Filters








19 Hits in 6.7 sec

A Smart Surveillance System for Uncooperative Gait Recognition Using Cycle Consistent Generative Adversarial Networks (CCGANs)

Wafaa Adnan Alsaggaf, Irfan Mehmood, Enas Fawai Khairullah, Samar Alhuraiji, Maha Farouk S. Sabir, Ahmed S. Alghamdi, Ahmed A. Abd El-Latif, Francisco Gomez-Donoso
2021 Computational Intelligence and Neuroscience  
individual with any dynamic walking conditions, a cycle consistent generative adversarial network is used.  ...  Gait Recognition is the study of recognizing people by the way they walk even when they are unwilling to cooperate.  ...  [44] to translate the GEIs affected by carried objects to GEIs without carried objects.  ... 
doi:10.1155/2021/3110416 pmid:34691168 pmcid:PMC8528623 fatcat:wo2px35ol5f6vnbtvvylp5tpsu

Deep Gait Recognition: A Survey [article]

Alireza Sepas-Moghaddam, Ali Etemad
2022 arXiv   pre-print
Gait recognition is an appealing biometric modality which aims to identify individuals based on the way they walk.  ...  We first review the commonly used gait datasets along with the principles designed for evaluating them.  ...  The Alpha-blending GAN (Ab-GAN) proposed in [123] exploits an encoder-decoder network as the generator to generate gait templates without carried objects.  ... 
arXiv:2102.09546v2 fatcat:iwzddzjy2rhunbuqz7h6tso5ii

Face Morphing Attack Generation Detection: A Comprehensive Survey [article]

Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
2020 arXiv   pre-print
The vulnerability of Face Recognition System (FRS) to various kind of attacks (both direct and in-direct attacks) and face morphing attacks has received a great interest from the biometric community.  ...  An e-passport with a morphed face images can be used by both the malicious actor and the accomplice to cross the border as the morphed face image can be verified against both of them.  ...  Morphs can be generated using various techniques from simple image warping to recent Generative Adversarial Networks (GAN) [27] , [32] , [33] , [65] , [67] , [85] , [126] , [128] , [129] .  ... 
arXiv:2011.02045v1 fatcat:why3ebhmcfezdckv443t7grddi

Face Morphing Attack Generation & Detection: A Comprehensive Survey

Sushma Venkatesh, Raghavendra Ramachandra, Kiran Raja, Christoph Busch
2021 IEEE Transactions on Technology and Society  
The vulnerability of face recognition systems (FRSs) to various kinds of attacks (both direct and indirect attacks) and face morphing attacks has received great interest from the biometric community.  ...  Face recognition has been successfully deployed in real-time applications, including secure applications such as border control.  ...  Morphs can be generated using various techniques, from simple image warping to recent generative adversarial networks (GANs) [27] , [33] , [34] , [66] , [68] , [86] , [128] , [130] , [131] .  ... 
doi:10.1109/tts.2021.3066254 fatcat:iyo5a6ofefewthz2kmiioocyg4

An Essay on Man: An Introduction to a Philosophy of Human Culture

Fritz Kaufmann, Ernst Cassirer
1947 Philosophy and Phenomenological Research  
It was the utterance of pleasurable recognition." 23 But when by means of the finger alpha bet the child had grasped the meaning of human language the case was altered.  ...  We must have a general conception of the object, and regard it from different angles in order to find its relations to other objects. We must locate it and determine its position in a general system.  ...  To be sure even here tradition still plays a paramount role. As in the case of language the same forms are transmitted from one generation to another.  ... 
doi:10.2307/2102729 fatcat:r6bmep23zbcijngrdxywzxtuxi

Proceedings, MSVSCC 2019

2019
each of the tracks, and provided overall assistance to the conference.  ...  The Conference featured student research and student projects that are central to MSV.  ...  not have been ACKNOWLEDGMENTS The authors would like to thank anonymous reviewers for their invaluable suggestions and helpful comments on the paper.  ... 
doi:10.25776/h6kt-wg87 fatcat:yhxdq5ep5jdldaajffu26vbcyy

The People's Voice: The Orator in American Society

G. Jack Gravlee, Barnet Baskerville
1981 Rocky Mountain Review of Language and Literature (RMMLA)  
five had been carried coast to coast by the radio networks.  ...  Roosevelt used the spoken and written word to exercise leadership and to carry out policies. -SAMUEL T.  ...  But if full-length speeches were not frequently carried on television, politicans continued to address constituents on the hustings.  ... 
doi:10.2307/1347804 fatcat:aknvjpnexfe3tgbkixx5gvgoay

