Recent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications

Size: px
Start display at page:

Download "Recent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications"

Transcription

1 NEURAL NETWORK FACE IDENTIFICATION DAVID MALANIK, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin Nad Stráněmi 4511, Zlín CZECH REPUBLIC Abstract: - The identification of peoples represents the actual problem of this World. The problem is the methods for contact-free or extremely user-friendly methods. The potential solutions of this problem are based on the method, that doesn t require the direct contact. This paper deals with the face identification method. These methods have a marginal problem with the quality of the tested sample. The quality might be repaired with the neural network. Key-Words: - Neural networks, Hopfield, Face detection, Identification, Biometric. 1 Introduction The problem of identification represents very important issue of the present World. There is potentially danger which flowing from the current World situation. The identification systems might detect any people identities inside the specific area. The place might be an airport or some government building. The problem of the contact-free face identification for a long range is the quality of the identification samples. The next potentially problem might be represented by the different age of the identification people. These factors could limit the commonly used comparison methods [1]. 2 Problem Formulation The problem of the face identification is inside the quality of the picture and the age of source sample. These both problems are based on the pictures. The scanning methods have their own limits in quality of pictures and the second problem might be in patterning of the source data. The captured picture must be adapted to specific position and size. The identification figure or picture must be in the correct direction and must have the same size. The resizing and direction correcting is quite difficult. The marginal role plays the problem of quality. The contact free identification based on the face identification is popular in the places with the high movement or high density of people [2]. The best examples might be the public part of airports, a government meetings and a public celebration. 2.1 Quality of scanning/capturing There are many factors, which limited the quality of captured picture of the face. The commonly described factor is the factor of environment [3]. The external environment might be affected by nature. The rain or the fog might produce the less quality of the face picture. The authentication method must repair these pictures before the authentication method might continue with the verification or identification of these people. The picture with the upper described deformation represents the Fig. 1. Fig. 1 - low quality face picture The low quality picture might provide the false identification of approved people or the positive identification of non-certificated people. These ISBN:

2 false identifications might affect the security steps. The face identification without any repair functions miss affects the identification. This paper describes the one the possible methods for reconstruction face identification picture with the self-repair neural network. Next parts will describe the procedures for improvement of the picture quality. The paper includes the test results from described solution. 3 Neural network reconstruction and identification The neural network represents the huge potential of availabilities, which might help us with many problems inside the security branch. There are many types of networks. Some of these networks have very specific abilities. The most interesting ability is the package with selfrepaired function. The one of the most popular self-repaired neural networks is The Hopfield neural network [4,5]. The basic structure of this network is on Fig. 2. face from the gray-scale or monochromatic picture [7]. The typical characteristics are the measurement of the eye position, position of nose, the size of nose, lips etc. Each of these measure-based methods required the picture of searched face [7]. Each of these algorithms deals with the quality of source with other methods and principles. 3.2 Hopfield network construction The neural network for the picture reconstruction is based on the Hopfield neural network. The testing samples were pictures of 6 different faces. There were some woman s faces and some man s faces captured from different positions. These faces are shown on Fig. 3. Fig. 3 - Source faces Fig. 2 - The Hopfield network structure [5] The network tries to repair the damaged source to one of the known originals. The Hopfield network might repair only the previously learned samples. 3.1 The human face The human face represented the complex biometric system for identification. The usability is done with the easy contact-free identification methods. For the user identification based on the specific face characteristics are used many methods [6]. The biometric system can detect and identify the The neural network contained 2500 neurons. Each neuron represented the one pixel of source image. The next step was learned the network with these 6 samples. The result from the learning has this description "Continuous Hopfield model for pattern vectors with 2500 components. Created at 15:35. Type of neuron: SaturatedLinear. 3.3 Face reconstruction The next step was producing the images with the lower quality. There was used a noise for simulation the nature problems such as the rain, the fog and the limited visibility. The level of noises was changed in interval <0.20;0.95>. The testing procedure contains the learned neural network (network was learned with the samples of faces). These experiments were ISBN:

3 realized 10 times and the followed picture represents the outputs from the reconstruction. The Fig. 4 represents the very weak noise. The noise does not affect each sample. Some samples are still relatively clear and processing system might identify it. Fig. 6-40% of noise Fig. 4-20% of noise The reconstruction in the Fig. 7 shows, that the neural network might repair these damaged samples to the original state. The Fig. 5 represents the reconstructed picture from the neural network. These reconstructed samples are the same that the source samples. Identification is quite simple in this case. Fig. 7-40% of noise - reconstruction Fig. 5-20% of noise - reconstruction The next figure describes the samples with 40% of the noise. This level made marginal changes in some samples, especially the first and the second from the left in the second line. The identification of these samples is quite complicated, because samples lost some of their biometric characteristics. The Fig. 8 shows the medium level of the noise, the noise is at 60% level at this figure. The source samples are damaged and the human operator does not recognize the original samples. The pixel comparison method does not work, because the samples lost to much biometric identification markants [7]. The pictures are damaged. ISBN:

4 repairs well, but there were false positive identification of sample. The second sample from the bottom right was identifying as the same that was second sample from the top left on the Fig. 11. This might provide the false positive identification of sample that does not approved for this area/work. Fig. 8-60% of noise The result from the neural network repair procedure is shown on the Fig. 9. The network can repair the original samples with extremely accuracy. The pictures were rebuilder to their original state. The identification system might analyse these samples and provide the positive or negative identification of selected peoples. The huge potential of the neural network selfrepair function is represented by these results. Fig % of noise Fig % of noise - reconstruction Fig. 9-60% of noise - reconstruction Next figures, starting with the Fig. 10 are not applicable for user identification. The level of damage is too high and perception of false positive identification rising marginally. The next figures represented only the ability of selfrepaired in extreme point of view. The Fig. 12 represents the potential limit for the neural network self-repair function. There are 2 damaged samples. The first sample from the top right is deformed and combined with other. The sample received some characteristics from the other one. So as the Fig. 13 shows, some samples are still reconstructing able and usable for identification. But the potential risk of false or positive identification is marginal. The Fig. 10 represents the samples with 80% of noise and the result from the neural network repairing. The less complicated samples were ISBN:

