
Philosophical Aspects in Pattern Recognition Research
... (e.g., biology and physics) and, even more profoundly, to the philosophical investigation. Hence, it is not surprising that many constitutive documents as well as psychological considerations or biological concepts, includes also many philosophical assertions ([66, 114] spring to mind). The same Dar ...
... (e.g., biology and physics) and, even more profoundly, to the philosophical investigation. Hence, it is not surprising that many constitutive documents as well as psychological considerations or biological concepts, includes also many philosophical assertions ([66, 114] spring to mind). The same Dar ...
Toward Narrative Schema-Based Goal Recognition Models for Interactive Narrative Environments
... models for interactive narrative systems, we aim to leverage explicit representations of common narrative sequences in order to identify relationships between higher-level story structures and player goals. Our intention is to automatically mine interactive narrative schemas from logs of players’ in ...
... models for interactive narrative systems, we aim to leverage explicit representations of common narrative sequences in order to identify relationships between higher-level story structures and player goals. Our intention is to automatically mine interactive narrative schemas from logs of players’ in ...
Toward Narrative Schema-Based Goal Recognition Models for
... interactive narrative system must identify the action’s agent, as well as any characters that appear in the action’s arguments. These actors populate the narrative schema’s event slots, allowing the representation to be used within an interactive narrative context. Figure 1 shows an example of a nar ...
... interactive narrative system must identify the action’s agent, as well as any characters that appear in the action’s arguments. These actors populate the narrative schema’s event slots, allowing the representation to be used within an interactive narrative context. Figure 1 shows an example of a nar ...
Ancient Tamil Script Recognition from Stone Inscriptions Using Slant
... images are transformed using the non-uniform slant correction introduced in [14]. In the first phase, the images of stone inscription text lines are normalised with respect to skew, slant, and baseline position. The skew angle, the slant angle and the position of the upper and the lower baseline are ...
... images are transformed using the non-uniform slant correction introduced in [14]. In the first phase, the images of stone inscription text lines are normalised with respect to skew, slant, and baseline position. The skew angle, the slant angle and the position of the upper and the lower baseline are ...
Differential Characteristics of Face Neuron Responses Within the
... De Souza, Wania C., Satoshi Eifuku, Ryoi Tamura, Hisao Nishijo, and Taketoshi Ono. Differential characteristics of face neuron responses within the anterior superior temporal sulcus of macaques. J Neurophysiol 94: 1252–1266, 2005. doi:10.1152/jn.00949.2004. The anterior superior temporal sulcus (STS ...
... De Souza, Wania C., Satoshi Eifuku, Ryoi Tamura, Hisao Nishijo, and Taketoshi Ono. Differential characteristics of face neuron responses within the anterior superior temporal sulcus of macaques. J Neurophysiol 94: 1252–1266, 2005. doi:10.1152/jn.00949.2004. The anterior superior temporal sulcus (STS ...
PPT - Lehigh CSE - Lehigh University
... PHONOID Individual authentication using spoken language ...
... PHONOID Individual authentication using spoken language ...
Learning Low-Rank Representations with Classwise Block
... deals with unsupervised case and does not take advantage of structural information when the label information is available. To leverage structural information in the face recognition problem, some methods are proposed based on lowrank matrix recovery (Chen, Wei, and Wang 2012)(Ma et al. 2012)(Zhang, ...
... deals with unsupervised case and does not take advantage of structural information when the label information is available. To leverage structural information in the face recognition problem, some methods are proposed based on lowrank matrix recovery (Chen, Wei, and Wang 2012)(Ma et al. 2012)(Zhang, ...
Individual Recognition Based on the Fingerprint of Things Expands
... On the other hand, the manufacturing lines engaged in mass-production need a system that can acquire the images of a large quantity of components one after another. Fig. 6 shows a registration system for the Fingerprint of Things that automatically captures the fingerprints of a large quantity of bo ...
... On the other hand, the manufacturing lines engaged in mass-production need a system that can acquire the images of a large quantity of components one after another. Fig. 6 shows a registration system for the Fingerprint of Things that automatically captures the fingerprints of a large quantity of bo ...
