This document presents a face recognition approach that extracts multiple facial features from images using metrics like homogeneity, energy, covariance, etc. and trains a feedforward neural network for classification. 40 face images from 8 individuals under varying conditions are used as a training dataset from the ORL database. Test images are input and their features extracted and compared to the training data using the neural network. Recognition rates are found to be high, eliminating variations from pose. The approach effectively increases robustness over single feature methods by utilizing multiple discriminative facial features to recognize faces.
Robust face recognition by applying partitioning around medoids over eigen fa...ijcsa
An unsupervised learning methodology for robust face recognition is proposed for enhancing invariance to
various changes in the face. The area of face recognition in spite of being the most unobtrusive biometric
modality of all has encountered challenges with high performance in uncontrolled environment owing to
frequently occurring, unavoidable variations in the face. These changes may be due to noise, outliers,
changing expressions, emotions, pose, illumination, facial distractions like makeup, spectacles, hair growth
etc. Methods for dealing with these variations have been developed in the past with different success.
However the cost and time efficiency play a crucial role in implementing any methodology in real world.
This paper presents a method to integrate the technique of Partitioning Around Medoids with Eigen Faces
and Fisher Faces to improve the efficiency of face recognition considerably. The system so designed has
higher resistance towards the impact of various changes in the face and performs well in terms of success
rate, cost involved and time complexity. The methodology can therefore be used in developing highly robust
face recognition systems for real time environment.
Happiness Expression Recognition at Different Age ConditionsEditor IJMTER
Recognition of different internal emotions of human face under various critical
conditions is a difficult task. Facial expression recognition with different age variations is
considered in this study. This paper emphasizes on recognition of facial expression like
happiness mood of nine persons using subspace methods. This paper mainly focuses on new
robust subspace method which is based on Proposed Euclidean Distance Score Level Fusion
(PEDSLF) using PCA, ICA, SVD methods. All these methods and new robust method is
tested with FGNET database. An automatic recognition of facial expressions is being carried
out. Comparative analysis results surpluses PEDSLF method is more accurate for happiness
emotional facial expression recognition.
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...Waqas Tariq
The face is the most extraordinary communicator, which plays an important role in interpersonal relations and Human Machine Interaction. . Facial expressions play an important role wherever humans interact with computers and human beings to communicate their emotions and intentions. Facial expressions, and other gestures, convey non-verbal communication cues in face-to-face interactions. In this paper we have developed an algorithm which is capable of identifying a person’s facial expression and categorize them as happiness, sadness, surprise and neutral. Our approach is based on local binary patterns for representing face images. In our project we use training sets for faces and non faces to train the machine in identifying the face images exactly. Facial expression classification is based on Principle Component Analysis. In our project, we have developed methods for face tracking and expression identification from the face image input. Applying the facial expression recognition algorithm, the developed software is capable of processing faces and recognizing the person’s facial expression. The system analyses the face and determines the expression by comparing the image with the training sets in the database. We have followed PCA and neural networks in analyzing and identifying the facial expressions.
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...csandit
Recognizing Faces helps to name the various subjects present in the image. This work focuses
on labeling faces on an image which includes faces of humans being of various age group
(heterogeneous set ). Principal component analysis concentrates on finds the mean of the data
set and subtracts the mean value from the data set with an intention to normalize that data.
Normalization with respect to image is the removal of common features from the data set. This
work brings in the novel idea of deploying the median another measure of central tendency for
normalization rather than mean. The above work was implemented using matlab. Results show
that Median is the best measure for normalization for a heterogeneous data set which gives
raise to outliers.
PRE-PROCESSING TECHNIQUES FOR FACIAL EMOTION RECOGNITION SYSTEMIAEME Publication
Humans share a universal and fundamental set of emotions which are exhibited through consistent facial expressions. Recognition of human emotions from the imaging templates is useful in a wide variety of human-computer interaction and intelligent systems applications. However, the automatic recognition of facial expressions using image template matching techniques suffer from the natural variability with facial features and recording conditions. In spite of the progress achieved in facial emotion recognition in recent years, the effective and computationally simple feature extraction and classification technique for emotion recognition is still an open problem. Image pre-processing and normalization is significant part of face recognition systems. Changes in lighting conditions produces dramatically decrease of recognition performance. In this paper, the image pre-processing techniques like K-Nearest Neighbor, Cultural Algorithm and Genetic Algorithm are used to remove the noise in the facial image for enhancing the emotion recognition. The performance of the preprocessing techniques are evaluated with various performance metrics.
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...theijes
Numerous PC vision and medical imaging issues a confronted with gaining from expansive scale datasets, with a huge number of perceptions furthermore, highlights.A novel productive learning plan that fixes a sparsity imperative by continuously expelling variables taking into account a measure and a timetable. The alluring actuality that the issue size continues dropping all through the cycles makes it especially reasonable for enormous information learning. Methodology applies nonexclusively to the advancement of any differentiable misfortune capacity, and discovers applications in relapse, order and positioning. The resultant calculations assemble variable screening into estimation and are amazingly easy to execute. It gives hypothetical assurances of joining and determination consistency. Investigates genuine and engineered information demonstrate that the proposed strategy contrasts exceptionally well and other cutting edge strategies in relapse, order and positioning while being computationally exceptionally effective and adaptable.
Robust face recognition by applying partitioning around medoids over eigen fa...ijcsa
An unsupervised learning methodology for robust face recognition is proposed for enhancing invariance to
various changes in the face. The area of face recognition in spite of being the most unobtrusive biometric
modality of all has encountered challenges with high performance in uncontrolled environment owing to
frequently occurring, unavoidable variations in the face. These changes may be due to noise, outliers,
changing expressions, emotions, pose, illumination, facial distractions like makeup, spectacles, hair growth
etc. Methods for dealing with these variations have been developed in the past with different success.
However the cost and time efficiency play a crucial role in implementing any methodology in real world.
This paper presents a method to integrate the technique of Partitioning Around Medoids with Eigen Faces
and Fisher Faces to improve the efficiency of face recognition considerably. The system so designed has
higher resistance towards the impact of various changes in the face and performs well in terms of success
rate, cost involved and time complexity. The methodology can therefore be used in developing highly robust
face recognition systems for real time environment.
Happiness Expression Recognition at Different Age ConditionsEditor IJMTER
Recognition of different internal emotions of human face under various critical
conditions is a difficult task. Facial expression recognition with different age variations is
considered in this study. This paper emphasizes on recognition of facial expression like
happiness mood of nine persons using subspace methods. This paper mainly focuses on new
robust subspace method which is based on Proposed Euclidean Distance Score Level Fusion
(PEDSLF) using PCA, ICA, SVD methods. All these methods and new robust method is
tested with FGNET database. An automatic recognition of facial expressions is being carried
out. Comparative analysis results surpluses PEDSLF method is more accurate for happiness
emotional facial expression recognition.
Face Emotion Analysis Using Gabor Features In Image Database for Crime Invest...Waqas Tariq
The face is the most extraordinary communicator, which plays an important role in interpersonal relations and Human Machine Interaction. . Facial expressions play an important role wherever humans interact with computers and human beings to communicate their emotions and intentions. Facial expressions, and other gestures, convey non-verbal communication cues in face-to-face interactions. In this paper we have developed an algorithm which is capable of identifying a person’s facial expression and categorize them as happiness, sadness, surprise and neutral. Our approach is based on local binary patterns for representing face images. In our project we use training sets for faces and non faces to train the machine in identifying the face images exactly. Facial expression classification is based on Principle Component Analysis. In our project, we have developed methods for face tracking and expression identification from the face image input. Applying the facial expression recognition algorithm, the developed software is capable of processing faces and recognizing the person’s facial expression. The system analyses the face and determines the expression by comparing the image with the training sets in the database. We have followed PCA and neural networks in analyzing and identifying the facial expressions.
FACE RECOGNITION USING PRINCIPAL COMPONENT ANALYSIS WITH MEDIAN FOR NORMALIZA...csandit
Recognizing Faces helps to name the various subjects present in the image. This work focuses
on labeling faces on an image which includes faces of humans being of various age group
(heterogeneous set ). Principal component analysis concentrates on finds the mean of the data
set and subtracts the mean value from the data set with an intention to normalize that data.
Normalization with respect to image is the removal of common features from the data set. This
work brings in the novel idea of deploying the median another measure of central tendency for
normalization rather than mean. The above work was implemented using matlab. Results show
that Median is the best measure for normalization for a heterogeneous data set which gives
raise to outliers.
PRE-PROCESSING TECHNIQUES FOR FACIAL EMOTION RECOGNITION SYSTEMIAEME Publication
Humans share a universal and fundamental set of emotions which are exhibited through consistent facial expressions. Recognition of human emotions from the imaging templates is useful in a wide variety of human-computer interaction and intelligent systems applications. However, the automatic recognition of facial expressions using image template matching techniques suffer from the natural variability with facial features and recording conditions. In spite of the progress achieved in facial emotion recognition in recent years, the effective and computationally simple feature extraction and classification technique for emotion recognition is still an open problem. Image pre-processing and normalization is significant part of face recognition systems. Changes in lighting conditions produces dramatically decrease of recognition performance. In this paper, the image pre-processing techniques like K-Nearest Neighbor, Cultural Algorithm and Genetic Algorithm are used to remove the noise in the facial image for enhancing the emotion recognition. The performance of the preprocessing techniques are evaluated with various performance metrics.
A Novel Feature Selection with Annealing For Computer Vision And Big Data Lea...theijes
Numerous PC vision and medical imaging issues a confronted with gaining from expansive scale datasets, with a huge number of perceptions furthermore, highlights.A novel productive learning plan that fixes a sparsity imperative by continuously expelling variables taking into account a measure and a timetable. The alluring actuality that the issue size continues dropping all through the cycles makes it especially reasonable for enormous information learning. Methodology applies nonexclusively to the advancement of any differentiable misfortune capacity, and discovers applications in relapse, order and positioning. The resultant calculations assemble variable screening into estimation and are amazingly easy to execute. It gives hypothetical assurances of joining and determination consistency. Investigates genuine and engineered information demonstrate that the proposed strategy contrasts exceptionally well and other cutting edge strategies in relapse, order and positioning while being computationally exceptionally effective and adaptable.
Blind Source Separation of Super and Sub-Gaussian Signals with ABC AlgorithmIDES Editor
Recently, several techniques have been presented
for blind source separation using linear or non-linear mixture
models. The problem is to recover the original source signals
without knowing apriori information about the mixture model.
Accordingly, several statistic and information theory-based
objective functions are used in literature to estimate the
original signals without providing mixture model. Here,
swarm intelligence played a major role to estimate the
separating matrix. In our work, we have considered the recent
optimization algorithm, called Artificial Bee Colony (ABC)
algorithm which is used to generate the separating matrix in
an optimal way. Here, Employee and onlooker bee and scout
bee phases are used to generate the optimal separating matrix
with lesser iterations. Here, new solutions are generated
according to the three major considerations such as, 1) all
elements of the separating matrix should be changed according
to best solution, 2) individual element of the separating matrix
should be changed to converge to the best optimal solution, 3)
Random solution should be added. These three considerations
are implemented in ABC algorithm to improve the
performance in Blind Source Separation (BSS). The
experimentation has been carried out using the speech signals
and the super and sub-Gaussian signal to validate the
performance. The proposed technique was compared with
Genetic algorithm in signal separation. From the result, it
was observed that ABC technique has outperformed existing
GA technique by achieving better fitness values and lesser
Euclidean distance.
