scholarly journals The Fast Integration of a Rotated Rectangle Applied to the Rotated Haar-Like Features for Rotated Objects Detection

In the area of Object Detection, the most important step is the extraction of object features. One of the most used approaches is HaarLike features and the Integral Image technique to integrate them. The Integral Image technique, used by Viola and Jones, is generally used to calculate the integral of a rectangular filter in an input picture. This filter is a rectilinear rectangle. We propose a method to integrate a rotated one by any angle of rotation inside an image based on the Bresenham algorithm of drawing a segment. We use some pixels – called key points - that forms the four segments of a rotated rectangle, to calculate its Integral Image. Our method focuses on three essential tasks; the first is to determine the rule for drawing a segment (SDR), the second is to identify all the key points of the rectangle r, and the third is to calculate the integral image. The speed of this method depends on the size and angle of rotation of the rectangle. To demonstrate the efficiency of our idea, we applied it to the rotated Haar-like features that we proposed in a later work [12], which had as objectives the improvement of the Viola and Jones algorithm to detect the rotated faces in a given image. We performed tests on more widespread databases of images, which showed that the application of this technique to rotated Haar-Like features improves the performance of object detectors, in general, and faces in particular.

Recognition and detection of an object in the watched scenes is a characteristic organic capacity. Animals and human being play out this easily in day by day life to move without crashes, to discover sustenance, dodge dangers, etc. Be that as it may, comparable PC techniques and calculations for scene examination are not all that direct, in spite of their exceptional advancement. Object detection is the process in which finding or recognizing cases of articles (for instance faces, mutts or structures) in computerized pictures or recordings. This is the fundamental task in computer. For detecting the instance of an object and to pictures having a place with an article classification object detection method usually used learning algorithm and extracted features. This paper proposed a method for moving object detection and vehicle detection.


2021 ◽  
Vol 11 (23) ◽  
pp. 11241
Author(s):  
Ling Li ◽  
Fei Xue ◽  
Dong Liang ◽  
Xiaofei Chen

Concealed objects detection in terahertz imaging is an urgent need for public security and counter-terrorism. So far, there is no public terahertz imaging dataset for the evaluation of objects detection algorithms. This paper provides a public dataset for evaluating multi-object detection algorithms in active terahertz imaging. Due to high sample similarity and poor imaging quality, object detection on this dataset is much more difficult than on those commonly used public object detection datasets in the computer vision field. Since the traditional hard example mining approach is designed based on the two-stage detector and cannot be directly applied to the one-stage detector, this paper designs an image-based Hard Example Mining (HEM) scheme based on RetinaNet. Several state-of-the-art detectors, including YOLOv3, YOLOv4, FRCN-OHEM, and RetinaNet, are evaluated on this dataset. Experimental results show that the RetinaNet achieves the best mAP and HEM further enhances the performance of the model. The parameters affecting the detection metrics of individual images are summarized and analyzed in the experiments.


Author(s):  
Andrew W. Fitzgibbon ◽  
Geoff Cross ◽  
Andrew Zisserman

Digital representation of an artefact is necessary in order to measure, admire and analyse such ancient pieces. For the purpose of storing, recoding and transmitting information, digital photographs may be enough. However, in the examination purposes of an artefact, a 3D presentation is invaluable as it allows the object viewpoint to be modified freely and 3D measurements to be taken on object features. This chapter describes the system by which 3D models from photographs can be acquired, without the need for the calibration of system geometry such as the camera focal length, relative motion of the camera and object, and the relative positions of the camera and object. This system instead computes the representation of all possible objects and camera configurations which are consistent with the given image. The first section discusses how tracking points observed in 2D images allows for the computation of the relative camera and object geometry. The second section discusses the construction of a triangulated 3D model from the object projections. The third section discusses the refinement of the model based on surface texture.


2019 ◽  
Vol 52 (3) ◽  
pp. 295-326 ◽  
Author(s):  
François Delerue

Since the end of the Cold War, international law has increasingly been challenged by states and other actors. Specific norms have also been challenged in their application by new realities and obstacles. This article focuses on these challenges as they arise from the development of cyberspace and cyber operations, and offers an overview of the main questions arising with regard to the application of international law to cyber operations. By analysing the application of the existing norms of international law to cyber operations as well as identifying their limits, the article offers an accurate lens through which to study the contestation or process of reinterpretation of some norms of international law. The objective of the article is not to deliver a comprehensive analysis of how the norms of international law apply to cyber operations but to provide an overview of the key points and issues linked to the applicability and application of the norms as well as elements of contextualisation, notably after the failure of the 2016–17 United Nations Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security. The article comprises three parts. The first part focuses on the applicability of international law to cyber operations. The second part identifies challenges that affect the applicability and application of international law in general, while the third part analyses challenges that affect specific norms of international law, highlighting their limits in dealing with cyber threats.


