Semantic mapping of road scenes, PhD thesis. The main aim of the thesis is to investigate and propose solutions to the scene understanding problem of finding 'what' objects are present in the world and 'where' are they located.
Intellectual property, traceability and the counterfeiting of 3D printable objects
3D Robust Blind Watermarking : A tool for 3D copyrighted printing?
Benoit Macq and Patrice Rondão Alface - ICL-ICTEAM
A Three-Dimensional Representation method for Noisy Point Clouds based on Gro...Sergio Orts-Escolano
Slides used for the thesis defense of the PhD candidate Sergio Orts-Escolano.
The research described in this thesis was motivated by the need of a robust model capable of representing 3D data obtained with 3D sensors, which are inherently noisy. In addition, time constraints have to be considered as these sensors are capable of providing a 3D data stream in real time.This thesis proposed the use of Self-Organizing Maps (SOMs) as a 3D representation model. In particular, we proposed the use of the Growing Neural Gas (GNG) network, which has been successfully used for clustering, pattern recognition and topology representation of multi-dimensional data. Until now, Self-Organizing Maps have been primarily computed offline and their application in 3D data has mainly focused on free noise models, without considering time constraints. It is proposed a hardware implementation leveraging the computing power of modern GPUs, which takes advantage of a new paradigm coined as General-Purpose Computing on Graphics Processing Units (GPGPU). The proposed methods were applied to different problems and applications in the area of computer vision such as the recognition and localization of objects, visual surveillance or 3D reconstruction.
Build Your Own 3D Scanner:
Conclusion
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
Build Your Own 3D Scanner: 3D Scanning with Swept-PlanesDouglas Lanman
Build Your Own 3D Scanner:
3D Scanning with Swept-Planes
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
Coastal erosion management using image processing and Node Oriented Programming AbdAllah Aly
Presentation of my Thesis with the title "Coastal erosion management using image processing and Node Oriented Programming" for achieving my Masters Degree in Computer and Automation Engineering from Siena University, Italy.
Semantic mapping of road scenes, PhD thesis. The main aim of the thesis is to investigate and propose solutions to the scene understanding problem of finding 'what' objects are present in the world and 'where' are they located.
Intellectual property, traceability and the counterfeiting of 3D printable objects
3D Robust Blind Watermarking : A tool for 3D copyrighted printing?
Benoit Macq and Patrice Rondão Alface - ICL-ICTEAM
A Three-Dimensional Representation method for Noisy Point Clouds based on Gro...Sergio Orts-Escolano
Slides used for the thesis defense of the PhD candidate Sergio Orts-Escolano.
The research described in this thesis was motivated by the need of a robust model capable of representing 3D data obtained with 3D sensors, which are inherently noisy. In addition, time constraints have to be considered as these sensors are capable of providing a 3D data stream in real time.This thesis proposed the use of Self-Organizing Maps (SOMs) as a 3D representation model. In particular, we proposed the use of the Growing Neural Gas (GNG) network, which has been successfully used for clustering, pattern recognition and topology representation of multi-dimensional data. Until now, Self-Organizing Maps have been primarily computed offline and their application in 3D data has mainly focused on free noise models, without considering time constraints. It is proposed a hardware implementation leveraging the computing power of modern GPUs, which takes advantage of a new paradigm coined as General-Purpose Computing on Graphics Processing Units (GPGPU). The proposed methods were applied to different problems and applications in the area of computer vision such as the recognition and localization of objects, visual surveillance or 3D reconstruction.
Build Your Own 3D Scanner:
Conclusion
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
Build Your Own 3D Scanner: 3D Scanning with Swept-PlanesDouglas Lanman
Build Your Own 3D Scanner:
3D Scanning with Swept-Planes
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
Coastal erosion management using image processing and Node Oriented Programming AbdAllah Aly
Presentation of my Thesis with the title "Coastal erosion management using image processing and Node Oriented Programming" for achieving my Masters Degree in Computer and Automation Engineering from Siena University, Italy.
