To see the other types of publications on this topic, follow the link: Face verification.

Books on the topic 'Face verification'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 17 books for your research on the topic 'Face verification.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Jonathon, Phillips P., Moon Hyeonjoon, and National Institute of Standards and Technology (U.S.), eds. The FERET verification testing protocol for face recognition algorithms. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mezaris, Vasileios, Lyndon Nixon, Symeon Papadopoulos, and Denis Teyssou, eds. Video Verification in the Fake News Era. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26752-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Department of Veterans Affairs: Agency has exceeded contracting goals for veteran-owned small businesses, but it faces challenges with its verification program : report to congressional committees. Washington, D.C.]: U.S. Govt. Accountability Office, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Office, General Accounting. Welfare eligibility: Deficit Reduction Act income verification issues : fact sheet for the ranking minority member, Subcommittee on Oversight of Government Management, Committee on Governmental Affairs, United States Senate. Washington, D.C: The Office, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Office, General Accounting. Welfare eligibility: Deficit Reduction Act income verification issues : fact sheet for the ranking minority member, Subcommittee on Oversight of Government Management, Committee on Governmental Affairs, United States Senate. Washington, D.C: The Office, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Office, General Accounting. Welfare eligibility: Deficit Reduction Act income verification issues : fact sheet for the ranking minority member, Subcommittee on Oversight of Government Management, Committee on Governmental Affairs, United States Senate. Washington, D.C: The Office, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lu, Jiwen, and Haibin Yan. Facial Kinship Verification: A Machine Learning Approach. Springer, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bindemann, Markus, ed. Forensic Face Matching. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198837749.001.0001.

Full text
Abstract:
Person identification at passport control, at borders, in police investigations, and in criminal trials relies critically on the identity verification of people via image-to-image or person-to-image comparison. While this task is known as ‘facial image comparison’ in forensic settings, it has been studied as ‘unfamiliar face matching’ in cognitive science. This book brings together expertise from practitioners, and academics in psychology and law, to draw together what is currently known about these tasks. It explains the problem of identity impostors and how within-person variability and between-person similarity, due to factors such as image quality, lighting direction, and view, affect identification. A framework to develop a cognitive theory of face matching is offered. The face-matching abilities of untrained lay observers, facial reviewers, facial examiners, and super-recognizers are analysed and contrasted. Individual differences between observers, learning and training for face recognition and face matching, and personnel selection are reviewed. The admissibility criteria of evidence from face matching in legal settings are considered, focusing on aspects such as the requirement of relevance, the prohibition on evidence of opinion, and reliability. Key concepts relevant to automatic face recognition algorithms at airports and in police investigations are explained, such as deep convolutional neural networks, biometrics, and human–computer interaction. Finally, new security threats in the form of hyper-realistic mask disguises are considered, including the impact these have on person identification in applied and laboratory settings.
APA, Harvard, Vancouver, ISO, and other styles
9

Papadopoulos, Symeon, Vasileios Mezaris, Lyndon Nixon, and Denis Teyssou. Video Verification in the Fake News Era. Springer International Publishing AG, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Papadopoulos, Symeon, Vasileios Mezaris, Lyndon Nixon, and Denis Teyssou. Video Verification in the Fake News Era. Springer, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Off-Board Fare Payment Using Proof-of-Payment Verification. Washington, D.C.: Transportation Research Board, 2012. http://dx.doi.org/10.17226/14647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Shorter, Edward, and Max Fink. New Faces of Catatonia? Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190881191.003.0012.

Full text
Abstract:
Initially, the stuporous, excited (delirious mania), and febrile neurotoxic forms (neuroleptic malignant syndrome) of catatonia were recognized as distinctive. As catatonia became systematically defined by symptoms identified in lists of symptom rating scales, verified by benzodiazepine challenge tests, and validated by responses to treatments by benzodiazepines (lorazepam, diazepam) and electroconvulsive therapy (ECT), other syndromes met these criteria—anti-NMDAR encephalitis, self-injurious behavior (SIB), selective mutism, pervasive refusal syndrome, and akinetic mutism, among others. Such classification brought these syndromes within the catatonia variants, relieved by catatonia treatments. Such identification is feasible when clinicians consider the medical (Sydenham) model of diagnosis, the process of identification by symptoms, verification by objective tests, and validation by response to specific treatments.
APA, Harvard, Vancouver, ISO, and other styles
13

Linguistics, Association for Computational. Proceedings of the Fifth Workshop on Fact Extraction and VERification (FEVER). Association for Computational Linguistics, 2022.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

U. S. Government Accountability Offi Gao. 2017 Filing Season: New Wage Verification Process Holds Promise but IRS Faced Implementation Challenges. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Brocki, Marcin, Małgorzata Maj, and Stanisława Trebunia-Staszel, eds. Anthropology and Ethnology During World War II. The Activity of Sektion Rassen- und Volkstumsforschung Institut für Deutsche Ostarbeit in the Light of New Source Materials. Wydawnictwo Uniwersytetu Jagiellońskiego, 2019. http://dx.doi.org/10.4467/k9915.19/19.19.15528.

