990 resultados para Head tracking
Resumo:
Sparse representation based visual tracking approaches have attracted increasing interests in the community in recent years. The main idea is to linearly represent each target candidate using a set of target and trivial templates while imposing a sparsity constraint onto the representation coefficients. After we obtain the coefficients using L1-norm minimization methods, the candidate with the lowest error, when it is reconstructed using only the target templates and the associated coefficients, is considered as the tracking result. In spite of promising system performance widely reported, it is unclear if the performance of these trackers can be maximised. In addition, computational complexity caused by the dimensionality of the feature space limits these algorithms in real-time applications. In this paper, we propose a real-time visual tracking method based on structurally random projection and weighted least squares techniques. In particular, to enhance the discriminative capability of the tracker, we introduce background templates to the linear representation framework. To handle appearance variations over time, we relax the sparsity constraint using a weighed least squares (WLS) method to obtain the representation coefficients. To further reduce the computational complexity, structurally random projection is used to reduce the dimensionality of the feature space while preserving the pairwise distances between the data points in the feature space. Experimental results show that the proposed approach outperforms several state-of-the-art tracking methods.
Resumo:
Purpose
– The purpose of this paper is to explore and explain the change process in Northern Ireland policing through an analysis of temporally bracketed change phases and key change delivery themes ranging from 1996 to 2012.
Design/methodology/approach
– The research approach adopted is process based, longitudinal and multi-method, utilising “temporal bracketing” to determine phases of change and conjunctural reasoning to unravel the systematic factors interacting over time, within the case.
Findings
– The paper identifies and temporally brackets four phases of change: “Tipping point”; “Implementation, Symbolic Modification and Resistance”; “Power Assisted Steering”; and “A Return to Turbulence”, identifies four themes that emerge from RUC-PSNI experience: the role of adaptive leadership; pace and sequencing of change implementation; sufficient resourcing; and the impact of external agents acting as boundary spanners, and comments on the prominence of these themes through the phases. The paper goes on to reflect upon how these phases and themes inform our understanding of organisational change within policing organisations generally and within politically pressurised transition processes.
Originality/value
– The contribution of the paper lies in the documentation of an almost unique organisational case in an environmentally forced change process. In this it contains lessons for other organisations facing similar, if less extreme challenges and presents an example of intense change analysed longitudinally.
Resumo:
The next-generation smart grid will rely highly on telecommunications infrastructure for data transfer between various systems. Anywhere we have data transfer in a system is a potential security threat. When we consider the possibility of smart grid data being at the heart of our critical systems infrastructure it is imperative that we do all we can to ensure the confidentiality, availability and integrity of the data. A discussion on security itself is outside the scope of this paper, but if we assume the network to be as secure as possible we must consider what we can do to detect when that security fails, or when the attacks comes from the inside of the network. One way to do this is to setup a hacker-trap, or honeypot. A honeypot is a device or service on a network which appears legitimate, but is in-fact a trap setup to catch breech attempts. This paper identifies the different types of honeypot and describes where each may be used. The authors have setup a test honeypot system which has been live for some time. The test system has been setup to emulate a device on a utility network. The system has had many hits, which are described in detail by the authors. Finally, the authors discuss how larger-scale systems in utilities may benefit from honeypot placement.
Resumo:
Objective
Based on the theory of incentive sensitization, the aim of this study was to investigate differences in attentional processing of food-related visual cues between normal-weight and overweight/obese males and females.
Methods
Twenty-six normal-weight (14M, 12F) and 26 overweight/obese (14M, 12F) adults completed a visual probe task and an eye-tracking paradigm. Reaction times and eye movements to food and control images were collected during both a fasted and fed condition in a counterbalanced design.
Results
Participants had greater visual attention towards high-energy-density food images compared to low-energy-density food images regardless of hunger condition. This was most pronounced in overweight/obese males who had significantly greater maintained attention towards high-energy-density food images when compared with their normal-weight counterparts however no between weight group differences were observed for female participants.
Conclusions
High-energy-density food images appear to capture visual attention more readily than low-energy-density food images. Results also suggest the possibility of an altered visual food cue-associated reward system in overweight/obese males. Attentional processing of food cues may play a role in eating behaviors thus should be taken into consideration as part of an integrated approach to curbing obesity.
Resumo:
This article shows practical results of a self-tracking receiving antenna array using a new phase locked loop (PLL) tracking configuration. The PLL configuration differs from other architectures, as it has the new feature of being able to directly track phase modulated signals without requiring an additional unmodulated pilot carrier to be present. The PLLs are used within the antenna array to produce a constant phase intermediate frequency (IF) for each antenna element. These IF's can then be combined in phase, regardless of the angle of arrival of the signal, thus utilizing the antennas array factor. The article's main focus is on the phase jitter performance of the modulation insensitive PLL carrier recovery when tracking phase modulated signals of low signal to noise ratio. From this analysis, it is concluded that the new architecture, when optimally designed, can produce phase jitter performance close to that of a conventional tracking PLL.