Build Your Own 3D Scanner: 3D Scanning with Structured LightingDouglas Lanman
Build Your Own 3D Scanner:
3D Scanning with Structured Lighting
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
Build Your Own 3D Scanner: The Mathematics of 3D TriangulationDouglas Lanman
Build Your Own 3D Scanner:
The Mathematics of 3D Triangulation
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
A new approach of edge detection in sar images using region based active cont...eSAT Journals
Abstract This paper presents a new methodology for the edge detection of complex radar images. The approach includes the edge improvisation algorithm and followed with edge detection. The nature of complex radar images made edge enhancement part before the edge detection as the data is highly heterogeneous in nature. Thus, the use of discrete wavelet transform in the edge improvisation algorithm is justified. Then region based active contour model is used as edge detection algorithm. The paper proposes the distribution fitting energy with a level set function and neighborhood means and variances as variables. The performance is tested by applying it on different images and the results are been analyzed. Keywords: Edge detection, Edge improvisation, Synthetic Aperture radar (SAR), wavelet transforms.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
DimEye Corp Presents Revolutionary VLS (Video Laser Scan) at SS IMMR 2013Patrick Raymond
DimEye Corp. Introduces the Revolutionary VLS (Video Laser Scan) to the Subsea Survey IMMR audience in Galveston Texas (November 2013).
VLS™ (Video Laser Scan) by DimEye Corp. is a revolution in Optical 3D Measurement. VLS Provides High Definition Visual Inspection, As-Built 3D Modeling of Industrial/Subsea Equipment, 3D High Density Mapping of Deformations and Defects (for example: Cracks, Dents, Bulges, Corrosion)
VLS™ is a unique combination of photogrammetry and Laser Techniques which provides the Advantages of both technologies without the disadvantages. VLS™ can also be operated by your existing technicians.
VLS™ is a High Accuracy Metrology Tool Linked to NIST (National Industry of Standards and Technology) that provides High Redundancy through volume of data collected (1000s of stills can be captured from HD video in seconds rather than individual photos taken manually at each location). VLS™ provides Reliable Accuracy Estimates (thanks to advanced processing and calibration algorithms developed by DimEye after years of industry experience in multiple measurement environments and scenarios).
Two Dimensional Image Reconstruction Algorithmsmastersrihari
Convolution Back-Projection (CBP) Algorithm was used for the reconstruction of the image. The performance was compared by implementing the algorithm by using RAM- LAK filter, Shepp- Logan filter and also No filter being used.
ideo surveillance is becoming more and more important forsocial security, law enforcement, social
order,military, and other social problems. In order to manage parking information effectively, this vehicle
detection method is presented. In general, motion detection plays an important role in video surveillance
systems. In this paper, firstly this system uses ViBe method to extract the foreground object, then extracts
HOG features on the performance of the ROI of images. At last this paper presents Support vector machine
for vehicle recognition. The results of this test show that, the r
Build Your Own 3D Scanner:
Introduction
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
Computational Displays in 4D, 6D, 8D
We have explored how light propagates from thin elements into a volume for viewing for both automultiscopic displays and holograms. In particular, devices that are typically connected with geometric optics, like parallax barriers, differ in treatment from those that obey physical optics, like holograms. However, the two concepts are often used to achieve the same effect of capturing or displaying a combination of spatial and angular information. Our work connects the two approaches under a general framework based in ray space, from which insights into applications and limitations of both parallax-based and holography-based systems are observed.
Both parallax barrier systems and the practical holographic displays are limited in that they only provide horizontal parallax. Mathematically, this is equivalent to saying that they can always be expressed as a rank-1 matrix (i.e, a matrix in which all the columns are linearly related). Knowledge of this mathematical limitation has helped us to explore the space of possibilities and extend the capabilities of current display types. In particular, we have designed a display that uses two LCD panels, and an optimisation algorithm, to produce a content-adaptive automultiscopic display (SIGGRAPH Asia 2010).
(Joint work with R Horstmeyer, Se Baek Oh, George Barbastathis, Doug Lanman, Matt Hirsch and Yunhee Kim) http://cameraculture.media.mit.edu
In other work we have developed a 6D optical system that responds to changes in viewpoint as well as changes in surrounding light. Our lenticular array alignment allows us to achieve such a system as a passive setup, omitting the need for electrical components. Unlike traditional 2D flat displays, our 6D displays discretize the incident light field and modulate 2D patterns in order to produce super-realistic (2D) images. By casting light at variable intensities and angles onto our 6D displays, we can produce multiple images as well as store greater information capacity on a single 2D film (SIGGRAPH 2008).
