Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer vision (8)
- Machine learning (7)
- Action recognition (6)
- Tracking (6)
- Algorithms (5)
-
- Evolutionary computation (4)
- Artificial intelligence (3)
- Augmented reality (3)
- Authentication (3)
- Global illumination (3)
- Intrusion detection (3)
- Pattern recognition (3)
- Recognition (3)
- Uav (3)
- User study (3)
- Wavelets (3)
- 3D reconstruction (2)
- Bioinformatics (2)
- Communities (2)
- Computer Science (2)
- Computer graphics (2)
- Crowdsourcing (2)
- Data clustering (2)
- Data mining (2)
- GPU (2)
- Genetic algorithms (2)
- Gestures (2)
- High performance computing (2)
- Human action recognition (2)
- Image-based rendering (2)
- Publication Year
Articles 61 - 90 of 178
Full-Text Articles in Engineering
A Study Of Localization And Latency Reduction For Action Recognition, Syed Zain Masood
A Study Of Localization And Latency Reduction For Action Recognition, Syed Zain Masood
Electronic Theses and Dissertations
The success of recognizing periodic actions in single-person-simple-background datasets, such as Weizmann and KTH, has created a need for more complex datasets to push the performance of action recognition systems. In this work, we create a new synthetic action dataset and use it to highlight weaknesses in current recognition systems. Experiments show that introducing background complexity to action video sequences causes a significant degradation in recognition performance. Moreover, this degradation cannot be fixed by fine-tuning system parameters or by selecting better feature points. Instead, we show that the problem lies in the spatio-temporal cuboid volume extracted from the interest point …
Gradient Based Mrf Learning For Image Restoration And Segmentation, Kegan Samuel
Gradient Based Mrf Learning For Image Restoration And Segmentation, Kegan Samuel
Electronic Theses and Dissertations
The undirected graphical model or Markov Random Field (MRF) is one of the more popular models used in computer vision and is the type of model with which this work is concerned. Models based on these methods have proven to be particularly useful in low-level vision systems and have led to state-of-the-art results for MRF-based systems. The research presented will describe a new discriminative training algorithm and its implementation. The MRF model will be trained by optimizing its parameters so that the minimum energy solution of the model is as similar as possible to the ground-truth. While previous work has …
Algorithms For Community Identification In Complex Networks, Mahadevan Vasudevan
Algorithms For Community Identification In Complex Networks, Mahadevan Vasudevan
Electronic Theses and Dissertations
First and foremost, I would like to extend my deepest gratitude to my advisor, Professor Narsingh Deo, for his excellent guidance and encouragement, and also for introducing me to this wonderful science of complex networks. Without his support this dissertation would not have been possible. I would also like to thank the members of my research committee, professors Charles Hughes, Ratan Guha, Mainak Chatterjee and Yue Zhao for their advice and guidance during the entire process. I am indebted to the faculty and the staff of the Department of Electrical Engineering and Computer Science for providing me the resources and …
Evolution Through The Search For Novelty, Joel Lehman
Evolution Through The Search For Novelty, Joel Lehman
Electronic Theses and Dissertations
I present a new approach to evolutionary search called novelty search, wherein only behavioral novelty is rewarded, thereby abstracting evolution as a search for novel forms. This new approach contrasts with the traditional approach of rewarding progress towards the objective through an objective function. Although they are designed to light a path to the objective, objective functions can instead deceive search into converging to dead ends called local optima. As a significant problem in evolutionary computation, deception has inspired many techniques designed to mitigate it. However, nearly all such methods are still ultimately susceptible to deceptive local optima because they …
Leveraging Help Requests In Pomdp Intelligent Tutors, Jeremiah Folsom-Kovarik
Leveraging Help Requests In Pomdp Intelligent Tutors, Jeremiah Folsom-Kovarik
Electronic Theses and Dissertations
Intelligent tutoring systems (ITSs) are computer programs that model individual learners and adapt instruction to help each learner differently. One way ITSs differ from human tutors is that few ITSs give learners a way to ask questions. When learners can ask for help, their questions have the potential to improve learning directly and also act as a new source of model data to help the ITS personalize instruction. Inquiry modeling gives ITSs the ability to answer learner questions and refine their learner models with an inexpensive new input channel. In order to support inquiry modeling, an advanced planning formalism is …
A Fitness Function Elimination Theory For Blackbox Optimization And Problem Class Learning, Gautham Anil
A Fitness Function Elimination Theory For Blackbox Optimization And Problem Class Learning, Gautham Anil
Electronic Theses and Dissertations
