Most illuminant estimation algorithms work with the assumption of one specific type of the light source (e.g. point light source or directional light source). This assumption brin...
Abstract--We study Random and Periodic sleep schedules from the point of view of delay in detecting the target. We consider sleep schedules in which a sensor in `inactive' mod...
In this paper, we explore a privacy algorithm that detects human private parts in a 3D scan data set. The analogia graph is introduced to study the proportion of structures. The i...
In this paper we present an improved Active Shape Model (ASM) for facial features extraction. The original ASM developed by Cootes et al. [1] suffers from factors such as, poor mod...
Mohammad H. Mahoor, Mohamed Abdel-Mottaleb, A-Nass...
Computing with failures is a typical programming technique in functional logic programs. However, there are also situations where a program should not fail (e.g., in a determinist...