SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD31384 | Volume – 4 | Issue – 4 | May-June 2020 Page 1313
Face Recognition and Increased
Reality System for Mobile Devices
Sirojiddin Tavboev1, Tavboev Islom2
1Vice Rector, 2Teacher,
1,2Jizzakh Polytechnic Institute, Jizzakh, Uzbekistan
ABSTRACT
The objective of this article is to explain the problems of using the facial
recognition functions in current mobile devices, as well as to give a possible
solution based on a client-server design.
KEYWORDS: Facial recognition, reality, mobile phones, client-server
How to cite this paper: Sirojiddin
Tavboev | Tavboev Islom "Face
Recognition and IncreasedRealitySystem
for Mobile Devices" Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-4, June 2020,
pp.1313-1316, URL:
www.ijtsrd.com/papers/ijtsrd31384.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
INTRODUCTION
In recent years, the developmentofnewcomputerhardware
and software for security systems has experienced a great
boost, such is the case of fingerprint, voice, iris and facial
recognition systems. Among these, facial recognition stands
out as the most promising.
The identification of facial features has received a strong
boost from advances in multimedia video technology,
leading to an increase in cameras in workplaces, homes and
mobile devices at low cost. Facial recognition can be applied
in access control to public and private buildings, ATMs,
research laboratories, as a secret access key for the use of
personal computers or latest generationmobileterminalsas
well as to serve as a person's business card.
The process of facial identification is basically divided into
two tasks: detection and recognition]. The first task,
detection, involves the location of one or more faces within
an image, either a still image or a video sequence. The
second task, recognition, consists of the comparison of the
face detected in the previous step with other faces
previously stored in a database. These processes, detection
and recognition, should not be totally independent because
depending on the way a face is detected it may be practically
impossible to recognize it with faces from a database
detected differently, hence facial recognition systems are
strongly conditioned by the position and orientation of the
subject's face in relation to the camera and the lighting
conditions at the time of detection.
MOTIVATION
Depending on the facial recognition algorithm we use, this
task can place a very high load on the devicethatperformsit,
consuming practically all the system's available resources
and leaving it unusable during the processing time.
It is therefore necessary to find a solutiontothisproblem for
those devices that do not have such computing power and
require running this type of multimedia applications.
ANALYSIS
After a thorough analysis of different recognition methods
and how to perform this task on devices withlowcomputing
power, it has been thought that the best option is to make a
task division of the whole procedure. Thus, the system will
be divided into 2 main pillars:
A detection device
A recognition server
IJTSRD31384
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31384 | Volume – 4 | Issue – 4 | May-June 2020 Page 1314
Picture 1. System design. Source: https://beward.en.alibaba.com/.
Today, every mobile device has a network connection, whether Wifiorwired,soimplementinga client-server basedmodel may
be an acceptable solution.
The detection device is responsible for capturing the image or video containing the person whose face you want to recognize.
This device has a camera, integrated or external. Once the image hasbeencaptured,itdetectsthefacesofthepersonorpersons
it is focusing on. The region is extracted and sent through the connection available at that time to the recognition server. In
short:
Capture the image
Detecting faces
Send the selected region to the server and wait for a response
On the other hand, the recognition server is running in passive mode waiting to receive connections from devices running the
client software and interacting with them to meet the appropriate needs. The tasks of the reconnaissance server are:
Pre-process the image you received from the customer
Performing recognition and obtaining extra information
Improve classifier features
Responding to the customer
As you can see, client tasks are light tasks that you can perform without consuming excessive system resources.
Face detection is the process of finding a face in pictures or videos. The face detection algorithm is based on a function that
searches for rectangular regions within an image, regions containing objects that with a high probability resemble others in a
training set, by returning the rectangular region of the imagewheretheyhavebeenfound.Thefunctionscanstheimageseveral
times and at different scales to find similar objects of different sizes. Therefore, in order to detect faces, only the set of faces
with the desired characteristics has to be passed to the function so that the detected faces look like these.
Picture 2. Face detection. Source: www.nodirbek.uz
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31384 | Volume – 4 | Issue – 4 | May-June 2020 Page 1315
The object detector used in this article was initially proposed by Paul Viola and improved by Rainer Lienhart. First, a cascade
classifier (i.e. a cascade of pulsed magnetic classifiers working with haar-like characteristics [5]) is trained with a few hundred
test images of a particular object (e.g. a face, a car, etc.), called positive images that are scaled to the same size; and negative
images (arbitrary images of the same size).
After the classifier has been trained, it can be applied to a region of interest (the samesizeasthatusedduringtraining)froman
input image. The classifier returns a "1" if the region contains the object, and "0" otherwise. To search for the object in the
entire image, the search window is moved through the image and each location is checked using the classifier. The classifieris
designed so that it can be easily resized to be able to find the objects of interest in different sizes, which is much more efficient
than resizing the image itself. Therefore, to find the object of an unknown size in the image, the scanning procedure must be
repeated several times with different scales.
The word "cascade" in the classifier's name means that the resulting classifier consists of several simpler classifiers (or steps)
