• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 165
  • 34
  • 14
  • 9
  • 4
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 280
  • 280
  • 77
  • 74
  • 46
  • 43
  • 38
  • 33
  • 33
  • 32
  • 31
  • 28
  • 26
  • 25
  • 25
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

Towards a Polyalgorithm for Land Use and Land Cover Change Detection

Saxena, Rishu 23 February 2018 (has links)
Earth observation satellites (EOS) such as Landsat provide image datasets that can be immensely useful in numerous application domains. One way of analyzing satellite images for land use and land cover change (LULCC) is time series analysis (TSA). Several algorithms for time series analysis have been proposed by various groups in remote sensing; more algorithms (that can be adapted) are available in the general time series literature. However, in spite of an abundance of algorithms, the choice of algorithm to be used for analyzing an image stack is presently an open question. A concurrent issue is the prohibitive size of Landsat datasets, currently of the order of petabytes and growing. This makes them computationally unwieldy --- both in storage and processing. An EOS image stack typically consists of multiple images of a fixed area on the Earth's surface (same latitudes and longitudes) taken at different time points. Experiments on multicore servers indicate that carrying out meaningful time series analysis on one such interannual, multitemporal stack with existing state of the art codes can take several days. This work proposes using multiple algorithms to analyze a given image stack in a polyalgorithmic framework. A polyalgorithm combines several basic algorithms, each meant to solve the same problem, producing a strategy that unites the strengths and circumvents the weaknesses of constituent algorithms. The foundation of the proposed TSA based polyalgorithm is laid using three algorithms (LandTrendR, EWMACD, and BFAST). These algorithms are precisely described mathematically, and chosen to be fundamentally distinct from each other in design and in the phenomena they capture. Analysis of results representing success, failure, and parameter sensitivity for each algorithm is presented. Scalability issues, important for real simulations, are also discussed, along with scalable implementations, and speedup results. For a given pixel, Hausdorff distance is used to compare the distance between the change times (breakpoints) obtained from two different algorithms. Timesync validation data, a dataset that is based on human interpretation of Landsat time series in concert with historical aerial photography, is used for validation. The polyalgorithm yields more accurate results than EWMACD and LandTrendR alone, but counterintuitively not better than BFAST alone. This nascent work will be directly useful in land use and land cover change studies, of interest to terrestrial science research, especially regarding anthropogenic impacts on the environment, and in much broader applications such as health monitoring and urban transportation. / M. S.
142

Monitoring Property Boundaries for the Appalachian National Scenic Trail Using Satellite Images

Hutchings, James Forrest 06 May 2005 (has links)
The Appalachian National Scenic Trail is a unit of the National Park System created by the National Trails Act of 1968. Commonly referred to as the Appalachian Trail, or the AT, this National Park has some of the longest boundaries of any park. The AT is routed more than 2000 miles along the mountains of the eastern United States. The land purchased for the protection of the AT creates a separate boundary on each side of the trail. Monitoring these boundaries for intrusions or encroachments is a difficult and time-consuming task when done totally by field methods. This thesis presents a more efficient and consistent monitoring process using remote sensing data and change detection algorithms. Using Landsat TM images, Normalized Difference Vegetation Index (NDVI), and image difference change detection, this research shows that major boundary encroachments can be detected. Detection of sub-pixel vegetation index decreases identifies specific locations for field inspection. Assuming low cost multispectral Landsat imagery is available, simple NDVI difference calculation allows this technique to be applied to the entire AT one or more times per year. This procedure would improve the response time for encroachment mediation. The producer's accuracy for finding possible encroachments was 100 percent and the consumer's accuracy for possible encroachments indicated was 78.3 percent. Due to limited image availability, this study only examines change between one pair of Landsat images. Further refinement of these techniques should investigate other Landsat images at other times. Use of other remote sensing systems and change detection algorithms could be the focus of further research. / Master of Science
143

Efficient end-to-end monitoring for fault management in distributed systems / La surveillance efficace de bout-à-bout pour la gestion des pannes dans les systèmes distribués

Feng, Dawei 27 March 2014 (has links)
Dans cette thèse, nous présentons notre travail sur la gestion des pannes dans les systèmes distribués, avec comme motivation principale le suivi de fautes et de changements brusques dans de grands systèmes informatiques comme la grille et le cloud.Au lieu de construire une connaissance complète a priori du logiciel et des infrastructures matérielles comme dans les méthodes traditionnelles de détection ou de diagnostic, nous proposons d'utiliser des techniques spécifiques pour effectuer une surveillance de bout en bout dans des systèmes de grande envergure, en laissant les détails inaccessibles des composants impliqués dans une boîte noire.Pour la surveillance de pannes d'un système distribué, nous modélisons tout d'abord cette application basée sur des sondes comme une tâche de prédiction statique de collaboration (CP), et démontrons expérimentalement l'efficacité des méthodes de CP en utilisant une méthode de la max margin matrice factorisation. Nous introduisons en outre l’apprentissage actif dans le cadre de CP et exposons son avantage essentiel dans le traitement de données très déséquilibrées, ce qui est particulièrement utile pour identifier la class de classe de défaut de la minorité.Nous étendons ensuite la surveillance statique de défection au cas séquentiel en proposant la méthode de factorisation séquentielle de matrice (SMF). La SMF prend une séquence de matrices partiellement observées en entrée, et produit des prédictions comportant des informations à la fois sur les fenêtres temporelles actuelle et passé. L’apprentissage actif est également utilisé pour la SMF, de sorte que les données très déséquilibrées peuvent être traitées correctement. En plus des méthodes séquentielles, une action de lissage pris sur la séquence d'estimation s'est avérée être une astuce pratique utile pour améliorer la performance de la prédiction séquentielle.Du fait que l'hypothèse de stationnarité utilisée dans le surveillance statique et séquentielle devient irréaliste en présence de changements brusques, nous proposons un framework en ligne semi-Supervisé de détection de changement (SSOCD) qui permette de détecter des changements intentionnels dans les données de séries temporelles. De cette manière, le modèle statique du système peut être recalculé une fois un changement brusque est détecté. Dans SSOCD, un procédé hors ligne non supervisé est proposé pour analyser un échantillon des séries de données. Les points de changement ainsi détectés sont utilisés pour entraîner un modèle en ligne supervisé, qui fournit une décision en ligne concernant la détection de changement à parti de la séquence de données en entrée. Les méthodes de détection de changements de l’état de l’art sont utilisées pour démontrer l'utilité de ce framework.Tous les travaux présentés sont vérifiés sur des ensembles de données du monde réel. Plus précisément, les expériences de surveillance de panne sont effectuées sur un ensemble de données recueillies auprès de l’infrastructure de grille Biomed faisant partie de l’European Grid Initiative et le framework de détection de changement brusque est vérifié sur un ensemble de données concernant le changement de performance d'un site en ligne ayant un fort trafic. / In this dissertation, we present our work on fault management in distributed systems, with motivating application roots in monitoring fault and abrupt change of large computing systems like the grid and the cloud. Instead of building a complete a priori knowledge of the software and hardware infrastructures as in conventional detection or diagnosis methods, we propose to use appropriate techniques to perform end-To-End monitoring for such large scale systems, leaving the inaccessible details of involved components in a black box.For the fault monitoring of a distributed system, we first model this probe-Based application as a static collaborative prediction (CP) task, and experimentally demonstrate the effectiveness of CP methods by using the max margin matrix factorization method. We further introduce active learning to the CP framework and exhibit its critical advantage in dealing with highly imbalanced data, which is specially useful for identifying the minority fault class.Further we extend the static fault monitoring to the sequential case by proposing the sequential matrix factorization (SMF) method. SMF takes a sequence of partially observed matrices as input, and produces predictions with information both from the current and history time windows. Active learning is also employed to SMF, such that the highly imbalanced data can be coped with properly. In addition to the sequential methods, a smoothing action taken on the estimation sequence has shown to be a practically useful trick for enhancing sequential prediction performance.Since the stationary assumption employed in the static and sequential fault monitoring becomes unrealistic in the presence of abrupt changes, we propose a semi-Supervised online change detection (SSOCD) framework to detect intended changes in time series data. In this way, the static model of the system can be recomputed once an abrupt change is detected. In SSOCD, an unsupervised offline method is proposed to analyze a sample data series. The change points thus detected are used to train a supervised online model, which gives online decision about whether there is a change presented in the arriving data sequence. State-Of-The-Art change detection methods are employed to demonstrate the usefulness of the framework.All presented work is verified on real-World datasets. Specifically, the fault monitoring experiments are conducted on a dataset collected from the Biomed grid infrastructure within the European Grid Initiative, and the abrupt change detection framework is verified on a dataset concerning the performance change of an online site with large amount of traffic.
144

Spatial and temporal processing biases in visual working memory in specific anxiety

Reinecke, Andrea 12 April 2007 (has links) (PDF)
BACKGROUND.One group of theories aiming at providing a framework explaining the etiology, maintenance and phenomenology of anxiety disorders is classified as cognitive models of anxiety. These approaches assume that distortions in specific levels of information processing are relevant for the onset and maintenance of the disorder. A detailed knowledge about the nature of these distortions would have important implications for the therapy of anxiety, as the implementation of confrontative or cognitive elements precisely fitting the distortions might enhance efficacy. Still, these models and related empirical evidence provide conflicting assumptions about the nature of disorder-linked processing distortions. Many cognitive models of anxiety (e.g., Fox, Russo, & Dutton, 2002; Mathews & Mackintosh, 1998; Williams, Watts, MacLeod, & Mathews, 1997) postulate that anxiety-linked biases of attention imply hypervigilance to threat and distractibility from other stimuli in the presence of feared materials. This is convincingly confirmed by various experimentalclinical studies assessing attention for threat in anxious participants compared to non-anxious controls (for a review, seeMathews &MacLeod, 2005). In contrast, assumptions concerning anxiety-linked biased memory for threat are less convincing; based on the shared tendency for avoidance of deeper elaboration in anxiety disorders, some models predict memory biases only for implicit memory tasks (Williams et al., 1997) or even disclaim the relevance of memory in anxiety at all (e.g., Mogg, Bradley, Miles, & Dixon, 2004). Other theories restrict the possibility of measuring disorder-specific memory biases to tasks that require merely perceptual encoding of the materials instead of verbal-conceptual memory (e.g., Fox et al., 2002; Mathews &Mackintosh, 1998). On the one hand, none of these models has integrated all the inconsistencies in empirical data on the topic. On the other hand, the numerous empirical studies on memory in anxiety that have been conducted with varying materials, anxiety disorders, encoding and retrieval conditions do not allow final conclusions about the prerequisites for finding memory biases (for a review, see MacLeod & Mathews, 2004). A more detailed investigation of the complete spectrum of memory for threat utilizing carefully controlled variations of depth of encoding and materials is needed. In view of these inconsistencies, it is all the more surprising that one important part of this spectrum has so far remained completely uninvestigated: visual working memory (VWM). No study has ever differentially addressed VWM for threat in anxious vs. nonanxious participants and none of the cognitive models of anxiety provides any predictions concerning this stage of information processing. Research on cognitive biases in anxiety has thus far only addressed the two extremes of the processing continuum: attention and longer-term memory. In between, a gap remains, the bridging of which might bring us closer to defining the prerequisites of memory biases in anxiety. As empirical research has provided substantial and coherent knowledge concerning attention in anxiety, and as attention and VWM are so closely linked (see, for instance, Cowan, 1995), the thorough investigation of VWM may provide important clues for models of anxiety. Is anxiety related to VWM biases favoring the processing of threatening information, or does the avoidance presumed by cognitive models of anxiety already begin at this stage? RESEARCH AIMS. To investigate the relevance of biased VWM in anxiety, the present research focused in eight experiments on the following main research questions: (1) Is threat preferably stored in VWM in anxious individuals? (2) Does threat preference occur at the cost of the storage of other items, or is extra storage capacity provided? (3) Would the appearance of threat interrupt ongoing encoding of non-threatening items? (4) Does prioritized encoding of threat in anxiety occur strategically or automatically? (5) Are disorder-specific VWM biases also materials-specific? (6) Are VWM biases in anxiety modifiable through cognitive-behavioral therapy? METHODS. In Experiments 1-4, a spatial-sequential cueing paradigm was used. A subset of real-object display items was successively cued on each trial by a sudden change of the picture background for 150 ms each. After the cueing, one of the display pictures was hidden and probed for a memory test. On most trials, a cued item was tested, and memory accuracy was determined depending on the item’s position within the cue string and depending on its valence. In some cases, memory for an uncued item was tested. Experiment 1 and 2 were directed at discovering whether spider fearfuls and non-anxious controls would differ with respect to the accuracy in memorizing cued spiders and uncued spiders and, thus, reveal disorder-specific biases of VWM. In addition, the question whether the presence of a spider image is related to costs for the memorization of other images was tested. Experiment 3 addressed whether any disorder-specific VWM biases found earlier were specific to the feared spiders. Therefore, the critical stimuli here were a snake and a spider. Participants were spider fearfuls and non-anxious controls, both without snake anxiety. In Experiment 4, it was tested whether disorder-specific biases found in Experiment 1 and 2 were modifiable through cognitive-behavioral treatment. The critical stimulus was a spider image. Spider fearfuls were tested three times. Half of them received a cognitive-behavioral intervention after the first test, the other half only after the second test. In two additional experiments, VWM was assessed with a change-detection paradigm. The main aim was to clarify whether disorder-specific effects found in the previous experiments were associated with automatic or with strategic selective encoding of threatening materials, and whether any group differences in spider change detection were materials-specific to spiders, but not to snakes. In Experiment 5, several images were presented simultaneously in a study display for either 100 or 500 milliseconds. After a short interruption, a test display was presented including either the same items as the first one or one changed item. Participants’ accuracy in determining whether displays were the same or different was measured depending on the valence of the changed item, set size, and presentation time of the display. There were trials with and without spiders. If a change was made, it could involve either a non-spider or a spider item. Of specific interest was the condition in which a spider image was presented initially, but not in the test phase, as noticing this specific change would require storage of that image in VWM. Would group differences be particularly pronounced in the shorter encoding condition suggesting automatic encoding of threat, or would they occur in the longer encoding condition, suggesting strategic encoding of spiders? In Experiment 6, change detection accuracy for spiders vs. snakes was tested. The participants in both experiments were spider fearfuls vs. controls, but those of Experiment 6 were additionally required to lack snake anxiety. Moreover, a temporal VWM paradigm - an attentional blink task - was applied to assess whether a biased encoding of spider images in spider fearfuls would occur at the expense of non-threatening items undergoing concurrent processing, and whether this effect was specific to spiders, but not to snakes. Series of real-object pictures were presented at rates of 80 ms at the display center. The observer’s task was to identify and report the two target pictures indicated by a brighter background. In Experiment 7, the first target always depicted a neutral item. The valence of the second target was varied - either negative depicting a spider, positive, or neutral. Participants varied with respect to their spider anxiety. In Experiment 8, spider fearfuls and non-anxious controls, both without snake anxiety, were tested. The experiment was nearly the same as the previous one, but two negative target types were tested: disorder-relevant spiders and negative but not feared snakes. Of specific interest was whether the appearance of a threatening target would reduce the report probability of the earlier attended target, indicating the interruption of its VWM encoding in favor of the threat item. RESULTS. (1) Both anxious and non-anxious controls, showed VWM advantages for negative materials such as spider or snake images. (2) In addition, there were disorderspecific VWM biases: some effects were larger in spider fearfuls than in non-anxious controls and some effects occurred exclusively in spider fearfuls. (3) Group differences and, thus, disorder-specificity were particularly pronounced under competitive circumstances, that is, under the condition of numerous stimuli competing for processing resources: when only little orientation time was allowed, when only little time was provided for selecting and encoding items from a crowd, and when VWMfor the critical item required reflexive instead of voluntary attention. (4) Pronounced memory for task-relevant, voluntarily attended spiders was related to difficulties in disengaging attention from these items in the fearful group, reflected in reduced memory accuracy for the item following it. (5) Disorder-specific VWM biases seem to be based on attentional biases to threatening materials resulting in a very quick, automatic memory consolidation. However, this preferential encoding was not at the cost of neutral materials currently undergoing encoding processes. (6) All disorder-specific VWM biases occured only with fear-related materials, not with other negative materials. (7) Automatic and highly disorder-specific fear-related VWM biases – but not strategic VWM biases occuring in both groups - were modifiable through cognitive-behavioral intervention. CONCLUSIONS. This work provides additional information about informationprocessing distortions related to specific anxiety. With the experimental investigation of biased VWM, this work has been performed to fill a gap within research on cognitive biases in anxiety. Moreover, this dissertation contributes to cognitive theories of anxiety by proposing several recommendations for refinements of current theoretical approaches. Most important, it was suggested to extend existing models by a more detailed consideration of attention and memory. In view of numerous previous empirical studies on the topic and the conclusions of this dissertation, a differentiation of the attentional engagement and disengagement component appears inevitable. Even more important, in view of the data presented here predictions concerning VWM for threatening materials need to be taken into account. In addition, suggestions are provided for the differential consideration of biases occuring from prepotent threat value of negative stimuli vs. individual threat value. A proposal for a cognitive model of anxiety extended by all these aspects is provided to serve as an invitation of further research in the investigation of the nature of memory biases in anxiety disorders. REFERENCES: Cowan, N. (1995). Attention and Memory. An integrated framework.New York: Oxford University Press. Fox, E., Russo, R., & Dutton, K. (2002). Attentional bias for threat: Evidence for delayed disengagement from emotional faces. Cognition and Emotion, 16, 355-379. MacLeod, C., & Mathews, A. (2004). Selective memory effects in anxiety disorders: An overview of research findings and their implications. In D. Reisberg & P. Hertel (eds.), Memory and Emotion. Oxford: Oxford University Press. Mathews, A., & Mackintosh, B. (1998). A cognitive model of selective processing in anxiety. Cognitive Therapy and Research, 22 (6), 539-560. Mathews, A., & MacLeod, C. (2005). Cognitive vulnerability to emotional disorders. Annual Review of Clinical Psychology, 1, 167-195.Mathews, Mogg, May, & Eysenck (1989). Mogg, K., Bradley, B.P., Miles, F., & Dixon, R. (2004). Time course of attentional bias for threat scenes: Testing the vigilance avoidance hypothesis. Cognition and Emotion, 18(5), 689-700. Williams, J.M.G., Watts, F.N., MacLeod, C., & Mathews, A. (1997). Cognitive psychology and emotional disorders. Chichester: John Wiley.
145

