1) The document presents a method for detecting building damage from very high resolution satellite images using one-class SVM classification and shadow information.
2) Initial building damage is detected using one-class SVM classification on multitemporal images. Shadows are then detected and changes in shadows over time are identified.
3) The initial damage detection results are refined by considering areas of shadow change, removing detections not near shadow changes. This combined method improved damage detection accuracy over using spectral data alone.
This document summarizes an investigation using an RGB-imaging topological radar (RGB-ITR) system to digitally capture and document a 12th century church in Hrastovlje, Slovenia. The RGB-ITR system was able to generate a 3D color digital model of the church's structure and paintings to enable monitoring changes over time and cataloguing the cultural heritage site. The summary captured the purpose, key capabilities of the RGB-ITR system, and one of the first results capturing a church for preservation and monitoring applications.
Depth-Based Real Time Head Motion Tracking Using 3D Template Matching愚 屠
In this work, we propose a system to estimate head poses only using depth information in real-time. An optimization method based on 3D model fitting is developed. We iteratively minimize the distance between source and target point clouds of a user’s head. The method give fully real-time responses (30fps) without the GPU speedup. We adopt a commodity depth sensor named Microsoft Kinect as well as Asus Xtion, and use the depth image as the only input so that our system will not be affected by illumination variations. However, the simplicity of this acquisition device comes at the cost of frequent noises in the acquired data. We demonstrate that 6 degrees of freedom real-time head motion tracking in 3D space can be achieved with such noisy depth data.
Various object detection and tracking methodssujeeshkumarj
This document provides an overview of various object detection and tracking methods. It discusses Scale-Invariant Feature Transform (SIFT) for object detection, which extracts keypoints that are invariant to scale, orientation and illumination changes. It also covers You Only Look Once (YOLO) for real-time object detection using a single neural network, and Histogram of Oriented Gradients (HOG) for human detection. For object tracking, it discusses point tracking using deterministic and statistical methods, kernel tracking using template matching, and silhouette tracking for complex object shapes. Applications mentioned include video surveillance, autonomous vehicles, and human-computer interaction.
X-rays were discovered in 1895 by the German physicist Wilhelm Conrad Röntgen,
who earned the Nobel Prize in Physics in 1901. Although their potential applications
in medical imaging diagnosis were clear from the beginning, the implementation of
the first X-ray computed tomography system was made in 1972 by Godfrey Newbold
Hounsfield (Nobel prize winner in 1979 for Physiology and Medicine), who constructed
the prototype of the first medical CT scanner and is considered the father of computed
tomography. CT was introduced into clinical practice into 1971 with a scan of a cystic
frontal lobe tumor on a patient at Atkinson Morley Hospital in Wimbledon (United
Kingdom). After this, CT was immediately welcomed by the medical community and
has often been referred to as the most important invention in radiological diagnosis, since
the discovery of X-rays [1].
The first applications of CT in an industrial context is traced back to the first 1980´s, in the
field of non destructive testing, where small number of slices of the object were visually
inspected. 3D quantitative industrial CT applications appeared in the later 1990s, with
simple volume and distance analysis [2]. Today, thanks to relevant improvements in both
hardware and software, CT has become a powerful and widely used tool among non
destructive techniques, capable of inspecting external and internal structures (without
destroying them) in many industrial applications. Development of more and more stable
X-ray sources and better detectors led to design of more complex CT system, providing
accurate geometrical information with micrometer accuracy. CT is widely used for
geometrical characterization of test objects, material composition determination, density
variation inspection etc. In a relative short time, CT is capable to produce a complete
three-dimensional model and tolerances of the scanned machined parts can be verified.
Because of the growing interest on precision in production engineering and an increasing
demand for quality control and assurance, CT is leading the field of manufacturing
and coordinate metrology. With respect to traditional techniques, CT systems have indisputable advantages: internal and external geometry can be acquired without
destroying the part, with a density of information much higher than common tactile and
optical coordinate measuring. A key parameter for reliability of the measurement process
is the establishment of measuring uncertainty. Since there are many influence parameters
in CT, uncertainty contributors in CT and standards dealing with quantification of CT
have not been completely established yet. The assessment of the uncertainty budget
becomes a challenge for all researchers
The document discusses object tracking in computer vision. It begins with an introduction and overview of applications of object tracking. It then discusses object representation, detection, tracking algorithms and methodologies. It compares different tracking methods and provides an example of object tracking in MATLAB. Key steps in object tracking include object detection, tracking the detected objects across frames using algorithms like point tracking, kernel tracking and silhouette tracking. Common challenges with object tracking are also summarized.
The document provides an overview of deep learning based object detection models. It discusses early approaches like R-CNN, Fast R-CNN, and Faster R-CNN, as well as more recent single-shot detectors like YOLO, SSD, RetinaNet, and CenterNet. It covers performance metrics like mean average precision (mAP) and compares the speed and accuracy of different models. The document concludes by outlining general guidelines for choosing an object detection model based on priorities like accuracy, speed, model size, and portability.
IRJET- Image Feature Extraction using Hough Transformation PrincipleIRJET Journal
The document describes an image processing technique that uses Hough transformation and contour detection to extract features from images and count objects. It proposes an integrated method to detect circular objects, detach overlapping objects, and count objects of any shape. The method applies Canny edge detection, contour detection, and circular Hough transform to segment overlapping circular objects. It then uses contour detection to count all objects regardless of shape. Experimental results show the method can successfully segment and count overlapping circular and non-circular objects in test images.
1) The document presents a method for detecting building damage from very high resolution satellite images using one-class SVM classification and shadow information.
2) Initial building damage is detected using one-class SVM classification on multitemporal images. Shadows are then detected and changes in shadows over time are identified.
3) The initial damage detection results are refined by considering areas of shadow change, removing detections not near shadow changes. This combined method improved damage detection accuracy over using spectral data alone.
This document summarizes an investigation using an RGB-imaging topological radar (RGB-ITR) system to digitally capture and document a 12th century church in Hrastovlje, Slovenia. The RGB-ITR system was able to generate a 3D color digital model of the church's structure and paintings to enable monitoring changes over time and cataloguing the cultural heritage site. The summary captured the purpose, key capabilities of the RGB-ITR system, and one of the first results capturing a church for preservation and monitoring applications.