5 Fig % of noise Fig % of noise Fig % of noise - reconstruction Fig % of noise - reconstruction The Fig. 15 represents the result; where is 3 maybe 4 false positive identifications. As it shown on the Fig. 15, there are 4 samples reconstructed to the one original. The figure contains 4 woman s faces with the same characteristics and 2 man s faces, but one of the man s samples is huge deformed. 4 Conclusion The previously shown results represent the ability and function of the neural network for the image processing and reconstruction. The reconstruction of the images; in these case face pictures, is important for the contact-free identification of people. The biometric identifications methods like the face identification represents the solution for the places where is impossible to identify each people with the biometric contact scanner. The main argument for the contact free identification might be the speed of identification. The camera just captures some pictures and system might detect faces and compares it with internal databases. The contact is not necessary. The controlled people could not know about this identification system. The system has one marginal issue. The issue is the quality of captured picture. This paper deals with this problem and showing the possibilities of usage the neural network for successfully image reconstruction and next processed identification of people based on the face identification. Samples represented the experiment, which had a specific purpose. The purpose was try to find the potentially limitation of neural network reconstruction and verification people with specific biometric characteristics such as their face. The contactfree identification represents the future of the ISBN:

6 people identification [7]. These methods are addicted on the pictures and their quality. The neural network reconstruction might represent the image pre-processing subsystem for these identification methods. Acknowledgement: The research work was performed to financial support of grant reg. No. IGA/57/FAI/10/D and by the European Regional Development Fund under the Project CEBIA-Tech No. CZ.1.05/2.1.00/ References: [1] TIPTON, Harold F; KRAUSE, Micki. Information security management handbook. 6th ed. Boca Raton : Auerbach, s. ISBN [2] GRAHAM, Benjamin; DODD, David L. Security analysis : principles and technique. 6th ed. New York : McGraw-Hill, s. ISBN [3] BITTO, Ondřej. Šifrování a biometrika, aneb, Tajemné bity a dotyky. Vyd. 1. Kralice na Hané : Computer Media, s. ISBN [4] ZELINKA, Ivan. Umělá inteligence aneb úvod do neuronových sítí, evolučních algoritmů. 1. vyd. Zlín : Univerzita Tomáše Bati, Fakulta technologická, s. ISBN [5] ZELINKA, Ivan; OPLATKOVÁ, Zuzana; ŠENKEŘÍK, Roman. Aplikace umělé inteligence. Vyd. 1. Zlín : Univerzita Tomáše Bati ve Zlíně, s. ISBN [6] MEYERS, E. and WOLF, L. Using Biologically Inspired Features for Face Processing. International Journal of Computer Vision. 76, 1 (Jul. 2007), pp , DOI: /s [7] MALTONI, D. and ECCV 2004 International Workshop. Biometric authentication : ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 : proceedings. Springer, ISBN: ISBN:

Select source Click the Bio Settings button to modify device settings. Select Fingers Use Ctrl+Left mouse button to select multiple fingers to scan.

Select source Click the Bio Settings button to modify device settings. Select Fingers Use Ctrl+Left mouse button to select multiple fingers to scan. 1. Select Source for SC Biometrics Choose Select Source from the Image Menu. Select the desired image type to link to the SC Biometric image source. Select SC Biometrics from the Custom dropdown list.

More information

TEST PATTERNS COMPRESSION TECHNIQUES BASED ON SAT SOLVING FOR SCAN-BASED DIGITAL CIRCUITS

TEST PATTERNS COMPRESSION TECHNIQUES BASED ON SAT SOLVING FOR SCAN-BASED DIGITAL CIRCUITS TEST PATTERNS COMPRESSION TECHNIQUES BASED ON SAT SOLVING FOR SCAN-BASED DIGITAL CIRCUITS Jiří Balcárek Informatics and Computer Science, 1-st class, full-time study Supervisor: Ing. Jan Schmidt, Ph.D.,

More information

Broken Wires Diagnosis Method Numerical Simulation Based on Smart Cable Structure

Broken Wires Diagnosis Method Numerical Simulation Based on Smart Cable Structure PHOTONIC SENSORS / Vol. 4, No. 4, 2014: 366 372 Broken Wires Diagnosis Method Numerical Simulation Based on Smart Cable Structure Sheng LI 1*, Min ZHOU 2, and Yan YANG 3 1 National Engineering Laboratory

More information

Distortion Analysis Of Tamil Language Characters Recognition

Distortion Analysis Of Tamil Language Characters Recognition www.ijcsi.org 390 Distortion Analysis Of Tamil Language Characters Recognition Gowri.N 1, R. Bhaskaran 2, 1. T.B.A.K. College for Women, Kilakarai, 2. School Of Mathematics, Madurai Kamaraj University,

More information

SMART VEHICLE SCREENING SYSTEM USING ARTIFICIAL INTELLIGENCE METHODS

SMART VEHICLE SCREENING SYSTEM USING ARTIFICIAL INTELLIGENCE METHODS 1 TERNOPIL ACADEMY OF NATIONAL ECONOMY INSTITUTE OF COMPUTER INFORMATION TECHNOLOGIES SMART VEHICLE SCREENING SYSTEM USING ARTIFICIAL INTELLIGENCE METHODS Presenters: Volodymyr Turchenko Vasyl Koval The

More information

Music Information Retrieval with Temporal Features and Timbre

Music Information Retrieval with Temporal Features and Timbre Music Information Retrieval with Temporal Features and Timbre Angelina A. Tzacheva and Keith J. Bell University of South Carolina Upstate, Department of Informatics 800 University Way, Spartanburg, SC

More information

A Hybrid Model of Painting: Pictorial Representation of Visuospatial Attention through an Eye Tracking Research

