20 resultados para super-resolution - face recognition - surveillance
em CentAUR: Central Archive University of Reading - UK
Resumo:
This paper considers the application of weightless neural networks (WNNs) to the problem of face recognition and compares the results with those provided using a more complicated multiple neural network approach. WNNs have significant advantages over the more common forms of neural networks, in particular in term of speed of operation and learning. A major difficulty when applying neural networks to face recognition problems is the high degree of variability in expression, pose and facial details: the generalisation properties of a WNN can be crucial. In the light of this problem a software simulator of a WNN has been built and the results of some initial tests are presented and compared with other techniques
Resumo:
Studies of face recognition and discrimination provide a rich source of data and debate on the nature of their processing, in particular through using inverted faces. This study draws parallels between the features of typefaces and faces, as letters share a basic configuration, regardless of typeface, that could be seen as similar to faces. Typeface discrimination is compared using paragraphs of upright letters and inverted letters at three viewing durations. Based on previously reported effects of expertise, the prediction that designers would be less accurate when letters are inverted, whereas nondesigners would have similar performance in both orientations, was confirmed. A proposal is made as to which spatial relations between typeface components constitute holistic and configural processing, posited as the basis for better discrimination of the typefaces of upright letters. Such processing may characterize designers’ perceptual abilities, acquired through training.
Resumo:
We report on the assembly of tumor necrosis factor receptor 1 (TNF-R1) prior to ligand activation and its ligand-induced reorganization at the cell membrane. We apply single-molecule localization microscopy to obtain quantitative information on receptor cluster sizes and copy numbers. Our data suggest a dimeric pre-assembly of TNF-R1, as well as receptor reorganization toward higher oligomeric states with stable populations comprising three to six TNF-R1. Our experimental results directly serve as input parameters for computational modeling of the ligand-receptor interaction. Simulations corroborate the experimental finding of higher-order oligomeric states. This work is a first demonstration how quantitative, super-resolution and advanced microscopy can be used for systems biology approaches at the single-molecule and single-cell level.
Resumo:
The actin nodule is a novel F-actin structure present in platelets during early spreading. However, only limited detail is known regarding nodule organization and function. Here we use electron microscopy, SIM and dSTORM super-resolution, and live-cell TIRF microscopy to characterize the structural organization and signalling pathways associated with nodule formation. Nodules are composed of up to four actin-rich structures linked together by actin bundles. They are enriched in the adhesion-related proteins talin and vinculin, have a central core of tyrosine phosphorylated proteins and are depleted of integrins at the plasma membrane. Nodule formation is dependent on Wiskott-Aldrich syndrome protein (WASp) and the ARP2/3 complex. WASp(-/-) mouse blood displays impaired platelet aggregate formation at arteriolar shear rates. We propose actin nodules are platelet podosome-related structures required for platelet-platelet interaction and their absence contributes to the bleeding diathesis of Wiskott-Aldrich syndrome.
Resumo:
This study investigated the ability of neonatal larvae of the root-feeding weevil, Sitona lepidus Gyllenhal, to locate white clover Trifolium repens L. (Fabaceae) roots growing in soil and to distinguish them from the roots of other species of clover and a co-occurring grass species. Choice experiments used a combination of invasive techniques and the novel technique of high resolution X-ray microtomography to non-invasively track larval movement in the soil towards plant roots. Burrowing distances towards roots of different plant species were also examined. Newly hatched S. lepidus recognized T. repens roots and moved preferentially towards them when given a choice of roots of subterranean clover, Trifolium subterraneum L. (Fabaceae), strawberry clover Trifolium fragiferum L. (Fabaceae), or perennial ryegrass Lolium perenne L. (Poaceae). Larvae recognized T. repens roots, whether released in groups of five or singly, when released 25 mm (meso-scale recognition) or 60 mm (macro-scale recognition) away from plant roots. There was no statistically significant difference in movement rates of larvae.
