25 resultados para Feature Point Detection
Resumo:
Nearest feature line-based subspace analysis is first proposed in this paper. Compared with conventional methods, the newly proposed one brings better generalization performance and incremental analysis. The projection point and feature line distance are expressed as a function of a subspace, which is obtained by minimizing the mean square feature line distance. Moreover, by adopting stochastic approximation rule to minimize the objective function in a gradient manner, the new method can be performed in an incremental mode, which makes it working well upon future data. Experimental results on the FERET face database and the UCI satellite image database demonstrate the effectiveness.
Resumo:
Structural Health Monitoring (SHM) ensures the structural health and safety of critical structures covering a wide range of application areas. This thesis presents novel, low-cost and good-performance fibre Bragg grating (FBG) based systems for detection of Acoustic Emission (AE) in aircraft structures, which is a part of SHM. Importantly a key aim, during the design of these systems, was to produce systems that were sufficiently small to install in an aircraft for lifetime monitoring. Two important techniques for monitoring high frequency AE that were developed as a part of this research were, Quadrature recombination technique and Active tracking technique. Active tracking technique was used extensively and was further developed to overcome the limitations that were observed while testing it at several test facilities and with different optical fibre sensors. This system was able to eliminate any low frequency spectrum shift due to environmental perturbation and keeps the sensor always working at optimum operation point. This is highly desirable in harsh industrial and operationally active environments. Experimental work carried out in the laboratory has proved that such systems can be used for high frequency detection and have capability to detect up to 600 kHz. However, the range of frequency depends upon the requirement and design of the interrogation system as the system can be altered accordingly for different applications. Several optical fibre configurations for wavelength detection were designed during the course of this work along with industrial partners. Fibre Bragg grating Fabry-Perot (FBG-FP) sensors have shown higher sensitivity and usability than the uniform FBGs to be used with such system. This was shown experimentally. The author is certain that further research will lead to development of a commercially marketable product and the use of active tracking systems can be extended in areas of healthcare, civil infrastructure monitoring etc. where it can be deployed. Finally, the AE detection system has been developed to aerospace requirements and was tested at NDT & Testing Technology test facility based at Airbus, Filton, UK on A350 testing panels.
Resumo:
In this poster we presented our preliminary work on the study of spammer detection and analysis with 50 active honeypot profiles implemented on Weibo.com and QQ.com microblogging networks. We picked out spammers from legitimate users by manually checking every captured user's microblogs content. We built a spammer dataset for each social network community using these spammer accounts and a legitimate user dataset as well. We analyzed several features of the two user classes and made a comparison on these features, which were found to be useful to distinguish spammers from legitimate users. The followings are several initial observations from our analysis on the features of spammers captured on Weibo.com and QQ.com. ¦The following/follower ratio of spammers is usually higher than legitimate users. They tend to follow a large amount of users in order to gain popularity but always have relatively few followers. ¦There exists a big gap between the average numbers of microblogs posted per day from these two classes. On Weibo.com, spammers post quite a lot microblogs every day, which is much more than legitimate users do; while on QQ.com spammers post far less microblogs than legitimate users. This is mainly due to the different strategies taken by spammers on these two platforms. ¦More spammers choose a cautious spam posting pattern. They mix spam microblogs with ordinary ones so that they can avoid the anti-spam mechanisms taken by the service providers. ¦Aggressive spammers are more likely to be detected so they tend to have a shorter life while cautious spammers can live much longer and have a deeper influence on the network. The latter kind of spammers may become the trend of social network spammer. © 2012 IEEE.
Resumo:
Even simple hybrid systems like the classic bouncing ball can exhibit Zeno behaviors. The existence of this type of behavior has so far forced simulators to either ignore some events or risk looping indefinitely. This in turn forces modelers to either insert ad hoc restrictions to circumvent Zeno behavior or to abandon hybrid modeling. To address this problem, we take a fresh look at event detection and localization. A key insight that emerges from this investigation is that an enclosure for a given time interval can be valid independently of the occurrence of a given event. Such an event can then even occur an unbounded number of times, thus making it possible to handle certain types of Zeno behavior.
Resumo:
The focus of our work is the verification of tight functional properties of numerical programs, such as showing that a floating-point implementation of Riemann integration computes a close approximation of the exact integral. Programmers and engineers writing such programs will benefit from verification tools that support an expressive specification language and that are highly automated. Our work provides a new method for verification of numerical software, supporting a substantially more expressive language for specifications than other publicly available automated tools. The additional expressivity in the specification language is provided by two constructs. First, the specification can feature inclusions between interval arithmetic expressions. Second, the integral operator from classical analysis can be used in the specifications, where the integration bounds can be arbitrary expressions over real variables. To support our claim of expressivity, we outline the verification of four example programs, including the integration example mentioned earlier. A key component of our method is an algorithm for proving numerical theorems. This algorithm is based on automatic polynomial approximation of non-linear real and real-interval functions defined by expressions. The PolyPaver tool is our implementation of the algorithm and its source code is publicly available. In this paper we report on experiments using PolyPaver that indicate that the additional expressivity does not come at a performance cost when comparing with other publicly available state-of-the-art provers. We also include a scalability study that explores the limits of PolyPaver in proving tight functional specifications of progressively larger randomly generated programs. © 2014 Springer International Publishing Switzerland.
