The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When learning a new classifier, poor quality training data can significantly degrade performance. Applying selection conditions to the training data can prevent mislabeled, noisy, or damaged data from skewing the classifier. We extend a set of action attributes and apply training case attribute selection conditions to a challenging action recognition dataset.
The use of sweat pores in fingerprint recognition is becoming increasingly popular, mostly because of the wide availability of pores, which provides complementary information for matching distorted or incomplete images. In this work we present a fully automatic pore-based fingerprint recognition framework that combines both pores and ridges to measure the similarity of two images. To obtain the ridge...
In this paper I will present a technique to generate a digital signature for an image, which will uniquely identify it, using Radon transform. Even if Radon based approaches are broadly applicable to tomography (the construction of an image from the projection data related with cross-sectional scans of it), in this research work I will show how it can be successfully utilized to classify images and...
In this paper, we propose a new temporal coherent face descriptor for video gender recognition. The proposed face descriptor is constructed from detected faces of continuous video frames. Because it describes detected faces under variant changes in continuous video frames and provides a unified feature description, face normalization and alignment processes can be avoided during gender recognition...
Nowadays, more and more activity recognition algorithms begin to improve recognition performance by combining the RGB and depth information. Although, the space-time volumes (STV) algorithm and the space-time local features algorithm can combine the RGB and depth information effectively, they also have their own defects. Such as they need expensive computational cost and they are not suitable for...
Deep convolutional networks have recently shown very interesting performance in a variety of computer vision tasks. Besides network architecture optimization, a key contribution to their success is the availability of training data. Network training is usually done with manually validated data but this approach has a significant cost and poses a scalability problem. Here we introduce an innovative...
Recognizing emotions of a user while interacting with smart devices like tablets and mobile phones is a prospective computer vision problem. They are used in a variety of applications like web browsing, multimedia content playing, gaming, etc., involving human interactions. We present an emotion recognition framework that analyze the facial expressions of a mobile phone user, under various real-world...
Audio Fingerprinting is a technology commonly used in query by exact example (QBEE) music service. In order to be commercialized technology, the system performance need to meet the service quality of user experience. The paper describes the short survey of market players in order to address the factors to influence the service quality. The computing performance factors include responsiveness, database...
Big data consists of large multidimensional datasets that would often be difficult to analyze if working with the original tensor. There is a rising interest in the use of tensor decompositions for feature extraction due to the ability to extract necessary features from a large dimensional feature space. In this paper the matrix product state (MPS) decomposition is used for feature extraction of large...
Multi-index hashing (MIH) is the state-of-the-art method for indexing binary codes, as it divides long codes into substrings and builds multiple hash tables. However, MIH is based on the dataset codes uniform distribution assumption, and will lose efficiency in dealing with non-uniformly distributed codes. Besides, there are lots of results sharing the same Hamming distance to a query, which makes...
About some years ago, several biometric technologies are considered mature enough to be a new tool for security and ear-based person identification is one of these technologies. This technology provides a reliable, low cost and user-friendly viable solution for a range of access control applications. In this paper, we propose an efficient online personal identification system based on ear images....
Audio event detection has been an active field of research in recent years. However, most of the proposed methods, if not all, analyze and detect complete events and little attention has been paid for early detection. In this paper, we present a system which enables early audio event detection in continuous audio recordings in which an event can be reliably recognized when only a partial duration...
Chen et al. proposed a non-negative local coordinate factorization algorithm for feature extraction (NLCF) [1], which incorporated the local coordinate constraint into non-negative matrix factorization (NMF). However, NLCF is actually a unsupervised method without making use of prior information of problems in hand. In this paper, we propose a novel graph regularized non-negative local coordinate...
This paper provides a novel and unified framework of representation based classification technique. The proposed atomic representation based classification (ARC) framework includes, but not limited to, sparse representation based classification (SRC), low-rank representation based classification (LRRC) as special cases. Despite good performance, most existing classification methods are heavily reliant...
There has long been a concern to improve the techniques of image processing for PCB's inspection. However, it is noticed the focus is mainly on the inspection of PCB in mass production. Even with a low volume of production, the small series production has become increasingly relevant. This work presents an image processing pipeline for mounted PCB inspection in small series production, strongly based...
In this paper, microcontroller based automatic door open system has been developed. The system is developed as speech recognition circuit where programmable voice is used as reference. Programmable means trained voice has been used for identification of authorized and unauthorized person. As software part, MATLAB GUI interface has been used to record authorized voice, and to synthesize the recorded...
As modern technology evolves, the use of face recognition system is scattering in different sectors of commercial markets rather than in security purposes only. Various approaches are introduced for face recognition system, among them principal component analysis is one of the simplest and efficient method. To improve the performance of face recognition, choosing a threshold value and minimum number...
Recently, state-of-the-art recognition accuracies for pose-invariant face recognition have been achieved by using 2D-Warping methods in a nearest-neighbor framework. However, the main drawback of these methods is the high computational complexity. In this paper we address this issue. We use a simple and fast method to get a rough estimate of a 2D-Warping. This estimate can then be used to apply an...
Automatic facial expression classification is a challenging problem for developing intelligent human-computer interaction systems. In order to take into account the expression dynamics, existing works usually make the assumption that a specific facial expression is displayed with a pre-segmented evolution, i.e. starting from neutral and finishing on an apex frame. In this paper, we propose a method...
Current studies of facial expression recognition (FER) pay little attention to the age effect on the performance of expression recognition. In this paper, we propose to enhance expression recognition by age. Specifically, we propose a three-node Bayesian network to incorporate age information as privileged information, which is only available during training. During training phase, a full probabilistic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.