IJASCSE, Vol1 Issue 2, 2012

نویسندگان

  • Vibekananda Dutta
  • Dr Nishtha Kesswani
  • Deepti Gahalot
چکیده

Towards next generation, Criminal activity in virtual worlds is becoming a major problem for law enforcement agencies. Virtual communities such as Second Life will be quickly becoming the next frontier of cybercrime. Even now a day’s Forensic investigators are becoming interested in being able to accurately and automatically track people in virtual communities. Mostly in the multimedia context, an avatar is the visual representation of the self in a virtual world. In this research paper we suggest how to extract a face from an image, modify it, characterize it in terms of high-level properties, and apply it to the creation of a personalized avatar. In this research work we tested, we implemented the algorithm on several hundred facial images, including many taken under uncontrolled acquisition conditions, and found to exhibit satisfactory performance for immediate practical use. GENERAL TERMS Avatar, Virtual world, Human face, Matching, Images, Criminal Activity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

IJASCSE, Vol 1 Issue 2, 2012

The game theory techniques are used to find the equilibrium of a market. Game theory refers to the ways in which strategic interactions among economic agents produce outcomes with respect to the preferences (or utilities) of those agents, where the outcomes in question might have been intended by none of the agents. The oligopolistic market structures are taken and how game theory applies to th...

متن کامل

Humanism and the Art of Medicine

Daniel Lewis explores the importance of humanistic values to modern physicians This journal article is available in Momentum: http://repository.upenn.edu/momentum/vol1/iss2/6

متن کامل

IJASCSE, Volume 2, Special Issue 2, 2013

The aim of this paper is to provide a description of deep-learning-based scheduling approach for academicpurpose high-performance computing systems. Academicpurpose distributed computing systems’ (DCS) share reaches 17.4% amongst TOP500 supercomputer sites (15.6% in performance scale) that make them a valuable object of research. The core of this approach is to predict the future workflow of th...

متن کامل

IJASCSE, Volume 2, Issue 4, 2013

There are a lot of intensive researches on handwritten character recognition (HCR) for almost past four decades. The research has been done on some of popular scripts such as Roman, Arabic, Chinese and Indian. In this paper we present a review on HCR work on the four popular scripts. We have summarized most of the published paper from 2005 to recent and also analyzed the various methods in crea...

متن کامل

IJASCSE Vol 1, Issue 3, 2012

In polyalphabetic substitution the plain text’s letters are enciphered differently according to their position. The name polyalphabetic suggests that there are more than one key so we have used two keys combination instead of just one, in order to produce the cipher text. We can also use three or more keys to make the enciphering process more complicated. In this paper have produced ASCII Codes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012