Ara
Toplam kayıt 113, listelenen: 11-20
Driver recognition using gaussian mixture models and decision fusion techniques
(Springer-Verlag Berlin, 2008)
In this paper we present our research in driver recognition. The goal of this study is to investigate the performance of different classifier fusion techniques in a driver recognition scenario. We are using solely driving ...
Budding trees
(IEEE Computer Soc, 2014-08-24)
We propose a new decision tree model, named the budding tree, where a node can be both a leaf and an internal decision node. Each bud node starts as a leaf node, can then grow children, but then later on, if necessary, its ...
İfade tanıma için yüz anatomisine dayalı öznitelikler
(IEEE, 2014-04-23)
Bu çalışmada yüz ifadesi tanıma için kas kuvvetlerine dayalı yeni öznitelikler öneriyoruz. Yüz üzerinde seçtiğimiz noktaların video üzerindeki hareketlerini izleyerek kas kuvvetlerini çözüyoruz. Yüz noktaları, ilk video ...
Extraction and selection of muscle based features for facial expression recognition
(IEEE Computer Soc, 2014-12-04)
In this study we propose a new set of muscle activity based features for facial expression recognition. We extract muscular activities by observing the displacements of facial feature points in an expression video. The ...
VC-dimension of rule sets
(IEEE Computer Soc, 2014-12-04)
In this paper, we give and prove lower bounds of the VC-dimension of the rule set hypothesis class where the input features are binary or continuous. The VC-dimension of the rule set depends on the VC-dimension values of ...
Microsoft Kinect Sensörü kullanarak zemin düzlemi algılama
(IEEE, 2013-06-13)
Görüntü işleme tabanlı mobil robotların başarılı navigasyonu için zemin düzlemi algılama esastır. Bu bildiride Kinect derinlik sensöründen elde edilen derinlik bilgisine dayalı yeni ve gürbüz bir zemin düzlemi algılama ...
Texture recognition for frog identification
(ACM SIGMM, 2012-11-02)
This paper describes a visual processing technique for automatic frog (Xenopus Laevis sp.) localization and identification. The problem of frog identification is to process and classify an unknown frog image to determine ...
Palmprint verification using SIFT majority voting
(Springer-Verlag, 2012)
In this paper we illustrate the implementation of a robust, real-time biometric system for identity verification based on palmprint images. The palmprint images are preprocessed to align the major axes of hand shapes and ...
Kaotik kriptografinin çilesi
(IEEE, 2013-06-13)
Son yirmi yıldır araştırılan bir konu olmasına rağmen, kaotik kriptografi ana akım kriptografi literatüründe yer almıyor. Bu makalede, bu ayrımın nedenleri üzerinde durulmuştur.
QoS-constrained core selection for group communication
(IEEE, 2005)
The core-based approach in multipoint communication enhances the solution space in terms of QoS-efficiency of solutions in inter and intra-domain routing. In an earlier work [KH04], we showed that the constrained cost ...