TeaP 2020 - Abstracts of the 62nd Conference of Experimental Psychologists

(:Unkn) Unknown, Leibniz Institut Für Psychologie (ZPID), Christian Dobel, Carina Giesen, Laura Anne Grigutsch, Jürgen M. Kaufmann, Gyula Kovács, Franziska Meissner, Klaus Rothermund, Stefan R. Schweinberger
2021
Consequently, we carried out an experimental driving simulator study (N = 32) and investigated several advanced interface variants for a typical office task (text-comprehension).  ...  Hence, we hypothesize that mobile offices will only be accepted by the general public when the tools are seamlessly integrated into automated vehicles, and thereby offering safe and productive mobile work  ...  engages a wider network than imagery of static objects.  ... 
doi:10.23668/psycharchives.5176 fatcat:67c63hw2bnal5bnfydwg5nvuta

The Last Great American Picture Show:New Hollywood Cinema in the 1970s

Coyne Michael
2007 Film International  
It erupted from beneath the cinders on the grave of Carrie (1976), a hand to drag us down into the darkness.  ...  If some were appalled to see the US react so soon and massively against so puny an adversary, the victory nevertheless intoxicated the American media.  ...  A jump cut hurls us headlong into Jimmy's breathless pursuit of the object of his desire. He has been drawn out into the larger world. A moment's confusion shows Jimmy looking this way and that.  ... 
doi:10.1386/fiin.5.2.64 fatcat:3owmp4iurne37pyewm223zalqq

Between capture and the camp

Richard Thomas Nisa
2013
logs to recently leaked security files.  ...  Over the course of the past sixty years, these liminal spaces, balanced precariously between the lethality of war and the humanitarian objectives of care and custody, have transformed from largely unregulated  ...  his ex-adversaries" and therefore would have had to have been "restrained, on occasion, from performing his duties too enthusiastically, and as a result there is invariably a mixed guard, US and ROK."  ... 
doi:10.7282/t3kp80vh fatcat:mot4ogmjdng5hf676ij7tltmma

Noisy expectations: sound of modernity in Sigmund Freud's and Arnold Schoeberg's fin de siècle

Dariusz Gafijczuk
2007
N o isy E x p ec tatio n s: S o u n d o f M o d ern ity in S ig m u n d F re u d 's an d A rn o ld S c h o e n b e rg 's fin de siecle by D a riu sz G afijc zu k A thesis submitted to the Faculty o f Graduate  ...  Acknowledgments I would like to express my sincere thanks to the following people: M y advisor and mentor, Dr.  ...  D erek Sayer, who always and w ith im peccable tim ing was able to correct the course o f my intellectual drifts and currents.  ... 
doi:10.7939/r3-ec3r-0993 fatcat:yyvtnr2xyncntaspnwzc4ly22e

Part I Disciplinary, legal and sociocultural overflow: from psycho-logism to psychologisation

Chris Arcp
unpublished
This book is said to be the first to contain the word-psychology‖ in print.  ...  Acknowledgements I would like to thank Angel Gordo López and Stavros Psaroudakis for their comments on earlier versions of this paper.  ...  I would also like to thank Chris Higgins for his help in turning this paper into something suitable for publication, and Jan de Vos for his infinite patience as editor.  ... 
fatcat:55y6rvqizbhfhc6tbclfhgd6ju

Genre Trouble: Composing the Personal in Academic and Public Writing

Nancy Bray
2018
To give the impression of objectivity, researchers have historically limited reference to themselves in their academic writing.  ...  Using rhetorical genre theory and the narrative paradigm as a framework, I ask the following questions in this dissertation: How do academic genres open or close spaces for personal writing and shape who  ...  It was not an invention strategy that I used to generate ideas that would be then trimmed and reduced for a traditional genre.  ... 
doi:10.7939/r3pv6bp02 fatcat:peqwc37eh5g3lhjpywflniisea

Proceedings, MSVSCC 2016

2016
ACKNOWLEDGEMENTS This work and any work generated in the future is directly linked to the Invisible Institute.  ...  add the body of research regarding instructional simulators generally.  ...  It employs many of the techniques common to augmented reality to blend elements of traditional game and app design.  ... 
doi:10.25776/e55g-8z13 fatcat:r674u2tdxngnxldoft34qtqv7i

The targum (1935:Feb. 2 - 1935:Feb. 27)

No Name Supplied
1935
alumni and the general public.  ...  1869, the Targum as we now know it, made its appearance as a monthly paper that concerned itself with student "literary contributions" and college news as well as serving as a vehicle for bringing news to  ...  The object of the bookstore is to be of value to thé student and at the same time to be a self-supporting institution. The latter object has not been realized.  ... 
doi:10.7282/t3-9r1p-gz13 fatcat:yzienf47njhozlpb2hvtbbfwwi
« Previous Showing results 1 — 15 out of 19 results