Search
Now showing items 11-20 of 109
İfade tanıma için yüz anatomisine dayalı öznitelikler
(IEEE, 2014-04-23)
Bu çalışmada yüz ifadesi tanıma için kas kuvvetlerine dayalı yeni öznitelikler öneriyoruz. Yüz üzerinde seçtiğimiz noktaların video üzerindeki hareketlerini izleyerek kas kuvvetlerini çözüyoruz. Yüz noktaları, ilk video ...
Extraction and selection of muscle based features for facial expression recognition
(IEEE Computer Soc, 2014-12-04)
In this study we propose a new set of muscle activity based features for facial expression recognition. We extract muscular activities by observing the displacements of facial feature points in an expression video. The ...
VC-dimension of rule sets
(IEEE Computer Soc, 2014-12-04)
In this paper, we give and prove lower bounds of the VC-dimension of the rule set hypothesis class where the input features are binary or continuous. The VC-dimension of the rule set depends on the VC-dimension values of ...
Microsoft Kinect Sensörü kullanarak zemin düzlemi algılama
(IEEE, 2013-06-13)
Görüntü işleme tabanlı mobil robotların başarılı navigasyonu için zemin düzlemi algılama esastır. Bu bildiride Kinect derinlik sensöründen elde edilen derinlik bilgisine dayalı yeni ve gürbüz bir zemin düzlemi algılama ...
Texture recognition for frog identification
(ACM SIGMM, 2012-11-02)
This paper describes a visual processing technique for automatic frog (Xenopus Laevis sp.) localization and identification. The problem of frog identification is to process and classify an unknown frog image to determine ...
Palmprint verification using SIFT majority voting
(Springer-Verlag, 2012)
In this paper we illustrate the implementation of a robust, real-time biometric system for identity verification based on palmprint images. The palmprint images are preprocessed to align the major axes of hand shapes and ...
Kaotik kriptografinin çilesi
(IEEE, 2013-06-13)
Son yirmi yıldır araştırılan bir konu olmasına rağmen, kaotik kriptografi ana akım kriptografi literatüründe yer almıyor. Bu makalede, bu ayrımın nedenleri üzerinde durulmuştur.
QoS-constrained core selection for group communication
(IEEE, 2005)
The core-based approach in multipoint communication enhances the solution space in terms of QoS-efficiency of solutions in inter and intra-domain routing. In an earlier work [KH04], we showed that the constrained cost ...
Numerical integration methods for simulation of mass-spring-damper systems
(Springer-Verlag, 2012)
The dynamics of a face are often implemented as a system of connected particles with various forces acting upon them. Animation of such a system requires the approximation of velocity and position of each particle through ...
Unsupervised morphological analysis using tries
(Springer London, 2012)
This article presents an unsupervised morphological analysis algorithm to segment words into roots and affixes. The algorithm relies on word occurrences in a given dataset. Target languages are English, Finnish, and Turkish, ...