In this paper we proposed a face detection method based on feature selection and feature optimization. Now in
current research trend of biometric security used the process of feature optimization for better improvement of
face detection technique. Basically our face consists of three types of feature such as skin color, texture and
shape and size of face. The most important feature of face is skin color and texture of face. In this detection
technique used texture feature of face image. For the texture extraction of image face used partial feature
extraction function, these function is most promising shape feature analysis. For the selection of feature and
optimization of feature used multi-objective TLBO. TLBO algorithm is population based searching technique
and defines two constraints function for the process of selection and optimization. The proposed algorithm of
face detection based on feature selection and feature optimization process. Initially used face image data base
and passes through partial feature extractor function and these transform function gives a texture feature of face
image. For the evaluation of performance our proposed algorithm implemented in MATLAB 7.8.0 software and
face image used provided by Google face image database. For numerical analysis of result used hit and miss
ratio. Our empirical evaluation of result shows better prediction result in compression of PIFR method of face
detection.
The process of determining eligibility for someone is usually given with the same value. The determination of eligibility is determined based on several criteria. These criteria are the ability to Academic Potential Test (APT) and Grade Point Average (GPA). The Tsukamoto fuzzy system is the model used in this paper. Each input variable is divided into two membership functions. There are nine rules of Tsukamoto's model applied. The system also provides following changes of parameters if the parameter values are to be changed. The result of the difference of the employability is given to them. The greater the APT score, the more the value of the feasibility of the work obtained. The more GPA values gained, the greater the value of the workplace eligibility.
The process of determining cuts tuition for students are usually given with the same nominal. And in this paper is the determination of the pieces tuition for students who are less able to be different, depending on how much income parents and the number of children covered. For income parents who get discounted tuition fee of IDR Rp.1,500,000 and for the number of children in these families also determine the number of pieces obtained. Tsukamoto Fuzzy system is the model used in this paper. Each input variable is divided into three membership functions. In this paper, Nine Tsukamoto Fuzzy model rules have been applied. The system also provides a consequent change of parameters if the current parameter values to be changed. The smaller the parent's income, the greater the pieces obtained. The more children insured the greater the college acquired pieces.
Classification of Machine Learning AlgorithmsAM Publications
The goal of various machine learning algorithms is to device learning algorithms that learns automatically without any human intervention or assistance. The emphasis of machine learning is on automatic methods. Supervised Learning, unsupervised learning and reinforcement learning are discussed in this paper. Machine learning is the core area of Artificial Intelligence. Although a subarea of AI, machine learning also intersects broadly with other fields, especially statistics, but also mathematics, physics, theoretical computer science and more.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...ijaia
The paper presents a novel technique called “Structural Crossing-Over” to synthesize qualified data for training machine learning-based handwriting recognition. The proposed technique can provide a greater variety of patterns of training data than the existing approaches such as elastic distortion and tangentbased affine transformation. A couple of training characters are chosen, then they are analyzed by their similar and different structures, and finally are crossed over to generate the new characters. The experiments are set to compare the performances of tangent-based affine transformation and the proposed approach in terms of the variety of generated characters and percent of recognition errors. The standard
MNIST corpus including 60,000 training characters and 10,000 test characters is employed in the
experiments. The proposed technique uses 1,000 characters to synthesize 60,000 characters, and then uses
these data to train and test the benchmark handwriting recognition system that exploits Histogram of
Gradient: HOG as features and Support Vector Machine: SVM as recognizer. The experimental result
yields 8.06% of errors. It significantly outperforms the tangent-based affine transformation and the
original MNIST training data, which are 11.74% and 16.55%, respectively.
Holistic Approach for Arabic Word RecognitionEditor IJCATR
Optical Character Recognition (OCR) is one of the important branches. One segmenting words into character is one of the
most challenging steps on OCR. As the results of advances in machine speeds and memory sizes as well as the availability of large
training dataset, researchers currently study Holistic Approach “recognition of a word without segmentation”. This paper describes a
method to recognize off-line handwritten Arabic names. The classification approach is based on Hidden Markov models.. For each
Arabic word many HMM models with different number of states have been trained. The experiments result are encouraging, it also
show that best number of state for each word need careful selection and considerations.
Recommendation algorithm using reinforcement learningArithmer Inc.
Slide for study session given by Lu Juanjuan at Arithmer inc.
It is a summary of recent methods for recommendation system using reinforcement learning.
Arithmer株式会社は東京大学大学院数理科学研究科発の数学の会社です。私達は現代数学を応用して、様々な分野のソリューションに、新しい高度AIシステムを導入しています。AIをいかに上手に使って仕事を効率化するか、そして人々の役に立つ結果を生み出すのか、それを考えるのが私たちの仕事です。
Arithmer began at the University of Tokyo Graduate School of Mathematical Sciences. Today, our research of modern mathematics and AI systems has the capability of providing solutions when dealing with tough complex issues. At Arithmer we believe it is our job to realize the functions of AI through improving work efficiency and producing more useful results for society.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The process of determining eligibility for someone is usually given with the same value. The determination of eligibility is determined based on several criteria. These criteria are the ability to Academic Potential Test (APT) and Grade Point Average (GPA). The Tsukamoto fuzzy system is the model used in this paper. Each input variable is divided into two membership functions. There are nine rules of Tsukamoto's model applied. The system also provides following changes of parameters if the parameter values are to be changed. The result of the difference of the employability is given to them. The greater the APT score, the more the value of the feasibility of the work obtained. The more GPA values gained, the greater the value of the workplace eligibility.
The process of determining cuts tuition for students are usually given with the same nominal. And in this paper is the determination of the pieces tuition for students who are less able to be different, depending on how much income parents and the number of children covered. For income parents who get discounted tuition fee of IDR Rp.1,500,000 and for the number of children in these families also determine the number of pieces obtained. Tsukamoto Fuzzy system is the model used in this paper. Each input variable is divided into three membership functions. In this paper, Nine Tsukamoto Fuzzy model rules have been applied. The system also provides a consequent change of parameters if the current parameter values to be changed. The smaller the parent's income, the greater the pieces obtained. The more children insured the greater the college acquired pieces.
Classification of Machine Learning AlgorithmsAM Publications
The goal of various machine learning algorithms is to device learning algorithms that learns automatically without any human intervention or assistance. The emphasis of machine learning is on automatic methods. Supervised Learning, unsupervised learning and reinforcement learning are discussed in this paper. Machine learning is the core area of Artificial Intelligence. Although a subarea of AI, machine learning also intersects broadly with other fields, especially statistics, but also mathematics, physics, theoretical computer science and more.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
AUTOMATIC TRAINING DATA SYNTHESIS FOR HANDWRITING RECOGNITION USING THE STRUC...ijaia
The paper presents a novel technique called “Structural Crossing-Over” to synthesize qualified data for training machine learning-based handwriting recognition. The proposed technique can provide a greater variety of patterns of training data than the existing approaches such as elastic distortion and tangentbased affine transformation. A couple of training characters are chosen, then they are analyzed by their similar and different structures, and finally are crossed over to generate the new characters. The experiments are set to compare the performances of tangent-based affine transformation and the proposed approach in terms of the variety of generated characters and percent of recognition errors. The standard
MNIST corpus including 60,000 training characters and 10,000 test characters is employed in the
experiments. The proposed technique uses 1,000 characters to synthesize 60,000 characters, and then uses
these data to train and test the benchmark handwriting recognition system that exploits Histogram of
Gradient: HOG as features and Support Vector Machine: SVM as recognizer. The experimental result
yields 8.06% of errors. It significantly outperforms the tangent-based affine transformation and the
original MNIST training data, which are 11.74% and 16.55%, respectively.
Holistic Approach for Arabic Word RecognitionEditor IJCATR
Optical Character Recognition (OCR) is one of the important branches. One segmenting words into character is one of the
most challenging steps on OCR. As the results of advances in machine speeds and memory sizes as well as the availability of large
training dataset, researchers currently study Holistic Approach “recognition of a word without segmentation”. This paper describes a
method to recognize off-line handwritten Arabic names. The classification approach is based on Hidden Markov models.. For each
Arabic word many HMM models with different number of states have been trained. The experiments result are encouraging, it also
show that best number of state for each word need careful selection and considerations.
Recommendation algorithm using reinforcement learningArithmer Inc.
Slide for study session given by Lu Juanjuan at Arithmer inc.
It is a summary of recent methods for recommendation system using reinforcement learning.
