{"title":"Face Detection Using Skin Color Recursive Clustering and Recognition Using Multilinear PCA","authors":"Padma Polash Paul, M. Monwar, M. Gavrilova","doi":"10.1109/CW.2011.44","DOIUrl":"https://doi.org/10.1109/CW.2011.44","url":null,"abstract":"In this paper, we present a robust approach for face recognition from video sequences. An automatic face detectoris employed which uses modified skin color modeling to detect human skin regions from the video sequences. The presence or absence of face in each region is verified by means of height width proportion and a Neural Network based template matching scheme. The obtained face images are then projected onto a feature space, defined by Multilinear Principal Component Analysis (MPCA), to produce the biometric feature template. Recognition is performed by projecting anew image onto the feature spaces by the MPCA that generalizes not only the classical PCA solution but also a number of the so-called 2-D PCA algorithms and then classifying the face by comparing its position in the feature spaces with the positions of known individuals. The proposed method is applicable to security systems, secure human computer interaction, visual communication systems (secure video conferencing) and virtual world environments.","PeriodicalId":231796,"journal":{"name":"2011 International Conference on Cyberworlds","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127706111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Information-Based Perception Model for Agent-Based Crowd and Egress Simulation","authors":"Vaisagh Viswanathan T., M. Lees","doi":"10.1109/CW.2011.10","DOIUrl":"https://doi.org/10.1109/CW.2011.10","url":null,"abstract":"One of the major components of Agent Based Crowd Simulation is motion planning. There have been various motion planning algorithms developed and they've become increasingly better and more efficient at calculating the most optimal path. We believe that this optimality is coming at the price of realism. Certain factors like social norms, limitations to human computation capabilities, etc. prevent humans from following their optimal path. One aspect of natural movement is related to perception and the manner in which humans process information. In this paper we propose two additions to generalmotion planning algorithms: (1) Group sensing for motion planning which results in agents avoiding clusters of other agents when choosing their collision free path. (2) Filtering of percepts based on interestingness to model limited information processing capabilities of human beings.","PeriodicalId":231796,"journal":{"name":"2011 International Conference on Cyberworlds","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134426255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roman V Yampolskiy, Gyuchoon Cho, Richard Rosenthal, M. Gavrilova
{"title":"Evaluation of Face Recognition Algorithms on Avatar Face Datasets","authors":"Roman V Yampolskiy, Gyuchoon Cho, Richard Rosenthal, M. Gavrilova","doi":"10.1109/CW.2011.11","DOIUrl":"https://doi.org/10.1109/CW.2011.11","url":null,"abstract":"Art metrics, a field of study that identifies, classifies and authenticates virtual reality avatars and intelligent software agents, has been proposed as a tool for fighting crimes taking place in virtual reality communities and in multiplayer game worlds. Forensic investigators are interested in developing tools for accurate and automated tracking and recognition of avatar faces. In this paper, we evaluate state of the art academic and commercial algorithms developed for human face recognition in the new domain of avatar recognition. While the obtained results are encouraging, ranging from 53.57% to 79.9% on different systems, the paper clearly demonstrated that there is room for improvement and presents avatar face recognition as an open problem to the pattern recognition and biometric communities.","PeriodicalId":231796,"journal":{"name":"2011 International Conference on Cyberworlds","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133031110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Reyes-García, Genesaret Miranda-Correa, J. M. González, Mariano Romero-Texis, Luis Cesar Osorio-Fernández, Alejandro Derbez-Gomez, Gustavo Torres-Altamirano, Isaac Rudomín, Daniel Rivera
{"title":"Of Bikes and Virtual Worlds","authors":"E. Reyes-García, Genesaret Miranda-Correa, J. M. González, Mariano Romero-Texis, Luis Cesar Osorio-Fernández, Alejandro Derbez-Gomez, Gustavo Torres-Altamirano, Isaac Rudomín, Daniel Rivera","doi":"10.1109/CW.2011.38","DOIUrl":"https://doi.org/10.1109/CW.2011.38","url":null,"abstract":"Bicycles today are interfaces between civility and nature, between poetics and technological evolution. Jeffrey Shaw's classical piece The Legible City (1989) involves a stationary bicycle in the context of visual poetry, 3D texts, and geometries of uninhabited cities. The Legible City is an interface to virtual worlds. Text-shaped cities are projected and explored by visitors in a journey of reading. Twenty-two years after Shaw's work, one can use a stationary bicycle to travel through richer worlds, which are narrative applications of geography updated periodically such as Google Earth. In this sense students of Animation and Digital Art program at Tecnológico de Monterrey in Toluca, Mexico, developed four process art applications, using and adapting physical interfaces and videogame motion capture devices as their own take on Shaw's work.","PeriodicalId":231796,"journal":{"name":"2011 International Conference on Cyberworlds","volume":"268 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122719012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Yamachi, Yasuyuki Souma, Y. Kambayashi, Y. Tsujimura, Tomoaki Iida
{"title":"Evaluation of a Technique for Collision and Object Detection with the Z-buffer in Cyber Space","authors":"H. Yamachi, Yasuyuki Souma, Y. Kambayashi, Y. Tsujimura, Tomoaki Iida","doi":"10.1109/CW.2011.28","DOIUrl":"https://doi.org/10.1109/CW.2011.28","url":null,"abstract":"We propose a new technique to detect objects and collisions of geometric objects in cyber space. This technique uses depth values of the Z-buffer in rendering scene. We use the orthographic projection for collision detection. Our method uses two depth value sets. One is obtained through rendering the cyber space from the sensor object toward a target point. This set does not have the depth values of the sensor object. Another one is obtained through rendering only the sensor object in the reverse direction. From these two depth value sets, we obtain the distance between the sensor object and others for each pixel. This technique requires only one or two rendering processes and it is independent from the complexity of the object's shape, deformation or motion. In this paper we evaluate the efficiency of this method on the GPUs we currently use.","PeriodicalId":231796,"journal":{"name":"2011 International Conference on Cyberworlds","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114470674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Multi-modal