A Hybrid Model of Painting: Pictorial Representation of Visuospatial Attention through an Eye Tracking Research A Hybrid Model of Painting: Pictorial Representation of Visuospatial Attention through an Eye Tracking Research S.A. Al-Maqtari, R.O. Basaree, and R. Legino Abstract A hybrid pictorial representation of

More information

Paulo V. K. Borges. Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) PRESENTATION

Paulo V. K. Borges. Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) PRESENTATION Paulo V. K. Borges Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) 07942084331 vini@ieee.org PRESENTATION Electronic engineer working as researcher at University of London. Doctorate in digital image/video

More information

IMIDTM. In Motion Identification. White Paper

IMIDTM. In Motion Identification. White Paper IMIDTM In Motion Identification Authorized Customer Use Legal Information No part of this document may be reproduced or transmitted in any form or by any means, electronic and printed, for any purpose,

More information

Exploring the Rules in Species Counterpoint

Exploring the Rules in Species Counterpoint Exploring the Rules in Species Counterpoint Iris Yuping Ren 1 University of Rochester yuping.ren.iris@gmail.com Abstract. In this short paper, we present a rule-based program for generating the upper part

More information

ENGINEER AND CONSULTANT IP VIDEO BRIEFING BOOK

ENGINEER AND CONSULTANT IP VIDEO BRIEFING BOOK SPRING 2008 ENGINEER AND CONSULTANT IP VIDEO BRIEFING BOOK Leading the Security Industry Since 1967 A & E SUPPORT SERVICES World Headquarters 89 Arkay Drive Hauppauge, NY 11788 Phone: 800-645-9116 Richard

More information

Analysing Musical Pieces Using harmony-analyser.org Tools

Analysing Musical Pieces Using harmony-analyser.org Tools Analysing Musical Pieces Using harmony-analyser.org Tools Ladislav Maršík Dept. of Software Engineering, Faculty of Mathematics and Physics Charles University, Malostranské nám. 25, 118 00 Prague 1, Czech

More information

Chord Classification of an Audio Signal using Artificial Neural Network

Chord Classification of an Audio Signal using Artificial Neural Network Chord Classification of an Audio Signal using Artificial Neural Network Ronesh Shrestha Student, Department of Electrical and Electronic Engineering, Kathmandu University, Dhulikhel, Nepal ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

2. Problem formulation

2. Problem formulation Artificial Neural Networks in the Automatic License Plate Recognition. Ascencio López José Ignacio, Ramírez Martínez José María Facultad de Ciencias Universidad Autónoma de Baja California Km. 103 Carretera

More information

Reconstruction of Ca 2+ dynamics from low frame rate Ca 2+ imaging data CS229 final project. Submitted by: Limor Bursztyn

Reconstruction of Ca 2+ dynamics from low frame rate Ca 2+ imaging data CS229 final project. Submitted by: Limor Bursztyn Reconstruction of Ca 2+ dynamics from low frame rate Ca 2+ imaging data CS229 final project. Submitted by: Limor Bursztyn Introduction Active neurons communicate by action potential firing (spikes), accompanied

More information

DISTRIBUTION STATEMENT A 7001Ö

DISTRIBUTION STATEMENT A 7001Ö Serial Number 09/678.881 Filing Date 4 October 2000 Inventor Robert C. Higgins NOTICE The above identified patent application is available for licensing. Requests for information should be addressed to:

More information

Title of Paper, size 18 NTR * font

Title of Paper, size 18 NTR * font Author, A. & Author, B. 1 Title of Paper, size 18 NTR * font First Author a, Second Author b, Third Author c a First author institutional affiliation and address b Second author affiliation and address

More information

ANALYSIS OF SOUND DATA STREAMED OVER THE NETWORK

ANALYSIS OF SOUND DATA STREAMED OVER THE NETWORK ACTA UNIVERSITATIS AGRICULTURAE ET SILVICULTURAE MENDELIANAE BRUNENSIS Volume LXI 233 Number 7, 2013 http://dx.doi.org/10.11118/actaun201361072105 ANALYSIS OF SOUND DATA STREAMED OVER THE NETWORK Jiří

More information

ECE Real Time Embedded Systems Final Project. Speeding Detecting System

ECE Real Time Embedded Systems Final Project. Speeding Detecting System ECE 7220 Real Time Embedded Systems Final Project Speeding Detecting System By Hancheng Wu Abstract Speeding is one of the most common reasons that lead to traffic accidents. This project implements a

More information

Digital holographic security system based on multiple biometrics

Digital holographic security system based on multiple biometrics Digital holographic security system based on multiple biometrics ALOKA SINHA AND NIRMALA SAINI Department of Physics, Indian Institute of Technology Delhi Indian Institute of Technology Delhi, Hauz Khas,

More information

EyeFace SDK v Technical Sheet

EyeFace SDK v Technical Sheet EyeFace SDK v4.5.0 Technical Sheet Copyright 2015, All rights reserved. All attempts have been made to make the information in this document complete and accurate. Eyedea Recognition, Ltd. is not responsible

More information

Hidden Markov Model based dance recognition

Hidden Markov Model based dance recognition Hidden Markov Model based dance recognition Dragutin Hrenek, Nenad Mikša, Robert Perica, Pavle Prentašić and Boris Trubić University of Zagreb, Faculty of Electrical Engineering and Computing Unska 3,

More information

INTRODUCTION OF INTERNET OF THING TECHNOLOGY BASED ON PROTOTYPE

INTRODUCTION OF INTERNET OF THING TECHNOLOGY BASED ON PROTOTYPE Jurnal Informatika, Vol. 14, No. 1, Mei 2017, 47-52 ISSN 1411-0105 / e-issn 2528-5823 DOI: 10.9744/informatika.14.1.47-52 INTRODUCTION OF INTERNET OF THING TECHNOLOGY BASED ON PROTOTYPE Anthony Sutera

More information

A Design Approach of Automatic Visitor Counting System Using Video Camera

A Design Approach of Automatic Visitor Counting System Using Video Camera IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 10, Issue 2 Ver. I (Mar Apr. 2015), PP 62-67 www.iosrjournals.org A Design Approach of Automatic