Arithmer株式会社は東京大学大学院数理科学研究科発の数学の会社です。私達は現代数学を応用して、様々な分野のソリューションに、新しい高度AIシステムを導入しています。AIをいかに上手に使って仕事を効率化するか、そして人々の役に立つ結果を生み出すのか、それを考えるのが私たちの仕事です。
Arithmer began at the University of Tokyo Graduate School of Mathematical Sciences. Today, our research of modern mathematics and AI systems has the capability of providing solutions when dealing with tough complex issues. At Arithmer we believe it is our job to realize the functions of AI through improving work efficiency and producing more useful results for society.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Data entry is a time consuming and erroneous procedure in its nature. In addition, validity
check of submitted information is not easier than retyping it. In a mega-corporation like Kanoon
Farhangi Amoozesh, there are almost no way to control the authenticity of students' educational
background. By the virtue of fast computer architectures, optical character recognition, a.k.a.
OCR, systems have become viable. Unfortunately, general-purpose OCR systems like Google's
Tesseract are not handful because they don't have any a-priori information about what they are
reading. In this paper the authors have taken a in-depth look on what has done in the field of
OCR in the last 60 years. Then, a custom-made system adapted to the problem is presented
which is way more accurate than general purpose OCRs. The developed system reads more than
60 digits per second. As shown in the Results section, the accuracy of the devised method is
reasonable enough to be exposed in public use.
An Automatic Question Paper Generation : Using Bloom's TaxonomyIRJET Journal
This document presents a system for automatically generating exam questions and categorizing them according to Bloom's Taxonomy. It uses natural language processing techniques like part-of-speech tagging to analyze questions and identify keywords and verbs. Rules are developed to match question patterns and keywords to the appropriate Bloom's Taxonomy category. A randomization algorithm is also introduced to randomly select questions from the database and avoid repetitions. The system aims to help educators automatically analyze exam questions and ensure a balance of cognitive levels according to Bloom's Taxonomy. Preliminary results found the rules could successfully categorize questions in the test set. The proposed system has applications for educational institutions, universities, and government exams.
IRJET- Stock Market Forecasting Techniques: A SurveyIRJET Journal
This document surveys various techniques for stock market forecasting, including traditional and recent methods using machine learning and artificial intelligence. It discusses techniques like artificial neural networks, hidden Markov models, support vector regression, and deep learning. It also reviews several research papers that have applied methods like ARIMA models, improved Levenberg-Marquardt training for neural networks, feedforward neural networks for the Stock Exchange of Thailand index, improved multiple linear regression in an Android app, support vector regression with windowing operators on the Dhaka Stock Exchange, hidden Markov models compared to neural networks and support vector machines, a hybrid support vector regression and filtering model, and using J48 decision trees and random forests with preprocessing.
Fiducial Point Location Algorithm for Automatic Facial Expression Recognitionijtsrd
We present an algorithm for the automatic recognition of facial features for color images of either frontal or rotated human faces. The algorithm first identifies the sub images containing each feature, afterwards, it processes them separately to extract the characteristic fiducial points. Then Calculate the Euclidean distances between the center of gravity coordinate and the annotated fiducial points coordinates of the face image. A system that performs these operations accurately and in real time would form a big step in achieving a human like interaction between man and machine. This paper surveys the past work in solving these problems. The features are looked for in down sampled images, the fiducial points are identified in the high resolution ones. Experiments indicate that our proposed method can obtain good classification accuracy. D. Malathi | A. Mathangopi | Dr. D. Rajinigirinath ""Fiducial Point Location Algorithm for Automatic Facial Expression Recognition"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21754.pdf
Paper URL: https://www.ijtsrd.com/computer-science/data-miining/21754/fiducial-point-location-algorithm-for-automatic-facial-expression-recognition/d-malathi
A NOVEL FEATURE SET FOR RECOGNITION OF SIMILAR SHAPED HANDWRITTEN HINDI CHARA...cscpconf
This document describes a study that uses machine learning algorithms to recognize similar shaped handwritten Hindi characters. It extracts 85 features from each character image based on geometry. Four machine learning algorithms (Bayesian Network, RBFN, MLP, C4.5 Decision Tree) are trained on datasets containing samples of a target character pair and evaluated based on precision, misclassification rate, and model build time. Feature selection techniques are also used to reduce the feature set dimensionality before classification. Experimental results show that different algorithms perform best depending on the feature set and number of samples used for training.
This paper proposes using fuzzy cognitive maps (FCM) to automatically detect a student's learning style in an adaptive e-learning system based on the Felder-Silverman learning style model. FCM is a soft computing technique that combines fuzzy logic and neural networks. The paper reviews related work on automatic detection of learning styles. It then explains how FCM would be used to model student behaviors and interactions to identify their learning style dimensions. The results of testing this approach are discussed. The overall goal is to personalize the e-learning experience based on a student's detected learning style.
Local feature extraction based facial emotion recognition: A surveyIJECEIAES
This document summarizes a research paper that performed a large-scale evaluation of 46 recent state-of-the-art local binary pattern (LBP) variants for facial expression recognition. Extensive experiments on four benchmark facial expression databases found that some LBP variants achieved promising recognition rates that were better or competitive compared to recent state-of-the-art facial recognition systems, with rates of 100%, 98.57%, 95.92% and 100% on the different databases. The best performing descriptors on each database were then compared to other state-of-the-art facial expression recognition approaches. The evaluation aimed to provide an up-to-date and comprehensive analysis of LBP variants for facial expression recognition given the rapid increase
The document describes a face recognition method that uses wavelet features extracted from images. It divides each face image into 12 blocks and applies discrete wavelet transform to each block. It extracts the mean of the horizontal and vertical wavelet coefficients as features. A neural network is trained on these features from training images and used to recognize faces in test images by classifying the extracted wavelet features.
Pattern Recognition of Japanese Alphabet Katakana Using Airy Zeta FunctionEditor IJCATR
Character recognition is one of common pattern recognition study. There are many object used in pattern recognition, such
as Japanese alphabet character, which is a very complex character compared to common Roman character. This research focus on
pattern recognition of Japanese character handwriting, Katakana. The pattern recognition process of a letter of the alphabet uses Airy
Zeta Function, with its input file is a .bmp file. User can write directly on an input device of the system. The testing of the system
examines 460 letter characters. The first testing that examines 230 characters result in an accuracy of 55,65%, whilst the second testing
that examines 460 characters produces an accuracy of 64,56% in recognizing the letters. These accuracy are much determined by the
quantity of training. The approach of pattern recognition is a statistical approach, where more pattern of letters are trained and saved as
a reference, more intelligent the system . The implementation of Airy zeta function methods in recognizing Japanese letter pattern is
able to produce high accuracy level.
An Optimal Solution to the Linear Programming Problem using Lingo Solver: A Case Study of an
Apparel Production Plant of Sri Lanka.................................................................................................1
Z. A. M. S. Juman and W. B. Daundasekara
Analysis of BT and SMS based Mobile Malware Propagation ................................................................. 16
Prof. R. S. Sonar and Sonal Mohite
Behavioral Pattern of Internet Use among University Students of Pakistan........................................... 25
Amir Manzoor
BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel
.................................................................................................................................................................... 37
Faisal Rasheed Lone and Sanjay Sharma
Harnessing Mobile Technology (MT) to Enhancy the Sustainable Livelihood of Rural Women in
Zimbabwe: Case of Mobile Money Transfer (MMT) ................................................................................ 46
Samuel Musungwini, Tinashe Gwendolyn Zhou, Munyaradzi Zhou, Caroline Ruvinga and Raviro Gumbo
Design and Evaluation of a Comprehensive e-Learning System using the Tools on Web 2.0 ................ 58
Maria Dominic, Anthony Philomenraj and Sagayaraj Francis
Critical Success Factors for the Adoption of School Administration and Management System in South
African Schools ...............................................................................................................................74
Mokwena Nicolas Sello
Efficient and Trust Based Black Hole Attack Detection and Prevention in WSN ................................... 93
Fuzzy modeling require two main steps which are structure identification and parameter optimization, the
first one determines the numbers of membership functions and fuzzy if-then rules, while the second
identifies a feasible set of parameters under the given structure. However, the increase of input dimension,
rule numbers will have an exponential growth and there will cause problem of “rule disaster”. In this
paper, we have applied adaptive network fuzzy inference system ANFIS for phonemes recognition. The
appropriate learning algorithm is performed on TIMIT speech database supervised type, a pre-processing
of the acoustic signal and extracting the coefficients MFCCs parameters relevant to the recognition system.
First learning of the network structure by subtractive clustering, in order to define an optimal structure and
obtain small number of rules, then learning of parameters network by hybrid learning which combine the
gradient decent and least square estimation LSE to find a feasible set of antecedents and consequents
parameters. The results obtained show the effectiveness of the method in terms of recognition rate and
number of fuzzy rules generated.
1. The document presents a methodology for recognizing isolated handwritten Devanagari numerals using structural and statistical features.
2. Key features extracted include whether the numeral has openings on the left, right, above or below, and the number of horizontal and vertical crossings.
3. The methodology achieves an average accuracy of 96.8% on a dataset of 500 numeral images collected from various individuals. Accuracy is highest for numerals 0, 6, 8 and 10 at 100%, while some similar numerals like 3 and 2 see more errors.
INTERVAL TYPE-2 INTUITIONISTIC FUZZY LOGIC SYSTEM FOR TIME SERIES AND IDENTIF...ijfls
This paper proposes a sliding mode control-based learning of interval type-2 intuitionistic fuzzy logic system for time series and identification problems. Until now, derivative-based algorithms such as gradient descent back propagation, extended Kalman filter, decoupled extended Kalman filter and hybrid method of decoupled extended Kalman filter and gradient descent methods have been utilized for the optimization of the parameters of interval type-2 intuitionistic fuzzy logic systems. The proposed model is based on a Takagi-Sugeno-Kang inference system. The evaluations of the model are conducted using both real world and artificially generated datasets. Analysis of results reveals that the proposed interval type-2 intuitionistic fuzzy logic system trained with sliding mode control learning algorithm (derivative-free) do outperforms some existing models in terms of the test root mean squared error while competing favourable with other models in the literature. Moreover, the proposed model may stand as a good choice for real time applications where running time is paramount compared to the derivative-based models.
Neuro-fuzzy inference system based face recognition using feature extractionTELKOMNIKA JOURNAL
Human face recognition (HFR) is the method of recognizing people in images or videos. There are different HFR methods such as feature-based, eigen-faces, hidden markov model and neural network (NN) based methods. Feature extraction or preprocessing used in first three mentioned methods that associated with the category of the image to recognize. While in the NN method, any type of image can be useful without the requirement to particular data about the type of image, and simultaneously provides superior accuracy. In this paper, HFR system based on neural-fuzzy (NF) has been introduced. In the NN system, backpropagation (BP) algorithm is used to update the weights of the neurons through supervised learning. Two sets of the image have been used for training and testing the network to identify the person. If the test image matches to one of the trained sets of the image, then the system will return recognized. And if the test image does not match to one of the trained sets of the image, then the system will return not recognized. The feature extraction methods used in this paper is Geometric moments and Color feature extraction. The recognition rate of 95.556 % has been achieved. The experimental result illustrations that the association of two techniques that provide better accuracy.
This document summarizes a semi-supervised clustering approach for classifying P300 signals for brain-computer interface (BCI) speller systems. It involves using k-means clustering on wavelet features extracted from EEG data, with some data points labeled to initialize the clusters. An ensemble of support vector machines is then trained on the clustered data points to classify new unlabeled P300 signals. The document outlines the P300 speller paradigm used to collect the EEG data, pre-processing steps like filtering and wavelet transformation, the seeded k-means semi-supervised clustering method, and using an ensemble SVM classifier trained on the clustered data for classification.
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET Journal
This document proposes a method for optical character recognition (OCR) using neural networks and character classification based on symmetry. It involves three main phases: 1) A classification phase that categorizes training characters by their symmetry properties (vertical, horizontal, total, none), 2) A training phase that trains separate neural networks on each classified group, and 3) A recognition phase that preprocesses documents, extracts lines and characters, and recognizes characters using the trained neural networks. Experimental results show the method achieves up to 99.2% accuracy on Arial font without punctuation, outperforming traditional OCR methods. However, it requires 14.01 seconds for full network training.
Recognition of Facial Emotions Based on Sparse CodingIJERA Editor
This paper deals with acknowledgment of characteristic feelings from human countenances is a fascinating subject with an extensive variety of potential applications like human-PC communication, robotized mentoring frameworks, picture and video recovery, brilliant situations, what's more, driver cautioning frameworks. Generally, facial feeling acknowledgment frameworks have been assessed on lab controlled information, which is not illustrative of the earth confronted in genuine applications. To vigorously perceive facial feelings in genuine regular circumstances, this paper proposes a methodology called Extreme Sparse Learning (ESL), which can mutually take in a word reference (set of premise) and a non-direct grouping model. The proposed approach consolidates the discriminative force of Extreme Learning Machine (ELM) with the reproduction property of meager representation to empower exact arrangement when given uproarious signs and blemished information recorded in common settings. Moreover, this work exhibits another neighborhood spatioworldly descriptor that is particular what's more, posture invariant. The proposed structure can accomplish best in class acknowledgment precision on both acted what's more, unconstrained facial feeling databases.
This document summarizes a research paper that presents a system for automatically counting faces in a classroom using MATLAB. The system first uses frame differencing and morphological processing to detect moving objects and edges. It then applies skin color detection and face feature detection to identify and count human faces in real-time video frames. The system was tested in a classroom environment and achieved accurate counts of students present. It provides an automated alternative to manual counting that saves teacher time and ensures accurate attendance records.
IRJET- Survey on Various Techniques of Attendance marking and Attention D...IRJET Journal
The document summarizes various techniques for automated attendance marking and detecting student attention levels in classrooms. It discusses methods using facial recognition, biometrics, Bluetooth beacons, sensors to track eye movements, posture and brain waves. Researchers have achieved over 95% accuracy using these techniques compared to traditional manual attendance marking methods. The techniques described can save time, reduce human errors and help teachers identify students who are inattentive or not focusing in class.
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniquesijtsrd
Effective software cost estimation is the most challenging and important activities in software development. Developers want a simple and accurate method of efforts estimation. Estimation of the cost before starting of work is a prediction and prediction always not accurate. Software effort estimation is a very critical task in the software engineering and to control quality and efficiency a suitable estimation technique is crucial. This paper gives a review of various available software effort estimation methods, mainly focus on the algorithmic model and non algorithmic model. These existing methods for software cost estimation are illustrated and their aspect will be discussed. No single technique is best for all situations, and thus a careful comparison of the results of several approaches is most likely to produce realistic estimation. This paper provides a detailed overview of existing software cost estimation models and techniques. This paper presents the strength and weakness of various cost estimation methods. This paper focuses on some of the relevant reasons that cause inaccurate estimation. Pa Pa Win | War War Myint | Hlaing Phyu Phyu Mon | Seint Wint Thu "Review on Algorithmic and Non-Algorithmic Software Cost Estimation Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26511.pdfPaper URL: https://www.ijtsrd.com/engineering/-/26511/review-on-algorithmic-and-non-algorithmic-software-cost-estimation-techniques/pa-pa-win
IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...IRJET Journal
This document discusses multiple feature fusion techniques for facial expression recognition in videos. It reviews existing literature on using features like Histogram of Oriented Gradients from Three Orthogonal Planes (HOG-TOP), geometric warp features, Convolutional Neural Networks (CNNs), Scale Invariant Feature Transform (SIFT) and combining these features through multiple feature fusion to improve facial expression recognition from video sequences. The document also analyzes techniques like HOG-TOP for extracting dynamic textures from videos and geometric features to capture facial configuration changes caused by expressions.
AN EXPERIMENTAL STUDY OF FEATURE EXTRACTION TECHNIQUES IN OPINION MININGijscai
The feature selection or extraction is the most important task in Opinion mining and Sentimental Analysis
(OSMA) for calculating the polarity score. These scores are used to determine the positive, negative, and
neutral polarity about the product, user reviews, user comments, and etc., in social media for the purpose
of decision making and Business Intelligence to individuals or organizations. In this paper, we have
performed an experimental study for different feature extraction or selection techniques available for
opinion mining task. This experimental study is carried out in four stages. First, the data collection process
has been done from readily available sources. Second, the pre-processing techniques are applied
automatically using the tools to extract the terms, POS (Parts-of-Speech). Third, different feature selection
or extraction techniques are applied over the content. Finally, the empirical study is carried out for
analyzing the sentiment polarity with different features.
Data entry is a time consuming and erroneous procedure in its nature. In addition, validity
check of submitted information is not easier than retyping it. In a mega-corporation like Kanoon
Farhangi Amoozesh, there are almost no way to control the authenticity of students' educational
background. By the virtue of fast computer architectures, optical character recognition, a.k.a.
OCR, systems have become viable. Unfortunately, general-purpose OCR systems like Google's
Tesseract are not handful because they don't have any a-priori information about what they are
reading. In this paper the authors have taken a in-depth look on what has done in the field of
OCR in the last 60 years. Then, a custom-made system adapted to the problem is presented
which is way more accurate than general purpose OCRs. The developed system reads more than
60 digits per second. As shown in the Results section, the accuracy of the devised method is
reasonable enough to be exposed in public use.
An Automatic Question Paper Generation : Using Bloom's TaxonomyIRJET Journal
This document presents a system for automatically generating exam questions and categorizing them according to Bloom's Taxonomy. It uses natural language processing techniques like part-of-speech tagging to analyze questions and identify keywords and verbs. Rules are developed to match question patterns and keywords to the appropriate Bloom's Taxonomy category. A randomization algorithm is also introduced to randomly select questions from the database and avoid repetitions. The system aims to help educators automatically analyze exam questions and ensure a balance of cognitive levels according to Bloom's Taxonomy. Preliminary results found the rules could successfully categorize questions in the test set. The proposed system has applications for educational institutions, universities, and government exams.
IRJET- Stock Market Forecasting Techniques: A SurveyIRJET Journal
This document surveys various techniques for stock market forecasting, including traditional and recent methods using machine learning and artificial intelligence. It discusses techniques like artificial neural networks, hidden Markov models, support vector regression, and deep learning. It also reviews several research papers that have applied methods like ARIMA models, improved Levenberg-Marquardt training for neural networks, feedforward neural networks for the Stock Exchange of Thailand index, improved multiple linear regression in an Android app, support vector regression with windowing operators on the Dhaka Stock Exchange, hidden Markov models compared to neural networks and support vector machines, a hybrid support vector regression and filtering model, and using J48 decision trees and random forests with preprocessing.
Fiducial Point Location Algorithm for Automatic Facial Expression Recognitionijtsrd
We present an algorithm for the automatic recognition of facial features for color images of either frontal or rotated human faces. The algorithm first identifies the sub images containing each feature, afterwards, it processes them separately to extract the characteristic fiducial points. Then Calculate the Euclidean distances between the center of gravity coordinate and the annotated fiducial points coordinates of the face image. A system that performs these operations accurately and in real time would form a big step in achieving a human like interaction between man and machine. This paper surveys the past work in solving these problems. The features are looked for in down sampled images, the fiducial points are identified in the high resolution ones. Experiments indicate that our proposed method can obtain good classification accuracy. D. Malathi | A. Mathangopi | Dr. D. Rajinigirinath ""Fiducial Point Location Algorithm for Automatic Facial Expression Recognition"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21754.pdf
Paper URL: https://www.ijtsrd.com/computer-science/data-miining/21754/fiducial-point-location-algorithm-for-automatic-facial-expression-recognition/d-malathi
A NOVEL FEATURE SET FOR RECOGNITION OF SIMILAR SHAPED HANDWRITTEN HINDI CHARA...cscpconf
This document describes a study that uses machine learning algorithms to recognize similar shaped handwritten Hindi characters. It extracts 85 features from each character image based on geometry. Four machine learning algorithms (Bayesian Network, RBFN, MLP, C4.5 Decision Tree) are trained on datasets containing samples of a target character pair and evaluated based on precision, misclassification rate, and model build time. Feature selection techniques are also used to reduce the feature set dimensionality before classification. Experimental results show that different algorithms perform best depending on the feature set and number of samples used for training.
This paper proposes using fuzzy cognitive maps (FCM) to automatically detect a student's learning style in an adaptive e-learning system based on the Felder-Silverman learning style model. FCM is a soft computing technique that combines fuzzy logic and neural networks. The paper reviews related work on automatic detection of learning styles. It then explains how FCM would be used to model student behaviors and interactions to identify their learning style dimensions. The results of testing this approach are discussed. The overall goal is to personalize the e-learning experience based on a student's detected learning style.
Local feature extraction based facial emotion recognition: A surveyIJECEIAES
This document summarizes a research paper that performed a large-scale evaluation of 46 recent state-of-the-art local binary pattern (LBP) variants for facial expression recognition. Extensive experiments on four benchmark facial expression databases found that some LBP variants achieved promising recognition rates that were better or competitive compared to recent state-of-the-art facial recognition systems, with rates of 100%, 98.57%, 95.92% and 100% on the different databases. The best performing descriptors on each database were then compared to other state-of-the-art facial expression recognition approaches. The evaluation aimed to provide an up-to-date and comprehensive analysis of LBP variants for facial expression recognition given the rapid increase
The document describes a face recognition method that uses wavelet features extracted from images. It divides each face image into 12 blocks and applies discrete wavelet transform to each block. It extracts the mean of the horizontal and vertical wavelet coefficients as features. A neural network is trained on these features from training images and used to recognize faces in test images by classifying the extracted wavelet features.
Pattern Recognition of Japanese Alphabet Katakana Using Airy Zeta FunctionEditor IJCATR
Character recognition is one of common pattern recognition study. There are many object used in pattern recognition, such
as Japanese alphabet character, which is a very complex character compared to common Roman character. This research focus on
pattern recognition of Japanese character handwriting, Katakana. The pattern recognition process of a letter of the alphabet uses Airy
Zeta Function, with its input file is a .bmp file. User can write directly on an input device of the system. The testing of the system
examines 460 letter characters. The first testing that examines 230 characters result in an accuracy of 55,65%, whilst the second testing
that examines 460 characters produces an accuracy of 64,56% in recognizing the letters. These accuracy are much determined by the
quantity of training. The approach of pattern recognition is a statistical approach, where more pattern of letters are trained and saved as
a reference, more intelligent the system . The implementation of Airy zeta function methods in recognizing Japanese letter pattern is
able to produce high accuracy level.
An Optimal Solution to the Linear Programming Problem using Lingo Solver: A Case Study of an
Apparel Production Plant of Sri Lanka.................................................................................................1
Z. A. M. S. Juman and W. B. Daundasekara
Analysis of BT and SMS based Mobile Malware Propagation ................................................................. 16
Prof. R. S. Sonar and Sonal Mohite
Behavioral Pattern of Internet Use among University Students of Pakistan........................................... 25
Amir Manzoor
BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel
.................................................................................................................................................................... 37
Faisal Rasheed Lone and Sanjay Sharma
Harnessing Mobile Technology (MT) to Enhancy the Sustainable Livelihood of Rural Women in
Zimbabwe: Case of Mobile Money Transfer (MMT) ................................................................................ 46
Samuel Musungwini, Tinashe Gwendolyn Zhou, Munyaradzi Zhou, Caroline Ruvinga and Raviro Gumbo
Design and Evaluation of a Comprehensive e-Learning System using the Tools on Web 2.0 ................ 58
Maria Dominic, Anthony Philomenraj and Sagayaraj Francis
Critical Success Factors for the Adoption of School Administration and Management System in South
African Schools ...............................................................................................................................74
Mokwena Nicolas Sello
Efficient and Trust Based Black Hole Attack Detection and Prevention in WSN ................................... 93
Fuzzy modeling require two main steps which are structure identification and parameter optimization, the
first one determines the numbers of membership functions and fuzzy if-then rules, while the second
identifies a feasible set of parameters under the given structure. However, the increase of input dimension,
rule numbers will have an exponential growth and there will cause problem of “rule disaster”. In this
paper, we have applied adaptive network fuzzy inference system ANFIS for phonemes recognition. The
appropriate learning algorithm is performed on TIMIT speech database supervised type, a pre-processing
of the acoustic signal and extracting the coefficients MFCCs parameters relevant to the recognition system.
First learning of the network structure by subtractive clustering, in order to define an optimal structure and
obtain small number of rules, then learning of parameters network by hybrid learning which combine the
gradient decent and least square estimation LSE to find a feasible set of antecedents and consequents
parameters. The results obtained show the effectiveness of the method in terms of recognition rate and
number of fuzzy rules generated.
1. The document presents a methodology for recognizing isolated handwritten Devanagari numerals using structural and statistical features.
2. Key features extracted include whether the numeral has openings on the left, right, above or below, and the number of horizontal and vertical crossings.
3. The methodology achieves an average accuracy of 96.8% on a dataset of 500 numeral images collected from various individuals. Accuracy is highest for numerals 0, 6, 8 and 10 at 100%, while some similar numerals like 3 and 2 see more errors.