Ramesh Raskar joined the Media Lab from Mitsubishi Electric Research Laboratories in 2008 as head of the Lab’s Camera Culture research group. His research interests span the fields of computational photography, inverse problems in imaging and human-computer interaction. Recent inventions include transient imaging to look around a corner, next generation CAT-Scan machine, imperceptible markers for motion capture (Prakash), long distance barcodes (Bokode), touch+hover 3D interaction displays (BiDi screen), low-cost eye care devices (Netra) and new theoretical models to augment light fields (ALF) to represent wave phenomena.
In 2004, Raskar received the TR100 Award from Technology Review, which recognizes top young innovators under the age of 35, and in 2003, the Global Indus Technovator Award, instituted at MIT to recognize the top 20 Indian technology innovators worldwide. In 2009, he was awarded a Sloan Research Fellowship. In 2010, he received the Darpa Young Faculty award. He holds over 40 US patents and has received four Mitsubishi Electric Invention Awards. He is currently co-authoring a book on Computational Photography. http://raskar.info
Build Your Own 3D Scanner: 3D Scanning with Structured LightingDouglas Lanman
Build Your Own 3D Scanner:
3D Scanning with Structured Lighting
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
Build Your Own 3D Scanner: The Mathematics of 3D TriangulationDouglas Lanman
Build Your Own 3D Scanner:
The Mathematics of 3D Triangulation
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
A new approach of edge detection in sar images using region based active cont...eSAT Journals
Abstract This paper presents a new methodology for the edge detection of complex radar images. The approach includes the edge improvisation algorithm and followed with edge detection. The nature of complex radar images made edge enhancement part before the edge detection as the data is highly heterogeneous in nature. Thus, the use of discrete wavelet transform in the edge improvisation algorithm is justified. Then region based active contour model is used as edge detection algorithm. The paper proposes the distribution fitting energy with a level set function and neighborhood means and variances as variables. The performance is tested by applying it on different images and the results are been analyzed. Keywords: Edge detection, Edge improvisation, Synthetic Aperture radar (SAR), wavelet transforms.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
DimEye Corp Presents Revolutionary VLS (Video Laser Scan) at SS IMMR 2013Patrick Raymond
DimEye Corp. Introduces the Revolutionary VLS (Video Laser Scan) to the Subsea Survey IMMR audience in Galveston Texas (November 2013).
VLS™ (Video Laser Scan) by DimEye Corp. is a revolution in Optical 3D Measurement. VLS Provides High Definition Visual Inspection, As-Built 3D Modeling of Industrial/Subsea Equipment, 3D High Density Mapping of Deformations and Defects (for example: Cracks, Dents, Bulges, Corrosion)
VLS™ is a unique combination of photogrammetry and Laser Techniques which provides the Advantages of both technologies without the disadvantages. VLS™ can also be operated by your existing technicians.
VLS™ is a High Accuracy Metrology Tool Linked to NIST (National Industry of Standards and Technology) that provides High Redundancy through volume of data collected (1000s of stills can be captured from HD video in seconds rather than individual photos taken manually at each location). VLS™ provides Reliable Accuracy Estimates (thanks to advanced processing and calibration algorithms developed by DimEye after years of industry experience in multiple measurement environments and scenarios).
Two Dimensional Image Reconstruction Algorithmsmastersrihari
Convolution Back-Projection (CBP) Algorithm was used for the reconstruction of the image. The performance was compared by implementing the algorithm by using RAM- LAK filter, Shepp- Logan filter and also No filter being used.
ideo surveillance is becoming more and more important forsocial security, law enforcement, social
order,military, and other social problems. In order to manage parking information effectively, this vehicle
detection method is presented. In general, motion detection plays an important role in video surveillance
systems. In this paper, firstly this system uses ViBe method to extract the foreground object, then extracts
HOG features on the performance of the ROI of images. At last this paper presents Support vector machine
for vehicle recognition. The results of this test show that, the r
Build Your Own 3D Scanner:
Introduction
http://mesh.brown.edu/byo3d/
SIGGRAPH 2009 Courses
Douglas Lanman and Gabriel Taubin
This course provides a beginner with the necessary mathematics, software, and practical details to leverage projector-camera systems in their own 3D scanning projects. An example-driven approach is used throughout; each new concept is illustrated using a practical scanner implemented with off-the-shelf parts. The course concludes by detailing how these new approaches are used in rapid prototyping, entertainment, cultural heritage, and web-based applications.