Depth-Based Real Time Head Motion Tracking Using 3D Template Matching愚 屠
In this work, we propose a system to estimate head poses only using depth information in real-time. An optimization method based on 3D model fitting is developed. We iteratively minimize the distance between source and target point clouds of a user’s head. The method give fully real-time responses (30fps) without the GPU speedup. We adopt a commodity depth sensor named Microsoft Kinect as well as Asus Xtion, and use the depth image as the only input so that our system will not be affected by illumination variations. However, the simplicity of this acquisition device comes at the cost of frequent noises in the acquired data. We demonstrate that 6 degrees of freedom real-time head motion tracking in 3D space can be achieved with such noisy depth data.
Various object detection and tracking methodssujeeshkumarj
This document provides an overview of various object detection and tracking methods. It discusses Scale-Invariant Feature Transform (SIFT) for object detection, which extracts keypoints that are invariant to scale, orientation and illumination changes. It also covers You Only Look Once (YOLO) for real-time object detection using a single neural network, and Histogram of Oriented Gradients (HOG) for human detection. For object tracking, it discusses point tracking using deterministic and statistical methods, kernel tracking using template matching, and silhouette tracking for complex object shapes. Applications mentioned include video surveillance, autonomous vehicles, and human-computer interaction.
X-rays were discovered in 1895 by the German physicist Wilhelm Conrad Röntgen,
who earned the Nobel Prize in Physics in 1901. Although their potential applications
in medical imaging diagnosis were clear from the beginning, the implementation of
the first X-ray computed tomography system was made in 1972 by Godfrey Newbold
Hounsfield (Nobel prize winner in 1979 for Physiology and Medicine), who constructed
the prototype of the first medical CT scanner and is considered the father of computed
tomography. CT was introduced into clinical practice into 1971 with a scan of a cystic
frontal lobe tumor on a patient at Atkinson Morley Hospital in Wimbledon (United
Kingdom). After this, CT was immediately welcomed by the medical community and
has often been referred to as the most important invention in radiological diagnosis, since
the discovery of X-rays [1].
The first applications of CT in an industrial context is traced back to the first 1980´s, in the
field of non destructive testing, where small number of slices of the object were visually
inspected. 3D quantitative industrial CT applications appeared in the later 1990s, with
simple volume and distance analysis [2]. Today, thanks to relevant improvements in both
hardware and software, CT has become a powerful and widely used tool among non
destructive techniques, capable of inspecting external and internal structures (without
destroying them) in many industrial applications. Development of more and more stable
X-ray sources and better detectors led to design of more complex CT system, providing
accurate geometrical information with micrometer accuracy. CT is widely used for
geometrical characterization of test objects, material composition determination, density
variation inspection etc. In a relative short time, CT is capable to produce a complete
three-dimensional model and tolerances of the scanned machined parts can be verified.
Because of the growing interest on precision in production engineering and an increasing
demand for quality control and assurance, CT is leading the field of manufacturing
and coordinate metrology. With respect to traditional techniques, CT systems have indisputable advantages: internal and external geometry can be acquired without
destroying the part, with a density of information much higher than common tactile and
optical coordinate measuring. A key parameter for reliability of the measurement process
is the establishment of measuring uncertainty. Since there are many influence parameters
in CT, uncertainty contributors in CT and standards dealing with quantification of CT
have not been completely established yet. The assessment of the uncertainty budget
becomes a challenge for all researchers
The document discusses object tracking in computer vision. It begins with an introduction and overview of applications of object tracking. It then discusses object representation, detection, tracking algorithms and methodologies. It compares different tracking methods and provides an example of object tracking in MATLAB. Key steps in object tracking include object detection, tracking the detected objects across frames using algorithms like point tracking, kernel tracking and silhouette tracking. Common challenges with object tracking are also summarized.
The document provides an overview of deep learning based object detection models. It discusses early approaches like R-CNN, Fast R-CNN, and Faster R-CNN, as well as more recent single-shot detectors like YOLO, SSD, RetinaNet, and CenterNet. It covers performance metrics like mean average precision (mAP) and compares the speed and accuracy of different models. The document concludes by outlining general guidelines for choosing an object detection model based on priorities like accuracy, speed, model size, and portability.
IRJET- Image Feature Extraction using Hough Transformation PrincipleIRJET Journal
The document describes an image processing technique that uses Hough transformation and contour detection to extract features from images and count objects. It proposes an integrated method to detect circular objects, detach overlapping objects, and count objects of any shape. The method applies Canny edge detection, contour detection, and circular Hough transform to segment overlapping circular objects. It then uses contour detection to count all objects regardless of shape. Experimental results show the method can successfully segment and count overlapping circular and non-circular objects in test images.
Quick museum artefacts digitization in 3D-ICONS, presented by Sara Gonizzi Ba...3D ICONS Project
Quick museum artefacts digitization in 3D-ICONS, presented by Sara Gonizzi Barsanti, Politecnico Di Milano, Italy during the 3D ICONS workshop at Digital Heritage 2013
People counting in low density video sequences2Ahmed Tememe
The document discusses people counting in low density video sequences. It describes an algorithm for detecting and tracking objects in video to count the number of people. The algorithm involves segmenting foreground objects, tracking objects between frames, detecting heads, and using classifiers to determine the number of people based on features of the segmented blobs. The goal is to automatically count people in video for applications like security and analytics with limited human monitoring.
Currently, in both market and the academic communities have required applications based on image and video processing with several real-time constraints. On the other hand, detection of moving objects is a very important task in mobile robotics and surveillance applications. In order to achieve this, we are using a alternative means for real time motion detection systems. This paper proposes hardware architecture for motion detection based on the background subtraction algorithm, which is implemented on FPGAs (Field Programmable Gate Arrays). For achieving this, the following steps are executed: (a) a background image (in gray-level format) is stored in an external SRAM memory, (b) a low-pass filter is applied to both the stored and current images, (c) a subtraction operation between both images is obtained, and (d) a morphological filter is applied over the resulting image. Afterward, the gravity center of the object is calculated and sent to a PC (via RS-232 interface).
The document provides an overview of object detection methods for nighttime surveillance. It discusses two main approaches: (1) a Contrast Change method that detects objects based on changes in local contrast between frames, and (2) a Salient Contrast Analysis method that improves on the first by adding adaptability using machine learning and feedback from trajectory analysis. Experimental results showed the Salient Contrast Analysis method achieved better detection accuracy and lower tracking errors than the original Contrast Change method.
Object Detection and Tracking using Statistical and Stochastic TechniquesVasuhiSamydurai1
The document discusses object detection and tracking using statistical and stochastic techniques. It describes using mixture of Gaussians for background modeling, principal component analysis for feature extraction, hidden Markov models for object modeling, and Kalman filtering for tracking objects. The proposed method aims to effectively detect and track multiple people in occluded environments and adapt to changes in illumination, color, and outdoor weather conditions. It provides results of tracking single and multiple objects in video frames and compares tracking errors of different methods.
Detection&Tracking - Thermal imaging object detection and trackinghadarpinhas1
The document discusses various methods for detection and tracking of objects using thermal imaging and computer vision techniques. It covers thermal detection which uses infrared cameras, object detection using deep learning approaches and classic computer vision algorithms, and object tracking methods such as template matching, Kalman filters, particle filters, and graph-based tracking. It also discusses challenges with thermal imagery and approaches to improve tracking performance such as fusing thermal and visible images.
This document discusses using extreme ultraviolet (EUV) scatterometry for metrology applications. It provides details on optical scatterometry technology, EUV sources using high harmonic generation, and rigorous coupled wave analysis for profile reconstruction. Preliminary results demonstrate resolving 70nm features using an EUV scatterometer with a table-top high harmonic generation EUV source. Future work aims to refine models and analysis algorithms to characterize smaller features and production devices.
The document describes a mine detection system consisting of three main parts: a robot system, Java application, and image processing. The robot uses a microcontroller and camera to autonomously map an area and detect mines, communicating wirelessly with the server. The Java application provides a user interface and database. Image processing techniques like contouring, segmentation, and optical flow are used for obstacle avoidance and self-alignment of the robot. The overall system uses these three integrated parts to remotely and autonomously detect mines.
3D Acquisition and Modeling in Cultural HeritageGabriele Guidi
Gabriele Guidi is responsible for the “Computer Vision and Reverse Engineering Laboratory” at Politecnico di Milano (Italy). Since the late 1990s, it has focused on 3D acquisition and modeling techniques of cultural heritage artifacts on very small to very large scales. An interesting quality of a polytechnic institution like the one in Milan is to have in its DNA both a technical mind, coming from the Engineering departments, and a humanistic soul, linked to its departments of Architecture and Design. This dual point of view is critical when applying advanced technologies such as 3D data capture, opto-electronics, image processing, metrology and computer graphics to 3D documentation of a cultural artifact in a way that is useful for archaeologists, architects and officers of institutions responsible for the conservation of cultural heritage.
This presentation introduces the research group at Politecnico di Milano and presents an overview of the technological evolution of 3D capturing techniques since 2000. Several major examples of the researches done are shown, as well as how such discoveries have been applied to concrete problems of cultural heritage documentation and visualization. In the conclusion some of the major challenges we intend to confront in the near future are mentioned.
The document describes the system interfaces for an auroral imager payload on the Boston University Student Satellite (BUSAT). The system includes a CCD camera, main processing board, microcontroller, and software console. It captures auroral images with resolutions up to 1391x1039 pixels and processes frames within 1.3-3.8 seconds. The system communicates with the satellite through a 100KHz I2C interface and consumes up to 7W of power. Future plans include further power management and testing under extreme cold temperatures.
Development of wearable object detection system & blind stick for visuall...Arkadev Kundu
It is a wearable device. It has a camera, and it detects all living and non living object. This module detects moving object also. It is made with raspberry pi 3, and a camera. One headphone connect with raspberry pi. When this module detects items, it gave a sound output through headphone. Hence the blind man know that item, which is in-front of him or her. We made it in very low budget, and it is very helpful for visually challenged people. And the Blind stick help him to detect obstacles.
The document proposes improving object detection and recognition capabilities. It discusses challenges with current methods like different object sizes and color variations. The objectives are to build a module that can learn and detect objects without a sliding box or datastore. A high-level design approach is outlined using techniques like contouring, BING, sliding box, and feature selection methods. The design considers optimal feature selection, dimensionality reduction, and classification algorithms to function in real-time.
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...IRJET Journal
This document summarizes a research paper that proposes a new method for detecting moving objects in videos using foreground detection and background subtraction. The key steps of the proposed method include initializing a background model using the median of initial frames, dynamically updating the background model to adapt to lighting changes, subtracting the background model from current frames and applying a threshold to detect moving objects, and using morphological operations and projection analysis to extract human bodies and remove noise. The experimental results showed that the proposed method can accurately and reliably detect moving human bodies in real-time video surveillance.
Object tracking is one of the most important problems in modern visual systems and researches are
continuing their studies in this field. A suitable tracking method should not only be able to recognize and
track the related object in continuous frames, but should also provide a reliable and efficient reaction
against the phenomena disturbing tracking process including performance efficiency in real-time
applications. In this article, an effective mesh-based method is introduced as a suitable tracking method in
continuous frames. Also, its preference and limitation is discussed.
This document presents an adaptive mesh method for object tracking in video frames. The method uses an adaptive mesh structure instead of a uniform mesh, where nodes are selected adaptively between frames based on object movement. This provides more robustness to minor or major occlusions. The method estimates background to be covered and uncovered background regions, applies polygon approximation to model borders, and estimates optical flow for node movement. It was shown to effectively handle challenges in tracking like occlusions while maintaining real-time performance. Some limitations are its complexity and inability to guarantee occlusion of all inter-nodal regions.
Carved visual hulls for image based modelingaftab alam
The document describes a method for 3D reconstruction from images called carved visual hulls. It involves three main steps: (1) identifying rims on the visual hull surface that touch the object, (2) globally optimizing the surface using graph cuts with photoconsistency and rim constraints, and (3) locally refining the surface while enforcing photoconsistency and geometric constraints. The method produces high-quality 3D models but cannot handle overly concave regions. Results on 7 datasets show promising geometric accuracy while balancing computational costs.
This document provides an overview of cone beam computed tomography (CBCT) including its history, components, principles, and applications in dentistry. Some key points:
- CBCT was first introduced in the 1990s and provides 3D imaging with lower radiation dose than medical CT. It works by generating a cone-shaped X-ray beam and using a detector to record attenuation data, which is then reconstructed into 3D images.
- Components include an X-ray generator, image sensor, and software for image reconstruction. Images are stored in DICOM format.
- Advantages include rapid scan time, interactive display modes, and ability to view structures in multiple planes. Disadvantages include potential artifacts and inability to view
Detection of a user-defined object in an image using feature extraction- Trai...IRJET Journal
The document proposes a method for detecting user-defined objects in images using feature extraction and training. The method combines contour detection, edge detection, k-means clustering, color identification, and image segmentation. It uses an original "source" object image to train the system to recognize and identify the target object in other images based on a feature set. The key steps include pre-processing images, extracting features like contours and edges, using k-means clustering to identify colors, and analyzing color and shape features to detect matching objects. The results demonstrate the ability to accurately detect target objects against complex backgrounds.
REGISTRATION TECHNOLOGIES and THEIR CLASSIFICATION IN AUGMENTED REALITY THE K...IJCSEA Journal
The registration in augmented reality is process which merges virtual objects generated by computer with
real world image caught by camera. This paper describes the knowledge-based registration, computer
vision-based registration and tracker-based registration technology. This paper mainly focused on trackerbased registration technology in augmented reality. Also described method in tracker- based technology,
problem and solution.
REGISTRATION TECHNOLOGIES and THEIR CLASSIFICATION IN AUGMENTED REALITY THE K...IJCSEA Journal
The registration in augmented reality is process which merges virtual objects generated by computer with real world image caught by camera. This paper describes the knowledge-based registration, computer vision-based registration and tracker-based registration technology. This paper mainly focused on trackerbased
registration technology in augmented reality. Also described method in tracker- based technology, problem and solution.
Alexey Mikhaylichenko - Automatic Detection of Bone Contours in X-Ray ImagesAIST
This document summarizes an algorithm for automatically segmenting and detecting joints in x-ray images. The algorithm involves several steps: (1) computing an edge map of the image, (2) determining binarization thresholds, (3) thinning edges, (4) binarizing the image, and (5) chaining edges together. The algorithm is compared to the Canny edge detector and is shown to achieve a 74% success rate on joint images. Processing time is improved by implementing a multi-threaded version. Challenges include false edge detection and discontinuities between edge fragments.
Quick museum artefacts digitization in 3D-ICONS, presented by Sara Gonizzi Ba...3D ICONS Project
Quick museum artefacts digitization in 3D-ICONS, presented by Sara Gonizzi Barsanti, Politecnico Di Milano, Italy during the 3D ICONS workshop at Digital Heritage 2013
People counting in low density video sequences2Ahmed Tememe
The document discusses people counting in low density video sequences. It describes an algorithm for detecting and tracking objects in video to count the number of people. The algorithm involves segmenting foreground objects, tracking objects between frames, detecting heads, and using classifiers to determine the number of people based on features of the segmented blobs. The goal is to automatically count people in video for applications like security and analytics with limited human monitoring.
Currently, in both market and the academic communities have required applications based on image and video processing with several real-time constraints. On the other hand, detection of moving objects is a very important task in mobile robotics and surveillance applications. In order to achieve this, we are using a alternative means for real time motion detection systems. This paper proposes hardware architecture for motion detection based on the background subtraction algorithm, which is implemented on FPGAs (Field Programmable Gate Arrays). For achieving this, the following steps are executed: (a) a background image (in gray-level format) is stored in an external SRAM memory, (b) a low-pass filter is applied to both the stored and current images, (c) a subtraction operation between both images is obtained, and (d) a morphological filter is applied over the resulting image. Afterward, the gravity center of the object is calculated and sent to a PC (via RS-232 interface).
The document provides an overview of object detection methods for nighttime surveillance. It discusses two main approaches: (1) a Contrast Change method that detects objects based on changes in local contrast between frames, and (2) a Salient Contrast Analysis method that improves on the first by adding adaptability using machine learning and feedback from trajectory analysis. Experimental results showed the Salient Contrast Analysis method achieved better detection accuracy and lower tracking errors than the original Contrast Change method.
Object Detection and Tracking using Statistical and Stochastic TechniquesVasuhiSamydurai1
The document discusses object detection and tracking using statistical and stochastic techniques. It describes using mixture of Gaussians for background modeling, principal component analysis for feature extraction, hidden Markov models for object modeling, and Kalman filtering for tracking objects. The proposed method aims to effectively detect and track multiple people in occluded environments and adapt to changes in illumination, color, and outdoor weather conditions. It provides results of tracking single and multiple objects in video frames and compares tracking errors of different methods.
Detection&Tracking - Thermal imaging object detection and trackinghadarpinhas1
The document discusses various methods for detection and tracking of objects using thermal imaging and computer vision techniques. It covers thermal detection which uses infrared cameras, object detection using deep learning approaches and classic computer vision algorithms, and object tracking methods such as template matching, Kalman filters, particle filters, and graph-based tracking. It also discusses challenges with thermal imagery and approaches to improve tracking performance such as fusing thermal and visible images.
This document discusses using extreme ultraviolet (EUV) scatterometry for metrology applications. It provides details on optical scatterometry technology, EUV sources using high harmonic generation, and rigorous coupled wave analysis for profile reconstruction. Preliminary results demonstrate resolving 70nm features using an EUV scatterometer with a table-top high harmonic generation EUV source. Future work aims to refine models and analysis algorithms to characterize smaller features and production devices.
The document describes a mine detection system consisting of three main parts: a robot system, Java application, and image processing. The robot uses a microcontroller and camera to autonomously map an area and detect mines, communicating wirelessly with the server. The Java application provides a user interface and database. Image processing techniques like contouring, segmentation, and optical flow are used for obstacle avoidance and self-alignment of the robot. The overall system uses these three integrated parts to remotely and autonomously detect mines.
3D Acquisition and Modeling in Cultural HeritageGabriele Guidi
Gabriele Guidi is responsible for the “Computer Vision and Reverse Engineering Laboratory” at Politecnico di Milano (Italy). Since the late 1990s, it has focused on 3D acquisition and modeling techniques of cultural heritage artifacts on very small to very large scales. An interesting quality of a polytechnic institution like the one in Milan is to have in its DNA both a technical mind, coming from the Engineering departments, and a humanistic soul, linked to its departments of Architecture and Design. This dual point of view is critical when applying advanced technologies such as 3D data capture, opto-electronics, image processing, metrology and computer graphics to 3D documentation of a cultural artifact in a way that is useful for archaeologists, architects and officers of institutions responsible for the conservation of cultural heritage.
