65 research outputs found

    Deep Sketch-Photo Face Recognition Assisted by Facial Attributes

    Full text link
    In this paper, we present a deep coupled framework to address the problem of matching sketch image against a gallery of mugshots. Face sketches have the essential in- formation about the spatial topology and geometric details of faces while missing some important facial attributes such as ethnicity, hair, eye, and skin color. We propose a cou- pled deep neural network architecture which utilizes facial attributes in order to improve the sketch-photo recognition performance. The proposed Attribute-Assisted Deep Con- volutional Neural Network (AADCNN) method exploits the facial attributes and leverages the loss functions from the facial attributes identification and face verification tasks in order to learn rich discriminative features in a common em- bedding subspace. The facial attribute identification task increases the inter-personal variations by pushing apart the embedded features extracted from individuals with differ- ent facial attributes, while the verification task reduces the intra-personal variations by pulling together all the fea- tures that are related to one person. The learned discrim- inative features can be well generalized to new identities not seen in the training data. The proposed architecture is able to make full use of the sketch and complementary fa- cial attribute information to train a deep model compared to the conventional sketch-photo recognition methods. Exten- sive experiments are performed on composite (E-PRIP) and semi-forensic (IIIT-D semi-forensic) datasets. The results show the superiority of our method compared to the state- of-the-art models in sketch-photo recognition algorithm

    Synchronization and Control of Chaotic Spur Gear System Using Type-II Fuzzy Controller Optimized via Whale Optimization Algorithm

    Full text link
    Interval type-II Fuzzy Inference System (FIS) assumes a crucial role in determining the coefficients of the PID controller, thereby augmenting the controller's flexibility. Controlling chaotic systems presents inherent challenges and difficulties due to their sensitivity to initial conditions and the intricate dynamics that require precise and adaptive control strategies. This paper offers an exhaustive exploration into the coordination and regulation of a chaotic spur gear system, employing a Type-II Fuzzy Controller. The initial control parameters of the PID controller undergo optimization using the Whale Optimization Algorithm (WOA) to increase the overall system performance. The adaptability and strength of the suggested control system are tested in various scenarios, covering diverse reference inputs and uncertainties. The investigation comprehensively assesses the operational efficacy of the formulated controller, contrasting its performance with other methodologies. The outcomes highlight the impressive efficiency of the suggested strategy, confirming its supremacy in attaining synchronization and control within the turbulent spur gear system under demanding circumstance

    Prosodic-Enhanced Siamese Convolutional Neural Networks for Cross-Device Text-Independent Speaker Verification

    Full text link
    In this paper a novel cross-device text-independent speaker verification architecture is proposed. Majority of the state-of-the-art deep architectures that are used for speaker verification tasks consider Mel-frequency cepstral coefficients. In contrast, our proposed Siamese convolutional neural network architecture uses Mel-frequency spectrogram coefficients to benefit from the dependency of the adjacent spectro-temporal features. Moreover, although spectro-temporal features have proved to be highly reliable in speaker verification models, they only represent some aspects of short-term acoustic level traits of the speaker's voice. However, the human voice consists of several linguistic levels such as acoustic, lexicon, prosody, and phonetics, that can be utilized in speaker verification models. To compensate for these inherited shortcomings in spectro-temporal features, we propose to enhance the proposed Siamese convolutional neural network architecture by deploying a multilayer perceptron network to incorporate the prosodic, jitter, and shimmer features. The proposed end-to-end verification architecture performs feature extraction and verification simultaneously. This proposed architecture displays significant improvement over classical signal processing approaches and deep algorithms for forensic cross-device speaker verification.Comment: Accepted in 9th IEEE International Conference on Biometrics: Theory, Applications, and Systems (BTAS 2018

    Polar Coding for Achieving the Capacity of Marginal Channels in Nonbinary-Input Setting

    Full text link
    Achieving information-theoretic security using explicit coding scheme in which unlimited computational power for eavesdropper is assumed, is one of the main topics is security consideration. It is shown that polar codes are capacity achieving codes and have a low complexity in encoding and decoding. It has been proven that polar codes reach to secrecy capacity in the binary-input wiretap channels in symmetric settings for which the wiretapper's channel is degraded with respect to the main channel. The first task of this paper is to propose a coding scheme to achieve secrecy capacity in asymmetric nonbinary-input channels while keeping reliability and security conditions satisfied. Our assumption is that the wiretap channel is stochastically degraded with respect to the main channel and message distribution is unspecified. The main idea is to send information set over good channels for Bob and bad channels for Eve and send random symbols for channels that are good for both. In this scheme the frozen vector is defined over all possible choices using polar codes ensemble concept. We proved that there exists a frozen vector for which the coding scheme satisfies reliability and security conditions. It is further shown that uniform distribution of the message is the necessary condition for achieving secrecy capacity.Comment: Accepted to be published in "51th Conference on Information Sciences and Systems", Baltimore, Marylan

    Synthesis and Studies of Potential Antifungal and Antibacterial Agents New Aryl Thiazolyl Mercury (II) Derivatives Compounds

    Get PDF
    Combination of mercaptothiazoles and mercury phenyl chloride synthesized some new compounds of thiazoles. Firstly some mercaptothiazoles with different sorts have been synthesized, and then synthesized compounds were reacted with different mercury phenyl chloride structures. At last, each of these synthesized compounds was purified. Consequently, these structures were recrystallized using oil ether. Forming product through chromatogram (TLC) and combination of Rf with other compound's Rf of were identified, and their purity percent was recognized. The 1H-NMR and other methods like FT-IR and mass spectroscopy have determined all of compounds. Obtained results of synthesized compounds showed that reactions were carried out with suitable speed and high yield

    Investigation of the battery degradation impact on the energy management of a fuel cell hybrid electric vehicle

    Get PDF
    This paper studies the influence of battery degradation over the performance of a fuel cell hybrid electric vehicle (FCHEV). For this purpose, an optimized fuzzy strategy based on the costs of battery and fuel cell degradations as well as fuel consumption and battery recharging is employed. Simulations are done by two driving cycles for three scenarios based on battery state of health (SOH) and validity of feedback signal. Simulation results prove that battery aging has a considerable impact on the total cost of a FCHEV. Moreover, tuning of the EMS parameters according to the battery SOH decreases the defined cost
    • …
    corecore