More information

A STUDY ON THE DEVELOPMENT OF THE DEDICATED OBU 1 FOR THE HANDICAPPED PERSONS USING HI-PASS 2 SYSTEM

A STUDY ON THE DEVELOPMENT OF THE DEDICATED OBU 1 FOR THE HANDICAPPED PERSONS USING HI-PASS 2 SYSTEM A STUDY ON THE DEVELOPMENT OF THE DEDICATED OBU 1 FOR THE HANDICAPPED PERSONS USING HI-PASS 2 SYSTEM *Young-Moon KIM, *Ji-Seok KIM, **Byung-Moon SON *ITS division, **Overseas project division, Korea Expressway

More information

Music Source Separation

Music Source Separation Music Source Separation Hao-Wei Tseng Electrical and Engineering System University of Michigan Ann Arbor, Michigan Email: blakesen@umich.edu Abstract In popular music, a cover version or cover song, or

More information

Biometric Voting system

Biometric Voting system Biometric Voting system ABSTRACT It has always been an arduous task for the election commission to conduct free and fair polls in our country, the largest democracy in the world. Crores of rupees have

More information

Handwriting Analysis, Forgery, and Counterfeiting. Forensic Science Chapter 10

Handwriting Analysis, Forgery, and Counterfeiting. Forensic Science Chapter 10 Handwriting Analysis, Forgery, and Counterfeiting Forensic Science Chapter 10 Introduction Document analysis examination and comparison of questioned documents with known material. Experts establish the

More information

Bar Codes to the Rescue!

Bar Codes to the Rescue! Fighting Computer Illiteracy or How Can We Teach Machines to Read Spring 2013 ITS102.23 - C 1 Bar Codes to the Rescue! If it is hard to teach computers how to read ordinary alphabets, create a writing

More information

From One-Light To Final Grade

From One-Light To Final Grade From One-Light To Final Grade Colorists Terms and Workflows by Kevin Shaw This article discusses some of the different terms and workflows used by colorists. The terminology varies, and the techniques

More information

VBM683 Machine Learning

VBM683 Machine Learning VBM683 Machine Learning Pinar Duygulu Slides are adapted from Dhruv Batra, David Sontag, Aykut Erdem Quotes If you were a current computer science student what area would you start studying heavily? Answer:

More information

Interlace and De-interlace Application on Video

Interlace and De-interlace Application on Video Interlace and De-interlace Application on Video Liliana, Justinus Andjarwirawan, Gilberto Erwanto Informatics Department, Faculty of Industrial Technology, Petra Christian University Surabaya, Indonesia

More information

TITLE OF CHAPTER FOR PD FCCS MONOGRAPHY: EXAMPLE WITH INSTRUCTIONS

TITLE OF CHAPTER FOR PD FCCS MONOGRAPHY: EXAMPLE WITH INSTRUCTIONS TITLE OF CHAPTER FOR PD FCCS MONOGRAPHY: EXAMPLE WITH INSTRUCTIONS Danuta RUTKOWSKA 1,2, Krzysztof PRZYBYSZEWSKI 3 1 Department of Computer Engineering, Częstochowa University of Technology, Częstochowa,

More information

Upgrading E-learning of basic measurement algorithms based on DSP and MATLAB Web Server. Milos Sedlacek 1, Ondrej Tomiska 2

Upgrading E-learning of basic measurement algorithms based on DSP and MATLAB Web Server. Milos Sedlacek 1, Ondrej Tomiska 2 Upgrading E-learning of basic measurement algorithms based on DSP and MATLAB Web Server Milos Sedlacek 1, Ondrej Tomiska 2 1 Czech Technical University in Prague, Faculty of Electrical Engineeiring, Technicka

More information

UniVision Engineering Limited Modpark Parking System Technical Description. Automatic Vehicle Access Control by Video Identification/

UniVision Engineering Limited Modpark Parking System Technical Description. Automatic Vehicle Access Control by Video Identification/ Automatic Vehicle Access Control by Video Identification/ Order Code: VISPA10 Introduction ASYTEC offers a vehicle access control system integrated into a car park management system, VISPA10. The system

More information

NEW APPROACHES IN TRAFFIC SURVEILLANCE USING VIDEO DETECTION

NEW APPROACHES IN TRAFFIC SURVEILLANCE USING VIDEO DETECTION - 93 - ABSTRACT NEW APPROACHES IN TRAFFIC SURVEILLANCE USING VIDEO DETECTION Janner C. ArtiBrain, Research- and Development Corporation Vienna, Austria ArtiBrain has installed numerous incident detection

More information

Smart Traffic Control System Using Image Processing

Smart Traffic Control System Using Image Processing Smart Traffic Control System Using Image Processing Prashant Jadhav 1, Pratiksha Kelkar 2, Kunal Patil 3, Snehal Thorat 4 1234Bachelor of IT, Department of IT, Theem College Of Engineering, Maharashtra,

More information

Identifying Table Tennis Balls From Real Match Scenes Using Image Processing And Artificial Intelligence Techniques

Identifying Table Tennis Balls From Real Match Scenes Using Image Processing And Artificial Intelligence Techniques Identifying Table Tennis Balls From Real Match Scenes Using Image Processing And Artificial Intelligence Techniques K. C. P. Wong Department of Communication and Systems Open University Milton Keynes,

More information

Quality Control Experiences from a Large-Scale Film Digitisation Project

Quality Control Experiences from a Large-Scale Film Digitisation Project DIGITAL Institute for Information and Communication Technologies Darrel Myers Quality Control Experiences from a Large-Scale Film Digitisation Project Peter Schallauer The Reel Thing Workshop @ AMIA 2018

More information

Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264

Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264 Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264 Ju-Heon Seo, Sang-Mi Kim, Jong-Ki Han, Nonmember Abstract-- In the H.264, MBAFF (Macroblock adaptive frame/field) and PAFF (Picture