The modern view of optimization is that optimization algorithms are not designed in a vacuum, but can make use of information regarding the broad class of objective functions from which a problem instance is drawn. Using this knowledge, we want to design optimization algorithms that execute quickly (efficiency), solve the objective function with minimal samples (performance), and are applicable over a wide range of problems (abstraction). However, we present a new theory for blackbox optimization from which, we conclude that of these three desired characteristics, only two can be maximized by any algorithm. We put forward an alternate view of …
4d-Ct Lung Registration And Its Application For Lung Radiation Therapy, Yugang Min
4d-Ct Lung Registration And Its Application For Lung Radiation Therapy, Yugang Min
Electronic Theses and Dissertations
Radiation therapy has been successful in treating lung cancer patients, but its efficacy is limited by the inability to account for the respiratory motion during treatment planning and radiation dose delivery. Physics-based lung deformation models facilitate the motion computation of both tumor and local lung tissue during radiation therapy. In this dissertation, a novel method is discussed to accurately register 3D lungs across the respiratory phases from 4D-CT datasets, which facilitates the estimation of the volumetric lung deformation models. This method uses multi-level and multi-resolution optical flow registration coupled with thin plate splines (TPS), to address registration issue of inconsistent …
Detecting, Tracking, And Recognizing Activities In Aerial Video, Vladimir Reilly
Detecting, Tracking, And Recognizing Activities In Aerial Video, Vladimir Reilly
Electronic Theses and Dissertations
In this dissertation, we address the problem of detecting humans and vehicles, tracking them in crowded scenes, and finally determining their activities in aerial video. Even though this is a well explored problem in the field of computer vision, many challenges still remain when one is presented with realistic data. These challenges include large camera motion, strong scene parallax, fast object motion, large object density, strong shadows, and insufficiently large action datasets. Therefore, we propose a number of novel methods based on exploiting scene constraints from the imagery itself to aid in the detection and tracking of objects. We show, …
Modeling Human Group Behavior In Virtual Worlds, Fahad Shah
Modeling Human Group Behavior In Virtual Worlds, Fahad Shah
Electronic Theses and Dissertations
Virtual worlds and massively-multiplayer online games are rich sources of information about large-scale teams and groups, offering the tantalizing possibility of harvesting data about group formation, social networks, and network evolution. They provide new outlets for human social interaction that differ from both face-to-face interactions and non-physically-embodied social networking tools such as Facebook and Twitter. We aim to study group dynamics in these virtual worlds by collecting and analyzing public conversational patterns of users grouped in close physical proximity. To do this, we created a set of tools for monitoring, partitioning, and analyzing unstructured conversations between changing groups of participants …
Techniques For Boosting The Performance In Content-Based Image Retrieval Systems, Ning Yu
Techniques For Boosting The Performance In Content-Based Image Retrieval Systems, Ning Yu
Electronic Theses and Dissertations
Content-Based Image Retrieval has been an active research area for decades. In a CBIR system, one or more images are used as query to search for similar images. The similarity is measured on the low level features, such as color, shape, edge, texture. First, each image is processed and visual features are extract. Therefore each image becomes a point in the feature space. Then, if two images are close to each other in the feature space, they are considered similar. That is, the k nearest neighbors are considered the most similar images to the query image. In this K-Nearest Neighbor …
Harmony Oriented Architecture, Kyle A. Martin
Harmony Oriented Architecture, Kyle A. Martin
Electronic Theses and Dissertations
This thesis presents Harmony Oriented Architecture: a novel architectural paradigm that applies the principles of Harmony Oriented Programming to the architecture of scalable and evolvable distributed systems. It is motivated by research on Ultra Large Scale systems that has revealed inherent limitations in human ability to design large-scale software systems that can only be overcome through radical alternatives to traditional object-oriented software engineering practice that simplifies the construction of highly scalable and evolvable system. HOP eschews encapsulation and information hiding, the core principles of objectoriented design, in favor of exposure and information sharing through a spatial abstraction. This helps to …
The Implications Of Virtual Environments In Digital Forensic Investigations, Farrah M. Patterson
The Implications Of Virtual Environments In Digital Forensic Investigations, Farrah M. Patterson
Electronic Theses and Dissertations