Resumo:
The turning point of the refractive index (RI) sensitivity based on the multimode microfiber (MMMF) in-line Mach–Zehnder interferometer (MZI) is observed. By tracking the resonant wavelength shift of the MZI generated between the HE11 and HE12 modes in the MMMF, the surrounding RI (SRI) could be detected. Theoretical analysis demonstrates that the RI sensitivity will reach ±∞ on either side of the turning point due to the group effective RI difference (퐺) approaching zero. Significantly, the positive sensitivity exists in a very wide fiber diameter range, while the negative sensitivity can be achieved in a narrow diameter range of only 0.3 μm. Meanwhile, the experimental sensitivities and variation trend at different diameters exhibit high consistency with the theoretical results. High RI sensitivity of 10777.8 nm/RIU (RI unit) at the fiber diameter of 4.6 μm and the RI around 1.3334 is realized. The discovery of the sensitivity turning points has great significance on trace detection due to the possibility of ultrahigh RI sensitivity.
Resumo:
This paper develops a theoretical analysis of the tradeoff between carrier suppression and nonlinearities induced by optical IQ modulators in direct-detection subcarrier multiplexing systems. The tradeoff is obtained by examining the influence of the bias conditions of the modulator on the transmitted single side band signal. The frequency components in the electric field and the associated photocurrent at the output of the IQ modulator are derived mathematically. For any frequency plan, the optimum bias point can be identified by calculating the sensitivity gain for every subchannel. A setup composed of subcarriers located at multiples of the data rate ensures that the effects of intermodulation distortion are studied in the most suitable conditions. Experimental tests with up to five QPSK electrical subchannels are performed to verify the mathematical model and validate the predicted gains in sensitivity.
Resumo:
Many Object recognition techniques perform some flavour of point pattern matching between a model and a scene. Such points are usually selected through a feature detection algorithm that is robust to a class of image transformations and a suitable descriptor is computed over them in order to get a reliable matching. Moreover, some approaches take an additional step by casting the correspondence problem into a matching between graphs defined over feature points. The motivation is that the relational model would add more discriminative power, however the overall effectiveness strongly depends on the ability to build a graph that is stable with respect to both changes in the object appearance and spatial distribution of interest points. In fact, widely used graph-based representations, have shown to suffer some limitations, especially with respect to changes in the Euclidean organization of the feature points. In this paper we introduce a technique to build relational structures over corner points that does not depend on the spatial distribution of the features. © 2012 ICPR Org Committee.
Resumo:
Even simple hybrid automata like the classic bouncing ball can exhibit Zeno behavior. The existence of this type of behavior has so far forced a large class of simulators to either ignore some events or risk looping indefinitely. This in turn forces modelers to either insert ad-hoc restrictions to circumvent Zeno behavior or to abandon hybrid automata. To address this problem, we take a fresh look at event detection and localization. A key insight that emerges from this investigation is that an enclosure for a given time interval can be valid independent of the occurrence of a given event. Such an event can then even occur an unbounded number of times. This insight makes it possible to handle some types of Zeno behavior. If the post-Zeno state is defined explicitly in the given model of the hybrid automaton, the computed enclosure covers the corresponding trajectory that starts from the Zeno point through a restarted evolution.
Resumo:
Motivation: In any macromolecular polyprotic system - for example protein, DNA or RNA - the isoelectric point - commonly referred to as the pI - can be defined as the point of singularity in a titration curve, corresponding to the solution pH value at which the net overall surface charge - and thus the electrophoretic mobility - of the ampholyte sums to zero. Different modern analytical biochemistry and proteomics methods depend on the isoelectric point as a principal feature for protein and peptide characterization. Protein separation by isoelectric point is a critical part of 2-D gel electrophoresis, a key precursor of proteomics, where discrete spots can be digested in-gel, and proteins subsequently identified by analytical mass spectrometry. Peptide fractionation according to their pI is also widely used in current proteomics sample preparation procedures previous to the LC-MS/MS analysis. Therefore accurate theoretical prediction of pI would expedite such analysis. While such pI calculation is widely used, it remains largely untested, motivating our efforts to benchmark pI prediction methods. Results: Using data from the database PIP-DB and one publically available dataset as our reference gold standard, we have undertaken the benchmarking of pI calculation methods. We find that methods vary in their accuracy and are highly sensitive to the choice of basis set. The machine-learning algorithms, especially the SVM-based algorithm, showed a superior performance when studying peptide mixtures. In general, learning-based pI prediction methods (such as Cofactor, SVM and Branca) require a large training dataset and their resulting performance will strongly depend of the quality of that data. In contrast with Iterative methods, machine-learning algorithms have the advantage of being able to add new features to improve the accuracy of prediction. Contact: yperez@ebi.ac.uk Availability and Implementation: The software and data are freely available at https://github.com/ypriverol/pIR. Supplementary information: Supplementary data are available at Bioinformatics online.