A Novel Connectionist System for Unconstrained Handwriting
... depends only on the current state, which makes contextual effects difficult to model. Another is that HMMs are generative, while discriminative models generally give better performance in labelling and classification tasks. Recurrent neural networks (RNNs) do not suffer from these limitations, and w ...
... depends only on the current state, which makes contextual effects difficult to model. Another is that HMMs are generative, while discriminative models generally give better performance in labelling and classification tasks. Recurrent neural networks (RNNs) do not suffer from these limitations, and w ...
Handwritten Gregg Shorthand Recognition
... appear to regenerate. Because this type of cell is the only part of the body that isn't slowly replaced, it is assumed that these cells are what provide us with our abilities to remember, think, and apply previous experiences to our every action. These cells, all 100 billion of them, are known as ne ...
... appear to regenerate. Because this type of cell is the only part of the body that isn't slowly replaced, it is assumed that these cells are what provide us with our abilities to remember, think, and apply previous experiences to our every action. These cells, all 100 billion of them, are known as ne ...
Direct comparison of the neural substrates of
... Recently, the time allowed for retrieval has also been suggested to affect the degree of activation of the right anterior prefrontal cortex, which has been shown to be activated during retrieval tasks (Wagner et al., 1998). Thus, these variables related to the retrieval of previously acquired inform ...
... Recently, the time allowed for retrieval has also been suggested to affect the degree of activation of the right anterior prefrontal cortex, which has been shown to be activated during retrieval tasks (Wagner et al., 1998). Thus, these variables related to the retrieval of previously acquired inform ...
Comparison of Handwriting characters Accuracy using
... networks have traditionally been popular classification methods for character recognition, but neural networks are increasingly proving to offer better and more reliable accuracy for handwriting recognition [8]. Architecture: The most popular architecture of neural network used in English character ...
... networks have traditionally been popular classification methods for character recognition, but neural networks are increasingly proving to offer better and more reliable accuracy for handwriting recognition [8]. Architecture: The most popular architecture of neural network used in English character ...
Geometric Hashing
... frame defined by the model basis (p1, p2, p3) (b) After a proper quantization, use the computed coordinates (u,v) as an index to a two dimensional hash table, and record in the corresponding hash table bin the information (model, (p1, p2, p3)) ...
... frame defined by the model basis (p1, p2, p3) (b) After a proper quantization, use the computed coordinates (u,v) as an index to a two dimensional hash table, and record in the corresponding hash table bin the information (model, (p1, p2, p3)) ...
An investigation on local wrinkle-based extractor of age estimation
... of databases used more frequently in previous work for estimating age, as it is publicly available. The database has 1002 images comprising 82 participants with an the age range of 0-69 years. All individuals in the database have more than one image included with different ages. Each image has 68 an ...
... of databases used more frequently in previous work for estimating age, as it is publicly available. The database has 1002 images comprising 82 participants with an the age range of 0-69 years. All individuals in the database have more than one image included with different ages. Each image has 68 an ...
Journal of Systems and Software:: A Fuzzy Neural Network for
... inaccurate and incomplete information in the process of quantification and transfer. Therefore, the speech recognition lacks of semantic character. The concept of membership function in fuzzy theory can compensate for these shortcomings to some degree and provide more comprehensive information for t ...
... inaccurate and incomplete information in the process of quantification and transfer. Therefore, the speech recognition lacks of semantic character. The concept of membership function in fuzzy theory can compensate for these shortcomings to some degree and provide more comprehensive information for t ...
Preprocessing involves noise removal, skew
... which reveal the information about the civilized part. One of the most important applications in image processing and pattern Recognition is Optical Character Recognition. OCR is a very well-studied problem in the vast area of pattern recognition. The first commercial OCR systems began to appear in ...
... which reveal the information about the civilized part. One of the most important applications in image processing and pattern Recognition is Optical Character Recognition. OCR is a very well-studied problem in the vast area of pattern recognition. The first commercial OCR systems began to appear in ...
Facial recognition system

A facial recognition system is a computer application capable of identifying or verifying a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems.