The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design and Production of Subject Specific Insole Using Reverse Engineering an...inventionjournals
In this study, a biomechanical application of three dimensional (3D) printing method was implemented to produce a subject-specific insole. It was aimed to design and manufacture a customized totalcontact insole operating a free mobile application that enables to create 3D scans of an object and a 3D printer device in this application. First, two dimensional pictures of a subject's foot sole was taken from various angles and these photos were uploaded to the server of the software which use photogrammetry technology to create a 3D model out of multiple pictures taken by the user. Next, 3D scanning data was transferred to a CAD software and the model was modified to represent the geometrical properties of the subject's foot most appropriately. Then, the model as an STL format imported to a 3D printer device. Finally, the model of subject-specific insole was printed and examined by placing into the shoe of the subject. It was shown with sequential processes that a subject-foot geometry based insole could be designed and manufactured benefitting from new facilities of technological advances with a low level of cost. Furthermore, the use of custom made biomechanical instruments, which make easy to carry out daily tasks, could likely be increased by utilizing educational and practical applications regarding 3D scanning and printing technologies
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design and Production of Subject Specific Insole Using Reverse Engineering an...inventionjournals
In this study, a biomechanical application of three dimensional (3D) printing method was implemented to produce a subject-specific insole. It was aimed to design and manufacture a customized totalcontact insole operating a free mobile application that enables to create 3D scans of an object and a 3D printer device in this application. First, two dimensional pictures of a subject's foot sole was taken from various angles and these photos were uploaded to the server of the software which use photogrammetry technology to create a 3D model out of multiple pictures taken by the user. Next, 3D scanning data was transferred to a CAD software and the model was modified to represent the geometrical properties of the subject's foot most appropriately. Then, the model as an STL format imported to a 3D printer device. Finally, the model of subject-specific insole was printed and examined by placing into the shoe of the subject. It was shown with sequential processes that a subject-foot geometry based insole could be designed and manufactured benefitting from new facilities of technological advances with a low level of cost. Furthermore, the use of custom made biomechanical instruments, which make easy to carry out daily tasks, could likely be increased by utilizing educational and practical applications regarding 3D scanning and printing technologies
FACIAL EXTRACTION AND LIP TRACKING USING FACIAL POINTSijcseit
Automatic facial feature extraction is one of the most important and attempted problems in computer
vision. It is a necessary step in face recognition, facial image compression. There are many methods have
been proposed in the literature for the facial feature extraction task. However, all of them have still
disadvantage such as not complete reflection about face structure, face texture. In this paper, we propose
a method for fast and accurate extraction of feature points such as eyes, nose, mouth, eyebrows and the
like from dynamic images with the purpose of face recognition. These methods are far from satisfactory
in terms of extraction accuracy and processing speed. The proposed method achieves high position
accuracy at a low computing cost by combining shape extraction with geometric features of facial images
like eyes, nose, mouth etc. In this paper, a facial expressions synthesis system, based on the facial points
tracking in the frontal image sequences. Selected facial points are automatically tracked using a crosscorrelation based optical flow. The proposed synthesis system uses a simple facial features model with a
few set of control points that can be tracked in original facial image sequences.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Review of facial expression recognition system and used datasetseSAT Journals
Abstract The human face is main part to recognize the individuals as well as provides the important information, current state of user behavior through their different expressions. Therefore, in biometric area of the research, automatically face & face expression recognition attracts researcher’s interest. The other areas which use such technique are computer science medicine, psychology etc. Usually face recognition system is consisting of many internal tasks. Face detection is thefirst task of such systems. Due to different variations across the human faces, the process of detecting face becomes complex. But with help of different modeling methods, it becomes possible to recognize the face and hence different face expressions. This paperpresents a literature review over the techniques and methods used for facial expression recognition. Also, different facial expression datasets available for the research or testing of existing methods of facial expression recognition are discussed. Keywords: Facial Expression, Face Detection, Features Extraction, Recognition, datasets.
Most face recognition algorithms are generally capable to achieve a high level of accuracy when
the image is acquired under wellcontrolled conditions. The face should be still during the acquisition
process; otherwise, the resulted image would be blur and hard for recognition. Enforcing persons to stand
still during the process is impractical; extremely likely that recognition should be performed on a blurred
image. It is important to understand the relation between the image blur and the recognition accuracy. The
ORL Database was used in the study. All images were in PGM format of 92 × 112 pixels from forty
different persons, ten images per person. Those images were randomly divided into training and testing
datasets with 50-50 ratio. Singular value decomposition was used to extract the features. The images in
the testing datasets were artificially blurred to represent a linear motion, and recognition was performed.
The blurred images were also filtered using various methods. The accuracy levels of the recognition on the
basis of the blurred faces and filtered faces were compared. The performed numerical study suggests that
at its best, the image improvement processes are capable to improve the recognition accuracy level by
less than five percent.
FACIAL LANDMARKING LOCALIZATION FOR EMOTION RECOGNITION USING BAYESIAN SHAPE ...cscpconf
This work presents a framework for emotion recognition, based in facial expression analysis using Bayesian Shape Models (BSM) for facial landmarking localization. The Facial Action Coding System (FACS) compliant facial feature tracking based on Bayesian Shape Model. The BSM estimate the parameters of the model with an implementation of the EM algorithm. We describe the characterization methodology from parametric model and evaluated the accuracy for feature detection and estimation of the parameters associated with facial expressions, analyzing its robustness in pose and local variations. Then, a methodology for emotion characterization is introduced to perform the recognition. The experimental results show that the proposed model can effectively detect the different facial expressions. Outperforming conventional approaches for emotion recognition obtaining high performance results in the estimation of emotion present in a determined subject. The model used and characterizationmethodology showed efficient to detect the emotion type in 95.6% of the cases.
Facial landmarking localization for emotion recognition using bayesian shape ...csandit
This work presents a framework for emotion recognition, based in facial expression analysis
using Bayesian Shape Models (BSM) for facial landmarking localization. The Facial Action
Coding System (FACS) compliant facial feature tracking based on Bayesian Shape Model. The
BSM estimate the parameters of the model with an implementation of the EM algorithm. We
describe the characterization methodology from parametric model and evaluated the accuracy
for feature detection and estimation of the parameters associated with facial expressions,
analyzing its robustness in pose and local variations. Then, a methodology for emotion
characterization is introduced to perform the recognition. The experimental results show that
the proposed model can effectively detect the different facial expressions. Outperforming
conventional approaches for emotion recognition obtaining high performance results in the
estimation of emotion present in a determined subject. The model used and characterization
methodology showed efficient to detect the emotion type in 95.6% of the cases.
Face recogition from a single sample using rlog filter and manifold analysisacijjournal
Face
recognition is A technique that has been widely used in various important field, this process helps
in
the identification of an individual by a machine for the purpose of security and ease of work. The n
ormal
technique of face recognition usually works bet
ter when there are multiple samples for a single person
(MSSP) is available. In present applications where this technique is to be used such as in social ne
tworks,
security systems, identification cards there is only a single sample per person (SSPP) that
is readily
available. This less availability of the samples causes failure in the working of conventional face
recognition techniques which require multiple samples for a particular individual. To overcome this
drawback which sets back the system from the
accurate functioning of face recognition this paper puts
forward a novel technique which makes use of discriminative multi
-
manifold analysis (DMMA) that
extracts distinctive features using image patches. Recognition is done by the process of manifold to
ma
nifold matching. Hence there is an increment in the accuracy rate of face recognition.
FACIAL EXTRACTION AND LIP TRACKING USING FACIAL POINTSijcseit
Automatic facial feature extraction is one of the most important and attempted problems in computer
vision. It is a necessary step in face recognition, facial image compression. There are many methods have
been proposed in the literature for the facial feature extraction task. However, all of them have still
disadvantage such as not complete reflection about face structure, face texture. In this paper, we propose
a method for fast and accurate extraction of feature points such as eyes, nose, mouth, eyebrows and the
like from dynamic images with the purpose of face recognition. These methods are far from satisfactory
in terms of extraction accuracy and processing speed. The proposed method achieves high position
accuracy at a low computing cost by combining shape extraction with geometric features of facial images
like eyes, nose, mouth etc. In this paper, a facial expressions synthesis system, based on the facial points
tracking in the frontal image sequences. Selected facial points are automatically tracked using a crosscorrelation based optical flow. The proposed synthesis system uses a simple facial features model with a
few set of control points that can be tracked in original facial image sequences.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Review of facial expression recognition system and used datasetseSAT Journals
Abstract The human face is main part to recognize the individuals as well as provides the important information, current state of user behavior through their different expressions. Therefore, in biometric area of the research, automatically face & face expression recognition attracts researcher’s interest. The other areas which use such technique are computer science medicine, psychology etc. Usually face recognition system is consisting of many internal tasks. Face detection is thefirst task of such systems. Due to different variations across the human faces, the process of detecting face becomes complex. But with help of different modeling methods, it becomes possible to recognize the face and hence different face expressions. This paperpresents a literature review over the techniques and methods used for facial expression recognition. Also, different facial expression datasets available for the research or testing of existing methods of facial expression recognition are discussed. Keywords: Facial Expression, Face Detection, Features Extraction, Recognition, datasets.
Most face recognition algorithms are generally capable to achieve a high level of accuracy when
the image is acquired under wellcontrolled conditions. The face should be still during the acquisition
process; otherwise, the resulted image would be blur and hard for recognition. Enforcing persons to stand
still during the process is impractical; extremely likely that recognition should be performed on a blurred
image. It is important to understand the relation between the image blur and the recognition accuracy. The
ORL Database was used in the study. All images were in PGM format of 92 × 112 pixels from forty
different persons, ten images per person. Those images were randomly divided into training and testing
datasets with 50-50 ratio. Singular value decomposition was used to extract the features. The images in
the testing datasets were artificially blurred to represent a linear motion, and recognition was performed.
