Shalini Bhatia

Learn More
Ashwini Pansare, Shalini Bhatia Abstract— a number of biometric techniques have been proposed for personal identif ication in the past. Among the vision-based ones are face recognition, f ingerprint recognition, iris scanning and retina scanning. Voice recognition or signature verif ication are the most w idely known among the nonvision based ones.As(More)
Facial expression analysis is rapidly becoming an area of intense interest in computer science and human-computer interaction design communities. The most expressive way humans display emotions is through facial expressions. In this paper a method is implemented using 2D appearance-based local approach for the extraction of intransient facial features and(More)
With rapid increase in motorization, urbanization, population growth, and changes in population density, Traffic Congestion problems have increased worldwide. Traffic Congestion causes increase in traveling time, air pollution and increase in fuel usage is also observed. Intelligent Transportation Systems (ITS) are used to avoid these problems and improve(More)
A number of biometric techniques have been proposed for personal identification in the past. Among the vision-based ones are face recognition, fingerprint recognition, iris scanning and retina scanning. Voice recognition or signature verification are the most widely known among the non-vision based ones. As signatures continue to play an important role in(More)
BACKGROUND The recognition of physical illnesses by mental health professionals has important clinical implications. AIM This study aimed to find the nature and prevalence of associated physical illnesses in psychiatric outpatients. METHODS Two hundred fifty consecutive psychiatric outpatients who fulfilled the inclusion criteria of the study were(More)
Visual cryptography technique for black and white images (Basic) introduced by Naor and Shamir [1]. Any visual secret information ( pictures, text, etc) is considered as image and encryption is performed using simple algorithm to generate n copies of shares depending on type of access structure schemes[2, 6].The simplest access structure is the 2 out of 2(More)
Most research on affect intensity has relied on the Affect Intensity Measure (AIM) of self-report that asks respondents to rate how often they react to situations with strong emotions. The AIM gives an indication of how strongly or weakly individuals tend to experience emotions in their everyday life. In this PhD project, I plan to quantify the affect(More)