IJASCSE, Vol1 Issue 2, 2012
نویسندگان
چکیده
Towards next generation, Criminal activity in virtual worlds is becoming a major problem for law enforcement agencies. Virtual communities such as Second Life will be quickly becoming the next frontier of cybercrime. Even now a day’s Forensic investigators are becoming interested in being able to accurately and automatically track people in virtual communities. Mostly in the multimedia context, an avatar is the visual representation of the self in a virtual world. In this research paper we suggest how to extract a face from an image, modify it, characterize it in terms of high-level properties, and apply it to the creation of a personalized avatar. In this research work we tested, we implemented the algorithm on several hundred facial images, including many taken under uncontrolled acquisition conditions, and found to exhibit satisfactory performance for immediate practical use. GENERAL TERMS Avatar, Virtual world, Human face, Matching, Images, Criminal Activity.
منابع مشابه
IJASCSE, Vol 1 Issue 2, 2012
The game theory techniques are used to find the equilibrium of a market. Game theory refers to the ways in which strategic interactions among economic agents produce outcomes with respect to the preferences (or utilities) of those agents, where the outcomes in question might have been intended by none of the agents. The oligopolistic market structures are taken and how game theory applies to th...
متن کاملHumanism and the Art of Medicine
Daniel Lewis explores the importance of humanistic values to modern physicians This journal article is available in Momentum: http://repository.upenn.edu/momentum/vol1/iss2/6
متن کاملIJASCSE, Volume 2, Special Issue 2, 2013
The aim of this paper is to provide a description of deep-learning-based scheduling approach for academicpurpose high-performance computing systems. Academicpurpose distributed computing systems’ (DCS) share reaches 17.4% amongst TOP500 supercomputer sites (15.6% in performance scale) that make them a valuable object of research. The core of this approach is to predict the future workflow of th...
متن کاملIJASCSE, Volume 2, Issue 4, 2013
There are a lot of intensive researches on handwritten character recognition (HCR) for almost past four decades. The research has been done on some of popular scripts such as Roman, Arabic, Chinese and Indian. In this paper we present a review on HCR work on the four popular scripts. We have summarized most of the published paper from 2005 to recent and also analyzed the various methods in crea...
متن کاملIJASCSE Vol 1, Issue 3, 2012
In polyalphabetic substitution the plain text’s letters are enciphered differently according to their position. The name polyalphabetic suggests that there are more than one key so we have used two keys combination instead of just one, in order to produce the cipher text. We can also use three or more keys to make the enciphering process more complicated. In this paper have produced ASCII Codes...
متن کامل