MultiModal Interaction Sabanci University. Berrin Yanıkoğlu [email protected]
|
|
|
- Osborne Cox
- 10 years ago
- Views:
Transcription
1 MultiModal Interaction Sabanci University Berrin Yanıkoğlu [email protected]
2
3 Overview Medical Imaging Brain-Computer Interfaces Gözde Ünal Müjdat Çetin Visualisation Selim Balcısoy Handwriting Recognition Multimodal biometrics Berrin Yanıkoğlu
4 VPA Lab CGLab SPIS Lab -
5 Gözde Ünal
6 Visualization and Interaction are necessary for Surgical and Treatment Planning In Radiotherapy: detailed high-res 3D images of the patient are used for outlining borders of the lesions during treatment planning, as well as for positioning of the patient during radiation delivery Funding: TÜBİTAK 1001 Research Grant ( ) Partners: Sabancı University, Assoc. Prof Gozde Unal Clinical Partner: Anadolu Medical Center, Prof. Dr. Kayhan Engin RadioOncology Department Dr. Kutlay Karaman, Radiology Department
7 For Interactive Tumor Segmentation, user draws a line on a 2D slice of different 3D MR volumes and the tumor is segmented Tumor is segmented on different MR modalities (T1, T2, FLAIR, with and w/o contrast) CE- Hamamci A., Unal G.,.. Tumor-Cut: segmentation of brain tumors... IEEE Transactions on Medical Imaging, 2012, 31(3): Hamamci A., Unal G., Multimodal Brain Tumor Segmentation Using The Tumor-cut Method on the BraTS Dataset MICCAI 2012-Multimodal Brain Tumor Segmentation Challenge.
8 Visualization of Anatomic Structures in Follow-up is important for comparison of pre/post therapy GLIOMA AFTER THERAPY BEFORE THERAPY
9 Brain Vasculature Modeling and Visualization is important for analyzing cerebral flow abnormalities MIP: Maximum Intensity projection: Vessels are visible however, we do not know where they are in space, to do that segmentation and modeling is needed
10 Cerebral Arteries Segmented from MRA and Modeled * * Cetin, S.., Unal G.,.. Vessel tractography using an intensity based tensor model with branch detection IEEE Transactions on Medical Imaging, 2013, 32(2):348-63
11 These Vessel models are then used for: surgical planning pathology detection and quantification
12 Pre-Post Op DTI for BrainStem Lesion Follow-up Computational Tools for Assessment of Brain Stem Lesion Surgery Follow-up are developed: BrainStem White Matter Structures are revealed along with pathology, i.e. the tumor Brain surgeon uses these for planning surgery too Funding: TÜBİTAK 1001 Research Grant ( ) Partners: Sabancı University, Assoc. Prof Gozde Unal Clinical Partner: Yeditepe University Hospital, Prof. Dr. Uğur Ture NeuroSurgery Department Zeynep Fırat, Radiology Department Before Surgery After Surgery
13 Selim Balcısoy
14 Spatio-temporal data analysis Do 3D Visualizations Fail? An Empirical Discussion on 2D and 3D Representations of the Spatio-temporal Data Erdem Kaya, M. Tolga Eren, Candemir Doger, Selim Balcisoy. IEEE SciVis 2014, Poster Presentation Analysis of spatio-temporal data has become critical with the emergence of ubiquitous location sensor technologies. One application area is location based services (LBS) for GSM networks and another area is shipment tracking. Video:
15 Spatio-temporal data analysis Light Source Estimation in Mobile Augmented Reality Scenes by Using Human Face Geometry Emre Koç, Selim Balcisoy, IEICE Transactions Vol. 97-D No. 8 Pg Light source estimation and virtual lighting must be believable in terms of appearance and correctness in augmented reality scenes. As a result of illumination complexity in an outdoor scene, realistic lighting for augmented reality is still a challenging problem. In this paper, we propose a framework based on an estimation of environmental lighting from welldefined objects, specifically human faces.
16 Spatio-temporal data analysis A visualisation technique for large temporal social network datasets in Hyperbolic space Uraz Cengiz Türker, Selim Balcısoy, Journal of Visual Languages & Computing, 2014 In this paper, we present a novel visualisationapproach that depicts both relational and statistical information of evolving social structures. The underlying framework is implemented by the usage ofhyperbolic Geometryto support focus context rendering. The proposed method guarantees representing prominent social actors through scaling their representations, preserves user s mental map, and provides the user to reduce visual clutter by means of filtering.