that are applied one after the other to a region of interest until either the candidate is rejected or all steps are satisfactory.The
word "driven" means that the classifiers at all stages of the cascade are complex and are built on the basic classifiers usingone
of four different drive techniques (weighted voting). Basic classifiers are classifiers in decision trees with at least 2 leaves.
FACIAL RECOGNITION
Facial recognition is a very active area of research specializinginhowtorecognizefacesinimagesorvideos.Facerecognitionis
the process of matching the detected face to one of the many faces known to the file system.
There are a multitude of algorithms available to carry out facial recognition, among which the following stand out [2]:
Eigenfaces or Principal Component Analysis (PCA) method
Fisherfaces or Linear Discriminant Analysis method
Kernel Methods
Methods of 3D facial recognition
Gabor Wavelets' method
Markov's Hidden Models
Active Appearance Models
For this development, the Eigenfaces method has been used because it is one of the simplest to implement.
The process of facial recognition using decomposition into principal values (PCA) and Eigenfaces,withoutgoingintotoomuch
detail, consists of the following steps:
Store a set of training images of different people. You can have subsets of images for each person that contain different
positions, lighting conditions, etc.
Create a matrix consisting of the new input image and those already stored in the database. Through a mathematical
process, the eigenvectors are calculated using the covariance matrix.
Once the characteristic vectors are obtained, the distances betweenthevectorrepresentingtheoriginal imageandtherest
are compared.
Established a threshold of discernment a priori, if the lower value of the previousstepislessthanthisthreshold,the image
of the input side is considered as known, if it is higher, it is considered unknown.
Picture 3. Example of a face database. Font FERET. Source: www.researchgate.net
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD31384 | Volume – 4 | Issue – 4 | May-June 2020 Page 1316
DEVELOPMENT
The implementation of the above process has been carried
out using the free machine vision library OpenCV.Itistotally
multiplatform, with versions for Linux, Mac OS X and
Windows, and contains more than 500functionsthatcovera
wide range of areas in the vision process, such as object
recognition, facial recognition, camera calibration, stereo
vision and robotic vision.
Two applications have been obtainedfromthedevelopment:
Server application: multiplatform, programmed in C
language using OpenCV, multithreaded so that it can
attend to requests from multiple clientssimultaneously.
Client application: multiplatform, programmed in JAVA,
also using OpenCV to facilitate access to the camera,
RESULTS
After the research, requirements study and development
phases, a system has beenobtainedthatcomplies100% with
the initial expectations and ideas of the project.
On the one hand, a server software has been developed for
Linux systems that is continuously listening on a TCP port
while waiting for clients and that, in addition, is in charge of
performing all the calculations to determine the identityofa
face. On the other hand, a real-time image capture client
software has been developed that is in charge of extracting
the region of the desired face and communicating with the
server to process it.
CONCLUSION
Recalling the initial objectives of the article "finding ways to
integrate facial recognition into devices with low computing
power", it can be concluded that these objectives have been
satisfactorily met: a robust and fast client-server facial
recognition system has been developed.
In the results section you can see how the facial recognition
in the cases with which it has been experimented has been
correct, obtaining success rates close to 100% and with
response times, both on the client side and the server side,
more than acceptable.
However, the system is susceptible toimprovementssuchas
the strong dependence on lighting conditions, which are
assumed to be constant for the development of theprogram,
and on the orientation and positionofthesubject'sface,both
in the detection and the recognition process.
REFERENCES
[1] Carrero, A. (2018). Biometrics and Federal Databases:
Could You Be In It?, 51 J. Marshall L. Rev. 589
(2018). The John Marshall Law Review, 51(3), 4.
[2] FERET database. [Online].
http://es.wikipedia.org/wiki/Base_de_datos_FERET.
[3] G.H, Zahorjan, J Forman, "The challenges of mobile
computing," IEEE, vol. 27, no. 4, pp. 38-47, 1994.
[4] Gates, K. A. (2011). Our biometric future: Facial
recognition technology and the culture of
surveillance (Vol. 2). NYU Press.
[5] Matthew AT and Alex PP, Face recognition using
eigenfaces.: Proc. IEEE Conf. Computer Vision and
Pattern Recognition, 1991.
[6] Milligan, C. S. (1999). Facial recognition technology,
video surveillance, and privacy. S. Cal. Interdisc. LJ, 9,
295.
[7] Monroe, D. A. (2009). U.S. Patent No. 7,634,662.
Washington, DC: U.S. Patent and Trademark Office.
[8] OpenCV. [Online].
http://es.wikipedia.org/wiki/OpenCV.
[9] Paul V. and Michael J. (2001) How face detection
works. [Online].
http://www.cognotics.com/opencv/servo_2007_series
/part_2/sidebar.html.
[10] R. and Maydt, J. Lienhart, An extended set of Haar-like
features for rapid object detection.: ICIP02, 2002.
[11] R. and Poggio, T Brunelli, Face recognition: features
versus templates. IEEE Trans. PAM1, 1993, vol. 15.
[12] R. Chellappa, P.J. Phillips, A. Rosenfeld W. Zhao, Face
Recognition: A literature survey.: ACM Computing
Surveys, 2003, vol. 35.
[13] Тавбоев, С. А., & Искандарова, З. А. (2019).
ОБРАБОТКА ИЗОБРАЖЕНИЙ С ИСПОЛЬЗОВАНИЕМ
ТЕОРИИНЕЧЕТКИХМНОЖЕСТВ. Фундаментальные
и прикладные исследования в современном мире,
(27), 42-45.
[14] Тавбоев, С. А., & Тавбоев, И. И. (2019). МЕТОДЫ
ЦИФРОВОЙ ОБРАБОТКИ ИЗОБРАЖЕНИЙ С
ИСПОЛЬЗОВАНИЕМ АППАРАТА НЕЧЕТКИХ
МНОЖЕСТВ. In Научный форум: Инновационная
наука (pp. 65-68).
[15] Тавбоев, С. А., Савурбаев, А., & Салиев, Э. А. (2016).
Формирование методов и задач компьютерного
зрения с использованием аппарата нечетких
множеств. Молодой ученый, (7-2), 23-26.
[16] Тавбоев, С. А., Савурбоев, А., Туракулов, О. Х., &
Исроилов, И. Н. (2016). АРХИТЕКТУРА СИСТЕМЫ
ЦИФРОВОЙ ОБРАБОТКИ ИЗОБРАЖЕНИЙ
СРЕДСТВАМИ ТЕОРИИ НЕЧЕТКИХ
МНОЖЕСТВ. Ученый XXI века, (2-5).
[17] www.researchgate.net
[18] www.nodirbek.uz

