A model based method of pedestrian abnormal behavior detection in traffic scene

Size: px
Start display at page:

Download "A model based method of pedestrian abnormal behavior detection in traffic scene"

Transcription

1 A model based method of pedestran abnormal behavor detecton n traffc scene Jang Qanyn 1,2,3, L Guomng 1,2,3, Yu Jnwe 1,2, L Xyng 1,2,3 1. esearch Center of Intellgent Transportaton System, School of Engneerng, Sun Yat-sen Unversty, Guangzhou, Chna 2. Guangdong Provncal Key Laboratory of Intellgent Transportaton System Guangzhou, Chna 3. Key Laboratory of Vdeo and Image Intellgent Analyss and Applcaton Technology of MPS, P.. Chna, Guangzhou, Chna qyjang19@163.com, @qq.com, stslxy@mal.sysu.edu.cn Abstract In order to reduce traffc accdents caused by the pedestran, fve nds of dangerous pedestran abnormal behavors are studed n the paper. A behavor model between the pedestran trajectory and the road s bult to descrbe the fve nds of dangerous pedestran abnormal behavors: crossng road border, llegal stay, crossng the road, movng along the curb, enterng road area. The method contans pedestran detecton, shadow elmnaton, pedestran recognton, pedestran tracng and abnormal behavor detecton. Bacground subtracton method s used to detect movng targets. After shadow elmnaton, pedestrans are dstngushed from vehcles accordng to the rato. Then, pedestran trajectores are gotten by pedestran tracng. Fnally, based on the relaton between trajectory and road, the model of fve nds of pedestran abnormal behavors s establshed, and abnormal behavors are detected accordng ths model. Experments show that the method can dstngush and detect the pedestran abnormal behavorseffectvelynshorttme,andtssutabletousenreal tme traffc montorng. Keywords traffc survellance vdeo; pedestran detecton; pedestran tracng; pedestran abnormal behavor model; pedestran abnormal behavor detecton I. INTODUCTION Traffc accdent problem need to be pad great attenton to n the transport system. The pedestran abnormal behavor s the man cause of the frequent traffc accdents. Therefore, pedestran abnormal behavor detecton attracts wdespread concerns n scholars who launch specal dscussons and researches on ths ssue. In the pedestran behavor detecton researches, the current methods are mostly focused on the followng two categores: the method based on template matchng and the method based on state space transfer. In the researches about the method based on template, movng target moton sequences are analyzed, many moton feature, such as velocty and drecton of movement, are calculated to match the events model. Masoud [1] used nfnte mpulse response flters to descrbe the behavors of pedestrans' goals and projected them onto a feature space, and then measured the smlarty n the vdeo mages between pedestrans and reference templates wth the Hausdorff dstance. Yn Yong [2] used approxmate motons perodc characterstc of human actons to realze the recognton of human behavors. Specfcally, frstly, the bacground dfference method based on Gaussan mxture model was used to detect human targets; then the approxmate perod of human moton was gotten by the changes of the human body shape, the whole body movement sequences were decomposed nto a seres of approxmate moton cycle unts, and the transformaton characterstcs of all movement cycle unts were extracted; fnally, the dynamc tme warpng method was used to determne the dfferent human acton categores. Dong-Gyu Lee [3] proposed a crowd behavor representaton method usng adaptve optcal flow flterng for abnormal behavor detecton and localzaton. Zhcheng Wang and Jun Zhang [4] desgned a fuzzy functon based on body s contour angle movement and proposed Fuzzy Assocatve Memory (FAM) to nfer abnormal behavor. The centrod and fuzzy feature were used to recognze abnormal behavor. The method based on template matchng s easly affected by nose, and more dffcult to buld a unfed template. In the researches about the method based on state space transfer, complex human behavor are decompose to seres smple acton or movement and recognzed wthout model preset. Bregler [5] put forward a comprehensve networ based on the human body dynamcs to recognze the movements of the body. Zhou Ybo and He Xaoha [6] detect human body usng the contour nformaton and extract the posture features by the contour fttng. A behavor classfer based on the normal behavor template s establshed to determne whether a human behavor s normal or not. Zhang Ljun and Wu Xaojuan [7] selected several specal meanng landmar ponts n the montorng mages, used these ponts to decompose complex human behavors nto a seres of smple combnatons of human actons, and created the HMMS model for smple human actons. And then, they used Level - Buldng algorthm wth an approprate threshold model and behavor grammar to dentfy the complex human behavors. Besdes, Bouttefroy [8] ntroduced a method for abnormal behavor detecton by usng contextual nformaton n Marov random felds. Modelng the local densty of object feature vector, they used a Gaussan Marov random feld mxture for abnormal behavor detecton. Shen-Bn Hsu [9] pad attenton to fallng and slppng detecton for pedestrans. They used the detecton algorthm n multple vew-angles, and then constructed the manfold walng models from the tranng samples and fallng or slppng behavor could be detected. The complexty of the method based on the state space transfer s relatvely hgh, and the calculaton process s tme consumng /15/$ IEEE