More information

Iris-Biometric Fuzzy Commitment Schemes under Signal Degradation

Iris-Biometric Fuzzy Commitment Schemes under Signal Degradation Iris-Biometric Fuzzy Commitment Schemes under Signal Degradation C. Rathgeb and A. Uhl Multimedia Signal Processing and Security Lab. Department of Computer Sciences University of Salzburg, A-5020 Salzburg,

More information

Comparison Parameters and Speaker Similarity Coincidence Criteria:

Comparison Parameters and Speaker Similarity Coincidence Criteria: Comparison Parameters and Speaker Similarity Coincidence Criteria: The Easy Voice system uses two interrelating parameters of comparison (first and second error types). False Rejection, FR is a probability

More information

DEEP REPRESENTATIONS FOR IRIS, FACE, AND FINGERPRINT SPOOFING DETECTION A. VIJAYA LAKSHMI 1, S. RANJITH 2

DEEP REPRESENTATIONS FOR IRIS, FACE, AND FINGERPRINT SPOOFING DETECTION A. VIJAYA LAKSHMI 1, S. RANJITH 2 DEEP REPRESENTATIONS FOR IRIS, FACE, AND FINGERPRINT SPOOFING DETECTION A. VIJAYA LAKSHMI 1, S. RANJITH 2 1 A.Vijaya Lakshmi, M.Tech Student, Ganapathy Engineering College, Rangasaipet, Warangal, Telangana,

More information

Deep Search Cannot Communicate Callsigns

Deep Search Cannot Communicate Callsigns Deep Search Cannot Communicate Callsigns Klaus von der Heide, DJ5HG There has been some discussion on the validity of QSOs which use the deep search decoder of JT65 [1,2,3,4]. The goal of this paper is

More information

White Paper ABC. The Costs of Print Book Collections: Making the case for large scale ebook acquisitions. springer.com. Read Now

White Paper ABC. The Costs of Print Book Collections: Making the case for large scale ebook acquisitions. springer.com. Read Now ABC White Paper The Costs of Print Book Collections: Making the case for large scale ebook acquisitions Read Now /whitepapers The Costs of Print Book Collections Executive Summary This paper explains how

More information

Universität Bamberg Angewandte Informatik. Seminar KI: gestern, heute, morgen. We are Humor Beings. Understanding and Predicting visual Humor

Universität Bamberg Angewandte Informatik. Seminar KI: gestern, heute, morgen. We are Humor Beings. Understanding and Predicting visual Humor Universität Bamberg Angewandte Informatik Seminar KI: gestern, heute, morgen We are Humor Beings. Understanding and Predicting visual Humor by Daniel Tremmel 18. Februar 2017 advised by Professor Dr. Ute

More information

Avoiding False Pass or False Fail

Avoiding False Pass or False Fail Avoiding False Pass or False Fail By Michael Smith, Teradyne, October 2012 There is an expectation from consumers that today s electronic products will just work and that electronic manufacturers have

More information

Fingerprint Verification System

Fingerprint Verification System Fingerprint Verification System Cheryl Texin Bashira Chowdhury 6.111 Final Project Spring 2006 Abstract This report details the design and implementation of a fingerprint verification system. The system

More information

A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MEDICAL IMAGING

A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MEDICAL IMAGING A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MEDICAL IMAGING Dr.P.Sumitra Assistant Professor, Department of Computer Science, Vivekanandha College of Arts and Sciences for

More information

Identification of Motion Artifact in Ambulatory ECG Signal Using Wavelet Techniques

Identification of Motion Artifact in Ambulatory ECG Signal Using Wavelet Techniques American Journal of Biomedical Engineering 23, 3(6): 94-98 DOI:.5923/j.ajbe.2336.8 Identification of Motion Artifact in Ambulatory ECG Signal Using Wavelet Techniques Deepak Vala,*, Tanmay Pawar, V. K.

More information

BIBLIOGRAPHIC DATA: A DIFFERENT ANALYSIS PERSPECTIVE. Francesca De Battisti *, Silvia Salini

BIBLIOGRAPHIC DATA: A DIFFERENT ANALYSIS PERSPECTIVE. Francesca De Battisti *, Silvia Salini Electronic Journal of Applied Statistical Analysis EJASA (2012), Electron. J. App. Stat. Anal., Vol. 5, Issue 3, 353 359 e-issn 2070-5948, DOI 10.1285/i20705948v5n3p353 2012 Università del Salento http://siba-ese.unile.it/index.php/ejasa/index

More information

Focused Ion Beam System MI4050

Focused Ion Beam System MI4050 SCIENTIFIC INSTRUMENT NEWS 2016 Vol. 7 SEPTEMBER Technical magazine of Electron Microscope and Analytical Instruments. Technical Explanation Focused Ion Beam System MI4050 Yasushi Kuroda *1, Yoshihisa

More information

A HIGHLY INTERACTIVE SYSTEM FOR PROCESSING LARGE VOLUMES OF ULTRASONIC TESTING DATA. H. L. Grothues, R. H. Peterson, D. R. Hamlin, K. s.

A HIGHLY INTERACTIVE SYSTEM FOR PROCESSING LARGE VOLUMES OF ULTRASONIC TESTING DATA. H. L. Grothues, R. H. Peterson, D. R. Hamlin, K. s. A HIGHLY INTERACTIVE SYSTEM FOR PROCESSING LARGE VOLUMES OF ULTRASONIC TESTING DATA H. L. Grothues, R. H. Peterson, D. R. Hamlin, K. s. Pickens Southwest Research Institute San Antonio, Texas INTRODUCTION

More information

Delta Journal of Education 1 ISSN

Delta Journal of Education 1 ISSN Author(s) Last Name(s) Volume 6, Issue 1, Spring, 2016 1 Delta Journal of Education 1 ISSN 2160-9179 Published by Delta State University Title of Paper, size 18 NTR * font First Author a, Second Author