FACIAL AGE ESTIMATION USING TRANSFER LEARNING AND BAYESIAN OPTIMIZATION BASED...sipij
Age estimation of unrestricted imaging circumstances has attracted an augmented recognition as it is
appropriate in several real-world applications such as surveillance, face recognition, age synthesis, access
control, and electronic customer relationship management. Current deep learning-based methods have
displayed encouraging performance in age estimation field. Males and Females have a variable type of
appearance aging pattern; this results in age differently. This fact leads to assuming that using gender
information may improve the age estimator performance. We have proposed a novel model based on
Gender Classification. A Convolutional Neural Network (CNN) is used to get Gender Information, then
Bayesian Optimization is applied to this pre-trained CNN when fine-tuned for age estimation task.
Bayesian Optimization reduces the classification error on the validation set for the pre-trained model.
Extensive experiments are done to assess our proposed model on two data sets: FERET and FG-NET. The
experiments’ result indicates that using a pre-trained CNN containing Gender Information with Bayesian
Optimization outperforms the state of the arts on FERET and FG-NET data sets with a Mean Absolute
Error (MAE) of 1.2 and 2.67 respectively.
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...ijscmcj
Face recognition is one of the most unobtrusive biometric techniques that can be used for access control as well as surveillance purposes. Various methods for implementing face recognition have been proposed with varying degrees of performance in different scenarios. The most common issue with effective facial biometric systems is high susceptibility of variations in the face owing to different factors like changes in pose, varying illumination, different expression, presence of outliers, noise etc. This paper explores a novel technique for face recognition by performing classification of the face images using unsupervised learning approach through K-Medoids clustering. Partitioning Around Medoids algorithm (PAM) has been used for performing K-Medoids clustering of the data. The results are suggestive of increased robustness to noise and outliers in comparison to other clustering methods. Therefore the technique can also be used to increase the overall robustness of a face recognition system and thereby increase its invariance and make it a reliably usable biometric modality.
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
Biometric matching involves finding similarity between fingerprint images.The accuracy and speed of the
matching algorithmdetermines its effectives. This researchaims at comparing two types of matching
algorithms namely(a) matching using global orientation features and (b) matching using minutia triangulation.The comparison is done using accuracy, time and number of similar features. The experiment is conducted on a datasets of 100 candidates using four (4) fingerprints from each candidate. The data is sampled from a mass registration conducted by a reputable organization in Kenya.Theresearch reveals that fingerprint matching based on algorithm (b) performs better in speed with an average of 38.32 milliseconds
as compared to matching based on algorithm (a) with an average of 563.76 milliseconds. On accuracy,algorithm(a) performs better with an average accuracy of 0.142433 as compared to algorithm (b) with an average accuracy score of 0.004202.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Efficient Facial Expression and Face Recognition using Ranking MethodIJERA Editor
Expression detection is useful as a non-invasive method of lie detection and behaviour prediction. However, these facial expressions may be difficult to detect to the untrained eye. In this paper we implements facial expression recognition techniques using Ranking Method. The human face plays an important role in our social interaction, conveying people's identity. Using human face as a key to security, the biometrics face recognition technology has received significant attention in the past several years. Experiments are performed using standard database like surprise, sad and happiness. The universally accepted three principal emotions to be recognized are: surprise, sad and happiness along with neutral.
Non-contact Heart Rate Monitoring Analysis from Various Distances with differ...IJECEIAES
Heart rate (HR) is one of vital biomedical signals for medical diagnosis. Previously, conventional camera is proven to be able to detect small changes in the skin due to the cardiac activity and can be used to measure the HR. However, most of the previous systems operate on near distance mode with a single face patch, thus the feasibility of the remote heart rate for various distances remains vague. This paper tackles this issue by analyzing an optimal framework that capable to works under the mentioned issues. Initially, plausible face landmarks are estimated by employing cascaded of regression mechanism. Next, the region of interest (ROI) was constructed from the landmarks in a face location where non rigid motion is minimal. From the ROI, temporal photoplethysmograph (PPG) signal is calculated based on the average green pixels intensity and environmental illumination is separated using Independent Component Analysis (ICA) filter. Eventually, the PPG signal is further processed using series of temporal filter to exclude frequencies outside the range of interest prior to estimate the HR. As a conclusion, the HR can be detected up to 5 meters range with 94% accuracy using lower part of face region.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Facial Expression Recognition Based on Facial Motion Patternsijeei-iaes
Facial expression is one of the most powerful and direct mediums embedded in human beings to communicate with other individuals’ feelings and abilities. In recent years, many surveys have been carried on facial expression analysis. With developments in machine vision and artificial intelligence, facial expression recognition is considered a key technique of the developments in computer interaction of mankind and is applied in the natural interaction between human and computer, machine vision and psycho- medical therapy. In this paper, we have developed a new method to recognize facial expressions based on discovering differences of facial expressions, and consequently appointed a unique pattern to each single expression.by analyzing the image by means of a neighboring window on it, this recognition system is locally estimated. The features are extracted as binary local features; and according to changes in points of windows, facial points get a directional motion per each facial expression. Using pointy motion of all facial expressions and stablishing a ranking system, we delete additional motion points that decrease and increase, respectively, the ranking size and strenghth. Classification is provided according to the nearest neighbor. In the conclusion of the paper, the results obtained from the experiments on tatal data of Cohn-Kanade demonstrate that our proposed algorithm, compared to previous methods (hierarchical algorithm combined with several features and morphological methods as well as geometrical algorithms), has a better performance and higher reliability.
The Formation of Job Referral Networks: Evidence from a Field Experiment in U...essp2
International Food Policy Research Institute (IFPRI) and Ethiopian Development Research Institute (EDRI) in collaboration with Ethiopian Economics Association (EEA). Eleventh International Conference on Ethiopian Economy. July 18-20, 2013
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONijsc
The word biometrics refers to the use of physiological or biological characteristics of human to recognize
and verify the identity of an individual. Face is one of the human biometrics for passive identification with
uniqueness and stability. In this manuscript we present a new face based biometric system based on neural
networks supervised self organizing maps (SOM). We name our method named SOM-F. We show that the
proposed SOM-F method improves the performance and robustness of recognition. We apply the proposed
method to a variety of datasets and show the results.
Illustration of Medical Image Segmentation based on Clustering Algorithmsrahulmonikasharma
Image segmentation is the most basic and crucial process remembering the true objective to facilitate the characterization and representation of the structure of excitement for medical or basic images. Despite escalated research, segmentation remains a challenging issue because of the differing image content, cluttered objects, occlusion, non-uniform object surface, and different factors. There are numerous calculations and techniques accessible for image segmentation yet at the same time there requirements to build up an efficient, quick technique of medical image segmentation. This paper has focused on K-means and Fuzzy C means clustering algorithm to segment malaria blood samples in more accurate manner.
Blind Source Separation of Super and Sub-Gaussian Signals with ABC AlgorithmIDES Editor
Recently, several techniques have been presented
for blind source separation using linear or non-linear mixture
models. The problem is to recover the original source signals
without knowing apriori information about the mixture model.
Accordingly, several statistic and information theory-based
objective functions are used in literature to estimate the
original signals without providing mixture model. Here,
swarm intelligence played a major role to estimate the
separating matrix. In our work, we have considered the recent
optimization algorithm, called Artificial Bee Colony (ABC)
algorithm which is used to generate the separating matrix in
an optimal way. Here, Employee and onlooker bee and scout
bee phases are used to generate the optimal separating matrix
with lesser iterations. Here, new solutions are generated
according to the three major considerations such as, 1) all
elements of the separating matrix should be changed according
to best solution, 2) individual element of the separating matrix
should be changed to converge to the best optimal solution, 3)
Random solution should be added. These three considerations
are implemented in ABC algorithm to improve the
performance in Blind Source Separation (BSS). The
experimentation has been carried out using the speech signals
and the super and sub-Gaussian signal to validate the
performance. The proposed technique was compared with
Genetic algorithm in signal separation. From the result, it
was observed that ABC technique has outperformed existing
GA technique by achieving better fitness values and lesser
Euclidean distance.
FACIAL AGE ESTIMATION USING TRANSFER LEARNING AND BAYESIAN OPTIMIZATION BASED...sipij
Age estimation of unrestricted imaging circumstances has attracted an augmented recognition as it is
appropriate in several real-world applications such as surveillance, face recognition, age synthesis, access
control, and electronic customer relationship management. Current deep learning-based methods have
displayed encouraging performance in age estimation field. Males and Females have a variable type of
appearance aging pattern; this results in age differently. This fact leads to assuming that using gender
information may improve the age estimator performance. We have proposed a novel model based on
Gender Classification. A Convolutional Neural Network (CNN) is used to get Gender Information, then
Bayesian Optimization is applied to this pre-trained CNN when fine-tuned for age estimation task.
Bayesian Optimization reduces the classification error on the validation set for the pre-trained model.
Extensive experiments are done to assess our proposed model on two data sets: FERET and FG-NET. The
experiments’ result indicates that using a pre-trained CNN containing Gender Information with Bayesian
Optimization outperforms the state of the arts on FERET and FG-NET data sets with a Mean Absolute
Error (MAE) of 1.2 and 2.67 respectively.
K-Medoids Clustering Using Partitioning Around Medoids for Performing Face Re...ijscmcj
Face recognition is one of the most unobtrusive biometric techniques that can be used for access control as well as surveillance purposes. Various methods for implementing face recognition have been proposed with varying degrees of performance in different scenarios. The most common issue with effective facial biometric systems is high susceptibility of variations in the face owing to different factors like changes in pose, varying illumination, different expression, presence of outliers, noise etc. This paper explores a novel technique for face recognition by performing classification of the face images using unsupervised learning approach through K-Medoids clustering. Partitioning Around Medoids algorithm (PAM) has been used for performing K-Medoids clustering of the data. The results are suggestive of increased robustness to noise and outliers in comparison to other clustering methods. Therefore the technique can also be used to increase the overall robustness of a face recognition system and thereby increase its invariance and make it a reliably usable biometric modality.
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
Biometric matching involves finding similarity between fingerprint images.The accuracy and speed of the
matching algorithmdetermines its effectives. This researchaims at comparing two types of matching
algorithms namely(a) matching using global orientation features and (b) matching using minutia triangulation.The comparison is done using accuracy, time and number of similar features. The experiment is conducted on a datasets of 100 candidates using four (4) fingerprints from each candidate. The data is sampled from a mass registration conducted by a reputable organization in Kenya.Theresearch reveals that fingerprint matching based on algorithm (b) performs better in speed with an average of 38.32 milliseconds
as compared to matching based on algorithm (a) with an average of 563.76 milliseconds. On accuracy,algorithm(a) performs better with an average accuracy of 0.142433 as compared to algorithm (b) with an average accuracy score of 0.004202.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Efficient Facial Expression and Face Recognition using Ranking MethodIJERA Editor
Expression detection is useful as a non-invasive method of lie detection and behaviour prediction. However, these facial expressions may be difficult to detect to the untrained eye. In this paper we implements facial expression recognition techniques using Ranking Method. The human face plays an important role in our social interaction, conveying people's identity. Using human face as a key to security, the biometrics face recognition technology has received significant attention in the past several years. Experiments are performed using standard database like surprise, sad and happiness. The universally accepted three principal emotions to be recognized are: surprise, sad and happiness along with neutral.
Non-contact Heart Rate Monitoring Analysis from Various Distances with differ...IJECEIAES
Heart rate (HR) is one of vital biomedical signals for medical diagnosis. Previously, conventional camera is proven to be able to detect small changes in the skin due to the cardiac activity and can be used to measure the HR. However, most of the previous systems operate on near distance mode with a single face patch, thus the feasibility of the remote heart rate for various distances remains vague. This paper tackles this issue by analyzing an optimal framework that capable to works under the mentioned issues. Initially, plausible face landmarks are estimated by employing cascaded of regression mechanism. Next, the region of interest (ROI) was constructed from the landmarks in a face location where non rigid motion is minimal. From the ROI, temporal photoplethysmograph (PPG) signal is calculated based on the average green pixels intensity and environmental illumination is separated using Independent Component Analysis (ICA) filter. Eventually, the PPG signal is further processed using series of temporal filter to exclude frequencies outside the range of interest prior to estimate the HR. As a conclusion, the HR can be detected up to 5 meters range with 94% accuracy using lower part of face region.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Facial Expression Recognition Based on Facial Motion Patternsijeei-iaes
Facial expression is one of the most powerful and direct mediums embedded in human beings to communicate with other individuals’ feelings and abilities. In recent years, many surveys have been carried on facial expression analysis. With developments in machine vision and artificial intelligence, facial expression recognition is considered a key technique of the developments in computer interaction of mankind and is applied in the natural interaction between human and computer, machine vision and psycho- medical therapy. In this paper, we have developed a new method to recognize facial expressions based on discovering differences of facial expressions, and consequently appointed a unique pattern to each single expression.by analyzing the image by means of a neighboring window on it, this recognition system is locally estimated. The features are extracted as binary local features; and according to changes in points of windows, facial points get a directional motion per each facial expression. Using pointy motion of all facial expressions and stablishing a ranking system, we delete additional motion points that decrease and increase, respectively, the ranking size and strenghth. Classification is provided according to the nearest neighbor. In the conclusion of the paper, the results obtained from the experiments on tatal data of Cohn-Kanade demonstrate that our proposed algorithm, compared to previous methods (hierarchical algorithm combined with several features and morphological methods as well as geometrical algorithms), has a better performance and higher reliability.
The Formation of Job Referral Networks: Evidence from a Field Experiment in U...essp2
International Food Policy Research Institute (IFPRI) and Ethiopian Development Research Institute (EDRI) in collaboration with Ethiopian Economics Association (EEA). Eleventh International Conference on Ethiopian Economy. July 18-20, 2013
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONijsc
The word biometrics refers to the use of physiological or biological characteristics of human to recognize
and verify the identity of an individual. Face is one of the human biometrics for passive identification with
uniqueness and stability. In this manuscript we present a new face based biometric system based on neural
networks supervised self organizing maps (SOM). We name our method named SOM-F. We show that the
proposed SOM-F method improves the performance and robustness of recognition. We apply the proposed
method to a variety of datasets and show the results.
Illustration of Medical Image Segmentation based on Clustering Algorithmsrahulmonikasharma
Image segmentation is the most basic and crucial process remembering the true objective to facilitate the characterization and representation of the structure of excitement for medical or basic images. Despite escalated research, segmentation remains a challenging issue because of the differing image content, cluttered objects, occlusion, non-uniform object surface, and different factors. There are numerous calculations and techniques accessible for image segmentation yet at the same time there requirements to build up an efficient, quick technique of medical image segmentation. This paper has focused on K-means and Fuzzy C means clustering algorithm to segment malaria blood samples in more accurate manner.
Implementation of Face Recognition in Cloud Vision Using Eigen FacesIJERA Editor
Cloud computing comes in several different forms and this article documents how service, Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The papers discuss a methodology for face recognition based on information theory approach of coding and decoding the face image. Proposed System is connection of two stages – Feature extraction using principle component analysis and recognition using the back propagation Network. This paper also discusses our work with the design and implementation of face recognition applications using our mobile-cloudlet-cloud architecture named MOCHA and its initial performance results. The dispute lies with how to performance task partitioning from mobile devices to cloud and distribute compute load among cloud servers to minimize the response time given diverse communication latencies and server compute powers
Comparative Analysis of Face Recognition Algorithms for Medical ApplicationAM Publications
Biometric-based techniques have emerged for recognizing individuals authenticating people. In the field of
face recognition, plastic surgery based face recognition is still a lesser explored area. Thus the use of face recognition for
surgical faces introduces the new challenge for designing future face recognition system. Face recognition after plastic
surgery can lead to rejection of genuine users or acceptance of impostors. Transmuting facial geometry and texture
increases the intra-class variability between the pre- and post-surgery images of the same individual. Therefore, matching
post-surgery images with pre-surgery images becomes a difficult task for automatic face recognition algorithms. This paper
deals with testing of two popular face recognition algorithms on plastic surgery database such as PCA and LDA and
compared this algorithms based on Recognition Rate for better performance. Finally, the results are concluded.
ZERNIKE-ENTROPY IMAGE SIMILARITY MEASURE BASED ON JOINT HISTOGRAM FOR FACE RE...AM Publications
The direction of image similarity for face recognition required a combination of powerful tools and stable in case of any challenges such as different illumination, various environment and complex poses etc. In this paper, we combined very robust measures in image similarity and face recognition which is Zernike moment and information theory in one proposed measure namely Zernike-Entropy Image Similarity Measure (Z-EISM). Z-EISM based on incorporates the concepts of Picard entropy and a modified one dimension version of the two dimensions joint histogram of the two images under test. Four datasets have been used to test, compare, and prove that the proposed Z-EISM has better performance than the existing measures
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMSijma
Face detection is one of the most relevant applications of image processing and biometric systems.
Artificial neural networks (ANN) have been used in the field of image processing and pattern recognition.
There is lack of literature surveys which give overview about the studies and researches related to the using
of ANN in face detection. Therefore, this research includes a general review of face detection studies and
systems which based on different ANN approaches and algorithms. The strengths and limitations of these
literature studies and systems were included also.
Review of face detection systems based artificial neural networks algorithmsijma
Face detection is one of the most relevant applications of image processing and biometric systems.
Artificial neural networks (ANN) have been used in the field of image processing and pattern recognition.
There is lack of literature surveys which give overview about the studies and researches related to the using
of ANN in face detection. Therefore, this research includes a general review of face detection studies and
systems which based on different ANN approaches and algorithms. The strengths and limitations of these
literature studies and systems were included also.
Effectual Face Recognition System for Uncontrolled IlluminationIIRindia
Facial recognition systems are biometric methods used to pinpoint the identities of faces present in various digital formats by comparing them to facial databases. The variation in illuminating conditions is a huge hindrance for efficient operation of facial verification systems. The effects of change in ambient lighting conditions and formation of shadows can be nullified by an effortless pre-processing system. This paper presents an effectual Facial Recognition System which consists of three stages: the illumination insensitive preprocessing method, Feature Extraction and Score Fusion. In the preprocessing stage, the light-sensitive images are converted to light-insensitive images so that uncontrolled lighting will no more be a liability for any kind of identification. In the feature extraction stage, hybrid Fourier classifiers are used to obtain transforms which are projected into subspaces using PCLDA Theory. And the output is passed onto the Score Fusion stage where the discriminating powers of the classifiers are unified by using LLR and knowing the ground truth optimizations. This proposal has passed the Face Recognition Grand Challenge (FRGC) Version-2 Experiment, Extended Yale B and FERET datasets.
CDS is the criminal face identification by capsule neural network.
Solving the common problems in image recognition such as illumination problem, scale variability, and to fight against a most common problem like pose problem, we are introducing Face Reconstruction System.
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
UiPath Test Automation using UiPath Test Suite series, part 5
An Approach to Face Recognition Using Feed Forward Neural Network
1. International Journal of Computer Applications Technology and Research
Volume 6–Issue 4, 183-189, 2017, ISSN:-2319–8656
An Approach to Face Recognition Using Feed Forward
Neural Network
Sajetha T
Dept. of CSE, UVCE,
Bangalore University,
Bangalore, India
Samyama Gunjal G H
Dept. of CSE, UVCE,
Bangalore University,
Bangalore, India
Abstract: Many approaches have been proposed for face recognition but there are major constraints like illumination, lightning, pose
etc., when taken into consideration, results in poor recognition rate. We propose a method to improve the recognition rate of the face
recognition system which uses various methods like homogeneity, energy, covariance, contrast, asymmetry, correlation, mean,
standard deviation, entropy, kurtosis to extract the facial features for a better recognition rate. Also the extracted features are trained
and it is associated with a feed forward back propagation neural network used for classification to render better results.
Keywords: Face recognition, Neural network, Features extraction.
I. INTRODUCTION
Face recognition is an active research area in last 30
years. Criminal immigrant detection, Passport authentication,
participant identification, system access control, enterprise
security, scanning criminal persons, telecommunication are some
of the applications of face recognition system [1]. Although there
is remarkable progress in the face recognition system, it remains a
challenging problem, mainly because of the complexities involved
in variations in illumination, where because of different light
conditions the face may appear differently. This leads in the
misclassification of the input face images. Another problem is
posing, where the face recognition system becomes unable to
recognize the different poses of the same person. The different
poses may include face images with smiling, not smiling, wearing
glasses or without glasses and so on. Therefore it becomes
necessary to develop an efficient face recognition system.
The approaches for face recognition system can be dealt
as analytical and holistic approaches. For analytical approaches,
the face outline forms a feature vector which represents a face [2].
Holistic method uses the whole face information.
Principal Component Analysis (PCA) is a well known holistic
method which uses eigenface for face recognition [3]. PCA can
achieve the minimum error but it has limitations where it is hard
to decide suitable thresholds automatically and to decide upon on
how many eigenvectors are required to recover an original face.
Linear Discriminant Analysis (LDA) is another holistic method
which is applied for the fisher face methods. It lags behind where
it needs large training sample sets for good generalization. PCA is
normally adopted to reduce the feature dimension before LDA can
be applied. In the proposed method, we are detecting various
features of face like homogeneity, energy, variance, contrast,
asymmetry, correlation, mean, standard deviation, entropy,
kurtosis each of these features has its own characteristics and
overall gives better recognition rate
II. ORGANIZATION OF
PAPER
The paper is organized as follows. Section I
deals with the brief description of basics of face
recognition system, its advantages, why the face
recognition system is required. Section III deals with
reviews of background of face recognition system
followed by the description of early and some new
techniques of face recognition system. Section IV deals
with proposed method. Section V deals with the
simulation and results of the proposed work with
classification using feed forward back propagation neural
network. Section VI gives the conclusion.
