Hand Posture Classification and Recognition using the Modified Census Transform
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
This report presents the implementation of a communication interface to bridge the gap between the semantic 3D city models of the Geographical information system (GIS) database and the scenarios creation environment for decision‐making in the conceptual ph ...
Haptic feedback located on the torso is proposed to enhance the state awareness of a user in virtual reality or during teleoperation while leaving the hands free for manipulation and communication. We provide haptic feedback on the torso by compressing a s ...
Presentation attack detection (PAD, also known as anti-spoofing) systems, regardless of the technique, biometric mode or degree of independence of external equipment, are most commonly treated as binary classification systems. The two classes that they dif ...
Understanding what elements of our visual environment guide our attention would be a crucial asset for design. In architecture, this knowledge could influence the position and size of the various components (e.g., windows) to support ergonomic, safe and em ...
HMMs have been the one of the first models to be applied for sign recognition and have become the baseline models due to their success in modeling sequential and multivariate data. Despite the extensive use of HMMs for sign recognition, determining the HMM ...
The Internet of Audio Things (IoAuT) is an emerging research field positioned at the intersection of the Internet of Things, sound and music computing, artificial intelligence, and human-computer interaction. The IoAuT refers to the networks of computing d ...
While the performance of face recognition systems has improved significantly in the last decade, they are proved to be highly vulnerable to presentation attacks (spoofing). Most of the research in the field of face presentation attack detection (PAD), was ...
During reach-to-grasp motions,the Electromyographic (EMG) activity of the arm varies depending on motion stage. The variability of the EMG signals results in low classification accuracy during the reaching phase, delaying the activation of the prosthesis. ...
The present invention concerns a method for an artificial neural network to confirm the recognition of handwritten characters produced by a user. The method comprising: training (21) the artificial neural network with a training data set comprising a first ...
Past research has shown that the use of tangible platforms for computingeducation can enhance students’ interest, engagement and collaboration within workgroups. However, to this day, the adoption of such interfaces in classrooms has remained relatively sc ...