Resumo:
In this paper we extend the minimum-cost network flow approach to multi-target tracking, by incorporating a motion model, allowing the tracker to better cope with longterm occlusions and missed detections. In our new method, the tracking problem is solved iteratively: Firstly, an initial tracking solution is found without the help of motion information. Given this initial set of tracklets, the motion at each detection is estimated, and used to refine the tracking solution.
Finally, special edges are added to the tracking graph, allowing a further revised tracking solution to be found, where distant tracklets may be linked based on motion similarity. Our system has been tested on the PETS S2.L1 and Oxford town-center sequences, outperforming the baseline system, and achieving results comparable with the current state of the art.
Resumo:
Indoor personnel localization research has generated a range of potential techniques and algorithms. However, these typically do not account for the influence of the user's body upon the radio channel. In this paper an active RFID based patient tracking system is demonstrated and three localization algorithms are used to estimate the location of a user within a modern office building. It is shown that disregarding body effects reduces the accuracy of the algorithms' location estimates and that body shadowing effects create a systematic position error that estimates the user's location as closer to the RFID reader that the active tag has line of sight to.
Resumo:
Active network scanning injects traffic into a network and observes responses to draw conclusions about the network. Passive network analysis works by looking at network meta data or by analyzing traffic as it traverses a fixed point on the network. It may be infeasible or inappropriate to scan critical infrastructure networks. Techniques exist to uniquely map assets without resorting to active scanning. In many cases, it is possible to characterize and identify network nodes by passively analyzing traffic flows. These techniques are considered in particular with respect to their application to power industry critical infrastructure.
Resumo:
Caballeria liewi Lim, 1995, uses adhesive secretions from the head organs and posterior secretory systems to assist in locomotion and attachment. Ultrastructural investigations show that the head organs of C. liewi consist of three pairs of antero-lateral pit-like openings bearing microvilli and ducts leading from two types of uninucleated gland cells (located lateral to the pharynx), one type producing rod-like (S1) bodies with an electron-dense matrix containing less electron-dense vesicles and the second type producing oval (S2) bodies with a homogeneous electron-dense matrix. Interlinking band-like structures are observed between S1 bodies and between S2 bodies. S1 body is synthesised in the granular endoplasmic reticulum, transported to a Golgi complex to be packaged into vesicles and routed into ducts for exudation. The synthesis of the S2 body is unresolved. Haptoral secretions manifested externally as net-like structures are derived from dual electron-dense (DED) secretory body produced in the peduncular gland cells. The DED body consists of a less electron-dense oval core in a homogeneous electron-dense matrix. On exocytosis into the pyriform haptoral reservoir, DED bodies are transformed into a secretion with two types of inclusions (less electron-dense oval and electron-dense spherical inclusions) in an electron-dense matrix. The secretions are further transformed (as small, oval, electron-dense bodies) when transported to the superficial anchor grooves, and on exudation into the gill tissues, the secretions become an electron-dense matrix. Secretory bodies associated with uniciliated structures, anchor sleeves and marginal hooks are also observed.
Resumo:
his paper investigates the identification and output tracking control of a class of Hammerstein systems through a wireless network within an integrated framework and the statistic characteristics of the wireless network are modelled using the inverse Gaussian cumulative distribution function. In the proposed framework, a new networked identification algorithm is proposed to compensate for the influence of the wireless network delays so as to acquire the more precise Hammerstein system model. Then, the identified model together with the model-based approach is used to design an output tracking controller. Mean square stability conditions are given using linear matrix inequalities (LMIs) and the optimal controller gains can be obtained by solving the corresponding optimization problem expressed using LMIs. Illustrative numerical simulation examples are given to demonstrate the effectiveness of our proposed method.
Resumo:
Rationale
Previous research on attention bias in nondependent social drinkers has focused on adult samples with limited focus on the presence of attention bias for alcohol cues in adolescent social drinkers.
Objectives
The aim of this study was to examine the presence of alcohol attention bias in adolescents and the relationship of this cognitive bias to alcohol use and alcohol-related expectancies.
Methods
Attention bias in adolescent social drinkers and abstainers was measured using an eye tracker during exposure to alcohol and neutral cues. Questionnaires measured alcohol use and explicit alcohol expectancies.
Results
Adolescent social drinkers spent significantly more time fixating to alcohol stimuli compared to controls. Total fixation time to alcohol stimuli varied in accordance with level of alcohol consumption and was significantly associated with more positive alcohol expectancies. No evidence for automatic orienting to alcohol stimuli was found in adolescent social drinkers.
Conclusion
Attention bias in adolescent social drinkers appears to be underpinned by controlled attention suggesting that whilst participants in this study displayed alcohol attention bias comparable to that reported in adult studies, the bias has not developed to the point of automaticity. Initial fixations appeared to be driven by alternative attentional processes which are discussed further.