Multiscale geometric feature extraction and object recognition

نویسنده

  • Seema Jaggi
چکیده

This thesis describes a new adaptive approximation technique called high resolution pursuit (HRP), and demonstrates how HRP can be used to extract features that are suitable for object recognition. Recently, adaptive approximation techniques have become popular for obtaining representations of large classes of signals. These techniques include method of frames, matching pursuit, and basis pursuit. In this work, HRP is developed as an alternative to existing function approximation techniques. Existing techniques do not always efficiently yield representations that are sparse and physically interpretable. HRP is an enhanced version of the matching pursuit algorithm that overcomes its shortcomings by emphasizing local fit over global fit at each stage. Furthermore, the HRP algorithm has the same order of computational complexity as matching pursuit. To demonstrate the utility of HRP for feature extraction, we develop a technique based on HRP features for the recognition of airplanes from silhouettes. Features extracted by HRP are shown to be robust to boundary perturbations, scale variations, small orientation variations, and variations due to occlusion. Furthermore, the HRPbased technique is shown to surpass the traditional Fourier descriptor techniques in the presence of occlusion. Thesis Supervisor: Alan S. Willsky Title: Professor of Electrical Engineering and Computer Science Thesis Supervisor: W. Clement 1\'.'arl Title: Assistant Professor of Electrical, Computer, and Systems Engineering Boston University

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Fisher Discriminant Analysis (FDA), a supervised feature reduction method in seismic object detection

Automatic processes on seismic data using pattern recognition is one of the interesting fields in geophysical data interpretation. One part is the seismic object detection using different supervised classification methods that finally has an output as a probability cube. Object detection process starts with generating a pickset of two classes labeled as object and non-object and then selecting ...

متن کامل

Contours Extraction Using Line Detection and Zernike Moment

Most of the contour detection methods suffers from some drawbacks such as noise, occlusion of objects, shifting, scaling and rotation of objects in image which they suppress the recognition accuracy. To solve the problem, this paper utilizes Zernike Moment (ZM) and Pseudo Zernike Moment (PZM) to extract object contour features in all situations such as rotation, scaling and shifting of object i...

متن کامل

Introducing a method for extracting features from facial images based on applying transformations to features obtained from convolutional neural networks

In pattern recognition, features are denoting some measurable characteristics of an observed phenomenon and feature extraction is the procedure of measuring these characteristics. A set of features can be expressed by a feature vector which is used as the input data of a system. An efficient feature extraction method can improve the performance of a machine learning system such as face recognit...

متن کامل

A novel Local feature descriptor using the Mercator projection for 3D object recognition

Point cloud processing is a rapidly growing research area of computer vision. Introducing of cheap range sensors has made a great interest in the point cloud processing and 3D object recognition. 3D object recognition methods can be divided into two categories: global and local feature-based methods. Global features describe the entire model shape whereas local features encode the neighborhood ...

متن کامل

Face Recognition using Curvelet Transform

This report is accompanied by a MATLAB package that can be requested by mail. Abstract Face recognition has been studied extensively for more than 20 years now. Since the beginning of 90s the subject has became a major issue. This technology is used in many important real-world applications, such as video surveillance, smart cards, database security, internet and intranet access. This report re...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1997