Search Results - "2010 International Conference on Emerging Security Technologies"
-
1
Supporting Search and Rescue Operations with UAVs
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…Search and rescue operations can greatly benefit from the use of autonomous UAVs to survey the environment and collect evidence about the position of a missing…”
Get full text
Conference Proceeding -
2
Person Identification from Spatio-temporal 3D Gait
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…This paper presents a spatio-temporal 3D gait database and a view independent person identification method from gait. In case that a target changes one's…”
Get full text
Conference Proceeding -
3
Biosignals for User Authentication - Towards Cognitive Biometrics?
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…Cognitive biometrics refers to a novel approach for user authentication/identification utilising biosignals which reflect the mental and emotional states of an…”
Get full text
Conference Proceeding -
4
Behaviour Profiling on Mobile Devices
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…Over the last decade, the mobile device has become a ubiquitous tool within everyday life. Unfortunately, whilst the popularity of mobile devices has…”
Get full text
Conference Proceeding -
5
Vision-Based Landing of a Simulated Unmanned Aerial Vehicle with Fast Reinforcement Learning
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…Landing is one of the difficult challenges for an unmanned aerial vehicle (UAV). In this paper, we propose a vision-based landing approach for an autonomous…”
Get full text
Conference Proceeding -
6
Giving Crime the 'evo': Catching Criminals Using EvoFIT Facial Composites
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…Facial composites are traditionally made by witnesses and victims describing and selecting parts of criminals' faces, but this method is hard to do and has…”
Get full text
Conference Proceeding -
7
Fusion of Omnidirectional and PTZ Cameras for Face Detection and Tracking
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…Many applications for mobile robot authentication require to be able to explore a large field of view with high resolution. The proposed vision system is…”
Get full text
Conference Proceeding -
8
Seeing More Clearly with Glasses?: The Impact of Glasses and Technology on Unfamiliar Face Matching and Identification of Facial Composites
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…The development of facial identification technologies is of vital importance for security. We demonstrate that psychology can ensure innovation produces…”
Get full text
Conference Proceeding -
9
Password Security through Negative Filtering
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…The purpose of an authentication system is to identify and verify incoming authentication requests comparing with some form of (stored) user identity. This…”
Get full text
Conference Proceeding -
10
Principled Electronic Consent Management: A Preliminary Research Framework
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…Consent is a multifaceted concept that has not received much attention in information systems literature. In this paper we categorise current electronic…”
Get full text
Conference Proceeding -
11
Are Two Eyes Better than One? An Experimental Investigation on Dual Iris Recognition
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…Iris recognition using both eyes of an individual has not been extensively researched in the available literature. However, for iris recognition at a distance,…”
Get full text
Conference Proceeding -
12
Learning Arm Motion Strategies for Balance Recovery of Humanoid Robots
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…Humans are able to robustly maintain balance in the presence of disturbances by combining a variety of control strategies using posture adjustments and limb…”
Get full text
Conference Proceeding -
13
Learning Flexible Full Body Kinematics for Humanoid Tool Use
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…We show that inverse kinematics of different tools can be efficiently learned with a single recurrent neural network. Our model exploits all upper body degrees…”
Get full text
Conference Proceeding -
14
Learning the Consequences of Actions: Representing Effects as Feature Changes
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…In advanced Programming by Demonstration (PbD) it is important to give a robot the ability to understand the effects of an action. This ability can enable a…”
Get full text
Conference Proceeding -
15
A Comparison of Individual and Morphed Facial Composites Created Using Different Systems
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…An evaluation of individual and morphed composites created using the E-FIT and EFIT-V production systems was conducted. With the assistance of trained police…”
Get full text
Conference Proceeding -
16
A Game-Theoretical Model Applied to an Active Patrolling Camera
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…In patrolling, an agent perceives portions of an environment to detect the presence of an intruder. Usually, the agent cannot perceive the whole environment at…”
Get full text
Conference Proceeding -
17
Keynote Talks
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…Summary form only given. Provides an abstract for each of the keynote presentations and a brief professional biography of each presenter…”
Get full text
Conference Proceeding -
18
Preface
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
Get full text
Conference Proceeding -
19
Attentive Monitoring Strategies in a Behavior-Based Robotic System: An Evolutionary Approach
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…In this paper, we propose an evolutionary approach to develop an attentive executive control system for a robotic agent. We consider a behavior-based system…”
Get full text
Conference Proceeding -
20
Audio-Based Indoor Health Monitoring System Using FLAC Features
Published in 2010 International Conference on Emerging Security Technologies (01-09-2010)“…In this paper, we present a novel methodology for indoor health monitoring based on acoustic information. The system detects the patient's symptom sounds which…”
Get full text
Conference Proceeding