The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Including children in the design of technologies that will have an impact on their daily lives is one of the pillars of user-centered design. Educational robots are an example of such a technology where children’s involvement is important. However, the form in which this involvement should take place is still unclear. Children do not have a lot of experience with educational robots yet, while they...
When pathologists analyze the cytopathological assessment process, they firstly find the optimum focused region by moving the microscope table along the Z axis. Auto-focusing provides a better and more effective imaging by reducing the personality dependence on the microscope system. Various studies have been carried out in the literature to determine the optimum auto-focus function. The aim of the...
When microbiology laboratory technicians examine the specimen on the microscope for recognition of bacteria, firstly they provide optimum focusing by adjusting of the microscope stage on the Z axis. Following the achievement of the optimal focus, the movement of the microscope stage on 3D axis (X-Y-Z) are performed without losing focusing in order to scan whole view of the specimen. Therefore, microscope...
Copy move attack, a special type of image forgery, is performed by copying a part of the image and pasting anywhere else in the same image. Besides block-based methods, keypoint-based methods like Scale Invariant Feature Transform (SIFT) are improved for detection of copy move attacks. In this method, firstly image keypoints are extracted and a 128 dimensional feature vector named as SIFT descriptor...
With the increase of the studies on palmprint recognition for the last 10 years, they are faced with the problems that arise from unrestricted pose (different angles and distances) of the biometrics. In this study, on the purpose of increase recognition success on palmprint recognition systems, a new approach based on geometric correction of palm region's pose is presented and system success is analyzed...
The biggest problem in the contactless biometry recognition system, whose popularity is increasing recently, is image distortion resulting from pose freedom (different angles and distances). In this study, a new approach is presented on the palm stance order to increase success on contactless palmprint verification systems. 3D palm is obtained through the stereo images received from the 2 cameras...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.