917 research outputs found
Separable time-causal and time-recursive spatio-temporal receptive fields
We present an improved model and theory for time-causal and time-recursive
spatio-temporal receptive fields, obtained by a combination of Gaussian
receptive fields over the spatial domain and first-order integrators or
equivalently truncated exponential filters coupled in cascade over the temporal
domain. Compared to previous spatio-temporal scale-space formulations in terms
of non-enhancement of local extrema or scale invariance, these receptive fields
are based on different scale-space axiomatics over time by ensuring
non-creation of new local extrema or zero-crossings with increasing temporal
scale. Specifically, extensions are presented about parameterizing the
intermediate temporal scale levels, analysing the resulting temporal dynamics
and transferring the theory to a discrete implementation in terms of recursive
filters over time.Comment: 12 pages, 2 figures, 2 tables. arXiv admin note: substantial text
overlap with arXiv:1404.203
Provably scale-covariant networks from oriented quasi quadrature measures in cascade
This article presents a continuous model for hierarchical networks based on a
combination of mathematically derived models of receptive fields and
biologically inspired computations. Based on a functional model of complex
cells in terms of an oriented quasi quadrature combination of first- and
second-order directional Gaussian derivatives, we couple such primitive
computations in cascade over combinatorial expansions over image orientations.
Scale-space properties of the computational primitives are analysed and it is
shown that the resulting representation allows for provable scale and rotation
covariance. A prototype application to texture analysis is developed and it is
demonstrated that a simplified mean-reduced representation of the resulting
QuasiQuadNet leads to promising experimental results on three texture datasets.Comment: 12 pages, 3 figures, 1 tabl
Affine Subspace Representation for Feature Description
This paper proposes a novel Affine Subspace Representation (ASR) descriptor
to deal with affine distortions induced by viewpoint changes. Unlike the
traditional local descriptors such as SIFT, ASR inherently encodes local
information of multi-view patches, making it robust to affine distortions while
maintaining a high discriminative ability. To this end, PCA is used to
represent affine-warped patches as PCA-patch vectors for its compactness and
efficiency. Then according to the subspace assumption, which implies that the
PCA-patch vectors of various affine-warped patches of the same keypoint can be
represented by a low-dimensional linear subspace, the ASR descriptor is
obtained by using a simple subspace-to-point mapping. Such a linear subspace
representation could accurately capture the underlying information of a
keypoint (local structure) under multiple views without sacrificing its
distinctiveness. To accelerate the computation of ASR descriptor, a fast
approximate algorithm is proposed by moving the most computational part (ie,
warp patch under various affine transformations) to an offline training stage.
Experimental results show that ASR is not only better than the state-of-the-art
descriptors under various image transformations, but also performs well without
a dedicated affine invariant detector when dealing with viewpoint changes.Comment: To Appear in the 2014 European Conference on Computer Visio
Effect of slow-release FSH on embryo recovery in dairy cows
AETE, Bath, UK, 8-9 September, 2017201
Whole blood transcriptome analysis reveals footprints of cattle adaptation to sub‐arctic conditions
201
A ‘quiet revolution’? The impact of Training Schools on initial teacher training partnerships
This paper discusses the impact on initial teacher training of a new policy initiative in England: the introduction of Training Schools. First, the Training School project is set in context by exploring the evolution of a partnership approach to initial teacher training in England. Ways in which Training Schools represent a break with established practice are considered together with their implications for the dominant mode of partnership led by higher education institutions (HEIs). The capacity of Training Schools to achieve their own policy objectives is examined, especially their efficacy as a strategy for managing innovation and the dissemination of innovation. The paper
ends by focusing on a particular Training School project which has adopted an unusual approach to its work and enquires whether this alternative approach could offer a more profitable way forward. During the course of the paper, five different models of partnership are considered:
collaborative, complementary, HEI-led, school-led and partnership within a partnership
Recommended from our members
Topological analysis of the vasculature of angiopoietin-expressing tumours through scale-space tracing
This work describes the topological analysis of the vasculature of tumours. The analysis is performed with a scale-space technique, which traces the centrelines of vessels as topological ridges of the image intensities and then obtains a series of measurements, which are used to compare the vasculatures. Besides the measurements directly associated with the centrelines, the scales obtained allow the estimation of width andthusareacoveredwithvessels. Tumours of SW1222 human colorectal carcinoma xenografts were observed when growing in dorsal skin-fold window chambers in mice. Three variants of the tumours expressing either endogenous levels of angiopoietins (WT) or over-expressing either angiopoietin-1 (Ang-1) or angiopoietin-2 (Ang-2) were assessed with/without vascular targeted therapy. The scale-space technique was able to discriminate between the vasculatures of the three different tumour types prior to treatment. Results also suggested that over-expression of Ang-2 was associated with susceptibility of the tumour vasculature to the vascular disrupting agent, combretastatin A4 phosphate (CA4P). Substantiation of this finding would point to the potential of tumour Ang-2 expression as a predictive bio-marker for response to CA4P
The Multiscale Morphology Filter: Identifying and Extracting Spatial Patterns in the Galaxy Distribution
We present here a new method, MMF, for automatically segmenting cosmic
structure into its basic components: clusters, filaments, and walls.
Importantly, the segmentation is scale independent, so all structures are
identified without prejudice as to their size or shape. The method is ideally
suited for extracting catalogues of clusters, walls, and filaments from samples
of galaxies in redshift surveys or from particles in cosmological N-body
simulations: it makes no prior assumptions about the scale or shape of the
structures.}Comment: Replacement with higher resolution figures. 28 pages, 17 figures. For
Full Resolution Version see:
http://www.astro.rug.nl/~weygaert/tim1publication/miguelmmf.pd
General Adaptive Neighborhood Image Restoration, Enhancement and Segmentation
12 pagesInternational audienceThis paper aims to outline the General Adaptive Neighborhood Image Processing (GANIP) approach [1–3], which has been recently introduced. An intensity image is represented with a set of local neighborhoods defined for each point of the image to be studied. These so-called General Adaptive Neighborhoods (GANs) are simultaneously adaptive with the spatial structures, the analyzing scales and the physical settings of the image to be addressed and/or the human visual system. After a brief theoretical introductory survey, the GANIP approach will be successfully applied on real application examples in image restoration, enhancement and segmentation
Pseudo Identities Based on Fingerprint Characteristics
This paper presents the integrated project TURBINE which is funded under the EU 7th research framework programme. This research is a multi-disciplinary effort on privacy enhancing technology, combining innovative developments in cryptography and fingerprint recognition. The objective of this project is to provide a breakthrough in electronic authentication for various applications in the physical world and on the Internet. On the one hand it will provide secure identity verification thanks to fingerprint recognition. On the other hand it will reliably protect the biometric data through advanced cryptography technology. In concrete terms, it will provide the assurance that (i) the data used for the authentication, generated from the fingerprint, cannot be used to restore the original fingerprint sample, (ii) the individual will be able to create different "pseudo-identities" for different applications with the same fingerprint, whilst ensuring that these different identities (and hence the related personal data) cannot be linked to each other, and (iii) the individual is enabled to revoke an biometric identifier (pseudo-identity) for a given application in case it should not be used anymore
- …