Computational Displays in 4D, 6D, 8D
We have explored how light propagates from thin elements into a volume for viewing for both automultiscopic displays and holograms. In particular, devices that are typically connected with geometric optics, like parallax barriers, differ in treatment from those that obey physical optics, like holograms. However, the two concepts are often used to achieve the same effect of capturing or displaying a combination of spatial and angular information. Our work connects the two approaches under a general framework based in ray space, from which insights into applications and limitations of both parallax-based and holography-based systems are observed.
Both parallax barrier systems and the practical holographic displays are limited in that they only provide horizontal parallax. Mathematically, this is equivalent to saying that they can always be expressed as a rank-1 matrix (i.e, a matrix in which all the columns are linearly related). Knowledge of this mathematical limitation has helped us to explore the space of possibilities and extend the capabilities of current display types. In particular, we have designed a display that uses two LCD panels, and an optimisation algorithm, to produce a content-adaptive automultiscopic display (SIGGRAPH Asia 2010).
(Joint work with R Horstmeyer, Se Baek Oh, George Barbastathis, Doug Lanman, Matt Hirsch and Yunhee Kim) http://cameraculture.media.mit.edu
In other work we have developed a 6D optical system that responds to changes in viewpoint as well as changes in surrounding light. Our lenticular array alignment allows us to achieve such a system as a passive setup, omitting the need for electrical components. Unlike traditional 2D flat displays, our 6D displays discretize the incident light field and modulate 2D patterns in order to produce super-realistic (2D) images. By casting light at variable intensities and angles onto our 6D displays, we can produce multiple images as well as store greater information capacity on a single 2D film (SIGGRAPH 2008).
Ramesh Raskar joined the Media Lab from Mitsubishi Electric Research Laboratories in 2008 as head of the Lab’s Camera Culture research group. His research interests span the fields of computational photography, inverse problems in imaging and human-computer interaction. Recent inventions include transient imaging to look around a corner, next generation CAT-Scan machine, imperceptible markers for motion capture (Prakash), long distance barcodes (Bokode), touch+hover 3D interaction displays (BiDi screen), low-cost eye care devices (Netra) and new theoretical models to augment light fields (ALF) to represent wave phenomena.
In 2004, Raskar received the TR100 Award from Technology Review, which recognizes top young innovators under the age of 35, and in 2003, the Global Indus Technovator Award, instituted at MIT to recognize the top 20 Indian technology innovators worldwide. In 2009, he was awarded a Sloan Research Fellowship. In 2010, he received the Darpa Young Faculty award. He holds over 40 US patents and has received four Mitsubishi Electric Invention Awards. He is currently co-authoring a book on Computational Photography. http://raskar.info
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...sipij
Recently anomaly detection (AD) has become an important application for target detection in hyperspectral remotely sensed images. In many applications, in addition to high accuracy of detection we need a fast and reliable algorithm as well. This paper presents a novel method to improve the performance of current AD algorithms. The proposed method first calculates Discrete Wavelet Transform (DWT) of every pixel vector of image using Daubechies4 wavelet. Then, AD algorithm performs on four bands of “Wavelet transform” matrix which are the approximation of main image. In this research some benchmark AD algorithms including Local RX, DWRX and DWEST have been implemented on Airborne Visible/Infrared Imaging Spectrometer (AVIRIS) hyperspectral datasets. Experimental results demonstrate significant improvement of runtime in proposed method. In addition, this method improves the accuracy of AD algorithms because of DWT’s power in extracting approximation coefficients of signal, which contain the main behaviour of signal, and abandon the redundant information in hyperspectral image data.
Research Inventy : International Journal of Engineering and Science is published by the group of young academic and industrial researchers with 12 Issues per year. It is an online as well as print version open access journal that provides rapid publication (monthly) of articles in all areas of the subject such as: civil, mechanical, chemical, electronic and computer engineering as well as production and information technology. The Journal welcomes the submission of manuscripts that meet the general criteria of significance and scientific excellence. Papers will be published by rapid process within 20 days after acceptance and peer review process takes only 7 days. All articles published in Research Inventy will be peer-reviewed.