Biometric Architecture for High-Dimensional Features","authors":"Kushan Ahmadian, M. Gavrilova","doi":"10.1109/CW.2011.48","DOIUrl":"https://doi.org/10.1109/CW.2011.48","url":null,"abstract":"Dealing with high-dimensional data has an important role in a number of areas, including biometric recognition in both real world and emerging virtual reality applications. Acquiring a group of different biometrics with various characteristics and specifications results in a number of issues that should be addressed, while developing such multi-modal recognition system. In this paper, we propose a novel Multi-Modal Biometric System based on neural network paradigm which utilizes the ear and face features and has unique method to train different classifiers based on each feature set. The aggregation result depicts the final decision over the recognized identity. In order to train accurate set of classifiers, the subspace clustering method has been used to overcome the problem of high dimensionality of the feature space. The proposed system is based on a new methodology for shrinking down the finite search space of all possible subspaces by focusing on axis-parallel subspaces which is a novel approach in data clustering for biometric dataset. The experimental results over the FERET dataset show the superiority of the proposed method over several dimensionality reduction methods.","PeriodicalId":231796,"journal":{"name":"2011 International Conference on Cyberworlds","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127387962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Techniques and Methods for \"Smart\" Processing of Information Flows in Applications of Information and Telecommunication Technologies: The Use of Expert Systems for Data Mining","authors":"Anatoly Lezhenko, S. Kuznetsov, Ilya Kuznetsov","doi":"10.1109/CW.2011.31","DOIUrl":"https://doi.org/10.1109/CW.2011.31","url":null,"abstract":"This research paper focuses on the use of \"smart\"information processing methods, such as factor analysis and expert systems construction, in applications of information and telecommunication technologies. Results of research by this technique can be used to support management decisions about the directions of further development in order to increase profitability of industrial enterprises, as well as in many other spheres of human activity.","PeriodicalId":231796,"journal":{"name":"2011 International Conference on Cyberworlds","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121923995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Lift Surgery for Reconstructed Virtual Humans","authors":"R. Pagés, Sergio Arnaldo, F. Morán","doi":"10.1109/CW.2011.13","DOIUrl":"https://doi.org/10.1109/CW.2011.13","url":null,"abstract":"We introduce an innovative, semi-automatic method to transform low resolution facial meshes into high definition ones, based on the tailoring of a generic, neutral human head model, designed by an artist, to fit the facial features of a specific person. To determine these facial features we need to select a set of \"control points\" (corners of eyes, lips, etc.) in at least two photographs of the subject's face. The neutral head mesh is then automatically reshaped according to the relation between the control points in the original subject's mesh through a set of transformation pyramids. The last step consists in merging both meshes and filling the gaps that appear in the previous process. This algorithm avoids the use of expensive and complicated technologies to obtain depth maps, which also need to be meshed later.","PeriodicalId":231796,"journal":{"name":"2011 International Conference on Cyberworlds","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116473913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Example of a Charge Calculation System Using the Numerical Value and Exponential Calculation of the Cellular Data System","authors":"T. Kodama, T. Kunii, Y. Seki","doi":"10.1109/CW.2011.21","DOIUrl":"https://doi.org/10.1109/CW.2011.21","url":null,"abstract":"in the era of cloud computing, data is processed in a gCloudh, and data and its dependencies between systems or functions progress and change constantly within the cloud, as a user's requirements change. Such information worlds are called cyber worlds. We need a more powerful mathematical background which can model the cyber worlds in the \"cloud\"as they are. We consider the Incrementally Modular Abstraction Hierarchy (IMAH) to be appropriate for modeling the dynamically changing cyber worlds by descending from the most abstract homotopy level to the most specific view level, while preserving invariants. We have developed a data processing system called the Cellular Data System (CDS) based on IMAH. In this paper, we introduce numerical value calculation, exponential calculation and the processing maps on the presentation level of IMAH into CDS. This function is quite effective in business application development because numerical values and exponential identifiers can be put into formulas and be calculated. We show its effectiveness through examples of core processing of a cellular phone charge calculation system using numerical value and exponential calculations.","PeriodicalId":231796,"journal":{"name":"2011 International Conference on Cyberworlds","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124558485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sina Microblog: An Information-Driven Online Social Network","authors":"Zhengbiao Guo, Zhitang Li, Hao Tu","doi":"10.1109/CW.2011.12","DOIUrl":"https://doi.org/10.1109/CW.2011.12","url":null,"abstract":"Online social network is becoming more and more popular these days. Some literatures about it have been published, but few papers talk about Sin a Weibo, which is the most prevalent micro log in China and has more than 100 million users. The goal of this paper is to study the topological characteristics of Sin a Weibo and show what people use Sin a Weibo for. There are two main researches in micro logging system: (i) How is the overlay formed, and (ii) How does the information transmit. We crawled the Sin a micro log for one month and got 1.12 million user profiles. We mainly study the topology of Sin a micro log, and find that: (1) the overlay of Weibo is dynamic, (2) most of the links between users are one-way, (3) there is a core network in Sin a Weibo, and (4) the radius of Sine Weibo is very short, which make it different from human social networks and other online social networks. Finally, we classify online social networks into two types according to our results. To the best of our knowledge this work is the first quantitative study on the topological characteristics of Sin a Weibo, and the results can make people know Sin a Weibo clearly.","PeriodicalId":231796,"journal":{"name":"2011 International Conference on Cyberworlds","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125250492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}