More Related Content

What's hot

IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET Journal
 
IRJET - Chatbot with Gesture based User Input
IRJET -  	  Chatbot with Gesture based User InputIRJET -  	  Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User InputIRJET Journal
 
Product Label Reading System for visually challenged people
Product Label Reading System for visually challenged peopleProduct Label Reading System for visually challenged people
Product Label Reading System for visually challenged peopleIRJET Journal
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET Journal
 
Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face D...
Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face D...Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face D...
Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face D...ijtsrd
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
 
Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a surveyZac Darcy
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methodsIRJET Journal
 
Antispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognitionAntispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognitionRishabh shah
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processingpaperpublications3
 
Classification and evaluation of digital forensic tools
Classification and evaluation of digital forensic toolsClassification and evaluation of digital forensic tools
Classification and evaluation of digital forensic toolsTELKOMNIKA JOURNAL
 
Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018ijesajournal
 
Smart Door Access using Facial Recognition
Smart Door Access using Facial RecognitionSmart Door Access using Facial Recognition
Smart Door Access using Facial Recognitionijtsrd
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...IAESIJEECS
 
IRJET - Automatic Attendance Provision using Image Processing
IRJET - Automatic Attendance Provision using Image ProcessingIRJET - Automatic Attendance Provision using Image Processing
IRJET - Automatic Attendance Provision using Image ProcessingIRJET Journal
 