Efficient end-to-end monitoring for fault management in distributed systems

Feng, Dawei 27 March 2014 (has links) (PDF)
In this dissertation, we present our work on fault management in distributed systems, with motivating application roots in monitoring fault and abrupt change of large computing systems like the grid and the cloud. Instead of building a complete a priori knowledge of the software and hardware infrastructures as in conventional detection or diagnosis methods, we propose to use appropriate techniques to perform end-to-end monitoring for such large scale systems, leaving the inaccessible details of involved components in a black box.For the fault monitoring of a distributed system, we first model this probe-based application as a static collaborative prediction (CP) task, and experimentally demonstrate the effectiveness of CP methods by using the max margin matrix factorization method. We further introduce active learning to the CP framework and exhibit its critical advantage in dealing with highly imbalanced data, which is specially useful for identifying the minority fault class.Further we extend the static fault monitoring to the sequential case by proposing the sequential matrix factorization (SMF) method. SMF takes a sequence of partially observed matrices as input, and produces predictions with information both from the current and history time windows. Active learning is also employed to SMF, such that the highly imbalanced data can be coped with properly. In addition to the sequential methods, a smoothing action taken on the estimation sequence has shown to be a practically useful trick for enhancing sequential prediction performance.Since the stationary assumption employed in the static and sequential fault monitoring becomes unrealistic in the presence of abrupt changes, we propose a semi-supervised online change detection (SSOCD) framework to detect intended changes in time series data. In this way, the static model of the system can be recomputed once an abrupt change is detected. In SSOCD, an unsupervised offline method is proposed to analyze a sample data series. The change points thus detected are used to train a supervised online model, which gives online decision about whether there is a change presented in the arriving data sequence. State-of-the-art change detection methods are employed to demonstrate the usefulness of the framework.All presented work is verified on real-world datasets. Specifically, the fault monitoring experiments are conducted on a dataset collected from the Biomed grid infrastructure within the European Grid Initiative, and the abrupt change detection framework is verified on a dataset concerning the performance change of an online site with large amount of traffic.
146

Spatial and temporal processing biases in visual working memory in specific anxiety