2 After analyzng the dangerous pedestran behavor n traffc, ths paper manly studes the detecton of fve nds of pedestran abnormal behavors whch are easy to cause traffc accdent n traffc survellance vdeo: pedestran crossng road border, llegal stay, crossng the road, movng along the curb and enterng road area. The aspect rato characterstc s used to dstngush between pedestrans and vehcles n pedestran recognton. The tradtonal tracng method based on features s used n pedestran tracng. In the pedestran behavors' understandng and descrpton, a new pedestran behavor detecton method s proposed based on the behavor model. The model descrbes dfferent characterstcs of the relatons between fve nds of pedestran behavors and road structures were analyzed, ncludng trajectory, dstance of trajectory ponts, angle, and dstance between trajectory and road. II. PEDESTIAN ECOGNITION AND TACKING A. Pedestran Detecton and ecognton Bacground subtracton method s an effectve method for movng target detecton whle the camera s statc. The flowchart of pedestran detecton and recognton s shown n Fg. 1. Where B-1(,j)s the gray value of the old bacground mage n the coordnates (,j), and W(,j) s the gray value of the bacground subtracton bnary mage n the coordnates (,j). The movng targets gotten by bacground subtracton method usually contans shadow whch mpacts on detecton of targets characterstcs such as shapes, contours, edges, thus pedestran detecton processng wll be nfluenced negatvely. It s necessary to elmnate the shadow. Generally, bacground regon covered by shadow causes brghtness change but not hue. Dvdng the bacground subtracton mage by bacground mage shows that the rato of the gray value of shadow regon to the gray value of bacground regon s approxmately fxed but the rato of the gray value of target regon to the gray value of bacground regon changes relatvely larger. Thus, t can be easly dstngushed between shadow regon and target regon. The shadow elmnaton procedures are shown below: 1) Dvde the bacground subtracton mage by bacground mage so that a resultng mage can be obtaned. 2) By usng three pars of gradent operators shown n Fg. 2, calculate the gradent value of each pxel n the resultng mage: g = G1 + G2 (3) Consequently, horzontal gradent value, vertcal gradent value and dagonal gradent value are obtaned. If one of the three drecton gradent value s less than a gven threshold, the pxel belongs to the shadow regon. (a) the frst par (b) the second par (c) the thrd par Fg. 2. Three pars of gradent operators Fg. 1. Pedestran detecton and dentfcaton flowchart The ntal bacground can be gotten by usng medan flterng method: B(,j) =Medan (I(,j)) (150) (1) Where,I(,j) s the gray value of the frstframe mage n the coordnates (,j). In vew of the slow change of the bacground caused by llumnaton, the Surendra method s used to update the bacground [10] n real tme. The core dea of Surendra algorthm s the non-movng areas' bacgrounds of each frame s updated n real tme but not the movng areas' bacgrounds. The prncple can be represented by (2): B (, j)! B 1(, j) ( W (, j) 1) #(1 ) I (, j) B 1(, j) ( W (, j) 0) (2) (a)orgnal target Fg. 3. Shadow elmnaton results (b)orgnal detecton (c) shadow removal (d)rght detecton The results of shadow elmnaton are shown n Fg. 3. Fg. 3(c) shows the result of shadow elmnatng of Fg. 3(a) and t can be seen that the shadow s elmnated effectvely. Fg. 3(b) s the pedestran detecton mage wthout shadow elmnatng. Fg. 3(d) s the pedestran detecton mage performed shadow elmnatng on. The shadow s elmnated n the mage, whch can mprove the pedestran detecton effect. In normal traffc stuatons, the movng targets gotten by bacground subtracton method nclude pedestrans and vehcles, whch accounts for the vast majorty are vehcles. In order to facltate subsequent processng, the movng targets are recognzed to dstngush between pedestrans and vehcles.

