نتایج جستجو برای: target transform fitting

تعداد نتایج: 553754  

1994
Wei Wen Baozong Yuan

Ellipses are a powerful feature and are useful in computer vision. Most techniques pr ellipse fitting can be divided into two main classifications: one is the least square estimation (LSE) method and the other is the Hough transform (HT). They either make certain assumptions about the type of noise distribution, or require input parameters. This often prevents the techniques working robustly ov...

2004
Massoud Babaie-Zadeh Ali Mansour Christian Jutten Farrokh Marvasti

Abstract. In this paper a new geometrical approach for separating speech signals is presented. This approach can be directly applied to separate more than two speech signals. It is based on clustering the observation points, and then fitting a line (hyper-plane) onto each cluster. The algorithm quality is shown to be improved by using DCT coefficients of speech signals, as opposed to using spee...

2000
Joohyung Cho

Joohyung Cho et al. 85 The surface modeling capability of CAD systems is widely used to design products bounded by free form surfaces and curves. However, the surfaces or curves generated by popular data fitting methods usually have shape imperfections such as wiggles. Thus, fairing operations are required to remove the wiggles, which makes the surfaces or curves smooth. This paper proposes a n...

2008
Jorge Márquez Flores Waldo Ramirez L. Boyer Patrice Delmas

We report current work on methods for robust fitting of ellipsoids to the shape of the human head in three-dimensional models built from laser scanner acquisitions. A starting ellipsoid is obtained from Principal Component Analysis from mesh vertices; those regions far from the surface of the ellipsoid are penalized (outlier rejection and/or damping). A first method consists in re-calculating i...

2001
LEIF ANDERSEN

This paper discusses extensions of the implied diffusion approach of Dupire (1994) to asset processes with Poisson jumps. We show that this extension yields important model improvements, particularly in the dynamics of the implied volatility surface. The paper derives a forward PIDE (Partial Integro-Differential Equation) and demonstrates how this equation can be used to fit the model to Europe...

2013
P. Suresh T. Thayaparan S. SivaSankaraSai K. Venkataramaniah

Micro-Doppler signatures provide unique information about properties of the target. These micro-Doppler features can be used for real time target recognition in military applications and surveillance operations. In this paper, we present Gabor-Wigner transform for extracting micro-Doppler features from the radar returns. The effectiveness of the GaborWigner transform in extracting micro-Doppler...

Journal: :PVLDB 2011
Bogdan Alexe Balder ten Cate Phokion G. Kolaitis Wang Chiew Tan

One of the first steps in the process of integrating information from multiple sources into a desired target format is to specify the relationships, called schema mappings, between the source schemas and the target schema. In this demonstration, we showcase a new methodology for designing schema mappings. Our system Eirene interactively solicits data examples from the mapping designer in order ...

Journal: :IEEE Geoscience and Remote Sensing Letters 2022

The Global Navigation Satellite System (GNSS)-based passive bistatic radar (PBR) which uses the GNSS signal as illuminators of opportunity is studied for moving target detection (MTD). GNSS-based PBR has many advantages due to removal transmitting device; however, its fundamental limitation low power density signal. Therefore, integration time should be sufficiently long obtain a promising maxi...

2010
Heverson Borba Ribeiro Emmanuelle Anceaume

This paper evaluates the performance of two seminal rateless erasure codes, LT Codes and Online Codes. Their properties make them appropriate for coping with communication channels having an unbounded loss rate. They are therefore very well suited to peer-to-peer systems. This evaluation targets two goals. First, it compares the performance of both codes in different adversarial environments an...

Journal: :Pattern Recognition Letters 2011
Shutao Li Ming Zhao

0167-8655/$ see front matter 2011 Elsevier B.V. A doi:10.1016/j.patrec.2011.03.015 ⇑ Corresponding author. Tel.: +86 731 88822924; fa E-mail addresses: [email protected] (S. Li (M. Zhao). Image inpainting technique uses structural and textural information to repair or fill missing regions of a picture. Inspired by human visual characteristics, we introduce a new image inpainting approach w...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید