Feature detection and letter identification
نویسندگان
چکیده
منابع مشابه
Feature detection and letter identification
Seeking to understand how people recognize objects, we have examined how they identify letters. We expected this 26-way classification of familiar forms to challenge the popular notion of independent feature detection ("probability summation"), but find instead that this theory parsimoniously accounts for our results. We measured the contrast required for identification of a letter briefly pres...
متن کاملFeature Detection and Identification Using a Sonar-Array
This work explores techniques for sonar sensor fusion in the context of environmental feature detection and identification for navigation tasks. By detecting common features in indoor environments and using them as landmarks, a robot can navigate reliably, recovering its pose when necessary. Preliminary results on a multiple hypothesis testing procedure for feature localization and identificati...
متن کاملReal-Time Facial Feature Detection for Person Identification System
In this paper, we present an approach to realtime facial feature detection. Facial regions are segmented using Gabor filter responses with M-style grid matching. M-style grid matching method has been shown more effective than Gabor bunch graph matching method in many aspects such as frontal face detection against expression, in-planeldepth rotation, and various illumination environments. In add...
متن کاملAutomatic Feature Detection Using Pattern Projection for Person Identification
In this paper an efficient algorithm is proposed for person identification based on the analysis of 2D images of a designed mask projected onto the person's face in a cooperative environment. The cooperative environment is essential for the accomplishment of the images under a certain condition. The importance of the designed mask is for avoiding the complexity of feature selection from the fac...
متن کاملStructural Feature Based Anomaly Detection for Packed Executable Identification
Malware is any software with malicious intentions. Commercial anti-malware software relies on signature databases. This approach has proven to be effective when the threats are already known. However, malware writers employ software encryption tools and code obfuscation techniques to hide the actual behaviour of their malicious programs. One of these techniques is executable packing, which cons...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Vision Research
سال: 2006
ISSN: 0042-6989
DOI: 10.1016/j.visres.2006.04.023