Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 8

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  face identification
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
1
Content available Support vector machine in gender recognition
EN
In the paper, Support Vector Machine (SVM) methods are discussed. The SVM algorithm is a very strong classification tool. Its capability in gender recognition in comparison with the other methods is presented here. Different sets of face features derived from the frontal facial image such as eye corners, nostrils, mouth corners etc. are taken into account. The efficiency of different sets of facial features in gender recognition using SVM method is examined.
EN
Soft biometrics methods that involve gender, age and ethnicity are still developed. Face recognition methods often rely on gender recognition. The same applies to the methods reconstructing the faces or building 2D or 3D models of the faces. In the paper, we conduct study on different set of gender recognition methods and their mobile applications. We show the advantages and disadvantages of that methods and future challenges to the researches. In the previous papers, we examined a range variety of skin detection methods that help to spot the face in the images or video stream. On acquiring faces, we focus on gender recognition that will allow us to create pattern to build 2D and 3D automatic faces models from the images. That will result also in face recognition and authentication, also.
EN
In this paper we present high computational complexity algorithms for detecting skin and non-skin colour. Because of their complexity they are not suitable for nowadays mobile devices but can be used in systems working on more demanding machines. The selection and implementation of algorithms gives accuracy about 80-90%.
EN
Face detection is one of the most important issues in the identification and authentication systems that use biometric features. In this paper we present algorithms for detecting skin colour. The selection and implementation of an algorithm for automated authentication system and face detection can significantly improve the effectiveness of such a system. In the paper we examine several algorithms and methods that can be used in mobile application for authentication purpose i.e. NFC payments.
PL
Praca zawiera opis systemu monitoringu budynku. System wyposażony został w moduł sztucznej inteligencji, pozwalający na rozpoznanie widocznych na zdjęciach kamer osób. System umożliwia wykrycie zagrożeń w czasie rzeczywistym oraz analizę zarejestrowanych zdarzeń w celu ich wyjaśnienia.
EN
Publication contains description of building monitoring system. System has AI module to allow it to identify people on camera images. System detects danger situations in real-time and allows user to analyze recorded events.
EN
Knowledge is a key factor to the personal success. The certifications are the instant tools that are commonly available to assess the personal success. In an e-Learning environment, where the learning projects are delivered with the aim to provide a professional or an academic certification, it is integral that the Learning Management Systems provide security features that will ensure the credibility of the online real-time assessments and the certification. In a conventional examination environment, there will be invigilators to overlook the examinees, on the contrary, in an on-line examination environment; it is vital that an invigilation mechanism is implemented to ensure the integrity of the examination. In this article we present a face based access control system for online e-Learning systems.
EN
The work concerns creation of the original FaMar method of user's identification on the basis of the frontal facial image, in which the fusion of Wavelet Transformation (WT) and Hidden Markov Models (HMM) are used for the three parts of face (eyes, nose, mouth); the decision is made on the basis of the sum maximalisation of likelihood of generating of the models observation.
PL
W ostatnim czasie w dziedzinie rozpoznawania wzorców bardzo rozpowszechniły się metody, w których wykorzystuje się tzw. ukryty model Markowa. Mówiąc najogólniej, ukryty model Markowa jest modelem probabilistycznym wykorzystywanym do analizy przebiegów czasowych o losowym charakterze. W niniejszym opracowaniu zaprezentowano podstawy teoretyczne ukrytego modelu Markowa. Rozważania ograniczono do modeli jednowymiarowych z czasem dyskretnym, z dyskretnymi i ciągłymi obserwacjami. Przedstawiona charakterystyka oprócz podstawowych definicji zawiera również obszerne omówienie zagadnień bezpośrednio związanych z zastosowaniami ukrytego modelu Markowa. W końcowej części pracy zawarto krótki opis przykładowych zastosowań ukrytego modelu Markowa w dziedzinie rozpoznawania wzorców.
EN
Methods that use Hidden Markov Models (HMM) became recently very popular in the domain of pattern recognition. Generally, a HMM is a probabilistic model used in analysis of random sequences. This article presents theoretical bases of HMMs. Only one-dimensional models with discrete time and continuos observation space have been analyzed. Besides of basic definitions, other problems directly related to applications of HMMs have been discussed. The last part of the article presents some examples of pattern recognition problems, which are solved with HMMs.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.