Women's beauty in computer 'eyes'
Based on 14 different criteria and 13 ratios, computer software from two Australian researchers can determine this face better than the other.
Based on 14 different criteria and 13 ratios, computer software from two Australian researchers can determine this face better than the other.
Hatice Gunes and Massimo Piccardi of Sydney University of Technology have long been interested in whether computers have the ability to identify beauty. To develop the system, they analyze faces in different sizes, for example from the top of the head to the chin, the distance between the eyes . and compare it with the images of actors and supermodels at other ages. each other, including Claudia Schiffer, Kate Moss and Catherine Zeta-Jones.
Every time a photo is imported into the program, the software is immediately activated and gives beauty scores from 1 to 10.
Gunes and Piccardi are looking for partners to commercialize products and believe that this technology will work in many areas such as entertainment, beauty . In the long run, it will also be used for evaluation. male.
However, Piccardi said that if the software falls into the hands of minors or people who are sensitive and inferior in appearance, they may be disappointed and self-destructive.
- Sitting long before the computer does not harm the eyes?
- 19 most obsessive eyes in the history of world photography
- Control the computer with eyes
- Slim waist - immutable beauty standard
- Fifty facts about eyes
- Everyone wants to be beautiful, but bad
- Ugly people are always looked down on
- Open the computer by glancing
- The mystery of eyes 'killing people with just one look'
- Interesting things about the eyes
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system