|
|
|
Archive for the ‘Research’ Category
Saturday, February 15th, 2014
Full list is published at:
http://www.guide2research.com/?p=1463
- [Sat 01 Mar 2014][ScienceDirect] ECAI 2014 : 21st European Conference on Artificial Intelligence
Prague, Czech Republic – Aug 17, 2014 – Aug 22, 2014
http://ecai2014.org
- [Sat 01 Mar 2014][ACM] ICIMCS 2014 : ACM International Conference on Internet Multimedia Computing and Service
Xiamen, China – Jul 10, 2014 – Jul 12, 2014
http://icimcs2014.xmu.edu.cn/
- [Sat 01 Mar 2014][IEEE] ICPP 2014 : International Conference on Parallel Processing
Minneapolis, USA – Sep 9, 2014 – Sep 12, 2014
http://icpp.cs.umn.edu/index.php?target=home
- [Sat 01 Mar 2014][DBLP] SEKE 2014 : 26th International Conference on Software Engineering and Knowledge Engineering
Vancouver, Canada – Jul 1, 2014 – Jul 3, 2014
http://www.ksi.edu/seke/seke14.html
- [Sat 01 Mar 2014][ACM] ICFP 2014 : ACM SIGPLAN International Conference on Functional Programming
Gothenburg, Sweden – Sep 1, 2014 – Sep 3, 2014
http://icfpconference.org/icfp2014/
- [Sat 01 Mar 2014][IEEE] WHISPERS 2014 : 6th IEEE GRSS Workshop on Hyperspectral Image and Signal Processing
Lausanne, Switzerland – Jun 25, 2014 – Jun 27, 2014
http://core.ieee-whispers.com/
- [Sat 01 Mar 2014][IEEE] AVSS 2014 : 11th IEEE International Conference on Advance Video- and Signal-based Surveillance
Seoul, Korea – Aug 26, 2014 – Aug 29, 2014
http://avss2014.org/bbs/board.php?bo_table=avss_98
- [Sat 01 Mar 2014][IEEE] RITMAN 2014 : IEEE WoWMoM Workshop on Resilient Information and Communication Technologies for Management of Natural Disasters
Sydney, Australia – Jun 16, 2014 – Jun 16, 2014
http://newslabx.csie.ntu.edu.tw/RITMAN14/
- [Sat 01 Mar 2014][ACM] DCC 2014 : SIGCOMM Workshop on Distributed Cloud Computing
Chicago, USA – Aug 22, 2014 – Aug 22, 2014
https://sites.google.com/site/dcc2014workshop/
- [Sat 01 Mar 2014][IEEE] ICCI*CC 2014 : 13th IEEE International Conference on Cognitive Informatics & Cognitive Computing
London, UK – Aug 18, 2014 – Aug 20, 2014
http://www.ucalgary.ca/icci_cc/ICCICC2014
- [Sat 01 Mar 2014][ACM] UCDPHA 2014 : 4th International Workshop on User-Centered Design of Pervasive Healthcare Applications 2014
Oldenburg, Germany – May 20, 2014 – May 20, 2014
http://www.comm.rwth-aachen.de/pervasivehealth2014/
- [Sat 01 Mar 2014][IEEE] INDIN 2014 : 12th IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN)
PORTO ALEGRE RS BRAZIL – Jul 27, 2014 – Jul 30, 2014
http://www.indin2014.org/
- [Sat 01 Mar 2014][ACM] DIDC 2014 : The Sixth International Workshop in Data-intensive Distributed Computing in conjunction with HPDC 2014
Vancouver, Canada – Jun 23, 2014 – Jun 27, 2014
http://www.fatih.edu.tr/~esma.yildirim/DIDC2014-workshop/home.html
- [Sat 01 Mar 2014][IEEE] SocialCom 2014 : The Sixth IEEE/ASE International Conference on Social Computing
Stanford, CA, USA – May 27, 2014 – May 31, 2014
http://socialcom2014.scienceengineering.org
- [Sat 01 Mar 2014][ACM] ScienceCloud 2014 : 5th Workshop on Scientific Cloud Computing
Vancouver, Canada – Apr 4, 2014 – Apr 4, 2014
http://datasys.cs.iit.edu/events/ScienceCloud2014
- [Sat 01 Mar 2014][ACM] AsiaCCS SCC 2014 : The Second International Workshop on Security in Cloud Computing
Kyoto, Japan – Jun 3, 2014 – Jun 3, 2014
http://conference.cs.cityu.edu.hk/asiaccsscc/
- ….