This research paper discusses the role of virtual environments in digital forensic investigations. With virtual environments becoming more prevalent as an analysis tool in digital forensic investigations, it’s becoming more important for digital forensic investigators to understand the limitation and strengths of virtual machines. The study aims to expose limitations within commercial closed source virtual machines and open source virtual machines. The study provides a brief overview of history digital forensic investigations and virtual environments, and concludes with an experiment with four common open and closed source virtual machines; the effects of the virtual machines on the host machine as …
Virtual Router Approach For Wireless Ad Hoc Networks, Ai Hua Ho
Virtual Router Approach For Wireless Ad Hoc Networks, Ai Hua Ho
Electronic Theses and Dissertations
Wireless networks have become increasingly popular in recent years. There are two variations of mobile wireless networks: infrastructure mobile networks and infrastructureless mobile networks. The latter are also known as mobile ad hoc network (MANET). MANETs have no fixed routers. Instead, mobile nodes function as relay nodes or routers, which discover and maintain communication connections between source nodes and destination nodes for various data transmission sessions. In other words, an MANET is a self-organizing multi-hop wireless network in which all nodes within a given geographical area participate in the routing and data forwarding process. Such networks are scalable and self-healing. …
The Power Of Quantum Walk Insights, Implementation, And Applications, Chen Fu Chiang
The Power Of Quantum Walk Insights, Implementation, And Applications, Chen Fu Chiang
Electronic Theses and Dissertations
In this thesis, I investigate quantum walks in quantum computing from three aspects: the insights, the implementation, and the applications. Quantum walks are the quantum analogue of classical random walks. For the insights of quantum walks, I list and explain the required components for quantizing a classical random walk into a quantum walk. The components are, for instance, Markov chains, quantum phase estimation, and quantum spectrum theorem. I then demonstrate how the product of two reflections in the walk operator provides a quadratic speed-up, in comparison to the classical counterpart. For the implementation of quantum walks, I show the construction …
Research In High Performance And Low Power Computer Systems For Data-Intensive Environment, Pengju Shang
Research In High Performance And Low Power Computer Systems For Data-Intensive Environment, Pengju Shang
Electronic Theses and Dissertations
According to the data affinity, DAFA re-organizes data to maximize the parallelism of the affinitive data, and also subjective to the overall load balance. This enables DAFA to realize the maximum number of map tasks with data-locality. Besides the system performance, power consumption is another important concern of current computer systems. In the U.S. alone, the energy used by servers which could be saved comes to 3.17 million tons of carbon dioxide, or 580,678 cars {Kar09}. However, the goals of high performance and low energy consumption are at odds with each other. An ideal power management strategy should be able …
Ray Collection Bounding Volume Hierarchy, Kris Krishna Rivera
Ray Collection Bounding Volume Hierarchy, Kris Krishna Rivera
Electronic Theses and Dissertations
This thesis presents Ray Collection BVH, an improvement over a current day Ray Tracing acceleration structure to both build and perform the steps necessary to efficiently render dynamic scenes. Bounding Volume Hierarchy (BVH) is a commonly used acceleration structure, which aides in rendering complex scenes in 3D space using Ray Tracing by breaking the scene of triangles into a simple hierarchical structure. The algorithm this thesis explores was developed in an attempt at accelerating the process of both constructing this structure, and also using it to render these complex scenes more efficiently. The idea of using "ray collection" as a …
Effective Task Transfer Through Indirect Encoding, Phillip Verbancsics
Effective Task Transfer Through Indirect Encoding, Phillip Verbancsics
Electronic Theses and Dissertations
An important goal for machine learning is to transfer knowledge between tasks. For example, learning to play RoboCup Keepaway should contribute to learning the full game of RoboCup soccer. Often approaches to task transfer focus on transforming the original representation to fit the new task. Such representational transformations are necessary because the target task often requires new state information that was not included in the original representation. In RoboCup Keepaway, changing from the 3 vs. 2 variant of the task to 4 vs. 3 adds state information for each of the new players. In contrast, this dissertation explores the idea …
Markerless Tracking Using Polar Correlation Of Camera Optical Flow, Prince Gupta
Markerless Tracking Using Polar Correlation Of Camera Optical Flow, Prince Gupta
Electronic Theses and Dissertations
We present a novel, real-time, markerless vision-based tracking system, employing a rigid orthogonal configuration of two pairs of opposing cameras. Our system uses optical flow over sparse features to overcome the limitation of vision-based systems that require markers or a pre-loaded model of the physical environment. We show how opposing cameras enable cancellation of common components of optical flow leading to an efficient tracking algorithm that captures five degrees of freedom including direction of translation and angular velocity. Experiments comparing our device with an electromagnetic tracker show that its average tracking accuracy is 80% over 185 frames, and it is …
