Recent Advances in Applied & Biomedical Informatics and Computational Engineering in Systems Applications
|
|
- Dennis Norton
- 5 years ago
- Views:
Transcription
1 NEURAL NETWORK FACE IDENTIFICATION DAVID MALANIK, ROMAN JASEK Department of Informatics and Artificial Intelligence Tomas Bata University in Zlin Nad Stráněmi 4511, Zlín CZECH REPUBLIC Abstract: - The identification of peoples represents the actual problem of this World. The problem is the methods for contact-free or extremely user-friendly methods. The potential solutions of this problem are based on the method, that doesn t require the direct contact. This paper deals with the face identification method. These methods have a marginal problem with the quality of the tested sample. The quality might be repaired with the neural network. Key-Words: - Neural networks, Hopfield, Face detection, Identification, Biometric. 1 Introduction The problem of identification represents very important issue of the present World. There is potentially danger which flowing from the current World situation. The identification systems might detect any people identities inside the specific area. The place might be an airport or some government building. The problem of the contact-free face identification for a long range is the quality of the identification samples. The next potentially problem might be represented by the different age of the identification people. These factors could limit the commonly used comparison methods [1]. 2 Problem Formulation The problem of the face identification is inside the quality of the picture and the age of source sample. These both problems are based on the pictures. The scanning methods have their own limits in quality of pictures and the second problem might be in patterning of the source data. The captured picture must be adapted to specific position and size. The identification figure or picture must be in the correct direction and must have the same size. The resizing and direction correcting is quite difficult. The marginal role plays the problem of quality. The contact free identification based on the face identification is popular in the places with the high movement or high density of people [2]. The best examples might be the public part of airports, a government meetings and a public celebration. 2.1 Quality of scanning/capturing There are many factors, which limited the quality of captured picture of the face. The commonly described factor is the factor of environment [3]. The external environment might be affected by nature. The rain or the fog might produce the less quality of the face picture. The authentication method must repair these pictures before the authentication method might continue with the verification or identification of these people. The picture with the upper described deformation represents the Fig. 1. Fig. 1 - low quality face picture The low quality picture might provide the false identification of approved people or the positive identification of non-certificated people. These ISBN:
2 false identifications might affect the security steps. The face identification without any repair functions miss affects the identification. This paper describes the one the possible methods for reconstruction face identification picture with the self-repair neural network. Next parts will describe the procedures for improvement of the picture quality. The paper includes the test results from described solution. 3 Neural network reconstruction and identification The neural network represents the huge potential of availabilities, which might help us with many problems inside the security branch. There are many types of networks. Some of these networks have very specific abilities. The most interesting ability is the package with selfrepaired function. The one of the most popular self-repaired neural networks is The Hopfield neural network [4,5]. The basic structure of this network is on Fig. 2. face from the gray-scale or monochromatic picture [7]. The typical characteristics are the measurement of the eye position, position of nose, the size of nose, lips etc. Each of these measure-based methods required the picture of searched face [7]. Each of these algorithms deals with the quality of source with other methods and principles. 3.2 Hopfield network construction The neural network for the picture reconstruction is based on the Hopfield neural network. The testing samples were pictures of 6 different faces. There were some woman s faces and some man s faces captured from different positions. These faces are shown on Fig. 3. Fig. 3 - Source faces Fig. 2 - The Hopfield network structure [5] The network tries to repair the damaged source to one of the known originals. The Hopfield network might repair only the previously learned samples. 3.1 The human face The human face represented the complex biometric system for identification. The usability is done with the easy contact-free identification methods. For the user identification based on the specific face characteristics are used many methods [6]. The biometric system can detect and identify the The neural network contained 2500 neurons. Each neuron represented the one pixel of source image. The next step was learned the network with these 6 samples. The result from the learning has this description "Continuous Hopfield model for pattern vectors with 2500 components. Created at 15:35. Type of neuron: SaturatedLinear. 3.3 Face reconstruction The next step was producing the images with the lower quality. There was used a noise for simulation the nature problems such as the rain, the fog and the limited visibility. The level of noises was changed in interval <0.20;0.95>. The testing procedure contains the learned neural network (network was learned with the samples of faces). These experiments were ISBN:
3 realized 10 times and the followed picture represents the outputs from the reconstruction. The Fig. 4 represents the very weak noise. The noise does not affect each sample. Some samples are still relatively clear and processing system might identify it. Fig. 6-40% of noise Fig. 4-20% of noise The reconstruction in the Fig. 7 shows, that the neural network might repair these damaged samples to the original state. The Fig. 5 represents the reconstructed picture from the neural network. These reconstructed samples are the same that the source samples. Identification is quite simple in this case. Fig. 7-40% of noise - reconstruction Fig. 5-20% of noise - reconstruction The next figure describes the samples with 40% of the noise. This level made marginal changes in some samples, especially the first and the second from the left in the second line. The identification of these samples is quite complicated, because samples lost some of their biometric characteristics. The Fig. 8 shows the medium level of the noise, the noise is at 60% level at this figure. The source samples are damaged and the human operator does not recognize the original samples. The pixel comparison method does not work, because the samples lost to much biometric identification markants [7]. The pictures are damaged. ISBN:
4 repairs well, but there were false positive identification of sample. The second sample from the bottom right was identifying as the same that was second sample from the top left on the Fig. 11. This might provide the false positive identification of sample that does not approved for this area/work. Fig. 8-60% of noise The result from the neural network repair procedure is shown on the Fig. 9. The network can repair the original samples with extremely accuracy. The pictures were rebuilder to their original state. The identification system might analyse these samples and provide the positive or negative identification of selected peoples. The huge potential of the neural network selfrepair function is represented by these results. Fig % of noise Fig % of noise - reconstruction Fig. 9-60% of noise - reconstruction Next figures, starting with the Fig. 10 are not applicable for user identification. The level of damage is too high and perception of false positive identification rising marginally. The next figures represented only the ability of selfrepaired in extreme point of view. The Fig. 12 represents the potential limit for the neural network self-repair function. There are 2 damaged samples. The first sample from the top right is deformed and combined with other. The sample received some characteristics from the other one. So as the Fig. 13 shows, some samples are still reconstructing able and usable for identification. But the potential risk of false or positive identification is marginal. The Fig. 10 represents the samples with 80% of noise and the result from the neural network repairing. The less complicated samples were ISBN:
5 Fig % of noise Fig % of noise Fig % of noise - reconstruction Fig % of noise - reconstruction The Fig. 15 represents the result; where is 3 maybe 4 false positive identifications. As it shown on the Fig. 15, there are 4 samples reconstructed to the one original. The figure contains 4 woman s faces with the same characteristics and 2 man s faces, but one of the man s samples is huge deformed. 4 Conclusion The previously shown results represent the ability and function of the neural network for the image processing and reconstruction. The reconstruction of the images; in these case face pictures, is important for the contact-free identification of people. The biometric identifications methods like the face identification represents the solution for the places where is impossible to identify each people with the biometric contact scanner. The main argument for the contact free identification might be the speed of identification. The camera just captures some pictures and system might detect faces and compares it with internal databases. The contact is not necessary. The controlled people could not know about this identification system. The system has one marginal issue. The issue is the quality of captured picture. This paper deals with this problem and showing the possibilities of usage the neural network for successfully image reconstruction and next processed identification of people based on the face identification. Samples represented the experiment, which had a specific purpose. The purpose was try to find the potentially limitation of neural network reconstruction and verification people with specific biometric characteristics such as their face. The contactfree identification represents the future of the ISBN:
6 people identification [7]. These methods are addicted on the pictures and their quality. The neural network reconstruction might represent the image pre-processing subsystem for these identification methods. Acknowledgement: The research work was performed to financial support of grant reg. No. IGA/57/FAI/10/D and by the European Regional Development Fund under the Project CEBIA-Tech No. CZ.1.05/2.1.00/ References: [1] TIPTON, Harold F; KRAUSE, Micki. Information security management handbook. 6th ed. Boca Raton : Auerbach, s. ISBN [2] GRAHAM, Benjamin; DODD, David L. Security analysis : principles and technique. 6th ed. New York : McGraw-Hill, s. ISBN [3] BITTO, Ondřej. Šifrování a biometrika, aneb, Tajemné bity a dotyky. Vyd. 1. Kralice na Hané : Computer Media, s. ISBN [4] ZELINKA, Ivan. Umělá inteligence aneb úvod do neuronových sítí, evolučních algoritmů. 1. vyd. Zlín : Univerzita Tomáše Bati, Fakulta technologická, s. ISBN [5] ZELINKA, Ivan; OPLATKOVÁ, Zuzana; ŠENKEŘÍK, Roman. Aplikace umělé inteligence. Vyd. 1. Zlín : Univerzita Tomáše Bati ve Zlíně, s. ISBN [6] MEYERS, E. and WOLF, L. Using Biologically Inspired Features for Face Processing. International Journal of Computer Vision. 76, 1 (Jul. 2007), pp , DOI: /s [7] MALTONI, D. and ECCV 2004 International Workshop. Biometric authentication : ECCV 2004 International Workshop, BioAW 2004, Prague, Czech Republic, May 15th, 2004 : proceedings. Springer, ISBN: ISBN:
Select source Click the Bio Settings button to modify device settings. Select Fingers Use Ctrl+Left mouse button to select multiple fingers to scan.
1. Select Source for SC Biometrics Choose Select Source from the Image Menu. Select the desired image type to link to the SC Biometric image source. Select SC Biometrics from the Custom dropdown list.