Posted in Research | No Comments »
Monday, January 6th, 2014
The h-index is an index that attempts to measure both the productivity and impact of the published work of a scientist or scholar. The index is based on the set of the scientist’s most cited papers and the number of citations that they have received in other publications. For the list of the scientists having the top H index in the field of Computer Science and Electronics, is listed below:
Source : http://www.guide2research.com/scientists/
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Posted in Research | No Comments »
Tuesday, October 8th, 2013
Posted in Research | No Comments »
Thursday, January 14th, 2010
As biometrics can now identify people based on individual measures, it appears prudent to translate these techniques for forensic use. As subjects can conceal features associated with identification, prior convictions have used gait and posture to identify suspect. The locations of human vertices are used within instantaneous posture matching. To derive a measure of confidence in this match, we use an automated analysis to determine the variation in the match measure as a function of increasing database size. We can match subjects between videos and assess the confidence in the match measure. We describe how we can derive a match for suspects recorded performing the same criminal act, in surveillance footage, and assess the confidence. As this is the first study of its kind, it raises many points to consider which can aid refinement not just of the matching procedure, but also constraints on the placement of cameras in surveillance.
Posted in Research | No Comments »
Thursday, March 5th, 2009
We present a new method for view-point independent gait biometrics. The system relies on a single camera, does not require camera calibration and works with a wide range of camera-views. This is achieved by a formulation where the gait is self-calibrating. These properties make the proposed method particularly suitable for identification by gait, where the advantages of completely unobtrusiveness, remoteness and covertness of the biometric system preclude the availability of camera information and specific walking directions. Moreover, tests on the multi-view CASIA-B database, composed of more than 2270 video sequences with 65 different subjects walking freely along different walking directions have been performed. The obtained results show that human identification by gait can be achieved without any knowledge of internal or external camera parameters with a mean CCR of 73.6% using purely dynamic gait features. The performance of the proposed method is particularly encouraging for application in surveillance scenarios.
Posted in Research | No Comments »
Friday, December 12th, 2008
The simple command to use to convert a given video video.ext to a set of images preferably with the naming format XXXX.png is :
ffmpeg -i video.ext %4d.png
It will produce images with the naming : 0001.png 0002.png and so on. You can try different image format if needed ( Jpeg, bmp…)
In case you want to extract and convert only a specific portion of the video :
ffmpeg -ss hh:mm:ss -t hh:mm:ss -i video.ext %4d.png
-ss option is the starting point whilst -t option is the duration to be converted.
Posted in Linux, Programming, Research | No Comments »
Thursday, May 22nd, 2008
In recent years, automatic visual surveillance has received considerable interest in the computer vision community. This is due to the increasing numbers of crimes from robbery to terrorist attacks, as well as the inability of human operators to monitor the increasingly growing numbers of surveillance cameras deployed in security sensitive areas such as government buildings and airports, or public places such as shopping malls and streets. According to the British Security Industry Association, the number of CCTV cameras installed in the UK was estimated to be more than 4.25 million in 2004; this figure is expected to grow rapidly particularly after the terrorist attacks that London witnessed in July 2005. Despite the huge increase of surveillance systems, the question whether current surveillance systems work as a deterrent to crime is still debatable. Security systems should not only be able to predict when a crime is about to happen but, more importantly, they ought to identify the individuals suspected of committing crimes, say through the use of biometrics such as gait recognition.
Posted in Research | No Comments »
|
|
|
imed.ws - Imed Bouchrika Website© 2003-2007. |
|
|