-
Takuya KOJIMA, Hideharu AMANO
Article type: PAPER
Subject area: Computer System
2019 Volume E102.D Issue 7 Pages
1247-1256
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
A novel configuration data compression technique for coarse-grained reconfigurable architectures (CGRAs) is proposed. Reducing the size of configuration data of CGRAs shortens the reconfiguration time especially when the communication bandwidth between a CGRA and a host CPU is limited. In addition, it saves energy consumption of configuration cache and controller. The proposed technique is based on a multicast configuration technique called RoMultiC, which reduces the configuration time by multicasting the same data to multiple PEs (Processing Elements) with two bit-maps. Scheduling algorithms for an optimizing the order of multicasting have been proposed. However, the multicasting is possible only if each PE has completely the same configuration. In general, configuration data for CGRAs can be divided into some fields like machine code formats of general perpose CPUs. The proposed scheme confines a part of fields for multicasting so that the possibility of multicasting more PEs can be increased. This paper analyzes algorithms to find a configuration pattern which maximizes the number of multicasted PEs. We implemented the proposed scheme to CMA (Cool Mega Array), a straight forward CGRA as a case study. Experimental results show that the proposed method achieves 40.0% smaller configuration than a previous method for an image processing application at maximum. The exploration of the multicasted grain size reveals the effective grain size for each algorithm. Furthermore, since both a dynamic power consumption of the configuration controller and a configuration time are improved, it achieves 50.1% reduction of the energy consumption for the configuration with a negligible area overhead.
View full abstract
-
Chun-Hung CHENG, Ying-Wen BAI
Article type: PAPER
Subject area: Computer System
2019 Volume E102.D Issue 7 Pages
1257-1270
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
This new design uses a low power embedded controller (EC) in cooperation with the BIOS of a notebook (NB) computer, both to accomplish dynamic adjustment and to maintain a required performance level of the battery mode of the notebook. In order to extend the operation time at the battery mode, in general, the notebook computer will directly reduce the clock rate and then reduce the performance. This design can obtain the necessary balance of the performance and the power consumption by using both the EC and the BIOS cooperatively to implement the dynamic control of both the CPU and the GPU frequency to maintain the system performance at a sufficient level for a high speed and high resolution video game. In contrast, in order to maintain a certain notebook performance, in terms of battery life it will be necessary to make some trade-offs.
View full abstract
-
Kanghee KIM, Wooseok LEE, Sangbang CHOI
Article type: PAPER
Subject area: Computer System
2019 Volume E102.D Issue 7 Pages
1271-1279
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
Hardware prefetching involves a sophisticated balance between accuracy, coverage, and timeliness while minimizing hardware cost. Recent prefetchers have achieved these goals, but they still require complex hardware and a significant amount of storage. In this paper, we propose an efficient Per-page Most-Offset Prefetcher (PMOP) that minimizes hardware cost and simultaneously improves accuracy while maintaining coverage and timeliness. We achieve these objectives using an enhanced offset prefetcher that performs well with a reasonable hardware cost. Our approach first addresses coverage and timeliness by allowing multiple Most-Offset predictions. To minimize offset interference between pages, the PMOP leverages a fine-grain per-page offset filter. This filter records the access history with page-IDs, which enables efficient mapping and tracking of multiple offset streams from diverse pages. Analysis results show that PMOP outperforms the state-of-the-art Signature Path Prefetcher while reducing storage overhead by a factor of 3.4.
View full abstract
-
Nhat-Hoa TRAN, Yuki CHIBA, Toshiaki AOKI
Article type: PAPER
Subject area: Software System
2019 Volume E102.D Issue 7 Pages
1280-1295
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
A concurrent system consists of multiple processes that are run simultaneously. The execution orders of these processes are defined by a scheduler. In model checking techniques, the scheduling policy is closely related to the search algorithm that explores all of the system states. To ensure the correctness of the system, the scheduling policy needs to be taken into account during the verification. Current approaches, which use fixed strategies, are only capable of limited kinds of policies and are difficult to extend to handle the variations of the schedulers. To address these problems, we propose a method using a domain-specific language (DSL) for the succinct specification of different scheduling policies. Necessary artifacts are automatically generated from the specification to analyze the behaviors of the system. We also propose a search algorithm for exploring the state space. Based on this method, we develop a tool to verify the system with the scheduler. Our experiments show that we could serve the variations of the schedulers easily and verify the systems accurately.