Resumo:
Conjugate addition of lithium dibenzylamide to tert-butyl (+/-)-3-methylcyclopentene-1-carboxylate occurs with high levels of stereocontrol, with preferential addition of lithium dibenzylamide to the face of the cyclic alpha,beta-unsaturated acceptor anti- to the 3-methyl substituent. High levels of enantiorecognition are observed between tert-butyl (+/-)-3-methylcyclopentene-1-carboxylate and an excess of lithium (+/-)-N-benzyl-N-alpha-methylbenzylamide (10 eq.) (E > 140) in their mutual kinetic resolution, while the kinetic resolution of tert-butyl (+/-)-3-methylcyclopentene-1-carboxylate with lithium (S)-N-benzyl-N-alpha-methylbenzylamide proceeds to give, at 51% conversion, tert-butyl (1R, 2S, 3R,alphaS)-3-methyl-2-N-benzyl-N-alpha-methylbenzylaminocyclopentane-1-c arboxylate consistent with E > 130, and in 39% yield and 99 +/- 0.5% de after purification. Subsequent deprotection by hydrogenolysis and ester hydrolysis gives (1R, 2S, 3R)-3-methylcispentacin in > 98% de and 98 +/- 1% ee. Selective epimerisation of tert-butyl (1R, 2S, 3R, alphaS)-3-methyl-2-N- benzyl-N-alpha-methylbenzylaminocyclopentane-1-carboxylate by treatment with (KOBu)-Bu-t in (BuOH)-Bu-t gives tert-butyl (1S, 2S, 3R, alphaS)-3-methyl-2-N-benzyl-N-alpha-methylbenzylaminocyclopentane-1-carb oxylate in quantitative yield and in > 98% de, with subsequent deprotection by hydrogenolysis and ester hydrolysis giving (1S, 2S, 3R)-3-methyltranspentacin hydrochloride in > 98% de and 97 +/- 1% ee.
Resumo:
This paper presents a new face verification algorithm based on Gabor wavelets and AdaBoost. In the algorithm, faces are represented by Gabor wavelet features generated by Gabor wavelet transform. Gabor wavelets with 5 scales and 8 orientations are chosen to form a family of Gabor wavelets. By convolving face images with these 40 Gabor wavelets, the original images are transformed into magnitude response images of Gabor wavelet features. The AdaBoost algorithm selects a small set of significant features from the pool of the Gabor wavelet features. Each feature is the basis for a weak classifier which is trained with face images taken from the XM2VTS database. The feature with the lowest classification error is selected in each iteration of the AdaBoost operation. We also address issues regarding computational costs in feature selection with AdaBoost. A support vector machine (SVM) is trained with examples of 20 features, and the results have shown a low false positive rate and a low classification error rate in face verification.
Resumo:
Driven by new network and middleware technologies such as mobile broadband, near-field communication, and context awareness the so-called ambient lifestyle will foster innovative use cases in different domains. In the EU project Hydra high-level security, trust and privacy concerns such as loss of control, profiling and surveillance are considered at the outset. At the end of this project the. Hydra middleware development platform will have been designed so as to enable developers to realise secure ambient scenarios. This paper gives a short introduction to the Hydra project and its approach to ensure security by design. Based on the results of a focus group analysis of the user domain "building automation" typical threats are evaluated and their risks are assessed. Then, specific security requirements with respect to security, privacy, and trust are derived in order to incorporate them into the Hydra Security Meta-Model. How concepts such as context, semantic resolution of security, and virtualisation support the overall Hydra approach will be introduced and illustrated on the basis of it technical building automation scenario.
Resumo:
Urban surveillance footage can be of poor quality, partly due to the low quality of the camera and partly due to harsh lighting and heavily reflective scenes. For some computer surveillance tasks very simple change detection is adequate, but sometimes a more detailed change detection mask is desirable, eg, for accurately tracking identity when faced with multiple interacting individuals and in pose-based behaviour recognition. We present a novel technique for enhancing a low-quality change detection into a better segmentation using an image combing estimator in an MRF based model.
Resumo:
This paper describes a real-time multi-camera surveillance system that can be applied to a range of application domains. This integrated system is designed to observe crowded scenes and has mechanisms to improve tracking of objects that are in close proximity. The four component modules described in this paper are (i) motion detection using a layered background model, (ii) object tracking based on local appearance, (iii) hierarchical object recognition, and (iv) fused multisensor object tracking using multiple features and geometric constraints. This integrated approach to complex scene tracking is validated against a number of representative real-world scenarios to show that robust, real-time analysis can be performed. Copyright (C) 2007 Hindawi Publishing Corporation. All rights reserved.
Resumo:
A new generation of advanced surveillance systems is being conceived as a collection of multi-sensor components such as video, audio and mobile robots interacting in a cooperating manner to enhance situation awareness capabilities to assist surveillance personnel. The prominent issues that these systems face are: the improvement of existing intelligent video surveillance systems, the inclusion of wireless networks, the use of low power sensors, the design architecture, the communication between different components, the fusion of data emerging from different type of sensors, the location of personnel (providers and consumers) and the scalability of the system. This paper focuses on the aspects pertaining to real-time distributed architecture and scalability. For example, to meet real-time requirements, these systems need to process data streams in concurrent environments, designed by taking into account scheduling and synchronisation. The paper proposes a framework for the design of visual surveillance systems based on components derived from the principles of Real Time Networks/Data Oriented Requirements Implementation Scheme (RTN/DORIS). It also proposes the implementation of these components using the well-known middleware technology Common Object Request Broker Architecture (CORBA). Results using this architecture for video surveillance are presented through an implemented prototype.
Resumo:
The results of applying a fragment-based protein tertiary structure prediction method to the prediction of 14 CASP5 target domains are described. The method is based on the assembly of supersecondary structural fragments taken from highly resolved protein structures using a simulated annealing algorithm. A number of good predictions for proteins with novel folds were produced, although not always as the first model. For two fold recognition targets, FRAGFOLD produced the most accurate model in both cases, despite the fact that the predictions were not based on a template structure. Although clear progress has been made in improving FRAGFOLD since CASP4, the ranking of final models still seems to be the main problem that needs to be addressed before the next CASP experiment
Resumo:
This paper presents a video surveillance framework that robustly and efficiently detects abandoned objects in surveillance scenes. The framework is based on a novel threat assessment algorithm which combines the concept of ownership with automatic understanding of social relations in order to infer abandonment of objects. Implementation is achieved through development of a logic-based inference engine based on Prolog. Threat detection performance is conducted by testing against a range of datasets describing realistic situations and demonstrates a reduction in the number of false alarms generated. The proposed system represents the approach employed in the EU SUBITO project (Surveillance of Unattended Baggage and the Identification and Tracking of the Owner).
Resumo:
A multi-proxy study of a Holocene sediment core (RF 93-30) from the western flank of the central Adriatic, in 77 m of water, reveals a sequence of changes in terrestrial vegetation, terrigenous sediment input and benthic fauna, as well as evidence for variations in sea surface temperature spanning most of the last 7000 yr. The chronology of sedimentation is based on several lines of evidence, including AMS 14C dates of foraminifera extracted from the core, palaeomagnetic secular variation, pollen indicators and dated tephra. The temporal resolution increases towards the surface and, for some of the properties measured, is sub-decadal for the last few centuries. The main changes recorded in vegetation, sedimentation and benthic foraminiferal assemblages appear to be directly related to human activity in the sediment source area, which includes the Po valley and the eastern flanks of the central and northern Appenines. The most striking episodes of deforestation and expanding human impact begin around 3600 BP (Late Bronze Age) and 700 BP (Medieval) and each leads to an acceleration in mass sedimentation and an increase in the proportion of terrigenous material, reflecting the response of surface processes to widespread forest clearance and cultivation. Although human impact appears to be the proximal cause of these changes, climatic effects may also have been important. During these periods, signs of stress are detectable in the benthic foram morphotype assemblages. Between these two periods of increased terrigeneous sedimentation there is smaller peak in sedimentation rate around 2400BP which is not associated with evidence for deforestation, shifts in the balance between terrigenous and authigenic sedimentation, or changes in benthic foraminifera. The mineral magnetic record provides a sensitive indicator of changing sediment sources: during forested periods of reduced terrigenous input it is dominated by authigenic bacterial magnetite, whereas during periods of increased erosion, anti-ferromagetic minerals (haematite and/or goethite) become more important, as well as both paramagnetic minerals and super-paramagnetic magnetite. Analysis of the alkenone, U37k′, record provides an indication of possible changes in sea surface temperature during the period, but it is premature to place too much reliance on these inferred changes until the indirect effects of past changes in the depth of the halocline and in circulation have been more fully evaluated. The combination of methods used and the results obtained illustrate the potential value of such high resolution near-shore marine sedimentary sequences for recording wide-scale human impact, documenting the effects of this on marine sedimentation and fauna and, potentially, disentangling evidence for human activities from that for past changes in climate.
Resumo:
The effects of auditory distraction in memory tasks have been examined to date with procedures that minimize participants’ control over their own memory processes. Surprisingly little attention has been paid to metacognitive control factors which might affect memory performance. In this study, we investigate the effects of auditory distraction on metacognitive control of memory, examining the effects of auditory distraction in recognition tasks utilizing the metacognitive framework of Koriat and Goldsmith (1996), to determine whether strategic regulation of memory accuracy is impacted by auditory distraction. Results replicated previous findings in showing that auditory distraction impairs memory performance in tasks minimizing participants’ metacognitive control (forced-report test). However, the results revealed also that when metacognitive control is allowed (free-report tests), auditory distraction impacts upon a range of metacognitive indices. In the present study, auditory distraction undermined accuracy of metacognitive monitoring (resolution), reduced confidence in responses provided and, correspondingly, increased participants’ propensity to withhold responses in free-report recognition. Crucially, changes in metacognitive processes were related to impairment in free-report recognition performance, as the use of the ‘don’t know’ option under distraction led to a reduction in the number of correct responses volunteered in free-report tests. Overall, the present results show how auditory distraction exerts its influence on memory performance via both memory and metamemory processes.