17
18
19 Müjdat Çetin
20 EEG-based Brain-Computer Interfaces (BCI) work at Sabancı University BCI-based spelling using P300 signals and language models New models and algorithms for classification of imaginary motor tasks BCI-based robotic rehabilitation [involving a collaboration with MPI Intelligent Systems Tübingen]
21 BCI-based Spelling System Joint use of EEG data and language models J.F. Delgado Saa, A. de Pesters, D. McFarland, and M. Çetin, A Probabilistic Graphical Model for Word-Level Language Modeling in P300 Spellers, International Brain-Computer Interface Conference, Ç. Ulaş and MÇetin, Incorporation of a Language Model into a Brain ComputerInterface based Speller through HMMs, IEEE International Conference on Acoustics, Speech, and Signal Processing, 2013.
22 Controlling RoboticMovements using Brain Signals for Stroke Rehabilitation Using movement intention continuously detected from EEG to control the robot M. Saraç, Ela Koyaş, A. Erdoğan, V. Patoğlu, and M. Çetin, Brain Computer Interface based Robotic Rehabilitation with Online Modification of Task Speed, International Conference on Rehabilitation Robotics, O. Özdenizci, T. Meyer, M. Çetin, and M. Grosse-Wentrup, Towards Neurofeedback Training of Associative Brain Areas for Stroke Rehabilitation, International Brain-Computer Interface Conference, 2014.
23 FacialFeature Tracking using Graphical Models Using spatio-temporal graphical models for jointly tracking multiple facial features S.Coşar and MÇetin, A Graphical Model based Solution to the Facial Feature Point Tracking Problem, Image and Vision Computing, 2011.
24 Berrin Yanıkoğlu
25 Computer Vision: Handwriting & Sketch Recognition Berrin Yanıkoğlu Objective Automatically recognize handwritten text or sketches: online or offline Significance Easy and natural interface alternative to keyboards Scanned document recognition helps extract information and speedup document processing. Approach Hidden Markov Models Neural Networks, SVM classifiers Deep Learning (LSTM architecture) Language Models Results Developed techniques to recognize handwritten Turkish documents which poses extra challenges
26 Handwriting Recognition (English and Turkish) Sketched symbol recognition with autocompletion. Caglar Tirkaz, Berrin A. Yanikoglu, T. Metin Sezgin, Pattern Recognition 45(11): (2012). Memory conscious sketched symbol recognition. Caglar Tirkaz, Berrin A. Yanikoglu, T. Metin Sezgin: ICPR 2012: Probabilistic Mathematical Formula Recognition Using a 2D Context-Free Graph Grammar, Mehmet Celik, Berrin A. Yanikoglu, ICDAR 2011: Online handwritten mathematical expression recognition, Hakan Büyükbayrak, Berrin A. Yanikoglu, Aytül Erçil: DRR 2007 An online handwriting recognition system for Turkish, Esra Vural, Hakan Erdogan, Kemal Oflazer, Berrin A. Yanikoglu, DRR 2005: Turkish handwritten text recognition: a case of agglutinative languages, Berrin A. Yanikoglu, Alisher Kholmatov, DRR 2003:
27 Objective To verify or recognize people through their biometric data. Significance Eliminate need for tokens or passwords. Increased security compared to passwords or tokens. Results Biometrics: Signature, Fingerprint Verification, Privacy Berrin Yanıkoğlu Our signature verification systems obtained several first place results in international competitions. Proposed novel privacy preserving template framework Approach Developed state-of-art fingerprint & signature verification systems and schemes for privacy preserving biometrics. Signatures Dynamic Time Warping Spectral Analysis (Fourier Transform) Histogram of Oriented Gradients Local Binary Pattern Support Vector Machines Fingerprints Minutiae-based approaches Spectral minutiae Privacy Preserving Biometrics Combining multiple fingerprints at template level increases both privacy and security.
