The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Conference proceedings front matter may contain various advertisements, welcome messages, committee or program information, and other miscellaneous conference information. This may in some cases also include the cover art, table of contents, copyright statements, title-page or half title-pages, blank pages, venue maps or other general information relating to the conference that was part of the original...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Unattended object detection is a crucial task in visual surveillance systems. However, it is challenging in handling false alarms and miss detection rate. In this paper, a two-stage method for the unattended object detection is proposed where the first stage tries to detect all possible unattended objects and prevent miss detections by considering attributes of objects such as staticness, foregroundness,...
In this paper, we present a novel approach for contour detection with Convolutional Neural Networks. A multi-scale CNN learning framework is designed to automatically learn the most relevant features for contour patch detection. Our method uses patch-level measurements to create contour maps with overlapping patches making interdependent decisions. We show the proposed CNN is very efficient to detect...
Analyzing the measurements of Radar Cross Section (RCS) characteristics is an effective and important method in the non-cooperative target detection, such as the ballistic missiles. However we should not ignore target fluctuation and should obtain dynamic RCS measurements for the targets over appropriate aspect angle regions. In this paper the geometric model of a precessing conical warhead in flight...
Face has been used as one of the mainstream manners for user identification. However, with the popularity of face-swapping apps, it takes only a few seconds to change the faces between two facial images. Such swapped results, when using improperly or carelessly, might create some security issues in certain applications. This paper is the first work to address the importance of this issue and discusses...
Video forgery acts have been increasing in recent years due to the easy accessibility of sophisticated video editing software. Criminals may be using video tampering as a way to get acquitted on the basis that the video evidences presented in court could not prove that they have performed the crime at a particular time or place. For high profile criminal court cases, it is likely that a video that...
Images often contain Similar but Genuine Objects (SGO), such as two beverage bottles, similar windows, etc. This poses a natural but unexplored challenge to existing copy-move forgery detection methods with an assumption that similar regions are always manipulated for forgery purpose. In this work, we investigate the limitations of the existing CMFD methods under the SGO setting, and propose a new...
Go-Motion: An Android Application Detecting Motion Gestures for Generating Basic Mobile Phone Commands Utilizing Kanade-Lucas-Tomasi (KLT) Algorithm is an application designed to facilitate a natural way of communication with machines, specifically, Android mobile phones, by using hand gestures. The research aims to provide an alternative way of using command on phone by implementing image processing...
This paper presents a novel solution for finding a person of interest using a mobile agent platform developed with Raspberry PI III module in indoor dynamic environments. This method is capable of extracting human figures from complex backgrounds while the platform is still moving and compare the identified human figures against the query image using features like clothing and other accessories. The...
Human activity recognition has been an active area of research in computer vision and artificial intelligence since the last two decades. This research aims to combine color information from RGBD with motion information from skeletal joints in order to capture subtle motions in the video which in used to tackle temporal features extraction. The researchers show this by using combined deep architecture:...
This paper presents handwritten non-cursive Sinhala character recognition method based on discrete feature extraction of the well thinned character. Study presents adjacent pixel connectivity based thinning algorithm for skeletonizing handwritten characters and curvature based pattern matching and histogram formation method for recognition which can sensitively accessed the round, confusion shapes...
Bio-metric based recognition is rapidly replacing the non-biometric based recognition systems. Face recognition is one of the most important bio-metric based recognition technique. Different algorithms exist for face recognition that works well on high resolution digital images. The aim of this work is to check whether these existing face recognition algorithms work on low quality Closed Circuit Television...
Fish disease diagnosis is a difficult process and needs high level of expertise. Any attempt of developing the system dealing with the fish disease diagnosis and to overcome various difficulties is in it has still not met any extra ordinary success. Identification of diseased fish at early stage is necessary step to prevent from spreading disease. This paper recognizes and identifies the EUS (Epizootic...
A nonverbal communication involves movements of different body parts to communicate a particular message. Hand, face and lips movements or other movement of body parts are regarded as gesture. In this paper we have proposed a method based on hand gesture recognition to recognize the different gesture used by deaf person to communicate using scale-invariant feature transform (SFIT) algorithm. This...
Person re-identification using analysis of photographs and video footages has a myriad of applications ranging from surveillance to human analytics. Techniques have been developed for closed-set re-identification of people in footages based on prior knowledge of the persons such as photographs, body features or face recognition models. However, except for face recognition, such methods are often incapable...
The Local Binary Pattern Histogram(LBPH) algorithm is a simple solution on face recognition problem, which can recognize both front face and side face. However, the recognition rate of LBPH algorithm under the conditions of illumination diversification, expression variation and attitude deflection is decreased. To solve this problem, a modified LBPH algorithm based on pixel neighborhood gray median(MLBPH)...
The interest on emotional computing has been increasing as many applications were in demand by multiple markets. This paper mainly focuses on different learning methods, and has implemented several methods: Support Vector Machine (SVM) and Deep Boltzmann Machine (DBM) for facial emotion recognition. The training and testing data sets of facial emotion prediction are from FERA 2015, and geometric features...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.