• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 3
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 22
  • 22
  • 15
  • 15
  • 14
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Testing the measurement invariance of the Likert and graphic rating scales under two conditions of scale numeric presentation

Bergman, Robert D. January 2009 (has links)
Thesis (Ph.D.)--University of Nebraska-Lincoln, 2009. / Title from title screen (site viewed January 5, 2010). PDF text: viii, 65 p. : ill. ; 507 K. UMI publication number: AAT 3360158. Includes bibliographical references. Also available in microfilm and microfiche formats.
2

Testing for Exponentiality

Rai, Kamta 08 1900 (has links)
<p> Several test statistics, which are known, can be used for testing for exponentiality. A new test statistic TE is proposed. TE is based on a censored sample and is similar to Tiku's T statistic for testing for normality. The distribution of TE tends to normality with increasing sample size. Besides, TE is easy to compute and is both origin and scale invariant. The power of TE for non-exponential distributions is comparable with Shapiro & Wilk statistic W-exponential. </p> / Thesis / Master of Science (MSc)
3

Scene Analysis Using Scale Invariant Feature Extraction and Probabilistic Modeling

Shen, Yao 08 1900 (has links)
Conventional pattern recognition systems have two components: feature analysis and pattern classification. For any object in an image, features could be considered as the major characteristic of the object either for object recognition or object tracking purpose. Features extracted from a training image, can be used to identify the object when attempting to locate the object in a test image containing many other objects. To perform reliable scene analysis, it is important that the features extracted from the training image are detectable even under changes in image scale, noise and illumination. Scale invariant feature has wide applications such as image classification, object recognition and object tracking in the image processing area. In this thesis, color feature and SIFT (scale invariant feature transform) are considered to be scale invariant feature. The classification, recognition and tracking result were evaluated with novel evaluation criterion and compared with some existing methods. I also studied different types of scale invariant feature for the purpose of solving scene analysis problems. I propose probabilistic models as the foundation of analysis scene scenario of images. In order to differential the content of image, I develop novel algorithms for the adaptive combination for multiple features extracted from images. I demonstrate the performance of the developed algorithm on several scene analysis tasks, including object tracking, video stabilization, medical video segmentation and scene classification.
4