The blurred images were also filtered using various methods. The accuracy levels of the recognition on the
basis of the blurred faces and filtered faces were compared. The performed numerical study suggests that
at its best, the image improvement processes are capable to improve the recognition accuracy level by
less than five percent.
FACIAL LANDMARKING LOCALIZATION FOR EMOTION RECOGNITION USING BAYESIAN SHAPE ...cscpconf
This work presents a framework for emotion recognition, based in facial expression analysis using Bayesian Shape Models (BSM) for facial landmarking localization. The Facial Action Coding System (FACS) compliant facial feature tracking based on Bayesian Shape Model. The BSM estimate the parameters of the model with an implementation of the EM algorithm. We describe the characterization methodology from parametric model and evaluated the accuracy for feature detection and estimation of the parameters associated with facial expressions, analyzing its robustness in pose and local variations. Then, a methodology for emotion characterization is introduced to perform the recognition. The experimental results show that the proposed model can effectively detect the different facial expressions. Outperforming conventional approaches for emotion recognition obtaining high performance results in the estimation of emotion present in a determined subject. The model used and characterizationmethodology showed efficient to detect the emotion type in 95.6% of the cases.
Facial landmarking localization for emotion recognition using bayesian shape ...csandit
This work presents a framework for emotion recognition, based in facial expression analysis
using Bayesian Shape Models (BSM) for facial landmarking localization. The Facial Action
Coding System (FACS) compliant facial feature tracking based on Bayesian Shape Model. The
BSM estimate the parameters of the model with an implementation of the EM algorithm. We
describe the characterization methodology from parametric model and evaluated the accuracy
for feature detection and estimation of the parameters associated with facial expressions,
analyzing its robustness in pose and local variations. Then, a methodology for emotion
characterization is introduced to perform the recognition. The experimental results show that
the proposed model can effectively detect the different facial expressions. Outperforming
conventional approaches for emotion recognition obtaining high performance results in the
estimation of emotion present in a determined subject. The model used and characterization
methodology showed efficient to detect the emotion type in 95.6% of the cases.
Face recogition from a single sample using rlog filter and manifold analysisacijjournal
Face
recognition is A technique that has been widely used in various important field, this process helps
in
the identification of an individual by a machine for the purpose of security and ease of work. The n
ormal
technique of face recognition usually works bet
ter when there are multiple samples for a single person
(MSSP) is available. In present applications where this technique is to be used such as in social ne
tworks,
security systems, identification cards there is only a single sample per person (SSPP) that
is readily
available. This less availability of the samples causes failure in the working of conventional face
recognition techniques which require multiple samples for a particular individual. To overcome this
drawback which sets back the system from the
accurate functioning of face recognition this paper puts
forward a novel technique which makes use of discriminative multi
-
manifold analysis (DMMA) that
extracts distinctive features using image patches. Recognition is done by the process of manifold to
ma
nifold matching. Hence there is an increment in the accuracy rate of face recognition.
Dac for high speed and low power applications using abacuscsandit
This paper proposes a Chinese Abacus Digital-to-Analog Converter (DAC) for high speed and
low power applications like audio and video applications. This circuit of DAC uses resister
strings to get a good analog output. The designed DAC uses the algorithm of abacus. Instead of
using binary code, here we use abacus code to control the switches. So the complexity and the
area will be reduced automatically. The 8-bit DAC is comprised of 12 resistors and 24 NMOS
switches. The 8-bit Abacus resistor DAC requires 12 resistors and 24 switches. The 8-bit
resistor-string DAC requires 255 resistors and 256 switches. The most important advantages
are that the numbers of both resistors and switches are all reduced effectively. The simulation
environment uses 1 μm process technology.
Mapping of traditional software development methods to agile methodologycsandit
Agility is bringing in responsibility and ownership in individuals, which will eventually bring
out effectiveness and efficiency in deliverables. Companies are drifting from traditional
Software Development Life Cycle models to Agile Environment for the purpose of attaining
quality and for the sake of saving cost and time. In Traditional models, life cycle is properly
defined and also phases are elaborated by specifying needed input and output parameters. On
the other hand, in Agile environment, phases are specific to methodologies of Agile - Extreme
Programming etc. In this paper a common life cycle approach is proposed that is applicable for
different kinds of methods. This paper also aims to describe a mapping function for mapping of
traditional methods to Agile methods
FIDUCIAL POINTS DETECTION USING SVM LINEAR CLASSIFIERScsandit
Currently, there is a growing interest from the scientific and/or industrial community in respect
to methods that offer solutions to the problem of fiducial points detection in human faces. Some
methods use the SVM for classification, but we observed that some formulations of optimization
problems were not discussed. In this article, we propose to investigate the performance of
mathematical formulation C-SVC when applied in fiducial point detection system. Futhermore,
we explore new parameters for training the proposed system. The performance of the proposed
system is evaluated in a fiducial points detection problem. The results demonstrate that the
method is competitive.