INTERVAL TYPE-2 INTUITIONISTIC FUZZY LOGIC SYSTEM FOR TIME SERIES AND IDENTIF...ijfls
This paper proposes a sliding mode control-based learning of interval type-2 intuitionistic fuzzy logic system for time series and identification problems. Until now, derivative-based algorithms such as gradient descent back propagation, extended Kalman filter, decoupled extended Kalman filter and hybrid method of decoupled extended Kalman filter and gradient descent methods have been utilized for the optimization of the parameters of interval type-2 intuitionistic fuzzy logic systems. The proposed model is based on a Takagi-Sugeno-Kang inference system. The evaluations of the model are conducted using both real world and artificially generated datasets. Analysis of results reveals that the proposed interval type-2 intuitionistic fuzzy logic system trained with sliding mode control learning algorithm (derivative-free) do outperforms some existing models in terms of the test root mean squared error while competing favourable with other models in the literature. Moreover, the proposed model may stand as a good choice for real time applications where running time is paramount compared to the derivative-based models.
Neuro-fuzzy inference system based face recognition using feature extractionTELKOMNIKA JOURNAL
Human face recognition (HFR) is the method of recognizing people in images or videos. There are different HFR methods such as feature-based, eigen-faces, hidden markov model and neural network (NN) based methods. Feature extraction or preprocessing used in first three mentioned methods that associated with the category of the image to recognize. While in the NN method, any type of image can be useful without the requirement to particular data about the type of image, and simultaneously provides superior accuracy. In this paper, HFR system based on neural-fuzzy (NF) has been introduced. In the NN system, backpropagation (BP) algorithm is used to update the weights of the neurons through supervised learning. Two sets of the image have been used for training and testing the network to identify the person. If the test image matches to one of the trained sets of the image, then the system will return recognized. And if the test image does not match to one of the trained sets of the image, then the system will return not recognized. The feature extraction methods used in this paper is Geometric moments and Color feature extraction. The recognition rate of 95.556 % has been achieved. The experimental result illustrations that the association of two techniques that provide better accuracy.
This document summarizes a semi-supervised clustering approach for classifying P300 signals for brain-computer interface (BCI) speller systems. It involves using k-means clustering on wavelet features extracted from EEG data, with some data points labeled to initialize the clusters. An ensemble of support vector machines is then trained on the clustered data points to classify new unlabeled P300 signals. The document outlines the P300 speller paradigm used to collect the EEG data, pre-processing steps like filtering and wavelet transformation, the seeded k-means semi-supervised clustering method, and using an ensemble SVM classifier trained on the clustered data for classification.
IRJET- Optical Character Recognition using Neural Networks by Classification ...IRJET Journal
This document proposes a method for optical character recognition (OCR) using neural networks and character classification based on symmetry. It involves three main phases: 1) A classification phase that categorizes training characters by their symmetry properties (vertical, horizontal, total, none), 2) A training phase that trains separate neural networks on each classified group, and 3) A recognition phase that preprocesses documents, extracts lines and characters, and recognizes characters using the trained neural networks. Experimental results show the method achieves up to 99.2% accuracy on Arial font without punctuation, outperforming traditional OCR methods. However, it requires 14.01 seconds for full network training.
Recognition of Facial Emotions Based on Sparse CodingIJERA Editor
This paper deals with acknowledgment of characteristic feelings from human countenances is a fascinating subject with an extensive variety of potential applications like human-PC communication, robotized mentoring frameworks, picture and video recovery, brilliant situations, what's more, driver cautioning frameworks. Generally, facial feeling acknowledgment frameworks have been assessed on lab controlled information, which is not illustrative of the earth confronted in genuine applications. To vigorously perceive facial feelings in genuine regular circumstances, this paper proposes a methodology called Extreme Sparse Learning (ESL), which can mutually take in a word reference (set of premise) and a non-direct grouping model. The proposed approach consolidates the discriminative force of Extreme Learning Machine (ELM) with the reproduction property of meager representation to empower exact arrangement when given uproarious signs and blemished information recorded in common settings. Moreover, this work exhibits another neighborhood spatioworldly descriptor that is particular what's more, posture invariant. The proposed structure can accomplish best in class acknowledgment precision on both acted what's more, unconstrained facial feeling databases.
This document summarizes a research paper that presents a system for automatically counting faces in a classroom using MATLAB. The system first uses frame differencing and morphological processing to detect moving objects and edges. It then applies skin color detection and face feature detection to identify and count human faces in real-time video frames. The system was tested in a classroom environment and achieved accurate counts of students present. It provides an automated alternative to manual counting that saves teacher time and ensures accurate attendance records.
IRJET- Survey on Various Techniques of Attendance marking and Attention D...IRJET Journal
The document summarizes various techniques for automated attendance marking and detecting student attention levels in classrooms. It discusses methods using facial recognition, biometrics, Bluetooth beacons, sensors to track eye movements, posture and brain waves. Researchers have achieved over 95% accuracy using these techniques compared to traditional manual attendance marking methods. The techniques described can save time, reduce human errors and help teachers identify students who are inattentive or not focusing in class.
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniquesijtsrd
Effective software cost estimation is the most challenging and important activities in software development. Developers want a simple and accurate method of efforts estimation. Estimation of the cost before starting of work is a prediction and prediction always not accurate. Software effort estimation is a very critical task in the software engineering and to control quality and efficiency a suitable estimation technique is crucial. This paper gives a review of various available software effort estimation methods, mainly focus on the algorithmic model and non algorithmic model. These existing methods for software cost estimation are illustrated and their aspect will be discussed. No single technique is best for all situations, and thus a careful comparison of the results of several approaches is most likely to produce realistic estimation. This paper provides a detailed overview of existing software cost estimation models and techniques. This paper presents the strength and weakness of various cost estimation methods. This paper focuses on some of the relevant reasons that cause inaccurate estimation. Pa Pa Win | War War Myint | Hlaing Phyu Phyu Mon | Seint Wint Thu "Review on Algorithmic and Non-Algorithmic Software Cost Estimation Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26511.pdfPaper URL: https://www.ijtsrd.com/engineering/-/26511/review-on-algorithmic-and-non-algorithmic-software-cost-estimation-techniques/pa-pa-win
IRJET- Multiple Feature Fusion for Facial Expression Recognition in Video: Su...IRJET Journal
This document discusses multiple feature fusion techniques for facial expression recognition in videos. It reviews existing literature on using features like Histogram of Oriented Gradients from Three Orthogonal Planes (HOG-TOP), geometric warp features, Convolutional Neural Networks (CNNs), Scale Invariant Feature Transform (SIFT) and combining these features through multiple feature fusion to improve facial expression recognition from video sequences. The document also analyzes techniques like HOG-TOP for extracting dynamic textures from videos and geometric features to capture facial configuration changes caused by expressions.
AN EXPERIMENTAL STUDY OF FEATURE EXTRACTION TECHNIQUES IN OPINION MININGijscai
The feature selection or extraction is the most important task in Opinion mining and Sentimental Analysis
(OSMA) for calculating the polarity score. These scores are used to determine the positive, negative, and
neutral polarity about the product, user reviews, user comments, and etc., in social media for the purpose
of decision making and Business Intelligence to individuals or organizations. In this paper, we have
performed an experimental study for different feature extraction or selection techniques available for
opinion mining task. This experimental study is carried out in four stages. First, the data collection process
has been done from readily available sources. Second, the pre-processing techniques are applied
automatically using the tools to extract the terms, POS (Parts-of-Speech). Third, different feature selection
or extraction techniques are applied over the content. Finally, the empirical study is carried out for
analyzing the sentiment polarity with different features.
IRJET - A Review on: Face Recognition using LaplacianfaceIRJET Journal
This document reviews face recognition using LaplacianFace, an appearance-based method that maps face images into a subspace using Locality Preserving Projections (LPP) to analyze local information and detect essential face manifold structure. The Laplacianfaces are optimal linear approximations of the eigenfunctions of the Laplace Beltrami operator on the face manifold, which can eliminate unwanted variations from lighting, expression, and pose. The paper compares LaplacianFace to Eigenface and Fisherface methods on three datasets, finding Laplacianface provides better representation and lower error rates. It also surveys related work applying PCA, LDA, LPP and other techniques to challenges like single image training and discusses the LaplacianFace method's modules for loading images, res
Automatically Estimating Software Effort and Cost using Computing Intelligenc...cscpconf
In the IT industry, precisely estimate the effort of each software project the development cost
and schedule are count for much to the software company. So precisely estimation of man
power seems to be getting more important. In the past time, the IT companies estimate the work
effort of man power by human experts, using statistics method. However, the outcomes are
always unsatisfying the management level. Recently it becomes an interesting topic if computing
intelligence techniques can do better in this field. This research uses some computing
intelligence techniques, such as Pearson product-moment correlation coefficient method and
one-way ANOVA method to select key factors, and K-Means clustering algorithm to do project
clustering, to estimate the software project effort. The experimental result show that using
computing intelligence techniques to estimate the software project effort can get more precise
and more effective estimation than using traditional human experts did
Progression in Large Age-Gap Face VerificationIRJET Journal
1. The document discusses progression in large age-gap face verification. It summarizes various techniques used for face recognition from conventional methods to deep neural networks.
2. A typical face recognition system includes image acquisition, face detection, normalization, feature extraction, and then matching. The document reviews several feature extraction methods like Eigenfaces, Fisherfaces, and local binary patterns.
3. Recent deep learning approaches like convolutional neural networks have improved face recognition accuracy. One study used CNNs with metric learning and achieved high accuracy on the Labeled Faces in the Wild dataset. Encoding image microstructures and identity factor analysis has also been effective for matching similar faces.
An Experimental Study of Feature Extraction Techniques in Opinion MiningIJSCAI Journal
This document summarizes an experimental study on different feature extraction techniques for opinion mining and sentiment analysis. The study used a freely available dataset containing 200 reviews from TripAdvisor. Various feature extraction methods were applied, including part-of-speech tags, entities, phrases, document-level features, and term weighting. The results found that term frequency-inverse document frequency (tf-idf) weighting at the single word and multi-word levels achieved the highest accuracy of 98.36% and 98.26% respectively. Overall accuracy across the different feature sets ranged from 95.91% to 98.36%. The study aims to evaluate different feature extraction methods for sentiment classification tasks in opinion mining.
The feature selection or extraction is the most important task in Opinion mining and Sentimental Analysis
(OSMA) for calculating the polarity score. These scores are used to determine the positive, negative, and
neutral polarity about the product, user reviews, user comments, and etc., in social media for the purpose
of decision making and Business Intelligence to individuals or organizations. In this paper, we have
performed an experimental study for different feature extraction or selection techniques available for
opinion mining task. This experimental study is carried out in four stages. First, the data collection process
has been done from readily available sources. Second, the pre-processing techniques are applied
automatically using the tools to extract the terms, POS (Parts-of-Speech). Third, different feature selection
or extraction techniques are applied over the content. Finally, the empirical study is carried out for
analyzing the sentiment polarity with different features.
IRJET- Facial Emotion Detection using Convolutional Neural NetworkIRJET Journal
The document describes a study that aims to design a convolutional neural network (CNN) model to classify facial expressions in images into seven emotions (angry, disgust, fear, happy, sad, surprise, neutral) using deep learning techniques. The proposed CNN architecture contains five convolutional layers and five max pooling layers, along with two fully connected layers and a softmax output layer. The model is trained and evaluated on the FER-2013 dataset from Kaggle, achieving an accuracy of 65.34%. The goal of the research is to develop a model that can automatically and accurately detect emotions from facial expressions using CNNs.
IRJET- Emotion Recognition using Facial ExpressionIRJET Journal
This document discusses emotion recognition using facial expressions. It begins with an introduction to how facial expressions are an important mode of human communication and expression of emotions. It then discusses previous work in recognizing basic emotions like happiness, sadness, anger, etc. from facial features. The proposed system uses the Inception V3 model with transfer learning and the CK+ dataset to classify images into seven emotion categories. The results found high accuracy in classifying emotions from facial images.
Detection of Attentiveness from Periocular InformationIRJET Journal
This document presents an approach to detect attentiveness from the periocular region surrounding the eyes. It first detects faces in an image using a classifier trained on facial features. It then isolates the periocular region by reducing the height of the bounding box around the detected face. Features are extracted from the periocular region using HOG descriptors and fed into an SVM classifier trained to identify attentiveness. The approach aims to predict attentiveness with minimal computational cost by focusing analysis on the periocular region rather than full face recognition or extensive image processing.
Analysis of student sentiment during video class with multi-layer deep learni...IJECEIAES
The modern education system is an essential part of the rise of technology. The E-learning education system is not just an experimental system; it is a vital learning system for the whole world over the last few months. In our research, we have developed our learning method in a more effective and modern way for students and teachers. For significant implementation, we are implementing convolutions neural networks and advanced data classifiers. The expression and mood analysis of a student during the online class is the main focus of our study. For output measure, we divide the final output result as attentive, inattentive, understand, and neutral. Showing the output in real-time online class and for sensory analysis, we have used support vector machine (SVM) and OpenCV. The level of 5*4 neural network is created for this work. An advanced learning medium is proposed through our study. Teachers can monitor the live class and different feelings of a student during the class period through this system.
Development and Evaluation of an Employee Performance Appraisal Insight Repor...IRJET Journal
This document describes research on developing a software tool called E-Perform that uses fuzzy inference techniques and natural language generation to generate narrative employee performance evaluation reports. The software allows managers to rate employees on various criteria. It then analyzes the data and generates insight reports on each employee's strengths, weaknesses and recommendations. The reports are evaluated for correctness and the software's acceptability is assessed through surveys. Results found the reports were 60.9% correct on average and the software was deemed useful, functional and user-friendly by managers. It is recommended to enhance the software with natural language processing to allow open-ended evaluator comments.
IRJET- Aspect based Sentiment Analysis on Financial Data using Transferred Le...IRJET Journal
This document presents an approach for aspect classification and sentiment prediction on financial data using transferred learning with BERT and regression models. The authors fine-tune BERT for aspect classification and use linear support vector regression for sentiment prediction, achieving an F1-score of 0.46-0.41 for aspect classification and MSE of 0.36-0.13 for sentiment prediction on the test data. They conclude BERT transfer learning is effective for this task and future work could explore other models like XLNet and larger datasets.
Face recognition for presence system by using residual networks-50 architectu...IJECEIAES
Presence system is a system for recording the individual attendance in the company, school or institution. There are several types presence system, including the manually presence system using signatures, presence system using fingerprints and presence system using face recognition technology. Presence system using face recognition technology is one of presence system that implements biometric system in the process of recording attendance. In this research we used one of the convolutional neural network (CNN) architectures that won the imagenet large scale visual recognition competition (ILSVRC) in 2015, namely the Residual Networks-50 architecture (ResNet-50) for face recognition. Our contribution in this research is to determine effectiveness ResNet architecture with different configuration of hyperparameters. This hyperparameters includes the number of hidden layers, the number of units in the hidden layer, batch size, and learning rate. Because hyperparameter are selected based on how the experiments performed and the value of each hyperparameter affects the final result accuracy, so we try 22 configurations (experiments) to get the best accuracy. We conducted experiments to get the best model with an accuracy of 99%.
Statistical learning theory provides a framework for machine learning that draws from statistics and functional analysis. It deals with finding predictive functions based on data. Supervised learning involves learning from input-output pairs in a training data set to infer the function that maps inputs to outputs. The goals of learning are understanding relationships and enabling prediction. Statistical learning in R can perform regression for continuous outputs or classification for discrete outputs. It is commonly used in fields like computer vision, speech recognition, and bioinformatics.
Student Attendance Using Face RecognitionIRJET Journal
This document describes a student attendance system using face recognition from group photos. The system works by taking a single group photo of students, detecting faces using a Haar cascade classifier, and recognizing faces to match them to student profiles stored in a database. The recognized student names are then marked as present in a Google Sheet for attendance tracking. The system provides a more efficient alternative to manual attendance marking and avoids costs of individual cameras. Face recognition is performed using the LBPH algorithm to extract face features and compare them to the training database for matching. The target is to complete attendance marking from a single group photo in under 30 seconds for ease of use.