Reinecke, Andrea 10 April 2007 (has links)
BACKGROUND.One group of theories aiming at providing a framework explaining the etiology, maintenance and phenomenology of anxiety disorders is classified as cognitive models of anxiety. These approaches assume that distortions in specific levels of information processing are relevant for the onset and maintenance of the disorder. A detailed knowledge about the nature of these distortions would have important implications for the therapy of anxiety, as the implementation of confrontative or cognitive elements precisely fitting the distortions might enhance efficacy. Still, these models and related empirical evidence provide conflicting assumptions about the nature of disorder-linked processing distortions. Many cognitive models of anxiety (e.g., Fox, Russo, & Dutton, 2002; Mathews & Mackintosh, 1998; Williams, Watts, MacLeod, & Mathews, 1997) postulate that anxiety-linked biases of attention imply hypervigilance to threat and distractibility from other stimuli in the presence of feared materials. This is convincingly confirmed by various experimentalclinical studies assessing attention for threat in anxious participants compared to non-anxious controls (for a review, seeMathews &MacLeod, 2005). In contrast, assumptions concerning anxiety-linked biased memory for threat are less convincing; based on the shared tendency for avoidance of deeper elaboration in anxiety disorders, some models predict memory biases only for implicit memory tasks (Williams et al., 1997) or even disclaim the relevance of memory in anxiety at all (e.g., Mogg, Bradley, Miles, & Dixon, 2004). Other theories restrict the possibility of measuring disorder-specific memory biases to tasks that require merely perceptual encoding of the materials instead of verbal-conceptual memory (e.g., Fox et al., 2002; Mathews &Mackintosh, 1998). On the one hand, none of these models has integrated all the inconsistencies in empirical data on the topic. On the other hand, the numerous empirical studies on memory in anxiety that have been conducted with varying materials, anxiety disorders, encoding and retrieval conditions do not allow final conclusions about the prerequisites for finding memory biases (for a review, see MacLeod & Mathews, 2004). A more detailed investigation of the complete spectrum of memory for threat utilizing carefully controlled variations of depth of encoding and materials is needed. In view of these inconsistencies, it is all the more surprising that one important part of this spectrum has so far remained completely uninvestigated: visual working memory (VWM). No study has ever differentially addressed VWM for threat in anxious vs. nonanxious participants and none of the cognitive models of anxiety provides any predictions concerning this stage of information processing. Research on cognitive biases in anxiety has thus far only addressed the two extremes of the processing continuum: attention and longer-term memory. In between, a gap remains, the bridging of which might bring us closer to defining the prerequisites of memory biases in anxiety. As empirical research has provided substantial and coherent knowledge concerning attention in anxiety, and as attention and VWM are so closely linked (see, for instance, Cowan, 1995), the thorough investigation of VWM may provide important clues for models of anxiety. Is anxiety related to VWM biases favoring the processing of threatening information, or does the avoidance presumed by cognitive models of anxiety already begin at this stage? RESEARCH AIMS. To investigate the relevance of biased VWM in anxiety, the present research focused in eight experiments on the following main research questions: (1) Is threat preferably stored in VWM in anxious individuals? (2) Does threat preference occur at the cost of the storage of other items, or is extra storage capacity provided? (3) Would the appearance of threat interrupt ongoing encoding of non-threatening items? (4) Does prioritized encoding of threat in anxiety occur strategically or automatically? (5) Are disorder-specific VWM biases also materials-specific? (6) Are VWM biases in anxiety modifiable through cognitive-behavioral therapy? METHODS. In Experiments 1-4, a spatial-sequential cueing paradigm was used. A subset of real-object display items was successively cued on each trial by a sudden change of the picture background for 150 ms each. After the cueing, one of the display pictures was hidden and probed for a memory test. On most trials, a cued item was tested, and memory accuracy was determined depending on the item’s position within the cue string and depending on its valence. In some cases, memory for an uncued item was tested. Experiment 1 and 2 were directed at discovering whether spider fearfuls and non-anxious controls would differ with respect to the accuracy in memorizing cued spiders and uncued spiders and, thus, reveal disorder-specific biases of VWM. In addition, the question whether the presence of a spider image is related to costs for the memorization of other images was tested. Experiment 3 addressed whether any disorder-specific VWM biases found earlier were specific to the feared spiders. Therefore, the critical stimuli here were a snake and a spider. Participants were spider fearfuls and non-anxious controls, both without snake anxiety. In Experiment 4, it was tested whether disorder-specific biases found in Experiment 1 and 2 were modifiable through cognitive-behavioral treatment. The critical stimulus was a spider image. Spider fearfuls were tested three times. Half of them received a cognitive-behavioral intervention after the first test, the other half only after the second test. In two additional experiments, VWM was assessed with a change-detection paradigm. The main aim was to clarify whether disorder-specific effects found in the previous experiments were associated with automatic or with strategic selective encoding of threatening materials, and whether any group differences in spider change detection were materials-specific to spiders, but not to snakes. In Experiment 5, several images were presented simultaneously in a study display for either 100 or 500 milliseconds. After a short interruption, a test display was presented including either the