This document summarizes a research paper that proposes an approach for face recognition under varying image resolutions using normalized feature representation and resolution mapping. The approach uses SVD for eigenface extraction and feature representation. It then proposes a novel method to optimize feature representation under different scales by developing scale-mapped features (SMF) that maximize correlation between original and scaled training features. A normalization approach is also presented to represent face features uniformly despite illumination and expression variations. Experimental results on the YALE face dataset show improved recognition accuracy under varying scaling conditions using this approach.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Study on Face Recognition Technique based on Eigenfacesadique_ghitm
This document summarizes a study on face recognition techniques based on eigenfaces. It discusses principal component analysis (PCA) as a common approach for face recognition. PCA is used to extract principal components or eigenvectors from a collection of face images, which characterize variations between faces. These eigenvectors are called "eigenfaces" and can be used to encode and compare faces. The document evaluates PCA face recognition on four different image databases to test the robustness of the approach under different image types, formats, and compositions.
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodIRJET Journal
This document proposes a hybrid approach for facial image recognition using feature extraction and classification methods. It will use Principal Component Analysis (PCA) for feature extraction to reduce the dimensionality of feature vectors and select the most important features. This will be followed by Support Vector Machine (SVM) classification to classify facial images. PCA is applied to eigenfaces derived from facial training images to form a feature space. Test images are projected into this space and classified by SVM based on distance between their eigenvectors and stored eigenvectors. The approach aims to improve classification accuracy over other methods by combining effective feature extraction and classification.
Data Mining - Facial Expression RecognitionArshiaSali1
Automatic Facial Expression Recognition by employing motion vector features (deformation generated on a face during a facial expression) used as our data. Some of the most
state-of-the-art classification algorithms such as C5.0, CRT,
QUEST, CHAID, Deep Learning (DL), SVM and Discriminant
algorithms are used to classify the extracted motion vectors.
This document summarizes a research paper on face recognition using Gabor features and PCA. It begins with an introduction to face recognition and discusses challenges like lighting, pose, and orientation. It then describes how the proposed system uses Gabor wavelets for preprocessing to reduce variations from pose, lighting, etc. Principal component analysis (PCA) is used to extract low dimensional and discriminating feature vectors from the preprocessed images. These feature vectors are then used for classification with k-nearest neighbors. The proposed system was tested on the Yale face database containing 100 images of 10 subjects with variable illumination and expressions.
This document reviews techniques for emotion recognition from facial expressions. It begins by outlining the general steps of emotion recognition systems as face detection, feature extraction, and classification. Popular techniques discussed include principal component analysis (PCA), local binary patterns (LBP), active appearance models, and Haar classifiers. PCA and LBP were found to provide higher recognition rates. The paper also reviews the Facial Action Coding System and compares the performance of different techniques based on recognition rate. In conclusion, PCA is identified as having the highest recognition rate and performance for emotion recognition.
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...CSCJournals
Facial Expression Recognition is one of the exciting and challenging field; it has important applications in many areas such as data driven animation, human computer interaction and robotics. Extracting effective features from the human face is an important step for successful facial expression recognition. In this paper we have evaluated Local Binary Patterns of some important parts of human face, for person independent as well as person dependent facial expression recognition. Extensive experiments on JAFFE database are conducted. The experiment results show that person dependent method is highly accurate and outperform many existing methods.
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION sipij
Face image is an efficient biometric trait to recognize human beings without expecting any co-operation from a person. In this paper, we propose HVDLP: Horizontal Vertical Diagonal Local Pattern based face recognition using Discrete Wavelet Transform (DWT) and Local Binary Pattern (LBP). The face images of different sizes are converted into uniform size of 108×990and color images are converted to gray scale images in pre-processing. The Discrete Wavelet Transform (DWT) is applied on pre-processed images and LL band is obtained with the size of 54×45. The Novel concept of HVDLP is introduced in the proposed method to enhance the performance. The HVDLP is applied on 9×9 sub matrix of LL band to consider HVDLP coefficients. The local Binary Pattern (LBP) is applied on HVDLP of LL band. The final features are generated by using Guided filters on HVDLP and LBP matrices. The Euclidean Distance (ED) is used to compare final features of face database and test images to compute the performance parameters.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A Study on Face Recognition Technique based on Eigenfacesadique_ghitm
This document summarizes a study on face recognition techniques based on eigenfaces. It discusses principal component analysis (PCA) as a common approach for face recognition. PCA is used to extract principal components or eigenvectors from a collection of face images, which characterize variations between faces. These eigenvectors are called "eigenfaces" and can be used to encode and compare faces. The document evaluates PCA face recognition on four different image databases to test the robustness of the approach under different image types, formats, and compositions.
A Hybrid Approach to Recognize Facial Image using Feature Extraction MethodIRJET Journal
This document proposes a hybrid approach for facial image recognition using feature extraction and classification methods. It will use Principal Component Analysis (PCA) for feature extraction to reduce the dimensionality of feature vectors and select the most important features. This will be followed by Support Vector Machine (SVM) classification to classify facial images. PCA is applied to eigenfaces derived from facial training images to form a feature space. Test images are projected into this space and classified by SVM based on distance between their eigenvectors and stored eigenvectors. The approach aims to improve classification accuracy over other methods by combining effective feature extraction and classification.
Data Mining - Facial Expression RecognitionArshiaSali1
Automatic Facial Expression Recognition by employing motion vector features (deformation generated on a face during a facial expression) used as our data. Some of the most
state-of-the-art classification algorithms such as C5.0, CRT,
QUEST, CHAID, Deep Learning (DL), SVM and Discriminant
algorithms are used to classify the extracted motion vectors.
This document summarizes a research paper on face recognition using Gabor features and PCA. It begins with an introduction to face recognition and discusses challenges like lighting, pose, and orientation. It then describes how the proposed system uses Gabor wavelets for preprocessing to reduce variations from pose, lighting, etc. Principal component analysis (PCA) is used to extract low dimensional and discriminating feature vectors from the preprocessed images. These feature vectors are then used for classification with k-nearest neighbors. The proposed system was tested on the Yale face database containing 100 images of 10 subjects with variable illumination and expressions.
This document reviews techniques for emotion recognition from facial expressions. It begins by outlining the general steps of emotion recognition systems as face detection, feature extraction, and classification. Popular techniques discussed include principal component analysis (PCA), local binary patterns (LBP), active appearance models, and Haar classifiers. PCA and LBP were found to provide higher recognition rates. The paper also reviews the Facial Action Coding System and compares the performance of different techniques based on recognition rate. In conclusion, PCA is identified as having the highest recognition rate and performance for emotion recognition.
Recognition of Facial Expressions using Local Binary Patterns of Important Fa...CSCJournals
Facial Expression Recognition is one of the exciting and challenging field; it has important applications in many areas such as data driven animation, human computer interaction and robotics. Extracting effective features from the human face is an important step for successful facial expression recognition. In this paper we have evaluated Local Binary Patterns of some important parts of human face, for person independent as well as person dependent facial expression recognition. Extensive experiments on JAFFE database are conducted. The experiment results show that person dependent method is highly accurate and outperform many existing methods.
HVDLP : HORIZONTAL VERTICAL DIAGONAL LOCAL PATTERN BASED FACE RECOGNITION sipij
Face image is an efficient biometric trait to recognize human beings without expecting any co-operation from a person. In this paper, we propose HVDLP: Horizontal Vertical Diagonal Local Pattern based face recognition using Discrete Wavelet Transform (DWT) and Local Binary Pattern (LBP). The face images of different sizes are converted into uniform size of 108×990and color images are converted to gray scale images in pre-processing. The Discrete Wavelet Transform (DWT) is applied on pre-processed images and LL band is obtained with the size of 54×45. The Novel concept of HVDLP is introduced in the proposed method to enhance the performance. The HVDLP is applied on 9×9 sub matrix of LL band to consider HVDLP coefficients. The local Binary Pattern (LBP) is applied on HVDLP of LL band. The final features are generated by using Guided filters on HVDLP and LBP matrices. The Euclidean Distance (ED) is used to compare final features of face database and test images to compute the performance parameters.
This document provides a literature review of various techniques for automatic facial expression recognition. It discusses approaches such as principal component analysis (PCA), linear discriminant analysis (LDA), independent component analysis (ICA), 2D PCA, global eigen approaches using color images, subpattern extended 2D PCA, multilinear image analysis, color subspace LDA, 2D Gabor filter banks, and local Gabor binary patterns. It provides a table comparing the performance and disadvantages of these different methods. Recently, tensor perceptual color frameworks have been introduced that apply tensor concepts and perceptual color spaces to improve recognition performance under varying illumination conditions.
A novel approach for performance parameter estimation of face recognition bas...IJMER
This document presents a novel approach for face recognition based on clustering, shape detection, and corner detection. The approach first clusters face key points and applies shape and corner detection methods to detect the face boundary and corners. It then performs both face identification and recognition on a large face database. The method achieves lower false acceptance rates, false rejection rates, and equal error rates compared to previous works, and also calculates recognition time. It provides a concise 3-sentence summary of the key aspects of the document.
FACIAL LANDMARKING LOCALIZATION FOR EMOTION RECOGNITION USING BAYESIAN SHAPE ...cscpconf
This work presents a framework for emotion recognition, based in facial expression analysis using Bayesian Shape Models (BSM) for facial landmarking localization. The Facial Action Coding System (FACS) compliant facial feature tracking based on Bayesian Shape Model. The BSM estimate the parameters of the model with an implementation of the EM algorithm. We describe the characterization methodology from parametric model and evaluated the accuracy for feature detection and estimation of the parameters associated with facial expressions, analyzing its robustness in pose and local variations. Then, a methodology for emotion characterization is introduced to perform the recognition. The experimental results show that the proposed model can effectively detect the different facial expressions. Outperforming conventional approaches for emotion recognition obtaining high performance results in the estimation of emotion present in a determined subject. The model used and characterizationmethodology showed efficient to detect the emotion type in 95.6% of the cases.
Facial landmarking localization for emotion recognition using bayesian shape ...csandit
This work presents a framework for emotion recognition, based in facial expression analysis
using Bayesian Shape Models (BSM) for facial landmarking localization. The Facial Action
Coding System (FACS) compliant facial feature tracking based on Bayesian Shape Model. The
BSM estimate the parameters of the model with an implementation of the EM algorithm. We
describe the characterization methodology from parametric model and evaluated the accuracy
for feature detection and estimation of the parameters associated with facial expressions,
analyzing its robustness in pose and local variations. Then, a methodology for emotion
characterization is introduced to perform the recognition. The experimental results show that
the proposed model can effectively detect the different facial expressions. Outperforming
conventional approaches for emotion recognition obtaining high performance results in the
estimation of emotion present in a determined subject. The model used and characterization
methodology showed efficient to detect the emotion type in 95.6% of the cases.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Optimization of Facial Landmark for Sentiment Analysis on Images with Human F...adewole63
Facial landmarks involve localizing key features on human faces, such as eyes, nose, and mouth. This technique is used in applications like video surveillance, computer vision, and human-computer interaction. However, facial landmark detection remains challenging due to issues including varying image quality, pose, lighting, and face shape/size. The document discusses different algorithms that can be used for facial landmark detection, including histogram of oriented gradients (HOG) and linear support vector machines (SVM). HOG counts gradient orientations in localized image regions and is robust to lighting changes, making it efficient for face detection when combined with machine and deep learning approaches.
Implementation of Face Recognition in Cloud Vision Using Eigen FacesIJERA Editor
Cloud computing comes in several different forms and this article documents how service, Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The papers discuss a methodology for face recognition based on information theory approach of coding and decoding the face image. Proposed System is connection of two stages – Feature extraction using principle component analysis and recognition using the back propagation Network. This paper also discusses our work with the design and implementation of face recognition applications using our mobile-cloudlet-cloud architecture named MOCHA and its initial performance results. The dispute lies with how to performance task partitioning from mobile devices to cloud and distribute compute load among cloud servers to minimize the response time given diverse communication latencies and server compute powers
ABSTRACT: a rigorous work on static and dynamic appearance based classification systems for face is on but, it is proving to be a challenging task for researchers to design a proper system since human face is complex one. Decades of work was and is focussed on how to classify a face and on how to increase the rate of classification but, little attention was paid to overcome redundancy in image classification. This paper presents a novel idea which focuses on redundancy check and its elimination. The paper after drawing inferences from previous work gives out a novel idea for exact face classification and elimination of redundancy.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- Prediction of Facial Attribute without Landmark InformationIRJET Journal
This document summarizes a research paper on predicting facial attributes without using landmark information. It describes the AFFAIR method which uses a global transformation network and part localization network to predict attributes. The global network learns an optimized transformation for each input face for attribute prediction. The part network localizes the most relevant facial regions for specific attributes. The global and local representations are then fused to predict attributes with high accuracy without requiring external landmark points. Experimental results on standard datasets show the AFFAIR method achieves state-of-the-art performance in landmark-free facial attribute prediction.
