For fatigue detection such as in the application of driver‟s fatigue monitoring system, the eye state analysis is one of the important and deciding steps to determine the fatigue of driver‟s eyes. In this study, algorithms for face detection, eye detection and eye state analysis have been studied and presented as well as an efficient algorithm for detection of face, eyes have been proposed. Firstly the efficient algorithm for face detection method has been presented which find the face area in the human images. Then, novel algorithms for detection of eye region and eye state are introduced. In this paper we propose a multi-view based eye state detection to determine the state of the eye. With the help of skin color model, the algorithm detects the face regions in an YCbCr color model. By applying the skin segmentation which normally separates the skin and non-skin pixels of the images, it detects the face regions of the image under various lighting and noise conditions. Then from these face regions, the eye regions are extracted within those extracted face regions. Our proposed algorithms are fast and robust as there is not pattern match.
Multi Local Feature Selection Using Genetic Algorithm For Face IdentificationCSCJournals
Face recognition is a biometric authentication method that has become more significant and relevant in recent years. It is becoming a more mature technology that has been employed in many large scale systems such as Visa Information System, surveillance access control and multimedia search engine. Generally, there are three categories of approaches for recognition, namely global facial feature, local facial feature and hybrid feature. Although the global facial-based feature approach is the most researched area, this approach is still plagued with many difficulties and drawbacks due to factors such as face orientation, illumination, and the presence of foreign objects. This paper presents an improved offline face recognition algorithm based on a multi-local feature selection approach for grayscale images. The approach taken in this work consists of five stages, namely face detection, facial feature (eyes, nose and mouth) extraction, moment generation, facial feature classification and face identification. Subsequently, these stages were applied to 3065 images from three distinct facial databases, namely ORL, Yale and AR. The experimental results obtained have shown that recognition rates of more than 89% have been achieved as compared to other global-based features and local facial-based feature approaches. The results also revealed that the technique is robust and invariant to translation, orientation, and scaling.
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDSIJCSES Journal
In order to establish face recognition system in rehabilitation nursing robots beds and achieve real-time
monitor the patient on the bed. We propose a face recognition method based on partial matching Hu
moments which apply for rehabilitation nursing robots beds. Firstly we using Haar classifier to detect
human faces automatically in dynamic video frames. Secondly we using Otsu threshold method to extract
facial features (eyebrows, eyes, mouth) in the face image and its Hu moments. Finally, we using Hu
moment feature set to achieve the automatic face recognition. Experimental results show that this method
can efficiently identify face in a dynamic video and it has high practical value (the accuracy rate is 91%
and the average recognition time is 4.3s).
Facial Feature Tracking under Varying Facial Expressions and Face Poses based...Yen Ho
This is the 2nd key paper: Facial Feature Tracking under Varying Facial Expressions and Face Poses based on Restricted Boltzmann Machines
For faces with expression
Powerful processing to three-dimensional facial recognition using triple info...IJAAS Team
Face Detection plays a crucial role in identifying individuals and criminals in Security, surveillance, and footwork control systems. Face Recognition in the human is superb, and pictures can be easily identified even after years of separation. These abilities also apply to changes in a facial expression such as age, glasses, beard, or little change in the face. This method is based on 150 three-dimensional images using the Bosphorus database of a high range laser scanner in a Bogaziçi University in Turkey. This paper presents powerful processing for face recognition based on a combination of the salient information and features of the face, such as eyes and nose, for the detection of three-dimensional figures identified through analysis of surface curvature. The Trinity of the nose and two eyes were selected for applying principal component analysis algorithm and support vector machine to revealing and classification the difference between face and non-face. The results with different facial expressions and extracted from different angles have indicated the efficiency of our powerful processing.
FACIAL EXPRESSION RECOGNITION USING DIGITALISED FACIAL FEATURES BASED ON ACTI...csandit
Facial Expression Recognition is a hot topic in recent years. As artificial intelligent technology is growing rapidly, to communicate with machines, facial expression recognition is essential.The recent feature extraction methods for facial expression recognition are similar to face
recognition, and those caused heavy load for calculation. In this paper, Digitalized Facial Features based on Active Shape Model method is used to reduce the computational complexity
and extract the most useful information from the facial image. The result shows by using this
method the computational complexity is dramatically reduced, and very good performance was obtained compared with other extraction methods.
Multi Local Feature Selection Using Genetic Algorithm For Face IdentificationCSCJournals
Face recognition is a biometric authentication method that has become more significant and relevant in recent years. It is becoming a more mature technology that has been employed in many large scale systems such as Visa Information System, surveillance access control and multimedia search engine. Generally, there are three categories of approaches for recognition, namely global facial feature, local facial feature and hybrid feature. Although the global facial-based feature approach is the most researched area, this approach is still plagued with many difficulties and drawbacks due to factors such as face orientation, illumination, and the presence of foreign objects. This paper presents an improved offline face recognition algorithm based on a multi-local feature selection approach for grayscale images. The approach taken in this work consists of five stages, namely face detection, facial feature (eyes, nose and mouth) extraction, moment generation, facial feature classification and face identification. Subsequently, these stages were applied to 3065 images from three distinct facial databases, namely ORL, Yale and AR. The experimental results obtained have shown that recognition rates of more than 89% have been achieved as compared to other global-based features and local facial-based feature approaches. The results also revealed that the technique is robust and invariant to translation, orientation, and scaling.
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDSIJCSES Journal
In order to establish face recognition system in rehabilitation nursing robots beds and achieve real-time
monitor the patient on the bed. We propose a face recognition method based on partial matching Hu
moments which apply for rehabilitation nursing robots beds. Firstly we using Haar classifier to detect
human faces automatically in dynamic video frames. Secondly we using Otsu threshold method to extract
facial features (eyebrows, eyes, mouth) in the face image and its Hu moments. Finally, we using Hu
moment feature set to achieve the automatic face recognition. Experimental results show that this method
can efficiently identify face in a dynamic video and it has high practical value (the accuracy rate is 91%
and the average recognition time is 4.3s).
