Vehicle Detection Using Local Size-Specific Classifiers
نویسندگان
چکیده
منابع مشابه
Cascade of Classifiers for Vehicle Detection
Being aware of other vehicles on the road ahead is a key information to help driver assistance systems to increase driver’s safety. This paper addresses this problem, proposing a system to detect vehicles from the images provided by a single camera mounted in a mobile platform. A classifier–based approach is presented, based on the evaluation of a cascade of classifiers (COC) at different scann...
متن کاملEfficient 3D Object Detection using Multiple Pose-Specific Classifiers
We propose an efficient method for object localization and 3D pose estimation. A two-step approach is used. In the first step, a pose estimator is evaluated in the input images in order to estimate potential object locations and poses. These candidates are then validated, in the second step, by the corresponding pose-specific classifier. The result is a detection approach that avoids the inhere...
متن کاملAutomatic Sleep Stages Detection Based on EEG Signals Using Combination of Classifiers
Sleep stages classification is one of the most important methods for diagnosis in psychiatry and neurology. In this paper, a combination of three kinds of classifiers are proposed which classify the EEG signal into five sleep stages including Awake, N-REM (non-rapid eye movement) stage 1, N-REM stage 2, N-REM stage 3 and 4 (also called Slow Wave Sleep), and REM. Twenty-five all night recordings...
متن کاملVehicle Detection Using Fisheye Camera
An approach for detecting and tracking vehicles are proposed in these paper. Traffic safety applications using vehicle-to-vehicle communication is an emerging and promising area within the environment. By using a single rear-mounted fisheye camera and multiple detection algorithms to find the blind zone of the vehicle. It is driving safety supported system. Furthermore, the effects of fisheye d...
متن کاملSpam Detection on Twitter Using Traditional Classifiers
Social networking sites have become very popular in recent years. Users use them to find new friends, updates their existing friends with their latest thoughts and activities. Among these sites, Twitter is the fastest growing site. Its popularity also attracts many spammers to infiltrate legitimate users’ accounts with a large amount of spam messages. In this paper, we discuss some userbased an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEICE Transactions on Information and Systems
سال: 2016
ISSN: 0916-8532,1745-1361
DOI: 10.1587/transinf.2016edp7101