3 By comparng pedestrans and vehcles, the aspect rato of them can be seen as a sgnfcant dfference n the shape features, whch are shown n Fg. 4. Target s aspect rato s the rato of ts external rectangle s heght to weght. (a)walng pedestran (b) runnng pedestran (c) car Fg. 4. Targets and ther external rectangle (d) bus In vew of the dfferent expermental vdeos n whch walng pedestrans, runnng pedestrans, cars(small vehcles) and buses(bg vehcles) are respectvely calculated the sequence values of aspect rato, whch are represented as and 4. What TABLE I shows s the numercal dstrbuton of the aspect rato of walng pedestrans and runnng pedestrans. What TABLE shows s the numercal dstrbuton of the aspect rato of small vehcles and large vehcles. TABLE I. Frame Number THE ASPECT ATIO OF WALKING PEDESTIANS AND UNNING PEDESTIANS TABLE II. Frame Number THE ASPECT ATIO OF SMALL VEHICLES AND LAGE VEHICLES Showng the numercal dstrbuton of the aspect rato of walng pedestrans and runnng pedestrans, TABLE I llustrates the aspect rato of walng pedestrans 1 ranges from 2.13 to 3.57, and the rato of runnng pedestrans 2 ranges from 1.93 to Showng the numercal dstrbuton of the aspect rato of small vehcles and large vehcles, TABLE llustrates the aspect rato of small vehcles 3 from 0.74 to 0.88, the rato of large vehcles 4 ranges from 1.08 to So, pedestran and vehcle can be dstngushed by a threshold of aspect rato. B. Pedestran Tracng In order to get the pedestran trajectory, pedestran tracng s requred. Pedestran tracng s manly dvded nto four steps: Frst, loo for pedestran and determne whether the target has been traced. Due to there s no rule where pedestran target wll appear, the detecton area s set as all vdeo mage area. As far as possble to fnd all pedestrans, and to determne whether the appearance of new, all connected doman are scanned from the upper left to the lower rght, and recognzed usng pedestran recognton method. Then the centrod dstance between new target and traced targets s calculated to determne whether a new pedestran s appeared, and record the poston. Second, predct pedestran poston n next frame usng lnear predcton model. Accordng to the pedestran trajectory s contnuty of tme and space and the others characterstcs, for example, slow movement n mage area, a three-pont lnear predcton method s used to estmate the poston of the pedestran n next frame. The lnear predcton model can be descrbed by the followng equaton: ' f 2 f f ( 2,3,, N) (4) 1 1 Where, f +1 represents the target's predctve poston n the +1 th frame, f'-1 represents the target's real poston n the-1 th frame, and f' represents the target's real poston n the th frame; represents predctve model s error parameter, t can be obtaned as:! 0 ( 2) % & d (5) % 3 ( 3, 4,, N) %# 2 d f f ( 3, 4,, N) (6) ' Where, d represents the subtracton between predctve poston and real poston n the th frame target mage. Thrd, match targets usng the cost functon and record trajectory. After the target s poston s obtaned, the cost functon [11] s ntroduced to complete the target matchng. Consderng the targetn the th frame, calculate cost functon value between all canddate targets n the +1 th frame. Cost functon can be represented by the followng equaton: V (, j) D (, j)! H (, j) A (, j) (7) D (, j) ( X X ) ( Y Y ) (8) j j 1 1 j H (, j) G G 1 (9) A (, j) S S (10) j 1 Where, X Y G and S respectvely represent centrod abscssa, centrod ordnate, the average gray value and the area of target n the th frame; D(,j), H(,j) and A(,j) represent the centrod dstance, average gray subtracton and area subtracton between the targetn the th frame and the target j n the +1 th frame;! are emprcal value.

4 Choose target j whch maes cost functon value mnmum from all canddate targets n the +1 th frame predctve area as subsequent target of target n+1 th frame mage, and record the poston of the target j, whch s the coordnate of the center of target j s external rectangle. At last, clear the target nformaton of the pedestran who s left or lost to avod tracng nformaton redundancy. III. PEDESTIAN ABNOMAL BEHAVIO DETECTION A. Pedestran abnormal behavor analyss Ths paper manly dscusses fve nds of abnormal behavors of pedestran, ncludng pedestran crossng road border, llegal stay, crossng the road, movng along the curb, enterng road area. Fg. 5 s a schematc dagram of these fve abnormal behavors where the area wthn the two blac straghts represents the road area. Lne A shows the trajectory of the pedestran crossng the road border. Pont a1 s the startng pont for trajectory of pedestran, and a2 s the current pont for trajectory of pedestran. Lne B shows the trajectory of the pedestrans stayng llegally. Pont b1 s the startng pont for trajectory of pedestran, and b2 s the stop pont for trajectory of pedestran. Lne C shows the trajectory of the pedestran across the road. Pont c1 s the startng pont for trajectory of pedestran, and c2 s the current pont for trajectory of pedestran. Lne D shows the trajectory of pedestran who moves along the curb. Pont d1 s the startng pont for trajectory of pedestran, and the d2 s the current pont for trajectory of pedestran. Lne E shows the trajectory of the pedestran gong nto the road area. Ponte1 s the startng pont for trajectory of pedestran, and the e2 s the current pont for trajectory of pedestran. Fg. 5. Fve nds of abnormal behavor movement dagram (a) ntersecton relaton (b) wthn relaton Fg. 6. Poston relatonshp of pedestran trajectory and road structure Accordng to Fg. 5, there are dfferent characterstcs and relatonshp between the trajectory and road structure of each abnormal behavor, aand they are reflected manly from angle and poston. Thus we can now that the poston and angle relatonshp of pedestran trajectoryy and road structure (border of road), as shown n Fg. 6 and Fg. 7. In the Fg. 6,represents road andprepresents pedestran trajectory. Fg. 6(a) shows that pedestran trajectory ntersects road structure, for example, pedestran crossng road border. Fg. 6(b) shows the poston relatonshp that pedestran trajectory s wthn road structure, such as llegal stay, crossng the road, movng along the curb and enterng road area. Fg. 7. Angle relatonshp of pedestran trajectory and road structure In the Fg. 7, "1" means pedestran trajectory does not form angle wth road structure, for example the trajectory of llegal stay, because of ts statc pedestran trajectory. "2" means pedestran trajectory forms the nearly vertcal angle wth road structure, for example the trajectory of crossng the road. "3" means pedestran trajectory s nearly parallel to road structure, for example the trajectory of movng along curb. "4" means pedestran trajectory forms the others angle relatonshp wth road structure, such as the trajectory of crossng road border and enterng road area, whose angle relatonshp between pedestran trajectory and road structure s not regular. Accordng to the poston and angle relatonshp between pedestran trajectory and road structure, fve nds of pedestran abnormal behavors can be dstngushed. B. Pedestran abnormal behavor modelng There s much nose or some lost on pedestran trajectory obtaned by pedestran tracng because of shelter, error tracng and other reasons. So t s necessary to process the orgnal trajectory [12]. In ths paper, the average flterng method s used to smooth the orgnal pedestran trajectory, as shown n (11), and ts prncple s that an average value s obtaned every 15 frames as pedestran trajectory pont coordnate after average flterng. 15n 14 pn [ ] (& p [ ]) / 15 ( n 0,1 N) (11) 15n 1: No angle value 2: Nearly vertcal 3: Nearly parallel 4: Other angle values Where, p[] represents the orgnal pedestran trajectory pont whch s the center coordnate value of the th pedestran s external rectangle; p[ n] represents the smoothed trajectory pont; n s the number of the pedestran trajectory ponts after average flterng, and there are total N+1 numbers; N s zero or postve nteger. Four pedestran behavor model parameters are defned to descrbe the relatonshp between pedestran trajectory and road structure:

5 1) Trajectory coordnates chan: P ( p[0], p[1],, pn [ ],, p[ N ]) ; 2) Trajectory path chan: D dstance( P) ( d, d,, d,, d ) ; 1 2 Where d represents the dstance of the adjacent two trajectory ponts after average flterng, and the unt s pxel d (( p [ ]. xp[ j]. x) ( p [ ]. yp[ j]. y) ) ( 1, N; j 1) ld 2 3) Angle chan between trajectory and road structure: A angle( P, ) ( a, a,, a,, a ) ; 1 2 N M (12) Where, P represents trajectory coordnate chan and represents the border of road structure. Use lnear fttng method to ft the curve paths nto multple lne segments, and a represents the angle between the th lne segment and road structure, whose value ranges from 0 to ( n radan. a arctan ( ) / (1 ) ( 1,2, M) (13) Where represents the slope of the th lne segment; represents the slope of road structure; M s the number of lne segments by lnear fttng. 4) Dstance chan between trajectory and road structure: LD dstance( P, ) ( ld, ld,, ld,, ld ) 0 1 Where, P represents trajectory coordnate chan and represents the border of road structure; ld represents the dstance between the trajectory pont and the border of road, the unt s pxel; A B C are the parameters for the lnear equaton of road structure border whose lnear equaton expresson s y Ax By C. 2 2 ld ( Ap [ ]. x Bp [ ]. y C) / A B ( 0,1, N) (14) The relatonshp between the trajectory of fve nds of pedestran abnormal behavors and road structure can be quantfed by usng the mathematcal model of fve nds of pedestran abnormal behavors, as shown n TABLE. TABLE III. THE MATHEMATICAL MODEL OF PEDESTIAN ABNOMAL BEHAVIO Pedestrans Abnormal Behavor crossng road border llegal stay crossng the road movng along the curb enterng road area The Mathematcal Model of Pedestran Abnormal Behavor d, 1 ld, 1 Pɳ d, d 2, 0&&P) N a (/2 &&P) ld, ld 2, < Td* &&P) P) * Td s an emprcal dstance parameter. C. Abnormal behavor detecton algorthms TABLE shows that there are obvous dfferences between dfferent nds of pedestran abnormal behavors. Accordng to the mathematcal model of pedestran behavor, Fg. 8 s flow chart of abnormal behavor detecton. Fg. 8. Detecton flow chart of fve nds of pedestran abnormal behavor IV. ESULTS AND ANALYSIS Several survellance vdeos gotten from real Guangzhou traffc montorng system and test vdeos shot n test road are used to detecton pedestran abnormal behavor. All vdeos are 25 fps and frame resoluton s 704*576 pxel and. The program developed by Vsual C++ and OpenCV Beta 4.0. Detecton results are shown n Fg. 9, where border of road are mared by a par of red lnes, and pedestrans are mared by ther external rectangle. Fg. 9(a) shows the detecton result of pedestrans crossng the road border, and ts alarm type s "crossng the road border". Fg. 9(b) shows the detecton result of llegal stay, and ts alarm type s "llegal stay". Fg. 9(c) shows the detecton result of crossng the road, and ts alarm type s "crossng the road". Fg. 9(d) shows the detecton result of movng along the curb, and ts alarm type s "movng along the curb". Fg. 9(e) shows the detecton result of enterng road area, and ts alarm type s "enterng road area". All pedestran tracng are real-tme and the alarm wll ssue after pedestran tracng successful. Correct rate of abnormal behavor detecton # s defned by the rato of the number of alarm(wn) and the number of abnormal behavor (AN) n expermental vdeo: # WN / AN (15) The expermental results are dsplay n TABLE IV. The detecton accuracy of fve nds of pedestran abnormal behavor are more than 85%, and can be detected effectvely. The man reasons affectng the expermental results are: (1) when few pedestrans wal together, t s dffcult to detect each one; (2) If the dstance threshold s set large, t s easy to confuse the llegal stay wth crossng the road whose speed s slow; (3) t s easy to lost tracng for suddenly acceleraton