Facial Feature Tracking under Varying Facial Expressions and Face Poses based...Yen Ho
This is the 2nd key paper: Facial Feature Tracking under Varying Facial Expressions and Face Poses based on Restricted Boltzmann Machines
For faces with expression
Powerful processing to three-dimensional facial recognition using triple info...IJAAS Team
Face Detection plays a crucial role in identifying individuals and criminals in Security, surveillance, and footwork control systems. Face Recognition in the human is superb, and pictures can be easily identified even after years of separation. These abilities also apply to changes in a facial expression such as age, glasses, beard, or little change in the face. This method is based on 150 three-dimensional images using the Bosphorus database of a high range laser scanner in a Bogaziçi University in Turkey. This paper presents powerful processing for face recognition based on a combination of the salient information and features of the face, such as eyes and nose, for the detection of three-dimensional figures identified through analysis of surface curvature. The Trinity of the nose and two eyes were selected for applying principal component analysis algorithm and support vector machine to revealing and classification the difference between face and non-face. The results with different facial expressions and extracted from different angles have indicated the efficiency of our powerful processing.
FACIAL EXPRESSION RECOGNITION USING DIGITALISED FACIAL FEATURES BASED ON ACTI...csandit
Facial Expression Recognition is a hot topic in recent years. As artificial intelligent technology is growing rapidly, to communicate with machines, facial expression recognition is essential.The recent feature extraction methods for facial expression recognition are similar to face
recognition, and those caused heavy load for calculation. In this paper, Digitalized Facial Features based on Active Shape Model method is used to reduce the computational complexity
and extract the most useful information from the facial image. The result shows by using this
method the computational complexity is dramatically reduced, and very good performance was obtained compared with other extraction methods.
BEB801 Project. Facial expression recognition android application. Student: Alexander Fernicola. Supervisor: Professor Vinod Chandran. Describes the first steps of building an android application that can detect the users facial expression in an image or in video.
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)’s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris. FFT is also applied on ROI to extract the features. These features are added arithmetically to obtain final features. The features of the database are compared with test iris using Euclidian Distance(ED) to compute performance parameters. It is observed that the values of CRR and EER are better in the case of propsed algorithm compared to existing algorithms.
Driver’s drowsiness is one of the major causes of serious accidents in road traffic. Thus, special effort in searching for better assistant technology has been paid. However, several existing approaches fail to work effectively as the head of a drowsy driver is usually in slanting state. Moreover, the shaking of vehicle or the driver’s winking even makes the problem much more complicated. Anyway, head bend posture also signifies a drowsy state. Consequently, this paper proposes a novel approach by considering head nodding behaviour as an input in our detection model. After detecting a human face, some significant facial features are extracted; then, they are used to calculate the predetermined optimal parameters; finally, drowsiness is evaluated based on these thresholds. In our empirical experiments, the proposed algorithm can successfully and accurately detect 96.56% of cases.
Driver's drowsiness is one of the major causes of serious accidents in road traffic. Thus, special effort in searching for better assistant technology has been paid. However, several existing approaches fail to work effectively as the head of a drowsy driver is usually in slanting state. Moreover, the shaking of vehicle or the driver's winking even makes the problem much more complicated. Anyway, head bend posture also signifies a drowsy state. Consequently, this paper proposes a novel approach by considering head nodding behavior as an input in our detection model. After detecting a human face, some significant facial features are extracted; then, they are used to calculate the predetermined optimal parameters; finally, drowsiness is
evaluated based on these thresholds. In our empirical experiments, the proposed algorithm can successfully
and accurately detect 96.56% of cases.
Investigation of deformation of the cornea during tonometry using FEM IJECEIAES
A three-dimensional finite element model of the human eye is developed to evaluate the force which will be applied over the surface of cornea during tonometry and gonioscopy tests. The standard tonometers and gonioscopy experiences deformation from 0.5mm to 3mm of the cornea is adopted during both point contact and boundary contact on the surface of the cornea. The results demonstrate the maximum force experienced by the tonometer with point contact at the center of the cornea for the maximum possible deformation of the cornea during tonometry. The study also analyzes for the force experienced by the tonometer or goniolens with boundary layer contact for the defined deformation of the cornea along the direction from cornea towards the retina.
Optimization of deep learning features for age-invariant face recognition IJECEIAES
This paper presents a methodology for Age-Invariant Face Recognition (AIFR), based on the optimization of deep learning features. The proposed method extracts deep learning features using transfer deep learning, extracted from the unprocessed face images. To optimize the extracted features, a Genetic Algorithm (GA) procedure is designed in order to select the most relevant features to the problem of identifying a person based on his/her facial images over different ages. For classification, K-Nearest Neighbor (KNN) classifiers with different distance metrics are investigated, i.e., Correlation, Euclidian, Cosine, and Manhattan distance metrics. Experimental results using a Manhattan distance KNN classifier achieve the best Rank-1 recognition rates of 86.2% and 96% on the standard FGNET and MORPH datasets, respectively. Compared to the state-of-the-art methods, our proposed method needs no preprocessing stages. In addition, the experiments show its privilege over other related methods.
In economical societies of today, using cash is an inseparable aspect of human life. People use
cashes for marketing, services, entertainments, bank operations and so on. This huge amount of
contact with cash and the necessity of knowing the monetary value of it caused one of the most
challenging problems for visually impaired people. In this paper we propose a mobile phone
based approach to identify monetary value of a picture taken from cashes using some image
processing and machine vision techniques. While the developed approach is very fast, it can
recognize the value of cash by average accuracy of about 95% and can overcome different
challenges like rotation, scaling, collision, illumination changes, perspective, and some others
Quantitative Modeling Of Formation Damage On The Reservoir During Microbial E...IJERA Editor
Microbial enhanced oil recovery is an inexpensive, environmentally friendly method of oil recovery, utilizing the potentials of certain microbes to significantly influence oil productionwith wide range of oil recovery mechanisms including oil mobilization, reservoir re-pressurization, permeability alteration, mobility control and a range of other exploitable recovery techniques. This study presents an investigation on the degree of damage to the reservoir as a result of microbial injection. Results from this analysis shows that for a continuous microbial injection process, the pore area of the formation reduces equivalently due to microbial plugging and or as a result of biomass accumulation in the reservoir. The prevailing effects of formation damage (skin) due to these microbes are also presented. Residual fluid flow rates and corresponding velocities were found to reduce in magnitude with deducing pore area after several days of injection.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...IJERA Editor
Transmission video over ad hoc networks has become one of the most important and interesting subjects of study for researchers and programmers because of the strong relationship between video applications and frequent users of various mobile devices, such as laptops, PDAs, and mobile phones in all aspects of life. However, many challenges, such as packet loss, congestion (i.e., impairments at the network layer), multipath fading (i.e., impairments at the physical layer) [1], and link failure, exist in transferring video over ad hoc networks; these challenges negatively affect the quality of the perceived video [2].This study has investigated video transfer over ad hoc networks. The main challenges of transferring video over ad hoc networks as well as types of errors that may occur during video transmission, various types of video mechanisms, error correction methods, and different Quality of Service (QoS) parameters that affect the quality of the received video are also investigated.