28 Multimodal Biometrics Multi-modal biometrics and Biometric privacy are both attraction attention. While a few bio-crypto frameworks exist, they fall short in lights of the fuzzy nature of biometrics. Our solution suggest the use of multimodal biometrics for increased security and privacy (template protection, unlinkeability, ) Multi-biometric templates using fingerprint and voice, E Camlikaya, A Kholmatov, B Yanikoglu SPIE Defense and Security Symposium, Combining multiple biometrics to protect privacy, B Yanikoglu, A Kholmatov ICBA Workshop Proceedings, 43, 2004
Biometric Authentication using Online Signatures
Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu [email protected], [email protected] http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,
Efficient on-line Signature Verification System
International Journal of Engineering & Technology IJET-IJENS Vol:10 No:04 42 Efficient on-line Signature Verification System Dr. S.A Daramola 1 and Prof. T.S Ibiyemi 2 1 Department of Electrical and Information
Machine Learning. 01 - Introduction
Machine Learning 01 - Introduction Machine learning course One lecture (Wednesday, 9:30, 346) and one exercise (Monday, 17:15, 203). Oral exam, 20 minutes, 5 credit points. Some basic mathematical knowledge
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics
Published International Standards Developed by ISO/IEC JTC 1/SC 37 - Biometrics Revised October 25, 2007 These standards can be obtained (for a fee) at ANSI s estandards Store: http://webstore.ansi.org/
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
NAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE. Venu Govindaraju
NAVIGATING SCIENTIFIC LITERATURE A HOLISTIC PERSPECTIVE Venu Govindaraju BIOMETRICS DOCUMENT ANALYSIS PATTERN RECOGNITION 8/24/2015 ICDAR- 2015 2 Towards a Globally Optimal Approach for Learning Deep Unsupervised
Signature Segmentation from Machine Printed Documents using Conditional Random Field
2011 International Conference on Document Analysis and Recognition Signature Segmentation from Machine Printed Documents using Conditional Random Field Ranju Mandal Computer Vision and Pattern Recognition
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
Online Farsi Handwritten Character Recognition Using Hidden Markov Model
Online Farsi Handwritten Character Recognition Using Hidden Markov Model Vahid Ghods*, Mohammad Karim Sohrabi Department of Electrical and Computer Engineering, Semnan Branch, Islamic Azad University,
Multimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
A Learning Based Method for Super-Resolution of Low Resolution Images
A Learning Based Method for Super-Resolution of Low Resolution Images Emre Ugur June 1, 2004 [email protected] Abstract The main objective of this project is the study of a learning based method
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
An Approach for Utility Pole Recognition in Real Conditions
6th Pacific-Rim Symposium on Image and Video Technology 1st PSIVT Workshop on Quality Assessment and Control by Image and Video Analysis An Approach for Utility Pole Recognition in Real Conditions Barranco
addressed. Specifically, a multi-biometric cryptosystem based on the fuzzy commitment scheme, in which a crypto-biometric key is derived from
Preface In the last decade biometrics has emerged as a valuable means to automatically recognize people, on the base is of their either physiological or behavioral characteristics, due to several inherent
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
Learning is a very general term denoting the way in which agents:
What is learning? Learning is a very general term denoting the way in which agents: Acquire and organize knowledge (by building, modifying and organizing internal representations of some external reality);
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Medical Image Processing on the GPU. Past, Present and Future. Anders Eklund, PhD Virginia Tech Carilion Research Institute [email protected].
Medical Image Processing on the GPU Past, Present and Future Anders Eklund, PhD Virginia Tech Carilion Research Institute [email protected] Outline Motivation why do we need GPUs? Past - how was GPU programming
Design of Two Tier Security ATM System with Multimodal Biometrics By Means of Fuzzy Logic
Design of Two Tier Security ATM System with Multimodal Biometrics By Means of Fuzzy Logic Mr.P.Akilan 1, Mr.K.Gunasekaran 2, M.Tech. Mr.D.Saravanan 3, M.E., (Ph.D), PG Scholar, Dept. of CSE, Pavendar Bharathidasan
Computer Science Electives and Clusters
Course Number CSCI- Computer Science Electives and Clusters Computer Science electives belong to one or more groupings called clusters. Undergraduate students with the proper prerequisites are permitted
Limitations of Human Vision. What is computer vision? What is computer vision (cont d)?
What is computer vision? Limitations of Human Vision Slide 1 Computer vision (image understanding) is a discipline that studies how to reconstruct, interpret and understand a 3D scene from its 2D images
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France
Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France OUTLINE Le pôle TES et le sans-contact Introduction User authentication GREYC - E-payment & Biometrics Introduction
Securing Electronic Medical Records using Biometric Authentication
Securing Electronic Medical Records using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA, [email protected], [email protected] Abstract.
Identity authentication using improved online signature verification method
Pattern Recognition Letters 26 (2005) 2400 2408 www.elsevier.com/locate/patrec Identity authentication using improved online signature verification method Alisher Kholmatov, Berrin Yanikoglu * Sabanci
Professional Organization Checklist for the Computer Science Curriculum Updates. Association of Computing Machinery Computing Curricula 2008
Professional Organization Checklist for the Computer Science Curriculum Updates Association of Computing Machinery Computing Curricula 2008 The curriculum guidelines can be found in Appendix C of the report
NFC & Biometrics. Christophe Rosenberger
NFC & Biometrics Christophe Rosenberger OUTLINE GREYC - E-payment & Biometrics Contactless transactions Biometric authentication Solutions Perspectives 2 GREYC Research Lab Research Group in Computer science,
Artificial Intelligence and Robotics @ Politecnico di Milano. Presented by Matteo Matteucci
1 Artificial Intelligence and Robotics @ Politecnico di Milano Presented by Matteo Matteucci What is Artificial Intelligence «The field of theory & development of computer systems able to perform tasks
False alarm in outdoor environments
Accepted 1.0 Savantic letter 1(6) False alarm in outdoor environments Accepted 1.0 Savantic letter 2(6) Table of contents Revision history 3 References 3 1 Introduction 4 2 Pre-processing 4 3 Detection,
Securing Electronic Medical Records Using Biometric Authentication
Securing Electronic Medical Records Using Biometric Authentication Stephen Krawczyk and Anil K. Jain Michigan State University, East Lansing MI 48823, USA {krawcz10,jain}@cse.msu.edu Abstract. Ensuring
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK J.Pradeep 1, E.Srinivasan 2 and S.Himavathi 3 1,2 Department of ECE, Pondicherry College Engineering,
HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
Face Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
How To Get A Computer Engineering Degree
COMPUTER ENGINEERING GRADUTE PROGRAM FOR MASTER S DEGREE (With Thesis) PREPARATORY PROGRAM* COME 27 Advanced Object Oriented Programming 5 COME 21 Data Structures and Algorithms COME 22 COME 1 COME 1 COME
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
ENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
GLOVE-BASED GESTURE RECOGNITION SYSTEM
CLAWAR 2012 Proceedings of the Fifteenth International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, Baltimore, MD, USA, 23 26 July 2012 747 GLOVE-BASED GESTURE
Applications of Deep Learning to the GEOINT mission. June 2015
Applications of Deep Learning to the GEOINT mission June 2015 Overview Motivation Deep Learning Recap GEOINT applications: Imagery exploitation OSINT exploitation Geospatial and activity based analytics
Support Vector Machines for Dynamic Biometric Handwriting Classification
Support Vector Machines for Dynamic Biometric Handwriting Classification Tobias Scheidat, Marcus Leich, Mark Alexander, and Claus Vielhauer Abstract Biometric user authentication is a recent topic in the
Multisensor Data Fusion and Applications
Multisensor Data Fusion and Applications Pramod K. Varshney Department of Electrical Engineering and Computer Science Syracuse University 121 Link Hall Syracuse, New York 13244 USA E-mail: [email protected]
Appendices master s degree programme Artificial Intelligence 2014-2015
Appendices master s degree programme Artificial Intelligence 2014-2015 Appendix I Teaching outcomes of the degree programme (art. 1.3) 1. The master demonstrates knowledge, understanding and the ability
Colorado School of Mines Computer Vision Professor William Hoff
Professor William Hoff Dept of Electrical Engineering &Computer Science http://inside.mines.edu/~whoff/ 1 Introduction to 2 What is? A process that produces from images of the external world a description
Automatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
Biometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
Journal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition
IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu
7/3/12 Yusuf Sinan Akgül
1/6 Yusuf Sinan Akgul Assoc. Prof. Department Of Computer Engineering Gebze Institute of Technology Turkey akgul{at}bilmuh.gyte.edu.tr +90 262 605 2221 Education Ph.D. 2000, Department of Computer and
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
A Lightweight and Effective Music Score Recognition on Mobile Phone
J Inf Process Syst, http://dx.doi.org/.3745/jips ISSN 1976-913X (Print) ISSN 92-5X (Electronic) A Lightweight and Effective Music Score Recognition on Mobile Phone Tam Nguyen* and Gueesang Lee** Abstract
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
244 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
TIETS34 Seminar: Data Mining on Biometric identification
TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland [email protected] Course Description Content
Computer Aided Liver Surgery Planning Based on Augmented Reality Techniques
Computer Aided Liver Surgery Planning Based on Augmented Reality Techniques Alexander Bornik 1, Reinhard Beichel 1, Bernhard Reitinger 1, Georg Gotschuli 2, Erich Sorantin 2, Franz Leberl 1 and Milan Sonka