Facial expression recongnition Techniques, Database and Classifiers Rupinder Saini
This document discusses various techniques for facial expression recognition including eigenface approach, principal component analysis (PCA), Gabor wavelets, PCA with singular value decomposition, independent component analysis with PCA, local Gabor binary patterns, and support vector machines. It describes databases commonly used for facial expression recognition research and classifiers such as Euclidean distance, backpropagation neural networks, PCA, and linear discriminant analysis. The document concludes that combining multiple techniques can achieve more accurate facial expression recognition compared to individual techniques alone by extracting relevant features and evaluating results.
A Novel Mathematical Based Method for Generating Virtual Samples from a Front...CSCJournals
This paper deals with one sample face recognition which is a new challenging problem in pattern recognition. In the proposed method, the frontal 2D face image of each person divided to some sub-regions. After computing the 3D shape of each sub-region, a fusion scheme is applied on sub-regions to create a total 3D shape for whole face image. Then, 2D face image is added to the corresponding 3D shape to construct 3D face image. Finally by rotating the 3D face image, virtual samples with different views are generated. Experimental results on ORL dataset using nearest neighbor as classifier reveal an improvement about 5% in recognition rate for one sample per person by enlarging training set using generated virtual samples. Compared with other related works, the proposed method has the following advantages: 1) only one single frontal face is required for face recognition and the outputs are virtual images with variant views for each individual 2) need only 3 key points of face (eyes and nose) 3) 3D shape estimation for generating virtual samples is fully automatic and faster than other 3D reconstruction approaches 4) it is fully mathematical with no training phase and the estimated 3D model is unique for each individual.
Fourier mellin transform based face recognitioniaemedu
This document presents a face recognition algorithm based on Fourier Mellin Transform. It begins with an introduction to face recognition and challenges of illumination and pose variations. It then describes extracting illumination invariant features by computing depth maps from input images using a shape from shading algorithm. Fourier Mellin Transform is applied to the depth maps to extract features. Experiments on the ORL database showed the approach achieved 100% recognition with 4 training images and 95.7% recognition with 3 training images, demonstrating robustness to illumination and pose variations.
This document presents a hybrid framework for facial expression recognition that uses SVD, PCA, and SURF. It extracts features using PCA with SVD, classifies expressions with an SVM classifier, and performs emotion detection with regression and SURF features. The framework achieves 98.79% accuracy and 67.79% average recognition on a database of 50 images with 5 expressions. It provides a concise facial expression recognition system using a combination of dimensionality reduction, classification, and feature detection techniques.
Real time face recognition system using eigen facesIAEME Publication
This document summarizes a research paper on real-time face recognition using eigenfaces. It discusses:
1. Eigenfaces are a set of eigenvectors used in face recognition to capture variations between face images and efficiently represent faces in a lower-dimensional "face space".
2. The process involves calculating eigenfaces from a training dataset of faces, projecting new images into face space, and comparing them to trained images to identify matches.
3. The paper focuses on implementing face recognition using principal component analysis in Matlab and C#.Net. Eigenfaces are extracted from a training set containing faces with variations in pose, lighting, scale, and features. Faces in new images are detected and matched against the training
This document presents a reflectance perception model based face recognition approach that is robust to illumination variations. It proposes a preprocessing algorithm based on the reflectance perception model to generate illumination insensitive images. It then applies principal component analysis (PCA) for feature extraction to reduce the image dimension and remove unwanted vectors. Multiple classifiers are used to extract features from different Fourier domains and frequencies, and scores from these classifiers are combined using a weighted sum fusion method based on equal error rate weights. Experimental results on standard databases show the proposed approach delivers large performance improvements over other face recognition algorithms in handling illumination variations.
This document discusses a reflectance perception model based face recognition algorithm that is robust to illumination variations. It begins with an introduction to the challenges of face recognition across different lighting conditions. It then reviews related work on illumination compensation techniques. The document proposes a reflectance perception model that transforms face images into an illumination-insensitive representation by estimating an illumination gain factor. It also describes applying principal component analysis (PCA) to extract facial features from the preprocessed images in a lower dimensional space, removing unwanted vectors. Finally, it discusses fusing matching scores from multiple classifiers using a weighted sum to improve recognition accuracy across variations in lighting.
This document discusses intelligent solutions in buildings and their impact on architectural and structural design. It defines intelligence and describes intelligent buildings as those that require little to no conventional energy for heating, cooling, and other functions. The document outlines various types of intelligent solutions, including sustainable design, green architecture, and minimizing costs. It presents the objectives of researching how integrated design and construction solutions can reduce energy and resource usage while limiting environmental impacts. The methodology includes a literature review and distributing a questionnaire to engineers in Sudan to understand knowledge of and willingness to implement intelligent solutions. Key findings from the questionnaire are that intelligent concepts are not well understood and require greater attention from authorities alongside more study and practical experience before implementation.
Academic Libraries: Engine Breed Spuring Innovation for Competitiveness and S...IOSR Journals
Abstract: The research was designed to unveil out how academic libraries have assisted institutions in bring up candidates to work in industrial capabilities towards the achievement of competitiveness and sustainable economic growth in society. This study was drawn from the extensive literature review and case studies to discuss the following economic value of accessing information using the library; innovation and services in academic libraries; initiatives, resources and activities that facilitate access to information in the library; FUTO Library and library responding to academic programmes. The following research questions helped ascertain what has made the academic libraries tick in this direction and to find answers to them; what status of people does the library have? To what extent material resources is provided and used by the library patrons? What ICT services are been offered by the library and of what purpose are they offered? What strategy development implied by the library to meet patron’s needs? What are the obstacles the library may encounter in the process to achieve competitiveness and sustainability to serve library patrons? Frequency and percentages were deployed for the study due is within the study environment area. Collection of Data was through the use of questionnaire developed by the researchers. Ninety-five copies of the questionnaires were distributed to staff of FUTO Library, out of which 85 were returned and found useful. Finding was analyzed and results ascertained. Keyword: Library, growth, process, ICT, resources, services, innovation
This document summarizes a study that analyzed the chemical composition of wastewater generated from olive oil production and evaluated its potential use as fertilizer on agricultural land. The study found that the wastewater was acidic but rich in organic matter and nutrients like potassium. Soil analysis before and after application of the wastewater showed increases in organic matter and nutrients. Over 280 days, biochemical and chemical oxygen demand of the wastewater decreased by around 50%, indicating its characteristics were modifying. The high potassium and organic content suggests the wastewater could improve soil quality and be a lower-cost fertilizer, though long term effects require more research.
Studies of transition metal ion - 5- Sulphosalicylic acid doped PolyanilinesIOSR Journals
This document summarizes a study on transition metal ion-5-sulphosalicylic acid complexes used as dopants for polyaniline. Polyaniline was doped with various transition metal carbonates both with and without 5-sulphosalicylic acid. The doped polyanilines were characterized through various tests. Conductivity was found to increase with increasing acid concentration in the doping solution. Magnetic susceptibility measurements showed paramagnetic behavior for transition metal-doped polyanilines and diamagnetic behavior for polyaniline doped with only 5-sulphosalicylic acid. The polymers were found to be amorphous by XRD. SEM showed small
Investigation of Relationship of Strength and Size of Different Body Parts to...IOSR Journals
This study investigated the relationship between strength, body size, and the velocity of volleyball serves and spikes. 30 male university volleyball players were measured for arm strength, grip strength, leg strength, back strength, arm length, hand length, leg length, foot length, and upper body length. Their serve and spike velocities were also recorded. Correlation analyses found significant relationships between serve velocity and arm strength, grip strength, leg strength, back strength, arm length, hand length, leg length, and upper body length. Significant relationships were also found between spike velocity and the same strength and body size measures. A multiple correlation analysis found that arm strength, arm length, and leg strength combined to highly correlate with serve velocity. Overall, the study
This document provides a literature review of various techniques for automatic facial expression recognition. It discusses approaches such as principal component analysis (PCA), linear discriminant analysis (LDA), independent component analysis (ICA), 2D PCA, global eigen approaches using color images, subpattern extended 2D PCA, multilinear image analysis, color subspace LDA, 2D Gabor filter banks, and local Gabor binary patterns. It provides a table comparing the performance and disadvantages of these different methods. Recently, tensor perceptual color frameworks have been introduced that apply tensor concepts and perceptual color spaces to improve recognition performance under varying illumination conditions.
A novel approach for performance parameter estimation of face recognition bas...IJMER
This document presents a novel approach for face recognition based on clustering, shape detection, and corner detection. The approach first clusters face key points and applies shape and corner detection methods to detect the face boundary and corners. It then performs both face identification and recognition on a large face database. The method achieves lower false acceptance rates, false rejection rates, and equal error rates compared to previous works, and also calculates recognition time. It provides a concise 3-sentence summary of the key aspects of the document.
FACIAL LANDMARKING LOCALIZATION FOR EMOTION RECOGNITION USING BAYESIAN SHAPE ...cscpconf
This work presents a framework for emotion recognition, based in facial expression analysis using Bayesian Shape Models (BSM) for facial landmarking localization. The Facial Action Coding System (FACS) compliant facial feature tracking based on Bayesian Shape Model. The BSM estimate the parameters of the model with an implementation of the EM algorithm. We describe the characterization methodology from parametric model and evaluated the accuracy for feature detection and estimation of the parameters associated with facial expressions, analyzing its robustness in pose and local variations. Then, a methodology for emotion characterization is introduced to perform the recognition. The experimental results show that the proposed model can effectively detect the different facial expressions. Outperforming conventional approaches for emotion recognition obtaining high performance results in the estimation of emotion present in a determined subject. The model used and characterizationmethodology showed efficient to detect the emotion type in 95.6% of the cases.
Facial landmarking localization for emotion recognition using bayesian shape ...csandit
This work presents a framework for emotion recognition, based in facial expression analysis
using Bayesian Shape Models (BSM) for facial landmarking localization. The Facial Action
Coding System (FACS) compliant facial feature tracking based on Bayesian Shape Model. The
BSM estimate the parameters of the model with an implementation of the EM algorithm. We
describe the characterization methodology from parametric model and evaluated the accuracy
for feature detection and estimation of the parameters associated with facial expressions,
analyzing its robustness in pose and local variations. Then, a methodology for emotion
characterization is introduced to perform the recognition. The experimental results show that
the proposed model can effectively detect the different facial expressions. Outperforming
conventional approaches for emotion recognition obtaining high performance results in the
estimation of emotion present in a determined subject. The model used and characterization
methodology showed efficient to detect the emotion type in 95.6% of the cases.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Optimization of Facial Landmark for Sentiment Analysis on Images with Human F...adewole63
Facial landmarks involve localizing key features on human faces, such as eyes, nose, and mouth. This technique is used in applications like video surveillance, computer vision, and human-computer interaction. However, facial landmark detection remains challenging due to issues including varying image quality, pose, lighting, and face shape/size. The document discusses different algorithms that can be used for facial landmark detection, including histogram of oriented gradients (HOG) and linear support vector machines (SVM). HOG counts gradient orientations in localized image regions and is robust to lighting changes, making it efficient for face detection when combined with machine and deep learning approaches.
Implementation of Face Recognition in Cloud Vision Using Eigen FacesIJERA Editor
Cloud computing comes in several different forms and this article documents how service, Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The papers discuss a methodology for face recognition based on information theory approach of coding and decoding the face image. Proposed System is connection of two stages – Feature extraction using principle component analysis and recognition using the back propagation Network. This paper also discusses our work with the design and implementation of face recognition applications using our mobile-cloudlet-cloud architecture named MOCHA and its initial performance results. The dispute lies with how to performance task partitioning from mobile devices to cloud and distribute compute load among cloud servers to minimize the response time given diverse communication latencies and server compute powers
ABSTRACT: a rigorous work on static and dynamic appearance based classification systems for face is on but, it is proving to be a challenging task for researchers to design a proper system since human face is complex one. Decades of work was and is focussed on how to classify a face and on how to increase the rate of classification but, little attention was paid to overcome redundancy in image classification. This paper presents a novel idea which focuses on redundancy check and its elimination. The paper after drawing inferences from previous work gives out a novel idea for exact face classification and elimination of redundancy.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
IRJET- Prediction of Facial Attribute without Landmark InformationIRJET Journal
This document summarizes a research paper on predicting facial attributes without using landmark information. It describes the AFFAIR method which uses a global transformation network and part localization network to predict attributes. The global network learns an optimized transformation for each input face for attribute prediction. The part network localizes the most relevant facial regions for specific attributes. The global and local representations are then fused to predict attributes with high accuracy without requiring external landmark points. Experimental results on standard datasets show the AFFAIR method achieves state-of-the-art performance in landmark-free facial attribute prediction.