More information

Auto classification and simulation of mask defects using SEM and CAD images

Auto classification and simulation of mask defects using SEM and CAD images Auto classification and simulation of mask defects using SEM and CAD images Tung Yaw Kang, Hsin Chang Lee Taiwan Semiconductor Manufacturing Company, Ltd. 25, Li Hsin Road, Hsinchu Science Park, Hsinchu

More information

Problem. Objective. Presentation Preview. Prior Work in Use of Color Segmentation. Prior Work in Face Detection & Recognition

Problem. Objective. Presentation Preview. Prior Work in Use of Color Segmentation. Prior Work in Face Detection & Recognition Problem Facing the Truth: Using Color to Improve Facial Feature Extraction Problem: Failed Feature Extraction in OKAO Tracking generally works on Caucasians, but sometimes features are mislabeled or altogether

More information

CS101 Final term solved paper Question No: 1 ( Marks: 1 ) - Please choose one ---------- was known as mill in Analytical engine. Memory Processor Monitor Mouse Ref: An arithmetical unit (the "mill") would

More information

Delta Journal of Education 1 ISSN

Delta Journal of Education 1 ISSN Author(s) Last Name(s) Volume 7, Issue 1, Spring, 2017 1 Delta Journal of Education 1 ISSN 2160-9179 Published by Delta State University Title of Paper, size 18 NTR * font First Author a, Second Author

More information

IDENTIFYING TABLE TENNIS BALLS FROM REAL MATCH SCENES USING IMAGE PROCESSING AND ARTIFICIAL INTELLIGENCE TECHNIQUES

IDENTIFYING TABLE TENNIS BALLS FROM REAL MATCH SCENES USING IMAGE PROCESSING AND ARTIFICIAL INTELLIGENCE TECHNIQUES IDENTIFYING TABLE TENNIS BALLS FROM REAL MATCH SCENES USING IMAGE PROCESSING AND ARTIFICIAL INTELLIGENCE TECHNIQUES Dr. K. C. P. WONG Department of Communication and Systems Open University, Walton Hall

More information

CMS Upgrade Activities

CMS Upgrade Activities CMS Upgrade Activities G. Eckerlin DESY WA, 1. Feb. 2011 CMS @ LHC CMS Upgrade Phase I CMS Upgrade Phase II Infrastructure Conclusion DESY-WA, 1. Feb. 2011 G. Eckerlin 1 The CMS Experiments at the LHC

More information

@ Massachusetts Institute of Technology All rights reserved.

@ Massachusetts Institute of Technology All rights reserved. Robust Audio-Visual Person Verification Using Web-Camera Video by Daniel Schultz Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for

More information

EEG Eye-Blinking Artefacts Power Spectrum Analysis

EEG Eye-Blinking Artefacts Power Spectrum Analysis EEG Eye-Blinking Artefacts Power Spectrum Analysis Plamen Manoilov Abstract: Artefacts are noises introduced to the electroencephalogram s (EEG) signal by not central nervous system (CNS) sources of electric

More information

IMPROVING VIDEO ANALYTICS PERFORMANCE FACTORS THAT INFLUENCE VIDEO ANALYTIC PERFORMANCE WHITE PAPER

IMPROVING VIDEO ANALYTICS PERFORMANCE FACTORS THAT INFLUENCE VIDEO ANALYTIC PERFORMANCE WHITE PAPER IMPROVING VIDEO ANALYTICS PERFORMANCE FACTORS THAT INFLUENCE VIDEO ANALYTIC PERFORMANCE WHITE PAPER Modern video analytic algorithms have changed the way organizations monitor and act on their security

More information

Quick Start Bruker Dimension Icon AFM

Quick Start Bruker Dimension Icon AFM Do not remove Quick Start Bruker Dimension Icon AFM March 3, 2015 GLA Contacts Harold Fu (hfu@caltech.edu) Weilai Yu (wyyu@caltech.edu) Bruker Tech Support (AFMSupport@bruker-nano.com 800-873-9750) Watch

More information

Comparative Study on Fingerprint Recognition Systems Project BioFinger

Comparative Study on Fingerprint Recognition Systems Project BioFinger Comparative Study on Fingerprint Recognition Systems Project BioFinger Michael Arnold 1, Henning Daum 1, Christoph Busch 1 Abstract: This paper describes a comparative study on fingerprint recognition

More information

OPTIMIZING VIDEO CLIPS IN EDUCATIONAL MATERIALS

OPTIMIZING VIDEO CLIPS IN EDUCATIONAL MATERIALS 2012, 1(2): 6879 DOI: 10.1515/ijicte-2012-0006 OPTIMIZING VIDEO CLIPS IN EDUCATIONAL MATERIALS Aleš Oujezdský Department of Information and Communication Technologies, Pedagogical Faculty, University of

More information

Create an Industrial 3D Machine Vision System using DLP Technology

Create an Industrial 3D Machine Vision System using DLP Technology Create an Industrial 3D Machine Vision System using DLP Technology -AM572x Processor based DLP Structured Light Terry Yuan Business Development Manager 1 1987 TI DLP Products: A History of Innovation Dr.

More information

QUESTIONS AND LOGICAL ANALYSIS OF NATURAL LANGUAGE: THE CASE OF TRANSPARENT INTENSIONAL LOGIC MICHAL PELIŠ

QUESTIONS AND LOGICAL ANALYSIS OF NATURAL LANGUAGE: THE CASE OF TRANSPARENT INTENSIONAL LOGIC MICHAL PELIŠ Logique & Analyse 185 188 (2004), x x QUESTIONS AND LOGICAL ANALYSIS OF NATURAL LANGUAGE: THE CASE OF TRANSPARENT INTENSIONAL LOGIC MICHAL PELIŠ Abstract First, some basic notions of transparent intensional

More information

Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting

Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting Dalwon Jang 1, Seungjae Lee 2, Jun Seok Lee 2, Minho Jin 1, Jin S. Seo 2, Sunil Lee 1 and Chang D. Yoo 1 1 Korea Advanced