Controlling non-equilibrium dynamics in lattice gas models

Mukhamadiarov, Ruslan Ilyich 05 March 2021 (has links)
In recent years a new interesting research avenue has emerged in non-equilibrium statistical physics, namely studies of collective responses in spatially inhomogeneous systems. Whereas substantial progress has been made in understanding the origins and the often universal nature of cooperative behavior in systems far from equilibrium, it is still unclear whether it is possible to control their global collective stochastic dynamics through local manipulations. Therefore, a comprehensive characterization of spatially inhomogeneous non-equilibrium systems is required. In the first system, we explore a variant of the Katz–Lebowitz–Spohn (KLS) driven lattice gas in two dimensions, where the lattice is split into two regions that are coupled to heat baths with distinct temperatures T > T<sub>c</sub> and T<sub>c</sub> respectively, where T<sub>c</sub> indicates the critical temperature for phase ordering. The geometry was arranged such that the temperature boundaries are oriented perpendicular or parallel to the external particle drive and resulting net current. For perpendicular orientation of the temperature boundaries, in the hotter region, the system behaves like the (totally) asymmetric exclusion processes (TASEP), and experiences particle blockage in front of the interface to the critical region. This blockage is induced by extended particle clusters, growing logarithmically with system size, in the critical region. We observe the density profiles in both high- and low-temperature subsystems to be similar to the well-characterized coexistence and maximal-current phases in (T)ASEP models with open boundary conditions, which are respectively governed by hyperbolic and trigonometric tangent functions. Yet if the lower temperature is set to T<sub>c</sub>, we detect marked fluctuation corrections to the mean-field density profiles, e.g., the corresponding critical KLS power-law density decay near the interfaces into the cooler region. For parallel orientation of the temperature boundaries, we have explored the changes in the dynamical behavior of the hybrid KLS model that are induced by our choice of the hopping rates across the temperature boundaries. If these hopping rates at the interfaces satisfy particle-hole symmetry, the current difference across them generates a vector flow diagram akin to an infinite flat vortex sheet. We have studied the finite-size scaling of the particle density fluctuations in both temperature regions, and observed that it is controlled by the respective temperature values. If the colder subsystem is maintained at the KLS critical temperature, while the hotter subsystem's temperature is set much higher, the interface current greatly suppresses particle exchange between the two regions. As a result of the ensuing effective subsystem decoupling, strong fluctuations persist in the critical region, whence the particle density fluctuations scale with the KLS critical exponents. However, if both temperatures are set well above the critical temperature, the particle density fluctuations scale according to the totally asymmetric exclusion process. We have also measured the entropy production rate in both subsystems; it displays intriguing algebraic decay in the critical region, while it saturates quickly at a small but non-zero level in the hotter region. The second system is a lattice gas that simulates the spread of COVID-19 epidemics using the paradigmatic stochastic Susceptible-Infectious-Recovered (SIR) model. In our effort to control the spread of the infection of a lattice, we robustly find that the intensity and spatial spread on the epidemic recurrence wave can be limited to a manageable extent provided release of these restrictions is delayed sufficiently (for a duration of at least thrice the time until the peak of the unmitigated outbreak). / Doctor of Philosophy / In recent years a new interesting research avenue has emerged in far-from-equilibrium statistical physics, namely studies of collective behavior in spatially non-uniform systems. Whereas substantial progress has been made in understanding the origins and the often universal nature of cooperative behavior in systems far from equilibrium, it is still unclear whether it is possible to control their global collective and randomly determined dynamics through local manipulations. Therefore, a comprehensive characterization of spatially non-uniform systems out of equilibrium is required. In the first system, we explore a variant of the two-dimensional lattice gas with completely biased diffusion in one direction and attractive particle interactions. By lattice gas we mean a lattice filled with particles that can hop on nearest-neighbor empty sites. The system we are considering is a lattice that is split into two regions, which in turn are maintained at distinct temperatures T > T<sub>c</sub> and T<sub>c</sub>, respectively, with T<sub>c</sub> indicating the critical temperature for the second-order phase transition. The geometry of the lattice was arranged such that the temperature boundaries are oriented perpendicular or parallel to the external particle drive that is responsible for a completely biased diffusion. When the temperature boundaries are oriented perpendicular to the drive, in the hotter region with temperature T > T<sub>c</sub>, the system evolves as if there are no attractive interactions between the particles, and experiences particle blockage in front of the temperature boundary from the hotter region held at T>T<sub>c</sub> to the critical region held at T<sub>c</sub>. This accumulation of particles at the temperature boundary is induced by elongated collections of particle, i.e., particle clusters in the critical region. We observe the particle density profiles (ρ(x) vs x plots) in both high-and low-temperature subsystems to be similar to the density profiles found for other well-characterized (T)ASEP models with open boundary conditions, which are in the coexistence and maximal-current phases, and which are respectively governed by hyperbolic and trigonometric tangent functions. Yet if the lower temperature is set to T<sub>c</sub>, we detect marked corrections to the hyperbolic and trigonometric tangent-like density profiles due to fluctuations, e.g., we observe the algebraic power-law decay of the density near the interfaces into the cooler region with the critical KLS exponent. For a parallel orientation of the temperature boundaries, we have explored the changes in the particle dynamics of the two-temperature KLS model that are induced by our choice of the particle hopping rates across the temperature boundaries. If these particle hopping rates at the temperature interfaces satisfy particle-hole symmetry (i.e. remain unchanged when particles are replaced with holes and vice versa), the particle current difference across them generates a current vector flow diagram akin to an infinite flat vortex sheet. We have studied how the particle density fluctuations in both temperature regions scale with the system size, and observed that the scaling is controlled by the respective temperature values. If the colder subsystem is maintained at the KLS critical temperature T<sub>cold</sub> = T<sub>c</sub>, while the hotter subsystem's temperature is set much higher T<sub>hot</sub> >> T<sub>c</sub>, the particle currents at the interface greatly suppresses particle exchange between the two temperature regions. As a result of the ensuing effective subsystem separation from each other, strong fluctuations persist in the critical region, whence the particle density fluctuations scale with the KLS critical exponents. However, if both temperatures are set well above the critical temperature, the particle density fluctuations scale with different scaling exponents, that fall into the totally asymmetric exclusion process (TASEP) universality class. We have also measured the rate of the entropy production in both subsystems; it displays intriguing algebraic decay in the critical region, while it reaches quickly a small but non-zero value in the hotter region. The second system is a lattice filled with particles of different types that hop around the lattice and are subjected to different sorts of reactions. That process simulates the spread of the COVID-19 epidemic using the paradigmatic random-process-based Susceptible-Infectious-Recovered (SIR) model. In our effort to control the spread of the infection of a lattice, we robustly find that the intensity and spatial spread of the epidemic second wave can be limited to a manageable extent provided release of these restrictions is delayed sufficiently (for a duration of at least thrice the time until the peak of the unmitigated outbreak).
5

