Intra-Class Threshold Selection in Face Space Using Set Estimation Technique
01 Jan 2011-pp 69-84
TL;DR: A hypothetical face recognition task can be viewed in general as combinations of two phases i.e. face authentication or verification and face identification.
Abstract: A hypothetical face recognition task can be viewed in general as combinations of two phases i.e. face authentication or verification and face identification. Several evaluation protocols (Philips, 2003; Jain, 2004; Blackburn, 2004) have been designed earlier for measuring the performance of different existing algorithms. Among those popular methods, appearance based methods (Zhao, 2003; Moghaddam, 2004; Solar, 2005; Maltoni 2005) are generally based on dissimilarity, where the query image is either put in the class for which the dissimilarity is minimal or from which the maximum number of matches are found. This is a classical approach of identification and known ABStRACt
Citations
More filters
TL;DR: The proposed methodology consists of three main phases and each phase has several steps in which activities that must be carried out are clearly defined in this paper.
Abstract: Metaheuristic algorithms will gain more and more popularity in the future as optimization problems are increasing in size and complexity. In order to record experiences and allow project to be replicated, a standard process as a methodology for designing and implementing metaheuristic algorithms is necessary. To the best of the authors' knowledge, no methodology has been proposed in literature for this purpose. This paper presents a Design and Implementation Methodology for Metaheuristic Algorithms, named DIMMA. The proposed methodology consists of three main phases and each phase has several steps in which activities that must be carried out are clearly defined in this paper. In addition, design and implementation of tabu search metaheuristic for travelling salesman problem is done as a case study to illustrate applicability of DIMMA.
25 citations
31 Dec 2011
TL;DR: This chapter describes an investigation into the premise that blind programmers and web-developers can create modern Graphical User Interfaces (GUI) through perceptions of MulSeMedia, and whether perceptual culture has a role in this understanding.
Abstract: This chapter describes an investigation into the premise that blind programmers and web-developers can create modern Graphical User Interfaces (GUI) through perceptions of MulSeMedia, and whether perceptual culture has a role in this understanding. Its purpose it to: 1) investigate whether the understanding of computer interfaces is related to perceptual culture as well as perceptual ability; 2) investigate whether it is possible for a person who has never seen to understand visual concepts in informational technology through non-visual senses and memories; and 3) provoke questions as to the nature of computer interfaces, and whether they can ever be regarded as MulSeMedia style interfaces. Beyond this, it proposes to: 1) inform accessible MulSeMedia interface design; and 2) investigate the boundaries of accessing computer interfaces through non-visual perceptions and memories. In order to address these aims and objectives, this chapter discusses the following two research questions:1) Is the perceptual culture of a blind person as important as physical level of blindness in being able to understand, work with, learn how to use or create and program Graphical User Inerfaces (GUIs)?2) Can a cultural model of understanding blindness in part explain the difficulties in adapting Windows MulSeMedia applications for blind people? The study found that programmers who had been introduced to, and educated using a range of visual, audio and /or tactile devices, whether early or late blind, could adapt to produce code with GUIs, but programmers who were educated using only tactile and audio devices preferred to shun visual references in their work.
18 citations
01 Jan 2012
TL;DR: In this article, the authors propose a framework, framed under an enterprise architecture that guarantees a high level of response to the applications development or configuration as improves its alignment to business by solving some limitations of traditional software development solutions.
Abstract: In this chapter the authors show, by using a case study, how it is possible to achieve the alignment between business and Information Technology (IT). It describes several phases of project development, from planning strategy, enterprise architecture, development of businesses supporting tools and keeping dynamic alignment between the business and the IT. The authors propose a framework, framed under an enterprise architecture that guarantees a high level of response to the applications development or configuration as improves its alignment to business by solving some limitations of traditional software development solutions namely: difficulty in gathering clients requirements, which should be supported by the applications; difficulty to connect the organisation processes used to answer the client, which must also be integrated in the applications and the difficulty to develop the applications that can follow the business cycle. To test the approach, this was applied to a real case study consisting in the configuration of an application that manages the relationship with the clients.
8 citations
References
More filters
TL;DR: A brief overview of the field of biometrics is given and some of its advantages, disadvantages, strengths, limitations, and related privacy concerns are summarized.
Abstract: A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user and no one else. Examples of such applications include secure access to buildings, computer systems, laptops, cellular phones, and ATMs. In the absence of robust personal recognition schemes, these systems are vulnerable to the wiles of an impostor. Biometric recognition, or, simply, biometrics, refers to the automatic recognition of individuals based on their physiological and/or behavioral characteristics. By using biometrics, it is possible to confirm or establish an individual's identity based on "who she is", rather than by "what she possesses" (e.g., an ID card) or "what she remembers" (e.g., a password). We give a brief overview of the field of biometrics and summarize some of its advantages, disadvantages, strengths, limitations, and related privacy concerns.
4,678 citations
TL;DR: A generalization of the convex hull of a finite set of points in the plane leads to a family of straight-line graphs, "alpha -shapes," which seem to capture the intuitive notions of "fine shape" and "crude shape" of point sets.
Abstract: A generalization of the convex hull of a finite set of points in the plane is introduced and analyzed. This generalization leads to a family of straight-line graphs, " \alpha -shapes," which seem to capture the intuitive notions of "fine shape" and "crude shape" of point sets. It is shown that a-shapes are subgraphs of the closest point or furthest point Delaunay triangulation. Relying on this result an optimal O(n \log n) algorithm that constructs \alpha -shapes is developed.
1,648 citations
Proceedings Article•
01 Jan 1997
TL;DR: The DET Curve is introduced as a means of representing performance on detection tasks that involve a tradeoff of error types and why it is likely to produce approximately linear curves.
Abstract: : We introduce the DET Curve as a means of representing performance on detection tasks that involve a tradeoff of error types. We discuss why we prefer it to the traditional ROC Curve and offer several examples of its use in speaker recognition and language recognition. We explain why it is likely to produce approximately linear curves. We also note special points that may be included on these curves, how they are used with multiple targets, and possible further applications.
1,516 citations
01 Aug 2002
TL;DR: The purpose of this document is to summarise the current understanding of the biometrics community of the best scientific practices for conducting technical performance testing towards the end of field performance estimation.
Abstract: The purpose of this document is to summarise the current understanding of the biometrics community of the best scientific practices for conducting technical performance testing towards the end of field performance estimation.
402 citations