Humanistic approach in mobile adhoc network hamanetcsandit
Human society is a complex and most organized networks, in which many communities have
different cultural livelihood. The creation/formation of one or more communities within a
society and the way of associations can be mapped to MANET. By involving human
characteristics and behavior, surely it would pave a new way, for further development. In this
paper we have presented a new approach called “HAMANET” which is not only robust and
secure but it certainly meets the challenges of MANET (such as name resolution, address
allocation and authentication). Our object oriented design defines a service in terms of Arts,
Culture, and Machine. The ‘Art’ is the smallest unit of work (defined as an interface), the
‘Culture’ is the integration/assembling of one or more Arts (defined as a class) and finally the
‘Machine’ which is an instance of a Culture that defines a service. The grouping of the
communicable Machines of the same Culture forms a ‘Community’. We have used the term
‘Society’ for MANET consisting of one or more communities and modeled using humanistic
approach. We have compared our design with GloMoSim and proposed the implementation of
file transfer service using the said approach. Our approach gives better results in terms of
implementation of the basic services, security, reliability, throughput, extensibility, scalability
etc.
Framework for tagging software in web applicationcsandit
Tagging is included in web application to ease maintenance of large amount of information
stored in a web application. With no mention of requirement specification or design
document for tagging software, academically or otherwise, integrating tagging software in a
web application is a tedious task. In this paper, a framework is presented for integrating
tagging software into a web application. The framework is for use during different stages of
software development life cycle. The requirement component of framework presents a
weighted requirement checklist that aids the user in deciding requirement for the tagging
software in a web application, from among mandatory and optional requirements. The
design component facilitates the developer in understanding the design of existing tagging
software, modifying it or developing a new one. Also, the framework helps in verification and
validation of tagging software integrated in a web application.
On average case analysis through statistical bounds linking theory to practicecsandit
Theoretical analysis of algorithms involves counting of operations and a separate bound is
provided for a specific operation type. Such a methodology is plagued with its inherent
limitations. In this paper we argue as to why we should prefer weight based statistical bounds,
which permit mixing of operations, instead as a robust approach. Empirical analysis is an
important idea and should be used to supplement and compliment its existing theoretical
counterpart as empirically we can work on weights (e.g. time of an operation can be taken as its
weight). Not surprisingly, it should not only be taken as an opportunity so as to amend the
mistakes already committed knowingly or unknowingly but also to tell a new story.
A Novel Mathematical Based Method for Generating Virtual Samples from a Front...CSCJournals
This paper deals with one sample face recognition which is a new challenging problem in pattern recognition. In the proposed method, the frontal 2D face image of each person divided to some sub-regions. After computing the 3D shape of each sub-region, a fusion scheme is applied on sub-regions to create a total 3D shape for whole face image. Then, 2D face image is added to the corresponding 3D shape to construct 3D face image. Finally by rotating the 3D face image, virtual samples with different views are generated. Experimental results on ORL dataset using nearest neighbor as classifier reveal an improvement about 5% in recognition rate for one sample per person by enlarging training set using generated virtual samples. Compared with other related works, the proposed method has the following advantages: 1) only one single frontal face is required for face recognition and the outputs are virtual images with variant views for each individual 2) need only 3 key points of face (eyes and nose) 3) 3D shape estimation for generating virtual samples is fully automatic and faster than other 3D reconstruction approaches 4) it is fully mathematical with no training phase and the estimated 3D model is unique for each individual.
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
Automatic recognition and verification of human faces is a significant problem in the development and application of Human Computer Interaction (HCI).In addition, the demand for reliable personal identification in computerized access control has resulted in an increased interest in biometrics to replace password and identification (ID) card. Over the last couple of years, face recognition researchers have been developing new techniques fuelled by the advances in computer vision techniques, Design of computers, sensors and in fast emerging face recognition systems. In this paper, a Face Recognition and Verification System has been designed which is robust to variations of illumination, pose and facial expression but very sensitive to variations of the features of the face. This design reckons in the holistic or global as well as the analyticor geometric features of the face of the human beings. The global structure of the human face is analysed by Principal Component Analysis while the features of the local structure are computed considering the geometric features of the face such as the eyes, nose and the mouth. The extracted local features of the face are trained and later tested using Artificial Neural Network (ANN). This combined approach of the global and the local structure of the face image is proved very effective in the system we have designed as it has a correct recognition rate of over 90%.
