Pose Estimation in AVI from Unknown Correspondences Using Genetic Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 4
Abstract
Abstract: In this paper we propose a model based approach to determine correspondences and pose of objects in automated visual inspection applications. The method does not consider correspondence and pose estimation problems as two distinct processes. Rather they are viewed as two cooperative processes and implemented through a proposed new composite chromosome structure of Genetic Algorithm (GA). GA evolves sets of posesand matched vertices sequences and the evolution process continues until a good accuracy in the values of pose parameters are obtained. The strength and robustness of our method are demonstrated by thorough testing on both simulated and real data in an Automated Visual Inspection (AVI) system.
Authors and Affiliations
A. Mukhopadhyay , S. Hati
The Architectural Design of Healthcare Service with Big-Data Storing Mechanism
Abstract: Healthcare is the diagnosis, treatment, and prevention of disease, illness, injury, and other physical and mental impairments in human beings. Healthcare is delivered by practitioners in allied health, de...
Privacy Protection in Personalized Web Search Via TaxonomyStructure
Abstract: Web search engine has long become the most important portal for ordinary people looking foruseful information on the web. User might experience failure when search engine return irrelevanceinformation due to en...
Comparative Study of AODV, FSR and IERP on MANET usingGrid topology
Abstract: Over the recent many of years, the use of wireless networks has become very popular. A MANET is acollection of wireless mobile nodes without the use of any fixed network infrastructure or centralizedadministrat...
Comparative Study of PEGASIS Protocols inWireless Sensor Network
Abstract: The area of Wireless Sensor Networks (WSNs) is one of the fast growing and emerging field in the scientific and engineering world. It is an ad-hoc network that consists of small nodes with sensing, computing an...
Authentication Scheme for Session Password using matrix Colour and Text
The most common method used for authentication is Textual passwords. But textual passwords are in risk to eves dropping, dictionary attacks, social engineering and shoulder surfing. Graphical passwords are ...