Full text
Abstract:
After reading this voluminous and, contrary to what the title might suggest, engaging study, I have no doubt that it is a great scientific achievement. Firstly, the authors managed to develop an approach to the otherwise sensitive subject of the IDO heritage that enables a cool, albeit not entirely distanced way of looking at the history of a certain institution, as well as at the entanglement of many people in its activity. The fact that the institution was established in dark times, and, in addition, by Hans Frank, should not a priori put it in the context of regular Nazi propaganda and degenerated science. The authors managed to separate what in the IDO output was based on objective research from what could never be defined as scientific. Secondly, the high level of competence of the papers in this tome makes one confident about the applied methods of presentation and interpretation of the available material, which, moreover, is still subject to further verification. This publication is not yet the final outcome of several years of research and queries, but a stop-over, an important one, on the way to further work, which is signaled throughout the book. So it is an example of work in progress. Prof. dr hab. Wojciech Józef Burszta
APA, Harvard, Vancouver, ISO, and other styles
16

Dowd, Cate. Digital Journalism, Drones, and Automation. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190655860.001.0001.

Full text
Abstract:
Advances in online technology and news systems, such as automated reasoning across digital resources and connectivity to cloud servers for storage and software, have changed digital journalism production and publishing methods. Integrated media systems used by editors are also conduits to search systems and social media, but the lure of big data and rise in fake news have fragmented some layers of journalism, alongside investments in analytics and a shift in the loci for verification. Data has generated new roles to exploit data insights and machine learning methods, but access to big data and data lakes is so significant it has spawned newsworthy partnerships between media moguls and social media entrepreneurs. However, digital journalism does not even have its own semantic systems that could protect the values of journalism, but relies on the affordances of other systems. Amidst indexing and classification systems for well-defined vocabulary and concepts in news, data leaks and metadata present challenges for journalism. By contrast data visualisations and real-time field reporting with short-form mobile media and civilian drones set new standards during the European asylum seeker crisis. Aerial filming with drones also adds to the ontological base of journalism. An ontology for journalism and intersecting ontologies can inform the design of new semantic learning systems. The Semantic CAT Method, which draws on participatory design and game design, also assists the conceptual design of synthetic players with emotion attributes, towards a meta-model for learning. The design of context-aware sensor systems to protect journalists in conflict zones is also discussed.
APA, Harvard, Vancouver, ISO, and other styles
17

Zydroń, Tymoteusz. Wpływ systemów korzeniowych wybranych gatunków drzew na przyrost wytrzymałości gruntu na ścinanie. Publishing House of the University of Agriculture in Krakow, 2019. http://dx.doi.org/10.15576/978-83-66602-46-5.

