Automatic Personality Analysis through Signatures
نویسندگان
چکیده
منابع مشابه
Personality Analysis Through Handwriting
Abstract— This work discusses about computer aided Graphology i.e. Personality analysis based on handwritten text, in which instead of a Graphologist, a system will be trained to perform the analysis without much human intervention. A real world dataset of handwritten text samples will be maintained and based on few features like Margins, Baseline, Size, Zones etc. depicted in each of the sampl...
متن کاملCardiac Signatures of Personality
BACKGROUND There are well-established relations between personality and the heart, as evidenced by associations between negative emotions on the one hand, and coronary heart disease or chronic heart failure on the other. However, there are substantial gaps in our knowledge about relations between the heart and personality in healthy individuals. Here, we investigated whether amplitude patterns ...
متن کاملAn Automatic Detection of the Fire Smoke Through Multispectral Images
One of the consequences of a fire is smoke. Occasionally, monitoring and detection of this smoke can be a solution to prevent occurrence or spreading a fire. On the other hand, due to the destructive effects of the smoke spreading on human health, measures can be taken to improve the level of health services by zoning and monitoring its expansion process. In this paper, an automated method is p...
متن کاملImproving assessment of personality disorder traits through social network analysis.
When assessing personality disorder traits, not all judges make equally valid judgments of all targets. The present study uses social network analysis to investigate factors associated with reliability and validity in peer assessment. Participants were groups of military recruits (N=809) who acted as both targets and judges in a round-robin design. Participants completed self- and informant ver...
متن کاملAutomatic Event-Stream Notarization Using Digital Signatures
Some digital signature algorithms (such as RSA) require messages to be padded before they are signed. Secure tokens can use these padding bits as a subliminal channel to embed auditing information in their signed messages. These auditing bits simplify protecting against lost and stolen tokens, breaks of specific protocols, hash functions, and ciphers, and attacks based on defeating a token’s ta...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2019
ISSN: 2321-9653
DOI: 10.22214/ijraset.2019.5437