Author(s):  
Marijn S. Visscher

This book aims to further our understanding of Seleucid literature, covering the period from Seleucus I to Antiochus III. Despite the historical importance of the Seleucid Empire during this time, little attention has been devoted to its literature. The works of authors affiliated with the Seleucid court have tended to be overshadowed by works coming out of Alexandria, emerging from the court of the Ptolemies, the main rivals of the Seleucids. This book makes two key points, both of which challenge the idea that ‘Alexandrian’ literature is coterminous with Hellenistic literature as a whole. First, the book sets out to demonstrate that a distinctly Seleucid strand of writing emerged from the Seleucid court, characterized by shared perspectives and thematic concerns. Second, the book argues that Seleucid literature was significant on the wider Hellenistic stage. Specifically, it aims to show that the works of Seleucid authors influenced and provided counterpoints to writers based in Alexandria, including key figures such as Eratosthenes and Callimachus. For this reason, the literature of the Seleucids is not only interesting in its own right; it also provides an important reference point for further understanding of Hellenistic literature in general. These two points are worked out in four chapters, each focussing on a specific ‘moment’ in Seleucid history and the corresponding literature: the establishment of the Eastern borders under Seleucus I; the consolidation of a symbolic centre at Babylon; the crisis of the Third Syrian War under Seleucus II; and the flourishing literary court of Antiochus III.


Author(s):  
Kuang-Wen Hsieh ◽  
Bo-Yu Huang ◽  
Kai-Ze Hsiao ◽  
Yu-Hao Tuan ◽  
Fu-Pang Shih ◽  
...  

AbstractThe objective of this study was to identify the maturity and position of tomatoes in greenhouse. Three parts have been included in this study: building the model of image capturing and object detection, position identification of mature fruits and prediction of the size of the mature fruits. For the first part, image capturing in different time and object detection will be conducted in the greenhouse for identification of mature fruits. For the second part, the relative 3D position of the mature fruits calculated by the binocular vision was compared with the actual measured position. For the third part, the size of the bounding box from the object detection was compared with the actual size of the mature fruit, and the correlation was calculated in order to pre-adjust the width of the gripper for plucking operation in the future. The precision and the recall of the mature fruits of this study are over 95%. The average error of the 3D position is 0.5 cm. The actual size of the fruits and the R-squared of the size of the bounding box are over 0.9.


2018 ◽  
Vol 7 (4.11) ◽  
pp. 9
Author(s):  
RA. Hamzah ◽  
MGY. Wei ◽  
NS. Nik Anwar ◽  
AF. Kadmin ◽  
SF. Abd Gani ◽  
...  

This paper presents a new algorithm for object detection using a stereo camera system, which is applicable for machine vision applications. The propose algorithm has four stages which the first stage is matching cost computation. This step acquires the preliminary result using a pixel based differences method. Then, the second stage known as aggregation step uses a guided filter with fixed window support size. This filter is efficiently reduce the noise and increase the edge properties. After that, the optimization stage uses winner-takes-all (WTA) approach which selects the smallest matching differences value and normalized it to the disparity level. The last stage in the framework uses a bilateral filter, which is effectively further reduce the remaining noise on the disparity map. This map is two-dimensional mapping of the final result which contains information of object detection and locations. Based on the standard benchmarking stereo dataset, the proposed work produces good results and performs much better compared with some recently published methods.  


Author(s):  
Michael McGuire ◽  
Alfonso Troisi

This chapter presents an overview of a theory of behavior. Systems of behavior are reviewed first, before focusing on the four infrastructures responsible for behavior: motivations-goals, automatic systems, algorithms, and functional capacities. The social environment and environment-condition interactions are the topics of the third section, and the last section discusses the functional analysis of behavior—psychiatry’s missing link. Clinical cases illustrate key points.


2020 ◽  
Vol 38 (3B) ◽  
pp. 150-160
Author(s):  
Ekhlas F. Naser

For the reason of colossal technological developments, the requirement of image information methods became a significant issue. The aim of this research was to retrieve the word based on Fast Retina Key-points (FREAK) descriptor .The suggested system consists of four stages. In the first stage, the images of English letters are loaded.  Points are detected via SUSAN in the second stage. FREAK used in the third stage and then a database was created containing 26 English letters. The image to be tested was entered and the points are extracted in the fourth stage and then Manhattan distance was used to calculate the distance between the value of the test image descriptors and all the values of the descriptors in a database. The experimental results show that the precision and the recall values were high for retrieval of the words when using SUSAN because it extracts a large number of interest points compared to the Harris method. For example, for the letter H was 104 with SUSAN while it was 42 for Harris, therefore; the precision for retrieval of the word Hour was 89% and recall was 93% when using SUSAN while precision was 77% and recall was 80% when using Harris.


2021 ◽  
pp. 47-74
Author(s):  
Marie-Claire Cordonier Segger

This chapter briefly discusses the three ‘key points of tension’ or normative effects identified between the demands of trade and investment agreements that focus mainly on economic growth, and regulations for the environmental and social development, including the efforts of States to comply with specific trade and investment obligations in other international treaties. These points of tension are described and illustrated with interesting examples. The first tension involves the concern that new trade liberalization obligations of non-discrimination and most-favoured nation (MFN) treatment and new investment liberalization obligations, in certain specific sectors, could prevent States from effectively enacting trade-related measures to prevent unsustainable development. A second tension involves concerns that through a new trade and investment agreement, there will be increased incentives for trade or investment-led economic growth, which can exacerbate environmental and social problems that already exist at the domestic level due to lack of enforcement of the law. The third tension involves concerns that application of trade or investment rules for liberalization will inadvertently support unsustainable growth in obsolete technologies and sectors.


Sign in / Sign up

Export Citation Format

Share Document