Search results

11 – 20 of 55
Article
Publication date: 1 April 2006

Zhongfei (Mark) Zhang

This research project focuses on developing techniques and technologies for automatically identifying human faces from images in the situations where face sample collections in…

Abstract

Purpose

This research project focuses on developing techniques and technologies for automatically identifying human faces from images in the situations where face sample collections in the database as well as in the input query images are “as is”, i.e. no standard data collection environment is available. The developed method can also be used in other biometric applications.

Design/methodology/approach

The specific method presented in this paper is called scale independent identification (SII). SII allows direct “comparison” between two images in terms of whether the two objects (e.g. faces) in the two images are the same object (i.e. the same individual). SII is developed by extensively using the matrix computation theory and in particular, the singular value decomposition theory.

Findings

It is found that almost all the existing methods in the literature or technologies in the market require that a normalization in scale be done before any identification processing. However, it is also found that normalization in scale not only adds additional processing complexity, but also may reduce the identification accuracy. In addition, it is difficult to anticipate an “optimal” scale in advance. The developed SII complements the existing methods in all these aspects.

Research limitations/implications

The only limitation which is also the limitation for many other biometric identification methods is that each object (e.g. individual in human face identification) must have a sufficient number of training samples collected before the method works well.

Practical implications

SII is particularly suitable in law enforcement and/or intelligence applications in which it is difficult or impossible to collect data in a standard, “clean” environment.

Originality/value

The SII method is new, and the paper should be interesting to researchers or engineers in this area, and should also be interesting to companies developing any biometrics‐based identification technologies as well as government agencies.

Details

Sensor Review, vol. 26 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Content available
Article
Publication date: 1 September 2002

81

Abstract

Details

Assembly Automation, vol. 22 no. 3
Type: Research Article
ISSN: 0144-5154

Keywords

Article
Publication date: 1 April 2006

Chein‐I Chang and Mingkai Hsueh

The paper aims to characterize anomaly detection in hyperspectral imagery.

Abstract

Purpose

The paper aims to characterize anomaly detection in hyperspectral imagery.

Design/methodology/approach

This paper develops an adaptive causal anomaly detector (ACAD) to investigate several issues encountered in hyperspectral image analysis which have not been addressed in the past. It also designs extensive synthetic image‐based computer simulations and real image experiments to substantiate the work proposed in this paper.

Findings

This paper developed an ACAD and custom‐designed computer simulations and real image experiments to successfully address several issues in characterizing anomalies for detection, which are – first, how large size for a target to be considered as an anomaly? Second, how an anomaly responds to its proximity? Third, how sensitive for an anomaly to noise? Finally, how different anomalies to be detected? Additionally, it also demonstrated that the proposed ACAD can be implemented in real time processing and implementation.

Originality/value

This paper is the first work on investigation of several issues related to anomaly detection in hyperspectral imagery via extensive synthetic image‐based computer simulations and real image experiments. In addition, it also develops a new developed an ACAD to address these issues and substantiate its performance.

Details

Sensor Review, vol. 26 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 1 April 2006

Dragan Vidacic, Pavlo Melnyk, Kriste Krstovski, Richard A. Messner, Frank C. Hludik and Andrew L. Kun

To design an efficient and integrated framework for automated and simple data acquisition and processing targeted for first response scenarios.

Abstract

Purpose

To design an efficient and integrated framework for automated and simple data acquisition and processing targeted for first response scenarios.

Design/methodology/approach

Utilizes existing software/hardware integration tools and primarily off‐the‐shelf components. Use the modular system architecture for development of new applications. System construction is preceded by the analysis of currently available devices for specific data acquisition and processing.

Findings

The development and integration of data acquisition and processing tools for first responder scenarios can be rapidly achieved by the modular and already existing software/hardware integration platform. Data types processed by this system are biometrics, live video/audio and textual/command data. The data acquisition is followed by the prompt dissemination of information from the incident scene thus overcoming interoperability issues.