More information

The modern and intelligent CCTV (written by Vlado Damjanovski, CEO - ViDi Labs,

The modern and intelligent CCTV (written by Vlado Damjanovski, CEO - ViDi Labs, The modern and intelligent CCTV (written by Vlado Damjanovski, CEO - ViDi Labs, www.vidilabs.com) The digital (r)evolution of the last twenty years changed almost everything. Analogue vinyl records morphed

More information

Accepted Manuscript. A new Optical Music Recognition system based on Combined Neural Network. Cuihong Wen, Ana Rebelo, Jing Zhang, Jaime Cardoso

Accepted Manuscript. A new Optical Music Recognition system based on Combined Neural Network. Cuihong Wen, Ana Rebelo, Jing Zhang, Jaime Cardoso Accepted Manuscript A new Optical Music Recognition system based on Combined Neural Network Cuihong Wen, Ana Rebelo, Jing Zhang, Jaime Cardoso PII: S0167-8655(15)00039-2 DOI: 10.1016/j.patrec.2015.02.002

More information

Security in digital cinema

Security in digital cinema 1 Security in digital cinema Touradj Ebrahimi Business of Cinema 2 Traditional: The business of cinema is the exhibition of film based theatrical content to audiences for their enjoyment 1 Cinema Overview

More information

Laser coding still the technology of choice for the Pharma industry

Laser coding still the technology of choice for the Pharma industry White Paper Laser coding still the technology of choice for the Pharma industry Introduction The year 2011 represented a milestone in terms of the introduction of new regulations in the campaign to combat

More information

A Parametric Autoregressive Model for the Extraction of Electric Network Frequency Fluctuations in Audio Forensic Authentication

A Parametric Autoregressive Model for the Extraction of Electric Network Frequency Fluctuations in Audio Forensic Authentication Proceedings of the 3 rd International Conference on Control, Dynamic Systems, and Robotics (CDSR 16) Ottawa, Canada May 9 10, 2016 Paper No. 110 DOI: 10.11159/cdsr16.110 A Parametric Autoregressive Model

More information

DISPLAY WEEK 2015 REVIEW AND METROLOGY ISSUE

DISPLAY WEEK 2015 REVIEW AND METROLOGY ISSUE DISPLAY WEEK 2015 REVIEW AND METROLOGY ISSUE Official Publication of the Society for Information Display www.informationdisplay.org Sept./Oct. 2015 Vol. 31, No. 5 frontline technology Advanced Imaging

More information

(12) United States Patent

(12) United States Patent (12) United States Patent Sims USOO6734916B1 (10) Patent No.: US 6,734,916 B1 (45) Date of Patent: May 11, 2004 (54) VIDEO FIELD ARTIFACT REMOVAL (76) Inventor: Karl Sims, 8 Clinton St., Cambridge, MA

More information

M4000 Diagnostic Test System For Power Apparatus Condition Assessment

M4000 Diagnostic Test System For Power Apparatus Condition Assessment Knowledge Is Power SM The World Leader in Diagnostic Test Instruments and Knowledge Services for Electric Power M4000 Diagnostic Test System For Power Apparatus Condition Assessment The world s most advanced

More information

The software concept. Try yourself and experience how your processes are significantly simplified. You need. weqube.

The software concept. Try yourself and experience how your processes are significantly simplified. You need. weqube. You need. weqube. weqube is the smart camera which combines numerous features on a powerful platform. Thanks to the intelligent, modular software concept weqube adjusts to your situation time and time

More information

THE INTERNET OF VISION ENABLED THINGS. Tom Brennan Artemis Vision

THE INTERNET OF VISION ENABLED THINGS. Tom Brennan Artemis Vision THE INTERNET OF VISION ENABLED THINGS Tom Brennan Artemis Vision DEFINING THE INTERNET OF THINGS Requirements of the Device: Intelligence: Must have some processing capability Sensors: Must somehow gather

More information

NDIA Army Science and Technology Conference EWA Government Systems, Inc.

NDIA Army Science and Technology Conference EWA Government Systems, Inc. NDIA Army Science and Technology Conference EWA Government Systems, Inc. PITCH DECK Biologically-Inspired Processor for Ultra-Low Power Audio and Video Surveillance Applications Presented by Lester Foster

More information

Qs7-1 DEVELOPMENT OF AN IMAGE COMPRESSION AND AUTHENTICATION MODULE FOR VIDEO SURVEILLANCE SYSTEMS. DlSTRlBUllON OF THIS DOCUMENT IS UNLlditEb,d

Qs7-1 DEVELOPMENT OF AN IMAGE COMPRESSION AND AUTHENTICATION MODULE FOR VIDEO SURVEILLANCE SYSTEMS. DlSTRlBUllON OF THIS DOCUMENT IS UNLlditEb,d DEVELOPMENT OF AN IMAGE COMPRESSION AND AUTHENTICATION MODULE FOR VIDEO SURVEILLANCE SYSTEMS Qs7-1 William R. Hale Sandia National Laboratories Albuquerque, NM 87185 Charles S. Johnson Sandia National

More information

Promotion Package Pricing

Promotion Package Pricing Promotion Package Pricing (For HDB flat, Condo, Small Office & Retail Shop less than 1200sqft) $1400 before GST for 4 camera package $1300 before GST for 3 camera package $1200 before GST for 2 camera

More information

EXPERIMENTS WITH THE ACTIVE VIBRATION CONTROL OF A CANTILEVER BEAM

EXPERIMENTS WITH THE ACTIVE VIBRATION CONTROL OF A CANTILEVER BEAM 11 th International Conference on Vibration Problems Z. Dimitrovová et al. (eds.) Lisbon Portugal 9-1 September 013 EXPERIMENTS WITH THE ACTIVE VIBRATION CONTROL OF A CANTILEVER BEAM Pavel Šuránek* 1 Jiří

More information

System Quality Indicators

System Quality Indicators Chapter 2 System Quality Indicators The integration of systems on a chip, has led to a revolution in the electronic industry. Large, complex system functions can be integrated in a single IC, paving the