This presentation introduces the research group at Politecnico di Milano and presents an overview of the technological evolution of 3D capturing techniques since 2000. Several major examples of the researches done are shown, as well as how such discoveries have been applied to concrete problems of cultural heritage documentation and visualization. In the conclusion some of the major challenges we intend to confront in the near future are mentioned.
The document describes the system interfaces for an auroral imager payload on the Boston University Student Satellite (BUSAT). The system includes a CCD camera, main processing board, microcontroller, and software console. It captures auroral images with resolutions up to 1391x1039 pixels and processes frames within 1.3-3.8 seconds. The system communicates with the satellite through a 100KHz I2C interface and consumes up to 7W of power. Future plans include further power management and testing under extreme cold temperatures.
Development of wearable object detection system & blind stick for visuall...Arkadev Kundu
It is a wearable device. It has a camera, and it detects all living and non living object. This module detects moving object also. It is made with raspberry pi 3, and a camera. One headphone connect with raspberry pi. When this module detects items, it gave a sound output through headphone. Hence the blind man know that item, which is in-front of him or her. We made it in very low budget, and it is very helpful for visually challenged people. And the Blind stick help him to detect obstacles.
The document proposes improving object detection and recognition capabilities. It discusses challenges with current methods like different object sizes and color variations. The objectives are to build a module that can learn and detect objects without a sliding box or datastore. A high-level design approach is outlined using techniques like contouring, BING, sliding box, and feature selection methods. The design considers optimal feature selection, dimensionality reduction, and classification algorithms to function in real-time.
IRJET- Moving Object Detection using Foreground Detection for Video Surveil...IRJET Journal
This document summarizes a research paper that proposes a new method for detecting moving objects in videos using foreground detection and background subtraction. The key steps of the proposed method include initializing a background model using the median of initial frames, dynamically updating the background model to adapt to lighting changes, subtracting the background model from current frames and applying a threshold to detect moving objects, and using morphological operations and projection analysis to extract human bodies and remove noise. The experimental results showed that the proposed method can accurately and reliably detect moving human bodies in real-time video surveillance.
Object tracking is one of the most important problems in modern visual systems and researches are
continuing their studies in this field. A suitable tracking method should not only be able to recognize and
track the related object in continuous frames, but should also provide a reliable and efficient reaction
against the phenomena disturbing tracking process including performance efficiency in real-time
applications. In this article, an effective mesh-based method is introduced as a suitable tracking method in
continuous frames. Also, its preference and limitation is discussed.
This document presents an adaptive mesh method for object tracking in video frames. The method uses an adaptive mesh structure instead of a uniform mesh, where nodes are selected adaptively between frames based on object movement. This provides more robustness to minor or major occlusions. The method estimates background to be covered and uncovered background regions, applies polygon approximation to model borders, and estimates optical flow for node movement. It was shown to effectively handle challenges in tracking like occlusions while maintaining real-time performance. Some limitations are its complexity and inability to guarantee occlusion of all inter-nodal regions.
Carved visual hulls for image based modelingaftab alam
The document describes a method for 3D reconstruction from images called carved visual hulls. It involves three main steps: (1) identifying rims on the visual hull surface that touch the object, (2) globally optimizing the surface using graph cuts with photoconsistency and rim constraints, and (3) locally refining the surface while enforcing photoconsistency and geometric constraints. The method produces high-quality 3D models but cannot handle overly concave regions. Results on 7 datasets show promising geometric accuracy while balancing computational costs.
This document provides an overview of cone beam computed tomography (CBCT) including its history, components, principles, and applications in dentistry. Some key points:
- CBCT was first introduced in the 1990s and provides 3D imaging with lower radiation dose than medical CT. It works by generating a cone-shaped X-ray beam and using a detector to record attenuation data, which is then reconstructed into 3D images.
- Components include an X-ray generator, image sensor, and software for image reconstruction. Images are stored in DICOM format.
- Advantages include rapid scan time, interactive display modes, and ability to view structures in multiple planes. Disadvantages include potential artifacts and inability to view
Detection of a user-defined object in an image using feature extraction- Trai...IRJET Journal
The document proposes a method for detecting user-defined objects in images using feature extraction and training. The method combines contour detection, edge detection, k-means clustering, color identification, and image segmentation. It uses an original "source" object image to train the system to recognize and identify the target object in other images based on a feature set. The key steps include pre-processing images, extracting features like contours and edges, using k-means clustering to identify colors, and analyzing color and shape features to detect matching objects. The results demonstrate the ability to accurately detect target objects against complex backgrounds.
REGISTRATION TECHNOLOGIES and THEIR CLASSIFICATION IN AUGMENTED REALITY THE K...IJCSEA Journal
The registration in augmented reality is process which merges virtual objects generated by computer with
real world image caught by camera. This paper describes the knowledge-based registration, computer
vision-based registration and tracker-based registration technology. This paper mainly focused on trackerbased registration technology in augmented reality. Also described method in tracker- based technology,
problem and solution.
REGISTRATION TECHNOLOGIES and THEIR CLASSIFICATION IN AUGMENTED REALITY THE K...IJCSEA Journal
The registration in augmented reality is process which merges virtual objects generated by computer with real world image caught by camera. This paper describes the knowledge-based registration, computer vision-based registration and tracker-based registration technology. This paper mainly focused on trackerbased
registration technology in augmented reality. Also described method in tracker- based technology, problem and solution.
Similar to Artem Kruglov and Yurii Chiryshev - Detection and Tracking of the Objects in Real Time Applied to the Problem of the Log Volume Estimation (20)
Alexey Mikhaylichenko - Automatic Detection of Bone Contours in X-Ray ImagesAIST
This document summarizes an algorithm for automatically segmenting and detecting joints in x-ray images. The algorithm involves several steps: (1) computing an edge map of the image, (2) determining binarization thresholds, (3) thinning edges, (4) binarizing the image, and (5) chaining edges together. The algorithm is compared to the Canny edge detector and is shown to achieve a 74% success rate on joint images. Processing time is improved by implementing a multi-threaded version. Challenges include false edge detection and discontinuities between edge fragments.
Евгений Цымбалов, Webgames - Методы машинного обучения для задач игровой анал...AIST
ML is helping a large Russian game developer and publisher called WebGames analyze data from their free-to-play games. They collect over 80 million records daily from their 400k daily players across various platforms. They use ML for tasks like churn prediction, revenue prediction, user classification, A/B testing, balance, and recommendations. Specifically, they build 30 different models to predict LTV for users based on their behavior in the first 30 days. They also use kNN and cohort-based approaches for user classification and Bayesian A/B testing to dynamically adjust testing over time. Rule-based modeling and midgame support based on classification help balance games. Content recommendations are done through static and dynamic clustering.