More informationTEST PATTERNS COMPRESSION TECHNIQUES BASED ON SAT SOLVING FOR SCAN-BASED DIGITAL CIRCUITS
TEST PATTERNS COMPRESSION TECHNIQUES BASED ON SAT SOLVING FOR SCAN-BASED DIGITAL CIRCUITS Jiří Balcárek Informatics and Computer Science, 1-st class, full-time study Supervisor: Ing. Jan Schmidt, Ph.D.,
More informationBroken Wires Diagnosis Method Numerical Simulation Based on Smart Cable Structure
PHOTONIC SENSORS / Vol. 4, No. 4, 2014: 366 372 Broken Wires Diagnosis Method Numerical Simulation Based on Smart Cable Structure Sheng LI 1*, Min ZHOU 2, and Yan YANG 3 1 National Engineering Laboratory
More informationDistortion Analysis Of Tamil Language Characters Recognition
www.ijcsi.org 390 Distortion Analysis Of Tamil Language Characters Recognition Gowri.N 1, R. Bhaskaran 2, 1. T.B.A.K. College for Women, Kilakarai, 2. School Of Mathematics, Madurai Kamaraj University,
More informationSMART VEHICLE SCREENING SYSTEM USING ARTIFICIAL INTELLIGENCE METHODS
1 TERNOPIL ACADEMY OF NATIONAL ECONOMY INSTITUTE OF COMPUTER INFORMATION TECHNOLOGIES SMART VEHICLE SCREENING SYSTEM USING ARTIFICIAL INTELLIGENCE METHODS Presenters: Volodymyr Turchenko Vasyl Koval The
More informationMusic Information Retrieval with Temporal Features and Timbre
Music Information Retrieval with Temporal Features and Timbre Angelina A. Tzacheva and Keith J. Bell University of South Carolina Upstate, Department of Informatics 800 University Way, Spartanburg, SC
More informationA Hybrid Model of Painting: Pictorial Representation of Visuospatial Attention through an Eye Tracking Research
A Hybrid Model of Painting: Pictorial Representation of Visuospatial Attention through an Eye Tracking Research S.A. Al-Maqtari, R.O. Basaree, and R. Legino Abstract A hybrid pictorial representation of
More informationPaulo V. K. Borges. Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) PRESENTATION
Paulo V. K. Borges Flat 1, 50A, Cephas Av. London, UK, E1 4AR (+44) 07942084331 vini@ieee.org PRESENTATION Electronic engineer working as researcher at University of London. Doctorate in digital image/video
More informationIMIDTM. In Motion Identification. White Paper
IMIDTM In Motion Identification Authorized Customer Use Legal Information No part of this document may be reproduced or transmitted in any form or by any means, electronic and printed, for any purpose,
More informationExploring the Rules in Species Counterpoint
Exploring the Rules in Species Counterpoint Iris Yuping Ren 1 University of Rochester yuping.ren.iris@gmail.com Abstract. In this short paper, we present a rule-based program for generating the upper part
More informationENGINEER AND CONSULTANT IP VIDEO BRIEFING BOOK
SPRING 2008 ENGINEER AND CONSULTANT IP VIDEO BRIEFING BOOK Leading the Security Industry Since 1967 A & E SUPPORT SERVICES World Headquarters 89 Arkay Drive Hauppauge, NY 11788 Phone: 800-645-9116 Richard
More informationAnalysing Musical Pieces Using harmony-analyser.org Tools
Analysing Musical Pieces Using harmony-analyser.org Tools Ladislav Maršík Dept. of Software Engineering, Faculty of Mathematics and Physics Charles University, Malostranské nám. 25, 118 00 Prague 1, Czech
More informationChord Classification of an Audio Signal using Artificial Neural Network
Chord Classification of an Audio Signal using Artificial Neural Network Ronesh Shrestha Student, Department of Electrical and Electronic Engineering, Kathmandu University, Dhulikhel, Nepal ---------------------------------------------------------------------***---------------------------------------------------------------------
More information2. Problem formulation
Artificial Neural Networks in the Automatic License Plate Recognition. Ascencio López José Ignacio, Ramírez Martínez José María Facultad de Ciencias Universidad Autónoma de Baja California Km. 103 Carretera
More informationReconstruction of Ca 2+ dynamics from low frame rate Ca 2+ imaging data CS229 final project. Submitted by: Limor Bursztyn
Reconstruction of Ca 2+ dynamics from low frame rate Ca 2+ imaging data CS229 final project. Submitted by: Limor Bursztyn Introduction Active neurons communicate by action potential firing (spikes), accompanied
More informationDISTRIBUTION STATEMENT A 7001Ö
Serial Number 09/678.881 Filing Date 4 October 2000 Inventor Robert C. Higgins NOTICE The above identified patent application is available for licensing. Requests for information should be addressed to:
More informationTitle of Paper, size 18 NTR * font
Author, A. & Author, B. 1 Title of Paper, size 18 NTR * font First Author a, Second Author b, Third Author c a First author institutional affiliation and address b Second author affiliation and address
More informationANALYSIS OF SOUND DATA STREAMED OVER THE NETWORK
ACTA UNIVERSITATIS AGRICULTURAE ET SILVICULTURAE MENDELIANAE BRUNENSIS Volume LXI 233 Number 7, 2013 http://dx.doi.org/10.11118/actaun201361072105 ANALYSIS OF SOUND DATA STREAMED OVER THE NETWORK Jiří
