The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we present a new database with handwritten Arabic script. It is based on five books written by different writers from the years 1088–1451. We took 680 pages from these five books, and fully annotated them on the sub-word level. For each page we manually applied bounding boxes on the different sub-words and annotated the sequence of characters. It consists of 121,636 sub-word appearances...
A new approach for authentication of individuals is presented in this paper. Use of the veins of the dorsal hand using infrared imaging and extraction of knuckle tip information is done. The knuckle tips are used as control points for obtaining the region which we are interested in that is the region of interest. The vein pattern is extracted to locate the branching points from which the intersection...
Car automation and surveillance is an escalating trend in this decade. Smart Vehicle security is becoming an indispensable need as it makes it easier for the owners to ensure their automobile's safety wirelessly. The core elements in our system consists of a mini central processing unit, motion detecting sensor accompanied with a camera module and buzzer. Our security network can be used to monitor...
This paper proposes an adaptive cross-window stereo camera distance estimation technology which is a low complexity disparity algorithm and high efficient parallelized, which includes Adaptive Cross Window Distance Estimation (ACWDE) and disparity-based erosion. The proposed algorithm reduces the computation time by changing the aggregation window shape, which calculates color and texture of 13 pixels...
Distortions, such as perspective distortion and partial occlusion, causes objects in different locations in the image of a scene appear to have different sizes. We present a new camera calibration method for estimating the dimension of objects, particularly people, in several locations in the image of a scene. Segmentation methods such as background subtraction combined with frame differencing is...
User generated data is tremendously increasing on the web. Many social networking sites are popular and powerful platforms for finding friends and people like to post comments. This data can be exploited for analyzing sentiments of the user. Feature extraction from text is crucial stage for sentiment analysis. This paper is intended to propose a simple method for feature extraction from text. Proposed...
The proliferation of consumer Internet of Things (IoT) devices offers as many convenient benefits as it poses significant vulnerabilities. Patching or otherwise mitigating these vulnerabilities will be difficult for the existing home security ecosystem. This paper proposes a central security manager that is built on top of the smarthome's hub or gateway router and positioned to intercept all traffic...
The field of Human Action Recognition has expanded greatly in previous years, exploring actions and interactions between individuals via the use of appearance and depth based pose information. There are numerous datasets that display action classes composed of behaviors that are well defined by their key poses, such as ‘kicking’ and ‘punching’. The CONVERSE dataset presents conversational interaction...
We demonstrate a personalized user authentication mechanism based on first-person-view videos. Our proposed algorithm forms temporary image-based authentication challenges which benefit a variety of purposes such as unlocking a mobile device or fallback authentication. First, representative frames are extracted from the egocentric videos. Then, they are split into distinguishable segments before repetitive...
In this paper, we analyse first-person-view videos to develop a personalized user authentication mechanism. Our proposed algorithm generates provisional image-based passwords which benefit a variety of purposes such as unlocking a mobile device or fallback authentication. First, representative frames are extracted from the egocentric videos. Then, they are split into distinguishable segments before...
Reliably discerning human activity from sensor data is a nontrivial task in ubiquitous computing, which is central to enabling smart environments. Ground-truth acquisition techniques for such environments can be broadly divided into observational and self-reporting approaches. In this paper we explore one self-reporting approach, using speech-enabled logging to generate ground-truth data. We report...
Energy balance is one component of weight management, but passive objective measures of caloric intake are non-existent. Given the recent success of actigraphy as a passive objective measure of the physical activity construct that relieves participants of the burden of biased self-report, computer scientists and engineers are aiming to find a passive objective measure of caloric intake. Passive sensing...
In this paper, we propose a video-based indoor positioning system (VIPS) to provide centimeter-grade localization for the Internet of Things (IoT). The VIPS system integrates installed surveillance cameras with the IoT to provide highly-accurate positioning information to indoor people, which efficiently enables microlocation-aware IoT applications and services in smart environments. VIPS can estimate...
Today's world is the smart world. In this smart world, everything that is from home to city everything is smart. So in this paper part of the smart home is given that is smart door lock system. In this owner can control their door using the smartphone by viewing the live feed. One database is there for storing visitors information. By using Bluetooth technology this all system works.
Depth cameras are low-cost, plug & play solution to generate point cloud. 3D depth camera yields depth images which do not convey the actual distance. A 3D camera driver does not support raw depth data output, these are usually filtered and calibrated as per the sensor specifications and hence a method is required to map every pixel back to its original point in 3D space. This paper demonstrates...
In this paper, we propose a SaaS service which prevents shoplifting using image analysis and ERP. In Japan, total damage of shoplifting reaches 450 billion yen. Based on cloud and data analysis technology, we propose a shoplifting prevention service with image analysis of security camera and ERP data check for small shops. We evaluated movie analysis.
Some of the most advanced functions in automated vehicles are in the parking domain, since it provides structured environments and slow speeds. As most parking garages deny GNSS reception, vehicles rely on dead reckoning or simple path-finding algorithms. To this regard, we have developed an infrastructure-based positioning system using cameras. In this paper, we present a novel approach on how to...
Moving item recommendation is now and again a champ among the most key and basic procedures in PC perspective programs. In this paper, a novel organization model is suggested to get rid of illustrating closer see things from files that may contain different sorts of disturbing impact, for instance, light changes, camera parameter varieties, bustles and component back-grounds, etc. For each appearance,...
The widespread application of camera-based surveillance systems has inspired extensive investigation on human localization. In this paper, we proposed a device-free localization method using panoramic camera and indoor map. The proposed method is able to provide precise location information of human object without any terminal device. After preprocessing the images observed with a panoramic camera,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.