Filters








97,200 Hits in 8.4 sec

An Approach Defining Gait Recognition System using K-Means and MDA

Riant Kaur, Heena Heena
2015 International Journal of Computer Applications  
Gait Recognition is a type of biometric identification method which is related to behavioral characteristic of a person. Gait identifies a person based on the manner he moves or walks on foot.  ...  Biometric Authentication is a technology of verifying and identifying individuals.  ...  Pushpa Rani et al. [8] proposed a system of gait recognition for identification of humans using Modified Independent Component Analysis (MICA).  ... 
doi:10.5120/20643-3350 fatcat:sra5xsn7ezb73mquuqxvlxd7ru

Biometric Identification from Human Aesthetic Preferences

Brandon Sieu, Marina Gavrilova
2020 Sensors  
The proposed system is capable of using a tree-based genetic approach for feature recombination.  ...  The expression of opinions is an example of online behavior that is commonly shared through the liking of online images.  ...  An adaptive mutation behavior was implemented, which increases the robustness and growth of the overall accuracy of the system.  ... 
doi:10.3390/s20041133 pmid:32093028 pmcid:PMC7071451 fatcat:5gd3pzbe2jfqrnrp4ajzmvfxqi

The Evolution of Wi-Fi Technology in Human.pdf

Noha Mohamed
2021 figshare.com  
; (b) single and multi-modality sensing; (c) Wi-Fi-based techniques; d) challenges and future works.  ...  This paper reviews various approaches for Wi-Fi human motion recognition systems, their analytical methodologies, challenges and proposed techniques along with the aspects to this paper: (a) applications  ...  As an outcome of the study, numerous applications such as video surveillance, HCI, and human behavior modelling demand a multiple action identification system.  ... 
doi:10.6084/m9.figshare.16668373.v1 fatcat:nl2y3c4lbvgsxbojcouavxdpuu

Multi Variant Feature Similarity based Behavior Tracking in Video Surveillance using Ann

2019 International journal of recent technology and engineering  
There are number of approaches available for the video surveillance and behavior analysis. The previous methods uses background models, object tracking for the problem of behavior analysis.  ...  The artificial neural network has been used for the classification of behavior identified through video surveillance. The method would produce higher accuracy and improves the performance.  ...  Similarly, the behavior of any human can be monitored and tracked using video surveillance systems.  ... 
doi:10.35940/ijrte.b3673.098319 fatcat:qs5a46sfgzfcjowuaxrs2yhvuq

Research on Multimode Biometric Features Recognition System Adopting Neural Network

Wang Xiaosong, Zheng Zhiqing
2015 Open Cybernetics and Systemics Journal  
The small sample issue is a common problem in face recognition system, and multi-modal model has strong generalization ability to solve the problem of small sample, which has already become the most important  ...  area of research in pattern recognition, however, the low accuracy and efficiency of the model has become a major challenge.  ...  INTRODUCTION Multimode biological feature recognition [1] is a pattern recognition research field to recognize identity based on a physical model of human or behavior patterns, and the advantages of  ... 
doi:10.2174/1874110x01509012508 fatcat:ysxo5sj3mzeztp5sddq3qcjpoq

A Multi-Agent Architecture for Data Analysis

Gianfranco Lombardo, Paolo Fornacciari, Monica Mordonini, Michele Tomaiuolo, Agostino Poggi
2019 Future Internet  
It provides a multi-agent architecture with a set of predefined and configurable agents performing the typical tasks of data mining applications.  ...  After an introduction about the actor model and the software framework used for implementing the software library, this article underlines the main features of ActoDatA and presents its experimentation  ...  The TrollPacifier multi-agent system.  ... 
doi:10.3390/fi11020049 fatcat:ejwx7oczcrhslhks54st7dgv3q

A survey Paper on Feature Extraction and Classification in ECG Biometric Signal

Kalyani U. Girde, Asst. Prof. Nandini Dhole
2017 IJARCCE  
Weights are allocated to the features inside the kernel of each task. We break down the network comprising of all the feature weights into sparse and low rank components.  ...  The meagre part decides the highlights that are important to distinguish every person, and the low rank segment decides the normal component subspace that is pertinent to distinguish every one of the subjects  ...  Biometrics is identification of an individual based on the physiological and/or behavioral characteristics. It is highly difficult to do falsification in case of biometric frameworks.  ... 
doi:10.17148/ijarcce.2017.63123 fatcat:6igbreq6jnhubpo7qsx6fcujae

Based on Wide Area Environment Abnormal Behavior Analysis and Anomaly Detection Research

Lin Zhang, Xiaoping Li, A.J. Arumugham, M.M. Ulkhaq, M. Kocisko, R.K. Goyal, W.A. Yusmawiza, X. Qiu
2016 MATEC Web of Conferences  
We are to research on the algorithms of accident source location and abnormal group identification based on behavior analysis in the condition of dramatically changing group geometry appearance, including  ...  to construct a multi-view human body skeleton invariant moment model and a motion trajectory model based on linear parametric equations.  ...  Rapid propagation of new abnormal group model, multi region and multi scene linkage realtime warning should be achieved by continuous training "group trend -the source of the object behavior attribute"  ... 
doi:10.1051/matecconf/20166810006 fatcat:jbncmcabfnatpmoww36v543usq