Александр Москвичев, EveResearch - Алгоритмы анализа данных в маркетинговых и...AIST
The document discusses various economic models related to utility and consumer choice. It introduces concepts like cardinal and ordinal utility and discusses modeling utility as a probability of success. It also discusses simple models of consumer choice that involve choosing a product based on type and brand or type and price. Additionally, it discusses models where neighbors' choices or prices can influence individual choices and mentions discounts and bundles. Graphs are shown comparing product turnover before and after implementing a neighbors effect model.
1) Exactpro is a specialist QA firm focused on testing financial systems that was acquired by the London Stock Exchange Group in 2015.
2) The London Stock Exchange Group is a leading international exchange group that traces its history back to 1698 and has over 5,500 employees.
3) Exactpro uses automated testing tools like Sailfish and ClearTH to test systems, as well as techniques like formal verification, crowd-sourced testing, and machine learning.
Nikolay Karpov - Evolvable Semantic Platform for Facilitating Knowledge ExchangeAIST
This document describes an evolvable semantic platform called EXPERTIZE that was developed to facilitate knowledge exchange between experts at a university. EXPERTIZE analyzes unstructured text from news and matches it to the skills of university experts, as defined in their personal ontologies, in order to recommend relevant experts. It uses a latent Dirichlet allocation algorithm to perform the semantic matching. The system was implemented and evaluated, showing its ability to successfully recommend experts and categories for news items.
George Moiseev - Classification of E-commerce Websites by Product CategoriesAIST
This document describes a study that classified e-commerce websites by the products they sell. It discusses preprocessing web pages, extracting features using TF-IDF with additional weighting for tags, and classifying pages using a support vector machine. The results show that considering information from other pages in addition to the main page improved classification accuracy, with an average F-score of 0.81 for product type classification when using all page information with the tag weighting.
Elena Bruches - The Hybrid Approach to Part-of-Speech DisambiguationAIST
The document describes a hybrid approach to part-of-speech disambiguation that combines neural networks and manually crafted rules. The algorithm uses neural networks to generate a set of possible part-of-speech tags for each word, and rule-based tagging to generate another set. The final set of tags is the intersection of these two sets, or their union if the intersection is empty. The approach achieved 96.11% precision on one corpus and 86.39% precision on another larger corpus.
Marina Danshina - The methodology of automated decryption of znamenny chantsAIST
1. The researchers created an automated system called "Computer Semiography" to decode Znamenny chants. The system consists of 5 modules: inputting chants into a database, reviewing manuscripts, forming linguistic and translation models, decoding chants, and a music editor.
2. The system can decode chants using either linear or Znamenny notation by applying rules from dictionaries and books. Researchers first build dictionaries from sources then use them to transform manuscripts into a linear notation.
3. The methodology allows producing three main components for decoding chants: a dictionary with translation rules, a translated manuscript version, and language and translation models. The work developed software to input, edit, and view chants in the database
Edward Klyshinsky - The Corpus of Syntactic Co-occurences: the First GlanceAIST
The document discusses the Corpus of Syntactic Co-occurrences, which aims to provide a corpus for students learning Russian that contains correct word combinations. It notes existing corpora like the Russian National Corpus are too large and technical for beginners. The CoSyCo extracts unambiguous syntactic phrases from Russian texts that could help learners. It uses various news and technical texts totaling over 15 billion words. Examples of extracted phrases are provided. The CoSyCo site is mentioned and future plans outlined, such as enlarging the phrase list, filtering repeats and strange combinations, improving the design, and making the co-occurrence database clearer.
Galina Lavrentyeva - Anti-spoofing Methods for Automatic Speaker Verification...AIST
This document discusses anti-spoofing methods for automatic speaker verification systems. It summarizes various spoofing methods like replay attacks, voice conversion, and text-to-speech synthesis that attempt to manipulate biometric systems. The document then outlines the ASVspoof 2015 challenge on spoofing detection and the system submitted by the authors that achieved 2nd place. It details the authors' system including front-end preprocessing, feature extraction using magnitude, phase and high-level features, and back-end classifiers like SVM and neural networks. The system fused multiple feature types to achieve robust spoofing detection.
Oleksandr Frei and Murat Apishev - Parallel Non-blocking Deterministic Algori...AIST
This document describes parallel algorithms for topic modeling, including synchronous, asynchronous, and deterministic asynchronous algorithms. The synchronous offline algorithm splits the document collection into batches and has each thread process one batch at a time. The asynchronous online algorithm has processor threads process batches concurrently while a merger thread accumulates and merges results to recalculate model parameters. To make the algorithm deterministic, the deterministic asynchronous approach has each thread process batches and write results directly without a merger thread.
Kaytoue Mehdi - Finding duplicate labels in behavioral data: an application f...AIST
The document discusses identifying duplicate labels, or aliases, in behavioral data from e-sports games. It presents a method to analyze confusion matrices from predictive models to identify pairs of labels that concentrate confusion, indicating they may belong to the same player using different aliases. The method extracts fuzzy concepts from the confusion matrix and scores candidate pairs based on their cosine similarity to rank and filter the most likely alias pairs. Experimental settings on real e-sports datasets are also discussed.
Valeri Labunets - The bichromatic excitable Schrodinger metamediumAIST
This document describes research into modeling wave phenomena like particle motion and interference using a cellular automata approach called an excitable metamedium. It can simulate the Schrodinger equation by representing diffusion as complex numbers across cells. The researchers extended this to use triplet "color" numbers for diffusion coefficients, allowing visualization of properties like hue, saturation and lightness. Experiments demonstrated particle motion, interference and blending effects using different color diffusion values. Unusual geometries were also explored by changing the definition of the imaginary unit, affecting the behavior of color wave propagation in interesting ways.
Valeri Labunets - Fast multiparametric wavelet transforms and packets for ima...AIST
This document discusses multiparametric wavelet transforms (WDT). It describes the structure of WDT, which is characterized by two sets of coefficients (h-coefficients and g-coefficients) related by a matrix equation. It also discusses arbitrary cyclic wavelet transforms (AWT) and their representation using Jacobi-Givens rotations and stairs-like structures. An example of an 8-level AWT is presented using these concepts.
Alexander Karkishchenko - Threefold Symmetry Detection in Hexagonal Images Ba...AIST
This document discusses a method for detecting threefold symmetry in hexagonal images using finite Eisenstein fields. It begins with an introduction to symmetry detection and issues that arise when applying existing continuous techniques to digital images. It then describes finite Eisenstein fields, which are constructed as finite fields analogous to the complex integers. Elements of these fields correspond naturally to hexagons, allowing hexagonal images to be represented as functions over the fields. Polar coordinate transformations are introduced to represent field elements in exponential form, enabling the transfer of continuous symmetry detection methods to digital hexagonal images. In summary, the document proposes a novel approach for symmetry detection in hexagonal images based on the algebraic structure of finite Eisenstein fields.
Artyom Makovetskii - An Efficient Algorithm for Total Variation DenoisingAIST
This document summarizes a research paper that analyzes the total variation denoising algorithm. It presents the following key points:
1. The total variation denoising model aims to minimize the sum of a fidelity term measuring noise and a regularization term measuring total variation.
2. The solution space can be reduced from bounded variation functions to piecewise constant functions on a given partition.
3. Explicit solutions are described for small values of the regularization parameter λ using Strong-Chan formulas, and these solutions are used to iteratively reduce the problem size and λ value.
4. The properties of extremal functions are proved, including uniqueness and behavior at discontinuity points depending on the sign of neighboring
Codeless Generative AI Pipelines
(GenAI with Milvus)
https://ml.dssconf.pl/user.html#!/lecture/DSSML24-041a/rate
Discover the potential of real-time streaming in the context of GenAI as we delve into the intricacies of Apache NiFi and its capabilities. Learn how this tool can significantly simplify the data engineering workflow for GenAI applications, allowing you to focus on the creative aspects rather than the technical complexities. I will guide you through practical examples and use cases, showing the impact of automation on prompt building. From data ingestion to transformation and delivery, witness how Apache NiFi streamlines the entire pipeline, ensuring a smooth and hassle-free experience.
Timothy Spann
https://www.youtube.com/@FLaNK-Stack
https://medium.com/@tspann
https://www.datainmotion.dev/
milvus, unstructured data, vector database, zilliz, cloud, vectors, python, deep learning, generative ai, genai, nifi, kafka, flink, streaming, iot, edge
4th Modern Marketing Reckoner by MMA Global India & Group M: 60+ experts on W...Social Samosa
The Modern Marketing Reckoner (MMR) is a comprehensive resource packed with POVs from 60+ industry leaders on how AI is transforming the 4 key pillars of marketing – product, place, price and promotions.
Global Situational Awareness of A.I. and where its headedvikram sood
You can see the future first in San Francisco.
Over the past year, the talk of the town has shifted from $10 billion compute clusters to $100 billion clusters to trillion-dollar clusters. Every six months another zero is added to the boardroom plans. Behind the scenes, there’s a fierce scramble to secure every power contract still available for the rest of the decade, every voltage transformer that can possibly be procured. American big business is gearing up to pour trillions of dollars into a long-unseen mobilization of American industrial might. By the end of the decade, American electricity production will have grown tens of percent; from the shale fields of Pennsylvania to the solar farms of Nevada, hundreds of millions of GPUs will hum.
The AGI race has begun. We are building machines that can think and reason. By 2025/26, these machines will outpace college graduates. By the end of the decade, they will be smarter than you or I; we will have superintelligence, in the true sense of the word. Along the way, national security forces not seen in half a century will be un-leashed, and before long, The Project will be on. If we’re lucky, we’ll be in an all-out race with the CCP; if we’re unlucky, an all-out war.
Everyone is now talking about AI, but few have the faintest glimmer of what is about to hit them. Nvidia analysts still think 2024 might be close to the peak. Mainstream pundits are stuck on the wilful blindness of “it’s just predicting the next word”. They see only hype and business-as-usual; at most they entertain another internet-scale technological change.
Before long, the world will wake up. But right now, there are perhaps a few hundred people, most of them in San Francisco and the AI labs, that have situational awareness. Through whatever peculiar forces of fate, I have found myself amongst them. A few years ago, these people were derided as crazy—but they trusted the trendlines, which allowed them to correctly predict the AI advances of the past few years. Whether these people are also right about the next few years remains to be seen. But these are very smart people—the smartest people I have ever met—and they are the ones building this technology. Perhaps they will be an odd footnote in history, or perhaps they will go down in history like Szilard and Oppenheimer and Teller. If they are seeing the future even close to correctly, we are in for a wild ride.
Let me tell you what we see.
Learn SQL from basic queries to Advance queriesmanishkhaire30
Dive into the world of data analysis with our comprehensive guide on mastering SQL! This presentation offers a practical approach to learning SQL, focusing on real-world applications and hands-on practice. Whether you're a beginner or looking to sharpen your skills, this guide provides the tools you need to extract, analyze, and interpret data effectively.
Key Highlights:
Foundations of SQL: Understand the basics of SQL, including data retrieval, filtering, and aggregation.
Advanced Queries: Learn to craft complex queries to uncover deep insights from your data.
Data Trends and Patterns: Discover how to identify and interpret trends and patterns in your datasets.
Practical Examples: Follow step-by-step examples to apply SQL techniques in real-world scenarios.
Actionable Insights: Gain the skills to derive actionable insights that drive informed decision-making.
Join us on this journey to enhance your data analysis capabilities and unlock the full potential of SQL. Perfect for data enthusiasts, analysts, and anyone eager to harness the power of data!
#DataAnalysis #SQL #LearningSQL #DataInsights #DataScience #Analytics
The Ipsos - AI - Monitor 2024 Report.pdfSocial Samosa
According to Ipsos AI Monitor's 2024 report, 65% Indians said that products and services using AI have profoundly changed their daily life in the past 3-5 years.
Analysis insight about a Flyball dog competition team's performanceroli9797
Insight of my analysis about a Flyball dog competition team's last year performance. Find more: https://github.com/rolandnagy-ds/flyball_race_analysis/tree/main
Orchestrating the Future: Navigating Today's Data Workflow Challenges with Ai...Kaxil Naik
Navigating today's data landscape isn't just about managing workflows; it's about strategically propelling your business forward. Apache Airflow has stood out as the benchmark in this arena, driving data orchestration forward since its early days. As we dive into the complexities of our current data-rich environment, where the sheer volume of information and its timely, accurate processing are crucial for AI and ML applications, the role of Airflow has never been more critical.