HUMAN FACE IDENTIFICATION
HUMAN FACE IDENTIFICATION HUMAN FACE IDENTIFICATION
HUMAN FACE IDENTIFICATION bhupesh lahare
 
Dynamic hand gesture recognition using cbir
Dynamic hand gesture recognition using cbirDynamic hand gesture recognition using cbir
Dynamic hand gesture recognition using cbirIAEME Publication
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
 

What's hot (19)

IRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe ModelIRJET- Real-Time Object Detection System using Caffe Model
IRJET- Real-Time Object Detection System using Caffe Model
 
IRJET - Chatbot with Gesture based User Input
IRJET -  	  Chatbot with Gesture based User InputIRJET -  	  Chatbot with Gesture based User Input
IRJET - Chatbot with Gesture based User Input
 
Product Label Reading System for visually challenged people
Product Label Reading System for visually challenged peopleProduct Label Reading System for visually challenged people
Product Label Reading System for visually challenged people
 
IRJET- Sign Language Interpreter
IRJET- Sign Language InterpreterIRJET- Sign Language Interpreter
IRJET- Sign Language Interpreter
 
Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face D...
Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face D...Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face D...
Utilizing Viola Jones with Haar Cascade Along with Neural Networks for Face D...
 
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationHighly Secured Bio-Metric Authentication Model with Palm Print Identification
Highly Secured Bio-Metric Authentication Model with Palm Print Identification
 
Facial image classification and searching –a survey
Facial image classification and searching –a surveyFacial image classification and searching –a survey
Facial image classification and searching –a survey
 
Ijetcas14 465
Ijetcas14 465Ijetcas14 465
Ijetcas14 465
 
A survey paper on various biometric security system methods
A survey paper on various biometric security system methodsA survey paper on various biometric security system methods
A survey paper on various biometric security system methods
 
Antispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognitionAntispoofing techniques in Facial recognition
Antispoofing techniques in Facial recognition
 
Face Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image ProcessingFace Recognition & Detection Using Image Processing
Face Recognition & Detection Using Image Processing
 
Classification and evaluation of digital forensic tools
Classification and evaluation of digital forensic toolsClassification and evaluation of digital forensic tools
Classification and evaluation of digital forensic tools
 
Table of contenets dec 2018
Table of contenets dec 2018Table of contenets dec 2018
Table of contenets dec 2018
 
Smart Door Access using Facial Recognition
Smart Door Access using Facial RecognitionSmart Door Access using Facial Recognition
Smart Door Access using Facial Recognition
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...
 
IRJET - Automatic Attendance Provision using Image Processing
IRJET - Automatic Attendance Provision using Image ProcessingIRJET - Automatic Attendance Provision using Image Processing
IRJET - Automatic Attendance Provision using Image Processing
 
HUMAN FACE IDENTIFICATION
HUMAN FACE IDENTIFICATION HUMAN FACE IDENTIFICATION
HUMAN FACE IDENTIFICATION
 
Dynamic hand gesture recognition using cbir
Dynamic hand gesture recognition using cbirDynamic hand gesture recognition using cbir
Dynamic hand gesture recognition using cbir
 
IRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using AndroidIRJET- Free & Generic Facial Attendance System using Android
IRJET- Free & Generic Facial Attendance System using Android
 

Similar to Face Recognition Mobile App

Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognitionijtsrd
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identificationijtsrd
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionIRJET Journal
 
Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
 
Deep Unified Model for Intrusion Detection Based on Convolutional Neural Network
Deep Unified Model for Intrusion Detection Based on Convolutional Neural NetworkDeep Unified Model for Intrusion Detection Based on Convolutional Neural Network
Deep Unified Model for Intrusion Detection Based on Convolutional Neural NetworkYogeshIJTSRD
 
IRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET Journal
 
Automatic Attendance Management System Using Face Recognition
Automatic Attendance Management System Using Face RecognitionAutomatic Attendance Management System Using Face Recognition
Automatic Attendance Management System Using Face RecognitionKathryn Patel
 
A Crowd Sourcing to Track Individuals in Highly Active Industries
A Crowd Sourcing to Track Individuals in Highly Active IndustriesA Crowd Sourcing to Track Individuals in Highly Active Industries
A Crowd Sourcing to Track Individuals in Highly Active Industriesijtsrd
 