Facial expression recongnition Techniques, Database and Classifiers Rupinder Saini
This document discusses various techniques for facial expression recognition including eigenface approach, principal component analysis (PCA), Gabor wavelets, PCA with singular value decomposition, independent component analysis with PCA, local Gabor binary patterns, and support vector machines. It describes databases commonly used for facial expression recognition research and classifiers such as Euclidean distance, backpropagation neural networks, PCA, and linear discriminant analysis. The document concludes that combining multiple techniques can achieve more accurate facial expression recognition compared to individual techniques alone by extracting relevant features and evaluating results.
A Novel Mathematical Based Method for Generating Virtual Samples from a Front...CSCJournals
This paper deals with one sample face recognition which is a new challenging problem in pattern recognition. In the proposed method, the frontal 2D face image of each person divided to some sub-regions. After computing the 3D shape of each sub-region, a fusion scheme is applied on sub-regions to create a total 3D shape for whole face image. Then, 2D face image is added to the corresponding 3D shape to construct 3D face image. Finally by rotating the 3D face image, virtual samples with different views are generated. Experimental results on ORL dataset using nearest neighbor as classifier reveal an improvement about 5% in recognition rate for one sample per person by enlarging training set using generated virtual samples. Compared with other related works, the proposed method has the following advantages: 1) only one single frontal face is required for face recognition and the outputs are virtual images with variant views for each individual 2) need only 3 key points of face (eyes and nose) 3) 3D shape estimation for generating virtual samples is fully automatic and faster than other 3D reconstruction approaches 4) it is fully mathematical with no training phase and the estimated 3D model is unique for each individual.
Fourier mellin transform based face recognitioniaemedu
This document presents a face recognition algorithm based on Fourier Mellin Transform. It begins with an introduction to face recognition and challenges of illumination and pose variations. It then describes extracting illumination invariant features by computing depth maps from input images using a shape from shading algorithm. Fourier Mellin Transform is applied to the depth maps to extract features. Experiments on the ORL database showed the approach achieved 100% recognition with 4 training images and 95.7% recognition with 3 training images, demonstrating robustness to illumination and pose variations.
This document presents a hybrid framework for facial expression recognition that uses SVD, PCA, and SURF. It extracts features using PCA with SVD, classifies expressions with an SVM classifier, and performs emotion detection with regression and SURF features. The framework achieves 98.79% accuracy and 67.79% average recognition on a database of 50 images with 5 expressions. It provides a concise facial expression recognition system using a combination of dimensionality reduction, classification, and feature detection techniques.
Real time face recognition system using eigen facesIAEME Publication
This document summarizes a research paper on real-time face recognition using eigenfaces. It discusses:
1. Eigenfaces are a set of eigenvectors used in face recognition to capture variations between face images and efficiently represent faces in a lower-dimensional "face space".
2. The process involves calculating eigenfaces from a training dataset of faces, projecting new images into face space, and comparing them to trained images to identify matches.
3. The paper focuses on implementing face recognition using principal component analysis in Matlab and C#.Net. Eigenfaces are extracted from a training set containing faces with variations in pose, lighting, scale, and features. Faces in new images are detected and matched against the training
This document presents a reflectance perception model based face recognition approach that is robust to illumination variations. It proposes a preprocessing algorithm based on the reflectance perception model to generate illumination insensitive images. It then applies principal component analysis (PCA) for feature extraction to reduce the image dimension and remove unwanted vectors. Multiple classifiers are used to extract features from different Fourier domains and frequencies, and scores from these classifiers are combined using a weighted sum fusion method based on equal error rate weights. Experimental results on standard databases show the proposed approach delivers large performance improvements over other face recognition algorithms in handling illumination variations.
This document discusses a reflectance perception model based face recognition algorithm that is robust to illumination variations. It begins with an introduction to the challenges of face recognition across different lighting conditions. It then reviews related work on illumination compensation techniques. The document proposes a reflectance perception model that transforms face images into an illumination-insensitive representation by estimating an illumination gain factor. It also describes applying principal component analysis (PCA) to extract facial features from the preprocessed images in a lower dimensional space, removing unwanted vectors. Finally, it discusses fusing matching scores from multiple classifiers using a weighted sum to improve recognition accuracy across variations in lighting.
This document discusses intelligent solutions in buildings and their impact on architectural and structural design. It defines intelligence and describes intelligent buildings as those that require little to no conventional energy for heating, cooling, and other functions. The document outlines various types of intelligent solutions, including sustainable design, green architecture, and minimizing costs. It presents the objectives of researching how integrated design and construction solutions can reduce energy and resource usage while limiting environmental impacts. The methodology includes a literature review and distributing a questionnaire to engineers in Sudan to understand knowledge of and willingness to implement intelligent solutions. Key findings from the questionnaire are that intelligent concepts are not well understood and require greater attention from authorities alongside more study and practical experience before implementation.
Academic Libraries: Engine Breed Spuring Innovation for Competitiveness and S...IOSR Journals
Abstract: The research was designed to unveil out how academic libraries have assisted institutions in bring up candidates to work in industrial capabilities towards the achievement of competitiveness and sustainable economic growth in society. This study was drawn from the extensive literature review and case studies to discuss the following economic value of accessing information using the library; innovation and services in academic libraries; initiatives, resources and activities that facilitate access to information in the library; FUTO Library and library responding to academic programmes. The following research questions helped ascertain what has made the academic libraries tick in this direction and to find answers to them; what status of people does the library have? To what extent material resources is provided and used by the library patrons? What ICT services are been offered by the library and of what purpose are they offered? What strategy development implied by the library to meet patron’s needs? What are the obstacles the library may encounter in the process to achieve competitiveness and sustainability to serve library patrons? Frequency and percentages were deployed for the study due is within the study environment area. Collection of Data was through the use of questionnaire developed by the researchers. Ninety-five copies of the questionnaires were distributed to staff of FUTO Library, out of which 85 were returned and found useful. Finding was analyzed and results ascertained. Keyword: Library, growth, process, ICT, resources, services, innovation
This document summarizes a study that analyzed the chemical composition of wastewater generated from olive oil production and evaluated its potential use as fertilizer on agricultural land. The study found that the wastewater was acidic but rich in organic matter and nutrients like potassium. Soil analysis before and after application of the wastewater showed increases in organic matter and nutrients. Over 280 days, biochemical and chemical oxygen demand of the wastewater decreased by around 50%, indicating its characteristics were modifying. The high potassium and organic content suggests the wastewater could improve soil quality and be a lower-cost fertilizer, though long term effects require more research.
Studies of transition metal ion - 5- Sulphosalicylic acid doped PolyanilinesIOSR Journals
This document summarizes a study on transition metal ion-5-sulphosalicylic acid complexes used as dopants for polyaniline. Polyaniline was doped with various transition metal carbonates both with and without 5-sulphosalicylic acid. The doped polyanilines were characterized through various tests. Conductivity was found to increase with increasing acid concentration in the doping solution. Magnetic susceptibility measurements showed paramagnetic behavior for transition metal-doped polyanilines and diamagnetic behavior for polyaniline doped with only 5-sulphosalicylic acid. The polymers were found to be amorphous by XRD. SEM showed small
Investigation of Relationship of Strength and Size of Different Body Parts to...IOSR Journals
This study investigated the relationship between strength, body size, and the velocity of volleyball serves and spikes. 30 male university volleyball players were measured for arm strength, grip strength, leg strength, back strength, arm length, hand length, leg length, foot length, and upper body length. Their serve and spike velocities were also recorded. Correlation analyses found significant relationships between serve velocity and arm strength, grip strength, leg strength, back strength, arm length, hand length, leg length, and upper body length. Significant relationships were also found between spike velocity and the same strength and body size measures. A multiple correlation analysis found that arm strength, arm length, and leg strength combined to highly correlate with serve velocity. Overall, the study
This document summarizes a research paper on using Markov Decision Processes (MDPs) to improve inpatient hospital care. It discusses challenges in the current healthcare system and how machine learning and artificial intelligence could help address issues like overtreatment, inconsistent care quality, and high costs. The paper proposes using MDPs and other algorithms to analyze patient electronic health record data, detect abnormal care patterns, and make real-time predictions to optimize treatment and resource allocation. A web application with modules for patients, doctors and administrators is designed to facilitate this approach. Simulation results suggest it could increase care efficiency by better connecting patients and doctors. Future work may expand this to personalized treatment planning, diagnostic testing optimization and knowledge discovery from medical literature.
The document summarizes the key steps in an optical character recognition (OCR) system for recognizing printed text:
1. Image acquisition involves obtaining the image, which can be done using scanners or digital cameras.
2. Pre-processing prepares the image for recognition through techniques like converting to grayscale, skew correction, binarization, noise reduction, and thinning.
3. Segmentation separates the image into lines and individual characters.
4. Recognition identifies the characters by comparing features or templates to stored models.
The paper then discusses specific algorithms that could implement grayscale conversion, skew correction, and other steps in the OCR system.
Qualitative Chemistry Education: The Role of the TeacherIOSR Journals
This document discusses the role of chemistry teachers in improving the quality of education in Nigeria. It identifies several factors that have contributed to the decline in quality, such as unqualified teachers, examination malpractice, and lack of practical skills. The document outlines strategies chemistry teachers can use, including changing from a lecture method to cooperative learning, concept mapping, and using information communication technology. It also stresses the importance of improvisation given limited resources. The document concludes by recommending that teachers adopt innovative teaching strategies and the government provide more funding and support for teacher training.
The document proposes a new method for efficient high resolution image reconstruction based on compressed sensing and the Modified Frame Reconstruction Iterative Thresholding Algorithm (MFR ITA). The method involves three phases: 1) input images are processed using multilook processing and discrete wavelet transform to minimize noise, 2) measurements are obtained from sparse coefficients using a proposed fusion method, and 3) a fast compressed sensing method based on MFR ITA is used to reconstruct the high resolution image using total variation. Simulation results show the proposed method achieves better PSNR and SSIM values compared to other traditional methods, and validates its effectiveness in reconstructing images in the presence of noise.
This document compares different window functions used for finite impulse response (FIR) filter design, including Hann, Hamming, Blackman, and Bartlett windows. It analyzes the performance of lowpass, highpass, bandpass, and bandstop filters designed with each window function. Hann window provides the narrowest main lobe width but Hamming window results in more side lobes. Blackman window achieves the highest side lobe attenuation of -70dB but with a wider main lobe. Bartlett window has the widest main lobe and highest side lobes. In conclusion, the appropriate window function depends on the specific filter design goals and tradeoffs between main lobe width and side lobe suppression.
This document summarizes research comparing the design of isolated footings in cohesive soils versus non-cohesive soils. Standard penetration tests were conducted in both soil types to determine their bearing capacities. Footings were then designed for a sample load of 500kN applied to a column. For cohesive soil, the designed footing was 2.5m x 2.5m x 0.205m, while for non-cohesive soil it was 1.9m x 1.9m x 0.201m. The volume and cost of the footing is 56.25% higher for cohesive soil. Therefore, for the same applied load, isolated footings are more economical in non-cohesive soils. For co
This document presents a study that aims to develop correlations between uniaxial compressive strength (UCS) and point load index (I50) for single and double jointed rocks. Over 180 plaster samples were prepared with different joint conditions like orientation, roughness, and number of joints. Samples were tested for UCS and I50. Statistical analysis identified two groups of jointed rocks that showed different trends between UCS and I50. Multiple linear regression was used to develop new correlation equations for each group to predict UCS from I50 for jointed rocks. The proposed equations were compared to previous studies and may be applied to actual rocks like weathered limestone.
This document analyzes the eigenfrequency of a MEMS-based bulk acoustic wave resonator designed using zinc oxide and lead zirconate titanate materials. It summarizes that a square plate thin film resonator was modeled and analyzed at different eigenfrequencies. The quality factor was highest at 1.385 GHz for zinc oxide, reaching 2487. For lead zirconate titanate, the quality factor was highest at 1.028 GHz at 1481.7. It concludes that zinc oxide is preferable for piezoelectric bulk acoustic wave resonators as it can generate a higher quality factor at higher frequencies suitable for intermediate and radio frequency filters.
