It is a challenge to represent the target appearance model for moving object tracking under complex environment. This study presents a novel method with appearance model described by double templates based on timed motion history image with HSV color histogram feature (tMHI-HSV). The main components include offline template and online template initialization, tMHI-HSV-based candidate patches feature histograms calculation, double templates matching (DTM) for object location, and templates updating. Firstly, we initialize the target object region and calculate its HSV color histogram feature as offline template and online template. Secondly, the tMHI-HSV is used to segment the motion region and calculate these candidate object patches' color histograms to represent their appearance models. Finally, we utilize the DTM method to trace the target and update the offline template and online template real-timely. The experimental results show that the proposed method can efficiently handle the scale variation and pose change of the rigid and nonrigid objects, even in illumination change and occlusion visual environment.
Abstract-Cloud computing became an emerging technology.The benefits have made a lot of institutions and companies looking to use this technology. The process of migration from legacy systems to cloud computing environments is a complex process. The migration process does not represent the movement of data, applications and service only but also presents the process from the early stages of planning and continue until after the selection and transfer of data to a specific deployment model. Security is the biggest concern to consumers during the migration process, whether immigration initial from legacy systems to the environment of cloud computing or migration between the clouds. This paper presents an overview of the security requirements: before, during and after the migration from legacy systems to cloud computing, as well as security requirements data migration between the clouds.
To enhance efforts directed at unraveling the role and mechanisms of leukocytes in mediating injury to corneal epithelium, an isolated bovine corneal cup was developed and evaluated. Bovine peripheral leukocytes and lysates were added to the corneal epithelial surface of isolated cornea for various periods after which the degree of morphologic changes and cell damage were assessed using light and electron microscopy. Results of these studies indicate that leukocyte/epithelial cell interactions are characterized by five successive stages: (1) leukocyte adhesion to superficial layer of the epithelium, (2) leukocyte penetration beneath the superficial epithelium, (3) epithelial cell injury, (4) leukocyte phagocytosis of killed epithelial cells and (5) ulceration and total destruction of the full thickness of the epithelial layer. The above sequence appears to be both time and dose dependent; that is epithelial cells exposed to leukocytes for short periods (5-60 minutes) or to low dose levels (10(5) - 10(7) cells/ml) shows leukocyte adhesion and penetration beneath the superficial layer of the epithelium, (stage 1 and 2), while longer exposures (2-3 hours) or higher numbers of leukocytes (10(7) - 10(8) cells/ml), leads to deeper penetration of epithelium by leukocytes and epithelial injury (Stages 3,4,and 5). We also observed that direct contact of intact leukocytes with epithelial cells is apparently necessary to induce this type of injury. These findings demonstrate the ability of leukocytes to destroy corneal epithelial cells and the value of this new ocular model for studies of the basic immunology of ocular inflammation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations –citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.