Multimodal Approach for Face Recognition using 3D-2D Face Feature FusionCSCJournals
3D Face recognition has been an area of interest among researchers for the past few decades especially in pattern recognition. The main advantage of 3D Face recognition is the availability of geometrical information of the face structure which is more or less unique for a subject. This paper focuses on the problems of person identification using 3D Face data. Use of unregistered 3D Face data for feature extraction significantly increases the operational speed of the system with huge database enrollment. In this work, unregistered 3D Face data is fed to a classifier in multiple spectral representations of the same data. Discrete Fourier Transform (DFT) and Discrete Cosine Transform (DCT) are used for the spectral representations. The face recognition accuracy obtained when the feature extractors are used individually is evaluated. The use of depth information alone in different spectral representation was not sufficient to increase the recognition rate. So a fusion of texture and depth information of face is proposed. Fusion of the matching scores proves that the recognition accuracy can be improved significantly by fusion of scores of multiple representations. FRAV3D database is used for testing the algorithm.
Abstract: Face Recognition appears to be an integral part in human-computer interfaces and eservices. To carry out security and fault tolerance various Image Processing techniques have been incorporated using ‘Curse of Dimensionality’ that refers to Classifying a pattern with high dimensions that requires a large number of training data. A face recognition & Detection system is a computer-driven application for automatically identifying or verifying a person from still or video image. It does that by comparing selected facial features in the live image and a facial database where the system returns a possible list of faces corresponding to training samples from the database. The nodal points are measured creating a numerical code, called a faceprint, representing the face in the database. Relatively many techniques are used. Image processing technique has been implemented using Feature extraction by Gabor Filters and database training data using Neural Networks. Multiscale resolution and matrix sampling is efficiently performed using this technique.
Keywords: Image Processing techniques, Curse of Dimensionality, Faceprint, Feature extraction, Gabor Filters, Neural Networks.
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMSijma
Face detection is one of the most relevant applications of image processing and biometric systems.
Artificial neural networks (ANN) have been used in the field of image processing and pattern recognition.
There is lack of literature surveys which give overview about the studies and researches related to the using
of ANN in face detection. Therefore, this research includes a general review of face detection studies and
systems which based on different ANN approaches and algorithms. The strengths and limitations of these
literature studies and systems were included also.
Review of face detection systems based artificial neural networks algorithmsijma
Face detection is one of the most relevant applications of image processing and biometric systems.
Artificial neural networks (ANN) have been used in the field of image processing and pattern recognition.
There is lack of literature surveys which give overview about the studies and researches related to the using
of ANN in face detection. Therefore, this research includes a general review of face detection studies and
systems which based on different ANN approaches and algorithms. The strengths and limitations of these
literature studies and systems were included also.
Multi modal face recognition using block based curvelet featuresijcga
In this paper, we present multimodal 2D +3D face recognition method using block based curvelet features. The 3D surface of face (Depth Map) is computed from the stereo face images using stereo vision technique. The statistical measures such as mean, standard deviation, variance and entropy are extracted from each block of curvelet subband for both depth and intensity images independently.In order to compute the decision score, the KNN classifier is employed independently for both intensity and depth map. Further, computed decision scoresof intensity and depth map are combined at decision level to improve the face recognition rate. The combination of intensity and depth map is verified experimentally using benchmark face database. The experimental results show that the proposed multimodal method is better than individual modality.
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Abstract: Face Recognition appears to be an integral part in human-computer interfaces and eservices. To carry out security and fault tolerance various Image Processing techniques have been incorporated using ‘Curse of Dimensionality’ that refers to Classifying a pattern with high dimensions that requires a large number of training data. A face recognition & Detection system is a computer-driven application for automatically identifying or verifying a person from still or video image. It does that by comparing selected facial features in the live image and a facial database where the system returns a possible list of faces corresponding to training samples from the database. The nodal points are measured creating a numerical code, called a faceprint, representing the face in the database. Relatively many techniques are used. Image processing technique has been implemented using Feature extraction by Gabor Filters and database training data using Neural Networks. Multiscale resolution and matrix sampling is efficiently performed using this technique.
Keywords: Image Processing techniques, Curse of Dimensionality, Faceprint, Feature extraction, Gabor Filters, Neural Networks.
Title: Face Recognition & Detection Using Image Processing
Author: Chandani Sharma
International Journal of Recent Research in Mathematics Computer Science and Information Technology (IJRRMCSIT)
Paper Publications
One of the least complex method for recognizing individual character is by taking a gander at the face. Face Recognition is a kind of Personal Identification System that utilizes an individual's very own characteristics to decide their character. The Facial Expressions likewise convey rich data about human relations, feelings and assume a fundamental part in human correspondence. Programmed Face Detection and Expression Recognition had been concentrated on worldwide in most recent twenty years, which has turned into the exceptionally dynamic examination region in Computer Vision and Pattern Recognition. The necessity for Automatic Recognition and Surveillance Systems, the interest in human visual framework on face acknowledgment, and the plan of human-PC connection point are a portion of the causes. Face Detection can be applied for a wide assortment of issues like Image and Film Processing, Human-Computer Interaction, Criminal Identification, Image Database Management and so on.