New Fuzzy Model For quality evaluation of e-Training of CNC Operatorsinventionjournals
The quality of e-learning is a very important issue, especially when production technologies are concerned. This paper introduces a new fuzzy model for e-learning quality evaluation. All uncertainties and consequent imprecision are modeled by triangular fuzzy numbers. The quality of CNC e-learning process is determined by using the fuzzy logic IF-THEN rules. The proposed method derives an aggregated satisfaction value both for the participants as well as the trainers.The authors introduce a genuine metric interval for the objective evaluation of E-learning effect. The OLS regression model estimates the magnitude and polarity of Elearning effect on participants` perception of the training quality. The predicted coefficient of E-learning effect on the overall quality of CNC training is estimated to be14.88 measurement points with a negative impact on overall satisfaction. These novel findings shed a new light on the quantitative effect of E-learning on CNC machine training and contribute to the contemporary scientific literature within the research area.The developed model is illustrated by real-life data from secondary technological schools from central Serbia
Similar to A Hybrid method of face detection based on Feature Extraction using PIFR and Feature Optimization using TLBO (20)
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
A Hybrid method of face detection based on Feature Extraction using PIFR and Feature Optimization using TLBO
1. Kapil Verma et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.145-150
www.ijera.com 145 | P a g e
A Hybrid method of face detection based on Feature Extraction
using PIFR and Feature Optimization using TLBO
Kapil Verma*, Akash Mittal**, Yogendra Kumar Jain***
*Department of Computer Science, Samrat Ashok Technological Institute, Vidisha, M.P, India
** Department of Computer Science, Samrat Ashok Technological Institute, Vidisha, M.P, India
***Department of Computer Science, Samrat Ashok Technological Institute, Vidisha, M.P, India
ABSTRACT
In this paper we proposed a face detection method based on feature selection and feature optimization. Now in
current research trend of biometric security used the process of feature optimization for better improvement of
face detection technique. Basically our face consists of three types of feature such as skin color, texture and
shape and size of face. The most important feature of face is skin color and texture of face. In this detection
technique used texture feature of face image. For the texture extraction of image face used partial feature
extraction function, these function is most promising shape feature analysis. For the selection of feature and
optimization of feature used multi-objective TLBO. TLBO algorithm is population based searching technique
and defines two constraints function for the process of selection and optimization. The proposed algorithm of
face detection based on feature selection and feature optimization process. Initially used face image data base
and passes through partial feature extractor function and these transform function gives a texture feature of face
image. For the evaluation of performance our proposed algorithm implemented in MATLAB 7.8.0 software and
face image used provided by Google face image database. For numerical analysis of result used hit and miss
ratio. Our empirical evaluation of result shows better prediction result in compression of PIFR method of face
detection.
Keywords - Feature extraction, Face recognition system, pattern recognition, TLBO
I. INTRODUCTION
In recent years, face recognition has attracted
much attention and its research has rapidly expanded
by not only engineers but also neuroscientists, since
it has many potential applications in computer vision
communication and automatic access control system.
Especially, face detection is an important part of
face recognition as the first step of automatic face
recognition [12]. However, face detection is not
straightforward because it has lots of variations of
image appearance, such as pose variation (front,
non-front), occlusion, image orientation,
illuminating condition and facial expression. Many
novel methods have been proposed to resolve each
variation listed above. For example, the template-
matching methods are used for face localization and
detection by computing the correlation of an input
image to a standard face pattern [4]. The face is our
primary focus of attention in social life playing an
important role in conveying identity and emotions.
Face recognition systems have gained a great deal of
popularity due to the wide range of applications that
they have proved to be useful in. Broadly, two main
categories for these applications exist: commercial
applications and research applications. From a
commercial standpoint, face recognition is practical
in security systems for law enforcement situations. It
is in places like airports and international borders
that the need arises for a face recognition system that
identifies individuals. Another application of face
recognition is the protection of privacy, obviating
the need for exchanging sensitive personal
information. Instead, a computer-based face
recognition system would provide sufficient
identification. For instance, PIN numbers, user ID‟s,
and passwords would be replaced by face
recognition in order to unify personal identification.
Finally, face recognition systems can be used for
entertainment purposes in areas like video games
and virtual reality [1].
Figure 1: Configuration of general face detection
structure.
RESEARCH ARTICLE OPEN ACCESS
2. Kapil Verma et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.145-150
www.ijera.com 146 | P a g e
Figure 2: Applications of face recognition.
Section-II gives the information of about feature of
face image. In section III discuss the method of face
recognition. In section IV discuss the proposed
method. In section V comparative result finally, in
section VI conclusion and future scope.
II FEATURE OF FACE IMAGE
Feature extraction process play important role in
face detection and pattern detection system based
authentication mechanism. The goal of feature
extraction is to find a specific representation of the
data that can highlight relevant information [7]. This
representation can be found by maximizing a
criterion or can be a pre-defined representation.
Usually, a face image is represented by a high
dimensional vector containing pixel values (holistic
representation) or a set of vectors where each vector
summarizes the underlying content of a local region
by using a high level transformation (local
representation). In this section we made distinction
in the holistic and local feature extraction and
differentiate them qualitatively as opposed to
quantitatively. It is argued that a global feature
representation based on local feature analysis should
be preferred over a bag-of-feature approach. The
problems in current feature extraction techniques
and their reliance on a strict alignment is discussed.
Finally we introduce to use face-GLOH signatures
that are invariant with respect to scale, translation
and rotation and therefore do not require properly
aligned images. The resulting dimensionality of the
vector is also low as compared to other commonly
used local features such as Gabor, Local Binary
Pattern Histogram „LBP‟ etc. and therefore learning
based methods can also benefit from it [9].
TEACHER LEARNING BASED
OPTIMIZATION
This optimization method is based on the effect
of the influence of a teacher on the output of learners
in a class. It is a population based method and like
other population based methods it uses a population
of solutions to proceed to the global solution. A
group of learners constitute the population in TLBO
[11]. In any optimization algorithms there are
numbers of different design variables. The different
design variables in TLBO are analogous to different
subjects offered to learners and the learners‟ result is
analogous to the „fitness‟, as in other population-
based optimization techniques. As the teacher is
considered the most learned person in the society,
the best solution so far is analogous to Teacher in
TLBO. The process of TLBO is divided into two
parts. The first part consists of the “Teacher phase”
and the second part consists of the “Learner phase”.
The “Teacher phase” means learning from the
teacher and the “Learner phase” means learning
through the interaction between learners. In the sub-
sections below we briefly discuss the
implementation of TLBO.
Initialization
Following are the notations used for describing the
TLBO
N: number of learners in class i.e. “class size”
D: number of courses offered to the learners
MAXIT: maximum number of allowable iterations
The population X is randomly initialized by a search
space bounded by matrix of N rows and D columns.
The jth parameter of the ith learner is assigned
values randomly using the equation
Where rand represents a uniformly distributed
random variable within the range (0, 1), xmin j and
xmaxj represent the minimum and maximum value
for jth parameter. The parameters of ith learner for
the generation g are given by
III.1 Teacher phase
The mean parameter Mg of each subject of the
learners in the class at generation g is given as
The learner with the minimum objective function
value is considered as the teacher Xg Teacher for
respective iteration. The Teacher phase makes the
algorithm proceed by shifting the mean of the
learners towards its teacher. To obtain a new set of
improved learners a random weighted differential
vector is formed from the current mean and the
desired mean parameters and added to the existing
population of learners.
TF is the teaching factor which decides the value of
mean to be changed. Value of TF can be either 1 or
2. The value of TF is decided randomly with equal
probability as,
Where TF is not a parameter of the TLBO algorithm.
The value of TF is not given as an input to the
3. Kapil Verma et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.145-150
www.ijera.com 147 | P a g e
algorithm and its value is randomly decided by the
algorithm using Eq. (5). After conducting a number
of experiments on many benchmark functions it is
concluded that the algorithm performs better if the
value of TF is between 1 and 2. However, the
algorithm is found to perform much better if the
value of TF is either 1 or 2 and hence to simplify the
algorithm, the teaching factor is suggested to take
either 1 or 2 depending on the rounding up criteria
given by Eq. (5). If Xnew is found to be a superior
learner than Xg in generation g , than it replaces
inferior learner Xg in the matrix.
III.2 Learner phase
In this phase the interaction of learners with one
another takes place. The process of mutual
interaction tends to increase the knowledge of the
learner. The random interaction among learners
improves his or her knowledge. For a given learner
Xg , another learner Xg is randomly selected (i ≠ r).
The ith parameter of the matrix Xnew in the learner
phase is given as
III PARTIAL FEATURE EXTRACTION
TECHNIQUE
Partial feature extraction process in image
database is comprised of image rotation invariant
process through sine and cosine transform function.
In this technique used sin function, cosine function
and tangential function for partial feature extraction
are used based on boundary value of image [41]. The
given image is divided into three section such as
hypotenuse, opposite and adjustment for finding of
three parameters hypotenuse, opposite and
adjustment, before applying edge detection
technique for getting X and Y parameter in the plane
for better continuity of edge detection used in many
edge detection methods. Now process of all derivate
is explained using a formula.
Figure 1: Shows that circular image and divide
this image into three sections X, Y and H
Process of feature extraction using triangular
formula of image.
Apply canny edge detection method for finding
boundary value of image
After that find the centred point of boundary value
of shape.
Find the Xc and Yc as
Xc= ........................(1)
Yc= ........................(2)
After getting a value of (Xc and Yc)
H=
After getting a value of H apply sine, cosine and
tangent function for shape of boundary
Sin=Xc/H and cosine =Yc/H and tangent = Yc/Xc
After getting of sin ,cosine and tangent , find three
consecutive matrix of shape
All three shape parameter match the boundary value
of feature.
All matched value create a feature matrix
All feature of parameter converted into feature
vector.
IV PROPOSED METHOD
In this section discuss the proposed algorithm of
face detection based on feature selection and feature
optimization process. Initially used face image data
base and passes through partial feature extractor and
this feature extractor gives a shape feature of face
image database. The extracted shape feature passes
through TLBO algorithm and selects the proper
feature and optimized the feature and finally passes
through the support vector machine for classification
of feature and finally detected the face and calculates
the hit and miss ratio of detected face. The process
of algorithm discuss step by step in below section.
1. Select data set for feature extraction
2. apply partial feature extractor
3. Start generation of feature matrix in terms
of shape feature.
4. convert feature matrix as row wise and
make vector of these feature
5. Initialized a number of student feature
N=100
6. Compare the value of distance vector with
student
7. If value of feature greater than vector value
8. Processed for new set of student
9. Check the value of teacher factor value
TF=1
10. After that generate new set of teacher.
11. These optimal value of teacher is passes
through SVM
12. If the value of shape not classified go to the
selection process of TLBO
13. Else optimized classified shape is
generated.
14. the optimized shape feature passes through
the liner support vector machine
4. Kapil Verma et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.145-150
www.ijera.com 148 | P a g e
15. support vector machine classified the shape
value
16. finally detected the face
17. calculate the hit and miss ratio of input
image
18. Exit.
Figure 3: Block diagram of proposed model.
V EXPERIMENTAL RESULT ANALYSIS
To evaluate the performance of proposed
method of Face detection we have use MATLAB
software 7.8.0 with a variety of group image dataset
used for experimental task.
Figure 4: Shows that the input image 1 for face
detection.
Figure 5: Shows that the result image 1 for face
detection using PIFR method.
Group
image
Name
Method Total
no of
face
hit miss Detection
ratio
%
Group
image
1
PIFR 20 18 2 90
Proposed 20 19 1 95
Table 1: Shows that the comparative study for
group image 1 with using PIFR and proposed
method.
Figure 6: Shows that the Comparative result
graph for group image 1 and find the no. of
person in an image, hit ratio, miss ratio and
detection ratio on the basis of PIFR and our
proposed method, then we find that the our
proposed method result is always better than the
PIFR method.
5. Kapil Verma et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.145-150
www.ijera.com 149 | P a g e
Figure 7: Shows that the Comparative result
graph for group image 2 and find the no. of
person in an image, hit ratio, miss ratio and
detection ratio on the basis of PIFR and our
proposed method, then we find that the our
proposed method result is always better than the
PIFR method.
VI CONCLUSION AND FUTURE WORK
In this paper we improved Face Detection
System using partial feature extractor and features
selection process by TLBO algorithm. After
extraction of feature of face used feature
optimizations technique for better selection of
feature. The localized face image is transformed
from layered form of transform function for
extraction of facial feature. The optimized feature
selection process gives better result in compression
of PIFR and support vector machine based detection
technique. In the process of feature extraction we
used partial feature extraction function, partial
feature extraction process implied as shape feature.
The proposed method work in two phases in first
phase used feature optimization and second phase
used face detection. For the selection of feature and
optimization of used two different functions in
TLBO algorithm, the selection of feature process
satisfied the given condition of feature constraints
then select feature and passes through matching of
feature for the process of optimization. The proposed
algorithm implemented in MATLAB software and
used standard face image provided by Google
database. For empirical evaluation used hit ratio and
miss ratio of face image in given dataset. The
detection of hit ratio is better in case of PIFR
method. The proposed algorithm for face detection is
very efficient in case of individual as well as group
face. The proposed algorithm used partial feature
extractor function with TLBO algorithm. The
process of feature optimization and feature selection
is very complex for two different constraints
function of optimization and detection. The
optimization and detection increase the time
complexity but incase the value of hit ratio. In future
reduces the time complexity of proposed algorithm
and improved the efficiency of overall system.
REFERENCES
[1] Huy Tho Ho, Rama Chellappa “Pose-
Invariant Face Recognition Using Markov
Random Fields” IEEE TRANSACTIONS ON
IMAGE PROCESSING, VOL- 22, 2013. Pp
1573-1584.
[2] Meng Yang, Lei Zhang, Simon Chi-Keung
Shiu, David Zhang “Robust Kernel
Representation With Statistical Local
Features for Face Recognition” IEEE
TRANSACTIONS ON NEURAL
NETWORKS AND LEARNING SYSTEMS,
VOL-24, 2013. Pp 900-912.
[3] jiwen Lu, Yap-Peng Tan, Gang Wang and
Gao Yang “Image-to-Set Face Recognition
Using Locality Repulsion Projections and
Sparse Reconstruction-Based Similarity
Measure” IEEE TRANSACTIONS ON
CIRCUITS AND SYSTEMS FOR VIDEO
TECHNOLOGY, VOL. 23, 2013. Pp 1070-
1080.
[4] B. Cheng, J. Yang, S. Yan, Y. Fu, and T.
Huang “Learning with l1-graph for image
analysis” IEEE Trans. Image Process., vol.
19, no. 4,pp. 858–866, Apr. 2010.
[5] W. Deng, J. Hu, and J. Guo “Extended SRC:
Undersampled face recognition via intra-class
variant dictionary” IEEE Trans. Pattern Anal.
Mach. Intell., vol. 34, no. 9, pp. 1864–1870,
Sep. 2012.
[6] W. Deng, J. Hu, J. Guo, W. Cai, and D. Feng
“Robust, accurate and efficient face
recognition from a single training image: A
uniform pursuit approach” Pattern Recognit.,
vol. 43, no. 5, pp. 1748–1762, 2010.
[7] Y. Fu, S. Yan, and T. S. Huang
“Classification and feature extraction by
simplexization” IEEE Trans. Inform.
Forensics Security, vol. 3, no. 1, pp. 91–100,
Mar. 2008.
[8] Q. Gao, L. Zhang, and D. Zhang “Face
recognition using FLDA with single training
image per person” Appl. Math. Comput., vol.
205, no. 2, pp. 726–734, 2008.
[9] R. Gottumukkal and V. Asari “An improved
face recognition technique based on modular
PCA approach” Pattern Recognit. Lett., vol.
25, no. 4, pp. 429–436, 2004.
[10] M. Harandi, A. Bigdeli, and B. Lovell
“Image-set face recognition based on
transductive learning” in Proc. IEEE Int.
Conf. Image Process., Sep. 2010, pp. 2425–
2428.
6. Kapil Verma et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 1, (Part - 4) January 2016, pp.145-150
www.ijera.com 150 | P a g e
[11] X. He, D. Cai, S. Yan, and H. Zhang
“Neighborhood preserving embedding” in
Proc. IEEE Int. Conf. Comput. Vision, Oct.
2005, pp. 1208–1213.
[12] X. He, S. Yan, Y. Hu, P. Niyogi, and H. J.
Zhang “Face recognition using
Laplacianfaces” IEEE Trans. Pattern Anal.
Mach. Intell., vol. 27, no. 3, pp. 328–340,
Mar. 2005.
[13] H. Hu, “Orthogonal neighborhood preserving
discriminant analysis for face recognition,”
Pattern Recognit., vol. 41, no. 6, pp. 2045–
2054, 2008.
[14] G. Huang, M. Ramesh, T. Berg, and E.
Learned-Miller “Labeled faces in the wild”
Univ. Massachusetts, Amherst, USA, Tech.
Rep. TR 07-49, 2007.
[15] Liu, C. and Wechsler, H. (2002). “Gabor
feature based classification using the
enhanced fisher linear discriminant model for
face recognition” Image processing, IEEE
Transactions on 11:467-476.
[16] Romby, H.A, Baluja, S. and Kanade T.
(1998). “Neural network based face
detection”. Pattern Analysis and Machine
Intelligence, IEEE Transactions on 20:23-38.
[17] D. Hill, C. Studholme, and D. Hawkes,
“Voxel similarity measuresfor automated
image registration”, in Proceedings of Third
SPIEConference on Visualization in
Biomedical Computing,1994, pp. 205–216.
[18] F. Maesa, A. Collignon, D. Vandermeulen, G.
Marchal, and P. Suetens, “Multimodality
image registration by maximization of mutual
information”,IEEE Transactions on Medical
Imaging, vol. 6, no. 2, pp.187–198, 1997.