• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 107
  • 23
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 128
  • 128
  • 128
  • 119
  • 112
  • 36
  • 36
  • 29
  • 21
  • 20
  • 18
  • 18
  • 18
  • 15
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Aplicação de sistemas imunológicos artificiais para biometria facial: Reconhecimento de identidade baseado nas características de padrões binários /

Silva, Jadiel Caparrós da. January 2015 (has links)
Orientador: Anna Diva Plasencia Lotufo / Co-orientador: Jorge Manuel M. C. Pereira Batista / Banca: Carlos Roberto Minussi / Banca: Ricardo Luiz Barros de Freitas / Banca: Díbio Leandro Borges / Banca: Gelson da Cruz Junior / Resumo: O presente trabalho tem como objetivo realizar o reconhecimento de identidade por meio de um método baseado nos Sistemas Imunológicos Artificiais de Seleção Negativa. Para isso, foram explorados os tipos de recursos e alternativas adequadas para a análise de expressões faciais 3D, abordando a técnica de Padrão Binário que tem sido aplicada com sucesso para o problema 2D. Inicialmente, a geometria facial 3D foi convertida em duas representações em 2D, a Depth Map e a APDI, que foram implementadas com uma variedade de tipos de recursos, tais como o Local Phase Quantisers, Gabor Filters e Monogenic Filters, a fim de produzir alguns descritores para então fazer-se a análise de expressões faciais. Posteriormente, aplica-se o Algoritmo de Seleção Negativa onde são realizadas comparações e análises entre as imagens e os detectores previamente criados. Havendo afinidade entre as imagens previamente estabelecidas pelo operador, a imagem é classificada. Esta classificação é chamada de casamento. Por fim, para validar e avaliar o desempenho do método foram realizados testes com imagens diretamente da base de dados e posteriormente com dez descritores desenvolvidos a partir dos padrões binários. Esses tipos de testes foram realizados tendo em vista três objetivos: avaliar quais os melhores descritores e as melhores expressões para se realizar o reconhecimento de identidade e, por fim, validar o desempenho da nova solução de reconhecimento de identidades baseado nos Sistemas Imunológicos Artificiais. Os resultados obtidos pelo método apresentaram eficiência, robustez e precisão no reconhecimento de identidade facial / Abstract: This work aims to perform the identity recognition by a method based on Artificial Immune Systems, the Negative Selection Algorithm. Thus, the resources and adequate alternatives for analyzing 3D facial expressions were explored, exploring the Binary Pattern technique that is successfully applied for the 2D problem. Firstly, the 3D facial geometry was converted in two 2D representations. The Depth Map and the Azimuthal Projection Distance Image were implemented with other resources such as the Local Phase Quantisers, Gabor Filters and Monogenic Filters to produce descriptors to perform the facial expression analysis. Afterwards, the Negative Selection Algorithm is applied, and comparisons and analysis with the images and the detectors previously created are done. If there is affinity with the images, than the image is classified. This classification is called matching. Finally, to validate and evaluate the performance of the method, tests were realized with images from the database and after with ten descriptors developed from the binary patterns. These tests aim to: evaluate which are the best descriptors and the best expressions to recognize the identities, and to validate the performance of the new solution of identity recognition based on Artificial Immune Systems. The results show efficiency, robustness and precision in recognizing facial identity / Doutor
72

Human face image searching system with relevance feedback using sketch

Man, Chun Him 01 January 2005 (has links)
No description available.
73

Face Recognition: Study and Comparison of PCA and EBGM Algorithms

Katadound, Sachin 01 January 2004 (has links)
Face recognition is a complex and difficult process due to various factors such as variability of illumination, occlusion, face specific characteristics like hair, glasses, beard, etc., and other similar problems affecting computer vision problems. Using a system that offers robust and consistent results for face recognition, various applications such as identification for law enforcement, secure system access, computer human interaction, etc., can be automated successfully. Different methods exist to solve the face recognition problem. Principal component analysis, Independent component analysis, and linear discriminant analysis are few other statistical techniques that are commonly used in solving the face recognition problem. Genetic algorithm, elastic bunch graph matching, artificial neural network, etc. are few of the techniques that have been proposed and implemented. The objective of this thesis paper is to provide insight into different methods available for face recognition, and explore methods that provided an efficient and feasible solution. Factors affecting the result of face recognition and the preprocessing steps that eliminate such abnormalities are also discussed briefly. Principal Component Analysis (PCA) is the most efficient and reliable method known for at least past eight years. Elastic bunch graph matching (EBGM) technique is one of the promising techniques that we studied in this thesis work. We also found better results with EBGM method than PCA in the current thesis paper. We recommend use of a hybrid technique involving the EBGM algorithm to obtain better results. Though, the EBGM method took a long time to train and generate distance measures for the given gallery images compared to PCA. But, we obtained better cumulative match score (CMS) results for the EBGM in comparison to the PCA method. Other promising techniques that can be explored separately in other paper include Genetic algorithm based methods, Mixture of principal components, and Gabor wavelet techniques.
74

Real Time Driver Safety System

Cho, Gyuchoon 01 May 2009 (has links)
The technology for driver safety has been developed in many fields such as airbag system, Anti-lock Braking System or ABS, ultrasonic warning system, and others. Recently, some of the automobile companies have introduced a new feature of driver safety systems. This new system is to make the car slower if it finds a driver’s drowsy eyes. For instance, Toyota Motor Corporation announced that it has given its pre-crash safety system the ability to determine whether a driver’s eyes are properly open with an eye monitor. This paper is focusing on finding a driver’s drowsy eyes by using face detection technology. The human face is a dynamic object and has a high degree of variability; that is why face detection is considered a difficult problem in computer vision. Even with the difficulty of this problem, scientists and computer programmers have developed and improved the face detection technologies. This paper also introduces some algorithms to find faces or eyes and compares algorithm’s characteristics. Once we find a face in a sequence of images, the matter is to find drowsy eyes in the driver safety system. This system can slow a car or alert the user not to sleep; that is the purpose of the pre-crash safety system. This paper introduces the VeriLook SDK, which is used for finding a driver’s face in the real time driver safety system. With several experiments, this paper also introduces a new way to find drowsy eyes by AOI,Area of Interest. This algorithm improves the speed of finding drowsy eyes and the consumption of memory use without using any object classification methods or matching eye templates. Moreover, this system has a higher accuracy of classification than others.
75

Principal component analysis with multiresolution

Brennan, Victor L., January 2001 (has links) (PDF)
Thesis (Ph. D.)--University of Florida, 2001. / Title from first page of PDF file. Document formatted into pages; contains xi, 124 p.; also contains graphics. Vita. Includes bibliographical references (p. 120-123).
76

New approaches to automatic 3-D and 2-D 3-D face recognition

Jahanbin, Sina 01 June 2011 (has links)
Automatic face recognition has attracted the attention of many research institutes, commercial industries, and government agencies in the past few years mainly due to the emergence of numerous applications, such as surveillance, access control to secure facilities, and airport screening. Almost all of the research on the early days of face recognition was focused on using 2-D (intensity/portrait) images of the face. While several sophisticated 2-D solutions have been proposed, unbiased evaluation studies show that their collective performance remains unsatisfactory, and degrades significantly with variations in lighting condition, face position, makeup, or existence of non-neutral facial expressions. Recent developments in 3-D imaging technology has made cheaper, quicker and more reliable acquisition of 3-D facial models a reality. These 3-D facial models contain information about the anatomical structure of the face that remains constant under variable lighting conditions, facial makeup, and pose variations. Thus, researchers are considering to utilize 3-D structure of the face alone or in combination with 2-D information to alleviate inherent limitations of 2-D images and attain better performance. Published 3-D face recognition algorithms have demonstrated promising results confirming the effectiveness of 3-D facial models in dealing with the above mentioned factors contributing to the failure of 2-D face recognition systems. However, the majority of these 3-D algorithms are extensions of conventional 2-D approaches, where intensity images are simply replaced by 3-D models rendered as range images. These algorithms are not specifically tailored to exploit abundant geometric and anthropometric clues available in 3-D facial models. In this dissertation we introduce innovative 3-D and 2-D+3-D facial measurements (features) that effectively describe the geometric characteristics of the corresponding faces. Some of the features described in this dissertation, as well as many features proposed in the literature are defined around or between meaningful facial landmarks (fiducial points). In order to reach our goal of designing an accurate automatic face recognition system, we also propose a novel algorithm combining 3-D (range) and 2-D (portrait) Gabor clues to pinpoint a number of points with meaningful anthropometric definitions with significantly better accuracies than those achievable using a single modality alone. This dissertation is organized as follows. In Chapter 1, various biometric modalities are introduced and the advantages of the facial biometrics over other modalities are discussed. The discussion in Chapter 1 is continued with introduction of the face recognition’s modes of operation followed by some current and potential future applications. The problem statement of this dissertation is also included in this chapter. In Chapter 2, an extensive review of the successful 2-D, 3-D, and 2-D+3-D face recognition algorithms are provided. Chapter 3 presents the details of our innovative 3-D and 2-D+3-D face features, as well as our accurate fiducial point detection algorithm. Conclusions and directions for future extensions are presented in Chapter 4. / text
77

Conducting gesture recognition, analysis and performance system

Kolesnik, Paul January 2004 (has links)
A number of conducting gesture analysis and performance systems have been developed over the years. However, most of the previous projects either primarily concentrated on tracking tempo and amplitude indicating gestures, or implemented individual mapping techniques for expressive gestures that varied from research to research. There is a clear need for a uniform process that could be applied toward analysis of both indicative and expressive gestures. The proposed system provides a set of tools that contain extensive functionality for identification, classification and performance with conducting gestures. Gesture recognition procedure is designed on the basis of Hidden Markov Model (HMM) process. A set of HMM tools are developed for Max/MSP software. Training and recognition procedures are applied toward both right-hand beat- and amplitude-indicative gestures, and left-hand expressive gestures. Continuous recognition of right-hand gestures is incorporated into a real-time gesture analysis and performance system in Eyesweb and Max/MSP/Jitter environments.
78

Adaptive parallelization of model-base head tracking

Schodl, Arno January 1999 (has links)
No description available.
79

Improving the performance of two dimensional facial recognition systems the development of a generic model for biometric technology variables in operational environments

McLindin, Brett Alan January 2005 (has links)
In recent times, there has been an increase in national security awareness with a focus on improving current practices relating to the identification and verification of individuals and the reduction of identity fraud. One tool that has been found to assist in these areas is biometrics. This thesis examines some biometric technologies that may be potentially suitable for surveillance and access control applications, and shows why facial recognition technology has been the focus of this study. Despite the testing reported in the literature discussing attempts to solve the problems with facial recognition operational performance, facial recognition has not been widely implemented in security applications to date. The reported testing regimes vary in terms of the date of testing, methodology used for the study, evaluation type, test size and the extent to which possible variations of each variable were examined. To summarise what is known about the effect each variable has on performance, a baseline model of variables together with a ranking scheme is defined and utilised to create a starting point for the research. The research described in this thesis focuses on how to improve the operational performance of two dimensional facial recognition systems by building upon the baseline model of variables and by better understanding how the variables affect facial recognition performance. To improve on the baseline model, systems engineering techniques are used to identify the functional components of a generic facial recognition system, the relationships between them, and the variables that affect those relationships. This identifies other variables that may affect performance. In order to determine which variables affect performance, and how, a series of technical, scenario and operational experiments are conducted to test a selection of the variables. It is shown that this results in a greater understanding of how facial recognition systems react to different variables in operational environments. A revised model of ranked variables is produced that can then be used by current and prospective stakeholders of biometric systems, system designers, integrators and testers to ensure that the majority of the variables are considered when designing, installing, commissioning, or testing facial recognition systems. The findings of this research can also be used to critically analyse existing facial recognition system implementations in order to identify areas where performance increases are possible. This is confirmed in part throughout the two year testing phase of this research where data collected from initial experiments were used as a starting point to improve the performance of later operational experiments. Finally, this thesis identifies that the revised model of variables is sufficiently generic to be used as a starting point for analysing a system using any biometric technology. This is supported by using iris recognition technology as a test case. It is anticipated that with an increased knowledge of how some systems are affected by certain variables, and by better controlling those variables, an increase in performance is possible for access control and surveillance security applications that utilise biometric technologies. / thesis (PhDElectronicSystemsEngineering)--University of South Australia, 2005.
80

Color face recognition by auto-regressive moving averaging

Aljarrah, Inad A. January 2002 (has links)
Thesis (M.S.)--Ohio University, November, 2002. / Title from PDF t.p. Includes bibliographical references (leaves 46-48).

Page generated in 0.1584 seconds