2013
DOI: 10.1007/s11042-013-1606-6
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced long-range personal identification based on multimodal information of human features

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
5
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 22 publications
0
5
0
Order By: Relevance
“…As a source of statistical information, we used open data posted on the website of the Federal Service for Technical and Export Control of Russia [15]. To build a theoretical model for reducing the redundancy of personal data when processed by AI, the most appropriate method for working with indirect and inaccurate data would be to conduct a mental experiment using a statistical method of technical diagnostics based on the generalized Bayesian formula, which allows the probability of an event in the presence of indirect and inaccurate data that must be determined [5], [6], [16]- [18].…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…As a source of statistical information, we used open data posted on the website of the Federal Service for Technical and Export Control of Russia [15]. To build a theoretical model for reducing the redundancy of personal data when processed by AI, the most appropriate method for working with indirect and inaccurate data would be to conduct a mental experiment using a statistical method of technical diagnostics based on the generalized Bayesian formula, which allows the probability of an event in the presence of indirect and inaccurate data that must be determined [5], [6], [16]- [18].…”
Section: Methodsmentioning
confidence: 99%
“…In this connection, the authors proposed to use a common formal basis for the analysis and comparison of communication protocols. Determining the requirements for the security of personal data for the entire life cycle of technologies is a key requirement [5], and the Bayesian methodology [24] and the method differentiated confidentiality [25] were studied for the analysis of personal data in the social network [26], [27].…”
Section: Related Workmentioning
confidence: 99%
“…A generic scheme can be designed while keeping a balance relation between user preferences and network centric approaches. The QoS of a handover scheme can be enhanced while designing a scheme which requires less amount of data for fetching multimedia information to the MN during handover process [7,8]. Nowadays Internet of Things (IoT) and Cyber Physical System (CPS) are evolving very rapidly.…”
Section: Introductionmentioning
confidence: 99%
“…This special issue covers a wide range of topics in human-machine interaction, including text-or speech-driven facial animation [11,23,28], emphatic speech synthesis [20], head and facial gesture synthesis [10], human pose estimation [24], crowd counting [6], person identification [25] and facial expression recognition [8].…”
mentioning
confidence: 99%
“…They propose a scene-adaptive, accurate and fast crowd counting approach using joint depth and color information. Tsai et al [25] address the problem of long-range person identification with a multimodal information fusion approach, which includes multiview face detection, height measurement and face recognition. Recognizing human facial expressions is critical to NUI applications that are required to understand human emotions.…”
mentioning
confidence: 99%