Abstract:
A method and a system for updating a background model based on depth are disclosed. The method includes receiving, in response to the occurrence of a predetermined background updating condition, one or more depth images captured after a time when the predetermined background updating condition occurs; obtaining, based on an original background model, foreground images in the one or more captured depth images, which are newly added compared with a depth image at the time when the predetermined background updating condition occurs; for each of foreground pixels in each of the newly added foreground images, comparing a current depth value with a previous depth value before the time when the predetermined background updating condition occurs; and updating, when the current depth value is greater than the previous depth value, the original background model as the updated background model by using the foreground pixel in the newly added foreground image.
Abstract:
Disclosed are a shadow detection method and device. The method includes a step of obtaining a depth/disparity map and color/grayscale image from a two-lens camera or stereo camera; a step of detecting and acquiring plural foreground points; a step of projecting the acquired plural foreground points into a 3-dimensional coordinate system; a step of carrying out, in the 3-dimensional coordinate system, a clustering process with respect to the projected plural foreground points so as to divide the projected plural foreground points into one or more point clouds; a step of calculating density distribution of each of the one or more point clouds by adopting a principal component analysis algorithm so as to obtain one or more principal component values of the corresponding point cloud; and a step of determining, based on the one or more principal component values, whether the corresponding point cloud is a shadow.
Abstract:
A method and an apparatus for separating objects are disclosed. The method includes obtaining a depth image including a plurality of objects; obtaining a two-dimensional image including the objects; performing pixel-clustering using depth values of pixels in the depth image and pixel values of pixels in the two-dimensional image to obtain a plurality of sub-regions; performing region-clustering for the sub-regions to obtain a clustering result as an object separation result; and outputting the object separation result.
Abstract:
A method and an apparatus for detecting persons are disclosed. The method includes initially detecting the persons in a height-top-view; dividing the height-top-view into one or more regions, and estimating crowd density in each region; determining, based on the crowd density, visible regions of the initially detected persons in each of the regions; for each of the initially detected persons, extracting a first gradient feature and a second gradient feature of the person from the height-top-view, and a grayscale image or a color image corresponding to the height-top-view, respectively; for each of the initially detected persons, determining, based on the extracted first gradient feature and second gradient feature, using a previously constructed classifier corresponding to the determined visible region of the person, a confidence level of the initially detected person; and correcting, based on the confidence level, a detection result of the initially detected persons.
Abstract:
A method and an apparatus for detecting an interest degree of a crowd in a target position are disclosed. The interest degree detection method includes projecting a depth image obtained by photographing onto a height-top-view, the depth image including the crowd and the target position; dividing the height-top-view into cells; determining density of the crowd in each cell; determining a moving speed and a moving direction of the crowd in each cell; determining orientation of the crowd in each cell; and determining, based on the density, the moving speed, the moving direction and the orientation of the crowd, the interest degree of the crowd in each cell in the target position. According to this method, the interest degree of the crowd in the target position can be detected accurately, even at a crowded place where it is difficult to detect and track a single person.
Abstract:
In order to help music players without sufficient musical knowledge to adapt original music pieces but still keep the original style, the present invention provides an interactive system and the accompanying method for creating music by substituting audio tracks. The interactive system includes a database of musical elements that comprises tonality, tempo, beat, timbre, texture, chord, and pitch, a database of music that contains multiple original music pieces, and a processor. As a result, players without strong knowledge in music theories can create adapted a music piece that matches the style of the original one.
Abstract:
In order to help music players without sufficient musical knowledge to adapt original music pieces but still keep the original style, the present invention provides an interactive system and the accompanying method for creating music by substituting audio tracks. The interactive system includes a database of musical elements that comprises tonality, tempo, beat, timbre, texture, chord, and pitch, a database of music that contains multiple original music pieces, and a processor. As a result, players without strong knowledge in music theories can create adapted a music piece that matches the style of the original one.
Abstract:
The inventive system includes a host, a network including a security gateway, and a public application. Established are an access session between the network and the host and an application session between the public application and the network. An application session record is created for the application session, and includes the user's public user identity used to access the public application, the user's private user identity used to access the network, a host identity, and an application session time, To determine the private user identity for the application session, the security gateway sends a query with the host identity and the application session time. These are compared with the host identity and access session time in an access session record, if they match, then the private user identity in the access session record is returned, and it is stored as the private user identity in the application session record.