6 runnng pedestrans; (4) the bnary threshold s vary n dfferent vdeos. abnormal behavors n the traffc scenes, other pedestran abnormal behavors' mathematcal models can be establshed by the method also. (a)pedestran crossng the road border (No. 1) (b)illegal stay (No. 2) V. CONCLUSION In the paper, a behavor mathematcal model s establshed for the common fve nds of pedestran abnormal behavors n the traffc scenes, and behavor detecton s also realzed. The expermental detecton results ndcate the effectveness of the proposed method. There are some problems need to be dealt wth n future research, such as adheson and occluson among multple pedestrans, tracng problem when pedestran s covered by vehcle and detecton of pedestran abnormal behavor at nght. VI. ACKNOWLEDGEMENT Ths research was supported by Guangdong Provncal Department of Scence and Technology (Project No.: 2013B ). (c) Crossng the road (No.5) (e) Enterng road area(no.1 and No.2) (d) Movng along the curb (No.3) Fg. 9. Some detecton results of fve nds of pedestran abnormal behavors TABLE IV. THE DETECTION ACCUACY OF PEDESTIAN ABNOMAL BEHAVIO IN EXPEIMENTAL VIDEOS Pedestrans Abnormal Behavor Number of alarm Number of abnormal behavor n vdeos Detecton accuracy crossng road border % llegal stay % crossng the road % movng along the curb % enterng road area % Indcated by the experment, the model of pedestran abnormal behavor dscussed n ths paper s smple and tme savng, and provdes a unfed representaton method and detecton standard for each nd of abnormal behavor. Although ths paper only consders the common fve nds of EFEENCES [1] MASOUD O, PAPANIKOLOPOULOS N. A method for human acton recognton. Image and Vson Computng, 2003, 21(8): [2] Yn Yong, Wang Jandong, and Jn Xangang. Human Abnormal actvty recognton for approxmate perod moton. Computer Engneerng and Applcatons, 2010, 46(26): [3] Dong-Gyu Lee, Heung-Il Su and Seong-Whan Lee. Modelng crowd motons for abnormal actvty detecton. 11th IEEE Internatonal Conference on Advanced Vdeo and Sgnal Based Survellance (AVSS), pp , [4] Zhcheng Wang, and Jun Zhang. Detectng Pedestran abnormal behavor based on fuzzy assocatve memory. Fourth Internatonal Conference on Natural Computaton, vol. 6, pp , [5] BEGLE C. Learnng and recognzng human dynamcs n vdeo sequences. Proc of IEEE Conference on Computer Vson and Pattern ecognton. 1997: [6] Zhou Ybo, He Xaoha, Zhang Shengjun, and Qng Lnbo. A new detecton algorthm of abnormal behavor.computer Engneerng and Applcaton, 2012,48(3): [7] Zhang Ljun, Wu Xaojuan, Sheng Zan, and Q Le. Behabor recognton method n complex envronment usng HMM. Computer Engneerng, 2008, 34(7): [8] P. L. M. Bouttefroy, A. Beghdad, A. Bouzerdoum, ands. L. Phung. Marov random felds for abnormal behavor detecton on hghways. Vsual Informaton Processng(EUVIP), nd European Worshop on, pp , July, [9] Shen-Bn Hsu, Chn-Chuan Han, Cheng-Ta Hseh, and Kuo-Chn Fan. Fallng and slppng detecton for pedestrans usng a manfold learnng approach. Proceedngs of the 2013 Internatonal Conference on Machne Learnng and Cyberntcs, July, [10] Wang Zhengqn, and Lu Fuqang. Comparson of adaptve bacground extracton algorthm of Object Scene. Computer Engneerng, 2008, 34(23): [11] L X, Cao Guangy, and Fu Xaowe. The pedestran tracng countng method based on real-tme mage sequence. Computer Smulaton, 2005,22(2): [12] Zhao Youtng, L Xyng, and Luo Donghua. Based on vdeo vehcle trajectory model of traffc ncdent automatc detecton method research. Journal of Sun Yansen Unversty, 2011,50(4):56-60.

