In this paper we introduce a newmethod for facial expression recognition. In order to be able to recognize the six main facial expressions [1] we use a grid approach and therefore we establish our new feature space ba...
详细信息
In this paper we introduce a newmethod for facial expression recognition. In order to be able to recognize the six main facial expressions [1] we use a grid approach and therefore we establish our new feature space based on the angles that each grid's edge form. This way we undertake several affine transformations such as translation, rotation and scaling which in other approaches are considered very harmful in the overall accuracy of a facial expression recognition algorithm. We will therefore demonstrate how we create this feature space, as well as how we apply a feature selection process within this space. The angular nature of the data impose some considerations which will be clarified in this paper. copyright by EURASIP.
In this paper we introduce a new method for facial expression recognition. In order to be able to recognize the six main facial expressions [1] we use a grid approach and therefore we establish our new feature space b...
详细信息
ISBN:
(纸本)9782839904506
In this paper we introduce a new method for facial expression recognition. In order to be able to recognize the six main facial expressions [1] we use a grid approach and therefore we establish our new feature space based on the angles that each grid's edge form. This way we undertake several affine transformations such as translation, rotation and scaling which in other approaches are considered very harmful in the overall accuracy of a facial expression recognition algorithm. We will therefore demonstrate how we create this feature space, as well as how we apply a feature selection process within this space. The angular nature of the data impose some considerations which will be clarified in this paper.
We consider continuous state, continuous action batch reinforcement learning where the goal is to learn a good policy from a sufficiently rich trajectory generated by some policy. We study a variant of fitted Q-iterat...
详细信息
ISBN:
(纸本)160560352X
We consider continuous state, continuous action batch reinforcement learning where the goal is to learn a good policy from a sufficiently rich trajectory generated by some policy. We study a variant of fitted Q-iteration, where the greedy action selection is replaced by searching for a policy in a restricted set of candidate policies by maximizing the average action values. We provide a rigorous analysis of this algorithm, proving what we believe is the first finite-time bound for value-function based algorithms for continuous state and action problems.
In this paper, we suggest an adaptive watermarking method to improve both transparence and robustness of quantization index modulation (QIM) scheme. inst.ad of a fixed quantization step size, we apply a step size adap...
详细信息
Localization in wireless sensor networks gets more and more important, because many applications need to locate the source of incoming measurements as precise as possible. Weighted centroid localization (WCL) provides...
详细信息
ISBN:
(纸本)9781424408290;1424408296
Localization in wireless sensor networks gets more and more important, because many applications need to locate the source of incoming measurements as precise as possible. Weighted centroid localization (WCL) provides a fast and easy algorithm to locate devices in wireless sensor networks. The algorithm is derived from a centroid determination which calculates the position of devices by averaging the coordinates of known reference points. To improve the calculated position in real implementations, WCL uses weights to attract the estimated position to close reference points provided that coarse distances are available. Due to the fact that Zigbee provides the link quality indication (LQI) as a quality indicator of a received packet, it can also be used to estimate a distance from a node to reference points.
We consider continuous state, continuous action batch reinforcement learning where the goal is to learn a good policy from a sufficiently rich trajectory generated by some policy. We study a variant of fitted Q-iterat...
ISBN:
(纸本)9781605603520
We consider continuous state, continuous action batch reinforcement learning where the goal is to learn a good policy from a sufficiently rich trajectory generated by some policy. We study a variant of fitted Q-iteration, where the greedy action selection is replaced by searching for a policy in a restricted set of candidate policies by maximizing the average action values. We provide a rigorous analysis of this algorithm, proving what we believe is the first finite-time bound for value-function based algorithms for continuous state and action problems.
In this paper, we present a new segmentation model, which makes uses of Curvelet's advantages of edge preserving and noise averaging. The model first applies Lorentzian-function based diffusion for stable pixel cl...
详细信息
In this paper, we present a new segmentation model, which makes uses of Curvelet's advantages of edge preserving and noise averaging. The model first applies Lorentzian-function based diffusion for stable pixel clustering, and then projects boundaries by Curvelet transform (CT) to enhance edges and modify region smear in diffusion. In particular, we also propose a criterion to seek the appropriate moment for CT enhancement, it is fulfilled by comparing partition results of Lorentzian and Tukey-based functions. If the number of reduced regions between two adjacent segmentation rounds arrives a threshold, CT will be performed to prevent edge disappearing. Experiments show that this significant segmentation is resulted from CT's properties of boundary keeping and denoising, the method is superior to many other PDE approaches.
Currently, a crucial challenge is raised on how to manage a large amount of images on the Web. Due to a real synergy between an image and its location, we propose an automatic solution to annotate contextual location ...
详细信息
The aim of this paper is to merge two approaches of software development: the component approach and the formal development approach. Developing software components is now a technique widely used by the software indus...
详细信息
The aim of this paper is to merge two approaches of software development: the component approach and the formal development approach. Developing software components is now a technique widely used by the software industry. These two approaches are not so distant if we consider Bertrand Meyer's opinion: it is more complicated to reuse a component without contracts. One of the difficulties with the design by contract approach is to find the contracts. This difficulty can be removed by the use of the B method. In the B method, the software properties (the contracts) are expressed in the specifications. We present in this paper an approach to generate code in the spirit of the component approach from B specifications.
Vehicle occupants that are out-of-position can be deadly injured by the deployment of the air bag in a crash situation. In recent years many different sensors and systems have been proposed to detect the type of occup...
详细信息
Vehicle occupants that are out-of-position can be deadly injured by the deployment of the air bag in a crash situation. In recent years many different sensors and systems have been proposed to detect the type of occupant and the position of the occupant's head. This paper presents a method for classification and occupant's head detection based on passive stereo vision. The proposed system uses depth surface analysis and scene statistics together with support vector machines for classification and selection of head candidates. Evaluation of the method shows 99% correct for classification and 98% correct for head detection, using large sets of image data, and image sequences recorded in a driving vehicle.
暂无评论