms have been extensively studied. As an important type of watermarking schemes, template-based approaches maintain a very high embedding rate. In such scheme, the message is often represented by some dedicatedly designed templates, and t...

  • Closed Access
    Authors: 
    Peihao Chen; Chuang Gan; Guangyao Shen; Wenbing Huang; Runhao Zeng; Mingkui Tan;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    Temporal action localization aims to accurately localize and recognize all possible action instances from an untrimmed video automatically. Most existing methods perform this task by first generating a set of proposals and then recognizing each independently. However, d...

  • Authors: 
    Fasih Haider; Nick Campbell; Saturnino Luz;
    Publisher: IEEE

    Real-time detection of a speaker and speaker's location is a challenging task, which is usually addressed by processing acoustic/visual information. However, it is a well-known fact that when a person speaks, the lip and head movements can also be used to detect the spe...

  • Closed Access
    Authors: 
    Pradeep Yadav; Rishi Gupta; Sandeep Kumar;
    Publisher: Springer Singapore

    This paper presents the different approaches by which the video image retrieval systems can become more efficient. In today’s world large database not only create the problem but also increases the complexity in terms of time as well as size. Traditional methods are now...

  • Authors: 
    Eric Narciso Molina; Zenghui Zhang;
    Publisher: IEEE

    Semantic segmentation is the task of clustering pixels into an object class. In the field of remote sensing semantic segmentation has wide applications ranging from scene cover classification to change detection for scene understanding. With the success of deep learning...

  • Closed Access
    Authors: 
    Wern Han Lim; Mark James Carman;
    Publisher: ACM

    This paper investigates the annotation-based retrieval (AR) of World Wide Web (WWW) resources that has been annotated by users on Collaborative Tagging (CT) platforms as a form of user-generated content (UGC). Previous approaches have simply weight the WWW resources acc...

  • Closed Access
    Authors: 
    Du, Youtian; Wang, Xue; Cui, Yunbo; Wang, Hang; Su, Chang;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    Modeling the relationship between multimodal media, including images, videos, and text, can reduce the gap between the modalities and promote cross-media retrieval, image annotation, etc. In this paper, we propose a new approach called kernel-based mixture mapping (KMM)...

  • Publication . Part of book or chapter of book . 2018
    Closed Access
    Authors: 
    Zhong Zhang; Huang Meiyan; Shuang Liu; Tariq S. Durrani;
    Publisher: Springer Singapore

    Person re-identification obtains a major concern from researchers owing to its extensive applications and many challenges. Feature extraction is the first step for person re-identification, and a robust feature can promote the performance. In this paper, we mainly intro...

  • Open Access
    Authors: 
    Ajidayanti Ajidayanti; Ersis Warmansyah Abbas;
    Publisher: Center for Journal Management and Publication, Lambung Mangkurat University

    Variasi dalam penggunaan sumber belajar dalam proses pembelajaran dapat membuat pembelajaran lebih efisien dan efektif. Termasuk pemanfaatan lingkungan sekitar peserta didik sebagai sumber belajar, seperti halnya pemanfaatan objek wisata. Dalam pembelajaran IPS, pemanfa...

  • Authors: 
    Lei Jiang; Hiroshi Higuchi; Hiromitsu Fujii; Atsushi Yamashita; Hajime Asama;
    Publisher: IEEE

    In this paper, an error model of stereo camera system and a robust methodology are presented for reflection removal from pictures taken through a glass with long-shot background. The proposed method, when compared with the previous methods, results to be robust to the p...

  • Open Access English
    Authors: 
    He-dong Lei; Qing-feng Gao; Dong-rui Lv;
    Publisher: EDP Sciences

    On the basis of analyzing the structure of common power fittings in high-voltage transmission lines and their image features, combined with the DNN deep neural network in machine learning, we proposed a model suitable for high-voltage transmission line inspection robots...

  • Closed Access
    Authors: 
    Xu, Bin; Shou, Yingxin; Luo, Jun; Pu, Huayan; Shi, Zhongke;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    This paper studies the compound learning control of disturbed uncertain strict-feedback systems. The design is using the dynamic surface control equipped with a novel learning scheme. This paper integrates the recently developed online recorded data-based neural learnin...

  • Authors: 
    Heegwang Kim; Jinho Park; Hasil Park; Joonki Paik;
    Publisher: IEEE

    This paper presents a novel stereo image defogging algorithm using the disparity map. The proposed algorithm iteratively performs three steps; i) disparity map estimation using the optical flow, ii) transmission map generation using the estimated disparity map, and iii)...

  • Open Access
    Authors: 
    Jumriani Jumriani; Bambang Subiyakto; Syaharuddin Syaharuddin;
    Publisher: Center for Journal Management and Publication, Lambung Mangkurat University

    “Kampung Sasirangan” predikat yang dilekatkan kepada Kelurahan Seberang Mesjid kota Banjarmasin karena dikembangkannya Usaha Kecil Menengah (UKM) yang bergerak di bidang industri kain sasirangan. Kain ini merupakan jenis batik khas Banjar. Interaksi sosial yang berlangs...

  • Open Access English
    Authors: 
    Chen, Xinyuan; Xu, Chang; Yang, Xiaokang; Song, Li; Tao, Dacheng;
    Country: Australia

    © 1992-2012 IEEE. Style transfer describes the rendering of an image's semantic content as different artistic styles. Recently, generative adversarial networks (GANs) have emerged as an effective approach in style transfer by adversarially training the generator to synt...

  • Closed Access
    Authors: 
    Rongqiang Zhao; Qiang Wang; Jun Fu; Luquan Ren;
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)

    Bayesian methods are attracting increasing attention in the field of compressive sensing (CS), as they are applicable to recover signals from random measurements. However, these methods have limited use in many tensor-based cases such as hyperspectral Kronecker compress...