The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, there have been very promising applications of biometric systems to improve access control systems and security of data recording. Of all the biometric systems available, fingerprint verification is the most dominant in commercial application due to its excellent performance and low cost. In this study, it is attempted to implement a fingerprint and face detection and recognition...
this article reports the development and experimental analysis of an Urdu Optical Character REcognition (OCR) system. The proposed approach presents the preprocessing, features extraction and classification of Urdu language text. Three different features extraction techniques, the Hu moments, Zernike moments and the Principal Component Analysis (PCA) are used. Decision Tree algorithm J-48 is used...
Nowadays, hand gesture is one of main considerations for hearing impaired people because they use sign language to communicate with each other and to normal people. In general, the normal people have difficulties with sign language therefore they need an interpreter supporting communication. Then the automatic hand gesture recognition system is needed to help hearing impaired people integrating into...
The goal of this paper is to present a new fuzzy logic-based feature extraction method, called Fuzzy Generalized Two-Dimensional Fisher's Linear Discriminant (FG-2DFLD) method for face recognition. More specifically, the FG-2DFLD method is an extension of the G-2DFLD method. In FG-2DFLD method, we introduced fuzzy membership values to all the training samples and incorporated them into the within-class...
In recent years considerable progress has been made in the area of face recognition. Through the work of computer science engineers, computers can now outperform humans in many face recognition tasks, particularly those in which large databases of faces must be searched. A system with the ability to detect and recognize faces has many potential applications including crowd and airport surveillance,...
Face recognition at a distance is still a challenging problem due to the low resolution face images resulting from the remote distance. To motivate researches on the problem and make up for the shortage of existing databases, we introduce MDCI database in this paper. The database contains 677 videos and 9734 pictures from 155 subjects captured by five different cameras, at four kinds of distances...
Automatic gender recognition has been becoming very important in potential applications. Many state-of-the-art gender recognition approaches based on a variety of biometrics, such as face, body shape, voice, are proposed recently. Among them, relying on voice is suboptimal due to significant variations in pitch, emotion, and noise in real-world speech. Inspired from the speaker recognition approaches...
Automatic personal identification from their physical and behavioral traits, called biometrics technologies, is now needed in many fields such as: surveillance systems, access control systems, physical buildings and many more applications. In this paper, we propose an efficient online personal identification system based on Multi-Spectral Palmprint images (MSP) using Hidden Markov Model (HMM) and...
Palmprint recognition is physiological biometric method used for recognition of person. It consists of various features like texture, statistical, line, point, geometry features which are used separately or by the combination of two or more features for quick and correct recognition purpose. The proposed method Palmprint Recognition using DWT and DCT with PCA technique (PRDDP) is simple and effective...
Noninvasive fetal ECG monitoring makes use of electrodes placed on the mother's abdomen with sophisticated algorithms to separate fetal and mother activity. In this task often Blind Source Separation is used as an intermediate step. To solve Blind Source Separation problem is generally employed PCA and ICA. COMBI and MULTI-COMBI algorithms offer novel schemes for combining PCA and ICA, enabling exploit...
This paper presents a robust and anticipative realtime gesture recognition and its motion quality analysis module. By utilizing a motion capture device, the system recognizes gestures performed by a human, where the recognition process is based on skeleton analysis and motion features computation. Gestures are collected from a single person. Skeleton joints are used to compute features which are stored...
Shape outliers can seriously affect the statistical analysis of the shape variations usually performed by the Principal Component Analysis PCA. This paper presents an algorithm for outliers detection and shape restoration as a new strategy for robust statistical shape analysis. The proposed framework is founded on an elastic metric in the shape space to cope with the nonlinear shape variability. The...
In this proposed work, a fully automatic 3D Face Recognition system across pose is presented, which works successfully on three modern databases namely the Frav3D, GavabDB and the Bosphorus databases. Poses handled in the system are yaw, pitch and roll varying from 0° to ±30° as well as expressions. The feature extraction is by depth face images with variation in depth values of the surface normals...
Feature extraction specific to face recognition, an improved version of two-dimensional principal component analysis (2DPCA) named Two-directional and Modular Fuzzy 2DPCA (MF(2D)2PCA) is proposed in this paper. First, Fuzzy K-Nearest Neighbor algorithm is used to get the fuzzy membership degree matrix of training samples. Then, modular processing is done to training images, combing with fuzzy membership...
In today's age of automation, face recognition is a vital component for authorization and security. It has received substantial attention from researchers in various fields of science such as biometrics and computer vision. In this paper, a face recognition system using Principal Component Analysis (PCA) with Back Propagation Neural Networks (BPNN) is analysed. A neural based algorithm is presented...
Even if, most of 2D face recognition approaches reached recognition rate more than 90% in controlled environment, current days face recognition systems degrade their performance in case of uncontrolled environment which includes pose variations, illumination variations, expression variations and ageing effect etc. Inclusion of 3D face analysis gives an age over 2D face recognition as they give vital...
Misclassification, which is a common phenomenon due to the absence of a perfect classifier, incurs losses from different classes. This paper aims on developing an algorithm which incorporates a cost sensitive subspace reduction technique for extracting the cost sensitive features from facial images of test subjects. The weight vector which projects the faces on to a new domain with lesser dimensions...
A protein-protein interaction is important for all living cells since it performs important biological functions to form cells as well as control their mechanisms. Identifying PPIs is always a challenge for biology researchers. Many computational methods have been developed to predict PPIs using different data types including gene neighborhood and genetic profiles. However, these methods cannot be...
Gender recognition is one of the most popular research areas in security, biometrics and human computer interaction applications [1]. In previous studies, structural and textural features of facial expressions were mostly used to identify gender. One of the biggest challenges of gender recognition is differentiating textual features of faces that decrease the accuracy of the proposed method, and there...
The need to identify and discern identities gradually rises in social and economic interactions along with following the rules and other fields. Accordingly, biometric data as basic information of an individual's physical and behavioral features play an important role. This article reviews the duties of face recognition, thence to make a comparison among the function of five face-recognition algorithm,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.