Ecstatic Deception from Video using Oxidase Zest
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 3
Abstract
To represent complex human emotional expressions Various Dimensional models has been used. Activation and valence are two common dimensions in such models. They can be used to describe certain emotions. This project proposes to recognise emotion of humans. Using multitask learning frame work which uses Thermal images. Thermal imaging is an efficient technology to detect the deception of the person (subject) during the enquiry or interview and it saves time. Dimensional models have been proposed in psychology studies to represent complex human emotional expressions. Two common dimensions in such models are Activation and valence. They can be used to describe certain emotions. This project proposes to recognize emotion of humans. Using multitask learning frame work which uses Thermal images. We report an 87% ability to predict the lie/truth responses based on a within-person methodology and fivefold cross validation. Our results also show that the between person approach for modelling deception does not generalize very well across the training data.
Authors and Affiliations
V. Aravindh, L. Malliga Arjunan, P. Naveen, Mr. A. Mahan Gopi, Dr. Rajini Girinath
Rhombus Shaped Microstrip Antenna with Microstrip Line Feeding Technique for Wireless Application
This paper summarize the study of Rhombus shaped Microstrip Antenna (RMSA) with microstrip line feed, RMSA with meandering technique by applying with and without capacitive loading. The reference RMSA is designed to ope...
slugStudy o f Re lationship Between Utilitarian and Hedonic Motives and Temporal Perspective a t Retail Malls
The paper examines the relationship between youth shopping motives and timing of shopping for home furniture. The age group selected is 18 to 29 years. The shopping motives considered for study are uti...
Online Advertisement System with Real Time Security and Authentication for Dual Booking
Our system deals with a real-time security system for authorized users. Generally there is no need of secure authentication for advertisers but here we have added mail based One Time Password (OTP). It is designed based...
A Study on Knowledge Management with the Employees SIPCOT & SIDCO Phase II Entrepreneur Finished Leather Effluent Treatment Company (P) Ltd
Knowledge Management is the establishment of a system that captures knowledge purposefully forin corporating into business strategies, policies, and practices at all levels of the company. This course will teach the lea...
SAKTHI: Scheduling Algorithm K to Hybrid in Cloud Computing
Cloud computing is based on the concepts of distributed computing, grid computing, utility computing and virtualization. It is a virtual pool of resources which are provided to users via Internet. These cloud computing...