View full abstract
-
Haiqiang LIU, Gang HUA, Hongsheng YIN, Aichun ZHU, Ran CUI
Article type: PAPER
Subject area: Information Network
2019 Volume E102.D Issue 7 Pages
1296-1301
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
Compressed sensing is an effective compression algorithm. It is widely used to measure signals in distributed sensor networks (DSNs). Considering the limited resources of DSNs, the measurement matrices used in DSNs must be simple. In this paper, we construct a deterministic measurement matrix based on Gordon-Mills-Welch (GMW) sequence. The column vectors of the proposed measurement matrix are generated by cyclically shifting a GMW sequence. Compared with some state-of-the-art measurement matrices, the proposed measurement matrix has relative lower computational complexity and needs less storage space. It is suitable for resource-constrained DSNs. Moreover, because the proposed measurement matrix can be realized by using simple shift register, it is more practical. The simulation result shows that, in terms of recovery quality, the proposed measurement matrix performs better than some state-of-the-art measurement matrices.
View full abstract
-
Di ZHOU, Ping FU, Hongtao YIN, Wei XIE, Shou FENG
Article type: PAPER
Subject area: Artificial Intelligence, Data Mining
2019 Volume E102.D Issue 7 Pages
1302-1309
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
The real-time state-of-health (SOH) estimation of lithium-ion batteries for electric vehicles (EV) is essential to EV maintenance. According to situations in practical applications such as long EV battery capacity test time, unavailability of regular daily tests, and availability of full-life-cycle charge data of EV recorded on the charging facility big data platform, this paper studies an online in-use EV state-of-health estimation method using iterated extended Gaussian process regression-Kalman filter (GPR-EKF) to incorporate lithium-ion battery data at the macro time scale and the micro time scale based on daily charge data of electric vehicles. This method proposes a kernel function GPR (Gaussian process regression) integrating neutral network with cycles to conduct fitting for data at the macro time scale to determine colored measurement noise; in addition, fragment charge data at the micro time scale is adjusted with real-time iteration to be used as the state equation, which effectively addresses issues of real-time SOC calibration and nonlinearization. The pertinence, effectiveness and real-time performance of the model algorithm in online battery state-of-health estimation is verified by actual data.
View full abstract
-
Takanobu BABA, Shinpei WATANABE, Boaz JESSIE JACKIN, Kanemitsu OOTSU, ...
Article type: PAPER
Subject area: Human-computer Interaction
2019 Volume E102.D Issue 7 Pages
1310-1320
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
The 3D holographic display has long been expected as a future human interface as it does not require users to wear special devices. However, its heavy computation requirement prevents the realization of such displays. A recent study says that objects and holograms with several giga-pixels should be processed in real time for the realization of high resolution and wide view angle. To this problem, first, we have adapted a conventional FFT algorithm to a GPU cluster environment in order to avoid heavy inter-node communications. Then, we have applied several single-node and multi-node optimization and parallelization techniques. The single-node optimizations include a change of the way of object decomposition, reduction of data transfer between the CPU and GPU, kernel integration, stream processing, and utilization of multiple GPUs within a node. The multi-node optimizations include distribution methods of object data from host node to the other nodes. Experimental results show that intra-node optimizations attain 11.52 times speed-up from the original single node code. Further, multi-node optimizations using 8 nodes, 2 GPUs per node, attain an execution time of 4.28 sec for generating a 1.6 giga-pixel hologram from a 3.2 giga-pixel object. It means a 237.92 times speed-up of the sequential processing by CPU and 41.78 times speed-up of multi-threaded execution on multicore-CPU, using a conventional FFT-based algorithm.