Presentation on Face Recognition: A facial recognition is a computer application for automatically identifying or verifying a person from a digital image or a video frame from a video source.
In this paper, we present an automatic application of 3D face recognition system using geodesic distance in Riemannian geometry. We consider, in this approach, the three dimensional face images as residing in Riemannian manifold and we compute the geodesic distance using the Jacobi iterations as a solution of the Eikonal equation. The problem of solving the Eikonal equation, unstructured simplified meshes of 3D face surface, such as tetrahedral and triangles are important for accurately modeling material interfaces and curved domains, which are approximations to curved surfaces in R3. In the classifying steps, we use: Neural Networks (NN), K-Nearest Neighbor (KNN) and Support Vector Machines (SVM). To test this method and evaluate its performance, a simulation series of experiments were performed on 3D Shape REtrieval Contest 2008 database (SHREC2008).
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...ijtsrd
In todays world, there are number of existing methods for facial recognition. These methods are based on frontal view face data. There are few methods which are based on non-frontal view face recognition method. In most of the face recognition algorithm, œFeature space approach is used. In this approach, different feature vectors are extracted from face. These distances are compared to determine matches. In this paper, it is proposed that how any person can be located in a campus or in a city using a cross pose face recognition method. This paper is focusing on three parts 1) generation of multi-view images 2) comparison of images 3) showing the actual location of a person. Sanjay D. Sawaitul"Cross Pose Facial Recognition Method for Tracking any Persons Location an Approach" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-1 , December 2017, URL: http://www.ijtsrd.com/papers/ijtsrd7186.pdf http://www.ijtsrd.com/computer-science/data-processing/7186/cross-pose-facial-recognition-method-for--tracking-any-persons-location-an-approach/sanjay-d-sawaitul
DOMAIN ENGINEERING FOR APPLIED MONOCULAR RECONSTRUCTION OF PARAMETRIC FACESsipij
Many modern online 3D applications and videogames rely on parametric models of human faces for
creating believable avatars. However, manually reproducing someone's facial likeness with a parametric
model is difficult and time-consuming. Machine Learning solution for that task is highly desirable but is
also challenging. The paper proposes a novel approach to the so-called Face-to-Parameters problem (F2P
for short), aiming to reconstruct a parametric face from a single image. The proposed method utilizes
synthetic data, domain decomposition, and domain adaptation for addressing multifaceted challenges in
solving the F2P. The open-sourced codebase illustrates our key observations and provides means for
quantitative evaluation. The presented approach proves practical in an industrial application; it improves
accuracy and allows for more efficient models training. The techniques have the potential to extend to
other types of parametric models.
Similar to 3D Modelling, Simulation and Prediction of Facial Wrinkles (20)
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
2. 318
Computer Science & Information Technology (CS & IT)
other parts of the human body) in many applications is that wherever a person may be, the face is
also there.
Moreover, the face carries a significant number of features that identify individuals such as
gender, emotional state, ethnic origin, age etc. The available facial ageing simulation and
prediction technologies lack in simulation accuracy, especially when simulating the appearance of
wrinkles. This might be due to the fact that wrinkles appear in different locations on human faces
and the amount of change in their development also differs. Failing to simulate the wrinkles in
real-time can have a direct impact on the ageing prediction accuracy as wrinkles play a vital role
as a major ageing feature.
One of the most popular 2D facial ageing simulation systems is the April Age Progression
Software ‘age-me’[2]. On the other hand, FaceGen [3] is a widely known 3D face generator
modelling software that includes an embedded ageing system. Both softwares are available for
commercial purposes and share the disadvantage of generating wrinkles based on assumptions
and no real data is considered. Our findings will challenge both commercial softwares in the
innovation of the techniques in setting solid grounds to generate real-time 3D wrinkles that can be
used later for various reasons that may include security, 3D facial ageing simulation systems,
facial animation, etc.
This work will commence by generating a 3D face model for any given individual. 2D binary
wrinkles will be mapped on the corresponding 3D face models using the generated outlined
images. NURBS curves will then be projected on those wrinkles to form a three-dimensional
wrinkle map. The coloured wrinkle map, as well as some parameters, will be combined together
in an algorithm to predict the appearance of the individual wrinkles in every age group that are
divided into decades, starting from the age of 20.
In the following section a review of related literature will be presented, while section 3
explainsthe work methodology, in which the 3D models are acquired, as well as the 3D face mesh
processing, texture mapping and wrinkles construction are discussed. The results of the
simulations and predictions are presented in section 4. Finally, section 5 will conclude the
findings on the 3D modelling, simulation and prediction of facial wrinkles.
2. RELATED WORK
In addition to the fact that facial wrinkle appearance is a vital sign of ageing, it also plays an
important feature in presenting FE; therefore, it became the focus of a number of FE research.Yin
and Basu [4] presented a partial texture updating method for facial expression synthesis with
facial wrinkles. Based on the observation of the wrinkle appearance and the change along with
performed expressions, they extracted the partial texture information, then used the texture
dissimilarity between the neutral expression and the active expression to extract the active texture
for the expression representation.