VGGFace Transfer Learning and Siamese Network for Face Recognition
VGGFace Transfer Learning and Siamese Network for Face RecognitionVGGFace Transfer Learning and Siamese Network for Face Recognition
VGGFace Transfer Learning and Siamese Network for Face Recognitionijtsrd
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face IdentificationIRJET Journal
 
A Literature Survey on Image Linguistic Visual Question Answering
A Literature Survey on Image Linguistic Visual Question AnsweringA Literature Survey on Image Linguistic Visual Question Answering
A Literature Survey on Image Linguistic Visual Question AnsweringIRJET Journal
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET Journal
 
Facial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyFacial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyIRJET Journal
 
IRJET - Gender and Age Prediction using Wideresnet Architecture
IRJET - Gender and Age Prediction using Wideresnet ArchitectureIRJET - Gender and Age Prediction using Wideresnet Architecture
IRJET - Gender and Age Prediction using Wideresnet ArchitectureIRJET Journal
 
IRJET - Blind Guidance using Smart Cap
IRJET - Blind Guidance using Smart CapIRJET - Blind Guidance using Smart Cap
IRJET - Blind Guidance using Smart CapIRJET Journal
 
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
IRJET-  	  Analysis of Face Recognition using Docface+ Selfie MatchingIRJET-  	  Analysis of Face Recognition using Docface+ Selfie Matching
IRJET- Analysis of Face Recognition using Docface+ Selfie MatchingIRJET Journal
 
Social distance and face mask detector system exploiting transfer learning
Social distance and face mask detector system exploiting  transfer learningSocial distance and face mask detector system exploiting  transfer learning
Social distance and face mask detector system exploiting transfer learningIJECEIAES
 
Password Authentication Framework Based on Encrypted Negative Password
Password Authentication Framework Based on Encrypted Negative PasswordPassword Authentication Framework Based on Encrypted Negative Password
Password Authentication Framework Based on Encrypted Negative PasswordIJSRED
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning AlgorithmIRJET Journal
 

Similar to Face Recognition Mobile App (20)

Profile Identification through Face Recognition
Profile Identification through Face RecognitionProfile Identification through Face Recognition
Profile Identification through Face Recognition
 
Adversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re IdentificationAdversarial Multi Scale Features Learning for Person Re Identification
Adversarial Multi Scale Features Learning for Person Re Identification
 
Paper of Final Year Project.pdf
Paper of Final Year Project.pdfPaper of Final Year Project.pdf
Paper of Final Year Project.pdf
 
Virtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial RecognitionVirtual Contact Discovery using Facial Recognition
Virtual Contact Discovery using Facial Recognition
 
Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...Real time voting system using face recognition for different expressions and ...
Real time voting system using face recognition for different expressions and ...
 
Deep Unified Model for Intrusion Detection Based on Convolutional Neural Network
Deep Unified Model for Intrusion Detection Based on Convolutional Neural NetworkDeep Unified Model for Intrusion Detection Based on Convolutional Neural Network
Deep Unified Model for Intrusion Detection Based on Convolutional Neural Network
 
IRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management SystemIRJET - Facial Recognition based Attendance Management System
IRJET - Facial Recognition based Attendance Management System
 
Automatic Attendance Management System Using Face Recognition
Automatic Attendance Management System Using Face RecognitionAutomatic Attendance Management System Using Face Recognition
Automatic Attendance Management System Using Face Recognition
 
A Crowd Sourcing to Track Individuals in Highly Active Industries
A Crowd Sourcing to Track Individuals in Highly Active IndustriesA Crowd Sourcing to Track Individuals in Highly Active Industries
A Crowd Sourcing to Track Individuals in Highly Active Industries
 
VGGFace Transfer Learning and Siamese Network for Face Recognition
VGGFace Transfer Learning and Siamese Network for Face RecognitionVGGFace Transfer Learning and Siamese Network for Face Recognition
VGGFace Transfer Learning and Siamese Network for Face Recognition
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
A Literature Survey on Image Linguistic Visual Question Answering
A Literature Survey on Image Linguistic Visual Question AnsweringA Literature Survey on Image Linguistic Visual Question Answering
A Literature Survey on Image Linguistic Visual Question Answering
 
IRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face RecognitionIRJET- Autonamy of Attendence using Face Recognition
IRJET- Autonamy of Attendence using Face Recognition
 
Facial Emotion Recognition: A Survey
Facial Emotion Recognition: A SurveyFacial Emotion Recognition: A Survey
Facial Emotion Recognition: A Survey
 
IRJET - Gender and Age Prediction using Wideresnet Architecture
IRJET - Gender and Age Prediction using Wideresnet ArchitectureIRJET - Gender and Age Prediction using Wideresnet Architecture
IRJET - Gender and Age Prediction using Wideresnet Architecture
 
IRJET - Blind Guidance using Smart Cap
IRJET - Blind Guidance using Smart CapIRJET - Blind Guidance using Smart Cap
IRJET - Blind Guidance using Smart Cap
 
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
IRJET-  	  Analysis of Face Recognition using Docface+ Selfie MatchingIRJET-  	  Analysis of Face Recognition using Docface+ Selfie Matching
IRJET- Analysis of Face Recognition using Docface+ Selfie Matching
 
Social distance and face mask detector system exploiting transfer learning
Social distance and face mask detector system exploiting  transfer learningSocial distance and face mask detector system exploiting  transfer learning
Social distance and face mask detector system exploiting transfer learning
 
Password Authentication Framework Based on Encrypted Negative Password
Password Authentication Framework Based on Encrypted Negative PasswordPassword Authentication Framework Based on Encrypted Negative Password
Password Authentication Framework Based on Encrypted Negative Password
 
IRJET - A Review on Face Recognition using Deep Learning Algorithm
IRJET -  	  A Review on Face Recognition using Deep Learning AlgorithmIRJET -  	  A Review on Face Recognition using Deep Learning Algorithm
IRJET - A Review on Face Recognition using Deep Learning Algorithm
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Face Recognition Mobile App