More informationECE Real Time Embedded Systems Final Project. Speeding Detecting System
ECE 7220 Real Time Embedded Systems Final Project Speeding Detecting System By Hancheng Wu Abstract Speeding is one of the most common reasons that lead to traffic accidents. This project implements a
More informationDigital holographic security system based on multiple biometrics
Digital holographic security system based on multiple biometrics ALOKA SINHA AND NIRMALA SAINI Department of Physics, Indian Institute of Technology Delhi Indian Institute of Technology Delhi, Hauz Khas,
More informationEyeFace SDK v Technical Sheet
EyeFace SDK v4.5.0 Technical Sheet Copyright 2015, All rights reserved. All attempts have been made to make the information in this document complete and accurate. Eyedea Recognition, Ltd. is not responsible
More informationHidden Markov Model based dance recognition
Hidden Markov Model based dance recognition Dragutin Hrenek, Nenad Mikša, Robert Perica, Pavle Prentašić and Boris Trubić University of Zagreb, Faculty of Electrical Engineering and Computing Unska 3,
More informationINTRODUCTION OF INTERNET OF THING TECHNOLOGY BASED ON PROTOTYPE
Jurnal Informatika, Vol. 14, No. 1, Mei 2017, 47-52 ISSN 1411-0105 / e-issn 2528-5823 DOI: 10.9744/informatika.14.1.47-52 INTRODUCTION OF INTERNET OF THING TECHNOLOGY BASED ON PROTOTYPE Anthony Sutera
More informationA Design Approach of Automatic Visitor Counting System Using Video Camera
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 10, Issue 2 Ver. I (Mar Apr. 2015), PP 62-67 www.iosrjournals.org A Design Approach of Automatic
More informationA STUDY ON THE DEVELOPMENT OF THE DEDICATED OBU 1 FOR THE HANDICAPPED PERSONS USING HI-PASS 2 SYSTEM
A STUDY ON THE DEVELOPMENT OF THE DEDICATED OBU 1 FOR THE HANDICAPPED PERSONS USING HI-PASS 2 SYSTEM *Young-Moon KIM, *Ji-Seok KIM, **Byung-Moon SON *ITS division, **Overseas project division, Korea Expressway
More informationMusic Source Separation
Music Source Separation Hao-Wei Tseng Electrical and Engineering System University of Michigan Ann Arbor, Michigan Email: blakesen@umich.edu Abstract In popular music, a cover version or cover song, or
More informationBiometric Voting system
Biometric Voting system ABSTRACT It has always been an arduous task for the election commission to conduct free and fair polls in our country, the largest democracy in the world. Crores of rupees have
More informationHandwriting Analysis, Forgery, and Counterfeiting. Forensic Science Chapter 10
Handwriting Analysis, Forgery, and Counterfeiting Forensic Science Chapter 10 Introduction Document analysis examination and comparison of questioned documents with known material. Experts establish the
More informationBar Codes to the Rescue!
Fighting Computer Illiteracy or How Can We Teach Machines to Read Spring 2013 ITS102.23 - C 1 Bar Codes to the Rescue! If it is hard to teach computers how to read ordinary alphabets, create a writing
More informationFrom One-Light To Final Grade
From One-Light To Final Grade Colorists Terms and Workflows by Kevin Shaw This article discusses some of the different terms and workflows used by colorists. The terminology varies, and the techniques
More informationVBM683 Machine Learning
VBM683 Machine Learning Pinar Duygulu Slides are adapted from Dhruv Batra, David Sontag, Aykut Erdem Quotes If you were a current computer science student what area would you start studying heavily? Answer:
More informationInterlace and De-interlace Application on Video
Interlace and De-interlace Application on Video Liliana, Justinus Andjarwirawan, Gilberto Erwanto Informatics Department, Faculty of Industrial Technology, Petra Christian University Surabaya, Indonesia
More informationTITLE OF CHAPTER FOR PD FCCS MONOGRAPHY: EXAMPLE WITH INSTRUCTIONS
TITLE OF CHAPTER FOR PD FCCS MONOGRAPHY: EXAMPLE WITH INSTRUCTIONS Danuta RUTKOWSKA 1,2, Krzysztof PRZYBYSZEWSKI 3 1 Department of Computer Engineering, Częstochowa University of Technology, Częstochowa,
More informationUpgrading E-learning of basic measurement algorithms based on DSP and MATLAB Web Server. Milos Sedlacek 1, Ondrej Tomiska 2
Upgrading E-learning of basic measurement algorithms based on DSP and MATLAB Web Server Milos Sedlacek 1, Ondrej Tomiska 2 1 Czech Technical University in Prague, Faculty of Electrical Engineeiring, Technicka
More informationUniVision Engineering Limited Modpark Parking System Technical Description. Automatic Vehicle Access Control by Video Identification/
Automatic Vehicle Access Control by Video Identification/ Order Code: VISPA10 Introduction ASYTEC offers a vehicle access control system integrated into a car park management system, VISPA10. The system
More informationNEW APPROACHES IN TRAFFIC SURVEILLANCE USING VIDEO DETECTION
- 93 - ABSTRACT NEW APPROACHES IN TRAFFIC SURVEILLANCE USING VIDEO DETECTION Janner C. ArtiBrain, Research- and Development Corporation Vienna, Austria ArtiBrain has installed numerous incident detection