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
The SAR and SAS images are perturbed by a multiplicative noise called speckle, due to the coherent nature of the scattering phenomenon. If the background of an image is uneven, the fixed thresholding technique is not suitable to segment an image using adaptive thresholding method. In this paper a new Adaptive thresholding method is proposed to reduce the speckle noise, preserving the structural features and textural information of Sector Scan SONAR (Sound Navigation and Ranging) images. Due to the massive proliferation of SONAR images, the proposed method is very appealing in under water environment applications. In fact it is a pre- treatment required in any SONAR images analysis system. The results obtained from the proposed method were compared quantitatively and qualitatively with the results obtained from the other speckle reduction techniques and demonstrate its higher performance for speckle reduction in the SONAR images.
A NOVEL APPROACH FOR SEGMENTATION OF SECTOR SCAN SONAR IMAGES USING ADAPTIVE ...ijistjournal
The SAR and SAS images are perturbed by a multiplicative noise called speckle, due to the coherent nature of the scattering phenomenon. If the background of an image is uneven, the fixed thresholding technique is not suitable to segment an image using adaptive thresholding method. In this paper a new Adaptive thresholding method is proposed to reduce the speckle noise, preserving the structural features and textural information of Sector Scan SONAR (Sound Navigation and Ranging) images. Due to the massive proliferation of SONAR images, the proposed method is very appealing in under water environment applications. In fact it is a pre- treatment required in any SONAR images analysis system. The results obtained from the proposed method were compared quantitatively and qualitatively with the results obtained from the other speckle reduction techniques and demonstrate its higher performance for speckle reduction in the SONAR images.
Investigations on real time RSSI based outdoor target tracking using kalman f...IJECEIAES
Target tracking is essential for localization and many other applications in Wireless Sensor Networks (WSNs). Kalman filter is used to reduce measurement noise in target tracking. In this research TelosB motes are used to measure Received Signal Strength Indication (RSSI). RSSI measurement doesn‟t require any external hardware compare to other distance estimation methods such as Time of Arrival (TOA), Time Difference of Arrival (TDoA) and Angle of Arrival (AoA). Distances between beacon and non-anchor nodes are estimated using the measured RSSI values. Position of the nonanchor node is estimated after finding the distance between beacon and nonanchor nodes. A new algorithm is proposed with Kalman filter for location estimation and target tracking in order to improve localization accuracy called as MoteTrack InOut system. This system is implemented in real time for indoor and outdoor tracking. Localization error reduction obtained in an outdoor environment is 75%.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Ant Colony Optimization (ACO) based Data Hiding in Image Complex Region IJECEIAES
This paper presents data an Ant colony optimization (ACO) based data hiding technique. ACO is used to detect complex region of cover image and afterward, least significant bits (LSB) substitution is used to hide secret information in the detected complex regions’ pixels. ACO is an algorithm developed inspired by the inborn manners of ant species. The ant leaves pheromone on the ground for searching food and provisions. The proposed ACO-based data hiding in complex region establishes an array of pheromone, also called pheromone matrix, which represents the complex region in sequence at each pixel position of the cover image. The pheromone matrix is developed according to the movements of ants, determined by local differences of the image element’s intensity. The least significant bits of complex region pixels are substituted with message bits, to hide secret information. The experimental results, provided, show the significance of the performance of the proposed method.
Signal Processing Algorithm of Space Time Coded Waveforms for Coherent MIMO R...IJMER
ABSTRACT: Space-time coding (STC) has been shown to play a key role in the design of MIMO radars with closely
spaced antennas. Multiple-input–multiple-output (MIMO) radar is emerging technology for target detection, parameter
identification, and target classification due to diversity of waveform and perspective. First, it turns out that a joint waveform
optimization problem can be decoupled into a set of individual waveform design problems. Second, a number of mono-static
waveforms can be directly used in a MIMO radar system, which offers flexibility in waveform selection. We provide
conditions for the elimination of waveform cross correlation. However, the mutual interference among the waveforms may
lead to performance degradation in resolving spatially close returns. We consider the use of space–time coding (STC) to
mitigate the waveform cross-correlation effects in MIMO radar. In addition, we also extend the model to partial waveform
cross-correlation removal based on waveform set division. Numerical results demonstrate the effectiveness of STC in MIMO
radar for waveform de-correlation. This paper introduces the signal processing issued for the coherent MIMO radar without
and with STC waveforms and also studied signal processing algorithms of coherent MIMO radar with STC waveforms for
improvement of target detection and recognition performance for real life scenario.