Vehicle Detection and Tracking in Video from Moving Airborne Platform

Vehicle Detection and Tracking in Video from Moving Airborne Platform Journal of Computatonal Informaton Systems 10: 12 (2014) 4965 4972 Avalable at http://www.jofcs.com Vehcle Detecton and Trackng n Vdeo from Movng Arborne Platform Lye ZHANG 1,2,, Hua WANG 3, L LI 2 1 School

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An interactive system for structure-based ASCII art creation

An interactive system for structure-based ASCII art creation An nteractve system for structure-based ASCII art creaton Katsunor Myake Henry Johan Tomoyuk Nshta The Unversty of Tokyo Nanyang Technologcal Unversty Abstract Non-Photorealstc Renderng (NPR), whose am

More information

A Suspect Vehicle Tracking System Based on Video

A Suspect Vehicle Tracking System Based on Video 3rd Internatonal Conference on Multmeda Technology ICMT 2013) A Suspect Vehcle Trackng System Based on Vdeo Yad Chen 1, Tuo Wang Abstract. Vdeo survellance systems are wdely used n securty feld. The large

More information

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information

A Multi-mode Image Tracking System Based on Distributed Fusion

A Multi-mode Image Tracking System Based on Distributed Fusion A Mult-mode Image Tracng System Based on Dstrbuted Fuson Ln zheng Chongzhao Han Dongguang Zuo Hongsen Yan School of Electroncs & nformaton engneerng, X an Jaotong Unversty X an, Shaanx, Chna Lnzheng@malst.xjtu.edu.cn

More information

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM

CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE DISTRIBUTED VIDEO SURVEILLANCESYSTEM Internatonal Research Journal of Appled and Basc Scences 2013 Avalable onlne at www.rjabs.com ISSN 2251-838X / Vol, 4 (12):3658-3663 Scence Explorer Publcatons CONSISTENT VEHICLES TRACKING BY USING A COOPERATIVE

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

A machine vision approach for detecting and inspecting circular parts

A machine vision approach for detecting and inspecting circular parts A machne vson approach for detectng and nspectng crcular parts Du-Mng Tsa Machne Vson Lab. Department of Industral Engneerng and Management Yuan-Ze Unversty, Chung-L, Tawan, R.O.C. E-mal: edmtsa@saturn.yzu.edu.tw

More information

Eye Center Localization on a Facial Image Based on Multi-Block Local Binary Patterns

Eye Center Localization on a Facial Image Based on Multi-Block Local Binary Patterns Eye Center Localzaton on a Facal Image Based on Mult-Bloc Local Bnary Patterns Anatoly tn, Vladmr Khryashchev, Olga Stepanova Yaroslavl State Unversty Yaroslavl, Russa anatolyntnyar@gmal.com, vhr@yandex.ru,

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM

VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM IJRET: Internatonal Journal of Research n Engneerng and Technology eissn: 2319-1163 pissn: 2321-7308 VEHICLE DETECTION BY USING REAR PARTS AND TRACKING SYSTEM Yogn Ashokrao Kanhegaonkar 1, Jagtap Rupal

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

where the coordinates are related to those in the old frame as follows.

where the coordinates are related to those in the old frame as follows. Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Detecting Global Motion Patterns in Complex Videos

Detecting Global Motion Patterns in Complex Videos Detectng Global Moton Patterns n Complex Vdeos Mn Hu, Saad Al, Mubarak Shah Computer Vson Lab, Unversty of Central Florda {mhu,sal,shah}@eecs.ucf.edu Abstract Learnng domnant moton patterns or actvtes

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION

MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION MACHINE VISION SYSTEM FOR SPECULAR SURFACE INSPECTION: USE OF SIMULATION PROCESS AS A TOOL FOR DESIGN AND OPTIMIZATION R. SEULIN, F. MERIENNE and P. GORRIA Laboratore Le2, CNRS FRE2309, EA 242, Unversté

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Texture Analysis and Modified Level Set Method for Automatic Detection of Bone Boundaries in Hand Radiographs

Texture Analysis and Modified Level Set Method for Automatic Detection of Bone Boundaries in Hand Radiographs Texture Analyss and Modfed Level Set Method for Automatc Detecton of Bone Boundares n Hand Radographs Syaful Anam Graduate School of Scence and Engneerng Yamaguch Unversty Yamaguch, Japan Department of

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success

More information

Who are you with and Where are you going?

Who are you with and Where are you going? Who are you wth and Where are you gong? Kota Yamaguch Alexander C. Berg Lus E. Ortz Tamara L. Berg Stony Brook Unversty Stony Brook Unversty, NY 11794, USA {kyamagu, aberg, leortz, tlberg}@cs.stonybrook.edu

More information

21 Vectors: The Cross Product & Torque

21 Vectors: The Cross Product & Torque 21 Vectors: The Cross Product & Torque Do not use our left hand when applng ether the rght-hand rule for the cross product of two vectors dscussed n ths chapter or the rght-hand rule for somethng curl

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Vehicle Detection, Classification and Position Estimation based on Monocular Video Data during Night-time

Vehicle Detection, Classification and Position Estimation based on Monocular Video Data during Night-time Vehcle Detecton, Classfcaton and Poston Estmaton based on Monocular Vdeo Data durng Nght-tme Jonas Frl, Marko H. Hoerter, Martn Lauer and Chrstoph Stller Keywords: Automotve Lghtng, Lght-based Drver Assstance,

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES

CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES CHAPTER 5 RELATIONSHIPS BETWEEN QUANTITATIVE VARIABLES In ths chapter, we wll learn how to descrbe the relatonshp between two quanttatve varables. Remember (from Chapter 2) that the terms quanttatve varable

More information

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.

Inter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN

More information

2. RELATED WORKS AND PROBLEM STATEMENT

2. RELATED WORKS AND PROBLEM STATEMENT JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 1245-1260 (2014) Short Paper Traffc Congeston Evaluaton and Sgnal Tmng Optmzaton Based on Wreless Sensor Networks: Issues, Approaches and Smulaton * School

More information

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson

More information

A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION

A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION A COLLABORATIVE TRADING MODEL BY SUPPORT VECTOR REGRESSION AND TS FUZZY RULE FOR DAILY STOCK TURNING POINTS DETECTION JHENG-LONG WU, PEI-CHANN CHANG, KAI-TING CHANG Department of Informaton Management,

More information

Parallel Numerical Simulation of Visual Neurons for Analysis of Optical Illusion

Parallel Numerical Simulation of Visual Neurons for Analysis of Optical Illusion 212 Thrd Internatonal Conference on Networkng and Computng Parallel Numercal Smulaton of Vsual Neurons for Analyss of Optcal Illuson Akra Egashra, Shunj Satoh, Hdetsugu Ire and Tsutomu Yoshnaga Graduate

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Forensic Handwritten Document Retrieval System

Forensic Handwritten Document Retrieval System Forensc Handwrtten Document Retreval System Sargur N SRIHARI and Zhxn SHI + Center of Excellence for Document Analyss and Recognton (CEDAR), Unversty at Buffalo, State Unversty of New York, Buffalo, USA

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals

Automated information technology for ionosphere monitoring of low-orbit navigation satellite signals Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce

More information

Product Quality and Safety Incident Information Tracking Based on Web

Product Quality and Safety Incident Information Tracking Based on Web Product Qualty and Safety Incdent Informaton Trackng Based on Web News 1 Yuexang Yang, 2 Correspondng Author Yyang Wang, 2 Shan Yu, 2 Jng Q, 1 Hual Ca 1 Chna Natonal Insttute of Standardzaton, Beng 100088,

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

A Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics

A Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics Vol.8, o.1 (14), pp.187-196 http://dx.do.org/1.1457/sh.14.8.1. A Fallng Detecton System wth wreless sensor for the Elderly People Based on Ergnomcs Zhenhe e 1, ng L, Qaoxang Zhao and Xue Lu 3 1 College

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Realistic Image Synthesis

Realistic Image Synthesis Realstc Image Synthess - Combned Samplng and Path Tracng - Phlpp Slusallek Karol Myszkowsk Vncent Pegoraro Overvew: Today Combned Samplng (Multple Importance Samplng) Renderng and Measurng Equaton Random

More information

Testing CAB-IDS through Mutations: on the Identification of Network Scans

Testing CAB-IDS through Mutations: on the Identification of Network Scans Testng CAB-IDS through Mutatons: on the Identfcaton of Network Scans Emlo Corchado, Álvaro Herrero, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span {escorchado, ahcoso, msaz}@ubu.es

More information

Vehicle Tracking Using Particle Filter for Parking Management System

Vehicle Tracking Using Particle Filter for Parking Management System 2014 4th Internatonal Conference on Artfcal Intellgence wth Applcatons n Engneerng and Technology Vehcle Trackng Usng Partcle Flter for Parkng Management System Kenneth Tze Kn Teo, Renee Ka Yn Chn, N.S.V.

More information

How To Predct On The Web For Hfmd

How To Predct On The Web For Hfmd Proceedngs of the Twenty-Second Internatonal Jont Conference on Artfcal Intellgence Predctng Epdemc Tendency through Search Behavor Analyss Danqng Xu, Yqun Lu, Mn Zhang, Shaopng Ma, Anq Cu, Lyun Ru State

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

Human Tracking by Fast Mean Shift Mode Seeking

Human Tracking by Fast Mean Shift Mode Seeking JOURAL OF MULTIMEDIA, VOL. 1, O. 1, APRIL 2006 1 Human Trackng by Fast Mean Shft Mode Seekng [10 font sze blank 1] [10 font sze blank 2] C. Belezna Advanced Computer Vson GmbH - ACV, Venna, Austra Emal:

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Wildfire Smoke Detection Using SpatioTemporal Bag-of-Features of Smoke

Wildfire Smoke Detection Using SpatioTemporal Bag-of-Features of Smoke Wldfre Smoke Detecton Usng SpatoTemporal Bag-of-Features of Smoke JunOh Park, ByoungChul Ko, Jae-Yeal Nam Dept. of Computer Engneerng Kemyung Unversty Daegu, Korea wnsdhd, nceko, jynam@kmu.ac.kr Abstract