More informationSmart Traffic Control System Using Image Processing
Smart Traffic Control System Using Image Processing Prashant Jadhav 1, Pratiksha Kelkar 2, Kunal Patil 3, Snehal Thorat 4 1234Bachelor of IT, Department of IT, Theem College Of Engineering, Maharashtra,
More informationIdentifying Table Tennis Balls From Real Match Scenes Using Image Processing And Artificial Intelligence Techniques
Identifying Table Tennis Balls From Real Match Scenes Using Image Processing And Artificial Intelligence Techniques K. C. P. Wong Department of Communication and Systems Open University Milton Keynes,
More informationQuality Control Experiences from a Large-Scale Film Digitisation Project
DIGITAL Institute for Information and Communication Technologies Darrel Myers Quality Control Experiences from a Large-Scale Film Digitisation Project Peter Schallauer The Reel Thing Workshop @ AMIA 2018
More informationFast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264
Fast MBAFF/PAFF Motion Estimation and Mode Decision Scheme for H.264 Ju-Heon Seo, Sang-Mi Kim, Jong-Ki Han, Nonmember Abstract-- In the H.264, MBAFF (Macroblock adaptive frame/field) and PAFF (Picture
More informationIris-Biometric Fuzzy Commitment Schemes under Signal Degradation
Iris-Biometric Fuzzy Commitment Schemes under Signal Degradation C. Rathgeb and A. Uhl Multimedia Signal Processing and Security Lab. Department of Computer Sciences University of Salzburg, A-5020 Salzburg,
More informationComparison Parameters and Speaker Similarity Coincidence Criteria:
Comparison Parameters and Speaker Similarity Coincidence Criteria: The Easy Voice system uses two interrelating parameters of comparison (first and second error types). False Rejection, FR is a probability
More informationDEEP REPRESENTATIONS FOR IRIS, FACE, AND FINGERPRINT SPOOFING DETECTION A. VIJAYA LAKSHMI 1, S. RANJITH 2
DEEP REPRESENTATIONS FOR IRIS, FACE, AND FINGERPRINT SPOOFING DETECTION A. VIJAYA LAKSHMI 1, S. RANJITH 2 1 A.Vijaya Lakshmi, M.Tech Student, Ganapathy Engineering College, Rangasaipet, Warangal, Telangana,
More informationDeep Search Cannot Communicate Callsigns
Deep Search Cannot Communicate Callsigns Klaus von der Heide, DJ5HG There has been some discussion on the validity of QSOs which use the deep search decoder of JT65 [1,2,3,4]. The goal of this paper is
More informationWhite Paper ABC. The Costs of Print Book Collections: Making the case for large scale ebook acquisitions. springer.com. Read Now
ABC White Paper The Costs of Print Book Collections: Making the case for large scale ebook acquisitions Read Now /whitepapers The Costs of Print Book Collections Executive Summary This paper explains how
More informationUniversität Bamberg Angewandte Informatik. Seminar KI: gestern, heute, morgen. We are Humor Beings. Understanding and Predicting visual Humor
Universität Bamberg Angewandte Informatik Seminar KI: gestern, heute, morgen We are Humor Beings. Understanding and Predicting visual Humor by Daniel Tremmel 18. Februar 2017 advised by Professor Dr. Ute
More informationAvoiding False Pass or False Fail
Avoiding False Pass or False Fail By Michael Smith, Teradyne, October 2012 There is an expectation from consumers that today s electronic products will just work and that electronic manufacturers have
More informationFingerprint Verification System
Fingerprint Verification System Cheryl Texin Bashira Chowdhury 6.111 Final Project Spring 2006 Abstract This report details the design and implementation of a fingerprint verification system. The system
More informationA COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MEDICAL IMAGING
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MEDICAL IMAGING Dr.P.Sumitra Assistant Professor, Department of Computer Science, Vivekanandha College of Arts and Sciences for
More informationIdentification of Motion Artifact in Ambulatory ECG Signal Using Wavelet Techniques
American Journal of Biomedical Engineering 23, 3(6): 94-98 DOI:.5923/j.ajbe.2336.8 Identification of Motion Artifact in Ambulatory ECG Signal Using Wavelet Techniques Deepak Vala,*, Tanmay Pawar, V. K.
More informationBIBLIOGRAPHIC DATA: A DIFFERENT ANALYSIS PERSPECTIVE. Francesca De Battisti *, Silvia Salini
Electronic Journal of Applied Statistical Analysis EJASA (2012), Electron. J. App. Stat. Anal., Vol. 5, Issue 3, 353 359 e-issn 2070-5948, DOI 10.1285/i20705948v5n3p353 2012 Università del Salento http://siba-ese.unile.it/index.php/ejasa/index
More informationFocused Ion Beam System MI4050
SCIENTIFIC INSTRUMENT NEWS 2016 Vol. 7 SEPTEMBER Technical magazine of Electron Microscope and Analytical Instruments. Technical Explanation Focused Ion Beam System MI4050 Yasushi Kuroda *1, Yoshihisa
More informationA HIGHLY INTERACTIVE SYSTEM FOR PROCESSING LARGE VOLUMES OF ULTRASONIC TESTING DATA. H. L. Grothues, R. H. Peterson, D. R. Hamlin, K. s.