More information

Melodic Pattern Segmentation of Polyphonic Music as a Set Partitioning Problem

Melodic Pattern Segmentation of Polyphonic Music as a Set Partitioning Problem Melodic Pattern Segmentation of Polyphonic Music as a Set Partitioning Problem Tsubasa Tanaka and Koichi Fujii Abstract In polyphonic music, melodic patterns (motifs) are frequently imitated or repeated,

More information

The effect of training data selection and sampling time intervals on signature verification

The effect of training data selection and sampling time intervals on signature verification The effect of training data selection and sampling time intervals on signature verification János Csirik, Zoltán Gingl, Erika Griechisch Department of Informatics University of Szeged Szeged, Hungary {csirik,gingl,grerika}@inf.u-szeged.hu

More information

InSync White Paper : Achieving optimal conversions in UHDTV workflows April 2015

InSync White Paper : Achieving optimal conversions in UHDTV workflows April 2015 InSync White Paper : Achieving optimal conversions in UHDTV workflows April 2015 Abstract - UHDTV 120Hz workflows require careful management of content at existing formats and frame rates, into and out

More information

Type-2 Fuzzy Logic Sensor Fusion for Fire Detection Robots

Type-2 Fuzzy Logic Sensor Fusion for Fire Detection Robots Proceedings of the 2 nd International Conference of Control, Dynamic Systems, and Robotics Ottawa, Ontario, Canada, May 7 8, 2015 Paper No. 187 Type-2 Fuzzy Logic Sensor Fusion for Fire Detection Robots

More information

GLI-12 V1.1 GLI 12 V2.0

GLI-12 V1.1 GLI 12 V2.0 1.41 Other Standards. These standards cover the actual requirements for various types of progressive gaming devices in casinos. The following other standards may apply: a) Technical Standards for Gaming

More information

Research Article Design and Analysis of a High Secure Video Encryption Algorithm with Integrated Compression and Denoising Block

Research Article Design and Analysis of a High Secure Video Encryption Algorithm with Integrated Compression and Denoising Block Research Journal of Applied Sciences, Engineering and Technology 11(6): 603-609, 2015 DOI: 10.19026/rjaset.11.2019 ISSN: 2040-7459; e-issn: 2040-7467 2015 Maxwell Scientific Publication Corp. Submitted:

More information

Lip Sync of Audio/Video Distribution and Display

Lip Sync of Audio/Video Distribution and Display Lip Sync of Audio/Video Distribution and Display Bill Hogan Clarity Image bill@clarityimage.com Michael Smith Consultant miksmith@attglobal.net HPA 2006 February 24, 2006 1 Lip Sync Overview The Problem

More information

SURVIVAL OF THE BEAUTIFUL

SURVIVAL OF THE BEAUTIFUL 2017.xCoAx.org SURVIVAL OF THE BEAUTIFUL PENOUSAL MACHADO machado@dei.uc.pt CISUC, Department of Informatics Engineering, University of Coimbra Lisbon Computation Communication Aesthetics & X Abstract

More information

SIL-2 8-Ch Analog Input Series Thermocouple, High Level, Low Level

SIL-2 8-Ch Analog Input Series Thermocouple, High Level, Low Level SIL-2 8-Ch Analog Input Series Thermocouple, High Level, Low Level 3107/3108/3109 PRODUCT HIGHLIGHTS 8 Isolated Channels for Safety and Critical Control Applications Configurable Redundancy Single, Dual,

More information

Lyrics Classification using Naive Bayes

Lyrics Classification using Naive Bayes Lyrics Classification using Naive Bayes Dalibor Bužić *, Jasminka Dobša ** * College for Information Technologies, Klaićeva 7, Zagreb, Croatia ** Faculty of Organization and Informatics, Pavlinska 2, Varaždin,

More information

V9A01 Solution Specification V0.1

V9A01 Solution Specification V0.1 V9A01 Solution Specification V0.1 CONTENTS V9A01 Solution Specification Section 1 Document Descriptions... 4 1.1 Version Descriptions... 4 1.2 Nomenclature of this Document... 4 Section 2 Solution Overview...

More information

Supervision of Analogue Signal Paths in Legacy Media Migration Processes using Digital Signal Processing

Supervision of Analogue Signal Paths in Legacy Media Migration Processes using Digital Signal Processing Welcome Supervision of Analogue Signal Paths in Legacy Media Migration Processes using Digital Signal Processing Jörg Houpert Cube-Tec International Oslo, Norway 4th May, 2010 Joint Technical Symposium

More information

International Journal of Advance Engineering and Research Development REMOTE VOTING MACHINE

International Journal of Advance Engineering and Research Development REMOTE VOTING MACHINE Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 05, May -2018 REMOTE VOTING MACHINE C.V.Rane 1, Aarti Devkar 2, Yogeshwari

More information

Module 3: Video Sampling Lecture 16: Sampling of video in two dimensions: Progressive vs Interlaced scans. The Lecture Contains:

Module 3: Video Sampling Lecture 16: Sampling of video in two dimensions: Progressive vs Interlaced scans. The Lecture Contains: The Lecture Contains: Sampling of Video Signals Choice of sampling rates Sampling a Video in Two Dimensions: Progressive vs. Interlaced Scans file:///d /...e%20(ganesh%20rana)/my%20course_ganesh%20rana/prof.%20sumana%20gupta/final%20dvsp/lecture16/16_1.htm[12/31/2015

More information

Data Mining in Medical Analysis and Performance Evaluation

Data Mining in Medical Analysis and Performance Evaluation 2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore Data Mining in Medical Analysis and Performance Evaluation Marek Penhaker, Vladimir

More information

ADC Peripheral in Microcontrollers. Petr Cesak, Jan Fischer, Jaroslav Roztocil

ADC Peripheral in Microcontrollers. Petr Cesak, Jan Fischer, Jaroslav Roztocil ADC Peripheral in s Petr Cesak, Jan Fischer, Jaroslav Roztocil Czech Technical University in Prague, Faculty of Electrical Engineering Technicka 2, CZ-16627 Prague 6, Czech Republic Phone: +420-224 352

More information