A study on the implementation and the robustness of face verification methods under illumination changes

Author(s):  
Dae Young Ko ◽  
Jin Young Kim ◽  
Seong-Joon Baek
Author(s):  
Chen Lin ◽  
Zhouyingcheng Liao ◽  
Peng Zhou ◽  
Jianguo Hu ◽  
Bingbing Ni

State-of-the-art live face verification methods would easily be attacked by recorded facial expression sequence. This work directly addresses this issue via proposing a patch-wise motion parameterization based verification network infrastructure. This method directly explores the underlying subtle motion difference between the facial movements re-captured from a planer screen (e.g., a pad) and those from a real face; therefore interactive facial expression is no longer required. Furthermore, inspired by the fact that ?a fake facial movement sequence MUST contains many patch-wise fake sequences?, we embed our network into a multiple instance learning framework, which further enhance the recall rate of the proposed technique. Extensive experimental results on several face benchmarks well demonstrate the superior performance of our method.


2014 ◽  
Vol 2014 ◽  
pp. 1-11 ◽  
Author(s):  
Ji-Xiang Du ◽  
Xing Wu ◽  
Chuan-Min Zhai

Face verification in the presence of age progression is an important problem that has not been widely addressed. In this paper, we propose to use the active appearance model (AAM) and gradient orientation pyramid (GOP) feature representation for this problem. First, we use the AAM on the dataset and generate the AAM images; we then get the representation of gradient orientation on a hierarchical model, which is the appearance of GOP. When combined with a support vector machine (SVM), experimental results show that our approach has excellent performance on two public domain face aging datasets: FGNET and MORPH. Second, we compare the performance of the proposed methods with a number of related face verification methods; the results show that the new approach is more robust and performs better.


Author(s):  
Pierre-Loïc Garoche

The verification of control system software is critical to a host of technologies and industries, from aeronautics and medical technology to the cars we drive. The failure of controller software can cost people their lives. This book provides control engineers and computer scientists with an introduction to the formal techniques for analyzing and verifying this important class of software. Too often, control engineers are unaware of the issues surrounding the verification of software, while computer scientists tend to be unfamiliar with the specificities of controller software. The book provides a unified approach that is geared to graduate students in both fields, covering formal verification methods as well as the design and verification of controllers. It presents a wealth of new verification techniques for performing exhaustive analysis of controller software. These include new means to compute nonlinear invariants, the use of convex optimization tools, and methods for dealing with numerical imprecisions such as floating point computations occurring in the analyzed software. As the autonomy of critical systems continues to increase—as evidenced by autonomous cars, drones, and satellites and landers—the numerical functions in these systems are growing ever more advanced. The techniques presented here are essential to support the formal analysis of the controller software being used in these new and emerging technologies.


2020 ◽  
Vol 7 (1) ◽  
pp. 41-49
Author(s):  
Ajat Sudrajat

Patient satisfaction at the hospital is a benchmark that is a benchmark for patients in getting health care. Each hospital must run a variety of strategies so that patients feel satisfied with health services, one of the strategies is through a good corporate image and trust, where a good corporate image can increase trust. So that affecting patient satisfaction Mitra Medika Narom Hospital Kabupaten Bekasi.             This research was conducted with descriptive and verification methods, namely knowing, analyzing, explaining and testing hypotheses, and making conclusions and suggestions. The sample in this study amounted to 240 respondents using the Eksplanary Survey method. Data analysis techniques used are ordinal scale techniques and path analysis using the Method of Successive Interval (MSI) tool, Microsoft Excel 2016 computer programs and SPSS 16.             The results of this study reveal that the company's image at the Mitra Medika Narom Hospital in Kabupaten Bekasi is in the agreed criteria, meaning that Mitra Medika Narom Hospital has built and made a good company image so that it is better known to all people. Furthermore, trust in Mitra Medika Narom Hospital in Kabupaten Bekasi is in the agreed criteria, meaning that Mitra Medika Narom Hospital has succeeded in building a good and optimal Trust so that patients trust Mitra Medika Narom Hospital to obtain health services. Then the patient satisfaction at the Mitra Medika Narom Hospital in Kabupaten Bekasi is in the agreed criteria, meaning that the patients as respondents feel a high level of satisfaction after completing treatment at the Mitra Medika Narom Hospital. There is a positive, strong and two-way correlation between company image and trust variables of 0.646. There is a partial influence of company image on patient satisfaction at Mitra Medika Narom Hospital significantly by 11.98%. There is a partial influence of trust on patient satisfaction at Mitra Medika Narom Hospital significantly by 25.08%. Then there is a simultan influence of corporate image and trust on patient satisfaction at Mitra Medika Narom Hospital positively and significantly by 37.06% while the remaining 62.94% is contributed by other variables not examined


2018 ◽  
Author(s):  
Annice Kim ◽  
Robert Chew ◽  
Michael Wenger ◽  
Margaret Cress ◽  
Thomas Bukowski ◽  
...  

BACKGROUND JUUL is an electronic nicotine delivery system (ENDS) resembling a USB device that has become rapidly popular among youth. Recent studies suggest that social media may be contributing to its popularity. JUUL company claims their products are targeted for adult current smokers but recent surveillance suggests youth may be exposed to JUUL products online. To date, there has been little attention on restricting youth exposure to age restricted products on social media. OBJECTIVE The objective of this study was to utilize a computational age prediction algorithm to determine the extent to which underage youth are being exposed to JUUL’s marketing practices on Twitter. METHODS We examined all of @JUULvapor’s Twitter followers in April 2018. For followers with a public account, we obtained their metadata and last 200 tweets using the Twitter application programming interface. We ran a series of classification models to predict whether the account following @JUULvapor was an underage youth or an adult. RESULTS Out of 9,077 individuals following @JUULvapor Twitter account, a three-age category model predicted that 44.9% are 13 to 17 years old (N=4,078), 43.6% are 18 to 24 years old (N=3,957), and 11.5% are 25 years old or older (N=1,042); and a two-age category model predicted that 80.6% (N=7,313) are under 21 years old. CONCLUSIONS Despite a disclaimer that followers must be of legal age to purchase tobacco products, the majority of JUUL followers on Twitter are under age. This suggests that ENDS brands and social media networks need to implement more stringent age-verification methods to protect youth from age-restricted content.


2021 ◽  
Vol 11 (6) ◽  
pp. 2590
Author(s):  
Samson Tan ◽  
Darryl Weinert ◽  
Paul Joseph ◽  
Khalid Moinuddin

Given that existing fire risk models often ignore human and organizational errors (HOEs) ultimately leading to underestimation of risks by as much as 80%, this study employs a technical-human-organizational risk (T-H-O-Risk) methodology to address knowledge gaps in current state-of-the-art probabilistic risk analysis (PRA) for high-rise residential buildings with the following goals: (1) Develop an improved PRA methodology to address concerns that deterministic, fire engineering approaches significantly underestimate safety levels that lead to inaccurate fire safety levels. (2) Enhance existing fire safety verification methods by incorporating probabilistic risk approach and HOEs for (i) a more inclusive view of risk, and (ii) to overcome the deterministic nature of current verification methods. (3) Perform comprehensive sensitivity and uncertainty analyses to address uncertainties in numerical estimates used in fault tree/event trees, Bayesian network and system dynamics and their propagation in a probabilistic model. (4) Quantification of human and organizational risks for high-rise residential buildings which contributes towards a policy agenda in the direction of a sustainable, risk-based regulatory regime. This research contributes to the development of the next-generation building codes and risk assessment methodologies.


2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
Joddat Fatima ◽  
Muhammad Usman Akram ◽  
Amina Jameel ◽  
Adeel Muzaffar Syed

AbstractIn human anatomy, the central nervous system (CNS) acts as a significant processing hub. CNS is clinically divided into two major parts: the brain and the spinal cord. The spinal cord assists the overall communication network of the human anatomy through the brain. The mobility of body and the structure of the whole skeleton is also balanced with the help of the spinal bone, along with reflex control. According to the Global Burden of Disease 2010, worldwide, back pain issues are the leading cause of disability. The clinical specialists in the field estimate almost 80% of the population with experience of back issues. The segmentation of the vertebrae is considered a difficult procedure through imaging. The problem has been catered by different researchers using diverse hand-crafted features like Harris corner, template matching, active shape models, and Hough transform. Existing methods do not handle the illumination changes and shape-based variations. The low-contrast and unclear view of the vertebrae also makes it difficult to get good results. In recent times, convolutional nnural Network (CNN) has taken the research to the next level, producing high-accuracy results. Different architectures of CNN such as UNet, FCN, and ResNet have been used for segmentation and deformity analysis. The aim of this review article is to give a comprehensive overview of how different authors in different times have addressed these issues and proposed different mythologies for the localization and analysis of curvature deformity of the vertebrae in the spinal cord.


Sign in / Sign up

Export Citation Format

Share Document