A HIGHLY INTERACTIVE SYSTEM FOR PROCESSING LARGE VOLUMES OF ULTRASONIC TESTING DATA H. L. Grothues, R. H. Peterson, D. R. Hamlin, K. s. Pickens Southwest Research Institute San Antonio, Texas INTRODUCTION
More informationDelta Journal of Education 1 ISSN
Author(s) Last Name(s) Volume 6, Issue 1, Spring, 2016 1 Delta Journal of Education 1 ISSN 2160-9179 Published by Delta State University Title of Paper, size 18 NTR * font First Author a, Second Author
More informationAuto classification and simulation of mask defects using SEM and CAD images
Auto classification and simulation of mask defects using SEM and CAD images Tung Yaw Kang, Hsin Chang Lee Taiwan Semiconductor Manufacturing Company, Ltd. 25, Li Hsin Road, Hsinchu Science Park, Hsinchu
More informationProblem. Objective. Presentation Preview. Prior Work in Use of Color Segmentation. Prior Work in Face Detection & Recognition
Problem Facing the Truth: Using Color to Improve Facial Feature Extraction Problem: Failed Feature Extraction in OKAO Tracking generally works on Caucasians, but sometimes features are mislabeled or altogether
More informationCS101 Final term solved paper Question No: 1 ( Marks: 1 ) - Please choose one ---------- was known as mill in Analytical engine. Memory Processor Monitor Mouse Ref: An arithmetical unit (the "mill") would
More informationDelta Journal of Education 1 ISSN
Author(s) Last Name(s) Volume 7, Issue 1, Spring, 2017 1 Delta Journal of Education 1 ISSN 2160-9179 Published by Delta State University Title of Paper, size 18 NTR * font First Author a, Second Author
More informationIDENTIFYING TABLE TENNIS BALLS FROM REAL MATCH SCENES USING IMAGE PROCESSING AND ARTIFICIAL INTELLIGENCE TECHNIQUES
IDENTIFYING TABLE TENNIS BALLS FROM REAL MATCH SCENES USING IMAGE PROCESSING AND ARTIFICIAL INTELLIGENCE TECHNIQUES Dr. K. C. P. WONG Department of Communication and Systems Open University, Walton Hall
More informationCMS Upgrade Activities
CMS Upgrade Activities G. Eckerlin DESY WA, 1. Feb. 2011 CMS @ LHC CMS Upgrade Phase I CMS Upgrade Phase II Infrastructure Conclusion DESY-WA, 1. Feb. 2011 G. Eckerlin 1 The CMS Experiments at the LHC
More information@ Massachusetts Institute of Technology All rights reserved.
Robust Audio-Visual Person Verification Using Web-Camera Video by Daniel Schultz Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the requirements for
More informationEEG Eye-Blinking Artefacts Power Spectrum Analysis
EEG Eye-Blinking Artefacts Power Spectrum Analysis Plamen Manoilov Abstract: Artefacts are noises introduced to the electroencephalogram s (EEG) signal by not central nervous system (CNS) sources of electric
More informationIMPROVING VIDEO ANALYTICS PERFORMANCE FACTORS THAT INFLUENCE VIDEO ANALYTIC PERFORMANCE WHITE PAPER
IMPROVING VIDEO ANALYTICS PERFORMANCE FACTORS THAT INFLUENCE VIDEO ANALYTIC PERFORMANCE WHITE PAPER Modern video analytic algorithms have changed the way organizations monitor and act on their security
More informationQuick Start Bruker Dimension Icon AFM
Do not remove Quick Start Bruker Dimension Icon AFM March 3, 2015 GLA Contacts Harold Fu (hfu@caltech.edu) Weilai Yu (wyyu@caltech.edu) Bruker Tech Support (AFMSupport@bruker-nano.com 800-873-9750) Watch
More informationComparative Study on Fingerprint Recognition Systems Project BioFinger
Comparative Study on Fingerprint Recognition Systems Project BioFinger Michael Arnold 1, Henning Daum 1, Christoph Busch 1 Abstract: This paper describes a comparative study on fingerprint recognition
More informationOPTIMIZING VIDEO CLIPS IN EDUCATIONAL MATERIALS
2012, 1(2): 6879 DOI: 10.1515/ijicte-2012-0006 OPTIMIZING VIDEO CLIPS IN EDUCATIONAL MATERIALS Aleš Oujezdský Department of Information and Communication Technologies, Pedagogical Faculty, University of
More informationCreate an Industrial 3D Machine Vision System using DLP Technology
Create an Industrial 3D Machine Vision System using DLP Technology -AM572x Processor based DLP Structured Light Terry Yuan Business Development Manager 1 1987 TI DLP Products: A History of Innovation Dr.