More information

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm

Document Clustering Analysis Based on Hybrid PSO+K-means Algorithm Document Clusterng Analyss Based on Hybrd PSO+K-means Algorthm Xaohu Cu, Thomas E. Potok Appled Software Engneerng Research Group, Computatonal Scences and Engneerng Dvson, Oak Rdge Natonal Laboratory,

More information

Design and Implementation of a Fall Monitor System by Using a 3-Axis Accelerometer in a Smart Phone

Design and Implementation of a Fall Monitor System by Using a 3-Axis Accelerometer in a Smart Phone 01 IEEE 16th Internatonal Symposum 01 ISCE 1569570475 Desgn and Implementaton of a Fall Montor System by Usng a 3-Axs Accelerometer n a Smart Phone Yng-Wen Ba, Sao-Can Wu and Cheng-Lung Tsa Abstract--

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

Learning from Multiple Outlooks

Learning from Multiple Outlooks Learnng from Multple Outlooks Maayan Harel Department of Electrcal Engneerng, Technon, Hafa, Israel She Mannor Department of Electrcal Engneerng, Technon, Hafa, Israel maayanga@tx.technon.ac.l she@ee.technon.ac.l

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

The Network flow Motoring System based on Particle Swarm Optimized

The Network flow Motoring System based on Particle Swarm Optimized The Network flow Motorng System based on Partcle Swarm Optmzed Neural Network Adult Educaton College, Hebe Unversty of Archtecture, Zhangjakou Hebe 075000, Chna Abstract The compatblty of the commercal

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION

THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh

More information

Web Object Indexing Using Domain Knowledge *

Web Object Indexing Using Domain Knowledge * Web Object Indexng Usng Doman Knowledge * Muyuan Wang Department of Automaton Tsnghua Unversty Bejng 100084, Chna (86-10)51774518 Zhwe L, Le Lu, We-Yng Ma Mcrosoft Research Asa Sgma Center, Hadan Dstrct

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Performance Analysis and Coding Strategy of ECOC SVMs

Performance Analysis and Coding Strategy of ECOC SVMs Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School

More information

Investigation of Normalization Techniques and Their Impact on a Recognition Rate in Handwritten Numeral Recognition

Investigation of Normalization Techniques and Their Impact on a Recognition Rate in Handwritten Numeral Recognition S C H E D A E I N F O R M A T I C A E VOLUME 19 010 Investgaton of Normalzaton Technques and Ther Impact on a Recognton Rate n Handwrtten Numeral Recognton WIESŁAW CHMIELNICKI 1, KATARZYNA STĄPOR 1 Faculty

More information

Hallucinating Multiple Occluded CCTV Face Images of Different Resolutions

Hallucinating Multiple Occluded CCTV Face Images of Different Resolutions In Proc. IEEE Internatonal Conference on Advanced Vdeo and Sgnal based Survellance (AVSS 05), September 2005 Hallucnatng Multple Occluded CCTV Face Images of Dfferent Resolutons Ku Ja Shaogang Gong Computer

More information

Faraday's Law of Induction

Faraday's Law of Induction Introducton Faraday's Law o Inducton In ths lab, you wll study Faraday's Law o nducton usng a wand wth col whch swngs through a magnetc eld. You wll also examne converson o mechanc energy nto electrc energy

More information

3D SURFACE RECONSTRUCTION AND ANALYSIS IN AUTOMATED APPLE STEM END/CALYX IDENTIFICATION

3D SURFACE RECONSTRUCTION AND ANALYSIS IN AUTOMATED APPLE STEM END/CALYX IDENTIFICATION 3D SURFACE RECONSTRUCTION AND ANALYSIS IN AUTOMATED APPLE STEM END/CALYX IDENTIFICATION L. Jang, B. Zhu, X. Cheng, Y. Luo, Y. Tao ABSTRACT. Machne vson methods are wdely used n apple defect detecton and

More information

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions

Comparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda

More information

A spam filtering model based on immune mechanism

A spam filtering model based on immune mechanism Avalable onlne www.jocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):2533-2540 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A spam flterng model based on mmune mechansm Ya-png

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Research on Engineering Software Data Formats Conversion Network

Research on Engineering Software Data Formats Conversion Network 2606 JOURNAL OF SOFTWARE, VOL. 7, NO. 11, NOVEMBER 2012 Research on Engneerng Software Data Formats Converson Network Wenbn Zhao School of Instrument Scence and Engneerng, Southeast Unversty, Nanng, Jangsu,

More information

The Effects of Geodetic Configuration of the Network in Deformation Analysis

The Effects of Geodetic Configuration of the Network in Deformation Analysis The Effects of Geodetc Confguraton of the Network n Deformaton Analyss M. Onur KAPLAN, Tevfk AYAN and Serdar EROL Turkey Key words: Network confguraton, deformaton analyss, optmzaton, confdence ellpses

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information