View full abstract
-
Fei GUO, Yuan YANG, Yang XIAO, Yong GAO, Ningmei YU
Article type: PAPER
Subject area: Human-computer Interaction
2019 Volume E102.D Issue 7 Pages
1321-1331
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
Currently, visual perceptions generated by visual prosthesis are low resolution with unruly color and restricted grayscale. This severely restricts the ability of prosthetic implant to complete visual tasks in daily scenes. Some studies explore existing image processing techniques to improve the percepts of objects in prosthetic vision. However, most of them extract the moving objects and optimize the visual percepts in general dynamic scenes. The application of visual prosthesis in daily life scenes with high dynamic is greatly limited. Hence, in this study, a novel unsupervised moving object segmentation model is proposed to automatically extract the moving objects in high dynamic scene. In this model, foreground cues with spatiotemporal edge features and background cues with boundary-prior are exploited, the moving object proximity map are generated in dynamic scene according to the manifold ranking function. Moreover, the foreground and background cues are ranked simultaneously, and the moving objects are extracted by the two ranking maps integration. The evaluation experiment indicates that the proposed method can uniformly highlight the moving object and keep good boundaries in high dynamic scene with other methods. Based on this model, two optimization strategies are proposed to improve the perception of moving objects under simulated prosthetic vision. Experimental results demonstrate that the introduction of optimization strategies based on the moving object segmentation model can efficiently segment and enhance moving objects in high dynamic scene, and significantly improve the recognition performance of moving objects for the blind.
View full abstract
-
Chun-Yu LIU, Shu-Nung YAO, Ying-Jen CHEN
Article type: PAPER
Subject area: Office Information Systems, e-Business Modeling
2019 Volume E102.D Issue 7 Pages
1332-1341
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
With advances in information technology and the development of big data, manual operation is unlikely to be a smart choice for stock market investing. Instead, the computer-based investment model is expected to bring investors more accurate strategic analysis and more effective investment decisions than human beings. This paper aims to improve investor profits by mining for critical information in the stock data, therefore helping big data analysis. We used the R language to find the technical indicators in the stock market, and then applied the technical indicators to the prediction. The proposed R package includes several analysis toolkits, such as trend line indicators, W type reversal patterns, V type reversal patterns, and the bull or bear market. The simulation results suggest that the developed R package can accurately present the tendency of the price and enhance the return on investment.
View full abstract
-
Chi-Chia SUN, Ming-Hwa SHEU, Jui-Yang CHI, Yan-Kai HUANG
Article type: PAPER
Subject area: Image Processing and Video Processing
2019 Volume E102.D Issue 7 Pages
1342-1348
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
In this paper, a nonoverlapping multi-camera and people re-identification algorithm is proposed. It applies inflated major color features for re-identification to reduce computation time. The inflated major color features can dramatically improve efficiency while retaining high accuracy of object re-identification. The proposed method is evaluated over a wide range of experimental databases. The accuracy attains upwards of 40.7% in Rank 1 and 84% in Rank 10 on average, while it obtains three to 15 times faster than algorithms reported in the literature. The proposed algorithm has been implemented on a SOC-FPGA platform to reach 50 FPS with 1280×720 HD resolution and 25 FPS with 1920×1080 FHD resolution for real-time processing. The results show a performance improvement and reduction in computation complexity, which is especially ideal for embedded platform.
View full abstract
-
Chengcheng JIANG, Xinyu ZHU, Chao LI, Gengsheng CHEN
Article type: PAPER
Subject area: Image Recognition, Computer Vision
2019 Volume E102.D Issue 7 Pages
1349-1361
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
Pre-trained CNNs on ImageNet have been widely used in object tracking for feature extraction. However, due to the domain mismatch between image classification and object tracking, the submergence of the target-specific features by noise largely decreases the expression ability of the convolutional features, resulting in an inefficient tracking. In this paper, we propose a robust tracking algorithm with low-dimensional target-specific feature extraction. First, a novel cascaded PCA module is proposed to have an explicit extraction of the low-dimensional target-specific features, which makes the new appearance model more effective and efficient. Next, a fast particle filter process is raised to further accelerate the whole tracking pipeline by sharing convolutional computation with a ROI-Align layer. Moreover, a classification-score guided scheme is used to update the appearance model for adapting to target variations while at the same time avoiding the model drift that caused by the object occlusion. Experimental results on OTB100 and Temple Color128 show that, the proposed algorithm has achieved a superior performance among real-time trackers. Besides, our algorithm is competitive with the state-of-the-art trackers in precision while runs at a real-time speed.