More informationQUESTIONS AND LOGICAL ANALYSIS OF NATURAL LANGUAGE: THE CASE OF TRANSPARENT INTENSIONAL LOGIC MICHAL PELIŠ
Logique & Analyse 185 188 (2004), x x QUESTIONS AND LOGICAL ANALYSIS OF NATURAL LANGUAGE: THE CASE OF TRANSPARENT INTENSIONAL LOGIC MICHAL PELIŠ Abstract First, some basic notions of transparent intensional
More informationAutomatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting
Automatic Commercial Monitoring for TV Broadcasting Using Audio Fingerprinting Dalwon Jang 1, Seungjae Lee 2, Jun Seok Lee 2, Minho Jin 1, Jin S. Seo 2, Sunil Lee 1 and Chang D. Yoo 1 1 Korea Advanced
More informationThe modern and intelligent CCTV (written by Vlado Damjanovski, CEO - ViDi Labs,
The modern and intelligent CCTV (written by Vlado Damjanovski, CEO - ViDi Labs, www.vidilabs.com) The digital (r)evolution of the last twenty years changed almost everything. Analogue vinyl records morphed
More informationAccepted Manuscript. A new Optical Music Recognition system based on Combined Neural Network. Cuihong Wen, Ana Rebelo, Jing Zhang, Jaime Cardoso
Accepted Manuscript A new Optical Music Recognition system based on Combined Neural Network Cuihong Wen, Ana Rebelo, Jing Zhang, Jaime Cardoso PII: S0167-8655(15)00039-2 DOI: 10.1016/j.patrec.2015.02.002
More informationSecurity in digital cinema
1 Security in digital cinema Touradj Ebrahimi Business of Cinema 2 Traditional: The business of cinema is the exhibition of film based theatrical content to audiences for their enjoyment 1 Cinema Overview
More informationLaser coding still the technology of choice for the Pharma industry
White Paper Laser coding still the technology of choice for the Pharma industry Introduction The year 2011 represented a milestone in terms of the introduction of new regulations in the campaign to combat
More informationA Parametric Autoregressive Model for the Extraction of Electric Network Frequency Fluctuations in Audio Forensic Authentication
Proceedings of the 3 rd International Conference on Control, Dynamic Systems, and Robotics (CDSR 16) Ottawa, Canada May 9 10, 2016 Paper No. 110 DOI: 10.11159/cdsr16.110 A Parametric Autoregressive Model
More informationDISPLAY WEEK 2015 REVIEW AND METROLOGY ISSUE
DISPLAY WEEK 2015 REVIEW AND METROLOGY ISSUE Official Publication of the Society for Information Display www.informationdisplay.org Sept./Oct. 2015 Vol. 31, No. 5 frontline technology Advanced Imaging
More information(12) United States Patent
(12) United States Patent Sims USOO6734916B1 (10) Patent No.: US 6,734,916 B1 (45) Date of Patent: May 11, 2004 (54) VIDEO FIELD ARTIFACT REMOVAL (76) Inventor: Karl Sims, 8 Clinton St., Cambridge, MA
More informationM4000 Diagnostic Test System For Power Apparatus Condition Assessment
Knowledge Is Power SM The World Leader in Diagnostic Test Instruments and Knowledge Services for Electric Power M4000 Diagnostic Test System For Power Apparatus Condition Assessment The world s most advanced
More informationThe software concept. Try yourself and experience how your processes are significantly simplified. You need. weqube.
You need. weqube. weqube is the smart camera which combines numerous features on a powerful platform. Thanks to the intelligent, modular software concept weqube adjusts to your situation time and time
More informationTHE INTERNET OF VISION ENABLED THINGS. Tom Brennan Artemis Vision
THE INTERNET OF VISION ENABLED THINGS Tom Brennan Artemis Vision DEFINING THE INTERNET OF THINGS Requirements of the Device: Intelligence: Must have some processing capability Sensors: Must somehow gather
More informationNDIA Army Science and Technology Conference EWA Government Systems, Inc.