Graduate Co-op Students Information Manual. Department of Computer Science. Faculty of Science. University of Regina
Graduate Co-op Students Information Manual Department of Computer Science Faculty of Science University of Regina 2014 1 Table of Contents 1. Department Description..3 2. Program Requirements and Procedures
Introduction to Computer Graphics
Introduction to Computer Graphics Torsten Möller TASC 8021 778-782-2215 [email protected] www.cs.sfu.ca/~torsten Today What is computer graphics? Contents of this course Syllabus Overview of course topics
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
Open issues and research trends in Content-based Image Retrieval
Open issues and research trends in Content-based Image Retrieval Raimondo Schettini DISCo Universita di Milano Bicocca [email protected] www.disco.unimib.it/schettini/ IEEE Signal Processing Society
Machine Intelligence. Department of Computer Science
Machine Intelligence Department of Computer Science Research Interests CG CV - IP ML - PR IA KR AR Computer Graphics Computer Vision Image Processing Machine Learning Pattern Recognition Intelligent Agents
REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])
305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference
Advanced Methods for Pedestrian and Bicyclist Sensing
Advanced Methods for Pedestrian and Bicyclist Sensing Yinhai Wang PacTrans STAR Lab University of Washington Email: [email protected] Tel: 1-206-616-2696 For Exchange with University of Nevada Reno Sept. 25,
Establishing the Uniqueness of the Human Voice for Security Applications
Proceedings of Student/Faculty Research Day, CSIS, Pace University, May 7th, 2004 Establishing the Uniqueness of the Human Voice for Security Applications Naresh P. Trilok, Sung-Hyuk Cha, and Charles C.
Winter 2016 Course Timetable. Legend: TIME: M = Monday T = Tuesday W = Wednesday R = Thursday F = Friday BREATH: M = Methodology: RA = Research Area
Winter 2016 Course Timetable Legend: TIME: M = Monday T = Tuesday W = Wednesday R = Thursday F = Friday BREATH: M = Methodology: RA = Research Area Please note: Times listed in parentheses refer to the
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS
PARTIAL FINGERPRINT REGISTRATION FOR FORENSICS USING MINUTIAE-GENERATED ORIENTATION FIELDS Ram P. Krish 1, Julian Fierrez 1, Daniel Ramos 1, Javier Ortega-Garcia 1, Josef Bigun 2 1 Biometric Recognition
Annotated bibliographies for presentations in MUMT 611, Winter 2006
Stephen Sinclair Music Technology Area, McGill University. Montreal, Canada Annotated bibliographies for presentations in MUMT 611, Winter 2006 Presentation 4: Musical Genre Similarity Aucouturier, J.-J.
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL Garkal Bramhraj 1, palve Atul 2, Ghule Supriya 3, Misal sonali 4 1 Garkal Bramhraj mahadeo, 2 Palve Atule Vasant, 3 Ghule Supriya Shivram, 4 Misal Sonali Babasaheb,
CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing
CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate
Alternative Biometric as Method of Information Security of Healthcare Systems
Alternative Biometric as Method of Information Security of Healthcare Systems Ekaterina Andreeva Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia [email protected]
Integration and Visualization of Multimodality Brain Data for Language Mapping
Integration and Visualization of Multimodality Brain Data for Language Mapping Andrew V. Poliakov, PhD, Kevin P. Hinshaw, MS, Cornelius Rosse, MD, DSc and James F. Brinkley, MD, PhD Structural Informatics
Privacy Preserving Automatic Fall Detection for Elderly Using RGBD Cameras
Privacy Preserving Automatic Fall Detection for Elderly Using RGBD Cameras Chenyang Zhang 1, Yingli Tian 1, and Elizabeth Capezuti 2 1 Media Lab, The City University of New York (CUNY), City College New
Handwritten Signature Verification using Neural Network
Handwritten Signature Verification using Neural Network Ashwini Pansare Assistant Professor in Computer Engineering Department, Mumbai University, India Shalini Bhatia Associate Professor in Computer Engineering
Document Image Retrieval using Signatures as Queries
Document Image Retrieval using Signatures as Queries Sargur N. Srihari, Shravya Shetty, Siyuan Chen, Harish Srinivasan, Chen Huang CEDAR, University at Buffalo(SUNY) Amherst, New York 14228 Gady Agam and
A colour Code Algorithm for Signature Recognition
Electronic Letters on Computer Vision and Image Analysis 6(1):1-12, 2007 A colour Code Algorithm for Signature Recognition Vinayak Balkrishana Kulkarni Department of Electronics Engineering. Finolex Academy
Curriculum Vitae Anders Eklund
Education 2008 2012 PhD, Medical Informatics Linköping University, Sweden Medical image processing. Thesis Computational Medical Image Analysis With a Focus on Real-Time fmri and Non-Parametric Statistics
Biometric Authentication Platform for a Safe, Secure, and Convenient Society
472 Hitachi Review Vol. 64 (2015), No. 8 Featured Articles Platform for a Safe, Secure, and Convenient Society Public s Infrastructure Yosuke Kaga Yusuke Matsuda Kenta Takahashi, Ph.D. Akio Nagasaka, Ph.D.
