Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

15,911 Full-Text Articles 14,608 Authors 3,373,217 Downloads 180 Institutions

All Articles in Computer Sciences

Faceted Search

15,911 full-text articles. Page 1 of 301.

Video Event Understanding With Pattern Theory, Fillipe Souza, Sudeep Sarkar, Anuj Srivastava, Jingyong Su 2015 University of South Florida

Video Event Understanding With Pattern Theory, Fillipe Souza, Sudeep Sarkar, Anuj Srivastava, Jingyong Su

MODVIS Workshop

We propose a combinatorial approach built on Grenander’s pattern theory to generate semantic interpretations of video events of human activities. The basic units of representations, termed generators, are linked with each other using pairwise connections, termed bonds, that satisfy predefined relations. Different generators are specified for different levels, from (image) features at the bottom level to (human) actions at the highest, providing a rich representation of items in a scene. The resulting configurations of connected generators provide scene interpretations; the inference goal is to parse given video data and generate high-probability configurations. The probabilistic structures are imposed using energies ...


Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo 2015 Purdue University

Two Correspondence Problems Easier Than One, Aaron Michaux, Zygmunt Pizlo

MODVIS Workshop

Computer vision research rarely makes use of symmetry in stereo reconstruction despite its established importance in perceptual psychology. Such stereo reconstructions produce visually satisfying figures with precisely located points and lines, even when input images have low or moderate resolution. However, because few invariants exist, there are no known general approaches to solving symmetry correspondence on real images. The problem is significantly easier when combined with the binocular correspondence problem, because each correspondence problem provides strong non-overlapping constraints on the solution space. We demonstrate a system that leverages these constraints to produce accurate stereo models from pairs of binocular images ...


Formal Aspects Of Non-Rigid-Shape-From-Motion Perception, Vicky Froyen, Qasim Zaidi 2015 SUNY College of Optometry

Formal Aspects Of Non-Rigid-Shape-From-Motion Perception, Vicky Froyen, Qasim Zaidi

MODVIS Workshop

Our world is full of objects that deform over time, for example animals, trees and clouds. Yet, the human visual system seems to readily disentangle object motions from non-rigid deformations, in order to categorize objects, recognize the nature of actions such as running or jumping, and even to infer intentions. A large body of experimental work has been devoted to extracting rigid structure from motion, but there is little experimental work on the perception of non-rigid 3-D shapes from motion (e.g. Jain, 2011). Similarly, until recently, almost all formal work had concentrated on the rigid case. In the last ...


Object Recognition And Visual Search With A Physiologically Grounded Model Of Visual Attention, Frederik Beuth, Fred H. Hamker 2015 Chemnitz University of Technology

Object Recognition And Visual Search With A Physiologically Grounded Model Of Visual Attention, Frederik Beuth, Fred H. Hamker

MODVIS Workshop

Visual attention models can explain a rich set of physiological data (Reynolds & Heeger, 2009, Neuron), but can rarely link these findings to real-world tasks. Here, we would like to narrow this gap with a novel, physiologically grounded model of visual attention by demonstrating its objects recognition abilities in noisy scenes.

To base the model on physiological data, we used a recently developed microcircuit model of visual attention (Beuth & Hamker, in revision, Vision Res) which explains a large set of attention experiments, e.g. biased competition, modulation of contrast response functions, tuning curves, and surround suppression. Objects are represented by object-view specific neurons, learned via a trace learning approach (Antonelli et al., 2014, IEEE TAMD). A visual cortex model combines the microcircuit with neuroanatomical properties like top-down attentional processing, hierarchical-increasing receptive field sizes, and synaptic transmission delays. The visual cortex model is complemented by a model of the frontal eye field (Zirnsak et al., 2011, Eur J Neurosci).

We evaluated the model on a realistic object recognition task in which a given target has to be localized in a scene (guided visual search task), using 100 different target objects, 1000 scenes, and two backgrounds. The model achieves an accuracy of 92% at black, and of 71% at white-noise backgrounds. We found that two of the underlying, neuronal attention mechanisms are prominently relevant for guided visual search: amplification of neurons preferring the target; and suppression of neurons encoding distractors or background noise.


Modeling Visual Features To Recognize Biological Motion: A Developmental Approach, Giulio Sandini, Nicoletta Noceti, Alessandra Sciutti, Francesco Rea, Alessandro Verri, Francesca Odone 2015 Robotics, Brain and Cognitive Sciences Department, Istituto Italiano di Tecnologia, Italy

Modeling Visual Features To Recognize Biological Motion: A Developmental Approach, Giulio Sandini, Nicoletta Noceti, Alessandra Sciutti, Francesco Rea, Alessandro Verri, Francesca Odone

MODVIS Workshop

In this work we deal with the problem of designing and developing computational vision models – comparable to the early stages of the human development – using coarse low-level information.

More specifically, we consider a binary classification setting to characterize biological movements with respect to non-biological dynamic events. To this purpose, our model builds on top of the optical flow estimation, and abstract the representation to simulate the limited amount of visual information available at birth. We take inspiration from known biological motion regularities explained by the Two-Thirds Power Law, and design a motion representation that includes different low-level features, which can ...