View full abstract
-
Onur KEKLIK, Tugkan TUGLULAR, Selma TEKIR
Article type: PAPER
Subject area: Natural Language Processing
2019 Volume E102.D Issue 7 Pages
1362-1373
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
This paper proposes a new rule-based approach to automatic question generation. The proposed approach focuses on analysis of both syntactic and semantic structure of a sentence. Although the primary objective of the designed system is question generation from sentences, automatic evaluation results shows that, it also achieves great performance on reading comprehension datasets, which focus on question generation from paragraphs. Especially, with respect to METEOR metric, the designed system significantly outperforms all other systems in automatic evaluation. As for human evaluation, the designed system exhibits similar performance by generating the most natural (human-like) questions.
View full abstract
-
Chi-Hua CHEN, Feng-Jang HWANG, Hsu-Yang KUNG
Article type: PAPER
Subject area: Biocybernetics, Neurocomputing
2019 Volume E102.D Issue 7 Pages
1374-1383
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
In recent years, intelligent transportation system (ITS) techniques have been widely exploited to enhance the quality of public services. As one of the worldwide leaders in recycling, Taiwan adopts the waste collection and disposal policy named “trash doesn't touch the ground”, which requires the public to deliver garbage directly to the collection points for awaiting garbage collection. This study develops a travel time prediction system based on data clustering for providing real-time information on the arrival time of waste collection vehicle (WCV). The developed system consists of mobile devices (MDs), on-board units (OBUs), a fleet management server (FMS), and a data analysis server (DAS). A travel time prediction model utilizing the adaptive-based clustering technique coupled with a data feature selection procedure is devised and embedded in the DAS. While receiving inquiries from users' MDs and relevant data from WCVs' OBUs through the FMS, the DAS performs the devised model to yield the predicted arrival time of WCV. Our experiment result demonstrates that the proposed prediction model achieves an accuracy rate of 75.0% and outperforms the reference linear regression method and neural network technique, the accuracy rates of which are 14.7% and 27.6%, respectively. The developed system is effective as well as efficient and has gone online.
View full abstract
-
Bumshik LEE, Waqas ELLAHI, Jae Young CHOI
Article type: PAPER
Subject area: Biological Engineering
2019 Volume E102.D Issue 7 Pages
1384-1395
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
In this paper, we propose a novel framework for structural magnetic resonance image (sMRI) classification of Alzheimer's disease (AD) with data combination, outlier removal, and entropy-based data selection using AlexNet. In order to overcome problems of conventional classical machine learning methods, the AlexNet classifier, with a deep learning architecture, was employed for training and classification. A data permutation scheme including slice integration, outlier removal, and entropy-based sMRI slice selection is proposed to utilize the benefits of AlexNet. Experimental results show that the proposed framework can effectively utilize the AlexNet with the proposed data permutation scheme by significantly improving overall classification accuracies for AD classification. The proposed method achieves 95.35% and 98.74% classification accuracies on the OASIS and ADNI datasets, respectively, for the binary classification of AD and Normal Control (NC), and also achieves 98.06% accuracy for the ternary classification of AD, NC, and Mild Cognitive Impairment (MCI) on the ADNI dataset. The proposed method can attain significantly improved accuracy of up to 18.15%, compared to previously developed methods.
View full abstract
-
Haomo LIANG, Zhixue WANG, Yi LIU
Article type: LETTER
Subject area: Fundamentals of Information Systems
2019 Volume E102.D Issue 7 Pages
1396-1399
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
Machine learning algorithms are becoming more and more popular in current era. Data preprocessing especially feature selection is helpful for improving the performance of those algorithms. A new powerful feature selection algorithm is proposed. It combines the advantages of ant colony optimization and brain storm optimization which simulates the behavior of human beings. Six classical datasets and five state-of-art algorithms are used to make a comparison with our algorithm on binary classification problems. The results on accuracy, percent rate, recall rate, and F1 measures show that the developed algorithm is more excellent. Besides, it is no more complex than the compared approaches.
