A Hidden Markov Model - Based Approach ForFace Detection And Recognition
نویسنده
چکیده
Date approved by Chairman ii iii Acknowledgement First, I would like to thank my family for their love, support, and encouragements. Their continuous care has been indispensable throughout my Ph.D research. I am most grateful to my advisor, Dr. Monson Hayes III, for his guidance, interesting discussions, and helpful suggestions. I owe a great deal of my research skills to him. I would like to thank the other members of the reading committee, Dr. Mark Clements and Dr. Russell Mersereau, for thoroughly reading this thesis. I would also like to thank Dr. Nykil Jyant and Dr. Irfan Essa for serving on the defense committee. I would like to thank all my fellow graduate students for creating a friendly and challenging environment. I especially thank for useful discussions and for making my stay in school more enjoyable. I would like to thank the researchers at the Human Interface Technology Center, NCR for the professional environment during my long term internship with the Image Understanding group. Special thanks to John Ming and Dr. Mehdi Khosravi whose friendship and technical guidance made my internship a great experience.
منابع مشابه
Application of Combined Local Object Based Features and Cluster Fusion for the Behaviors Recognition and Detection of Abnormal Behaviors
In this paper, we propose a novel framework for behaviors recognition and detection of certain types of abnormal behaviors, capable of achieving high detection rates on a variety of real-life scenes. The new proposed approach here is a combination of the location based methods and the object based ones. First, a novel approach is formulated to use optical flow and binary motion video as the loc...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملImproving Phoneme Sequence Recognition using Phoneme Duration Information in DNN-HSMM
Improving phoneme recognition has attracted the attention of many researchers due to its applications in various fields of speech processing. Recent research achievements show that using deep neural network (DNN) in speech recognition systems significantly improves the performance of these systems. There are two phases in DNN-based phoneme recognition systems including training and testing. Mos...
متن کاملAbnormality Detection in a Landing Operation Using Hidden Markov Model
The air transport industry is seeking to manage risks in air travels. Its main objective is to detect abnormal behaviors in various flight conditions. The current methods have some limitations and are based on studying the risks and measuring the effective parameters. These parameters do not remove the dependency of a flight process on the time and human decisions. In this paper, we used an HMM...
متن کاملAlert correlation and prediction using data mining and HMM
Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...
متن کامل