NDIA Army Science and Technology Conference EWA Government Systems, Inc. PITCH DECK Biologically-Inspired Processor for Ultra-Low Power Audio and Video Surveillance Applications Presented by Lester Foster
More informationQs7-1 DEVELOPMENT OF AN IMAGE COMPRESSION AND AUTHENTICATION MODULE FOR VIDEO SURVEILLANCE SYSTEMS. DlSTRlBUllON OF THIS DOCUMENT IS UNLlditEb,d
DEVELOPMENT OF AN IMAGE COMPRESSION AND AUTHENTICATION MODULE FOR VIDEO SURVEILLANCE SYSTEMS Qs7-1 William R. Hale Sandia National Laboratories Albuquerque, NM 87185 Charles S. Johnson Sandia National
More informationPromotion Package Pricing
Promotion Package Pricing (For HDB flat, Condo, Small Office & Retail Shop less than 1200sqft) $1400 before GST for 4 camera package $1300 before GST for 3 camera package $1200 before GST for 2 camera
More informationEXPERIMENTS WITH THE ACTIVE VIBRATION CONTROL OF A CANTILEVER BEAM
11 th International Conference on Vibration Problems Z. Dimitrovová et al. (eds.) Lisbon Portugal 9-1 September 013 EXPERIMENTS WITH THE ACTIVE VIBRATION CONTROL OF A CANTILEVER BEAM Pavel Šuránek* 1 Jiří
More informationSystem Quality Indicators
Chapter 2 System Quality Indicators The integration of systems on a chip, has led to a revolution in the electronic industry. Large, complex system functions can be integrated in a single IC, paving the
More informationMelodic Pattern Segmentation of Polyphonic Music as a Set Partitioning Problem
Melodic Pattern Segmentation of Polyphonic Music as a Set Partitioning Problem Tsubasa Tanaka and Koichi Fujii Abstract In polyphonic music, melodic patterns (motifs) are frequently imitated or repeated,
More informationThe effect of training data selection and sampling time intervals on signature verification
The effect of training data selection and sampling time intervals on signature verification János Csirik, Zoltán Gingl, Erika Griechisch Department of Informatics University of Szeged Szeged, Hungary {csirik,gingl,grerika}@inf.u-szeged.hu
More informationInSync White Paper : Achieving optimal conversions in UHDTV workflows April 2015
InSync White Paper : Achieving optimal conversions in UHDTV workflows April 2015 Abstract - UHDTV 120Hz workflows require careful management of content at existing formats and frame rates, into and out
More informationType-2 Fuzzy Logic Sensor Fusion for Fire Detection Robots
Proceedings of the 2 nd International Conference of Control, Dynamic Systems, and Robotics Ottawa, Ontario, Canada, May 7 8, 2015 Paper No. 187 Type-2 Fuzzy Logic Sensor Fusion for Fire Detection Robots
More informationGLI-12 V1.1 GLI 12 V2.0
1.41 Other Standards. These standards cover the actual requirements for various types of progressive gaming devices in casinos. The following other standards may apply: a) Technical Standards for Gaming
More informationResearch Article Design and Analysis of a High Secure Video Encryption Algorithm with Integrated Compression and Denoising Block
Research Journal of Applied Sciences, Engineering and Technology 11(6): 603-609, 2015 DOI: 10.19026/rjaset.11.2019 ISSN: 2040-7459; e-issn: 2040-7467 2015 Maxwell Scientific Publication Corp. Submitted:
More informationLip Sync of Audio/Video Distribution and Display
Lip Sync of Audio/Video Distribution and Display Bill Hogan Clarity Image bill@clarityimage.com Michael Smith Consultant miksmith@attglobal.net HPA 2006 February 24, 2006 1 Lip Sync Overview The Problem
More informationSURVIVAL OF THE BEAUTIFUL
2017.xCoAx.org SURVIVAL OF THE BEAUTIFUL PENOUSAL MACHADO machado@dei.uc.pt CISUC, Department of Informatics Engineering, University of Coimbra Lisbon Computation Communication Aesthetics & X Abstract
More informationSIL-2 8-Ch Analog Input Series Thermocouple, High Level, Low Level
SIL-2 8-Ch Analog Input Series Thermocouple, High Level, Low Level 3107/3108/3109 PRODUCT HIGHLIGHTS 8 Isolated Channels for Safety and Critical Control Applications Configurable Redundancy Single, Dual,
More informationLyrics Classification using Naive Bayes
Lyrics Classification using Naive Bayes Dalibor Bužić *, Jasminka Dobša ** * College for Information Technologies, Klaićeva 7, Zagreb, Croatia ** Faculty of Organization and Informatics, Pavlinska 2, Varaždin,
More informationV9A01 Solution Specification V0.1
V9A01 Solution Specification V0.1 CONTENTS V9A01 Solution Specification Section 1 Document Descriptions... 4 1.1 Version Descriptions... 4 1.2 Nomenclature of this Document... 4 Section 2 Solution Overview...
More informationSupervision of Analogue Signal Paths in Legacy Media Migration Processes using Digital Signal Processing
Welcome Supervision of Analogue Signal Paths in Legacy Media Migration Processes using Digital Signal Processing Jörg Houpert Cube-Tec International Oslo, Norway 4th May, 2010 Joint Technical Symposium
More informationInternational Journal of Advance Engineering and Research Development REMOTE VOTING MACHINE
Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 05, May -2018 REMOTE VOTING MACHINE C.V.Rane 1, Aarti Devkar 2, Yogeshwari
More informationModule 3: Video Sampling Lecture 16: Sampling of video in two dimensions: Progressive vs Interlaced scans. The Lecture Contains:
The Lecture Contains: Sampling of Video Signals Choice of sampling rates Sampling a Video in Two Dimensions: Progressive vs. Interlaced Scans file:///d /...e%20(ganesh%20rana)/my%20course_ganesh%20rana/prof.%20sumana%20gupta/final%20dvsp/lecture16/16_1.htm[12/31/2015
More informationData Mining in Medical Analysis and Performance Evaluation
2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore Data Mining in Medical Analysis and Performance Evaluation Marek Penhaker, Vladimir
More informationADC Peripheral in Microcontrollers. Petr Cesak, Jan Fischer, Jaroslav Roztocil
ADC Peripheral in s Petr Cesak, Jan Fischer, Jaroslav Roztocil Czech Technical University in Prague, Faculty of Electrical Engineering Technicka 2, CZ-16627 Prague 6, Czech Republic Phone: +420-224 352
More information