View full abstract
-
Yuehang DING, Hongtao YU, Jianpeng ZHANG, Yunjie GU, Ruiyang HUANG, Sh ...
Article type: LETTER
Subject area: Data Engineering, Web Information Systems
2019 Volume E102.D Issue 7 Pages
1400-1403
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
Redundant relations refer to explicit relations which can also be deducted implicitly. Although there exist several ontology redundancy elimination methods, they all do not take equivalent relations into consideration. Actually, real ontologies usually contain equivalent relations; their redundancies cannot be completely detected by existing algorithms. Aiming at solving this problem, this paper proposes a super-node based ontology redundancy elimination algorithm. The algorithm consists of super-node transformation and transitive redundancy elimination. During the super-node transformation process, nodes equivalent to each other are transferred into a super-node. Then by deleting the overlapped edges, redundancies relating to equivalent relations are eliminated. During the transitive redundancy elimination process, redundant relations are eliminated by comparing concept nodes' direct and indirect neighbors. Most notably, we proposed a theorem to validate real ontology's irredundancy. Our algorithm outperforms others on both real ontologies and synthetic dynamic ontologies.
View full abstract
-
Akihiro SATOH, Yutaka NAKAMURA, Daiki NOBAYASHI, Kazuto SASAI, Gen KIT ...
Article type: LETTER
Subject area: Information Network
2019 Volume E102.D Issue 7 Pages
1404-1407
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
Some of the most serious threats to network security involve malware. One common way to detect malware-infected machines in a network is by monitoring communications based on blacklists. However, such detection is problematic because (1) no blacklist is completely reliable, and (2) blacklists do not provide the sufficient evidence to allow administrators to determine the validity and accuracy of the detection results. In this paper, we propose a malicious DNS query clustering approach for blacklist-based detection. Unlike conventional classification, our cause-based classification can efficiently analyze malware communications, allowing infected machines in the network to be addressed swiftly.
View full abstract
-
Linjie ZHU, Bin WU, Zhiwei WEI, Yu TANG
Article type: LETTER
Subject area: Information Network
2019 Volume E102.D Issue 7 Pages
1408-1411
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
In this letter, a novel frame aggregation scheduler is proposed to solve the head-of-line blocking problem for real-time user datagram protocol (UDP) traffic in error-prone and aggregation-enabled wireless local area networks (WLANs). The key to the proposed scheduler is to break the restriction of in-order delivery over the WLAN. The simulation results show that the proposed scheduler can achieve high UDP goodput and low delay compared to the conventional scheduler.
View full abstract
-
Chun Gun PARK, Hyun AHN
Article type: LETTER
Subject area: Office Information Systems, e-Business Modeling
2019 Volume E102.D Issue 7 Pages
1412-1416
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
Temporal behavior is a primary aspect of business process executions. Herein, we propose a temporal outlier detection and analysis method for business processes. Particularly, the method performs correlation analysis between the execution times of traces and activities to determine the type of activities that significantly influences the anomalous temporal behavior of a trace. To this end, we describe the modeling of temporal behaviors considering different control-flow patterns of business processes. Further, an execution time matrix with execution times of activities in all traces is constructed by using the event logs. Based on this matrix, we perform temporal outlier detection and correlation-based analysis.
View full abstract
-
Lingyan LI, Xiaoyan ZHOU, Yuan ZONG, Wenming ZHENG, Xiuzhen CHEN, Jing ...
Article type: LETTER
Subject area: Pattern Recognition
2019 Volume E102.D Issue 7 Pages
1417-1421
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
Over the past several years, the research of micro-expression recognition (MER) has become an active topic in affective computing and computer vision because of its potential value in many application fields, e.g., lie detection. However, most previous works assumed an ideal scenario that both training and testing samples belong to the same micro-expression database, which is easily broken in practice. In this letter, we hence consider a more challenging scenario that the training and testing samples come from different micro-expression databases and investigated unsupervised cross-database MER in which the source database is labeled while the label information of target database is entirely unseen. To solve this interesting problem, we propose an effective method called target-adapted least-squares regression (TALSR). The basic idea of TALSR is to learn a regression coefficient matrix based on the source samples and their provided label information and also enable this learned regression coefficient matrix to suit the target micro-expression database. We are thus able to use the learned regression coefficient matrix to predict the micro-expression categories of the target micro-expression samples. Extensive experiments on CASME II and SMIC micro-expression databases are conducted to evaluate the proposed TALSR. The experimental results show that our TALSR has better performance than lots of recent well-performing domain adaptation methods in dealing with unsupervised cross-database MER tasks.
