The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Camera tamper detection is the ability to detect faults and operational failures in video surveillance cameras by analyzing the video. Researchers have increasingly focused on such techniques attributing to the ubiquitous deployment of large scale surveillance systems. In this paper, a signal detection theory approach is proposed to quantitatively analyze the information being captured by the camera...
This paper proposes a simple but efficient shape regression method for face alignment using an ensemble of random ferns. First, a classification method is used to obtain several mean shapes for initialization. Second, an ensemble of local random ferns is learned based on the correlation between the projected regression targets and local pixel-difference matrix for each landmark. Third, the ensemble...
To compare rates of clinical pregnancy (CPR) and live birth (LBR) following embryo transfer (ET) performed by reproductive endocrinology and infertility (REI) fellows before and after a prolonged lapse in clinical training due to an 18-month research rotation.Retrospective cohort study.Not applicable.All women undergoing in vitro fertilization (IVF) and IVF–intracytoplasmic sperm injection (ICSI)...
Although multi-view datasets have become more accessible in the real-world applications, most state-of-the-art action recognition methods applied to those datasets rely on simple view agreement when combining local information from various views together. This leads to deteriorated performance in situations with view insufficiency and view disagreements. In this paper, we propose a novel framework...
Attention deficits are a highly prevalent result of traumatic brain injury (TBI) that has a profound effect on an individual's functional abilities. However, studies that test the severely impaired inpatient population are scarce. 21 severe TBI inpatients completed 2-week intervention (either visuo-haptic environment training or standard attention training). Results indicate that patients who received...
To assess pregnancy rates before and after a training intervention in which reproductive endocrinology and infertility fellows were required to perform 100 IUIs before performing ETs.Retrospective cohort study.Large, academic training program.Not applicable.Comparing pregnancy rates between two time periods: July 1998–June 2001 (before IUI intervention) and July 2001–June 2010 (after IUI intervention)...
3D face recognition for partial data is a very challenging task. The task is even more challenging when the gallery sample originates from one side of the face while the probe sample originates from the other. We present a new method for computing the similarity of partial 3D data for the purpose of face recognition. This method improves upon an existing Semi-Coupled Dictionary Learning method by...
In this paper, we demonstrate the effectiveness of using statistical shape priors to recover shape descriptors from occluded objects in a level set based variational framework. Parameters that balance curve evolution forces are estimated systematically through embedded discrete Conditional Random Field (CRF). In addition, our approach exploits the benefit of using spectral data to construct a local...
Collection of wireless nodes like mobile, laptops, palmtops etc. can creates a dynamic wireless network without using any existing infrastructure known as Mobile Ad-Hoc Network (MANET). MANET performs peer to peer interactions among the wireless nodes participating in the network. Each node in the network must be able to function as a router as well to relay the packets generated by other nodes. Due...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.