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 4, June 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD31384 | Volume – 4 | Issue – 4 | May-June 2020 Page 1313 Face Recognition and Increased Reality System for Mobile Devices Sirojiddin Tavboev1, Tavboev Islom2 1Vice Rector, 2Teacher, 1,2Jizzakh Polytechnic Institute, Jizzakh, Uzbekistan ABSTRACT The objective of this article is to explain the problems of using the facial recognition functions in current mobile devices, as well as to give a possible solution based on a client-server design. KEYWORDS: Facial recognition, reality, mobile phones, client-server How to cite this paper: Sirojiddin Tavboev | Tavboev Islom "Face Recognition and IncreasedRealitySystem for Mobile Devices" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-4, June 2020, pp.1313-1316, URL: www.ijtsrd.com/papers/ijtsrd31384.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) INTRODUCTION In recent years, the developmentofnewcomputerhardware and software for security systems has experienced a great boost, such is the case of fingerprint, voice, iris and facial recognition systems. Among these, facial recognition stands out as the most promising. The identification of facial features has received a strong boost from advances in multimedia video technology, leading to an increase in cameras in workplaces, homes and mobile devices at low cost. Facial recognition can be applied in access control to public and private buildings, ATMs, research laboratories, as a secret access key for the use of personal computers or latest generationmobileterminalsas well as to serve as a person's business card. The process of facial identification is basically divided into two tasks: detection and recognition]. The first task, detection, involves the location of one or more faces within an image, either a still image or a video sequence. The second task, recognition, consists of the comparison of the face detected in the previous step with other faces previously stored in a database. These processes, detection and recognition, should not be totally independent because depending on the way a face is detected it may be practically impossible to recognize it with faces from a database detected differently, hence facial recognition systems are strongly conditioned by the position and orientation of the subject's face in relation to the camera and the lighting conditions at the time of detection. MOTIVATION Depending on the facial recognition algorithm we use, this task can place a very high load on the devicethatperformsit, consuming practically all the system's available resources and leaving it unusable during the processing time. It is therefore necessary to find a solutiontothisproblem for those devices that do not have such computing power and require running this type of multimedia applications. ANALYSIS After a thorough analysis of different recognition methods and how to perform this task on devices withlowcomputing power, it has been thought that the best option is to make a task division of the whole procedure. Thus, the system will be divided into 2 main pillars: A detection device A recognition server IJTSRD31384
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31384 | Volume – 4 | Issue – 4 | May-June 2020 Page 1314 Picture 1. System design. Source: https://beward.en.alibaba.com/. Today, every mobile device has a network connection, whether Wifiorwired,soimplementinga client-server basedmodel may be an acceptable solution. The detection device is responsible for capturing the image or video containing the person whose face you want to recognize. This device has a camera, integrated or external. Once the image hasbeencaptured,itdetectsthefacesofthepersonorpersons it is focusing on. The region is extracted and sent through the connection available at that time to the recognition server. In short: Capture the image Detecting faces Send the selected region to the server and wait for a response On the other hand, the recognition server is running in passive mode waiting to receive connections from devices running the client software and interacting with them to meet the appropriate needs. The tasks of the reconnaissance server are: Pre-process the image you received from the customer Performing recognition and obtaining extra information Improve classifier features Responding to the customer As you can see, client tasks are light tasks that you can perform without consuming excessive system resources. Face detection is the process of finding a face in pictures or videos. The face detection algorithm is based on a function that searches for rectangular regions within an image, regions containing objects that with a high probability resemble others in a training set, by returning the rectangular region of the imagewheretheyhavebeenfound.Thefunctionscanstheimageseveral times and at different scales to find similar objects of different sizes. Therefore, in order to detect faces, only the set of faces with the desired characteristics has to be passed to the function so that the detected faces look like these. Picture 2. Face detection. Source: www.nodirbek.uz
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31384 | Volume – 4 | Issue – 4 | May-June 2020 Page 1315 The object detector used in this article was initially proposed by Paul Viola and improved by Rainer Lienhart. First, a cascade classifier (i.e. a cascade of pulsed magnetic classifiers working with haar-like characteristics [5]) is trained with a few hundred test images of a particular object (e.g. a face, a car, etc.), called positive images that are scaled to the same size; and negative images (arbitrary images of the same size). After the classifier has been trained, it can be applied to a region of interest (the samesizeasthatusedduringtraining)froman input image. The classifier returns a "1" if the region contains the object, and "0" otherwise. To search for the object in the entire image, the search window is moved through the image and each location is checked using the classifier. The classifieris designed so that it can be easily resized to be able to find the objects of interest in different sizes, which is much more efficient than resizing the image itself. Therefore, to find the object of an unknown size in the image, the scanning procedure must be repeated several times with different scales. The word "cascade" in the classifier's name means that the resulting classifier