Practical implications

Integration of new modules is achieved through simple system upgrades – new applications are created and integrated while the rest of the platform remains intact. Off‐the‐shelf components used eliminate the need for specialized hardware development. The speech user interface allows simple interaction with the system in an eyes‐off, hands‐off manner.

Originality/value

The system represents an efficient platform for integrated data acquisition and processing specially targeted for first response. The test‐bed flexibility allows for straightforward integration of devices/applications handling new data type as required by the user.

Details

Sensor Review, vol. 26 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 1 April 2006

David Simplot‐Ryl, Ivan Stojmenovic, Aleksandar Micic and Amiya Nayak

Radio frequency identification (RFID) is a technology for tracking objects that is expected to be widely adopted in very near future. A reader device sends probes to a set of RFID…

Abstract

Purpose

Radio frequency identification (RFID) is a technology for tracking objects that is expected to be widely adopted in very near future. A reader device sends probes to a set of RFID tags, which then respond to the request. A tag is recognized only when it is the only one to respond to the probe. Only reader has collision detection capability. The problem considered here is to minimize the number of probes necessary for reading all the tags, assuming that the number of tags is known in advance.

Design/methodology/approach

Well known binary and n‐ary partitioning algorithms can be applied to solve the problem for the case of known number of tags. A new randomized hybrid tag identification protocol has been proposed, which combines the two partitioning algorithms into a more efficient one. The new scheme optimizes the binary partition protocol for small values of n (e.g. n=2, 3, 4). The hybrid scheme then applies n‐ary partition protocol on the whole set, followed by binary partition on the tags that caused collision.

Findings

It is analytically proved that the expected number of time slots in the hybrid algorithm with known number of users is less than 2.20 n. Performance of these algorithms was also evaluated experimentally, and an improvement from en to approximately 2.15 n was obtained.

Originality/value

The algorithm shown here is efficient both by theory and practice and outperforms existing ones.

Details

Sensor Review, vol. 26 no. 2
Type: Research Article
ISSN: 0260-2288

Keywords

Content available
Article
Publication date: 1 January 2006

79

Abstract

Details

Aircraft Engineering and Aerospace Technology, vol. 78 no. 1
Type: Research Article
ISSN: 0002-2667

Keywords

Content available
Article
Publication date: 6 February 2009

2168

Abstract

Details

International Journal of Operations & Production Management, vol. 29 no. 2
Type: Research Article
ISSN: 0144-3577

Article
Publication date: 1 March 2001

John McFarlane

This paper discusses how corruption, in its various manifestations, has had — and continues to have — a very serious impact on the economic and political stability of the…

690

Abstract

This paper discusses how corruption, in its various manifestations, has had — and continues to have — a very serious impact on the economic and political stability of the Asia‐Pacific region.

Details

Journal of Financial Crime, vol. 9 no. 1
Type: Research Article
ISSN: 1359-0790

Article
Publication date: 1 March 1983

Anita M. Kennedy

I. INTRODUCTION This study attempts to extend and expand previous research conducted by the Department of Marketing at Strathclyde on the adoption and diffusion of industrial…

Abstract

I. INTRODUCTION This study attempts to extend and expand previous research conducted by the Department of Marketing at Strathclyde on the adoption and diffusion of industrial products.

Details

European Journal of Marketing, vol. 17 no. 3
Type: Research Article
ISSN: 0309-0566

Article
Publication date: 1 January 1977

A distinction must be drawn between a dismissal on the one hand, and on the other a repudiation of a contract of employment as a result of a breach of a fundamental term of that…

2050

Abstract

A distinction must be drawn between a dismissal on the one hand, and on the other a repudiation of a contract of employment as a result of a breach of a fundamental term of that contract. When such a repudiation has been accepted by the innocent party then a termination of employment takes place. Such termination does not constitute dismissal (see London v. James Laidlaw & Sons Ltd (1974) IRLR 136 and Gannon v. J. C. Firth (1976) IRLR 415 EAT).

Details

Managerial Law, vol. 20 no. 1
Type: Research Article
ISSN: 0309-0558

11 – 20 of 55