Reviewing the factors of the Renewable Energy systems for Improving the Energ...IJERA Editor
Electricity demand around the globe has increased alarmingly and is increasing at high rates. Therefore,
electricity supply by the conventional resources is not sufficient right now and the generation of electricity by
these resources is causing pollution worldwide. As the recent world is moving towards the alternative and
renewable resources of energy that include sun, wind, water, and air. This paper focuses on reviewing the
renewable energy sources used to improve the energy efficiency. This paper presents how the maximum power
generation capacity can be achieved using these sources. Main focus of this paper is on solar and wind power
that is freely available all around the globe. This paper concludes that there are certain factors that should be
considered while generating power from these sources. The factors include the calculation of radiation data,
storage size and capacity calculation, and geographic dispersion of the plants.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Preprocessing and Classification in WEKA Using Different ClassifiersIJERA Editor
Data mining is a process of extracting information from a dataset and transform it into understandable structure
for further use, also it discovers patterns in large data sets [1]. Data mining has number of important techniques
such as preprocessing, classification. Classification is one such technique which is based on supervised learning.
It is a technique used for predicting group membership for the data instance. Here in this paper we use
preprocessing, classification on diabetes database. Here we apply classifiers on this database and compare the
result based on certain parameters using WEKA. 77.2 million people in India are suffering from pre diabetes.
ICMR estimates that around 65.1million are diabetes patients. Globally in year 2010, 227 to 285 million people
had diabetes, out of that 90% cases are related to type 2 ,this is equal to 3.3% of the population with equal rates
in both women and men in 2011 it resulted in 1.4 million deaths worldwide making it the leading cause of
death.
Assessment of the waste water quality parameter of the Chitrakoot Dham, KarwiIJERA Editor
Chitrakoot is a major holy place of Bundelkhand, situated at 24.48” to 25.12” North Latitude and 80.58” to
81.34” East Longitude. It is about 62 km from East to West and 57.5 km from North to South There are more
than thousand temples in the study area, which are located mainly in Kamadgiri parikrama and along the bank of
river Mandakini. A number of pilgrims visit the place throughout the year. Obviously a considerable amount of
waste generated from the religious activities is being discharged anywhere consequently in creation of sever
solid waste problem.
Assessment of the waste water quality parameter of the Chitrakoot Dham Karwi for the parameters- pH,
Temperature, Nitrate, COD, TDS, TS, TSS, Nitrite, Chloride were analyzed using standard methods prescribed
as in the APHA, AWHA (2005). The result indicates that the water is unsuitable for Human body, Animals and
Agriculture.
Analysis On Classification Techniques In Mammographic Mass Data SetIJERA Editor
Data mining, the extraction of hidden information from large databases, is to predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. Data-Mining classification techniques deals with determining to which group each data instances are associated with. It can deal with a wide variety of data so that large amount of data can be involved in processing. This paper deals with analysis on various data mining classification techniques such as Decision Tree Induction, Naïve Bayes , k-Nearest Neighbour (KNN) classifiers in mammographic mass dataset.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This paper presents a Dye sensitized solar cell (DYSSC), which is called as future generation solar cell. It is a
new class of green photovoltaic cell based on photosynthesis principle in nature. DYSSCs are fabricated using
two different natural dyes as sensitizers, which extracted from the materials existing in nature and our life, such
as flowers, leaves, fruits, traditional Chinese medicines, and beverages. The use of sensitizers having a broad
absorption band in conjunction with oxide films of nanocrystalline morphology permits to harvest a large
fraction of sunlight. There are good prospects to produce these cells at lower cost and much better efficiency
than conventional semiconductor devices by introducing various chemical and natural dyes. DYSSC are
implemented with simple and new technique to overcome the energy crisis and excess cost of semiconductor
solar cells.
BEB801 Project. Facial expression recognition android application. Student: Alexander Fernicola. Supervisor: Professor Vinod Chandran. Describes the first steps of building an android application that can detect the users facial expression in an image or in video.
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)’s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris. FFT is also applied on ROI to extract the features. These features are added arithmetically to obtain final features. The features of the database are compared with test iris using Euclidian Distance(ED) to compute performance parameters. It is observed that the values of CRR and EER are better in the case of propsed algorithm compared to existing algorithms.
Driver’s drowsiness is one of the major causes of serious accidents in road traffic. Thus, special effort in searching for better assistant technology has been paid. However, several existing approaches fail to work effectively as the head of a drowsy driver is usually in slanting state. Moreover, the shaking of vehicle or the driver’s winking even makes the problem much more complicated. Anyway, head bend posture also signifies a drowsy state. Consequently, this paper proposes a novel approach by considering head nodding behaviour as an input in our detection model. After detecting a human face, some significant facial features are extracted; then, they are used to calculate the predetermined optimal parameters; finally, drowsiness is evaluated based on these thresholds. In our empirical experiments, the proposed algorithm can successfully and accurately detect 96.56% of cases.
Driver's drowsiness is one of the major causes of serious accidents in road traffic. Thus, special effort in searching for better assistant technology has been paid. However, several existing approaches fail to work effectively as the head of a drowsy driver is usually in slanting state. Moreover, the shaking of vehicle or the driver's winking even makes the problem much more complicated. Anyway, head bend posture also signifies a drowsy state. Consequently, this paper proposes a novel approach by considering head nodding behavior as an input in our detection model. After detecting a human face, some significant facial features are extracted; then, they are used to calculate the predetermined optimal parameters; finally, drowsiness is
evaluated based on these thresholds. In our empirical experiments, the proposed algorithm can successfully
and accurately detect 96.56% of cases.
Investigation of deformation of the cornea during tonometry using FEM IJECEIAES
A three-dimensional finite element model of the human eye is developed to evaluate the force which will be applied over the surface of cornea during tonometry and gonioscopy tests. The standard tonometers and gonioscopy experiences deformation from 0.5mm to 3mm of the cornea is adopted during both point contact and boundary contact on the surface of the cornea. The results demonstrate the maximum force experienced by the tonometer with point contact at the center of the cornea for the maximum possible deformation of the cornea during tonometry. The study also analyzes for the force experienced by the tonometer or goniolens with boundary layer contact for the defined deformation of the cornea along the direction from cornea towards the retina.