Gal: A Stepwise Model For Automated Cloud Shadow Detection In Hico Oceanic Imagery Utilizing Guided Filter, Pixel Assignment, And Geometric Linking, Jennerpher Renee Meyers 2015 University of Southern Mississippi

Gal: A Stepwise Model For Automated Cloud Shadow Detection In Hico Oceanic Imagery Utilizing Guided Filter, Pixel Assignment, And Geometric Linking, Jennerpher Renee Meyers

Dissertations

Detection of cloud shadow pixels is an important step in image processing in several remote sensing ocean-color application domains, such as obtaining chlorophyll content. While shadow detection algorithms do exist, the vast majority are for over land which leaves few options for detection over water.

The detection of cloud shadow over water in HICO imagery is a unique problem. As its name implies, HICO (Hyperspectral Imager for the Coastal Ocean) imagery is produced for coastal and oceanic regions. Since land based algorithms remove water before processing, these approaches would not be applicable. The only currently published HICO shadow pixel detection ...


Secure And Reliabe Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad 2015 University of Southern Mississippi

Secure And Reliabe Routing Protocol For Transmission Data In Wireless Sensor Mesh Networks, Nooh Adel Bany Muhammad

Dissertations

Abstract

Sensor nodes collect data from the physical world then exchange it until it reaches the intended destination. This information can be sensitive, such as battlefield surveillance. Therefore, providing secure and continuous data transmissions among sensor nodes in wireless network environments is crucial. Wireless sensor networks (WSN) have limited resources, limited computation capabilities, and the exchange of data through the air and deployment in accessible areas makes the energy, security, and routing major concerns in WSN. In this research we are looking at security issues for the above reasons. WSN is susceptible to malicious activities such as hacking and physical ...


Video Event Recognition And Prediction Based On Temporal Structure Analysis, Kang Li 2015 Northeastern University

Video Event Recognition And Prediction Based On Temporal Structure Analysis, Kang Li

Computer Engineering Dissertations

The increasing ubiquitousness of multimedia information in today's world has positioned video as a favored information vehicle, and given rise to an astonishing generation of social media and surveillance footage. Consumer-grade video is becoming abundant on the Internet, and it is now easier than ever to download multimedia material of any kind and quality. This raises a series of technological demands for automatic video understanding, which has motivated the research community to guide its steps towards a better attainment of such capabilities. As a result, current trends on cognitive vision promise to recognize complex events and self-adapt to different ...


Partial Differential Equations Resource, Joseph Richard Dorris, Wilson Parker, Joey Allen, Alex Kotzman 2015 University of Tennessee, Knoxville

Partial Differential Equations Resource, Joseph Richard Dorris, Wilson Parker, Joey Allen, Alex Kotzman

University of Tennessee Honors Thesis Projects

No abstract provided.


Providing Privacy From The Residential Cloud, Aldo Cassola 2015 Northeastern University

Providing Privacy From The Residential Cloud, Aldo Cassola

Computer Science Dissertations

The growth of mobile devices and computing has continued in recent years to the point where mobile network providers must not only upgrade their networks to serve the new traffic-intensive content that their users demand, but to actually turn to alternative methods of delivery, namely WiFi hotspots and femtocells. This demand is driven in part by the surge in streaming services, but also by the demand for ubiquitous access to data hosted in cloud services.

The increased connectivity has changed user expectations for access to their data. Cloud service providers have seen similar increases in their user bases as clients ...


Modeling Traffic At An Intersection, Kaleigh L. Mulkey, Saniita K. FaSenntao 2015 Kennesaw State University

Modeling Traffic At An Intersection, Kaleigh L. Mulkey, Saniita K. Fasenntao

Symposium of Student Scholars

The main purpose of this project is to build a mathematical model for traffic at a busy intersection. We use elements of Queueing Theory to build our model: the vehicles driving into the intersection are the “arrival process” and the stop light in the intersection is the “server.”

We collected traffic data on the number of vehicles arriving to the intersection, the duration of green and red lights, and the number of vehicles going through the intersection during a green light. We built a SAS macro code to simulate traffic based on parameters derived from the data.

In our program ...


Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague 2015 University of Wyoming

Welcome To The Machine: Privacy And Workplace Implications Of Predictive Analytics, Robert Sprague

Robert Sprague

Predictive analytics use a method known as data mining to identify trends, patterns, or relationships among data, which can then be used to develop a predictive model. Data mining itself relies upon big data, which is “big” not solely because of its size but also because its analytical potential is qualitatively different. “Big data” analysis allows organizations, including government and businesses, to combine diverse digital datasets and then use statistics and other data mining techniques to extract from them both hidden information and surprising correlations. These data are not necessarily tracking transactional records of atomized behavior, such as the purchasing ...


Supervisory Control And Data Acquisition (Scada) Control Optimization, Garrett Johnson, Jeremy Straub, Eunjin Kim 2015 SelectedWorks

Supervisory Control And Data Acquisition (Scada) Control Optimization, Garrett Johnson, Jeremy Straub, Eunjin Kim

Jeremy Straub

SCADA systems are generally used to monitor and control multiple systems of the same type to allow them to be remotely controlled and monitored. Water plants, for example, could be controlled and monitored by a SCADA system. This project seeks to optimize a SCADA system using Artificial Intelligence. A constraint satisfaction / optimization algorithm is used to maximize performance relative to weighted system goals.


