So far, biometric identification in general and facial recognition in particular are still being researched and developed for applying in several areas such as security, etc. In this paper, the authors study on some facial image recognition methods that have been researched and published in the worl[r]
This non-linear equation can be solved by Levenberg-Marquadt approach as described in the book of Scales [Scales85]. We have used the 3D reconstructed locations of both eye pupil centers as well as left and right eye corner of both eyes as fitting locations. The radius was fixed to a sligh[r]
2.2. LBP Histograms. Face recognition using histograms of LBP features was originally proposed in [ 13 ] and used by many groups since then. In the original approach, three di ff erent levels of locality are defined: pixel level, regional level, and holistic level. The f[r]
This article presented an extensive experience of the Netherlands, the United Kingdom, Denmark and Australia - four of the countries which had established the evaluation system of research activities in universities in a comprehensive way, at national level - with the content including starting time[r]
21.5 Conclusions Neural networks are standard and important tools for data mining. Many features of neural networks such as nonlinear, data-driven, universal function approximating, noise-tolerance, and parallel processing of large number of variables are especially desirable for data mining appli[r]
In smart school, the identified features of smart classroom are the face recognition system; repositories of digital learning content and online web resources, learning portals; speech/v[r]
4.1 Recognition via RGB Images For recognition comparison between FICA and four other types of conventional feature extraction methods including PCA, ICA, EICA, and PCA-LDA, all extraction methods mentioned above were implemented with the s[r]
Applicatlons 157 Imaging (Di3D, 2006) was used to acquire 3D facial sequences. The system consisfs of two pods with three cameras In each pod, and two floodlights. All six cameras have a hiph resolution four megapixel sensor. In each pod, tw[r]
Some groups of society which are illiterate and nontechnical find technical gadgets, machines and computers less convenient and friendly to work with. So, in order to enhance this interaction with such machines and devices, speech interface is added as a new natural[r]
In 1955 Martin Luther King Jr., gained national recognition for his nonviolent methods used in a bus boycott in Montgomery.. This peaceful boycott, under Dr.[r]
wearable instruments, such as LED markers, and walking surfaces [ 9 ]. Luckily, we may not need to recover 3D kinematics for gait recognition after all. In Johansson’s early psychophysical experiments [ 3 ], human subjects were able to recognize the type of movement solely by obser[r]
This paper presents approaches and methods for evaluation of research organizations. This is a newly set-up concept to be applied in Vietnam because the methods developed in other countries do not match with science and technology (S&T) requirements and conditions in Vietnam which is being on a tran[r]
TRANG 1 SUMMARY _OBJECTIVES: Evaluation the average velocity of shear wave in _ _hepatic fibrosisARFI according to Metavir classification._ _METHODS: 241 of healthy volunteers with norma[r]
METHODOLOGY: IN THIS ESSAY TWO BOOKS: HANDBOOK ON IMPACT EVALUATION - QUANTITATIVE methods and practices and Handbook on Planning, Monitoring and Evaluating for Development Results have [r]
The increased recognition of pathogenic potential in CONS and emergence of drug resistance among them demonstrates the need to adopt simple laboratory methods to identify the species and[r]
Recognition of facial expressions is an important example of face-recognition techniques used in these smart environments. It can, for example, be useful for a smart system to know whether the user looks impatient because infor- mation is being presented too slowly, or co[r]
based on [ 16 ] in the logarithmic mel-frequency filter bank domain. Our method di ff ers from conventional methods in that the proposed method attempts to incorporate phonemic information into the feature space. We apply PCA to estimate phoneme subspaces that are selected base[r]
appended to the feature vectors to account for the dynamic nature of speech. 3.3.2. Silence Detection. It is well known that the silence part of the signal alters largely the performance of a speaker verification system. Actually, silence does not carry any useful information about the speaker,[r]