Search for dissertations about: "Motion detection"
Showing result 1 - 5 of 139 swedish dissertations containing the words Motion detection.
-
1. Social causality in motion : Visual bias and categorization of social interactions during the observation of chasing in infancy
Abstract : Since the seminal work of Fritz Heider and Marienne Simmel (1944) the study of animacy perception, or the perception and attribution of life from the motion of simple geometrical shapes has intrigued researchers. The intrigue for psychologists and vision scientists then and today centered on the stark disconnect between the simplicity of the visual input and the universal richness of the resulting percept. READ MORE
-
2. Multidimensional MRI of Cardiac Motion : Acquisition, Reconstruction and Visualization
Abstract : Methods for measuring deformation and motion of the human heart in-vivo are crucial in the assessment of cardiac function. Applications ranging from basic physiological research, through early detection of disease to follow-up studies, all benefit from improved methods of measuring the dynamics of the heart. READ MORE
-
3. Local spatio-temporal image features for motion interpretation
Abstract : Visual motion carries information about the dynamics of ascene. Automatic interpretation of this information isimportant when designing computer systems forvisualnavigation, surveillance, human-computer interaction, browsingof video databases and other growing applications. READ MORE
-
4. Bring Your Body into Action : Body Gesture Detection, Tracking, and Analysis for Natural Interaction
Abstract : Due to the large influx of computers in our daily lives, human-computer interaction has become crucially important. For a long time, focusing on what users need has been critical for designing interaction methods. READ MORE
-
5. Evidence for "liveness" in face biometrics
Abstract : Aliveness or "liveness" detection is a novel but crucial topic in biometrics. In this study we will investigate it for face biometrics. The problem is given by the real-time requirements of such a system to be able to avert advanced spoofing attempts, e.g. READ MORE