This document provides a review of using refrigerant blends in existing refrigerator and air conditioning systems. It discusses the history of refrigerants used from early toxic and hazardous natural refrigerants to safer chlorofluorocarbons (CFCs) and hydrochlorofluorocarbons (HCFCs). However, CFCs and HCFCs were found to deplete the ozone layer. Alternative refrigerants considered include hydrofluorocarbons (HFCs), hydrocarbons (HCs), and refrigerant blends. Refrigerant blends are mixtures of two or more refrigerants that can provide desired characteristics while being safer for the environment than existing refrigerants. The document examines properties and examples of a
The document discusses the effects of adding HHO gas produced through water electrolysis on the performance of a single cylinder, four stroke spark ignition engine. Three key findings are presented:
1) The addition of 2.57-2.74% HHO gas to the intake air decreased fuel consumption by 1.95-3.58% compared to petrol alone, with greater decreases at higher compression ratios and higher percentages of HHO gas.
2) Brake thermal efficiency increased by 0.34-0.74% with the addition of HHO gas at compression ratios of 7-9, indicating improved engine performance.
3) Mechanical efficiency increased with both higher compression ratios and higher percentages of added H
This document evaluates the mechanical properties of aluminum 2024-based hybrid metal composites. It discusses how aluminum 2024 alloy is commonly used in aircraft structures due to its high strength and fatigue resistance. The document then describes creating aluminum 2024-based composites reinforced with E-glass fibers and fly ash using stir casting. Tensile and compression tests were performed on the composite materials and aluminum 2024 alloy to compare their mechanical properties. The results showed that the composite materials achieved better tensile and compression strength compared to aluminum 2024 alloy alone.
IOSR Journal of Business and Management (IOSR-JBM) is an open access international journal that provides rapid publication (within a month) of articles in all areas of business and managemant and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications inbusiness and management. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IOSR journal of VLSI and Signal Processing (IOSRJVSP) is an open access journal that publishes articles which contribute new results in all areas of VLSI Design & Signal Processing. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced VLSI Design & Signal Processing concepts and establishing new collaborations in these areas.
This document describes an experimental study on optimizing cutting parameters for milling aluminum alloy 6351. Experiments were conducted using an orthogonal array design with four cutting parameters (speed, feed, depth of cut, tool diameter) each at three levels. The objectives were to minimize surface roughness and maximize material removal rate. Gray relational analysis was used to determine the optimal cutting conditions for the combined objectives. The results showed that feed had the greatest influence on surface roughness, while speed had the least effect on material removal rate. This analysis method provides a means to optimize multiple performance characteristics simultaneously in milling.
The document discusses factors that cause road damage in Palangka Raya City, Indonesia and analyzes the relationship between these factors and their effect on road damage. It finds that water infiltration, traffic load, climate, construction materials, subgrade conditions, and compaction processes significantly impact road damage on peatland roads. A regression equation is presented relating road damage to these six independent factors.
A study of techniques for facial detection and expression classificationIJCSES Journal
Automatic recognition of facial expressions is an important component for human-machine interfaces. It
has lot of attraction in research area since 1990's.Although humans recognize face without effort or
delay, recognition by a machine is still a challenge. Some of its challenges are highly dynamic in their
orientation, lightening, scale, facial expression and occlusion. Applications are in the fields like user
authentication, person identification, video surveillance, information security, data privacy etc. The
various approaches for facial recognition are categorized into two namely holistic based facial
recognition and feature based facial recognition. Holistic based treat the image data as one entity without
isolating different region in the face where as feature based methods identify certain points on the face
such as eyes, nose and mouth etc. In this paper, facial expression recognition is analyzed with various
methods of facial detection,facial feature extraction and classification.
Happiness Expression Recognition at Different Age ConditionsEditor IJMTER
This document proposes a new robust subspace method called Proposed Euclidean Distance Score Level Fusion (PEDSLF) for recognizing happiness facial expressions with age variations. PEDSLF performs score level fusion of three subspace methods - PCA, ICA, and SVD. It normalizes the scores from each method and takes their maximum value for classification. The method is tested on two databases from FGNET and achieves recognition rates of 81.8% for ages 1-5 training and 10-15 testing, and 72% for ages 20-25 training and 30-35 testing. The results show PEDSLF performs better than the individual subspace methods for facial expression recognition with age variations.
Face detection using the 3 x3 block rank patterns of gradient magnitude imagessipij
Face detection locates faces prior to various face-
related applications. The objective of face detecti
on is to
determine whether or not there are any faces in an
image and, if any, the location of each face is det
ected.
Face detection in real images is challenging due to
large variability of illumination and face appeara
nces.
This paper proposes a face detection algorithm usin
g the 3×3 block rank patterns of gradient magnitude
images and a geometrical face model. First, the ill
umination-corrected image of the face region is obt
ained
using the brightness plane that is produced using t
he locally minimum brightness of each block. Next,
the
illumination-corrected image is histogram equalized
, the face region is divided into nine (3×3) blocks
, and
two directional (horizontal and vertical) gradient
magnitude images are computed, from which the 3×3
block rank patterns are obtained. For face detectio
n, using the FERET and GT databases three types of
the
3×3 block rank patterns are a priori determined as
templates based on the distribution of the sum of t
he
gradient magnitudes of each block in the face candi
date region that is also composed of nine (3×3) blo
cks.
The 3×3 block rank patterns roughly classify whethe
r the detected face candidate region contains a fac
e or
not. Finally, facial features are detected and used
to validate the face model. The face candidate is
validated as a face if it is matched with the geome
trical face model. The proposed algorithm is tested
on the
Caltech database images and real images. Experiment
al results with a number of test images show the
effectiveness of the proposed algorithm.
IRJET- A Survey on Facial Expression Recognition Robust to Partial OcclusionIRJET Journal
This document summarizes various approaches for facial expression recognition that are robust to partial facial occlusions. It begins by introducing the topic and importance of facial expression recognition systems that can handle real-world scenarios involving partial occlusions. It then categorizes and reviews key approaches in the literature, including feature reconstruction based on PCA or RPCA, sparse coding approaches using SRC or MLESR, sub-space based methods using Gabor filters or LGBPHS, and statistical prediction models using Bayesian or tracking methods. The document focuses on studies that have researched expression recognition for facial images with partial occlusions.
RATIONAL STRUCTURAL-ZERNIKE MEASURE: AN IMAGE SIMILARITY MEASURE FOR FACE REC...AM Publications
Image similarity or image distortion assessment is the underlying technology in many computer vision applications, and is the root of many algorithms used in image processing. Many similarity measures have been proposed with the aim of achieving a high level of accuracy, and each of these measures has its strength as well as its weaknesses. In this paper, we present a highly efficient hybrid measure for image similarity that is based on structural and momental measures. We propose a similarity measure called the rational structural-Zernike measure (ZSM), to determine a reliable similarity between any two images including human faces images. This measure combines the best features of two structural measures, the well-known structural similarity index measure (SSIM) and the feature similarity index for image quality assessment (FSIM), with Zernike moments (ZMs), which have proven effective in the extraction of image features. Simulation results show that the proposed measure outperforms the SSIM, FSIM , ZMs and the state-of-art measure Feature-Based Structural Measure (FSM) through its ability to detect similarity even under distortion and to recognise the similarity between images of human faces under various conditions of facial expression and pose.
IRJET- A Review on Various Approaches of Face RecognitionIRJET Journal
This document reviews various approaches for face recognition. It begins by describing challenges in face recognition related to scale, pose, illumination, and disguise. It then discusses principal component analysis (PCA) and local discriminant analysis (LDA), which are appearance-based approaches, as well as local binary pattern (LBP) and local ternary pattern (LTP), which are texture-based approaches. PCA uses eigenfaces to represent facial features while LDA aims to preserve discriminating information between classes. LBP and LTP extract texture features from facial images for recognition. The document concludes LDA generally provides better accuracy than PCA for whole-face recognition, while LTP performs better than other methods for texture-based recognition as it is more
CDS is the criminal face identification by capsule neural network.
Solving the common problems in image recognition such as illumination problem, scale variability, and to fight against a most common problem like pose problem, we are introducing Face Reconstruction System.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationAM Publications
Biometric-based techniques have emerged for recognizing individuals authenticating people. In the field of
face recognition, plastic surgery based face recognition is still a lesser explored area. Thus the use of face recognition for
surgical faces introduces the new challenge for designing future face recognition system. Face recognition after plastic
surgery can lead to rejection of genuine users or acceptance of impostors. Transmuting facial geometry and texture
increases the intra-class variability between the pre- and post-surgery images of the same individual. Therefore, matching
post-surgery images with pre-surgery images becomes a difficult task for automatic face recognition algorithms. This paper
deals with testing of two popular face recognition algorithms on plastic surgery database such as PCA and LDA and
compared this algorithms based on Recognition Rate for better performance. Finally, the results are concluded.
This document discusses face detection techniques. It begins with an introduction that defines face detection and discusses why it is important and challenging. It then covers topics like image segmentation, face detection approaches, morphological image processing, and skin color-based face detection. The document analyzes literature on face detection methods and provides descriptions of techniques like thresholding, edge detection, region-based segmentation, and template matching. It also includes a case study on specific face detection software applications and concludes by summarizing the discussed techniques.
Face Recognition Using Gabor features And PCAIOSR Journals
This document summarizes a research paper on face recognition using Gabor features and principal component analysis (PCA). It begins by providing background on face recognition and discusses challenges like lighting, pose, and orientation. It then describes preprocessing faces using Gabor wavelets to extract discriminative features and reduce variations. PCA is used to further reduce the dimensionality of features into principal components. These components are used for classification, with nearest neighbor classification tested on the Yale face database. Results show the proposed approach improves recognition rates compared to Euclidean distance measures.
New Approach: Dominant and Additional Features Selection Based on Two Dimensi...CSCJournals
Modality reduction by using the Eigentransform method can not efficiently work, when number of training sets larger than image dimension. While modality reduction by using the first derivative negative followed by feature extraction using Two Dimensional Discrete Cosine Transform has limitation, which is feature extraction achieved of face sketch feature is included non-dominant features. We propose to select the image region that contains the dominant features. For each region that contains dominant features will be extracted one frequency by using Two Dimensional-Discrete Cosine Transform. To reduce modality between photographs as training set and face sketches as testing set, we propose to bring the training and testing set toward new dimension by using the first derivative followed by negative process. In order to improve final result on the new dimension, it is necessary to add the testing set pixels by using the difference of photograph average values as training sets and the corresponding face sketches average as testing sets. We employed 100 face sketches as testing and 100 photographs as training set. Experimental results show that maximum recognition is 93%.
Fiducial Point Location Algorithm for Automatic Facial Expression Recognitionijtsrd
We present an algorithm for the automatic recognition of facial features for color images of either frontal or rotated human faces. The algorithm first identifies the sub images containing each feature, afterwards, it processes them separately to extract the characteristic fiducial points. Then Calculate the Euclidean distances between the center of gravity coordinate and the annotated fiducial points coordinates of the face image. A system that performs these operations accurately and in real time would form a big step in achieving a human like interaction between man and machine. This paper surveys the past work in solving these problems. The features are looked for in down sampled images, the fiducial points are identified in the high resolution ones. Experiments indicate that our proposed method can obtain good classification accuracy. D. Malathi | A. Mathangopi | Dr. D. Rajinigirinath ""Fiducial Point Location Algorithm for Automatic Facial Expression Recognition"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21754.pdf
Paper URL: https://www.ijtsrd.com/computer-science/data-miining/21754/fiducial-point-location-algorithm-for-automatic-facial-expression-recognition/d-malathi
This document discusses principal component analysis (PCA) for face recognition. It begins with an introduction to face recognition and PCA. PCA works by calculating eigenvectors from a set of face images, which represent the principal components that account for the most variance in the image data. These eigenvectors are called "eigenfaces" and can be used to reconstruct the face images. The document then discusses how the system is implemented, including preparing a face database, normalizing the training images, calculating the eigenfaces/principal components, projecting the face images into this reduced space, and recognizing faces by calculating distances between projected test images and training images.
This document discusses principal component analysis (PCA) for face recognition. It begins with an introduction to face recognition and PCA. PCA works by calculating eigenvectors from a set of face images, which represent the principal components that account for the most variance in the image data. These eigenvectors are called "eigenfaces" and can be used to reconstruct the face images. The document then discusses how the system is implemented, including preparing a face database, normalizing the training images, calculating the eigenfaces/principal components, projecting the face images into this reduced space, and recognizing faces by calculating distances between projected test images and training images.
This document discusses face detection and recognition techniques using MATLAB. It begins with an abstract describing face detection as determining the location and size of faces in images and ignoring other objects. It then discusses implementing an algorithm to recognize faces from images in near real-time by calculating the difference between an input face and the average of faces in a training set. The document then provides details on various face recognition methods, the 5 step process of facial recognition, benefits and applications, and concludes that recent algorithms are much more accurate than older ones.
Eigenfaces , Fisherfaces and Dimensionality_Reductionmostafayounes012
Eigenfaces , Fisherfaces and Dimensionality Reduction are explained easily and clearly. These topics focus on 2 face recognition methods and explains the mathematics behind them. Hope it Helps!
Improved Face Recognition across Poses using Fusion of Probabilistic Latent V...TELKOMNIKA JOURNAL
Uncontrolled environments have often required face recognition systems to identify faces
appearing in poses that are different from those of the enrolled samples. To address this problem,
probabilistic latent variable models have been used to perform face recognition across poses. Although
these models have demonstrated outstanding performance, it is not clear whether richer parameters
always lead to performance improvement. This work investigates this issue by comparing performance of
three probabilistic latent variable models, namely PLDA, TFA, and TPLDA, as well as the fusion of these
classifiers on collections of video data. Experiments on the VidTIMIT+UMIST and the FERET datasets
have shown that fusion of multiple classifiers improves face recognition across poses, given that the
individual classifiers have similar performance. This proves that different probabilistic latent variable
models learn statistical properties of the data that are complementary (not redundant). Furthermore, fusion
across multiple images has also been shown to produce better perfomance than recogition using single
still image.
Fourier mellin transform based face recognitioniaemedu
This document presents a face recognition algorithm based on Fourier Mellin Transform. It begins with an introduction to face recognition and challenges of illumination and pose variations. It then describes extracting illumination invariant features by computing depth maps from input images using a shape from shading algorithm. Fourier Mellin Transform is applied to the depth maps to extract features. Experiments on the ORL database showed the approach achieved 100% recognition with 4 training images and 95.7% recognition with 3 training images, demonstrating robustness to illumination and pose variations.
This document summarizes a research paper on a Fourier Mellin transform based face recognition algorithm. The algorithm extracts illumination invariant features from depth maps of face images obtained through a shape from shading algorithm. These features are transformed using Fourier Mellin transform and classified using k-NN classification based on L1 norm distance. Experiments on the ORL database showed the transformed shape features are robust to illumination and pose variations, achieving better recognition performance compared to other algorithms. The document provides background on challenges in face recognition and reviews existing algorithms before describing the proposed Fourier Mellin transform based approach.
This document provides a technical review of secure banking using RSA and AES encryption methodologies. It discusses how RSA and AES are commonly used encryption standards for secure data transmission between ATMs and bank servers. The document first provides background on ATM security measures and risks of attacks. It then reviews related work analyzing encryption techniques. The document proposes using a one-time password in addition to a PIN for ATM authentication. It concludes that implementing encryption standards like RSA and AES can make transactions more secure and build trust in online banking.
This document analyzes the performance of various modulation schemes for achieving energy efficient communication over fading channels in wireless sensor networks. It finds that for long transmission distances, low-order modulations like BPSK are optimal due to their lower SNR requirements. However, as transmission distance decreases, higher-order modulations like 16-QAM and 64-QAM become more optimal since they can transmit more bits per symbol, outweighing their higher SNR needs. Simulations show lifetime extensions up to 550% are possible in short-range networks by using higher-order modulations instead of just BPSK. The optimal modulation depends on transmission distance and balancing the energy used by electronic components versus power amplifiers.
This document provides a review of mobility management techniques in vehicular ad hoc networks (VANETs). It discusses three modes of communication in VANETs: vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), and hybrid vehicle (HV) communication. For each communication mode, different mobility management schemes are required due to their unique characteristics. The document also discusses mobility management challenges in VANETs and outlines some open research issues in improving mobility management for seamless communication in these dynamic networks.
This document provides a review of different techniques for segmenting brain MRI images to detect tumors. It compares the K-means and Fuzzy C-means clustering algorithms. K-means is an exclusive clustering algorithm that groups data points into distinct clusters, while Fuzzy C-means is an overlapping clustering algorithm that allows data points to belong to multiple clusters. The document finds that Fuzzy C-means requires more time for brain tumor detection compared to other methods like hierarchical clustering or K-means. It also reviews related work applying these clustering algorithms to segment brain MRI images.
1) The document simulates and compares the performance of AODV and DSDV routing protocols in a mobile ad hoc network under three conditions: when users are fixed, when users move towards the base station, and when users move away from the base station.
2) The results show that both protocols have higher packet delivery and lower packet loss when users are either fixed or moving towards the base station, since signal strength is better in those scenarios. Performance degrades when users move away from the base station due to weaker signals.
3) AODV generally has better performance than DSDV, with higher throughput and packet delivery rates observed across the different user mobility conditions.
This document describes the design and implementation of 4-bit QPSK and 256-bit QAM modulation techniques using MATLAB. It compares the two techniques based on SNR, BER, and efficiency. The key steps of implementing each technique in MATLAB are outlined, including generating random bits, modulation, adding noise, and measuring BER. Simulation results show scatter plots and eye diagrams of the modulated signals. A table compares the results, showing that 256-bit QAM provides better performance than 4-bit QPSK. The document concludes that QAM modulation is more effective for digital transmission systems.
The document proposes a hybrid technique using Anisotropic Scale Invariant Feature Transform (A-SIFT) and Robust Ensemble Support Vector Machine (RESVM) to accurately identify faces in images. A-SIFT improves upon traditional SIFT by applying anisotropic scaling to extract richer directional keypoints. Keypoints are processed with RESVM and hypothesis testing to increase accuracy above 95% by repeatedly reprocessing images until the threshold is met. The technique was tested on similar and different facial images and achieved better results than SIFT in retrieval time and reduced keypoints.
This document studies the effects of dielectric superstrate thickness on microstrip patch antenna parameters. Three types of probes-fed patch antennas (rectangular, circular, and square) were designed to operate at 2.4 GHz using Arlondiclad 880 substrate. The antennas were tested with and without an Arlondiclad 880 superstrate of varying thicknesses. It was found that adding a superstrate slightly degraded performance by lowering the resonant frequency and increasing return loss and VSWR, while decreasing bandwidth and gain. Specifically, increasing the superstrate thickness or dielectric constant resulted in greater changes to the antenna parameters.
This document describes a wireless environment monitoring system that utilizes soil energy as a sustainable power source for wireless sensors. The system uses a microbial fuel cell to generate electricity from the microbial activity in soil. Two microbial fuel cells were created using different soil types and various additives to produce different current and voltage outputs. An electronic circuit was designed on a printed circuit board with components like a microcontroller and ZigBee transceiver. Sensors for temperature and humidity were connected to the circuit to monitor the environment wirelessly. The system provides a low-cost way to power remote sensors without needing battery replacement and avoids the high costs of wiring a power source.
1) The document proposes a model for a frequency tunable inverted-F antenna that uses ferrite material.
2) The resonant frequency of the antenna can be significantly shifted from 2.41GHz to 3.15GHz, a 31% shift, by increasing the static magnetic field placed on the ferrite material.
3) Altering the permeability of the ferrite allows tuning of the antenna's resonant frequency without changing the physical dimensions, providing flexibility to operate over a wide frequency range.
This document summarizes a research paper that presents a speech enhancement method using stationary wavelet transform. The method first classifies speech into voiced, unvoiced, and silence regions based on short-time energy. It then applies different thresholding techniques to the wavelet coefficients of each region - modified hard thresholding for voiced speech, semi-soft thresholding for unvoiced speech, and setting coefficients to zero for silence. Experimental results using speech from the TIMIT database corrupted with white Gaussian noise at various SNR levels show improved performance over other popular denoising methods.
This document reviews the design of an energy-optimized wireless sensor node that encrypts data for transmission. It discusses how sensing schemes that group nodes into clusters and transmit aggregated data can reduce energy consumption compared to individual node transmissions. The proposed node design calculates the minimum transmission power needed based on received signal strength and uses a periodic sleep/wake cycle to optimize energy when not sensing or transmitting. It aims to encrypt data at both the node and network level to further optimize energy usage for wireless communication.
This document discusses group consumption modes. It analyzes factors that impact group consumption, including external environmental factors like technological developments enabling new forms of online and offline interactions, as well as internal motivational factors at both the group and individual level. The document then proposes that group consumption modes can be divided into four types based on two dimensions: vertical (group relationship intensity) and horizontal (consumption action period). These four types are instrument-oriented, information-oriented, enjoyment-oriented, and relationship-oriented consumption modes. Finally, the document notes that consumption modes are dynamic and can evolve over time.
The document summarizes a study of different microstrip patch antenna configurations with slotted ground planes. Three antenna designs were proposed and their performance evaluated through simulation: a conventional square patch, an elliptical patch, and a star-shaped patch. All antennas were mounted on an FR4 substrate. The effects of adding different slot patterns to the ground plane on resonance frequency, bandwidth, gain and efficiency were analyzed parametrically. Key findings were that reshaping the patch and adding slots increased bandwidth and shifted resonance frequency. The elliptical and star patches in particular performed better than the conventional design. Three antenna configurations were selected for fabrication and measurement based on the simulations: a conventional patch with a slot under the patch, an elliptical patch with slots
1) The document describes a study conducted to improve call drop rates in a GSM network through RF optimization.
2) Drive testing was performed before and after optimization using TEMS software to record network parameters like RxLevel, RxQuality, and events.
3) Analysis found call drops were occurring due to issues like handover failures between sectors, interference from adjacent channels, and overshooting due to antenna tilt.
4) Corrective actions taken included defining neighbors between sectors, adjusting frequencies to reduce interference, and lowering the mechanical tilt of an antenna.
5) Post-optimization drive testing showed improvements in RxLevel, RxQuality, and a reduction in dropped calls.
This document describes the design of an intelligent autonomous wheeled robot that uses RF transmission for communication. The robot has two modes - automatic mode where it can make its own decisions, and user control mode where a user can control it remotely. It is designed using a microcontroller and can perform tasks like object recognition using computer vision and color detection in MATLAB, as well as wall painting using pneumatic systems. The robot's movement is controlled by DC motors and it uses sensors like ultrasonic sensors and gas sensors to navigate autonomously. RF transmission allows communication between the robot and a remote control unit. The overall aim is to develop a low-cost robotic system for industrial applications like material handling.
This document reviews cryptography techniques to secure the Ad-hoc On-Demand Distance Vector (AODV) routing protocol in mobile ad-hoc networks. It discusses various types of attacks on AODV like impersonation, denial of service, eavesdropping, black hole attacks, wormhole attacks, and Sybil attacks. It then proposes using the RC6 cryptography algorithm to secure AODV by encrypting data packets and detecting and removing malicious nodes launching black hole attacks. Simulation results show that after applying RC6, the packet delivery ratio and throughput of AODV increase while delay decreases, improving the security and performance of the network under attack.
The document describes a proposed modification to the conventional Booth multiplier that aims to increase its speed by applying concepts from Vedic mathematics. Specifically, it utilizes the Urdhva Tiryakbhyam formula to generate all partial products concurrently rather than sequentially. The proposed 8x8 bit multiplier was coded in VHDL, simulated, and found to have a path delay 44.35% lower than a conventional Booth multiplier, demonstrating its potential for higher speed.
This document discusses image deblurring techniques. It begins by introducing image restoration and focusing on image deblurring. It then discusses challenges with image deblurring being an ill-posed problem. It reviews existing approaches to screen image deconvolution including estimating point spread functions and iteratively estimating blur kernels and sharp images. The document also discusses handling spatially variant blur and summarizes the relationship between the proposed method and previous work for different blur types. It proposes using color filters in the aperture to exploit parallax cues for segmentation and blur estimation. Finally, it proposes moving the image sensor circularly during exposure to prevent high frequency attenuation from motion blur.
This document describes modeling an adaptive controller for an aircraft roll control system using PID, fuzzy-PID, and genetic algorithm. It begins by introducing the aircraft roll control system and motivation for developing an adaptive controller to minimize errors from noisy analog sensor signals. It then provides the mathematical model of aircraft roll dynamics and describes modeling the real-time flight control system in MATLAB/Simulink. The document evaluates PID, fuzzy-PID, and PID-GA (genetic algorithm) controllers for aircraft roll control and finds that the PID-GA controller delivers the best performance.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
A017530114
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. – Oct. 2015), PP 01-14
www.iosrjournals.org
DOI: 10.9790/0661-17530114 www.iosrjournals.org 1 | Page
Normalized Feature Representation with Resolution Mapping For
Face Image Recognition
1Raghavendra Kulkarni,
Research Scholar, Mewar University, Rajasthan,
Abstract: This paper develops an approach for face feature representation under variant resolution condition
with normalized face distribution. In the approach of face feature extraction, SVD based approach for Eigen
space representation is been used. To optimize the feature representation under various input conditions, a
novel approach for feature representation under variant scales and its recognition is proposed. The effect
of scaling over different resolutions and variation in face feature distribution is evaluated. A normalization
approach to face feature representation with scale mapped feature is presented. The simulation observations
under variant scaling condition on YALE face dataset is carried out. An improvement in the re c o g n i t i o n
accuracy under these variant conditions was observed.
Index Term – Face Recognition, Feature representation, Normalization, Scale mapped coding.
I. Introduction
Face recognition is an area of study from a long time. Various approach of face recognition and its
enhancements were proposed in past to achieve the objective of optimal face recognition. Input face images
with different real- time parameters of the face recognition systems with a set of trained data is often observed to
be reduced. This is a major problem for automated face recognition system. Limited accuracy of existing
algorithms and real-time image capture devices are usually effective in face recognition. In various applications
of face recognition, to train and test samples, images are not maintained to a common scale. Therefore, to
improve the recognition performance under scale variation of similar samples is required in face recognition
applications. In various usage faces from the camera where the field of view is quite small, such as security
surveillance, images are captured at lower scale. In this paper, to develop a recognition system, focusing on
improving the performance under scaling is proposed. Researchers in machine learning community are
focusing on advanced classifiers, in order to increase the recognition rate of lower quality inputs to achieve
better performance. In the work proposed in June Liu [11], defines that face always are represented by a well-
known singular value decomposition of image matrix with variation all elements such as illumination,
expression, etc, which are more sensitive and highly variant from face to face variations [1].Kwak & Pedrycz
developed an independent component analysis (ICA) and presented a technique for face recognition related to
their application. In the ICA modeling, face is represented by unsupervised learning and use higher-order
statistics[2] to perform face recognition. To optimize the face recognition more effectively, a Fuzzy clustering
and parallel ANN based approach of face recognition was developed by Jianming Li[3].In such approach Face
patterns are divided into many small-scale NN units with fuzzy clustering and obtained recognition are
combined to achieve the result. The most commonly used fuzzy clustering algorithm FCM algorithm is a
clustering algorithm been associated with dataset with a membership function for each feature point. This
technique measures the difference in different scale groups and process the cost function to minimize it. The
approach divides the data points into clusters, defined by its center in each group so as the data points
could be split into group of collection. The Independent component analysis in such system, perform a linear
transformation of the data point to maximize the statistical independence. A new data analysis tool using such
Independent analysis was outlined in [4].In the approach of face recognition under different image scaling; a
vector is represented as a projecting coefficient using standard linear algebra to make the operation effective
under stand alone operation. In [17] a practical model for face representation using rectangular graph design
is proposed. Based on the coefficient matching approach face recognition is proposed in [18].To overcome the
drawback of conventional method a new algorithm is designed. In this paper to achieve this objective, a new
coding approach for scale mapped features for training and testing feature is developed. These features is called
as Scale-mapped Feature (SMF), which is applied to extract mapped features that have maximal correlation
between the training original and scaled similar features. In order to directly connect the scaled similar
features to their original counterparts, a feature mapping approach is employed to construct the nonlinear
mappings between the features in the mapped subspaces. Given an input scaled similar face image, the
mapped original feature is obtained by mapping the scaled similar feature with the trained features. The
distribution of face image with respect to illumination and expression variation is also considered. Where a
normalized singular distribution is proposed for image uniformity. To present the stated approach, this paper is
2. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 2 | Page
organized as follows. In Section II, we briefly review related works on original for face recognition and
applications of SMF and SVM model. In Section III, the framework of our method is introduced. Section IV
gives the details of our method, and is followed by experimental results in Section V. Section VI gives the
conclusion for the presented approach.
II. Face Recognition System
Galton proposed a face recognition approach based on photos alignment from human faces. The main
problem, not able to describe personal similarities, the types of faces and personal characteristics. Biometric
features of facial images are extracted to overcome the above problem and processes for face recognition. For
new face images we need to match existing face to perform face recognition making use of Eigen faces
Approach. New face image having high dimension. For given new face image, it becomes very difficult to
recognize this face with existing face. So Eigen Face approach is used to simplify this problem. So instead of
considering whole face space, it is better to consider only a subspacewith lower dimensionality. The Eigen Face
approach gives us efficient way to find this lower dimensional space. Eigen faces are the Eigenvectors, which
are representative of each of the dimensions of this face space, and they can be considered as various face
features. It means that all images projected in this direction lie close to each other and so do not represent much
face variation. The eigenvectors in some sense represent the features of face. So this Eigen Face approach helps
in extracting various useful features essential for face recognition. So this Eigen Face Approach can be used for
Face Recognition. This is very simple and efficient method of face recognition.The primary reason for using
fewer Eigen faces is computational efficiency. The most meaningful M Eigen faces span an M-dimensional
subspace ―face space‖ of all possible images. The Eigen faces are essentially the basis vectors of the Eigen face
decomposition.The idea of using Eigen faces for efficiently representing faces images using principal
component analysis.It is argued that a collection of face images can be approximately reconstructed by storing a
small collection of weights for each face and a small set of standard images. Therefore, if a multitude of face
images can be reconstructed by weighted sum of a small collection of characteristic images.Eigen space-based
approaches approximate the face images with lower dimensional feature vectors. The main idea behind this
procedure is that the face spacehas a lower dimension than the image space, and that the recognition of the faces
can be performed in this reduced space. Also mean face is calculated and the reduced representation of each
database image with respect to mean face.These representations are the ones to be used in the recognition
process. The Eigenfaces approach for face recognition involves the following initialization operations:
1. Acquire a set of training images.
2. Calculate the Eigenfaces from the training set, keeping only the best M images with the highest
Eigenvalues. These M images define the ―face space‖. As new faces are experienced, the Eigenfaces can be
updated.
3. Calculate the corresponding distribution in M-dimensional weight space for each known individual
(training image), by projecting their face images onto the face space.
4. Having initialized the system, the following steps are used to recognize new face images:
5. Given an image to be recognized, calculate a set of weights of the M Eigen faces by projecting it onto each
of the Eigen faces.
6. 4. Determine if the image is a face at all by checking to see if the image is sufficiently close to the face
space.
7. 5. If it is a face, classify the weight pattern as either a known person or as unknown.
a) Eigen Face Estimation
Let the training set of face images be 1
, 2
, 3
, …, M
. The average face of the set if defined by
M
n
n
M 1
1 . Each face differs from the average by the vector nn
. This set of very large vectors is
then subject to principal component analysis, which seeks a set of M orthonormal vectors, n
, which best
describes the distribution of the data. The kth vector, k
is chosen such that
𝜆 𝑘 =
1
𝑀
(𝜇 𝑘
𝑇
Φ 𝑛 )2𝑀
𝑛=1 (1)
is a maximum, subject to
𝜇𝑙
𝑇
𝜇 𝑘 =
1, 𝑙 = 𝑘
0, 𝑜𝑡𝑒𝑟𝑤𝑖𝑠𝑒
(2)
The vectors k
and scalars k
are the eigenvectors and eigenvalues, respectively, of the covariance matrix
𝐶 =
1
𝑀
Φ 𝑛 Φ 𝑛
𝑇
= 𝐴𝐴 𝑇𝑀
𝑛=1 (3)
3. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 3 | Page
Where the matrix ]...[ 21 M
A . The matrix C, however, is
2
N by
2
N , and determining the
2
N
eigenvectors and eigenvalues is an intractable task for typical image sizes. A computationally feasible method
is needed to find these eigenvectors.If the number of data points in the image space is less than the dimension of
the space (
2
NM ), there will be only 1M , rather than
2
N , meaningful eigenvectors (the remaining
eigenvectors will have associated eigenvalues of zero). Fortunately, we can solve for the
2
N -dimensional
eigenvectors in this case by first solving for the eigenvectors of and M by M matrix e.g., solving a 16 x 16
matrix rather than a 16,384 x 16,384 matrix—and then taking appropriate linear combinations of the face
images n
. Consider the eigenvectors n
of AA
T
such that
𝐴 𝑇
𝐴𝑣𝑛 = 𝜆 𝑛 𝑣𝑛 (4)
Pre-multiplying both sides by A, we have
𝐴𝐴 𝑇
𝐴𝑣𝑛 = 𝜆 𝑛 𝐴𝑣𝑛 (5)
from which we see that n
A are the eigenvectors of
T
AAC .
Following this analysis, we construct the M by M matrix AAL
T
, where n
T
mmn
L , and find
the Meigenvectors n
of L. These vectors determine linear combinations of the M training set face images to
form the eigenfaces n
:
𝜇 𝑛 = 𝑣 𝑛𝑘 Φ 𝑘 = 𝐴𝑣𝑛 , 𝑛 = 1, … … , 𝑀𝑀
𝑘=1 (6)
With this analysis the calculations are greatly reduced, from the order of the number of pixels in the
images (
2
N ) to the order of the number of images in the training set (M). In practice, the training set of face
images will be relatively small (
2
NM ), and the calculations become quite manageable. The associated
eigenvalues allow us to rank the eigenvectors according to their usefulness in characterizing the variation among
the images.
b) Face Image Classification
The Eigenface images calculated from the eigenvectors of L span a basis set with which to describe
face images. As mentioned before, the usefulness of eigenvectors varies according their associated eigenvalues.
This suggests we pick up only the most meaningful eigenvectors and ignore the rest, in other words, the number
of basis functions is further reduced from M to M‘ (M‘<M) and the computation is reduced as a consequence.
Experiments have shown that the RMS pixel-by-pixel errors in representing cropped versions of face images are
about 2% with M=115 and M‘=40.
In practice, a smaller M‘ is sufficient for identification, since accurate reconstruction of the image is not a
requirement. In this framework, identification becomes a pattern recognition task. The eigenfaces span an M‘
dimensional subspace of the original
2
N image space. The M‘ most significant eigenvectors of the L matrix
are chosen as those with the largest associated eigenvalues.
A new face image is transformed into its eigenface components (projected onto ―face space‖) by a simple
operation
𝑤𝑛 = 𝜇 𝑛 (Γ − Ψ) (7)
for n=1,……,M‘. This describes a set of point-by-point image multiplications and summations.
The weights form a vector ],...,,[ '21 M
T
that describes the contribution of each Eigen face in
representing the input face image, treating the Eigen faces as a basis set for face images. For each new face
image to be identified, calculate its pattern vector , the distance k
to each known class, and the distance
to face space. If the minimum distance
k
and the distance , classify the input face as the
individual associated with class vector k
. If the minimum distance
k
but , then the image may
be classified as ―unknown‖, and optionally used to begin a new face class. If the new image is classified
as a known individual, this image may be added to the original set of familiar face images, and the eigenfaces
may be recalculated (steps 1-4). This gives the opportunity to modify the face space as the system encounters
more instances of known faces.
4. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 4 | Page
III. Face Feature Normalization
The singular value decomposition is a outcome of linear algebra. It plays an interesting, fundamental
role in many different applications. On such application is in digital image processing. SVD in digital
applications provides a robust method of storing large images as smaller, more manageable square ones. This is
accomplished by reproducing the original image with each succeeding nonzero singular value. Furthermore, to
reduce storage size even further, images may approximated using fewer singular values.
a) Singular Value Decomposition
The singular value decomposition of a matrix A of m x n matrix is given in the form,
𝐴 = 𝑈Σ𝑉 𝑇
(8)
Where U is an m x m orthogonal matrix; V an n x n orthogonal matrix, and is an m x n matrix containing the
singular values of A.
𝜎1 ≥ 𝜎2 ≥ ⋯ ≥ 𝜎𝑛 ≥ 0 (9)
along its main diagonal.
A similar technique, known as the eigenvalue decomposition (EVD), diagonalizes matrix A, but with
this case, A must be a square matrix. The EVD diagonalizes A as;
𝐴 = 𝑉𝐷𝑉−1
(10)
Where D is a diagonal matrix comprised of the eigenvalues, and V is a matrix whose columns contain the
corresponding eigenvectors. Where Eigen value decomposition may not be possible for all facial images SVD is
the result.
These SVD features are used for facial feature decomposition to represent an image in dimensionality
reduction (DR) factor.
An SVD operation breaks down the matrix A into three separate matrices.
𝐴 = 𝑈Σ𝑉 𝑇
(11)
= 𝑢1, … , 𝑢 𝑛
𝜎1 0 0
0 …. 0
0 0 𝜎𝑛
𝑣1
𝑇
:
𝑣𝑛
𝑇
= 𝑢1, … , 𝑢 𝑛
𝜎1 𝑣1
𝑇
:
𝜎𝑛 𝑣𝑛
𝑇
= 𝜎1 𝑢1 𝑣1
𝑇
+ ⋯ . +𝜎𝑛 𝑢 𝑛 𝑣𝑛
𝑇
(12)
= 𝜎1 𝑢1 𝑣1
𝑇
+ ⋯ . +𝜎𝑟 𝑢 𝑟 𝑣𝑟
𝑇
(13)
because𝜎𝑟+1. . 𝜎𝑛are equal to zeros.
(a) (b) (c) (d)
Fig 1: (a) original face image, (b) SV at (1), (c) SV at (2), (d) SV at (3)
Figure above illustrates the obtained Singular values at each iteration.
(1) at 1st
iteration SV values the facial information provided is given by
𝐴 = 𝜎1 𝑢1 𝑣1
𝑇
(14)
(2) After n=2 iteration the facial approximation is given by,
𝐴 = 𝜎1 𝑢1 𝑣1
𝑇
+ 𝜎2 𝑢2 𝑣2
𝑇
(15)
(3) after n=3 iteration the facial approximation is given by,
From the above observations it could be observed that the facial information‘s are though presented in high
leading images such as the eye, mouth and nose regions they are less definitive to facial expressions. So a same
face image with facial variation may not be predicted in such SV approach. To overcome this limitation the
SVD based face recognition approach is modified to SDM approach as presented below.
b) Singular Distribution Normalization (SDM)
To alleviate the facial variations on face images, a novel Singular Distribution Normalization (SDM)
approach is suggested.The main ideas of SDM approach are that;
5. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 5 | Page
(1) The weights of the leading base images uivi
T
should be deflated, since they are very sensitive to the great
facial variations within the image matrix A itself.
(2) the weights of base images uivi
T
corresponding to relatively small σi ‘s should be inflated, since they may be
less sensitive to the facial variations within A.
The order of the weights of the base images uivi
T
in formulating the new representation of SVD should be
retained. More specifically, for each face image matrix A which has the SVD, its SDM ‗B‘ can be defined as,
𝐵 = 𝑈 𝑉 𝑇𝑎
. (16)
Where U, Σ and V are the SV matrices, and in order to achieve the above underlying ideas, α is a
Normalizing parameter that satisfies:
0 ≤ 𝛼 ≤ 1 (17)
it is seen that the rank of SDM ‗B‘ is r, i.e., identical to the rank of A as the B matrix isNormalizing raised the
values are inflated retaining the rank of the matrix constant.
The uivi
T
, i = 1, 2, . . . , r form a set of uvT
which are similar to the base images for the SVD approach. It is
observed that the intrinsic characteristic of A, the rank, is retained in the SDM approach. In fact it has the same
uvT
like base images as A, and considering the fact that these base images are the components to compose A and
B, the information of A is effectively been passed to B. As SDM approach uses a Normalizing parameter, α
which inflates the lower SV, the effect of α on the above-illustrated image is been presented below,
(a) (b) (c) (d)
Fig 2: Face image under variation of Normalizing factor (a) α = 1, (b) α = 0.7, (c) α = 0.4,
(d)α = 0.1
From the observation it could be observed that:
(1) The SDM is still like human face under lower SV.
(2) The SDM deflates the lighting condition in vision. Taking the two face images (c) and (d) under
consideration, when α is set to 0.4 and 0.1, from the SDM alone, it is difficult to tell whether the original face
image matrix A is of left light on or right light on.
(3) The SDM reveals some facial details. In the original face images (a) presented, neither the right eyeball of
the left face image nor the left eyeball of the right face image is visible, however, when setting α to 0.4 and
0.1 in SDM, the eyeballs become visible.
In the case of SDM thus the Normalizing parameter and it‘s optimal selection is an important criterion in
making the face recognition process more accurate.
c) Normalization Parameter ‘α’
In SDM, α is a key parameter that should be tuned. On a suitable selectivity of α parameter the
recognition system can achieve superior performance to existing recognition performance. Further, in images
(which are sensitive to facial variations) are deflated but meanwhile the discriminant information contained in
the leading base images may be deflated. Some face images have great facial variations and are perhaps in favor
of smaller α‘s, while some face images have slight facial variations and might be in favor of larger α‘s. The α
learned from the training set is a tradeoff among all the training samples and thus is only applicable to the
unknown sample from the similar distribution. each DR method has its specific application scope, which leads
to the difficulty in designing a unique α selection criterion for all the DR methods. As a result, the criterion for
automatic choosing α should be dependent on the training samples, the given testing sample and the specific DR
method. To optimally choose the αvalue minimum argument MSV criterion is used.Mean square variance
(MSV) criterion state that,
𝑀𝑆𝑉 =
1
𝐶
𝑆𝑉𝑖
𝐶
𝑖=1 , (18)
whereSVi is the standard variance of the ith
class defined as
𝑆𝑉𝑖 =
1
𝑑
1
𝑁𝑖−1
(𝑥𝑗𝑘
𝑖
− 𝑚𝑖𝑘 )2,
𝑁𝑖
𝑗 =1
𝑑
𝑘=1 (19)
Where xi
jk and mik, respectively, denote the kth
element of the d-dimensional samples xi
j and class mean mi, C is
the number of classes, and Ni is the number of training samples contained in the ith
class. For an optimal
selection of α value the MSV value must be optimally chosen. The smaller MSV value represents, compact the
same class samples are, and on the contrary, the bigger MSV is, the looser the same class samples. When the
6. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 6 | Page
same class samples are very loose, these samples will lead to biased estimation of the class mean, within class
and between-class scatter matrices, while on the contrary, when the same class samples are compact, the
estimation of the class mean, within-class and between-class variance matrices may be much more reliable.
When the same class samples are compact, it is more likely that these samples can nicely depict the Gaussian
distribution from which they are generated and considering the fact it is essential for the same class samples to
be compact, namely MSV to be small in the recognition methods. Based on the above argument, a heuristic
criterion to automatically choose an adequate α for the recognition method is given as,
𝛼 𝑜𝑝𝑡 = 𝑎𝑟𝑔 min 𝛼 𝑀𝑆𝑉 𝛼 (20)
d) SDM-Algorithm
Let the face image in the data Base be represented as F(i)K , where i represent the total number of
samples for Kth class face image. Then the SVD feature for the given face image is calculated as,
1. Apply SVD on each of the face image for each class in the database, such that
Ψi = UiSiVit
. where, U = [u1, u2, . . ., um], V =[v1, v2, . . . , vn], and S = [0 Xi 0], Xi=diag (si), si are the
computed Singular vector for each face image.
2. (2) The obtained Singular Vector is applied with the Normalizing value of αand a modified SVD values are
obtained as, Bi=Ui Siα
Vit
3. Each training face image Fi
(k)
is then projected using the these obtained face feature image.
4. For the obtained representing image apply a DR method PCA, where the eigen features are computed and
for the maximum eigen values eigen vectors are located and normalized for this projected image.
5. A test face image Tr ~ єRm×n
is transformed into a face feature matrix Yr єRr×c
by
6. Yr = UrSrVrt
.
7. For the developed query feature a image representation is developed and passed to the PCA.
8. For the computed face feature the distance between a test face image T and a traning face images Xi
(j)
is
calculated by Rji = δ(Y,Xi
(j)
) = 𝑌 − 𝑋𝑖
(𝑗)
𝐹
, , a Frobenius norm.
(9) Retrieve the top 8 subjects of the database according to the rank of Rji given byarg Rank j{Rji = δ(Y,Xi
(j)
), 1
≤ i ≤ Nj}. the image with the highest Rank is obtained as the recognized image.However under scaled image of
same two face images the feature may deviate, to overcome this problem, a scale map coding is proposed.
IV. Scale Map-Coding
In this section, we present the detailed procedure of our algorithm. Different from the mixture
models, SMF just works with a single PCA. It is an extension of PCA to non-linear distributions. Instead of
directly doing a PCA, the n data points xi are mapped into a higher-dimensional (possibly infinite-dimensional)
feature space [12].As stated, the problem of original of feature domain for face recognition is formulated as
the inference of the original domain feature co from an input scaled similar image Is , given the training sets
of original and scaled similar face images, Io
= Ii
o
i=1
m
and IL
= Ii
s
i=1
m
where m denotes the size of the training
sets. The dimension of the image data, which is much larger than the number of training images, leads to
huge computational costs. So, the holistic features of face images are obtained by classical PCA, which
represents a given face image by a weighted combination of eigenfaces. We define;
𝑥𝑖
𝑜
= 𝐵 𝑜 𝑇
(𝐼𝑖
𝑜
− 𝜇 𝑜
) (21)
whereμH
is the corresponding mean face of original training face images and xi
o
is the feature vector of face
image Ii
o
. Bo
is the feature extraction matrix obtained by the original training face images and is made up of
orthogonal eigenvectors of(Îo
)T
×Îo
corresponding to the Eigen values being ordered in descending order.
Similarly, the feature of scaled similar face image is represented as
𝑥𝑖
𝑠
= 𝐵 𝑠 𝑇
(𝐼𝑖
𝑠
− 𝜇 𝑠
) (22)
Where BL
and μL
are the feature extraction matrix and the mean face obtained by scaled similar training
face images, respectively. Then, we have the PCA feature vectors of original and scaled similar training sets.
The following process of our algorithm is based on these SMF feature vectors.
Scaled Mapping analysis has been used to study the correlations between two sets of variables. In our
study of feature-domain original for scaled similar face recognition, the relationship between original and scaled
similar feature vectors should be learned by the training sets. Thus, given an input scaled similar face features,
the corresponding original features can be obtained for recognition. In the existing methods, this relationship is
directly obtained by the SMF features of scaled similar and original face images. Corresponding original and
scaled similar images of the same face have differences only in resolution, thus, they are mapped through their
intrinsic structures. In order to learn the relationship between original and scaled similar feature vectors more
exactly, we apply SMF to incorporate the intrinsic topological structure as the prior constraint. In the mapped
subspace obtained by SMF transformation, the solution space of original feature corresponding to a given scaled
7. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 7 | Page
similar image is reduced. Then, the more exact mapped original features can be obtained for recognition in the
mapped subspace.
Specifically, from the PCA feature training sets X o
and X s
, we first subtract their mean values
Xo
and Xs
, respectively, which yields the centralized data sets. SMF finds two base vectors V H
and V L
for
datasets Xo
andX s
in order to maximize the correlation coefficient between vectors Co
and Cs
. The correlation
coefficient is defined as;
ρ =
E[Co Cs ]
E[(Co )2]E[(Cs )2]
(23)
Where E[Co
Cs
] denotes mathematical expectation. To find the base vectors Vo
andVs
, we define c11 =
[x~o
(x~o
)T
] and c22=[x~s
x~s
)T
as the within-set covariance matrices ofˆ Xo
andˆ Xs
, respectively, while
c12 = [x~H
(x~L
)T
] and c21 = [x~s
(x~o
)T
] as their between-set covariance matrices. Then, we compute;
R1 = C11
−1
C12C22
−1
C21 (24)
R2 = C22
−1
C21C11
−1
C12 (25)
Vo
is made up of the eigenvectors of R1 when the eigenvalues of R1 are ordered in descending order. Similarly,
the eigenvectors of R2 compose V s
. We obtain the corresponding projected coefficient sets Co
andCs
of the SMF
feature sets Xo
andXs
projected into the mapped sub spaces using the following base vectors:
Ci
H
= (Vo
)T
Xi
o
(26)
Ci
L
= (Vs
)T
Xi
s
(27)
As there exists a mapped intrinsic structure embedded in the original and scaled similar feature sets X
o
and Xs
, the correlation between the two sets C o
and Cs
is increased and their topological structures are more
mapped after the transformation. Then, the relationship between original and scaled similar features is more
exactly established in the mapped subspace.
a) Mapping approach
As the mapped subspace is obtained, the nonlinear mapping relationship between the mapped features
of original and scaled similar will be learned by the training features. This problem can be formulated as finding
an approximate function to establish the mapping between the mapped features of original and scaled similar
face images. Radial kernels are typically used to build up function approximations. So, we apply radial kernel to
construct the mapping relationship. Radial kernel uses radial symmetry function to transform the multivariate
data approximation problem into the unary approximation problem, and can interpolate no uniform distribution
of high-dimensional data smoothly. The form of radial kernel used to build up function approximations is
fi . = wj ∥ ti − tj
m
j=1 ∥)(28)
where the approximating function fi(・) is represented as a sum of m-kernels𝑓𝑖(. ), each associated with a
different center t j, and wjis the weighting coefficient. The form has been particularly used in nonlinear systems.
In our implementation, we apply multi quadric basis function
φ . = ∥ ti − tj ∥2
+1 (29)
In order to apply radial kernels, first, we train the weighting coefficients by training mapped features of
original and scaled similar face images. The approximate value we want to obtain is the mapped original
features, while the input value is the mapped features of scaled similar face images. So, in the training stage, we
substitute the mapped features of scaled similar face imagesCi
l
and Cj
L
for ti andtj , and the mapped original
feature CL
H
corresponding to Ci
L
forfi. The aim of radial kernels is to establish the nonlinear mappings betweenCL
H
andCH
L
.
b) Feature mapping for Recognition
We feed the mapped features super-resolved from the features of scaled similar faces to an SVM
classifier to achieve the face recognition. In the testing phase, given an scaled similar face image Il ,theSMF
feature vector xl of the input face image is computed as
xi = (Bs
)T
(Il − μs
) (30)
In our algorithm, we execute our recognition process in the mapped subspaces. So, the PCA feature
vector Xsis transformed to the mapped subspace using
8. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 8 | Page
ci = (Vs
)T
(xi − x−s
) (31)
The mapped original feature chis obtained by feeding the mapped feature of the scaled similar face image clto
the trained radial kernel mapping. We will get
ch = w. [φ(c1
s
,ci), … … … φ(cm
s
, ci)]T
(32)
Finally, we apply the mapped featurech and CH
= ci
H
i=1
m
for recognition based on the SVM classification with
L2 norm
gk(co)=min(∥ Ch − Cik
o
∥ 2) i=1,2,…….m (33)
Where Cik
o
represents the ith
sample in the kth
class inCo
.
V. Simulation Result
Experiments are performed on the YALE face database. In order to demonstrate the effectiveness of
our algorithm, we compare the face recognition rate of our method with other methods.The developed system is
evaluated for various effects of illumination, expression and wearing glass effects. For the robustness of the
developed system the Yale Database is trained and evaluated for various classes of face information with the
variation effects of improved parameter α. The effect of retrieval on the value of α and number of training
sample per class is evaluated.
(a)Mean image of original (b) Mean image of scaled similar
(c) Training of original images
(d) Training of scaled similar images
9. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 9 | Page
Fig.3 (a)Mean image of original (b) Mean image of scaled similar(c) Training of original images d) Training of
scaled similar images
CASE 1:
Image having right side light ON
Fig: 4.Original image considered for the testing with left side light off
SVD based outputs
Fig:5 obtained SVD results for the given query for 1-8 iteration
SDM based results
At α = 0.5
Fig:6 SDM based retrieval for the same input image after 1-8 iteration at α = 0.5
At α = 0.8
Fig:7 SDM based retrieval for the same input image after 1-8 iteration at α = 0.8
At α = 1
Fig:8 SDM based retrieval for the same input image after 1-8 iteration at α = 1
RETRIEVAL OPERATION:
CASE 2:
Image Having Left side Light ON
Fig:9 Original image considered for the testing with left side light ON
SVD based outputs
Fig:10 obtained SVD results for the given query for 1-8 iteration
10. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 10 | Page
SDM based results
At α = 0.5
Fig:11 SDM based retrieval for the same input image after 1-8 iteration at α = 0.5
At α = 0.8
Fig:12 SDM based retrieval for the same input image after 1-8 iteration at α = 0.8
At α = 1
Fig:13 SDM based retrieval for the same input image after 1-8 iteration at α = 1
Case 3:
Image with wearing glasses
Fig:14 Original image considered for the testing with Spectacles on
Fig:15 SVD result obtained for given query after 1-8 iterations
SDM based results
At α = 0.5
Fig:16 SDM based results obtained after 1-8 iteration at α = 0.5
At α = 0.8
Fig: 17 SDM based results obtained after 1-8 iteration at α = 0.8
At α = 1
Fig: 18 SDM based results obtained after 1-8 iteration at α = 1
CASE 4: Image with facial expression variation
11. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 11 | Page
Fig: 19 Original Image with facial expression variation
Fig:20 SVD based results for given query
SDM based results
At α = 0.5
Fig:21 SDM results after 1-8 iteration at α = 0.5
At α = 0.8
Fig:22 SDM results after 1-8 iteration at α = 0.8
At α = 1
Fig:23 SDM results after 1-8 iteration at α = 1
(e) Testing input scaled similar image (f) Recognized image by SDM-SMF approach
Fig:24 Observations and dataset Face images in Yale Database
The proposed algorithm undergoes 3 phasesi.e training, testing and classification. The figures (a)-(d) are training
images, the figure (e) is the testing stage input image and the figure (f) is the recognized result.
Figure 25. Comparison TPF over FPF for the system
12. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 12 | Page
Figure 25 shows the comparison of recognition rate of proposed method with other methods. From the
results the proposed method achieves higher recognition rate. Table 1 shows that cumulative results for Yale
database. From the table it is clear that the recognition rate for SMF method is higher than the other methods. So
compared to other methods, SMF method achieves the good recognition result.
Figure 26: System precision over recall rate
To evaluate the retrieval efficiency of the developed approach, the performance measures of recall and precision
is made. Where the recall is defined as a ratio of number of relevant image retrieved over, total number of
relevant image present. The Precision is derived as a ratio of number of relevant images retrieved to the total
number of images retrieved. The recall and the precision factor is defined as;
Precission =
No .of relevant images retreived
No .of images retreived
(34)
Recall =
No .of rel evant images retreived
No .of relavent images present
(35)
Table 1 Cumulative Recognition Results for ORL database
a) Impact of down sampling Rate
In this experiment, we study the impact of dowmsampling rate on each SR recognition method. When
the downsampling rate is 4, 5, 6, 7, and 8, all methods were applied to the relatively large YALE database to
study the impact of the downsampling rate. Table 2 gives the corresponding results. We can see that, basically,
the larger the downsampling rate, the lower the recognition rate for every method. At all downsampling rates,
our method obtains the highest recognition rate. With the downsampling rate changing from 4 to 8, the changing
range of recognition rate, which is obtained by the maximum minus the minimum, of our method is only 0.058
(i.e., 0.844 minus 0.786), which shows that our method is very stable. And the range of CLPM, Wang‘s,
Gunturk‘s, and LR-PCA methods, respectively, is 0.220, 0.179, 0.228, and 0.198. Thus, our method is the best,
considering both stability and effectiveness.
Table 2 Recognition Results with Different Dimensions for the Yale Database
13. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 13 | Page
b) Discussion
The SDM based recognition approach is observed to be more effective in face recognition compared to
the existing approach due to the fact that the SDM approach works on the simple principle of deflating the more
dominant leading base image (i.e. the higher order SV) and inflating the lower SV‘s. As these lower SV‘s are
content of low variations which are facial expressions in the given face image. As SDM inflate these SV‘s the
expression or illumination, which are completely neglected in previous, approach resulting in lower estimation
accuracy are overcome in SDM approach. The proposed SDM based recognition approach is found to be very
effective in case of intermediate feature extraction for face recognition. This feature extraction could then be
used as a information for recognition systems such as PCA, LDA, SVM etc. The SDM based recognition
approach is focused to overcome the effects of various real time factors in face image. Though this technique is
found to inflate the low SV so as to reveal the expression affects this method is found to be of same computation
time as compared to the existing recognition system. When employing SDM as a recognition approach for face
recognition method, the time complexities in training and testing are almost the same as the existing methods.
The time complexity for training N samples with dimensionality d = rxc is T(N2
d), and the time complexity in
testing any given unknown sample is T(dC), where C is the number of classes. For and SDM based system it
consumes T(Nd max(r, c)) in computing the SDM for N samples where max(r,c) is usually smaller than N, and
thus the time complexity in training is still T(N2
d), as with the original recognition system, on the other hand,
for any unknown sample, it takes T(max(r, c)d) in computing SDM, and thus the time complexity in testing is
also T(dC) since max(r, c) is usually comparable to or less than C.
VI. Conclusion
For the problem of scaled similar face images resulting in lower recognition rate, an original method in
the feature domain for face recognition was proposed in this paper. SMF was applied to obtain the mapped
subspaces between the holistic features of original and scaled similar face images, and radial kernel was used to
construct the nonlinear mapping relationship between the mapped features. Then, the original feature in the
original space of the single-input scaled similar face image was obtained for recognition. Experiments show that
even the simple SVM classifier can implement high recognition rates in the mapped subspaces. Compared to
other feature-domain original methods, our method is more robust under the variations of expression, pose,
lighting, and down sampling rate and has a higher recognition rate.
References
[1]. S.-W Lee. and J. Park, ―Low resolution face recognition based on support vector data description,‖ Pattern Recognit., vol. 39, no. 9,
pp. 1809–1812, Sep. 2006.
[2]. O. Sezer, Y. Altunbasak, and A. Ercil, ―Face recognition with independent component-based super-resolution,‖ in Proc. SPIE
Visual Commun. Image Process., vol. 6077. San Francisco, CA, 2006, pp. 52–66.
[3]. J. Lu, X. Yuan, and T. Yahagi, ―A method of face recognition based on fuzzy c-means clustering and associated sub-NNs,‖ IEEE
Trans. Neural Netw., vol. 18, no. 1, pp. 150–160, Jan. 2007.
[4]. K.-C. Kwak and W. Pedrycz, ―Face recognition using an enhanced independent component analysis approach,‖ IEEE Trans. Neural
Netw., vol. 18, no. 2, pp. 530–541, Mar. 2007.
[5]. F. Lin, J. Cook, V. Chandran, and S. ORidharan, ―Face recognition from super-resolved images,‖ in Proc. 8th Int. Symp. Signal
Process. Appl., vol. 2. Sydney, NSW, Australia, Aug. 2005, pp. 667–670.
[6]. S. Zhou, V. Krueger, and R. Chellappa, ―Probabilistic recognition of human faces from video,‖ Comput. Vis. Image Understanding,
vol. 91, nos. 1–2, pp. 214–245, Jul.–Aug. 2003.
[7]. H. Hotelling, ―Relations between two sets ofvariates,‖ Biometrika, vol.28, nos. 3–4, pp. 321–
377,1936.,http://en.wikipedia.org/wiki/Kernel_principal_component_analysis
[8]. T.-K. Kim, S.-F.Wong, and R. Cipolla, ―Tensor mapped correlation analysis for action classification,‖ in Proc. IEEE Conf. Comput.
Vis. Pattern Recognit., Minneapolis, MN, Jun. 2007, pp. 1–8.
[9]. J. Moody and C. Darken, ―Fast learning in networks of locally-tuned processing units,‖ Neural Comput., vol. 1, no. 2, pp. 281–294,
1989.
[10]. Z. Hong, Algebraic feature extraction of image for retrieval, Pattern Retrieval 24 (1991) 211–219.
[11]. J. Liu, S. Chen, Discriminant common vecotors versus neighbourhood components analysis and laplacianfaces: a comparative study
in small sample size problem, Image Vision Comput. 24 (3), 249–262, 2006.
[12]. J. Liu, S. Chen, Resampling lda/qr and pca+lda for face retrieval, in: The 18th Australian Joint Conference on Artificial
Intelligence, pp. 1221–1225, 2005.
[13]. J. Ye, Q. Li, A two-stage linear discriminant analysis via qrdecomposition, IEEE Trans. Pattern Anal. Mach. Intell. 27 (6), 929–941,
2005.
14. Normalized Feature Representation With Resolution Mapping For Face Image Recognition
DOI: 10.9790/0661-17530114 www.iosrjournals.org 14 | Page
Authors Detail
1) Mr. Raghavendra Kulkarni
Scholar,Mewar University,Rajasthan.
e-mail: raghavendrakulkarni444@gmail.com
Raghavendra Kulkarni received B. Tech. (ECE) from Gulbarga University, M. Tech Degree in DSCE from
JNTU Hyderabad. He is pursuing Ph.D from MEWAR UNIVERSAITY, RAJASTHAN.
He is having 21 years of experience .He has authored and coauthored 28 research papers in
National and International Conferences & Journals.