1,059 Result(s)
-
Chapter and Conference Paper
Camera calibration based on 3D-point-grid
In this paper an effective technique of camera calibration based on a 3D-point-grid is presented. The properties of structured space points, defined as 3D-point-grid, and their relations under perspective tran...
-
Chapter and Conference Paper
Bézier Volume Deformation Model for Facial Animation and Video Tracking
Capturing real motions from video sequences is a powerful approach to automatically build facial deformation model. In this paper, a 3D Bézier volume deformation model is proposed for both synthesis and analys...
-
Chapter and Conference Paper
Reconstruction and Physically-based Animation of Trees from Static Images
Trees, in particular the dynamic waving of trees plays a very important role in the natural scenery of landscape. Unfortunately, due to the high level complexity of the structure of trees and the highly varyin...
-
Chapter and Conference Paper
A Sampling Algorithm for Tracking Multiple Objects
The recently proposed CONDENSATION algorithm and its variants enable the estimation of arbitrary multi-modal posterior distributions that potentially represent multiple tracked objects. However, the specific s...
-
Chapter and Conference Paper
The Synthesis of Realistic Human Face
In this paper, we present new techniques for creating a realistic specific human face based on a general 3D face model and several photos of a human. The morphing technique allows interactive alignment of feat...
-
Chapter and Conference Paper
Detecting Facial Features on Images with Multiple Faces
This paper presents an approach to detect facial features of multiple faces on complex background and with variable poses, illumination conditions, expressions, ages, image sizes, etc. First, the skin parts of...
-
Chapter and Conference Paper
A Bayesian Method for Content-Based Image Retrieval by Use of Relevance Feedback
This paper proposes a new Bayesian method for content-based image retrieval using relevance feedback. In this method, the problem of contentbased image retrieval is first formulated as a two-class classificati...
-
Chapter and Conference Paper
Explosive Impact on Real-time
In this paper, we describe methods for real-time modelling explosions and their impacts on realistic deformable terrains. Our simulation method elaborates a strength and damage model for terrain ma...
-
Chapter and Conference Paper
Monte Carlo Visual Tracking Using Color Histograms and a Spatially Weighted Oriented Hausdorff Measure
Color-based and edge-based trackers based on sequential Monte Carlo filters have been shown to be robust and versatile for a modest computational cost. However, background features with characteristics similar...
-
Chapter and Conference Paper
Tunnelling Descent: A New Algorithm for Active Contour Segmentation of Ultrasound Images
The presence of speckle in ultrasound images makes it hard to segment them using active contours. Speckle causes the energy function of the active contours to have many local minima, and the gradient descent p...
-
Chapter and Conference Paper
A Palmprint Acquisition Device with Time-Sharing Light Source Used in Personal Verification
This paper proposes a hardware-based line feature enhancement approach that uses a palmprint acquisition device fitted with a time-sharing light source. When capturing images, two lamps of the light source can...
-
Chapter and Conference Paper
Gesture Recognition for Human-Robot Interaction Through a Knowledge Based Software Platform
The task of real-time hand gesture recognition is extremely challenging due to a number of DOFs of hand pose and motion. However, for human-robot interaction in natural ways, gesture can provide a powerful int...
-
Chapter and Conference Paper
Rough Fuzzy Integrals for Information Fusion and Classification
This paper presents two extended fuzzy integrals under rough uncertainty, i.e. rough upper fuzzy and lower fuzzy integrals, and extended properties are also given. Furthermore, these two integrals are applied ...
-
Chapter and Conference Paper
A Hierarchical Hough Transform for Fingerprint Matching
This paper addresses the improvement on the matching accuracy and speed of generalized Hough transform for the biometric identification applications. The difficulties encountered in generalized Hough transform...
-
Chapter and Conference Paper
Using Multi-matching System Based on a Simplified Deformable Model of the Human Iris for Iris Recognition
This paper proposes a new method for iris recognition using a multi-matching system based on a simplified deformable model of the human iris. The method defines iris feature points and forms the feature space ...
-
Chapter and Conference Paper
A Speaker Tracking Algorithm Based on Audio and Visual Information Fusion Using Particle Filter
Object tracking by sensor fusion has become an active research area in recent years, but how to fuse various information in an efficient and robust way is still an open problem. This paper presents a new algor...
-
Chapter and Conference Paper
Hidden Markov Model Based Events Detection in Soccer Video
This paper presents an algorithm developed based on hidden Markov model for cues fusion and event inference in soccer video. Four events, shoot, foul, offside and normal playing, are defined to be detected. Th...
-
Chapter and Conference Paper
Clustering XML Documents by Structure
This work explores the application of clustering methods for grou** structurally similar XML documents. Modeling the XML documents as rooted ordered labeled trees, we apply clustering algorithms using distan...
-
Chapter and Conference Paper
Bi-phase Encoded Waveform Design to Deal with the Range Ambiguities for Sparse Space-Based Radar Systems
In order to mitigate the Range-Doppler ambiguities inherent in a sparse aperture, high pulse repetition frequency is adopted to resolve Doppler ambiguous and waveform approach exploits temporal diversity to re...
-
Chapter and Conference Paper
A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls
Intrusion detection has emerged as an important technique for network security. Due to the complex and dynamic properties of intrusion behaviors, machine learning and data mining methods have been widely emplo...