In this paper, we present a system to browse a set of graphical documents without prior knowledge of their content. This system relies on a new structural method locating regions ...
In most approaches to speech recognition, the speech signals are segmented using constant-time segmentation, for example into 25 ms blocks. Constant segmentation risks losing info...
Motion analysis in broadcast sports video is a challenging problem especially for player action recognition due to the low resolution of players in the frames. In this paper, we pr...
Finding a small set of representative instances for large datasets can bring various benefits to data mining practitioners so they can (1) build a learner superior to the one cons...
In this paper, a robust technique is proposed to detect and track a set of twenty-eight prominent facial features under various facial expressions and face orientations in real-ti...
The question of fingerprint individuality can be posed as follows: Given a query fingerprint, what is the probability that the observed number of minutiae matches with a template ...
This paper describes a framework for detecting unusual events in surveillance videos. Most surveillance systems consist of multiple video streams, but traditional event detection ...
Detection of lines in noisy image is not easy. When using Hough transform, multiple false peaks may be generated from collinear noisy edge points, which in turn may create false l...
Arturo Sanchez-Azofeifa, Jun Zhou, Walter F. Bisch...
To accelerate the learning of reinforcement learning, many types of function approximation are used to represent state value. However function approximation reduces the accuracy o...
Tolerance to pose variations is one of the key remaining problems in face recognition. It is of great interest in airport surveillance systems using mugshot databases to screen tr...