Full text
Abstract:
The aim of the paper was to determine the influence of root systems of chosen tree species found in the Polish Flysch Carpathians on the increase of soil shear strength (root cohesion) in terms of slope stability. The paper's goal was achieved through comprehensive tests on root systems of eight relatively common in the Polish Flysch Carpathians tree species. The tests that were carried out included field work, laboratory work and analytical calculations. As part of the field work, the root area ratio (A IA) of the roots was determined using the method of profiling the walls of the trench at a distance of about 1.0 m from the tree trunk. The width of the. trenches was about 1.0 m, and their depth depended on the ground conditions and ranged from 0.6 to 1.0 m below the ground level. After preparing the walls of the trench, the profile was divided into vertical layers with a height of 0.1 m, within which root diameters were measured. Roots with diameters from 1 to 10 mm were taken into consideration in root area ratio calculations in accordance with the generally accepted methodology for this type of tests. These measurements were made in Biegnik (silver fir), Ropica Polska (silver birch, black locust) and Szymbark (silver birch, European beech, European hornbeam, silver fir, sycamore maple, Scots pine, European spruce) located near Gorlice (The Low Beskids) in areas with unplanned forest management. In case of each tested tree species the samples of roots were taken, transported to the laboratory and then saturated with water for at least one day. Before testing the samples were obtained from the water and stretched in a. tensile testing machine in order to determine their tensile strength and flexibility. In general, over 2200 root samples were tested. The results of tests on root area ratio of root systems and their tensile strength were used to determine the value of increase in shear strength of the soils, called root cohesion. To this purpose a classic Wu-Waldron calculation model was used as well as two types of bundle models, the so called static model (Fiber Bundle Model — FIRM, FBM2, FBM3) and the deformation model (Root Bundle Model— RBM1, RBM2, mRBM1) that differ in terms of the assumptions concerning the way the tensile force is distributed to the roots as well as the range of parameters taken into account during calculations. The stability analysis of 8 landslides in forest areas of Cicikowicleie and Wignickie Foothills was a form of verification of relevance of the obtained calculation results. The results of tests on root area ratio in the profile showed that, as expected, the number of roots in the soil profile and their ApIA values are very variable. It was shown that the values of the root area ratio of the tested tree species with a diameter 1-10 ram are a maximum of 0.8% close to the surface of the ground and they decrease along with the depth reaching the values at least one order of magnitude lower than close to the surface at the depth 0.5-1.0 m below the ground level. Average values of the root area ratio within the soil profile were from 0.05 to 0.13% adequately for Scots pine and European beech. The measured values of the root area ratio are relatively low in relation to the values of this parameter given in literature, which is probably connected with great cohesiveness of the soils and the fact that there were a lot of rock fragments in the soil, where the tests were carried out. Calculation results of the Gale-Grigal function indicate that a distribution of roots in the soil profile is similar for the tested species, apart from the silver fir from Bie§nik and European hornbeam. Considering the number of roots, their distribution in the soil profile and the root area ratio it appears that — considering slope stability — the root systems of European beech and black locust are the most optimal, which coincides with tests results given in literature. The results of tensile strength tests showed that the roots of the tested tree species have different tensile strength. The roots of European beech and European hornbeam had high tensile strength, whereas the roots of conifers and silver birch in deciduous trees — low. The analysis of test results also showed that the roots of the studied tree species are characterized by high variability of mechanical properties. The values Of shear strength increase are mainly related to the number and size (diameter) of the roots in the soil profile as well as their tensile strength and pullout resistance, although they can also result from the used calculation method (calculation model). The tests showed that the distribution of roots in the soil and their tensile strength are characterized by large variability, which allows the conclusion that using typical geotechnical calculations, which take into consideration the role of root systems is exposed to a high risk of overestimating their influence on the soil reinforcement. hence, while determining or assuming the increase in shear strength of soil reinforced with roots (root cohesion) for design calculations, a conservative (careful) approach that includes the most unfavourable values of this parameter should be used. Tests showed that the values of shear strength increase of the soil reinforced with roots calculated using Wu-Waldron model in extreme cases are three times higher than the values calculated using bundle models. In general, the most conservative calculation results of the shear strength increase were obtained using deformation bundle models: RBM2 (RBMw) or mRBM1. RBM2 model considers the variability of strength characteristics of soils described by Weibull survival function and in most cases gives the lowest values of the shear strength increase, which usually constitute 50% of the values of shear strength increase determined using classic Wu-Waldron model. Whereas the second model (mRBM1.) considers averaged values of roots strength parameters as well as the possibility that two main mechanism of destruction of a root bundle - rupture and pulling out - can occur at the same. time. The values of shear strength increase calculated using this model were the lowest in case of beech and hornbeam roots, which had high tensile strength. It indicates that in the surface part of the profile (down to 0.2 m below the ground level), primarily in case of deciduous trees, the main mechanism of failure of the root bundle will be pulling out. However, this model requires the knowledge of a much greater number of geometrical parameters of roots and geotechnical parameters of soil, and additionally it is very sensitive to input data. Therefore, it seems practical to use the RBM2 model to assess the influence of roots on the soil shear strength increase, and in order to obtain safe results of calculations in the surface part of the profile, the Weibull shape coefficient equal to 1.0 can be assumed. On the other hand, the Wu-Waldron model can be used for the initial assessment of the shear strength increase of soil reinforced with roots in the situation, where the deformation properties of the root system and its interaction with the soil are not considered, although the values of the shear strength increase calculated using this model should be corrected and reduced by half. Test results indicate that in terms of slope stability the root systems of beech and hornbeam have the most favourable properties - their maximum effect of soil reinforcement in the profile to the depth of 0.5 m does not usually exceed 30 kPa, and to the depth of 1 m - 20 kPa. The root systems of conifers have the least impact on the slope reinforcement, usually increasing the soil shear strength by less than 5 kPa. These values coincide to a large extent with the range of shear strength increase obtained from the direct shear test as well as results of stability analysis given in literature and carried out as part of this work. The analysis of the literature indicates that the methods of measuring tree's root systems as well as their interpretation are very different, which often limits the possibilities of comparing test results. This indicates the need to systematize this type of tests and for this purpose a root distribution model (RDM) can be used, which can be integrated with any deformation bundle model (RBM). A combination of these two calculation models allows the range of soil reinforcement around trees to be determined and this information might be used in practice, while planning bioengineering procedures in areas exposed to surface mass movements. The functionality of this solution can be increased by considering the dynamics of plant develop¬ment in the calculations. This, however, requires conducting this type of research in order to obtain more data.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography