Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The goal of this project is to build an android based application for the mini-brain stroke victims to help them in detection and remediation of brain stroke. This application helps the user to recover from the after effects of the stroke which includes difficulties in speaking, upper limb movement and memory. The application also helps in the detection of brain stroke by automating the F.A.S.T technique...
With the dawn of rising sophisticated technology where everything or rather everyone depends on smartphones, tablets and voice assistants. With such increase in the rate of people using technology to automate their tasks, it is impractical to hire a person for monitoring the CCTV or the IP camera feed for the intruders. Hence, the concept of automation can be implemented here as well. CCTV cameras...
The Fish owners of the pet fish are usually distressed when they are away from home environment because they could not feed the fish on time. Both reasons, food starvation and overfeeding risk the health of fish and leads to poor water quality in indoor fish tanks. Thus monitoring the fish feeder is of great importance which can be very beneficial for the fish owners. This work is aimed to design...
Presentation attacks (a.k.a, direct attacks or spoofing attacks) against face recognition systems have emerged as a serious security threat. To mitigate these attacks on conventional face recognition systems, several Presentation Attack Detection (PAD) algorithms have been developed, which address various Presentation Attack Instruments (PAI) including 3D face masks, 2D photo, wrap photo and electronic...
This paper is devoted to three approaches of the face recognition realized in solving a complex program of visual identification. We described the corresponding algorithms. Graphs and fragments of their program realization are provided, the applicability of the results on the basis of the research is analyzed.
In recent years due to the update of relevant graphical technologies acquiring of 3D reconstructed images from 2D views is getting attention exponentially. Many researchers have therefore tried to develop robust as well as efficient methods to reconstruct 3D models from images. In this paper, we have proposed a method for reconstructing 3D view from multiple images. This approach is based on images...
In this paper, a robust and efficient histogram based template matching method for automatic detection of Optic Disc (OD) in retinal images to help ophthalmologists for diagnosis of retinal diseases is presented. Based on camera field of view (FOV) and image resolution, the OD size estimation algorithm for creation of specific size templates is proposed. Color plane histograms of OD region were used...
Nowadays, many pedestrians are victims of road accidents. Several artificial vision solutions, based on pedestrian detection, have therefore been developed to assist drivers and reduce the accident rate. But most of the proposed pedestrian databases make it possible to test detection only in favorable conditions. The main goal of this research is to provide a learning and testing environment for the...
Exchange of image information is one of the main features of a camera network. In order to exchange a large amount of information, a platform with good communication speed is needed. In this study, we designed and implemented a specialized camera network platform using Wi-Fi Direct devices. This platform can provide various services to other devices within the same network. We designed the platform...
Fall detection plays a significant role in the medical care of elderly people. As reported, falling is the main cause leading to the death of the elderly over the age of 65. Recently, video-based fall detection methods have been widely used, with the progress of intelligent video analysis. In this study, we presents a novel method to detect the fall with a position-fixed RGB camera. Our method consists...
This paper describes iris biometric matching performed using the iris pictures captured by the standard visible spectrum smart phone cameras from the MICHE II database. Our method uses a combination of a popular iris code approach and a periocular biometric based on the Multi-Block Transitional Local Binary Patterns. The authentication scores are calculated separately, and the results are combined...
This paper aims to study the problem of spoofing attack detection for facial recognition systems. Real faces and falsified faces present in front of a security system (phone's camera in our case) have differences of micro-textures on their surface, which are exploited to discriminate face spoofing images. Our method exploits the statistic behavior of the distribution of noise's local variances, which...
The task of classifying videos of natural dynamic scenes into appropriate classes has gained a lot of attention in recent years. The problem especially becomes challenging when the camera used to capture the video is dynamic. In this paper, we analyse the performance of statistical aggregation (SA) techniques on various pre-trained convolutional neural network(CNN) models to address this problem....
In this paper we introduce a novel solution for real-time 3D hand gesture analysis using the embedded 2D camera of a mobile device. The presented framework is based on forming a large database of hand gestures including the ground truth information of hand poses and details of finger joints in 3D. For a query frame captured by the mobile device's camera in real time, the gesture analysis system finds...
Gender estimation has received increased attention due to its use in a number of pertinent security and commercial applications. Automated gender estimation algorithms are mainly based on extracting representative features from face images. In this work we study gender estimation based on information deduced jointly from face and body, extracted from single-shot images. The approach addresses challenging...
The precondition of productive data mining is having an efficient database to work on. The BioVid Emo DB is a multimodal database recorded for the purpose of analyzing human affective states and data mining related to emotion. Psychophysiological signals such as Skin Conductance Level, Electrocardiogram, Trapezius Electromyogram and also 4 video signals were recorded. 5 discrete emotions (amusement,...
Finding the optimal ordering of k-subsets with respect to an objective function is known to be an extremely challenging problem. In this paper we introduce a new objective for this task, rooted in the problem of star identification on spacecrafts: subsets of detected spikes are to be generated in an ordering that minimizes time to detection of a valid star constellation. We carry out an extensive...
To provide daily-life assistance appropriately by a service robot, the management of houseware's information in a room or a house is an indispensable function. Especially, the information about what and where objects are in the environment are fundamental and critical knowledge. We can track housewares with high reliability by attaching markers such as RFID tags to them, however, markerless housewares...
Securing face recognition systems against replay attacks has been recognized as a real challenge. In this work, the problem of fake face detection is addressed by modelling radiometric distortions involved in the recapturing process. The originality of our approach is that the fake face detection process occurs after the face identification process. Having access to enrolment data of each client,...
This paper reports on the construction of a multi-modal Mandarin-Tibetan speech database collected from native speakers of WeiZang dialect. The Mandarin-Tibetan corpus contains 41 Tibetan sentences, 27 Chinese sentences, 30 Tibetan consonants, 4 Tibetan vowels, and 25 Tibetan monosyllables. A multi-modal data collection system was established, which comprises an ultrasound scanner, high-speed camera,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.