Mixture Kernel Radial Basis Functions Neural Networks for Web Log Classification [chapter]

Dash Ch. Sanjeev Kumar, Pandia Manoj Kumar, Dehuri Satchidananda, Cho Sung-Bae
2013 Advances in Intelligent Systems and Computing  
In this connection two RBFNs with different mixture of kernels are investigated on web access logs for classification. The collected data are used for training, validation, and testing of the models.  ...  Along side they are also interested in tracking and understanding the need of the users. Analyzing web access logs, one can understand the browsing behavior of users.  ...  In model-b we have used combination of Gaussian, multi-quadric, and inverse multi-quadric functions.  ... 
doi:10.1007/978-3-642-35314-7_1 fatcat:rkuoaffu75b4zgmk75gz726nda

A Survey Of Activity Recognition And Understanding The Behavior In Video Survelliance [article]

A. R. Revathi, Dhananjay Kumar
2012 arXiv   pre-print
Visual surveillance system is directed on automatic identification of events of interest, especially on tracking and classification of moving objects.  ...  The processing step of the video surveillance system includes the following stages: Surrounding model, object representation, object tracking, activity recognition and behaviour understanding.  ...  behavior analysis, and biometrics for stand-off human subject identification and behavior understanding.  ... 
arXiv:1207.6774v1 fatcat:zau7izoouffe7livk6zvxrn5sq

On-line Transformer Condition Monitoring through Diagnostics and Anomaly Detection

V. M. Catterson, S. E. Rudd, S. D. J. McArthur, G. Moss
2009 2009 15th International Conference on Intelligent System Applications to Power Systems  
This paper describes the end-to-end components of an on-line system for diagnostics and anomaly detection.  ...  The paper discusses the requirements on a system for interpreting data from the sensors installed on site, as well as describing the operation of specific diagnostic and anomaly detection techniques employed  ...  The correlation model was trained using the selected Gaussian mixture models: a 14-component indicator model, and a 16-component environment model. C.  ... 
doi:10.1109/isap.2009.5352860 fatcat:ymj7xroy7jbrxpcvny7eqtymeq

Classification and Comparison of Critical Infrastructure Protection Tools [chapter]

George Stergiopoulos, Efstratios Vasilellis, Georgia Lykou, Panayiotis Kotzanikolaou, Dimitris Gritzalis
2016 IFIP Advances in Information and Communication Technology  
It simulates dynamic behavior, including the effects of system interdependencies.  ...  Critical infrastructures are complex adaptive systems and their components can be modeled as agents.  ... 
doi:10.1007/978-3-319-48737-3_14 fatcat:hvmld2z2ezbn7j4a6yipr5tbuu

Biometric Systems De-Identification: Current Advancements and Future Directions

Md Shopon, Sanjida Nasreen Tumpa, Yajurv Bhatia, K. N. Pavan Kumar, Marina L. Gavrilova
2021 Journal of Cybersecurity and Privacy  
A comprehensive overview of research in the context of authentication applications spanning physiological, behavioral, and social-behavioral biometric systems and their privacy considerations is discussed  ...  An overview of biometric de-identification in emerging domains such as sensor-based biometrics, social behavioral biometrics, psychological user profile identification, and aesthetic-based biometrics is  ...  The system used silhouette splitting and clothing color segmentation algorithms. The components of the HSV color space of the segmented clothing were modified for de-identification. Pena et al.  ... 
doi:10.3390/jcp1030024 fatcat:fzrdvbpyeja67km2xjac36s4da

Patterns Reuse in the PASSI Methodology [chapter]

Massimo Cossentino, Luca Sabatucci, Antonio Chella
2004 Lecture Notes in Computer Science  
Design patterns already proved successful in lowering the development time and number of errors of object-oriented software; now, they are, candidate to play a similar role in the MAS (multi-agent system  ...  In this work we describe our experiences in the identification, production and application of patterns for agents.  ...  This model is composed of a structural and behavioral definition of the MAS that is performed at both the multi and single agent level.  ... 
doi:10.1007/978-3-540-25946-6_19 fatcat:3wgdpivffrd5bkokqcaqbbub6i

Argument Component Classification for Classroom Discussions

Luca Lugini, Diane Litman
2018 Proceedings of the 5th Workshop on Argument Mining  
This paper focuses on argument component classification for transcribed spoken classroom discussions, with the goal of automatically classifying student utterances into claims, evidence, and warrants.  ...  at the character and at the word level, and specificity information can help boost performance in multi-task training.  ...  This work was supported by the Learning Research and Development Center.  ... 
doi:10.18653/v1/w18-5208 dblp:conf/argmining/LuginiL18 fatcat:7xub5o2ruvahnfjnvzvbl2zgdi
« Previous Showing results 1 — 15 out of 97,200 results