Keywords: STC, coherent, Probability detection, MIMO and SNR.
SLIC Superpixel Based Self Organizing Maps Algorithm for Segmentation of Micr...IJAAS Team
We can find the simultaneous monitoring of thousands of genes in parallel Microarray technology. As per these measurements, microarray technology have proven powerful in gene expression profiling for discovering new types of diseases and for predicting the type of a disease. Gridding, Intensity extraction, Enhancement and Segmentation are important steps in microarray image analysis. This paper gives simple linear iterative clustering (SLIC) based self organizing maps (SOM) algorithm for segmentation of microarray image. The clusters of pixels which share similar features are called Superpixels, thus they can be used as mid-level units to decrease the computational cost in many vision applications. The proposed algorithm utilizes superpixels as clustering objects instead of pixels. The qualitative and quantitative analysis shows that the proposed method produces better segmentation quality than k-means, fuzzy cmeans and self organizing maps clustering methods.
In this paper, a new algorithm for a high resolution
Direction Of Arrival (DOA) estimation method for multiple
wideband signals is proposed. The proposed method proceeds
in two steps. In the first step, the received signals data is
decomposed in a Toeplitz form using the first-order statistics.
In the second step, The QR decomposition is applied on the
constructed Toeplitz matrix. Compared with existing schemes,
the proposed scheme provides several advantages. First, it
requires computing the triangular matrix R or the orthogonal
matrix Q to find the DOA; these matrices can be computed
with O(n2) operation. However, most of the existing schemes
required eignvalue decomposition (EVD) for the covariance
matrix or singular value decomposition (SVD) for the data
matrix; using EVD or SVD requires much more complex
computational O(n3) operation. Second, the proposed scheme
is more suitable for high-speed communication since it
requires first-order statistics and a single snapshot. Third,
the proposed scheme can estimate the correlated wideband
signals without using spatial smoothing techniques; whereas,
already-existing schemes do not. Accuracy of the proposed
wideband DOA estimation method is evaluated through
computer simulation in comparison with a conventional
method.
Recent advances in radio and embedded systems for completing the procedure of location estimation most
of the time sensor networks are fully dependent on the distance measurements that is present between the
sensor neighbourhood node. Techniques used for the localization can be categorized differently.
Techniques used for the measurement of the distance between the wireless sensor nodes, dependent upon
the physical means are divided into three broader categories namely Received signal strength (RSS), Angle
of Arrival (AOA) and propagation base on time measurements. This paper discusses the most of the
approached of WSN and IoT based positioning system.
Time of arrival based localization in wireless sensor networks a non linear ...sipij
In this paper, we aim to obtain the location information of a sensor node deployed in a Wireless Sensor Network (WSN). Here, Time of Arrival based localization technique is considered. We calculate the position information of an unknown sensor node using the non- linear techniques. The performances of the techniques are compared with the Cramer Rao Lower bound (CRLB). Non-linear Least Squares and the Maximum Likelihood are the non-linear techniques that have been used to estimate the position of the unknown sensor node. Each of these non-linear techniques are iterative approaches, namely, Newton
Raphson estimate, Gauss Newton Estimate and the Steepest Descent estimate for comparison. Based on the
results of the simulation, the approaches have been compared. From the simulation study, Localization
based on Maximum Likelihood approach is having higher localization accuracy.
Atmospheric Correction of Remotely Sensed Images in Spatial and Transform DomainCSCJournals
Remotely sensed data is an effective source of information for monitoring changes in land use and land cover. However remotely sensed images are often degraded due to atmospheric effects or physical limitations. Atmospheric correction minimizes or removes the atmospheric influences that are added to the pure signal of target and to extract more accurate information. The atmospheric correction is often considered critical pre-processing step to achieve full spectral information from every pixel especially with hyperspectral and multispectral data. In this paper, multispectral atmospheric correction approaches that require no ancillary data are presented in spatial domain and transform domain. We propose atmospheric correction using linear regression model based on the wavelet transform and Fourier transform. They are tested on Landsat image consisting of 7 multispectral bands and their performance is evaluated using visual and statistical measures. The application of the atmospheric correction methods for vegetation analyses using Normalized Difference Vegetation Index is also presented in this paper.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
1. DETECTION OF VEHICLES IN SHADOW AREAS USING COMBINED HYPERSPECTRAL AND LIDAR DATA M. Shimoni*; G. Tolt**; C. Perneel*** and J. Ahlberg** * Signal and Image Centre, Dept. of Electrical Engineering (SIC-RMA), Brussels, Belgium, ** FOI Swedish Defence Research Agency, Linköping, Sweden , *** Dept. of Mathematics, Royal Military Academy, Brussels, Belgium.
