3,895 research outputs found

    A MATLAB SMO implementation to train a SVM classifier: Application to multi-style license plate numbers recognition

    Get PDF
    This paper implements the Support Vector Machine (SVM) training procedure proposed by John Platt denominated Sequential Minimimal Optimization (SMO). The application of this system involves a multi-style license plate characters recognition identifying numbers from “0” to “9”. In order to be robust against license plates with different character/background colors, the characters (numbers) visual information is encoded using Histograms of Oriented Gradients (HOG). A reliability measure to validate the system outputs is also proposed. Several tests are performed to evaluate the sensitivity of the algorithm to different parameters and kernel functions.Fil: Negri, Pablo Augusto. Consejo Nacional de Investigaciones Científicas y Técnicas. Oficina de Coordinación Administrativa Ciudad Universitaria. Instituto de Investigación En Ciencias de la Computación. Universidad de Buenos Aires. Facultad de Ciencias Exactas y Naturales. Instituto de Investigación En Ciencias de la Computacion; Argentin

    Automated license plate recognition: a survey on methods and techniques

    Get PDF
    With the explosive growth in the number of vehicles in use, automated license plate recognition (ALPR) systems are required for a wide range of tasks such as law enforcement, surveillance, and toll booth operations. The operational specifications of these systems are diverse due to the differences in the intended application. For instance, they may need to run on handheld devices or cloud servers, or operate in low light and adverse weather conditions. In order to meet these requirements, a variety of techniques have been developed for license plate recognition. Even though there has been a notable improvement in the current ALPR methods, there is a requirement to be filled in ALPR techniques for a complex environment. Thus, many approaches are sensitive to the changes in illumination and operate mostly in daylight. This study explores the methods and techniques used in ALPR in recent literature. We present a critical and constructive analysis of related studies in the field of ALPR and identify the open challenge faced by researchers and developers. Further, we provide future research directions and recommendations to optimize the current solutions to work under extreme conditions

    The Evolution of ICT in the Public Safety domain: Challenges and Opportunities

    Get PDF
    The services provided by public safety organizations bring value to society by creating a stable and secure environment. These services include protection to people environment and properties and they address a large number of threats both natural and man-made, acts of terrorism, technological, radiological or environmental accidents. Information and Communication Technologies (ICT) have always played an important role in the public safety domain. The capability of exchanging information (e.g., voice or data) is essential to improve the coordination of public safety officers during an emergency crisis. Wireless communications are particularly important in field operations to support the mobility of first responders. Operational and business requirements in the public safety domain are significantly different from the commercial domain. Innovative ICT concepts and technologies may not be directly applicable to the public safety domain or they need to be customized to fit specific requirements (e.g., security). This paper will identify the most significant challenges in the Public Safey domain, the main technical enablers and the opportunities provided by new ICT technologies. In particular, this paper focuses on the lack of interoperability and broadband connectivity for public safety organizations. The potential evolution paths for ICT in the public safety domain will also be described.JRC.G.6-Security technology assessmen

    An Examination of Personality as a Predictor of Guard Behavior in a Virtual Environment

    Get PDF
    Military personnel need access to realistic training tools that can provide a safe environment in which to acquire skills that will generalize to real world tasks. A virtual environment (VE) is one such tool. The focus of the present study was to evaluate a VE as a training tool for military guards. The first goal was to examine the potential of VE technology to provide effective training for standing watch at a military checkpoint. The second goal was to study a set of personality traits that might predict performance. Participants completed the NEO Personality Inventory and were trained to perform the role of a military checkpoint guard within a CAVE Automatic Virtual Environment. Trainees interacted with virtual drivers and determined whether drivers exhibited suspicious behavior and met identification requirements for entry onto a fictional base. Results indicated that participants were able to use VE technology to (a) familiarize and immerse themselves in a military checkpoint task, (b) improve performance on training scenarios, and (c) transfer their knowledge from one session to a subsequent session. Examination of personality traits yielded significant results only for openness as a predictor of performance. Collectively, these findings suggest that VEs show potential for scenario-based training

    Music for autism: a protocol for an international randomized crossover trial on music therapy for children with autism