consists of several simpler classifiers (or steps) that are applied one after the other to a region of interest until either the candidate is rejected or all steps are satisfactory.The word "driven" means that the classifiers at all stages of the cascade are complex and are built on the basic classifiers usingone of four different drive techniques (weighted voting). Basic classifiers are classifiers in decision trees with at least 2 leaves. FACIAL RECOGNITION Facial recognition is a very active area of research specializinginhowtorecognizefacesinimagesorvideos.Facerecognitionis the process of matching the detected face to one of the many faces known to the file system. There are a multitude of algorithms available to carry out facial recognition, among which the following stand out [2]: Eigenfaces or Principal Component Analysis (PCA) method Fisherfaces or Linear Discriminant Analysis method Kernel Methods Methods of 3D facial recognition Gabor Wavelets' method Markov's Hidden Models Active Appearance Models For this development, the Eigenfaces method has been used because it is one of the simplest to implement. The process of facial recognition using decomposition into principal values (PCA) and Eigenfaces,withoutgoingintotoomuch detail, consists of the following steps: Store a set of training images of different people. You can have subsets of images for each person that contain different positions, lighting conditions, etc. Create a matrix consisting of the new input image and those already stored in the database. Through a mathematical process, the eigenvectors are calculated using the covariance matrix. Once the characteristic vectors are obtained, the distances betweenthevectorrepresentingtheoriginal imageandtherest are compared. Established a threshold of discernment a priori, if the lower value of the previousstepislessthanthisthreshold,the image of the input side is considered as known, if it is higher, it is considered unknown. Picture 3. Example of a face database. Font FERET. Source: www.researchgate.net
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD31384 | Volume – 4 | Issue – 4 | May-June 2020 Page 1316 DEVELOPMENT The implementation of the above process has been carried out using the free machine vision library OpenCV.Itistotally multiplatform, with versions for Linux, Mac OS X and Windows, and contains more than 500functionsthatcovera wide range of areas in the vision process, such as object recognition, facial recognition, camera calibration, stereo vision and robotic vision. Two applications have been obtainedfromthedevelopment: Server application: multiplatform, programmed in C language using OpenCV, multithreaded so that it can attend to requests from multiple clientssimultaneously. Client application: multiplatform, programmed in JAVA, also using OpenCV to facilitate access to the camera, RESULTS After the research, requirements study and development phases, a system has beenobtainedthatcomplies100% with the initial expectations and ideas of the project. On the one hand, a server software has been developed for Linux systems that is continuously listening on a TCP port while waiting for clients and that, in addition, is in charge of performing all the calculations to determine the identityofa face. On the other hand, a real-time image capture client software has been developed that is in charge of extracting the region of the desired face and communicating with the server to process it. CONCLUSION Recalling the initial objectives of the article "finding ways to integrate facial recognition into devices with low computing power", it can be concluded that these objectives have been satisfactorily met: a robust and fast client-server facial recognition system has been developed. In the results section you can see how the facial recognition in the cases with which it has been experimented has been correct, obtaining success rates close to 100% and with response times, both on the client side and the server side, more than acceptable. However, the system is susceptible toimprovementssuchas the strong dependence on lighting conditions, which are assumed to be constant for the development of theprogram, and on the orientation and positionofthesubject'sface,both in the detection and the recognition process. REFERENCES [1] Carrero, A. (2018). Biometrics and Federal Databases: Could You Be In It?, 51 J. Marshall L. Rev. 589 (2018). The John Marshall Law Review, 51(3), 4. [2] FERET database. [Online]. http://es.wikipedia.org/wiki/Base_de_datos_FERET. [3] G.H, Zahorjan, J Forman, "The challenges of mobile computing," IEEE, vol. 27, no. 4, pp. 38-47, 1994. [4] Gates, K. A. (2011). Our biometric future: Facial recognition technology and the culture of surveillance (Vol. 2). NYU Press. [5] Matthew AT and Alex PP, Face recognition using eigenfaces.: Proc. IEEE Conf. Computer Vision and Pattern Recognition, 1991. [6] Milligan, C. S. (1999). Facial recognition technology, video surveillance, and privacy. S. Cal. Interdisc. LJ, 9, 295. [7] Monroe, D. A. (2009). U.S. Patent No. 7,634,662. Washington, DC: U.S. Patent and Trademark Office. [8] OpenCV. [Online]. http://es.wikipedia.org/wiki/OpenCV. [9] Paul V. and Michael J. (2001) How face detection works. [Online]. http://www.cognotics.com/opencv/servo_2007_series /part_2/sidebar.html. [10] R. and Maydt, J. Lienhart, An extended set of Haar-like features for rapid object detection.: ICIP02, 2002. [11] R. and Poggio, T Brunelli, Face recognition: features versus templates. IEEE Trans. PAM1, 1993, vol. 15. [12] R. Chellappa, P.J. Phillips, A. Rosenfeld W. Zhao, Face Recognition: A literature survey.: ACM Computing Surveys, 2003, vol. 35. [13] Тавбоев, С. А., & Искандарова, З. А. (2019). ОБРАБОТКА ИЗОБРАЖЕНИЙ С ИСПОЛЬЗОВАНИЕМ ТЕОРИИНЕЧЕТКИХМНОЖЕСТВ. Фундаментальные и прикладные исследования в современном мире, (27), 42-45. [14] Тавбоев, С. А., & Тавбоев, И. И. (2019). МЕТОДЫ ЦИФРОВОЙ ОБРАБОТКИ ИЗОБРАЖЕНИЙ С ИСПОЛЬЗОВАНИЕМ АППАРАТА НЕЧЕТКИХ МНОЖЕСТВ. In Научный форум: Инновационная наука (pp. 65-68). [15] Тавбоев, С. А., Савурбаев, А., & Салиев, Э. А. (2016). Формирование методов и задач компьютерного зрения с использованием аппарата нечетких множеств. Молодой ученый, (7-2), 23-26. [16] Тавбоев, С. А., Савурбоев, А., Туракулов, О. Х., & Исроилов, И. Н. (2016). АРХИТЕКТУРА СИСТЕМЫ ЦИФРОВОЙ ОБРАБОТКИ ИЗОБРАЖЕНИЙ СРЕДСТВАМИ ТЕОРИИ НЕЧЕТКИХ МНОЖЕСТВ. Ученый XXI века, (2-5). [17] www.researchgate.net [18] www.nodirbek.uz