Optimization of deep learning features for age-invariant face recognition IJECEIAES
This paper presents a methodology for Age-Invariant Face Recognition (AIFR), based on the optimization of deep learning features. The proposed method extracts deep learning features using transfer deep learning, extracted from the unprocessed face images. To optimize the extracted features, a Genetic Algorithm (GA) procedure is designed in order to select the most relevant features to the problem of identifying a person based on his/her facial images over different ages. For classification, K-Nearest Neighbor (KNN) classifiers with different distance metrics are investigated, i.e., Correlation, Euclidian, Cosine, and Manhattan distance metrics. Experimental results using a Manhattan distance KNN classifier achieve the best Rank-1 recognition rates of 86.2% and 96% on the standard FGNET and MORPH datasets, respectively. Compared to the state-of-the-art methods, our proposed method needs no preprocessing stages. In addition, the experiments show its privilege over other related methods.
In economical societies of today, using cash is an inseparable aspect of human life. People use
cashes for marketing, services, entertainments, bank operations and so on. This huge amount of
contact with cash and the necessity of knowing the monetary value of it caused one of the most
challenging problems for visually impaired people. In this paper we propose a mobile phone
based approach to identify monetary value of a picture taken from cashes using some image
processing and machine vision techniques. While the developed approach is very fast, it can
recognize the value of cash by average accuracy of about 95% and can overcome different
challenges like rotation, scaling, collision, illumination changes, perspective, and some others
Quantitative Modeling Of Formation Damage On The Reservoir During Microbial E...IJERA Editor
Microbial enhanced oil recovery is an inexpensive, environmentally friendly method of oil recovery, utilizing the potentials of certain microbes to significantly influence oil productionwith wide range of oil recovery mechanisms including oil mobilization, reservoir re-pressurization, permeability alteration, mobility control and a range of other exploitable recovery techniques. This study presents an investigation on the degree of damage to the reservoir as a result of microbial injection. Results from this analysis shows that for a continuous microbial injection process, the pore area of the formation reduces equivalently due to microbial plugging and or as a result of biomass accumulation in the reservoir. The prevailing effects of formation damage (skin) due to these microbes are also presented. Residual fluid flow rates and corresponding velocities were found to reduce in magnitude with deducing pore area after several days of injection.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Analyzing Video Streaming Quality by Using Various Error Correction Methods o...IJERA Editor
Transmission video over ad hoc networks has become one of the most important and interesting subjects of study for researchers and programmers because of the strong relationship between video applications and frequent users of various mobile devices, such as laptops, PDAs, and mobile phones in all aspects of life. However, many challenges, such as packet loss, congestion (i.e., impairments at the network layer), multipath fading (i.e., impairments at the physical layer) [1], and link failure, exist in transferring video over ad hoc networks; these challenges negatively affect the quality of the perceived video [2].This study has investigated video transfer over ad hoc networks. The main challenges of transferring video over ad hoc networks as well as types of errors that may occur during video transmission, various types of video mechanisms, error correction methods, and different Quality of Service (QoS) parameters that affect the quality of the received video are also investigated.
Reviewing the factors of the Renewable Energy systems for Improving the Energ...IJERA Editor
Electricity demand around the globe has increased alarmingly and is increasing at high rates. Therefore,
electricity supply by the conventional resources is not sufficient right now and the generation of electricity by
these resources is causing pollution worldwide. As the recent world is moving towards the alternative and
renewable resources of energy that include sun, wind, water, and air. This paper focuses on reviewing the
renewable energy sources used to improve the energy efficiency. This paper presents how the maximum power
generation capacity can be achieved using these sources. Main focus of this paper is on solar and wind power
that is freely available all around the globe. This paper concludes that there are certain factors that should be
considered while generating power from these sources. The factors include the calculation of radiation data,
storage size and capacity calculation, and geographic dispersion of the plants.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Preprocessing and Classification in WEKA Using Different ClassifiersIJERA Editor
Data mining is a process of extracting information from a dataset and transform it into understandable structure
for further use, also it discovers patterns in large data sets [1]. Data mining has number of important techniques
such as preprocessing, classification. Classification is one such technique which is based on supervised learning.
It is a technique used for predicting group membership for the data instance. Here in this paper we use
preprocessing, classification on diabetes database. Here we apply classifiers on this database and compare the
result based on certain parameters using WEKA. 77.2 million people in India are suffering from pre diabetes.
ICMR estimates that around 65.1million are diabetes patients. Globally in year 2010, 227 to 285 million people
had diabetes, out of that 90% cases are related to type 2 ,this is equal to 3.3% of the population with equal rates
in both women and men in 2011 it resulted in 1.4 million deaths worldwide making it the leading cause of
death.
Assessment of the waste water quality parameter of the Chitrakoot Dham, KarwiIJERA Editor
Chitrakoot is a major holy place of Bundelkhand, situated at 24.48” to 25.12” North Latitude and 80.58” to
81.34” East Longitude. It is about 62 km from East to West and 57.5 km from North to South There are more
than thousand temples in the study area, which are located mainly in Kamadgiri parikrama and along the bank of
river Mandakini. A number of pilgrims visit the place throughout the year. Obviously a considerable amount of
waste generated from the religious activities is being discharged anywhere consequently in creation of sever
solid waste problem.
Assessment of the waste water quality parameter of the Chitrakoot Dham Karwi for the parameters- pH,
Temperature, Nitrate, COD, TDS, TS, TSS, Nitrite, Chloride were analyzed using standard methods prescribed
as in the APHA, AWHA (2005). The result indicates that the water is unsuitable for Human body, Animals and
Agriculture.
Analysis On Classification Techniques In Mammographic Mass Data SetIJERA Editor
Data mining, the extraction of hidden information from large databases, is to predict future trends and behaviors, allowing businesses to make proactive, knowledge-driven decisions. Data-Mining classification techniques deals with determining to which group each data instances are associated with. It can deal with a wide variety of data so that large amount of data can be involved in processing. This paper deals with analysis on various data mining classification techniques such as Decision Tree Induction, Naïve Bayes , k-Nearest Neighbour (KNN) classifiers in mammographic mass dataset.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This paper presents a Dye sensitized solar cell (DYSSC), which is called as future generation solar cell. It is a
new class of green photovoltaic cell based on photosynthesis principle in nature. DYSSCs are fabricated using
two different natural dyes as sensitizers, which extracted from the materials existing in nature and our life, such
as flowers, leaves, fruits, traditional Chinese medicines, and beverages. The use of sensitizers having a broad
absorption band in conjunction with oxide films of nanocrystalline morphology permits to harvest a large
fraction of sunlight. There are good prospects to produce these cells at lower cost and much better efficiency
than conventional semiconductor devices by introducing various chemical and natural dyes. DYSSC are
implemented with simple and new technique to overcome the energy crisis and excess cost of semiconductor
solar cells.
Amelioration of safety management in infrastructure projectsIJERA Editor
Accidents are a major public health concern, resulting in an estimated 1.2 million deaths and 50 million injuries
worldwide each year specifically, the relationships between drivers' characteristics and road accidents are not
fully understood. Many factors are involved in the accident occurrence at construction site. Some important
elements that create a significant portion of accidents include: safety management error, poor training programs,
human element, act of god, outdated procedure and no clear monitoring policy. Although some of these items
are inevitable, but the occurrence of the largest part can be prevented. Therefore, for ameliorating the safety in a
project each of these items should be analyzed and a practical approach introduced. In general, near miss,
incident and accident are three dependent levels that mainly lead to injury. Risk and hazard are allocated in first
level which means near miss, therefore, no on-time identification of hazard and risk causes to create incident
and preventing accident in incident stage is unavoidable.
Growth and Characterization of Barium doped Potassium Hydrogen Phthalate Sing...IJERA Editor
The Non Linear Optical materials have acquired new significance with the advent of a large number of devices
utilizing solid state Laser sources. Potassium Hydrogen Phthalate one of the Non Linear Optical material having
superior non linear optical properties has been exploited for variety of application. In the present work, KHP
single crystals were grown by slow evaporation technique with Barium metal ion as a dopant. The grown
crystals were subjected to powder XRD analysis and the result shows that the Ba2+ ions does not alter the crystal
structure, but it enter into the crystal lattice of pure KHP. The optical transparency of the grown crystal was
studied by UV-Visible spectroscopy, the molecular structure was confirmed by FTIR analysis and its thermal
stability by TG/DTA analysis. The improved SHG efficiency of barium doped Potassium Hydrogen Phthalate
crystal could enhance the nonlinearity behaviour. In addition to this, the electrical parameter such as dielectric
constant was studied in detail.
Flexible ac transmission systems (FACTS), network congestion, Ordinal Optimiz...IJERA Editor
IS 800 in 2007, follows Limit State Design method for general construction for steel but provision for limit state design of light gauge cold form steel has not been made in it. IS 801-1975 provides the guild lines for use of cold formed light gauge steel structural members in general building construction which follows working stress design. This code is under revision. In this paper, in order to understand limit strength of light gauge cold form steel section in flexure a finite element analyses has been carried out on light gauge cold form built up I sections with different heights and thicknesses to asses limit load and modes of failure. Elastic and inelastic flexural strength and deformation behavior have been studied and finally a parametric study was undertaken to understand the influence of height, thickness on its structural behavior. It has been observed that light gauge cold form section with low H/t aspect ratio posses higher ratios of limiting load to elastic load.
Analysis on different Data mining Techniques and algorithms used in IOTIJERA Editor
In this paper, we discusses about five functionalities of data mining in IOT that affects the performance and that
are: Data anomaly detection, Data clustering, Data classification, feature selection, time series prediction. Some
important algorithm has also been reviewed here of each functionalities that show advantages and limitations as
well as some new algorithm that are in research direction. Here we had represent knowledge view of data
mining in IOT.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Comparative Study of Lip Extraction Feature with Eye Feature Extraction Algor...Editor IJCATR
In recent time, along with the advances and new inventions in science and technology, fraud people and identity thieves are
also becoming smarter by finding new ways to fool the authorization and authentication process. So, there is a strong need of efficient
face recognition process or computer systems capable of recognizing faces of authenticated persons. One way to make face recognition
efficient is by extracting features of faces. This paper is to compare the relative efficiency of Lip Extraction and Eye extraction feature
for face recognition in biometric devices. Importance of this paper is to bring to the light which Feature Extraction method provides
better results under various conditions. For recognition experiments, I used face images of persons from different sets of YALE
database. In my dataset, there are total 132 images consisting of 11 persons & 12 face images of each person.
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMSijma
Face detection is one of the most relevant applications of image processing and biometric systems.
Artificial neural networks (ANN) have been used in the field of image processing and pattern recognition.
There is lack of literature surveys which give overview about the studies and researches related to the using
of ANN in face detection. Therefore, this research includes a general review of face detection studies and
systems which based on different ANN approaches and algorithms. The strengths and limitations of these
literature studies and systems were included also.
Review of face detection systems based artificial neural networks algorithmsijma
Face detection is one of the most relevant applications of image processing and biometric systems.
Artificial neural networks (ANN) have been used in the field of image processing and pattern recognition.
There is lack of literature surveys which give overview about the studies and researches related to the using
of ANN in face detection. Therefore, this research includes a general review of face detection studies and
systems which based on different ANN approaches and algorithms. The strengths and limitations of these
literature studies and systems were included also.
Facial expression identification by using features of salient facial landmarkseSAT Journals
Abstract
Facial expression recognition/identification (FER) systems plays vital role in the field of biometrics. Localizing the facial components accurately is a challenging task in image analysis and computer vision. Accurate detection of face and facial components gives effective performance with classification of expressions. This paper proposes feature based facial recognition system using JAFFE and CK databases. 18 facial landmarks were located using Haar cascade classifier. The distances between 12 points were extracted as features. These features were classified using SVM and K-NN classifier and comparison based on accuracy and execution time is done. The proposed algorithm gives better performance.
Facial expression identification by using features of salient facial landmarkseSAT Journals
Abstract
Facial expression recognition/identification (FER) systems plays vital role in the field of biometrics. Localizing the facial components accurately is a challenging task in image analysis and computer vision. Accurate detection of face and facial components gives effective performance with classification of expressions. This paper proposes feature based facial recognition system using JAFFE and CK databases. 18 facial landmarks were located using Haar cascade classifier. The distances between 12 points were extracted as features. These features were classified using SVM and K-NN classifier and comparison based on accuracy and execution time is done. The proposed algorithm gives better performance.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
FACIAL EXTRACTION AND LIP TRACKING USING FACIAL POINTSijcseit
Automatic facial feature extraction is one of the most important and attempted problems in computer
vision. It is a necessary step in face recognition, facial image compression. There are many methods have
been proposed in the literature for the facial feature extraction task. However, all of them have still
disadvantage such as not complete reflection about face structure, face texture. In this paper, we propose
a method for fast and accurate extraction of feature points such as eyes, nose, mouth, eyebrows and the
like from dynamic images with the purpose of face recognition. These methods are far from satisfactory
in terms of extraction accuracy and processing speed. The proposed method achieves high position
accuracy at a low computing cost by combining shape extraction with geometric features of facial images
like eyes, nose, mouth etc. In this paper, a facial expressions synthesis system, based on the facial points
tracking in the frontal image sequences. Selected facial points are automatically tracked using a crosscorrelation based optical flow. The proposed synthesis system uses a simple facial features model with a
few set of control points that can be tracked in original facial image sequences.
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
Driving support systems, such as car navigation systems are becoming common and they
support driver in several aspects. Non-intrusive method of detecting Fatigue and drowsiness
based on eye-blink count and eye directed instruction controlhelps the driver to prevent from
collision caused by drowsy driving. Eye detection and tracking under various conditions such as
illumination, background, face alignment and facial expression makes the problem
complex.Neural Network based algorithm is proposed in this paper to detect the eyes efficiently.
In the proposed algorithm, first the neural Network is trained to reject the non-eye regionbased
on images with features of eyes and the images with features of non-eye using Gabor filter and Support Vector Machines to reduce the dimension and classify efficiently. In the algorithm, first the face is segmented using L*a*btransform color space, then eyes are detected using HSV and Neural Network approach. The algorithm is tested on nearly 100 images of different persons under different conditions and the results are satisfactory with success rate of 98%.The Neural Network is trained with 50 non-eye images and 50 eye images with different angles using Gabor filter. This paper is a part of research work on “Development of Non-Intrusive system for realtime Monitoring and Prediction of Driver Fatigue and drowsiness” project sponsored by Department of Science & Technology, Govt. of India, New Delhi at Vignan Institute of Technology and Sciences, Vignan Hills, Hyderabad.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
TECHNICAL TRAINING MANUAL GENERAL FAMILIARIZATION COURSEDuvanRamosGarzon1
AIRCRAFT GENERAL
The Single Aisle is the most advanced family aircraft in service today, with fly-by-wire flight controls.
The A318, A319, A320 and A321 are twin-engine subsonic medium range aircraft.
The family offers a choice of engines
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Multi-View Algorithm for Face, Eyes and Eye State Detection in Human Image- Study Paper
1. Latesh Kumari et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.168-173
www.ijera.com 168 | P a g e
Multi-View Algorithm for Face, Eyes and Eye State Detection in Human Image- Study Paper Latesh Kumari*, Er. Sonia Jangra**, Er. Rakesh Sharma*** *M.Tech. Scholar (Computer Science and Engineering, L.R.I.E.T Solan (H.P) – Himachal Pradesh Technical University) ** Assistant Professor (Computer Science and Engineering, L.R.I.E.T Solan (H.P) – Himachal Pradesh Technical University ** *Principal (Computer Science and Engineering, L.R.Polytechnic Solan (H.P) – Himachal Pradesh Technical University) ABSTRACT For fatigue detection such as in the application of driver‟s fatigue monitoring system, the eye state analysis is one of the important and deciding steps to determine the fatigue of driver‟s eyes. In this study, algorithms for face detection, eye detection and eye state analysis have been studied and presented as well as an efficient algorithm for detection of face, eyes have been proposed. Firstly the efficient algorithm for face detection method has been presented which find the face area in the human images. Then, novel algorithms for detection of eye region and eye state are introduced. In this paper we propose a multi-view based eye state detection to determine the state of the eye. With the help of skin color model, the algorithm detects the face regions in an YCbCr color model. By applying the skin segmentation which normally separates the skin and non-skin pixels of the images, it detects the face regions of the image under various lighting and noise conditions. Then from these face regions, the eye regions are extracted within those extracted face regions. Our proposed algorithms are fast and robust as there is not pattern match. Keywords –Image Processing, Skin Detection, Face Detection, Eye detection, Color Models.
I. INTRODUCTION
Human face analysis and detection of human face recognition has been received attention of the researchers during the past decades because of emerging applications such as person identification, video surveillance etc. Similarly the eye detection and eye state detection have been a emerging area of research due to wide variety of the application associated in these research areas such driver‟s fatigue monitoring system, to analyze the behavior parameters of the drivers to avoid the road accidents. In current road accidents, loss of attentions of the driver is major reason for it. The driver‟s loss of attention due to drowsiness or fatigue is one of the major contributors in road accidents. According to National Highway Traffic Safety Administration [1] more than 100,000 crashes per year in United States are caused by drowsy driving. By detecting the patterns of the faces, one can design an automatic face recognition system which is a first step in face detection, then normalization can be applied to normalize the face images using behavior parameters of the faces such as facial features, eyes and mouth. [3], [4]. Therefore we can say the detection of faces and facial behavior properties is a important and major step in face detection.
In the literatures, there are various approaches have been proposed for solving the problem of face detection [5] and these can be divided into basically two stage framework [6] as shown in the below figure. In the first stage, the face candidates those may contain the face are marked and sent as a feed to verifier state which verify the candidate region of the face. Face verifier is basically a validations module which validates the candidates regions of the face which will determine whether the candidate regions are the part of the face or not. Face detection and selection of candidate regions of the images is major research area in past which is the core components of the face detection. There are several approaches have been proposed and discussed over the past decade for improvement in human face detection which are broadly categorized into two main categories known as knowledge based methods and machine learning based approaches also known as feature based approaches. Those human face features are describing the human faces. The model known as statistical model is usually developed for describing the relations among these human face features. In machine learning based approaches, the descriptions of these attributed and relationships among them is more useful in terms of human face detection.
RESEARCH ARTICLE OPEN ACCESS
2. Latesh Kumari et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.168-173
www.ijera.com 169 | P a g e
Figure 1: Face Detection framework And for eye detection, there are many eye detection methods have been proposed and implemented during last two decades. Broadly these proposed approaches can be classified into two categories:
Passive Approaches also known as Image Baaed Approaches
Active Approaches also known as Infrared based approaches
Then further the image-based method is partitioned into three major approaches:
Template-based [7, 8],
Feature-based [9.10]
Appearance-based [11, 12].
Figure 2: Eye Detection Approaches In template based stated above, the eye model which is generic is designed, and then template matching is used to search the image for eyes. In terms of performance of this approach, it is very time consuming as it matches the whole image for eye regions. Here the detection of eye regions depend upon the model creation based on the shape of eye shape. The template is created for matching for the eye region in the whole image.
In case of the feature based approach, the behavior of the eyes to determination of some distinctive features around the eyes. However, eyebrow and face orientation may also degrade the performance of the discriminative function, since the performance of distinct features depends upon the candidate eye window detection. In case of the appearance-based methods, the detection of eyes is based on their photometric appearance. In appearance based approach, there is usually requirement of large amount of training data which represent the eyes of different properties, under various and different facial structures, face orientations. The classifier based on machine learning algorithms such as support vector machine, Neural Networks etc has been trained with these types of data set. We can summarize the things like the above three methods extract the eye by selecting the eye regions under different appearances and geometric structure from the rest of the face. The special features of eye such as dark pupil, white sclera, circular iris, eye corners, eye shape etc. are utilized to distinguish the human eye from other objects. However, because of changing of lighting conditions and face pose, these differences will be too trivial to distinguish. Particularly, illumination variations in eye detection applications could be greatly sensitive. In some applications, Hough transform is used to detect eye regions in face images [13]. Hough transform needs high computations, so it is time consuming; consequently it is not suitable for real time applications. IR-based methods [14, 15] are only restricted to some specific applications since they need the assistance of IR illuminating devices. The former is relatively application independent and more widely used with merit that no extra equipment is needed. Similar to the facial features in human face detection, eyes can be a one of the most silent and stable features in a human face [16], [17]. The eye detection techniques can be seen in [18]. The main classical methods include the template matching method; eingen space method and Hough transform method [17], [18] as shown in figure 2 below.
Figure 2: Eye Detection Methods
Along with these three classical methods, there are other techniques proposed in the literatures which are based on images for eye detection. Han et al. [19] uses the morphological operations to locate the eye- pixels in the input image, then the labeling process
3. Latesh Kumari et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.168-173
www.ijera.com 170 | P a g e
have been performed to generate eye-analogue segments. Further these segments are being used as a guide to search for potential face regions of the image. Finally a trained back propagation based on the neural network is used to identify faces and their locations. Similar ideas are used by Wu and Zhou [20].
II. BACKGROUND AND RELATED WORK
2.1 Face Detection In face detection, the skin color of the human images is one of very crucial feature, however different researchers may have different skin color, various literatures have shown that major difference lies largely between their intensity rather than their chrominance [21], [22]. Many different color spaces have been employed. Among them one finds: RGB, normalized RGB, HSI, HSV, YCbCr, YES, YUV, CIE Lab [23]. 2.1.1 Skin Color Segmentation With the help skin color segmentation we can separate the skin and non-skin regions of the image. However this depends upon the color models in which we are representing the human image. Therefore the selection of color model is very important in skin segmentation to make it more effective. Some potential color spaces:
CIEXYZ
CIEXYZ
YCbCr
YUV
YIQ
A performance metric that others have used includes the computation of the separability of clusters of skin and non-skin pixels using scatter matrices. Another is to do a histogram comparison of the skin and non-skin pixels after colorspace transformation. The YCbCr colorspace was found to perform very well,
2.2 Skin Detection Skin detection is defined as a process of extraction of skin pixels and non-skin pixels in an image or in a video. With the help of skin detector, the pixels of the images are divided into skin and non-skin regions. In computer vision, there are various approaches have been developed for skin detection. A skin detector typically transforms a given pixel into an appropriate color space and then uses a skin classifier to label the pixel whether it is a skin or a non-skin pixel. In any given color space, skin color occupies a part of such a space, which might be a compactor large region in the space. Such region is usually called the skin color cluster. A skin classifier is a one-class or two-class classification problem. A given pixel is classified and labeled whether it is a skin or a non-skin given a model of the skin color cluster in a given color space. In the context of skin classification, true positives are skin pixels that the classifier correctly labels as skin. True negatives are non-skin pixels that the classifier correctly labels as non-skin. Any classifier makes errors: it can wrongly label a non-skin pixel as skin or a skin pixel as a non- skin. The former type of errors is referred to as false positives (false detections) while the later is false negatives. A good classifier should have low false positive and false negative rates. As in any classification problem, there is a tradeoff between false positives and false negatives. The more loose the class boundary, the less the false negatives and the more the false positives. 2.3 Eye Detection In [24] and [25], eyes are detected based on the assumption that they are darker than other part of the face. Han at al. [25] use morphological operations to locate eye-analogue segments, while Wu and Zhou [24] find eye-analogue segments searching small patches in the input image that are roughly as large as an eye and are darker than their neighborhoods. For eye detection, there are four methods are used which include Viola-Jones eyes detector, the algorithm described by Valenti and Gevers [18], the approach proposed by Timm and Barth [19], and feature extractor by Ribarić, Lovrenčić, and Pavešič [3]. 2.4 Eye State Detection
4. Latesh Kumari et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.168-173
www.ijera.com 171 | P a g e
For eye state detection, the method of [Sirohey, S., Rosenfeld, A., Duric, Z.: „A method of detecting and tracking irises and eyelids in video‟, Pattern Recognit., 2001, 9,44444444444pp. 1389–1401] uses the distance between two eyelids. For a person being able to see, the upper eyelid should not cover the pupil. Thus, if the distance between the two eyelids is less than the iris radius, the eye is closed. However, this method is very sensitive to pupil centre location. In [1], eye property in saturation channel of HSI colour space is utilized for eye state detection. This property is used to extract iris region from skin region in iris circle. After choosing threshold value and creating binary image of iris circle, eye state is set to open if the number of white pixels in iris circle is more than the black pixels.
III. PROPOSED ALGORITHMS FOR FACE, EYE AND EYE STATE DETECTION
During the study and research we have found that there is no specific efficient model for face detection, eye-region detection and eye state detection methods. Academically, many researchers have worked in the field of face detection, eye detection and eye state analysis ( open/closed) separately, but in a composite research and to determine the eye state analysis based on the facial features and eye regions, there is no efficient approach for it for public research. Research in the determination of eye state (open/closed) is growing very fast these days. In the past, the face-detection algorithms are focused on the detection of frontal human faces, whereas in the current trends, the algorithms are more towards to solve the more general and difficult problem of multi-view face detection. In this paper, we aim to determine eye state (open or closed), for this purpose, we first need to detect face region, then we find eyes and after that, we detect eye state. Based on the region selection of human faces, here we propose the efficient face, eye and eye state detection algorithms. Based on facial behavior analysis, the facial regions of the image is being extracted which is a optimal face region of the human image. Briefly following are the steps followed in algorithm implementation:
1. Start.
a. Input Image.
b. Binary Image Conversion in a particular color model.
c. Face region selection
d. Eye region selection
e. Left and right eye region selection
f. Eye state determination.
2. End.
As stated, Face detection and eye detection can be considered as a specific case of object-class detection. In terms of object class detection, the objective is to find the location and size of the specific object in a image. Computer vision is a field that includes methods for acquiring, processing, analyzing, and understanding images. The Computer Vision has been described as the processes and representations of vision perceptions. Computer vision covers the core technology of automated image analysis which is used in many fields. “Scientifically, the computer vision is mainly concerned with the artificial system that extracts the information from human images. The computer vision is a field which acquires, process, and extracts the important features of the images. The human image data can take multiple forms in terms of video sequences, views in the form of multiple cameras. To simulate the images, the computer mainly breaks down the images into constituents, such as light and shadow, edges and fields.
Figure 3: Block Diagram of proposed algorithm.
5. Latesh Kumari et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.168-173
www.ijera.com 172 | P a g e
As shown in the above block diagram, the first step is image input, here in this research input image we are taking from various sources such as open database. Then the image is being converted into binary image using the color models which are further processed for region selection related to face, eyes. The selected eye regions are being the deciding parameters for the selection and determination of eye states.
IV. Conclusion
Here in this paper, we try to present our research for eye state analysis and detection of eye states which would be helpful in the applications such drive‟s fatigue monitoring system, determination of eye state of human image. During this, face detection based on human facial features and eye detection for determination of eye regions is presented which lead us to eye state determinations. We also try to present the research presented in the literatures for eye state detection and found that there is no efficient algorithm till now for eye state detection. Then based on the study, we presented algorithms for face, eye and eye state detection. This is initial research which we will take forward to detection of eye state in optimal way.
V. ACKNOWLEDGEMENTS
I would like to acknowledge Er.Sonia jangra, Assistant Professor, Department of Computer Science and Engineering for her support and guidance in writing this research paper. I also would like to thank Er. Rakesh Sharma, Principal at L.R.Polytechnic Solan (H.P), without his support, this research was just not possible, I sincerely thank to him for his support and guidance. References
[1] Research on Drowsy Driving, National Highway Traffic Safety Administration, [online] Available: http://www.nhtsa.gov/Driving+Safety/Distracted+Driving/Research+on +Drowsy+Driving
[2] [M. Kutila, “Methods for Machine Vision Based Driver Monitoring.
[3] S. G. Kong, J. Heo, B. R. Abidi, J. Paik, and M. A. Abidi, “Recent advances in visual and infrared face recognition: a review,” Computer Vision and Image Understanding, vol. 97, pp. 103–135, 2005.
[4] W. Zhao, R. Chellappa, A. Ronsenfeld, and P. J. Phillips, “Face recognition: A literature survey,” ACM Computing Surveys, pp. 399–458, 2003.
[5] C. C. Han, H. Y. M. Liao, G. J. Yu, and L. H.Chen, “Fast face detection via morphologybased pre-processing,” Pattern Recognition, vol. 33, pp. 1701–1712, 2000.
[6] J. Wu and Z. H. Zhou, “Efficient face candidates selector for face detection,” Pattern Recognition, vol. 36, pp. 1175– 1186, 2003.
[7] Xie, X., Sudhakar, R., Zhuang, H.: „On improving eye feature extraction using deformable templates‟, Pattern Recognit., 1994, 27, (6), pp. 791–799
[8] Huang,W., Mariani, R.: „Face detection and precise eyes location‟. Proc. Int. Conf. on Pattern Recognition, 2000, pp. 722–727
[9] Zhou, Z., Geng, X.: „Projection functions for eye detection‟, Pattern Recognit., 2004, 37, (5), pp. 1049–1056
[10] Kawato, S., Tetsutani, N.: „Detection and tracking of eyes for gaze-camera control’. Proc. 15th Int. Conf. on Vision Interface, 2002, pp. 1031–1038
[11] Huang, J., Wechsler, H.: „Eye detection using optimal wavelet packets and radial basis functions (rbfs)‟, Int. J. Pattern Recognit. Artif. Intell., 1999, 13, (7), pp. 1009
[12] Feng, G., Yuen, P.: „Multi cues eye detection on gray intensity image’, Pattern Recognit., 2001, 34, pp. 1033–1046
[13] Khairosfaizal, W., Nor‟aini, A.: „Eyes detection in facial images using circular Hough transform’. Proc. Fifth Int. Colloquium on Signal Processing and Its Applications, 2009, pp. 238–242
[14] Li, S., Chu, R., Ao, M., Zhang, L., He, R.: „Highly accurate and fast face recognition using near infrared images’. Proc. IAPR Int. Conf. on Biometric, 2006, pp. 151–158
[15] Li, S., Zhang, L., Liao, S., et al.: „A near- infrared image based face recognition system’. Proc. Seventh IEEE Int. Conf. on Automatic Face and Gesture Recognition, 2006, pp. 455–460
[16] C. C. Han, H. Y. M. Liao, G. J. Yu, and L. H. Chen, “Fast face detection via morphology based pre-processing,” Pattern Recognition,vol. 33, pp. 1701–1712, 2000.
[17] R. Hsu, M. Abdel-Mottaleb, and A. K. Jain, “Face detecting in color images,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, pp. 696–706, may 2002.
[18] J. Song, Z. Chi, and J. Liu, “A robust eye detection method using combined binary edge and intensity information,” Pattern Recognition, vol. 39, pp. 1110–1125, 2006.
[19] C. C. Han, H. Y. M. Liao, G. J. Yu, and L. H. Chen, “Fast face detection via morphology based pre-processing,” Pattern Recognition,vol. 33, pp. 1701–1712, 2000.
6. Latesh Kumari et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 7( Version 5), July 2014, pp.168-173
www.ijera.com 173 | P a g e
[20] J. Wu and Z. H. Zhou, “Efficient face candidates selector for face detection,” Pattern Recognition, vol. 36, pp. 1175– 1186, 2003.
[21] H. Graf, T. Chen, E. Petajan, and E. Cosatto, “Locating faces and facial parts,” in Proc First Int’l Workshop Automatic Face and Resture Recognition, pp. 41–46, 1995.
[22] M. J. Jones and J. M. Rehg, “Statistical color models with application to skin detection.,” International Journal of Computer Vision,vol. 46, no. 1, pp. 81–96, 2002.
[23] R. Hsu, M. Abdel-Mottaleb, and A. K. Jain, “Face detecting in color images,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, pp. 696–706, may 2002.
[24] J. Wu and Z. H. Zhou, “Efficient face candidates selector for face detection,” Pattern Recognition, vol. 36, pp. 1175– 1186, 2003.
[25] C. C. Han, H. Y. M. Liao, G. J. Yu, and L. H. Chen, “Fast face detection via morphology based pre-processing,” Pattern Recognition, vol. 33, pp. 1701–1712, 2000.