Compression vidéo très bas débit par analyse du contenu / Low bitrate video compression by content characterization

Decombas, Marc 22 November 2013 (has links)
L’objectif de cette thèse est de trouver de nouvelles méthodes de compression sémantique compatible avec un encodeur classique tel que H.264/AVC. . L’objectif principal est de maintenir la sémantique et non pas la qualité globale. Un débit cible de 300 kb/s a été fixé pour des applications de sécurité et de défense Pour cela une chaine complète de compression a dû être réalisée. Une étude et des contributions sur les modèles de saillance spatio-temporel ont été réalisées avec pour objectif d’extraire l’information pertinente. Pour réduire le débit, une méthode de redimensionnement dénommée «seam carving » a été combinée à un encodeur H.264/AVC. En outre, une métrique combinant les points SIFT et le SSIM a été réalisée afin de mesurer la qualité des objets sans être perturbée par les zones de moindre contenant la majorité des artefacts. Une base de données pouvant être utilisée pour des modèles de saillance mais aussi pour de la compression est proposée avec des masques binaires. Les différentes approches ont été validées par divers tests. Une extension de ces travaux pour des applications de résumé vidéo est proposée. / The objective of this thesis is to find new methods for semantic video compatible with a traditional encoder like H.264/AVC. The main objective is to maintain the semantic and not the global quality. A target bitrate of 300 Kb/s has been fixed for defense and security applications. To do that, a complete chain of compression has been proposed. A study and new contributions on a spatio-temporal saliency model have been done to extract the important information in the scene. To reduce the bitrate, a resizing method named seam carving has been combined with the H.264/AVC encoder. Also, a metric combining SIFT points and SSIM has been created to measure the quality of objects without being disturbed by less important areas containing mostly artifacts. A database that can be used for testing the saliency model but also for video compression has been proposed, containing sequences with their manually extracted binary masks. All the different approaches have been thoroughly validated by different tests. An extension of this work on video summary application has also been proposed.
6

[en] COMPUTATIONAL INTELLIGENCE TECHNIQUES FOR VISUAL SELF-LOCALIZATION AND MAPPING OF MOBILE ROBOTS / [pt] LOCALIZAÇÃO E MAPEAMENTO DE ROBÔS MÓVEIS UTILIZANDO INTELIGÊNCIA E VISÃO COMPUTACIONAL

