Search
Now showing items 1-10 of 18
A multiobjective evolutionary algorithm approach for map sketch generation
(2018)
In this paper, we present a method to generate map sketches for strategy games using a state of the art many-objective evolutionary algorithm, namely NSGAIII. The map sketch generator proposed in this study outputs a three ...
Facial landmark localization in depth images using supervised descent method
(2015)
This paper proposes using the state of the art 2D facial landmark localization method, Supervised Descent Method (SDM), for facial landmark localization in 3D depth images. The proposed method was evaluated on frontal faces ...
OpenMP and POSIX threads implementation of Jerasure 2.0
(2017)
In shared memory multiprocessor architectures, threads can be used to implement parallelism. POSIX threads (pthreads) is a low-level bare-bones programming interface for working with threads. Therefore, we have extremely ...
Facial expression recognition from still images
(2017)
With the development of technology, Facial Expression Recognition (FER) become one of the important research areas in Human Computer Interaction. Changes in the movement of some muscles in face create the facial expressions. ...
Mojette transform based LDPC erasure correction codes for distributed storage systems
(2017)
Mojette Transform (MT) based erasure correction coding possesses extremely efficient encoding/decoding algorithms and demonstrate promising burst erasure recovery performance. MT codes are based on discrete geometry and ...
The Use of Neurometric and Biometric Research Methods in Understanding the User Experience of First-Time Buyers in E-Commerce -- Book Chapter 94
(Elsevier, 2018)
User experience (UX) research has attracted increasing attention especially in the last decade as the demand for online shopping has increased by 30.7% from 2014 to 2015 in Turkey. The traditional methods including ...
A joint dedupe-fountain coded archival storage
(2017)
An erasure-coded archival file storage system is presented using a chunk-based deduplication mechanism and fountain codes for space/time efficient operation. Unlike traditional archival storage, this proposal considers the ...
Corner detection by Local Zernike Moments
(2015)
In this paper, our corner-based interest point detector, Robust Local Zernike Moment based Features (R-LZMF), which was proved to be scale, rotation and translation-invariant, is investigated for invariance against affine ...
Security analysis of revocable and bipartite biotokens
(2015)
In this paper, we analyze the security of bipartite biotokens that release a secret key hidden in the biotoken by using biometrics. We show that the biotoken encoding of 80/112/128-bit symmetric encryption keys are vulnerable ...
Yüz tanıma
(Elektrik Mühendisleri Odası EMO), 2015)
Görüntü işleme alanında çalışan 36 farklı üniversiteden 52 doktora ve yüksek lisans öğrencisinin katılımı ile başlayan akademik kampta, alanında uzmanlıkları ile tanınan 11 farklı üniversiteden 14 akademisyenin katılımıyla ...