Application of Stand-PSO Technique for Optimization Cameras’ 2D Dispositions in a MoCap system
Journal Title: Journal of Applied Computer Science & Mathematics - Year 2016, Vol 10, Issue 21
Abstract
In this paper, a detailed study of the Particle Swarm Optimization (PSO) technique is given in its standard version to solve a network camera placement problem and to ensure the coverage of a reflector point by, at least, two cameras in each frame of a motion sequence of an object in movement in a MoCap (Motion Capture) system. Solving the problem is by optimizing the extrinsic camera parameters for the whole network. The interest of this study is to determine the advantages and limits of this metaheuristic. Simulation results for 2D scenarios showed the effectiveness of this technique when considering all continuous space and the presence of obstacles.
Authors and Affiliations
Salim ABDESSELAM, Abir BETKA, Abida TOUMI, 4Zine-Eddine BAARIR
Application of Stand-PSO Technique for Optimization Cameras’ 2D Dispositions in a MoCap system
In this paper, a detailed study of the Particle Swarm Optimization (PSO) technique is given in its standard version to solve a network camera placement problem and to ensure the coverage of a reflector point by, at least...
A Formal Verification Model for Performance Analysis of Reinforcement Learning Algorithms Applied to Dynamic Networks
Routing data packets in a dynamic network is a difficult and important problem in computer networks. As the network is dynamic, it is subject to frequent topology changes and is subject to variable link costs due to cong...
Developing a Mathematical Model to Estimate the Intensity of the Global Radiation
–This research aimed to create an empirical mathematical model to estimate the average monthly of total daily radiation of the global radiation in the middle of northeast Thailand. The model showed the ratio of the month...
Real World Applications of MGR, Neeva and KN-Hash
Hash functions have prominent role in cryptography because of their ubiquitous applications in real world. Earlier, it was used for authentication only but with continuous research and development, it has been started us...
Novel Crypting Methods Based on Singular Values Decomposition
With the rapid development of multimedia exchanges, it is necessary to dispose secure systems to protect data and ensure the security of transfer. Two encryption schemes are proposed in this letter where the second is ob...