detection and localization
Recently Published Documents


TOTAL DOCUMENTS

2375
(FIVE YEARS 1053)

H-INDEX

71
(FIVE YEARS 20)

Author(s):  
Dounia Daghouj ◽  
Marwa Abdellaoui ◽  
Mohammed Fattah ◽  
Said Mazer ◽  
Youness Balboul ◽  
...  

<span>The pulse ultra-wide band (UWB) radar consists of switching of energy of very short duration in an ultra-broadband emission chain, and the UWB signal emitted is an ultrashort pulse, of the order of nanoseconds, without a carrier. These systems can indicate the presence and distances of a distant object, call a target, and determine its size, shape, speed, and trajectory. In this paper, we present a UWB radar system allowing the detection of the presence of a target and its localization in a road environment based on the principle of correlation of the reflected signal with the reference and the determination of its correlation peak.</span>


2022 ◽  
Vol 73 ◽  
pp. 102229 ◽  
Author(s):  
Zhengxue Zhou ◽  
Leihui Li ◽  
Alexander Fürsterling ◽  
Hjalte Joshua Durocher ◽  
Jesper Mouridsen ◽  
...  

2022 ◽  
pp. 1-13
Author(s):  
Kathryn Bruss ◽  
Raymond Kim ◽  
Taylor A. Myers ◽  
Jiann-cherng Su ◽  
Anirban Mazumdar

Abstract Defect detection and localization are key to preventing environmentally damaging wellbore leakages in both geothermal and oil/gas applications. In this work, a multi-step, machine learning approach is used to localize two types of thermal defects within a wellbore model. This approach includes a COMSOL heat transfer simulation to generate base data, a neural network to classify defect orientations, and a localization algorithm to synthesize sensor estimations into a predicted location. A small-scale physical wellbore test bed was created to verify the approach using experimental data. The classification and localization results were quantified using this experimental data. The classification predicted all experimental defect orientations correctly. The localization algorithm predicted the defect location with an average root mean square error of 1.49 in. The core contributions of this work are 1) the overall localization architecture, 2) the use of centroid-guided mean-shift clustering for localization, and 3) the experimental validation and quantification of performance.


Author(s):  
Andreas Leibetseder ◽  
Klaus Schoeffmann ◽  
Jörg Keckstein ◽  
Simon Keckstein

AbstractEndometriosis is a common gynecologic condition typically treated via laparoscopic surgery. Its visual versatility makes it hard to identify for non-specialized physicians and challenging to classify or localize via computer-aided analysis. In this work, we take a first step in the direction of localized endometriosis recognition in laparoscopic gynecology videos using region-based deep neural networks Faster R-CNN and Mask R-CNN. We in particular use and further develop publicly available data for transfer learning deep detection models according to distinctive visual lesion characteristics. Subsequently, we evaluate the performance impact of different data augmentation techniques, including selected geometrical and visual transformations, specular reflection removal as well as region tracking across video frames. Finally, particular attention is given to creating reasonable data segmentation for training, validation and testing. The best performing result surprisingly is achieved by randomly applying simple cropping combined with rotation, resulting in a mean average segmentation precision of 32.4% at 50-95% intersection over union overlap (64.2% for 50% overlap).


Mathematics ◽  
2022 ◽  
Vol 10 (2) ◽  
pp. 168
Author(s):  
Naheed Akhtar ◽  
Mubbashar Saddique ◽  
Khurshid Asghar ◽  
Usama Ijaz Bajwa ◽  
Muhammad Hussain ◽  
...  

Digital videos are now low-cost, easy to capture and easy to share on social media due to the common feature of video recording in smart phones and digital devices. However, with the advancement of video editing tools, videos can be tampered (forged) easily for propaganda or to gain illegal advantages—ultimately, the authenticity of videos shared on social media cannot be taken for granted. Over the years, significant research has been devoted to developing new techniques for detecting different types of video tampering. In this paper, we offer a detailed review of existing passive video tampering detection techniques in a systematic way. The answers to research questions prepared for this study are also elaborated. The state-of-the-art research work is analyzed extensively, highlighting the pros and cons and commonly used datasets. Limitations of existing video forensic algorithms are discussed, and we conclude with research challenges and future directions.


Author(s):  
Mukesh Kumar Gupta ◽  
Pankaj Dadheech ◽  
Ankit Kumar ◽  
Sanwta Ram Dogiwal ◽  
Ramesh Chandra Poonia ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document