same items as the first one or one changed item. Participants’ accuracy in determining whether displays were the same or different was measured depending on the valence of the changed item, set size, and presentation time of the display. There were trials with and without spiders. If a change was made, it could involve either a non-spider or a spider item. Of specific interest was the condition in which a spider image was presented initially, but not in the test phase, as noticing this specific change would require storage of that image in VWM. Would group differences be particularly pronounced in the shorter encoding condition suggesting automatic encoding of threat, or would they occur in the longer encoding condition, suggesting strategic encoding of spiders? In Experiment 6, change detection accuracy for spiders vs. snakes was tested. The participants in both experiments were spider fearfuls vs. controls, but those of Experiment 6 were additionally required to lack snake anxiety. Moreover, a temporal VWM paradigm - an attentional blink task - was applied to assess whether a biased encoding of spider images in spider fearfuls would occur at the expense of non-threatening items undergoing concurrent processing, and whether this effect was specific to spiders, but not to snakes. Series of real-object pictures were presented at rates of 80 ms at the display center. The observer’s task was to identify and report the two target pictures indicated by a brighter background. In Experiment 7, the first target always depicted a neutral item. The valence of the second target was varied - either negative depicting a spider, positive, or neutral. Participants varied with respect to their spider anxiety. In Experiment 8, spider fearfuls and non-anxious controls, both without snake anxiety, were tested. The experiment was nearly the same as the previous one, but two negative target types were tested: disorder-relevant spiders and negative but not feared snakes. Of specific interest was whether the appearance of a threatening target would reduce the report probability of the earlier attended target, indicating the interruption of its VWM encoding in favor of the threat item. RESULTS. (1) Both anxious and non-anxious controls, showed VWM advantages for negative materials such as spider or snake images. (2) In addition, there were disorderspecific VWM biases: some effects were larger in spider fearfuls than in non-anxious controls and some effects occurred exclusively in spider fearfuls. (3) Group differences and, thus, disorder-specificity were particularly pronounced under competitive circumstances, that is, under the condition of numerous stimuli competing for processing resources: when only little orientation time was allowed, when only little time was provided for selecting and encoding items from a crowd, and when VWMfor the critical item required reflexive instead of voluntary attention. (4) Pronounced memory for task-relevant, voluntarily attended spiders was related to difficulties in disengaging attention from these items in the fearful group, reflected in reduced memory accuracy for the item following it. (5) Disorder-specific VWM biases seem to be based on attentional biases to threatening materials resulting in a very quick, automatic memory consolidation. However, this preferential encoding was not at the cost of neutral materials currently undergoing encoding processes. (6) All disorder-specific VWM biases occured only with fear-related materials, not with other negative materials. (7) Automatic and highly disorder-specific fear-related VWM biases – but not strategic VWM biases occuring in both groups - were modifiable through cognitive-behavioral intervention. CONCLUSIONS. This work provides additional information about informationprocessing distortions related to specific anxiety. With the experimental investigation of biased VWM, this work has been performed to fill a gap within research on cognitive biases in anxiety. Moreover, this dissertation contributes to cognitive theories of anxiety by proposing several recommendations for refinements of current theoretical approaches. Most important, it was suggested to extend existing models by a more detailed consideration of attention and memory. In view of numerous previous empirical studies on the topic and the conclusions of this dissertation, a differentiation of the attentional engagement and disengagement component appears inevitable. Even more important, in view of the data presented here predictions concerning VWM for threatening materials need to be taken into account. In addition, suggestions are provided for the differential consideration of biases occuring from prepotent threat value of negative stimuli vs. individual threat value. A proposal for a cognitive model of anxiety extended by all these aspects is provided to serve as an invitation of further research in the investigation of the nature of memory biases in anxiety disorders. REFERENCES: Cowan, N. (1995). Attention and Memory. An integrated framework.New York: Oxford University Press. Fox, E., Russo, R., & Dutton, K. (2002). Attentional bias for threat: Evidence for delayed disengagement from emotional faces. Cognition and Emotion, 16, 355-379. MacLeod, C., & Mathews, A. (2004). Selective memory effects in anxiety disorders: An overview of research findings and their implications. In D. Reisberg & P. Hertel (eds.), Memory and Emotion. Oxford: Oxford University Press. Mathews, A., & Mackintosh, B. (1998). A cognitive model of selective processing in anxiety. Cognitive Therapy and Research, 22 (6), 539-560. Mathews, A., & MacLeod, C. (2005). Cognitive vulnerability to emotional disorders. Annual Review of Clinical Psychology, 1, 167-195.Mathews, Mogg, May, & Eysenck (1989). Mogg, K., Bradley, B.P., Miles, F., & Dixon, R. (2004). Time course of attentional bias for threat scenes: Testing the vigilance avoidance hypothesis. Cognition and Emotion, 18(5), 689-700. Williams, J.M.G., Watts, F.N., MacLeod, C., & Mathews, A. (1997). Cognitive psychology and emotional disorders. Chichester: John Wiley.
147

Suivi des changements des utilisations/occupations du sol en milieu urbain par imagerie satellitale de résolution spatiale moyenne : le cas de la région métropolitaine de Montréal

