21 research outputs found

    Nighttime Motorcycle Detection for Sparse Traffic Images

    Get PDF
    Kecelakaan lalu lintas sebagian besar terjadi pada malam hari. Hal ini dapat dimengerti karena tingkat visibilitas yang rendah pada malam hari. Berbagai upaya untuk mengurangi kecelakaan di malam hari telah dilakukan, salah satunya dengan mengembangkan alat untuk mendeteksi kendaraan di dekatnya untuk menghindari kecelakaan. Namun, sebagian besar upaya tersebut hanya dapat mendeteksi keberadaaan mobil saja. Kebanyakan penelitian sebelumnya fokus pada mobil yang mana memiliki sepasang lampu sebagai fitur pengidentifikasi. Sedangkan bagian belakang pada sebuah sepeda motor yang mampu teridentifikasi terdiri dari tubuh pengendara motor, lampu belakang motor, dan area plat kendaraan bermotor. Untuk mendapatkan semua properti tersebut, hal pertama yang perlu dilakukan adalah menemukan area yang diduga terdapat sepeda motor menggunakan ambang batas warna HSV, yang kita sebut proposal motor. Kami mengusulkan empat fitur yang diekstrak dari piksel berwarna merah dan pemetaan tepi. Pemetaan merah mengacu pada sebaran cahaya lampu belakang motor pada gambar. Sedangkan, pemetaan tepi mengacu pada pengendara, bagian belakang sepeda motor, dan seluruh lengkungan dari objek. Untuk menunjukkan efektifitas dari fitur yang didapatkan, kami menerapkannya pada empat pengklasifikasi yang umum digunakan, seperti ANN, Decision Tree, SVM, dan Naive Bayes Classifier. Hasilnya menunjukkan bahwa ANN adalah pengklasifikasi yang lebih baik karena dapat mengklasifikasikan proposal motor dengan akurasi sebesar 63,51%, sesitivitas sebesar 55,24%, rata-rata presisi 31,18%, dan dapat memproses hingga 0,05 detik per gambar

    Episturmian words: a survey

    Get PDF
    In this paper, we survey the rich theory of infinite episturmian words which generalize to any finite alphabet, in a rather resembling way, the well-known family of Sturmian words on two letters. After recalling definitions and basic properties, we consider episturmian morphisms that allow for a deeper study of these words. Some properties of factors are described, including factor complexity, palindromes, fractional powers, frequencies, and return words. We also consider lexicographical properties of episturmian words, as well as their connection to the balance property, and related notions such as finite episturmian words, Arnoux-Rauzy sequences, and "episkew words" that generalize the skew words of Morse and Hedlund.Comment: 36 pages; major revision: improvements + new material + more reference

    Sturmian words and words with a critical exponent

    Get PDF
    Let S be a standard Sturmian word that is a fixed point of a non-trivial homomorphism. Associated to the infinite word S is a unique irrational number Ī² with 0 0 it contains a fractional power with exponent greater than Ī© - Īµ; here Ī© is a constant that depends on Ī². The constant Ī© is given explicitly. Using these results we are able to give a short proof of Mignosi's theorem and give an exact evaluation of the maximal power that can occur in a standard Sturmian word.18 page(s

    Is Local Civil Society Conducive to European Participatory Engineering

    No full text

    Managing Cybersecurity Research and Experimental Development: The REVO Approach

    No full text
    We present a systematic approach for managing a research and experimental development cybersecurity program that must be responsive to continuously evolving cybersecurity, and other, operational concerns. The approach will be of interest to research-program managers, academe, corporate leads, government leads, chief information officers, chief technology officers, and social and technology policy analysts. The approach is compatible with international standards and procedures published by the Organisation for Economic Co-operation and Development (OECD) and the Treasury Board of Canada Secretariat (TBS). The key benefits of the approach are the following: i) the breadth of the overall (cybersecurity) space is described; ii) depth statements about specific (cybersecurity) challenges are articulated and mapped to the breadth of the problem; iii) specific (cybersecurity) initiatives that have been resourced through funding or personnel are tracked and linked to specific challenges; and iv) progress is assessed through key performance indicators. Although we present examples from cybersecurity, the method may be transferred to other domains. We have found the approach to be rigorous yet adaptive to change; it challenges an organization to be explicit about the nature of its research and experimental development in a manner that fosters alignment with evolving business priorities, knowledge transfer, and partner engagement
    corecore