In my journey as the Senior Engineering Director and a pivotal member of Apache Airflow's Project Management Committee (PMC), I've witnessed Airflow transform data handling, making agility and insight the norm in an ever-evolving digital space. At Astronomer, our collaboration with leading AI & ML teams worldwide has not only tested but also proven Airflow's mettle in delivering data reliably and efficiently—data that now powers not just insights but core business functions.
This session is a deep dive into the essence of Airflow's success. We'll trace its evolution from a budding project to the backbone of data orchestration it is today, constantly adapting to meet the next wave of data challenges, including those brought on by Generative AI. It's this forward-thinking adaptability that keeps Airflow at the forefront of innovation, ready for whatever comes next.
The ever-growing demands of AI and ML applications have ushered in an era where sophisticated data management isn't a luxury—it's a necessity. Airflow's innate flexibility and scalability are what makes it indispensable in managing the intricate workflows of today, especially those involving Large Language Models (LLMs).
This talk isn't just a rundown of Airflow's features; it's about harnessing these capabilities to turn your data workflows into a strategic asset. Together, we'll explore how Airflow remains at the cutting edge of data orchestration, ensuring your organization is not just keeping pace but setting the pace in a data-driven future.
Session in https://budapestdata.hu/2024/04/kaxil-naik-astronomer-io/ | https://dataml24.sessionize.com/session/667627
Predictably Improve Your B2B Tech Company's Performance by Leveraging DataKiwi Creative
Harness the power of AI-backed reports, benchmarking and data analysis to predict trends and detect anomalies in your marketing efforts.
Peter Caputa, CEO at Databox, reveals how you can discover the strategies and tools to increase your growth rate (and margins!).
From metrics to track to data habits to pick up, enhance your reporting for powerful insights to improve your B2B tech company's marketing.
- - -
This is the webinar recording from the June 2024 HubSpot User Group (HUG) for B2B Technology USA.
Watch the video recording at https://youtu.be/5vjwGfPN9lw
Sign up for future HUG events at https://events.hubspot.com/b2b-technology-usa/
STATATHON: Unleashing the Power of Statistics in a 48-Hour Knowledge Extravag...sameer shah
"Join us for STATATHON, a dynamic 2-day event dedicated to exploring statistical knowledge and its real-world applications. From theory to practice, participants engage in intensive learning sessions, workshops, and challenges, fostering a deeper understanding of statistical methodologies and their significance in various fields."
Artem Kruglov and Yurii Chiryshev - Detection and Tracking of the Objects in Real Time Applied to the Problem of the Log Volume Estimation
1. DETECTION AND TRACKING OBJECTS IN
REAL TIME APPLIED TO THE PROBLEM OF
ROUNDWOOD ESTIMATION
Artem Kruglov, Yuriy Chiryshev1
1Ural federal university named after the first President of Russia B.N.Yeltsin
2. Preamble
The system for roundwood geometry evaluation on the
basis of machine vision allows to:
• Automate the process of the roundwood scanning and
sorting,
• Reduce an error as compared to the systems based on a
laser scanning and photocell
• Fulfill an external asessment of the quality and type of
wood
AIST 2016
3. Equipment
Parameter Comments
material steel
Height, min..max 1623-2400 mm
Width, min..max 1820-2200 mm
Weight 63 kg.
camera
2x Busler acA1600-
20mc
Lighting system
6 impulse projectors,
synchronized, remote
control
AIST 2016
4. Problems
• logs detection should be carried out in real time, which
imposes much tighter restrictions than the methods of
selecting objects on the static images:
• Two digital cameras, 20 frames per second
• Maximum processing time for each frame ~ 20 ms.
• one log is observed in a series of consecutive images, so
it is necessary to track the logs between frames in
conjunction with the detection;
• high price of an error
AIST 2016
5. Background model formation
AIST 2016
• algorithm is able to detect the
movement of shadows;
• automatic adjustment to the
periodic motions existing on the
video after a certain period of time;
• algorithm is able to reflect the slow
changes of illumination.
Nonsingular normal distribution is
calculated for each background pixel
, , ,1
, ,
K
t i t t i t i ti
P
6. Object detection
• Implementation of morphological operations to remove
noise
• Small foreground objects and shadows are excluded from
the processing
• Connected components are combined into the blob
bounded by rectangle
AIST 2016
7. Matching sequential frames
• Comparison with the objects from the previous frame:
• definite correspondence between objects was found
• correspondence to the several objects of the previous frame was
found
• no correspondence was found
• Each detected object has two attributes:
• age (number of frames when object was observed)
• identity (serial number of the detected object )
AIST 2016
8. Object tracking
• Bayesian approach used to track the object and include
the priory and conditional probabilities of the events
during object movement:
• H1: log outside of the measuring zone;
• H2: log entering the measuring zone;
• H3: log inside of the measuring zone;
• H4: log leaving the measuring zone.
• Two criteria are considered:
• distance between the object and the zone a few frames back;
• distance between the object and the zone at the moment.
AIST 2016
9. Measuring zone
AIST 2016
• Measuring zone – area in the centre of the image where
object’s geometry could be properly measured.
• The object considered as a log passed through the measuring
system if it is associated with the following sequence of events:
1) The subject has entered the zone from top/bottom.
2) The subject has been inside the zone for a long time.
3) The object has left out the zone from the bottom/top.
10. Matching the parallel frames
Each log must has the one-to-one correspondence of its
image from the first camera to the equal image from the
second camera.
Assignment problem: the sum of the Euclidean distances
between the pair of beams of two synchronized frames
is minimized
AIST 2016
,C u f u
11. Further steps
The further analysis of the log geometry includes the
following steps:
1. Detecting the specific points in the image (Harris detector)
2. Formation the descriptors of specific points (binary descriptor
ORB)
AIST 2016
12. Further steps
3. Matching the descriptors (hierarchical algorithm of optical flow)
4. Filtering (RANSAC method)
AIST 2016
13. Conclusion
• The proposed module including algorithms for
determining the geometric parameters of logs was carried
out in MS Visual C ++ framework.
• The performance of module on the computer Intel Core i7,
2800 Mhz allows to process a video sequence with a
frequency of 20 frames per second.
• The system for roundwood geometry evaluation will be
tested in logging enterprise in July, 2016.
AIST 2016