Computer Vision: Visual Extent of an Object
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 4
Abstract
The visual extent of an object reaches beyond the object itself. It is reflected in image retrieval techniques which combine statistics from the whole image in order to identify the image within. Nevertheless, it is still unclear to what degree and how this visual extent of an object affects the classification performance.Here we analyze the visual extent of an object on the Pascal VOC dataset using bag of words implementation with SIFT Descriptors. Our analysis is performed from two angles: (a) Not knowing the object location, we determine where in the image the support for object classification resides (normal situation) and (b) Assuming that the object location is known, we evaluate he relative potential of the object and its surround, and of the object border and object interior (ideal situation).
Authors and Affiliations
Akshit Chopra
Spatial Correlation Based Medium Access Control Protocol Using DSR & AODV Routing In Wireless Sensor Networks For Energy Efficient Data Collection
In Wireless sensor network sensor nodes have a limited battery life and their efficient utilization is a very much importent task. Their are many ways are proposed for efficient utilization of energy.For efficie...
Driving Simulator
Abstract: Simulators which are developed by suppliers individually for specific application purpose are known as Driving Simulator. Most of the conventional driving simulators provide some flexibility for construc...
A Method for Efficient and Minimal Utilization of Mobile Resources for Multimedia Based on Interactive Streaming
Abstract: The dramatic emergence and exponential growth of mobile devices have made them one of the fast growing consumer commodities in history and are now dominating the appliance market. The spectrum bears a wide rang...
TAB-PRRA: Improved Link Repair Decision Mechanism for Ondemand Routing in MANET
The traditional AODV protocol uses a fixed hop count based threshold as a basis for deciding when to invoke Local Repair or Source Repair in case of a link break. The problem arises with this type of repairing m...
Secure Sharing of Personal Health Record in Server withOn-track ECG Monitoring
Abstract: Personal Health Record (PHR) paved the way to the patient centric model of health information exchange. This service allows a patient to create, manage, and control her personal health data in one place t...