51,335 research outputs found
Offline Handwritten Signature Verification - Literature Review
The area of Handwritten Signature Verification has been broadly researched in
the last decades, but remains an open research problem. The objective of
signature verification systems is to discriminate if a given signature is
genuine (produced by the claimed individual), or a forgery (produced by an
impostor). This has demonstrated to be a challenging task, in particular in the
offline (static) scenario, that uses images of scanned signatures, where the
dynamic information about the signing process is not available. Many
advancements have been proposed in the literature in the last 5-10 years, most
notably the application of Deep Learning methods to learn feature
representations from signature images. In this paper, we present how the
problem has been handled in the past few decades, analyze the recent
advancements in the field, and the potential directions for future research.Comment: Accepted to the International Conference on Image Processing Theory,
Tools and Applications (IPTA 2017
Contact process on a Voronoi triangulation
We study the continuous absorbing-state phase transition in the contact
process on the Voronoi-Delaunay lattice. The Voronoi construction is a natural
way to introduce quenched coordination disorder in lattice models. We simulate
the disordered system using the quasistationary simulation method and determine
its critical exponents and moment ratios. Our results suggest that the critical
behavior of the disordered system is unchanged with respect to that on a
regular lattice, i.e., that of directed percolation
Unintegrated parton distributions in nuclei
We study how unintegrated parton distributions in nuclei can be calculated
from the corresponding integrated partons using the EPS09 parametrization. The
role of nuclear effects is presented in terms of the ratio
for both large and small domains.Comment: 9 pages, 4 figure
Hamming distance and mobility behavior in generalized rock-paper-scissors models
This work reports on two related investigations of stochastic simulations
which are widely used to study biodiversity and other related issues. We first
deal with the behavior of the Hamming distance under the increase of the number
of species and the size of the lattice, and then investigate how the mobility
of the species contributes to jeopardize biodiversity. The investigations are
based on the standard rules of reproduction, mobility and predation or
competition, which are described by specific rules, guided by generalization of
the rock-paper-scissors game, valid in the case of three species. The results
on the Hamming distance indicate that it engenders universal behavior,
independently of the number of species and the size of the square lattice. The
results on the mobility confirm the prediction that it may destroy diversity,
if it is increased to higher and higher values.Comment: 7 pages, 9 figures. To appear in EP
Degree-dependent intervertex separation in complex networks
We study the mean length of the shortest paths between a vertex of
degree and other vertices in growing networks, where correlations are
essential. In a number of deterministic scale-free networks we observe a
power-law correction to a logarithmic dependence, in a wide range of network
sizes. Here is the number of vertices in the network, is the
degree distribution exponent, and the coefficients and depend on a
network. We compare this law with a corresponding dependence obtained
for random scale-free networks growing through the preferential attachment
mechanism. In stochastic and deterministic growing trees with an exponential
degree distribution, we observe a linear dependence on degree, . We compare our findings for growing networks with those for
uncorrelated graphs.Comment: 8 pages, 3 figure
Wyman's solution, self-similarity and critical behaviour
We show that the Wyman's solution may be obtained from the four-dimensional
Einstein's equations for a spherically symmetric, minimally coupled, massless
scalar field by using the continuous self-similarity of those equations. The
Wyman's solution depends on two parameters, the mass and the scalar charge
. If one fixes to a positive value, say , and let
take values along the real line we show that this solution exhibits critical
behaviour. For the space-times have eternal naked singularities,
for one has a Schwarzschild black hole of mass and finally
for one has eternal bouncing solutions.Comment: Revtex version, 15pages, 6 figure
Improving Small Object Proposals for Company Logo Detection
Many modern approaches for object detection are two-staged pipelines. The
first stage identifies regions of interest which are then classified in the
second stage. Faster R-CNN is such an approach for object detection which
combines both stages into a single pipeline. In this paper we apply Faster
R-CNN to the task of company logo detection. Motivated by its weak performance
on small object instances, we examine in detail both the proposal and the
classification stage with respect to a wide range of object sizes. We
investigate the influence of feature map resolution on the performance of those
stages.
Based on theoretical considerations, we introduce an improved scheme for
generating anchor proposals and propose a modification to Faster R-CNN which
leverages higher-resolution feature maps for small objects. We evaluate our
approach on the FlickrLogos dataset improving the RPN performance from 0.52 to
0.71 (MABO) and the detection performance from 0.52 to 0.67 (mAP).Comment: 8 Pages, ICMR 201
- …