NILTON CESAR ANCHAYHUA ARESTEGUI 18 October 2017 (has links)
[pt] Esta dissertação introduz um estudo sobre os algoritmos de inteligência computacional para o controle autônomo dos robôs móveis, Nesta pesquisa, são desenvolvidos e implementados sistemas inteligentes de controle de um robô móvel construído no Laboratório de Robótica da PUC-Rio, baseado numa modificação do robô ER1. Os experimentos realizados consistem em duas etapas: a primeira etapa de simulação usando o software Player-Stage de simulação do robô em 2-D onde foram desenvolvidos os algoritmos de navegação usando as técnicas de inteligência computacional; e a segunda etapa a implementação dos algoritmos no robô real. As técnicas implementadas para a navegação do robô móvel estão baseadas em algoritmos de inteligência computacional como são redes neurais, lógica difusa e support vector machine (SVM) e para dar suporte visual ao robô móvel foi implementado uma técnica de visão computacional chamado Scale Invariant Future Transform (SIFT), estes algoritmos em conjunto fazem um sistema embebido para dotar de controle autônomo ao robô móvel. As simulações destes algoritmos conseguiram o objetivo, mas na implementação surgiram diferenças muito claras respeito à simulação pelo tempo que demora em processar o microprocessador. / [en] This theses introduces a study on the computational intelligence algorithms for autonomous control of mobile robots, In this research, intelligent systems are developed and implemented for a robot in the Robotics Laboratory of PUC-Rio, based on a modiÞcation of the robot ER1. The verification consist of two stages: the first stage includes simulation using Player-Stage software for simulation of the robot in 2-D with the developed of artiÞcial intelligence; an the second stage, including the implementation of the algorithms in the real robot. The techniques implemented for the navigation of the mobile robot are based on algorithms of computational intelligence as neural networks, fuzzy logic and support vector machine (SVM); and to give visual support to the mobile robot was implemented the visual algorithm called Scale Invariant Future Transform (SIFT), these algorithms in set makes an absorbed system to endow with independent control the mobile robot. The simulations of these algorithms had obtained the objective but in the implementation clear differences had appeared respect to the simulation, it just for the time that delays in processing the microprocessor.
7

Real-time Hand Gesture Detection and Recognition for Human Computer Interaction

Dardas, Nasser Hasan Abdel-Qader 08 November 2012 (has links)
This thesis focuses on bare hand gesture recognition by proposing a new architecture to solve the problem of real-time vision-based hand detection, tracking, and gesture recognition for interaction with an application via hand gestures. The first stage of our system allows detecting and tracking a bare hand in a cluttered background using face subtraction, skin detection and contour comparison. The second stage allows recognizing hand gestures using bag-of-features and multi-class Support Vector Machine (SVM) algorithms. Finally, a grammar has been developed to generate gesture commands for application control. Our hand gesture recognition system consists of two steps: offline training and online testing. In the training stage, after extracting the keypoints for every training image using the Scale Invariance Feature Transform (SIFT), a vector quantization technique will map keypoints from every training image into a unified dimensional histogram vector (bag-of-words) after K-means clustering. This histogram is treated as an input vector for a multi-class SVM to build the classifier. In the testing stage, for every frame captured from a webcam, the hand is detected using my algorithm. Then, the keypoints are extracted for every small image that contains the detected hand posture and fed into the cluster model to map them into a bag-of-words vector, which is fed into the multi-class SVM classifier to recognize the hand gesture. Another hand gesture recognition system was proposed using Principle Components Analysis (PCA). The most eigenvectors and weights of training images are determined. In the testing stage, the hand posture is detected for every frame using my algorithm. Then, the small image that contains the detected hand is projected onto the most eigenvectors of training images to form its test weights. Finally, the minimum Euclidean distance is determined among the test weights and the training weights of each training image to recognize the hand gesture. Two application of gesture-based interaction with a 3D gaming virtual environment were implemented. The exertion videogame makes use of a stationary bicycle as one of the main inputs for game playing. The user can control and direct left-right movement and shooting actions in the game by a set of hand gesture commands, while in the second game, the user can control and direct a helicopter over the city by a set of hand gesture commands.
8

Real-time Hand Gesture Detection and Recognition for Human Computer Interaction

Dardas, Nasser Hasan Abdel-Qader 08 November 2012 (has links)
This thesis focuses on bare hand gesture recognition by proposing a new architecture to solve the problem of real-time vision-based hand detection, tracking, and gesture recognition for interaction with an application via hand gestures. The first stage of our system allows detecting and tracking a bare hand in a cluttered background using face subtraction, skin detection and contour comparison. The second stage allows recognizing hand gestures using bag-of-features and multi-class Support Vector Machine (SVM) algorithms. Finally, a grammar has been developed to generate gesture commands for application control. Our hand gesture recognition system consists of two steps: offline training and online testing. In the training stage, after extracting the keypoints for every training image using the Scale Invariance Feature Transform (SIFT), a vector quantization technique will map keypoints from every training image into a unified dimensional histogram vector (bag-of-words) after K-means clustering. This histogram is treated as an input vector for a multi-class SVM to build the classifier. In the testing stage, for every frame captured from a webcam, the hand is detected using my algorithm. Then, the keypoints are extracted for every small image that contains the detected hand posture and fed into the cluster model to map them into a bag-of-words vector, which is fed into the multi-class SVM classifier to recognize the hand gesture. Another hand gesture recognition system was proposed using Principle Components Analysis (PCA). The most eigenvectors and weights of training images are determined. In the testing stage, the hand posture is detected for every frame using my algorithm. Then, the small image that contains the detected hand is projected onto the most eigenvectors of training images to form its test weights. Finally, the minimum Euclidean distance is determined among the test weights and the training weights of each training image to recognize the hand gesture. Two application of gesture-based interaction with a 3D gaming virtual environment were implemented. The exertion videogame makes use of a stationary bicycle as one of the main inputs for game playing. The user can control and direct left-right movement and shooting actions in the game by a set of hand gesture commands, while in the second game, the user can control and direct a helicopter over the city by a set of hand gesture commands.
9

Real-time Hand Gesture Detection and Recognition for Human Computer Interaction

Dardas, Nasser Hasan Abdel-Qader January 2012 (has links)
This thesis focuses on bare hand gesture recognition by proposing a new architecture to solve the problem of real-time vision-based hand detection, tracking, and gesture recognition for interaction with an application via hand gestures. The first stage of our system allows detecting and tracking a bare hand in a cluttered background using face subtraction, skin detection and contour comparison. The second stage allows recognizing hand gestures using bag-of-features and multi-class Support Vector Machine (SVM) algorithms. Finally, a grammar has been developed to generate gesture commands for application control. Our hand gesture recognition system consists of two steps: offline training and online testing. In the training stage, after extracting the keypoints for every training image using the Scale Invariance Feature Transform (SIFT), a vector quantization technique will map keypoints from every training image into a unified dimensional histogram vector (bag-of-words) after K-means clustering. This histogram is treated as an input vector for a multi-class SVM to build the classifier. In the testing stage, for every frame captured from a webcam, the hand is detected using my algorithm. Then, the keypoints are extracted for every small image that contains the detected hand posture and fed into the cluster model to map them into a bag-of-words vector, which is fed into the multi-class SVM classifier to recognize the hand gesture. Another hand gesture recognition system was proposed using Principle Components Analysis (PCA). The most eigenvectors and weights of training images are determined. In the testing stage, the hand posture is detected for every frame using my algorithm. Then, the small image that contains the detected hand is projected onto the most eigenvectors of training images to form its test weights. Finally, the minimum Euclidean distance is determined among the test weights and the training weights of each training image to recognize the hand gesture. Two application of gesture-based interaction with a 3D gaming virtual environment were implemented. The exertion videogame makes use of a stationary bicycle as one of the main inputs for game playing. The user can control and direct left-right movement and shooting actions in the game by a set of hand gesture commands, while in the second game, the user can control and direct a helicopter over the city by a set of hand gesture commands.
10

A Programming Framework To Implement Rule-based Target Detection In Images

Sahin, Yavuz 01 December 2008 (has links) (PDF)
An expert system is useful when conventional programming techniques fall short of capturing human expert knowledge and making decisions using this information. In this study, we describe a framework for capturing expert knowledge under a decision tree form and this framework can be used for making decisions based on captured knowledge. The framework proposed in this study is generic and can be used to create domain specific expert systems for different problems. Features are created or processed by the nodes of decision tree and a final conclusion is reached for each feature. Framework supplies 3 types of nodes to construct a decision tree. First type is the decision node, which guides the search path with its answers. Second type is the operator node, which creates new features using the inputs. Last type of node is the end node, which corresponds to a conclusion about a feature. Once the nodes of the tree are developed, then user can interactively create the decision tree and run the supplied inference engine to collect the result on a specific problem. The framework proposed is experimented with two case studies / &quot / Airport Runway Detection in High Resolution Satellite Images&quot / and &quot / Urban Area Detection in High Resolution Satellite Images&quot / . In these studies linear features are used for structural decisions and Scale Invariant Feature Transform (SIFT) features are used for testing existence of man made structures.

Page generated in 0.0548 seconds