RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • Scrutinize Study on Face Recognition by Pose Invariant Methodology

        Deepika Dubey,G.S Tomar,Hye-jin Kim 보안공학연구지원센터 2016 International Journal of Future Generation Communi Vol.9 No.9

        Three-dimensional (3D) face models can handle large pose face recognition problem. In this paper, we propose survey on pose-invariant face recognition method. By scrutinizing study depth, here we only analysis on pose invariant technique in face recognition method is able to handle self-occlusion and deformation, both of which are challenging problems in two-dimensional (2D) face recognition. Texture images of the face in the database can be the same view as the probe during surveillance. In this survey of face detection technology has been presented in this work feature based approach with low level analysis has been done. Information, color, shape, model etc. has been considered for investigation. The technique considered here also explained in other papers. Depth information has improved the performance of face recognition with large pose variations up to the mark able angle and under even more challenging conditions.

      • Deep Perusal of Human Face Recognition Algorithms from Facial Snapshots

        Deepika Dubey,Dr. G.S. Tomar 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.9

        Face recognition having so many application in security, access control, gaming, aging effect, health issues, and internet communication and so on. It has been perform by using different face recognition algorithms on different field of application. When we use face recognition in real-world scenarios with unfavorable conditions such as occlusion and pose variations, illumination and expressions. Here also study the challenges during face recognition under immoral conditions such as facial expression recognition with poses variations, occlusion and lightning condition. Basically it proposes several possible future direction which is excluded from the challenges used in it. Thus, it is a beneficial developing ping point for research project on face recognitions able to be used for a practical purpose or in several ways.

      • KCI등재후보

        Echelon Based Pose Generalization of Facial Images Approaches

        Deepika Dubey,G. S. Tomar 사단법인 미래융합기술연구학회 2017 아시아태평양융합연구교류논문지 Vol.3 No.1

        Face recognition having many applications applied different in security, using in access control, applied on gaming, also effect by aging effect, health issues, and internet communication and so on. It has been perform on different images either they are stored in database or a new image is captured and take it as input image. Face recognition algorithms having different fields of application. The intelligent image (face) recognition system consists of various components through which human identification and recognition has been done. In real world practical applications unconstrained conditions like illumination and create variations, occlusion and expressions are to be faced by the users. in this paper discuss about the pose invariant technology also study the challenges during face recognition under unconstrained conditions like illumination and cause variations, basically it proposes several possible pose invariant technologies future directions which is excluded from the challenges used.

      • Survey on Digital Watermarking Techniques

        Deepti Shukla,Nirupama Tiwari,Deepika Dubey 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.1

        This paper presents a literature survey on Digital Watermarking within an image. It describes the early work carried out on digital watermarks, including the brief analysis of various watermarking schemes and its applications. This paper also makes a comparison between various watermarking schemes .This paper also gives us a brief introduction about the procedure of digital watermarking.

      • A Survey of Digital Image Tampering Techniques

        Nishtha Parashar,Nirupama Tiwari,Deepika Dubey 보안공학연구지원센터 2016 International Journal of Signal Processing, Image Vol.9 No.2

        Due to powerful computers and advanced photo-editing software tools the manipulation of images has become an easy task. Confirming the authenticity of images and detecting tampered regions in an image without any knowledge about the image content is an important part of the research field. An effort is made to survey the recent advancements being made in the field of digital image forgery detection and thus passive methods for forgery detection are being presented. Blind or passive methods do not require any explicit former information about the image. In the first part, various image forgery detection techniques are classified and then an overview of passive image authentication is presented and the existing blind forgery detection techniques are reviewed

      • KCI등재

        Simulation of Bernoulli Lemniscate Holonomically Constrained by Cassini Oval Function for Brunnian Braiding Mechanism and Dynamics

        Supankar Das,Kaushal K Dubey,Bikar Singh,Deepika Singh,Amit Dogra 한국정밀공학회 2014 International Journal of Precision Engineering and Vol. No.

        This paper presents a novel braiding mechanism simulated on Bernoulli Lemniscate function. Spatial dynamics of thread sequencehave been computed to find a simple and innovative drive mechanism for braiding complex pattern. Dynamic degree-of-freedoms(DOFs) of strings has been holonomically constrained by Cassini oval function in simulation and spatially driven by centrifugal forceto move the strings over a 2-manifold surface. The paper presents the essence of a new mechanism, and the result reflects thecorrectness of concept and allows to indicate technological possibilities of the working principle. Drive system is first modelled inmathematics, and later, more accurately in a multi-degree-of-freedom dynamic model. Correlated experiment and simulation responsevalidate mathematical phase model, for use as a designer’s tool.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