For expressive facial animations, Li et al. [7] developed a method for modelling dynamic facial
wrinkle. They started with structured facial mesh, then divided the face region into wrinkle subregions, and created some wrinkle lines with their algorithm in these sub-regions. Some key
nodes were labelled on the facial mesh; these key nodes affect wrinkle lines if wrinkle lines
located the sub-regions that abut on the key nodes. With the algorithm, motion of wrinkle lines
3. Computer Science & Information Technology (CS & IT)
319
was produced by movement of the key nodes. Consequently, wrinkle lines derived facial mesh to
lines
model expressive wrinkles.
From expressions on a 3D face model, Antini et al. [8] proposed a framework for three
threedimensional face representation and matching for identification purposes. Basic traits of a face
were encoded by extracting curves (wrinkles) of salient ridges and ravines from the surface of a
acting
dense mesh. A compact graph representation was then extracted from these curves through a
modelling technique that was capable to quantitatively measure spatial relationships betw
between
curves in a three-dimensional space. Therefore, face recognition was obtained by matching 3D
dimensional
graph representations of faces.
3. METHODOLOGY
3.1 3D Face Creation
The construction of 3D face models using 2D face photographs, such as the work in [9], has
become the focus of study on 3D face modelling, in which generated textures will affect directly
the sense of reality of the generated 3D face models[10] and it is indeed one of the most difficult
problems in the fields of computer graphics and compute vision.
computer
On the other hand, 3D scanners are becoming widely employed for the task of 3D face
generation. However, in this work, the 3D face models are generated from the neutral face of any
individual using FaceGen for its simplicity and relative low cos
cost.
The 2D face image is marked (Figure 1) for feature point extraction then processed. The method
is based on a 3D morphable face model that encodes shape and texture in terms of model
parameters. The stages of this process are shown in Figure 2, where the 3D face model as well as
the
the facemask (texture) are exported.
Figure 1: Marked 2D face image
Figure 2: The process of generating and exporting the 3D face model
4. 320
Computer Science & Information Technology (CS & IT)
The process of the image takes about 10 – 15 minutes depending on the speed of the system. The
result of the 3D face model is displayed in Figure 3 while the exported materials are shown in
Figure 4.
Figure 3: The 3D face model
Figure 4: Exported items
3.2 The 3D Face Mesh
The generated face models contain simple mesh; in the modelling process of wrinkles, we take
into consideration the flow of the facial muscles, so that the edge loops are in the direction of the
natural flow of the human muscles (as described in Figure 5).
5. Computer Science & Information Technology (CS & IT)
321
Figure 5: Facial muscle flow
The 3D face has to be processed further for optimisation; this process involves increasing the
mesh by adding edge loops in order to boost the smoothness of the wrinkles later in the
simulation. This method might cause the program to have a slow loading time due to the addit
addition
of more geometry to the model.
An alternative method to create wrinkles can be implemented by generating a so called normal
so-called
map [11, 12]. In 3D computer graphics, normal mapping is a technique used for faking the
.
lighting of bumps and dents. It is used to add details without using more polygons,
We fabricated our own normal map (an example is shown in Figure 6); the depressions make the
surface look deeper, which gives the illusion of wrinkles. In our work, accuracy and realistically
in terms of the wrinkle locations are top priorities; hence, using normal maps will be inadequate.
For this reason, the higher resolution 3D face polygons will be used in this work despite the
esolution
contingency of a slow loading time.
Figure 6: Our generated normal map
6. 322
Computer Science & Information Technology (CS & IT)
3.3 Texture Mapping
Texture mapping is the method for adding detail or colour to a computer generated graphics or
computer-generated
3D Models. In this section, the texture that is generated in Figure 4 is considered using a UV
space. The UV mapping is the process of texturing a 2D image on a 3D object. In contrast to X, Y
and Z, which are the coordinates for the original 3D object in the modelling space, another set of
coordinates is required to describe the surface of the mesh, so the letters U and V are used. The
Figure 7 shows an example of our 3D faces that is opened up to be a UV map.
Figure 7: (a) Our 3D face and its UV map; (b) Textured 3D head model
The eyes are textured in the same manner but on a smaller scale.The final texturing result is
presented in the figure 8.
Figure 8: Final texture
7. Computer Science & Information Technology (CS & IT)
323
3.3 Wrinkles Construction
The generated binary wrinkle maps are mapped on their corresponding 3D face models; Figure 9
illustrates an example. Wrinkles are then constructed on the 3D models by the projection of the
NURBS curves.
Figure 9: The binary wrinkle map is textured on the 3D face model
Upon the projection of the NURBS curves; the curves are modelled to enhance the look of the 3D
wrinkle maps (Figure 10). This is performed by observing the original images in order to add or
fill gaps that might be present in the binary wrinkle maps due to detection failure.