A New Framework For Qos Provisioning In Wireless Lans Using The P-Persistent Mac Protocol, Kiran Babu Anna
A New Framework For Qos Provisioning In Wireless Lans Using The P-Persistent Mac Protocol, Kiran Babu Anna
Electronic Theses and Dissertations
The support of multimedia traffic over IEEE 802.11 wireless local area networks (WLANs) has recently received considerable attention. This dissertation has proposed a new framework that provides efficient channel access, service differentiation and statistical QoS guarantees in the enhanced distributed channel access (EDCA) protocol of IEEE 802.11e. In the first part of the dissertation, the new framework to provide QoS support in IEEE 802.11e is presented. The framework uses three independent components, namely, a core MAC layer, a scheduler, and an admission control. The core MAC layer concentrates on the channel access mechanism to improve the overall system efficiency. The …
A Robust Wireless Mesh Access Environment For Mobile Video Users, Fei Xie
A Robust Wireless Mesh Access Environment For Mobile Video Users, Fei Xie
Electronic Theses and Dissertations
The rapid advances in networking technology have enabled large-scale deployments of online video streaming services in today's Internet. In particular, wireless Internet access technology has been one of the most transforming and empowering technologies in recent years. We have witnessed a dramatic increase in the number of mobile users who access online video services through wireless access networks, such as wireless mesh networks and 3G cellular networks. Unlike in wired environment, using a dedicated stream for each video service request is very expensive for wireless networks. This simple strategy also has limited scalability when popular content is demanded by a …
Spatio-Temporal Maximum Average Correlation Height Templates In Action Recognition And Video Summarization, Mikel Rodriguez
Spatio-Temporal Maximum Average Correlation Height Templates In Action Recognition And Video Summarization, Mikel Rodriguez
Electronic Theses and Dissertations
Action recognition represents one of the most difficult problems in computer vision given that it embodies the combination of several uncertain attributes, such as the subtle variability associated with individual human behavior and the challenges that come with viewpoint variations, scale changes and different temporal extents. Nevertheless, action recognition solutions are critical in a great number of domains, such video surveillance, assisted living environments, video search, interfaces, and virtual reality. In this dissertation, we investigate template-based action recognition algorithms that can incorporate the information contained in a set of training examples, and we explore how these algorithms perform in action …
Architectural Support For Improving Computer Security, Jingfei Kong
Architectural Support For Improving Computer Security, Jingfei Kong
Electronic Theses and Dissertations
Computer security and privacy are becoming extremely important nowadays. The task of protecting computer systems from malicious attacks and potential subsequent catastrophic losses is, however, challenged by the ever increasing complexity and size of modern hardware and software design. We propose several methods to improve computer security and privacy from architectural point of view. They provide strong protection as well as performance efficiency. In our first approach, we propose a new dynamic information flow method to protect systems from popular software attacks such as buffer overflow and format string attacks. In our second approach, we propose to deploy encryption schemes …
A Fpga-Based Architecture For Led Backlight Driving, Zhaoshi Zheng
A Fpga-Based Architecture For Led Backlight Driving, Zhaoshi Zheng
Electronic Theses and Dissertations
In recent years, Light-emitting Diodes (LEDs) have become a promising candidate for backlighting Liquid Crystal Displays [1] (LCDs). Compared with traditional Cold Cathode Fluorescent Lamps (CCFLs) technology, LEDs offer not only better visual quality, but also improved power efficiency. However, to fully utilized LEDs' capability requires dynamic independent control of individual LEDs, which remains as a challenging topic. A FPGA-based hardware system for LED backlight control is proposed in this work. We successfully achieve dynamic adjustment of any individual LED's intensity in each of the three color channels (Red, Green and Blue), in response to a real time incoming video …
Real-Time Cinematic Design Of Visual Aspects In Computer-Generated Images, Juraj Obert
Real-Time Cinematic Design Of Visual Aspects In Computer-Generated Images, Juraj Obert
Electronic Theses and Dissertations
Creation of visually-pleasing images has always been one of the main goals of computer graphics. Two important components are necessary to achieve this goal --- artists who design visual aspects of an image (such as materials or lighting) and sophisticated algorithms that render the image. Traditionally, rendering has been of greater interest to researchers, while the design part has always been deemed as secondary. This has led to many inefficiencies, as artists, in order to create a stunning image, are often forced to resort to the traditional, creativity-baring, pipelines consisting of repeated rendering and parameter tweaking. Our work shifts the …
Visual Inspection Of Railroad Tracks, Pavel Babenko
Visual Inspection Of Railroad Tracks, Pavel Babenko
Electronic Theses and Dissertations
In this dissertation, we have developed computer vision methods for measurement of rail gauge, and reliable identification and localization of structural defects in railroad tracks. The rail gauge is the distance between the innermost sides of the two parallel steel rails. We have developed two methods for evaluation of rail gauge. These methods were designed for different hardware setups: the first method works with two pairs of unaligned video cameras while the second method works with depth maps generated by paired laser range scanners. We have also developed a method for detection of rail defects such as damaged or missed …
Detecting Malicious Software By Dynamicexecution, Jianyong Dai
Detecting Malicious Software By Dynamicexecution, Jianyong Dai
Electronic Theses and Dissertations
Traditional way to detect malicious software is based on signature matching. However, signature matching only detects known malicious software. In order to detect unknown malicious software, it is necessary to analyze the software for its impact on the system when the software is executed. In one approach, the software code can be statically analyzed for any malicious patterns. Another approach is to execute the program and determine the nature of the program dynamically. Since the execution of malicious code may have negative impact on the system, the code must be executed in a controlled environment. For that purpose, we have …
Alliances In Graphs: Parameterized Algorithms And On Partitioning Series-Parallel Graphs, Rosa Enciso
Alliances In Graphs: Parameterized Algorithms And On Partitioning Series-Parallel Graphs, Rosa Enciso
Electronic Theses and Dissertations
Alliances are used to denote agreements between members of a group with similar interests. Alliances can occur between nations, biological sequences, business cartels, and other entities. The notion of alliances in graphs was first introduced by Kristiansen, Hedetniemi, and Hedetniemi in . A defensive alliance in a graph G = (V, E) is a non empty set S ⊆ V where, for all x ∈ S, |N[x] ∩ S| ≥ |N[x] − S|. Consequently, every vertex that is a member of a defensive alliance has at least as many vertices defending it as there are vertices attacking it. Alliances can …
Design And Analysis Of Effective Routing And Channel Scheduling For Wavelength Division Multiplexing Optical Networks, Xingbo Gao
Electronic Theses and Dissertations
Optical networking, employing wavelength division multiplexing (WDM), is seen as the technology of the future for the Internet. This dissertation investigates several important problems affecting optical circuit switching (OCS) and optical burst switching (OBS) networks. Novel algorithms and new approaches to improve the performance of these networks through effective routing and channel scheduling are presented. Extensive simulations and analytical modeling have both been used to evaluate the effectiveness of the proposed algorithms in achieving lower blocking probability, better fairness as well as faster switching. The simulation tests were performed over a variety of optical network topologies including the ring and …
Connectionless Approach: A Localized Scheme To Mobile Ad Hoc Networks, Yao Ho
Connectionless Approach: A Localized Scheme To Mobile Ad Hoc Networks, Yao Ho
Electronic Theses and Dissertations
According to a Gartner Group (www.gartner.com) report in September 2008, the worldwide telecommunications market is on pace to reach $2 trillion in 2008. Gartner predicts that by 2012, the ratio of mobile to fixed connections will exceed 4-to-1. The North American mobile data market grew to 141.1 million connections in 2007, with a compound annual growth rate of 41.7 percent. It is believed that a large portion will be ad hoc and multi-hop connections, which will open many opportunities for Mobile Ad hoc NETwork (MANET) applications and Wireless Mesh Network (WMN) applications. A MANET is a self-organizing multi-hop wireless network …
Modeling Scenes And Human Activities In Videos, Arslan Basharat
Modeling Scenes And Human Activities In Videos, Arslan Basharat
Electronic Theses and Dissertations
In this dissertation, we address the problem of understanding human activities in videos by developing a two-pronged approach: coarse level modeling of scene activities and fine level modeling of individual activities. At the coarse level, where the resolution of the video is low, we rely on person tracks. At the fine level, richer features are available to identify different parts of the human body, therefore we rely on the body joint tracks. There are three main goals of this dissertation: (1) identify unusual activities at the coarse level, (2) recognize different activities at the fine level, and (3) predict the …