2. CASI-1500 382 nm to 1040 nm with 24 spectral bands, IFOV: 0.25 m.
5. STEP 1 : Shadow detection Training area SVM (force shadow/no shadow) Detect the interior of large area using distance transformation
6. Model of stationary European vehicle In the orthorectifed normalized Digital Surface Model (nDSM=DEM − DSM) and HIS data sets, a vehicle covers maximum 12 to 20 pixels in different delineations.
7. STEP 2 : Segmentation of vehicles in 3D LIDAR data Selected method: Mean Shift (MS) Major challenge: how to adaptively determine the kernel bandwidth in the spatial domain. For our purpose: a cylinder-shaped kernel is used, where the horizontal bandwidth h h (k) at each point varies and has to be determined based on joint height edge and pixel shape information (PSI): PSI is obtained through extending direction lines radiating from the central pixel based on spatial homogeneity PH d , PH d is the height difference between a centric pixel and every pixel on the direction lines. where L d (k) is the length of the d th direction line, T 1 is a predefined threshold for PH d (T 1 =0.75-1.50) T 2 is the maximal number of pixels allowed in the direction line (T 2 =20 pixels). Binary edge(x) indicates the presence of height edge.
8. Once all the direction lines are extended, the kernel bandwidth can be determined as follows: where with D being the total number of direction lines.
9. STEP 3 : Detection of spectral anomalies in shadows areas Selected method: Topological Anomaly Detection (TAD)* Processing steps: (1) The shadow areas were selected as ROI and been counted to assure the availability of at least 20X20 pixels. In negative case, this shadow area was not processed. (2) Normalisation : we normalize the shadow areas so that the brightest 10% of the pixels in the areas have Euclidean L2 norm equal to two and the darkest 1% have Euclidean L2 norm equal to one. (3) Background model: the shadow area pixels are chosen to model the background and the pairwise pixel distances between all pixels in the background set are computed. (4) Ranking each test pixel is compared to the pixels in the background set via the codensity metric, k , which represents the radius of the smallest sphere enclosing k neighbors. * Basener, W., I. E. and Messinger, D., “Anomaly detection using topology,” Algorithms and Technologies for Multispectral, Hyperspectral, and Ultraspectral Imagery XIII SPIE 6565 (April 2007).
10. The TAD ranking of each pixel in the image is equal to the sum of the distances from the 3rd, 4th, and 5th nearest neighbors in the background pixels, i.e., The TAD rankings result in level sets of arbitrary topology, allowing detection of pixels in the holes of the convex hull of the background. Post processing: The TAD score is then thresholded in order to create a binary anomaly map. A vegetation index can be computed on the detected anomalies, so that the pixels containing biomass can be removed from the detections. The remaining anomalies are potential vehicles.
12. STEP 4 : Detection of occluded vehicles based on decision fusion Proposed method: shape/spectral integration (SSI) decision fusion algorithm Algorithm score assumption: The SSI algorithm exploits spectral target detection methods to nominate pixels as targets (vehicle), but uses shape information to boost target pixel scores above the scores of spectrally similar false alarms in the background by assuming that vehicles correspond to local height maxima.
14. Conclusions: The SSI decision fusion algorithm was shown to outperform the MS and TAD anomaly algorithm mainly in deep shadow areas; The utility of shape information was shown to be a way to enhance spectral target detection in complex urban scene. The results illustrated that LIDAR is not independent of target-sensor geometry and that combined spectral information can be used to improve its detection in urban scene.
15.
16. DETECTION OF VEHICLES IN SHADOW AREAS M. Shimoni*; G. Tolt**; C. Perneel*** and J. Ahlberg** * Signal and Image Centre, Dept. of Electrical Engineering (SIC-RMA), Brussels, Belgium, ** FOI Swedish Defence Research Agency, Linköping, Sweden , *** Dept. of Mathematics, Royal Military Academy, Brussels, Belgium.