Tracking Groups of Pedestrians in Video Sequences
Tracking Groups of Pedestrians in Video Sequences Jorge S. Marques Pedro M. Jorge Arnaldo J. Abrantes J. M. Lemos IST / ISR ISEL / IST ISEL INESC-ID / IST Lisbon, Portugal Lisbon, Portugal Lisbon, Portugal
Sense Making in an IOT World: Sensor Data Analysis with Deep Learning
Sense Making in an IOT World: Sensor Data Analysis with Deep Learning Natalia Vassilieva, PhD Senior Research Manager GTC 2016 Deep learning proof points as of today Vision Speech Text Other Search & information
Advice for Students completing the B.S. degree in Computer Science based on Quarters How to Satisfy Computer Science Related Electives
Advice for Students completing the B.S. degree in Computer Science based on Quarters How to Satisfy Computer Science Related Electives Students completing their B.S. degree under quarters had a requirement
Signature verification using Kolmogorov-Smirnov. statistic
Signature verification using Kolmogorov-Smirnov statistic Harish Srinivasan, Sargur N.Srihari and Matthew J Beal University at Buffalo, the State University of New York, Buffalo USA {srihari,hs32}@cedar.buffalo.edu,[email protected]
2. Distributed Handwriting Recognition. Abstract. 1. Introduction
XPEN: An XML Based Format for Distributed Online Handwriting Recognition A.P.Lenaghan, R.R.Malyan, School of Computing and Information Systems, Kingston University, UK {a.lenaghan,r.malyan}@kingston.ac.uk
Learning to Process Natural Language in Big Data Environment
CCF ADL 2015 Nanchang Oct 11, 2015 Learning to Process Natural Language in Big Data Environment Hang Li Noah s Ark Lab Huawei Technologies Part 1: Deep Learning - Present and Future Talk Outline Overview
Introduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University [email protected] CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
Cursive Handwriting Recognition for Document Archiving
International Digital Archives Project Cursive Handwriting Recognition for Document Archiving Trish Keaton Rod Goodman California Institute of Technology Motivation Numerous documents have been conserved
Is a Data Scientist the New Quant? Stuart Kozola MathWorks
Is a Data Scientist the New Quant? Stuart Kozola MathWorks 2015 The MathWorks, Inc. 1 Facts or information used usually to calculate, analyze, or plan something Information that is produced or stored by
engin erzin the use of speech processing applications is expected to surge in multimedia-rich scenarios
engin erzin Associate Professor Department of Computer Engineering Ph.D. Bilkent University http://home.ku.edu.tr/ eerzin [email protected] Engin Erzin s research interests include speech processing, multimodal
School of Computer Science
School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level
Professional Profile
Dr. Abdelmalek ZIDOURI Electrical Engineering Department KFUPM, Dhahran, 31261 Saudi Arabia Tel. +966 3 860 3677 Fax: +966 3 860 3535 [email protected] [email protected] Professional Profile Eager to
Introduction. Selim Aksoy. Bilkent University [email protected]
Introduction Selim Aksoy Department of Computer Engineering Bilkent University [email protected] What is computer vision? What does it mean, to see? The plain man's answer (and Aristotle's, too)
Embedded Systems in Healthcare. Pierre America Healthcare Systems Architecture Philips Research, Eindhoven, the Netherlands November 12, 2008
Embedded Systems in Healthcare Pierre America Healthcare Systems Architecture Philips Research, Eindhoven, the Netherlands November 12, 2008 About the Speaker Working for Philips Research since 1982 Projects
Manjeet Kaur Bhullar, Kiranbir Kaur Department of CSE, GNDU, Amritsar, Punjab, India
Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Multiple Pheromone