    Get PDF
    The notion of a connection between autism and music is as old as the first reported cases of autism, and music has been used as a therapeutic tool for many decades. Music therapy holds promise as an intervention for individuals with autism, harnessing their strengths in music processing to enhance communication and expression. While previous randomized controlled trials have demonstrated positive outcomes in terms of global improvement and quality of life, their reliance on psychological outcomes restricts our understanding of underlying mechanisms. This paper introduces the protocol for the Music for Autism study, a randomized crossover trial designed to investigate the effects of a 12-week music therapy intervention on a range of psychometric, neuroimaging, and biological outcomes in school-aged children with autism. The protocol builds upon previous research and aims to both replicate and expand upon findings that demonstrated improvements in social communication and functional brain connectivity following a music intervention. The primary objective of this trial is to determine whether music therapy leads to improvements in social communication and functional brain connectivity as compared to play-based therapy. In addition, secondary aims include exploring various relevant psychometric, neuroimaging, and biological outcomes. To achieve these objectives, we will enroll 80 participants aged 6–12 years in this international, assessor-blinded, crossover randomized controlled trial. Each participant will be randomly assigned to receive either music therapy or play-based therapy for a period of 12 weeks, followed by a 12-week washout period, after which they will receive the alternate intervention. Assessments will be conducted four times, before and after each intervention period. The protocol of the Music for Autism trial provides a comprehensive framework for studying the effects of music therapy on a range of multidimensional outcomes in children with autism. The findings from this trial have the potential to contribute to the development of evidence-based interventions that leverage strengths in music processing to address the complex challenges faced by individuals with autism.publishedVersio

    Normative spatiotemporal fetal brain maturation with satisfactory development at 2 years

    Get PDF
    Maturation of the human fetal brain should follow precisely scheduled structural growth and folding of the cerebral cortex for optimal postnatal function1 . We present a normative digital atlas of fetal brain maturation based on a prospective international cohort of healthy pregnant women2 , selected using World Health Organization recommendations for growth standards3 . Their fetuses were accurately dated in the first trimester, with satisfactory growth and neurodevelopment from early pregnancy to 2 years of age4,5 . The atlas was produced using 1,059 optimal quality, three dimensional ultrasound brain volumes from 899 of the fetuses and an automated analysis pipeline6–8 . The atlas corresponds structurally to published magnetic resonance images9 , but with finer anatomical details in deep grey matter. The between study site variability represented less than 8.0% of the total variance of all brain measures, supporting pooling data from the eight study sites to produce patterns of normative maturation. We have thereby generated an average representation of each cerebral hemisphere between 14 and 31 weeks’ gestation with quantification of intracranial volume variability and growth patterns. Emergent asymmetries were detectable from as early as 14 weeks, with peak asymmetries in regions associated with language development and functional lateralization between 20 and 26 weeks’ gestation. These patterns were validated in 1,487 three-dimensional brain volumes from 1,295 different fetuses in the same cohort. We provide a unique spatiotemporal benchmark of fetal brain maturation from a large cohort with normative postnatal growth and neurodevelopment

    ResearchNews, Volume 8, 2014.

    Get PDF

    Biometric Identification, Law and Ethics

    Get PDF
    This book undertakes a multifaceted and integrated examination of biometric identification, including the current state of the technology, how it is being used, the key ethical issues, and the implications for law and regulation. The five chapters examine the main forms of contemporary biometrics–fingerprint recognition, facial recognition and DNA identification– as well the integration of biometric data with other forms of personal data, analyses key ethical concepts in play, including privacy, individual autonomy, collective responsibility, and joint ownership rights, and proposes a raft of principles to guide the regulation of biometrics in liberal democracies.Biometric identification technology is developing rapidly and being implemented more widely, along with other forms of information technology. As products, services and communication moves online, digital identity and security is becoming more important. Biometric identification facilitates this transition. Citizens now use biometrics to access a smartphone or obtain a passport; law enforcement agencies use biometrics in association with CCTV to identify a terrorist in a crowd, or identify a suspect via their fingerprints or DNA; and companies use biometrics to identify their customers and employees. In some cases the use of biometrics is governed by law, in others the technology has developed and been implemented so quickly that, perhaps because it has been viewed as a valuable security enhancement, laws regulating its use have often not been updated to reflect new applications. However, the technology associated with biometrics raises significant ethical problems, including in relation to individual privacy, ownership of biometric data, dual use and, more generally, as is illustrated by the increasing use of biometrics in authoritarian states such as China, the potential for unregulated biometrics to undermine fundamental principles of liberal democracy. Resolving these ethical problems is a vital step towards more effective regulation.Ethics & Philosophy of Technolog

    Deployment of DeepTech AI Models in Engineering Solutions

    Get PDF
    Ponencia presentada en ICRAMAE-2k21, International Conference on Recent Advances in Mechanical and Automation Engineering, Vivekananda Global University, Jaipur, India, 29-30th November 2021[EN]Industrial Engineering is a branch of engineering that focuses on the design and operation of industrial processes. It involves the application of science to the construction of production systems. This field has undergone significant advancements over the last decades. In the last centuries, the emergence of different technologies has led to breakthroughs in engineering, making it possible to automate processes in industries. Steam, electricity, the internet, and now Artificial Intelligence technologies have all brought with them greater levels of automation to machinery, gradually decreasing human involvement in processes such as procurement, raw material handling, manufacturing and quality control
    corecore