View full abstract
-
Asera WAYNE ASERA, Masayoshi ARITSUGI
Article type: LETTER
Subject area: Pattern Recognition
2019 Volume E102.D Issue 7 Pages
1422-1425
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
In this research, we propose a novel method to determine fingerprint liveness to improve the discriminative behavior and classification accuracy of the combined features. This approach detects if a fingerprint is from a live or fake source. In this approach, fingerprint images are analyzed in the differential excitation (DE) component and the centralized binary pattern (CBP) component, which yield the DE image and CBP image, respectively. The images obtained are used to generate a two-dimensional histogram that is subsequently used as a feature vector. To decide if a fingerprint image is from a live or fake source, the feature vector is processed using support vector machine (SVM) classifiers. To evaluate the performance of the proposed method and compare it to existing approaches, we conducted experiments using the datasets from the 2011 and 2015 Liveness Detection Competition (LivDet), collected from four sensors. The results show that the proposed method gave comparable or even better results and further prove that methods derived from combination of features provide a better performance than existing methods.
View full abstract
-
Yue XIE, Ruiyu LIANG, Zhenlin LIANG, Li ZHAO
Article type: LETTER
Subject area: Pattern Recognition
2019 Volume E102.D Issue 7 Pages
1426-1429
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
Despite the widespread use of deep learning for speech emotion recognition, they are severely restricted due to the information loss in the high layer of deep neural networks, as well as the degradation problem. In order to efficiently utilize information and solve degradation, attention-based dense long short-term memory (LSTM) is proposed for speech emotion recognition. LSTM networks with the ability to process time series such as speech are constructed into which attention-based dense connections are introduced. That means the weight coefficients are added to skip-connections of each layer to distinguish the difference of the emotional information between layers and avoid the interference of redundant information from the bottom layer to the effective information from the top layer. The experiments demonstrate that proposed method improves the recognition performance by 12% and 7% on eNTERFACE and IEMOCAP corpus respectively.
View full abstract
-
Song LIANG, Leida LI, Bo HU, Jianying ZHANG
Article type: LETTER
Subject area: Image Processing and Video Processing
2019 Volume E102.D Issue 7 Pages
1430-1433
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
This letter presents an objective quality index for benchmarking image inpainting algorithms. Under the guidance of the masks of damaged areas, the boundary region and the inpainting region are first located. Then, the statistical features are extracted from the boundary and inpainting regions respectively. For the boundary region, we utilize Weibull distribution to fit the gradient magnitude histograms of the exterior and interior regions around the boundary, and the Kullback-Leibler Divergence (KLD) is calculated to measure the boundary distortions caused by imperfect inpainting. Meanwhile, the quality of the inpainting region is measured by comparing the naturalness factors between the inpainted image and the reference image. Experimental results demonstrate that the proposed metric outperforms the relevant state-of-the-art quality metrics.
View full abstract
-
Karthikeyan PANJAPPAGOUNDER RAJAMANICKAM, Sakthivel PERIYASAMY
Article type: LETTER
Subject area: Image Recognition, Computer Vision
2019 Volume E102.D Issue 7 Pages
1434-1437
Published: July 01, 2019
Released on J-STAGE: July 01, 2019
JOURNAL
FREE ACCESS
Background subtraction algorithms generate a background model of the monitoring scene and compare the background model with the current video frame to detect foreground objects. In general, most of the background subtraction algorithms fail to detect foreground objects when the scene illumination changes. An entropy based background subtraction algorithm is proposed to address this problem. The proposed method adapts to illumination changes by updating the background model according to differences in entropy value between the current frame and the previous frame. This entropy based background modeling can efficiently handle both sudden and gradual illumination variations. The proposed algorithm is tested in six video sequences and compared with four algorithms to demonstrate its efficiency in terms of F-score, similarity and frame rate.
View full abstract