Lang, Feng Mei 05 1900 (has links)
De nos jours les cartes d’utilisation/occupation du sol (USOS) à une échelle régionale sont habituellement générées à partir d’images satellitales de résolution modérée (entre 10 m et 30 m). Le National Land Cover Database aux États-Unis et le programme CORINE (Coordination of information on the environment) Land Cover en Europe, tous deux fondés sur les images LANDSAT, en sont des exemples représentatifs. Cependant ces cartes deviennent rapidement obsolètes, spécialement en environnement dynamique comme les megacités et les territoires métropolitains. Pour nombre d’applications, une mise à jour de ces cartes sur une base annuelle est requise. Depuis 2007, le USGS donne accès gratuitement à des images LANDSAT ortho-rectifiées. Des images archivées (depuis 1984) et des images acquises récemment sont disponibles. Sans aucun doute, une telle disponibilité d’images stimulera la recherche sur des méthodes et techniques rapides et efficaces pour un monitoring continue des changements des USOS à partir d’images à résolution moyenne. Cette recherche visait à évaluer le potentiel de telles images satellitales de résolution moyenne pour obtenir de l’information sur les changements des USOS à une échelle régionale dans le cas de la Communauté Métropolitaine de Montréal (CMM), une métropole nord-américaine typique. Les études précédentes ont démontré que les résultats de détection automatique des changements dépendent de plusieurs facteurs tels : 1) les caractéristiques des images (résolution spatiale, bandes spectrales, etc.); 2) la méthode même utilisée pour la détection automatique des changements; et 3) la complexité du milieu étudié. Dans le cas du milieu étudié, à l’exception du centre-ville et des artères commerciales, les utilisations du sol (industriel, commercial, résidentiel, etc.) sont bien délimitées. Ainsi cette étude s’est concentrée aux autres facteurs pouvant affecter les résultats, nommément, les caractéristiques des images et les méthodes de détection des changements. Nous avons utilisé des images TM/ETM+ de LANDSAT à 30 m de résolution spatiale et avec six bandes spectrales ainsi que des images VNIR-ASTER à 15 m de résolution spatiale et avec trois bandes spectrales afin d’évaluer l’impact des caractéristiques des images sur les résultats de détection des changements. En ce qui a trait à la méthode de détection des changements, nous avons décidé de comparer deux types de techniques automatiques : (1) techniques fournissant des informations principalement sur la localisation des changements et (2)techniques fournissant des informations à la fois sur la localisation des changements et sur les types de changement (classes « de-à »). Les principales conclusions de cette recherche sont les suivantes : Les techniques de détection de changement telles les différences d’image ou l’analyse des vecteurs de changements appliqués aux images multi-temporelles LANDSAT fournissent une image exacte des lieux où un changement est survenu d’une façon rapide et efficace. Elles peuvent donc être intégrées dans un système de monitoring continu à des fins d’évaluation rapide du volume des changements. Les cartes des changements peuvent aussi servir de guide pour l’acquisition d’images de haute résolution spatiale si l’identification détaillée du type de changement est nécessaire. Les techniques de détection de changement telles l’analyse en composantes principales et la comparaison post-classification appliquées aux images multi-temporelles LANDSAT fournissent une image relativement exacte de classes “de-à” mais à un niveau thématique très général (par exemple, bâti à espace vert et vice-versa, boisés à sol nu et vice-versa, etc.). Les images ASTER-VNIR avec une meilleure résolution spatiale mais avec moins de bandes spectrales que LANDSAT n’offrent pas un niveau thématique plus détaillé (par exemple, boisés à espace commercial ou industriel). Les résultats indiquent que la recherche future sur la détection des changements en milieu urbain devrait se concentrer aux changements du couvert végétal puisque les images à résolution moyenne sont très sensibles aux changements de ce type de couvert. Les cartes indiquant la localisation et le type des changements du couvert végétal sont en soi très utiles pour des applications comme le monitoring environnemental ou l’hydrologie urbaine. Elles peuvent aussi servir comme des indicateurs des changements de l’utilisation du sol. De techniques telles l’analyse des vecteurs de changement ou les indices de végétation son employées à cette fin. / Nowadays land use/land cover maps at regional scale are commonly generated with satellite data of medium spatial resolution (between 10 m and 30m). The National Land Cover Database (NLCD) in the United States and the Coordination of Information on the Environment (CORINE) Land Cover program in Europe, both based on LANDSAT images, are two typical examples. However, these maps become rapidly obsolete, especially in highly dynamic areas such as mega cities and metropolitan areas. In many applications, such as to monitor the water quality affected by the Land use/Land cover (LULC) change, the spread of invasive species, policy making for city managers, annual updating of LULC maps is required. Since 2007, the USGS offers access to ortho-rectified LANDSAT imagery free of charge. Both archived (since 1984) and recently acquired images are available. Without doubt, such data availability will stimulate the research on fast and cost effective methods and techniques for “continuous” regional land cover/use map updating using medium resolution satellite imagery. The objective of this research was to evaluate the potential of such medium resolution satellite imagery for providing information on changes useful for the continuous updating of LULC maps at a regional scale in the case of the Montreal Metropolitan Community (MMC) area, a typical North American metropolis. Previous studies have demonstrated that many factors could affect the results of automatic change detection such as: (1) the characteristics of the images (spatial resolution, spectral bands, etc.); (2) the method itself used to automatically detect changes; and (3) the complexity of the landscape. In the study site except for the Central Business District (CBD) and some commercial streets, land uses (industrial, commercial, residential, etc.) are well delimited. Thus this study was focused on the other factors affecting change detection results, namely, the characteristics of the images and the method of change detection. We used 6 spectral bands of LANDSAT TM/ETM+ with 30 m spatial resolution and 3 spectral bands of ASTER-VNIR with 15 m spatial resolution to evaluate the impact of image characteristics on change detection. Concerning the change detection method, we decided to compare two types of automatic techniques: (1) techniques providing information principally on the location of changed areas,and (2) techniques providing information on both the location of changed areas and the type of changes ("from-to" classes). The main conclusions of this research are as follows: Change detection techniques such as image differencing or change vector analysis applied to LANDSAT multi-temporal imagery provide an accurate picture of changed areas in a fast and efficient manner. They can thus be integrated in a continuous monitoring system for a rapid evaluation of the volume of changes. The produced maps could be helpful to guide the acquisition of high spatial resolution imagery if a detailed identification of the type of changes is required. Change detection techniques such as principal component analysis and post-classification comparison applied to LANDSAT multi-temporal imagery could provide a relatively accurate picture of “from-to” classes but at a very general thematic level (for example, built-up to green space and vice-versa, forest lands to bare soil and vice-versa, etc.). ASTER images with better spatial resolution but with less spectral bands than LANDSAT images do not provide more detailed thematic information (for example forest land to commercial or industrial areas). The results indicate that future research should be focused on the detection of changes in the vegetation cover as medium resolution imagery is highly sensitive to this type of surface cover. Maps indicating the location and the type of changes in vegetation cover are in itself very useful for various applications, such as environmental monitoring or urban hydrology, and can be used as indicators on land use changes. Techniques such as change vector analysis or vegetation indices could be used to this end.
148

Étude théorique d'indicateurs d'analyse technique / Theoretical study of technical analysis indicators

Ibrahim, Dalia 08 February 2013 (has links)
L'objectif de ma thèse est d'étudier mathématiquement un indicateur de rupture de volatilité très utilisé par les praticiens en salle de marché. L'indicateur bandes de Bollinger appartient à la famille des méthodes dites d'analyse technique et donc repose exclusivement sur l'historique récente du cours considéré et un principe déduit des observations passées des marchés, indépendamment de tout modèle mathématique. Mon travail consiste à étudier les performances de cet indicateur dans un univers qui serait gouverné par des équations différentielles stochastiques (Black -Scholes) dont le coefficient de diffusion change sa valeur à un temps aléatoire inconnu et inobservable, pour un praticien désirant maximiser une fonction objectif (par exemple, une certaine utilité espérée de la valeur du portefeuille à une certaine maturité). Dans le cadre du modèle, l'indicateur de Bollinger peut s'interpréter comme un estimateur de l'instant de la prochaine rupture. On montre dans le cas des petites volatilités, que le comportement de la densité de l'indicateur dépend de la volatilité, ce qui permet pour un ratio de volatilité assez grand, de détecter via l'estimation de la distribution de l'indicateur dans quel régime de volatilité on se situe. Aussi, dans le cas des grandes volatilités, on montre par une approche via la transformée de Laplace, que le comportement asymptotique des queues de distribution de l'indicateur dépend de la volatilité. Ce qui permet de détecter le changement des grandes volatilités. Ensuite, on s'intéresse à une étude comparative entre l'indicateur de Bollinger et l'estimateur classique de la variation quadratique pour la détection de changement de la volatilité. Enfin, on étudie la gestion optimale de portefeuille qui est décrite par un problème stochastique non standard en ce sens que les contrôles admissibles sont contraints à être des fonctionnelles des prix observés. On résout ce problème de contrôle en s'inspirant de travaux de Pham and Jiao pour décomposer le problème initial d'allocation de portefeuille en un problème de gestion après la rupture et un problème avant la rupture, et chacun de ces problèmes est résolu par la méthode de la programmation dynamique . Ainsi, un théorème de verification est prouvé pour ce problème de contrôle stochastique. / The aim of my thesis is to study mathematically an indicator widely used by the practitioners in the trading market, and designed to detect changes in the volatility term . The Bollinger Bands indicator belongs to the family of methods known as technical analysis which consist in looking t the past price movement in order to predict its future price movements independently of any mathematical model. We study the performance of this indicator in a universe that is governed by a stochastic differential equations (Black-Scholes) such that the volatility changes at an unknown and unobservable random time, for a practitioner seeking to maximize an objective function (for instance, the expected utility of the wealth at a certain maturity). Within the framework of the model, Bollinger indicator can be interpreted as an estimator of the time at which the volatility changes its value. We show that in the case of small volatilities, the density behavior of the indicator depends on the value of the volatility, which allows that for large ratio of volatility, to detect via the distribution estimation in which regime of volatility we are. Also , for the case of large volatilities, we show by an approach via the Laplace transform that the asymptotic tails behavior of the indictor depends on the volatility value. This allows to detect a change for large volatilities. Next, we compare two indicators designed to detect a volatility change: the Bollinger bands and the quadratic variation indicators. Finally, we study the optimal portfolio allocation which is described by a non-standard stochastic problem in view of that the admissible controls need to be adapted to the filtration generated by the prices. We resolve this control problem by an approach used by Pham and Jiao to separate the initial allocation problem into an allocation problem after the rupture and an problem before the rupture, and each one of these problems is resolved by the dynamic programming method. Also, a verification theorem is proved for this stochastic control problem.
149

Algorithmes de graphes pour la découverte de la topologie d'un réseau énergétique par la connaissance de ses flots / Algorithm of graphs for topology discovery for a energy network from flot knowledges

Ehounou, Joseph 02 October 2018 (has links)
Dans les réseaux énergétiques, la connaissance des équipements, leurs emplacements et leursfonctions sont les prérequis à l’exploitation de l’infrastucture. En effet, tout opérateur disposed’une carte appelée schéma synoptique indiquant les connexions entre les équipements. À partirde cette carte, sont prises des décisions pour un fonctionnement optimal du réseau.Ce schéma synoptique peut être érronné parce que des opérations de maintenance sur le réseaun’auraient pas été retranscrites ou mal saisies. Et cela peut entrainer des coûts supplémentairesd’exploitation du réseau énergetique.Nous considérons le réseau électrique d’un Datacenter. Ce réseau est composé d’une topologiephysique modélisée par un DAG sans circuit et de mesures électriques sur ces arcs. La particularitéde ce réseau est que les mesures contiennent des erreurs et cette topologie est inconnue c’est-à-direles arcs sont connus mais les extrémités des arcs sont inconnues. Dans le cas où ces mesuressont correctes alors la corrélation des arcs induit la matrice d’adjacence du line-graphe du graphenon-orienté sous-jacent de notre DAG. Un line-graphe est un graphe dans lequel chaque sommet etson voisinage peuvent être partitionnés par une ou deux cliques et que chaque arête est couvertepar une clique. Cependant, avec la présence des erreurs de mesures, nous avons un graphe avecdes arêtes en plus ou en moins qui n’est pas nécessairement un line-graphe. Si ce graphe est unline-graphe alors il n’est pas le line-graphe de notre DAG. Notre problème est de découvrir cettetopologie en se basant sur ces mesures électriques.Nous débutons par une étude bibliographique des corrélations de mesures possibles afin dedéterminer celle qui est pertinente pour notre problème. Ensuite nous proposons deux algorithmespour résoudre ce problème. Le premier algorithme est l’algorithme de couverture et il déterminel’ensemble des cliques qui couvre chaque sommet de notre graphe. Le second algorithme estl’algorithme de correction. Il ajoute ou supprime des arêtes au voisinage d’un sommet non couvertde telle sorte que son voisinage soit partitionné en une ou deux cliques. Enfin, nous évaluons lesperformances de nos algorithmes en vérifiant le nombre d’arêtes corrigées et la capacité à retournerle graphe le plus proche du line-graphe de notre DAG. / In energy network, the knowledge of equipments, their locations and their functions are theimportant information for the distributor service operator. In fact, each operator has a networkplan often named synoptic schema. That schema shows the interconnexion between equipments inthe network. From this schema, some management decisions have taken for ensuring an optimalperformance of a network.Sometimes, a synoptic schema has some mistakes because the maintenance operations, such aschanged the connexion between equipments or replaced equipments, have not been updated orhave been written with errors. And these mistakes increase exploitation cost in the energy network.We consider an electric network of a datacenter. This network consists of physical topologymodelised by a DAG without circuit and measurements are on the edges of a DAG. The mainpoint of the network is that measurements are some mistakes and the topology is unknown i.ewe know edges but the nodes of edges are unknown. When measurements are correct then thecorrelations between pairwise edges provide the adjacency matrix of the linegraph of undirectedgraph of the DAG. A linegraph is a graph in which each node and the neighbor are partitionnedby one or deux cliques. However, with the mistakes in measurements, the obtained graph is nota linegraph because it contains more or less edges. If the obtained graph is a linegraph then it isa linegraph of the other DAG. Our problem is to discovery the topology of the DAG with somemistakes in measurements.We start by the state of art in the measurement correlations in order to choose the good methodfor our problem. Then, we propose two algorithms to resolve our problem. The first algorithmis the cover algorithm and it returns the set of cliques in the graph. The second algorithm is acorrection algorithm which adds or deletes edges in the graph for getting a nearest linegraph ofthe DAG. In the last, we evaluate the performances of the algorithms by checking the number ofedges corrected and the ability to return a nearest linegraph of the DAG.
150

Détection de changement par fusion d'images de télédétection de résolutions et modalités différentes / Fusion-based change detection for ng images of differemote sensirent resolutions and modalities

Ferraris, Vinicius 26 October 2018 (has links)
La détection de changements dans une scène est l’un des problèmes les plus complexes en télédétection. Il s’agit de détecter des modifications survenues dans une zone géographique donnée par comparaison d’images de cette zone acquises à différents instants. La comparaison est facilitée lorsque les images sont issues du même type de capteur c’est-à-dire correspondent à la même modalité (le plus souvent optique multi-bandes) et possèdent des résolutions spatiales et spectrales identiques. Les techniques de détection de changements non supervisées sont, pour la plupart, conçues spécifiquement pour ce scénario. Il est, dans ce cas, possible de comparer directement les images en calculant la différence de pixels homologues, c’est-à-dire correspondant au même emplacement au sol. Cependant, dans certains cas spécifiques tels que les situations d’urgence, les missions ponctuelles, la défense et la sécurité, il peut s’avérer nécessaire d’exploiter des images de modalités et de résolutions différentes. Cette hétérogénéité dans les images traitées introduit des problèmes supplémentaires pour la mise en œuvre de la détection de changements. Ces problèmes ne sont pas traités par la plupart des méthodes de l’état de l’art. Lorsque la modalité est identique mais les résolutions différentes, il est possible de se ramener au scénario favorable en appliquant des prétraitements tels que des opérations de rééchantillonnage destinées à atteindre les mêmes résolutions spatiales et spectrales. Néanmoins, ces prétraitements peuvent conduire à une perte d’informations pertinentes pour la détection de changements. En particulier, ils sont appliqués indépendamment sur les deux images et donc ne tiennent pas compte des relations fortes existant entre les deux images. L’objectif de cette thèse est de développer des méthodes de détection de changements qui exploitent au mieux l’information contenue dans une paire d’images observées, sans condition sur leur modalité et leurs résolutions spatiale et spectrale. Les restrictions classiquement imposées dans l’état de l’art sont levées grâce à une approche utilisant la fusion des deux images observées. La première stratégie proposée s’applique au cas d’images de modalités identiques mais de résolutions différentes. Elle se décompose en trois étapes. La première étape consiste à fusionner les deux images observées ce qui conduit à une image de la scène à haute résolution portant l’information des changements éventuels. La deuxième étape réalise la prédiction de deux images non observées possédant des résolutions identiques à celles des images observées par dégradation spatiale et spectrale de l’image fusionnée. Enfin, la troisième étape consiste en une détection de changements classique entre images observées et prédites de mêmes résolutions. Une deuxième stratégie modélise les images observées comme des versions dégradées de deux images non observées caractérisées par des résolutions spectrales et spatiales identiques et élevées. Elle met en œuvre une étape de fusion robuste qui exploite un a priori de parcimonie des changements observés. Enfin, le principe de la fusion est étendu à des images de modalités différentes. Dans ce cas où les pixels ne sont pas directement comparables, car correspondant à des grandeurs physiques différentes, la comparaison est réalisée dans un domaine transformé. Les deux images sont représentées par des combinaisons linéaires parcimonieuses des éléments de deux dictionnaires couplés, appris à partir des données. La détection de changements est réalisée à partir de l’estimation d’un code couplé sous condition de parcimonie spatiale de la différence des codes estimés pour chaque image. L’expérimentation de ces différentes méthodes, conduite sur des changements simulés de manière réaliste ou sur des changements réels, démontre les avantages des méthodes développées et plus généralement de l’apport de la fusion pour la détection de changements / Change detection is one of the most challenging issues when analyzing remotely sensed images. It consists in detecting alterations occurred in a given scene from between images acquired at different times. Archetypal scenarios for change detection generally compare two images acquired through the same kind of sensor that means with the same modality and the same spatial/spectral resolutions. In general, unsupervised change detection techniques are constrained to two multiband optical images with the same spatial and spectral resolution. This scenario is suitable for a straight comparison of homologous pixels such as pixel-wise differencing. However, in somespecific cases such as emergency situations, punctual missions, defense and security, the only available images may be of different modalities and of different resolutions. These dissimilarities introduce additional issues in the context of operational change detection that are not addressedby most classical methods. In the case of same modality but different resolutions, state-of-the artmethods come down to conventional change detection methods after preprocessing steps appliedindependently on the two images, e.g. resampling operations intended to reach the same spatialand spectral resolutions. Nevertheless, these preprocessing steps may waste relevant informationsince they do not take into account the strong interplay existing between the two images. The purpose of this thesis is to study how to more effectively use the available information to work with any pair of observed images, in terms of modality and resolution, developing practicalcontributions in a change detection context. The main hypothesis for developing change detectionmethods, overcoming the weakness of classical methods, is through the fusion of observed images. In this work we demonstrated that if one knows how to properly fuse two images, it is also known how to detect changes between them. This strategy is initially addressed through a change detection framework based on a 3-step procedure: fusion, prediction and detection. Then, the change detection task, benefiting from a joint forward model of two observed images as degradedversions of two (unobserved) latent images characterized by the same high spatial and highspectral resolutions, is envisioned through a robust fusion task which enforces the differencesbetween the estimated latent images to be spatially sparse. Finally, the fusion problem isextrapolated to multimodal images. As the fusion product may not be a real quantity, the process is carried out by modelling both images as sparse linear combinations of an overcomplete pair of estimated coupled dictionaries. Thus, the change detection task is envisioned through a dual code estimation which enforces spatial sparsity in the difference between the estimated codes corresponding to each image. Experiments conducted in simulated realistically and real changes illustrate the advantages of the developed method, both qualitatively and quantitatively, proving that the fusion hypothesis is indeed a real and effective way to deal with change detection

Page generated in 0.1389 seconds