A Behavior-Reactive Autonomous System To Identify Pokémon Characters, Xu Cao, Bohan Zhang, Jeremy Straub, Eunjin Kim 2015 SelectedWorks

A Behavior-Reactive Autonomous System To Identify Pokémon Characters, Xu Cao, Bohan Zhang, Jeremy Straub, Eunjin Kim

Jeremy Straub

Pokémon is an entertainment franchise with a large fan base. This project uses well-known Pokémon characters to demonstrate the operations of a question selection system. Presented in the form of a game where the computer attempts to guess the user-selected character, the system attempts to minimize the number of questions required for this purpose by identifying questions that most constrain the decision space. The decision making process is refined based on actual user behavior.


Scada System Security: Accounting For Operator Error And Malicious Intent, Ryan Kilbride, Jeremy Straub, Eunjin Kim 2015 SelectedWorks

Scada System Security: Accounting For Operator Error And Malicious Intent, Ryan Kilbride, Jeremy Straub, Eunjin Kim

Jeremy Straub

Supervisory control and data acquisition (SCADA) systems are becoming more and more com-monplace in many industries today. Industries are making better use of software and large scale control systems to run efficiently, without the need for large amounts of oversight. Security is a particularly large issue with such systems, however. A human must still be involved to ensure smooth operation in the event of catastrophic system error, or unusual circumstanc-es. Human involvement presents problems: operators could make mistakes, configure the system to operate sub-optimally or take malicious actions. This imple-mentation of SCADA security aims to combat these problems.


Scheduling Algorithm Development For An Open Source Software And Open Hardware Spacecraft, Calvin Bina, Jeremy Straub, Ronald Marsh 2015 SelectedWorks

Scheduling Algorithm Development For An Open Source Software And Open Hardware Spacecraft, Calvin Bina, Jeremy Straub, Ronald Marsh

Jeremy Straub

The efficacy of each type of scheduler is assessed rela-tive to the goal of having a time and resource efficient scheduling algorithm. The scheduler must ensure suc-cessful spacecraft operations and maximize the perfor-mance of tasks relative to performance constraints and their respective due dates.


Assessment Of The Impact Of Clothing And Environmental Conditions On Visible Light 3d Scanning, Pann Ajjimaporn, Jeremy Straub, Scott Kerlin 2015 SelectedWorks

Assessment Of The Impact Of Clothing And Environmental Conditions On Visible Light 3d Scanning, Pann Ajjimaporn, Jeremy Straub, Scott Kerlin

Jeremy Straub

The quality of models produced by visible light 3D scanners is influenced by multiple factors. To max-imize model accuracy and detail levels, the correct combination of lighting texture, subject posture and software usage must be selected. The work described herein has been performed to measure the effect of different lighting and envi-ronmental conditions on human 3D scanning results.


Web-Based Job Management System For Three-Dimensional Printing And Scanning, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin 2015 SelectedWorks

Web-Based Job Management System For Three-Dimensional Printing And Scanning, Stephanie Hollman, Dalyn Limesand, Jeremy Straub, Scott Kerlin

Jeremy Straub

Three-dimensional (3D) printers have gained popularity for use for many different projects. The work presented herein aims to make this process simpler. This poster discusses a system that will allow individuals from all over campus to submit object files for printing, without having to schedule appointments and schedule 3D scanning appointments and retrieve scan results.


Autonomous Navigation And Control Of Unmanned Aerial Systems In The National Airspace, Michael Hlas, Jeremy Straub, Eunjin Kim 2015 SelectedWorks

Autonomous Navigation And Control Of Unmanned Aerial Systems In The National Airspace, Michael Hlas, Jeremy Straub, Eunjin Kim

Jeremy Straub

Pilotless aircraft known as Unmanned Aerial Vehicles (UAVs) have been used extensively for military and intelligence purposes. This includes situations where the mission area is too dangerous for a pilot to fly, the length of the mission is longer than a pilot could stay awake or aircraft are used as cruise missiles that crash into their target. With the decreasing cost and miniaturization of computers, it has become possible to build UAVs that are small and inexpensive making them accessible to businesses, law enforcement, hobbyists and the general public.


Medical Procedure Expert System, Timothy Whitney, Jeremy Straub, Eunjin Kim 2015 SelectedWorks

Medical Procedure Expert System, Timothy Whitney, Jeremy Straub, Eunjin Kim

Jeremy Straub

Artificial intelligence is an area of research in computer science that allows for computer systems to make logical decisions based on its environment. This basic ability can be applied to many problems, including detecting abnormalities in a system, such as commands issued by malicious users, or erroneous commands from valid users. The ability to detect such commands is particularly useful in high risk application where such a command could result in harm to people. This research focuses on one such area by applying the decision making power of AI towards a medical use by developing an expert system to detect ...


Digital Commons powered by bepress