Figure 10: An enhanced 3D wrinkle map
8. 324
Computer Science & Information Technology (CS & IT)
3.4 Wrinkles Simulation and Prediction
For the tasks of simulation and prediction, three elements (for any individual) are considered: the
binary wrinkle map, the general development of the wrinkles over the decades and the coloured
wrinkle map.
The binary map acts as a benchmark that displays the full facial wrinkles and their locations.
While the coloured map will work within each age group, i.e. the wrinkles that have the highest
intensity values will appear first and so on. Finally, the findings will be displayed in a form of a
graph to study the behaviour of the wrinkles as age progresses.
4. RESULTS
Some sample results are presented in figure 11 and compared to the simulation results that are
generated by the commercial software FaceGen. Our results are presented on the left hand side
while FaceGen results are presented on the right hand side.
Our method doesn’t only work on the standard head models that are taken from FaceGen, but it
accepts 3D face scans as well. Figures 12 are generated results using a 3D face scan for Person S
and also compared to the generated results from FaceGen:
Figure 12: A comparisons between our proposed system results(on the left hand side) and FaceGen results
(on the right hand side).
5. DISCUSSION AND CONCLUSION
In this work, novel techniques were used in the tasks of facial wrinkles simulation and prediction.
Various parameters were utilised in order to develop this unique facial wrinkle pattern formation
9. Computer Science & Information Technology (CS & IT)
325
system, which include the generated wrinkle maps for any given individual along with published
literature on the general development of the facial wrinkles over the years.
The provided system has the privilege of using real-time data that has high potential to boost the
accuracy. Moreover, the system was compared to other available popular technologies and proved
competence.
Figure 12: A comparisons between generated results using a 3D face scan results (on the left hand side) and
FaceGen results (on the right hand side).
In comparison to FaceGen, it was seen from their results that their system could only display
common facial wrinkles; Better results than FaceGen were obtained by using the age-me
software. This software uses 2D images and performs the age predictions using 2D approach. The
generated wrinkles in this software do not match the actual wrinkle maps of the individuals,
which shows that either some assumptions were made in the generation of wrinkles based on data
estimation or wrinkles were randomly produced. Though, both cases jeopardise the accuracy of
wrinkles formation.Furthermore, the developed system has the distinctive advantage of its ability
to accept standard (mean) 3D head models as well as 3D face scans.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
Clement, J., and Marks, M., "Computer Graphic Facial Reconstruction". 2005, USA: Elsevier.
April Age Progression Software. [cited 17/01/2011]; Available from: http://www.age-me.com/.
FaceGen. [cited 31/03/2010]; Available from: http://www.facegen.com/.
Yin, L., and Basu, A., "Generating Realistic Facial Expressions with Wrinkles for Model-Based
Coding". Computer Vision and Image Understanding, November 2001. Vol. 84(Issue 2): p. 201-240.
Zhang, Y., "Muscle-Driven Modeling of Wrinkles for 3D Facial Expression", in IEEE international
conference on multimedia and expo. 2008, IEEE: Hannover. p. 957-960.
Tian, Y., Kanade, T. and Cohn, J. , "Recognizing action units for facial expression analysis", in IEEE
Transactions on Pattern Analysis and Machine Intelligence. 2001, IEEE. p. 97-115.
Li, M., Yin, B., Kong, D. and Luo, X. , "Modeling Expressive Wrinkles of Face For Animation", in
Proc. of Fourth International Conference on Image and Graphics 2007, IEEE. p. 874-879.
10. 326
[8]
Computer Science & Information Technology (CS & IT)
Antini, G., Berretti, S., Del Bimbo, A., and Pala, P., "3D Face Identification Based on Arrangement of
Salient Wrinkles", in IEEE International Conference on Multimedia and Expo. July 2006: Toronto,
Ont. p. 85-88.
[9] Lin, W., Weijun, H., Rui, C., and Xiaoxi, W., "Three-Dimensional Reconstruction of Face Model
Based on Single Photo", in Proceedings of the International Conference on Computer Application and
System Modeling 2010, IEEE: Taiyuan. p. 674.
[10] Wang, H., Zheng, Q., and Sun, Y., "A Method of Generating Global View Texture Images in 3D Face
Modeling", in The sencond International Conference on Information Science and Engineering
(ICISE). December 2010, IEEE: Hangzhou, China. p. 3435.
[11] Cohen, J., Olano, M., Manocha, D., "Appearance-Preserving Simplification", in Proceedings of the
25th annual conference on Computer graphics and interactive techniques. 1998, ACM: New York,
USA.
[12] Yang, B., Pan, Z., "A Hybrid Adaptive Normal Map Texture Compression Algorithm", in
Proceedings of the 16th International Conference on Artificial Reality and Telexistence--Workshops.
2006, IEEE: Hangzhou.