III. RELATED WORK
The face recognition methods are divided into
template based method and geometry based methods.
Template matching method uses the whole face
information.
R. Brunelli and T. Poggio developed the
template based method [4], where an array with intensity
values is used to represent the image and compared using
Euclidean distance.
Sirovich and Penev used PCA method to obtain
reduced dimensions of the human faces [6]. PCA is one of
the statistical approaches used for the compression of data
[5] and is also known as eigenface method. This method
was considered robust and produced a good recognition
rate on various database. However, PCA lags behind if
the parameter range exceeds. It also removes the
relationships between neighborhood pixels.
The Linear Discriminant Analysis or the fisher
face method is another statistical approach which is
considered as better than eigenface method in classifying
1
2. International Journal of Computer Applications Technology and Research
Volume 6–Issue 4, 183-189, 2017, ISSN:-2319–8656
face images better than the eigenface method. It uses interclass
and intraclass relationships to classify face images. It is robust
against noise, occlusion, and illumination [12].
Independent Component Analysis (ICA) is a new
statistical technique which extracts independent variables [7]. The
technique of ICA is originated from signal processing. However,
the training is considered slow and computational cost is high.
Geometry feature based methods were mainly focused on
finding the angles, size, and distance between eyes, nose, ears,
head outline and mouth. Wavelets is a technique used in the
geometry method to decompose complex signals into basis
functions, this is similar to Fourier decomposition. For several
computer vision applications Gabor filters are used [8].
IV. PROPOSED METHOD
The proposed method uses a well known face database,
ORL database from the AT&T laboratories, Cambridge [9]. The
architecture of the proposed system is as shown in Fig 1. A typical
face recognition system has pre-processing, feature extraction and
classification steps. In the proposed method pre-processing is
done where the images are converted to matrix form, Feature
extraction is done using homogeneity, energy, covariance,
contrast, asymmetry, mean, entropy, kurtosis, standard deviation,
and covariance. The classification is carried out using feed
forward neural network.
Fig 1: Architecture of proposed face recognition system
A. Pre-processing Stage
The first phase of face recognition system would be
collecting the face images. The images may contain unnecessary
factors like noise, blurriness, improper illumination effects,
distortions etc.
Pre-processing of images is used to enhance the image
features which might be important for further processing, it
optimize the images to get the satisfactory results on output.
Several pre-processing methods like enhancing
brightness of the images, smoothing of images to reduce noise,
contrast enhancement, edge enhancement, normalizing intensity of
image pixels, removing image reflections, histogram equalization
which distributes the brightness levels normally can be
applied to the selected input images. In the proposed
method images are collected from the ORL database. It is
transformed into matrix form in order to ease the
operation.
B. Feature Extraction Factors
• Homogeneity is used to see the similarity of the
pixels, to check the uniformity of the pixels.
• Energy is defined as a factor that would
capture the desired solution and perform
gradient-descent to compute its lowest value,
resulting in a solution for the image
segmentation.
• Covariance is a measure of how much the two
pixels change together, the greater values of one
pixel mainly correspond with the greater values
of the other pixel, and the same holds for the
smaller values, i.e., the pixels tend to show
similar behavior, the covariance is positive, in
the opposite case, when the greater values of
one pixel mainly correspond to the smaller
values of the other, i.e., the pixels tend to show
opposite behavior, the covariance is negative.
The covariance shows the linear relationship
between the pixels.
• The Contrast function enhances the contrast
of an image. It defines the intensity of the
image; image may have high intensity or the
low intensity.
• The Asymmetry is without symmetry means,
it is the analysis of the abnormal distribution of
the pixels in the specified window. It means that
there are no mirror images in a composition. It
involves the measure of the asymmetry of the
data. If asymmetry is negative then the data are
spread more to the left of the mean. If it is
negative the data are spread more to the right.
The asymmetry of the normal distribution is
zero.
[1] The Correlation defines how much the pixels are
closely related to each other. Properties of
correlation are:
• Single objects usually have a higher
correlation value within them than
between adjacent objects.
• Pixels are usually more highly
correlated with pixels nearby than
with more distant pixels. Smaller
window sizes will usually have a
higher correlation value than larger
windows.
• Correlation is calculated for
successively larger window sizes, the
size at which the Correlation value
declines may be taken as the size of
definable objects within an image,
which works only if all objects in the
image are of same size.
2
3. International Journal of Computer Applications Technology and Research
Volume 6–Issue 4, 183-189, 2017, ISSN:-2319–8656
• Correlation uses a different approach in
calculation than the other texture measures
mentioned above. As a result, it provides
different information and can often be used in
combination with other texture measures.
• If all the pixels have identical values, then the
variances are zero and the correlation equation
would give an undefined result.
• If the variance is zero, then the equation is not
used, and the correlation is set to 1, to reflect
identical pixels.
[2] Mean returns the mean of image. It finds out the mean of the
row pixels, the mean of the column pixels and the mean
together with row and column pixels returning mean of the
image.
[3] Standard deviation returns deviation between images. It
computes the standard deviation of each row and column of
the input.
[4] Entropy measures the randomness of the pixels, which is
used to characterize the texture of the input image [11].
[5] Kurtosis describes the peakness of image, frequency
distribution of the pixels. If the distribution is normal then
the kurtosis has zero value. If the kurtosis value is positive its
peak distribution will be sharper. Conversely, if kurtosis has
negative value lesser the peak distribution will be. The
extracted features from test and training images are classified
using feed forward neural network.
C. Feature Extraction
In various applications feature extraction is a
process of dimensionality reduction, which is required if the input
data to be processed is too large and redundant, then the input data
is transformed into a reduced dimension set of features, which are
also called as features vectors.
In the proposed method the features of the face are
extracted and fed as input to the neural network for the further
process. Extraction of the relevant information is necessary for the
proper recognition to be made.
Rather than working with the entire image it is
simple to analyze the relevant extracted features. In the proposed
method the features like Homogeneity, Energy, Covariance,
Contrast, Asymmetry, Correlation, Mean, Standard Deviation,
Entropy, and Kurtosis. The following equations are used to extract
the particular features [10].
Features Expression
Homogeneity H=∑
i,j
p (i,j)
1+∣i− j∣
Energy
Range = [0 1]
Energy is 1 for a
constant image.
E=∑
i,j
p(i,j)2
p (i, j) is the pixel value at the point (i, j)
Covariance Var=√SD
Contrast
Is 0 for a
constant image
C=∑
i,j
∣i− j∣
2
p(i,j)
Asymmetry
A=
1
mn
∑
i=1
m
∑
j=1
n
(p(i,j−μ)
σ )
3
p (i, j) is the pixel value at point (i,j), µ and
σ are the mean and standard deviation
respectively.
Correlation
1 if the image is
positively
correlated
-1 if the image in
negatively
correlated
Corr=∑
i,j
(i−μi)( j−μ j ) p(i,j)
σi σ j
pi and pj, the partial probability density
functions.
Mean
μ=
1
mn
∑
i=1
m
∑
j=1
n
p(i,j)
p (i, j) is the pixel value at point (i, j) of an
image of size mXn.
Standard
Deviation (SD)
σ=
√ 1
mn
∑
i=1
m
∑
j=1
n
( p(i,j)−μ)2
Entropy
Ent=−∑
k=0
L−1
prk (log2 prk )
prk is the kth
grey level probability,
L total number of grey levels.
Kurtosis
K=
{1
mn
∑
i= 1
m
∑
j=1
n
[p(i,j)−μ
σ ]
4
}−3
p (i, j) is the pixel value at point (i, j),
For normal distribution -3 becomes zero.
3
4. International Journal of Computer Applications Technology and Research
Volume 6–Issue 4, 183-189, 2017, ISSN:-2319–8656
D. Neural network
The Feed Forward Back propagation neural network is a
technique with the network structure, having series of layers,
where the inputs flows forward in the network. The network is a
collection of nodes connected together. Nodes represent neurons
and arrows represent links between them. Input layer has input
nodes which simply pass values to the processing nodes. The
activity of hidden layer is hidden. The output layer is expected to
give the output.
Back propagation neural network works in two phases.
Feed forward and feed backward. Network without cycles are
called a feed-forward networks, where the inputs flows only
forward. In the feed backward network, weights can be used, if the
expected output doesn’t come then the weights can be changed in
such a way that it will achieve expected output.
Fig 2: Feed Forward Back propagation neural network
In the proposed method feed forward neural network is
used. The features extracted for the face is fed as an input to the
neural network. It propagates forward and gives the expected
result, which is in this case recognizing the input face. The
features obtained for input face is compared with the features of
the training dataset faces. The network is trained with the training
dataset images. The feed forward back propagation neural network
is as shown in Fig 2.
The advantage of using neural network in classification
stage is, there is no need to train the network with known inputs
repeatedly. Once it is trained it is expected to work efficiently to
analyze the data, and is easy to maintain.
V. SIMULATION AND RESULTS
In the proposed method 8 selected face images of
different individuals from the ORL database are considered and
training data consists of 40 images, each individual with 5
different facial expressions like open/close eyes, smiling or not
smiling, glasses or no glasses. The sample dataset is as shown in
Fig 4. The test faces are shown in Fig 3. For some faces, the
images were taken at different times, varying the lighting.
The system has been simulated in MATLAB.
Fig 3: Test data
Fig 4: Sample data set consisting each person image
with different facial expression
Any face image among 8 different individuals is
given as input to the face recognition system. The training
data set is loaded and features are extracted for the
training data set. With the extracted features classification
is carried out using back propagation neural network.
Then a decision is made upon recognizing the face. The
test data with recognized face is as shown in Fig 5.
Fig 5: Test face and recognized face
4
5. International Journal of Computer Applications Technology and Research
Volume 6–Issue 4, 183-189, 2017, ISSN:-2319–8656
The values obtained for all the features mentioned for
the input face is given in Table 1.
TABLE I: THE FEATURE VALUES OBTAINED
Features Values
Homogeneity (H) 0.2624
Energy (E) 3.8950
Covariance (Var) 3.5248
Contrast (C) 6.9221
Asymmetry (A) 0.2327
Correlation (Corr) 6.9662
Mean (µ) 0.3252
Standard deviation
(σ)
131.98
Entropy (Ent) -693.7
Kurtosis (K) 432051
VI. CONCLUSION
For any face recognition system feature extraction is an
important step. If features are not extracted properly recognition
becomes difficult. The proposed face recognition system has high
recognition rate as it calculates various features like homogeneity,
energy, correlation, covariance, mean, standard deviation,
kurtosis, asymmetry, contrast, entropy.
Extracted features increase the robustness of the face
recognition system. It is found that the recognition rate for the
selected database followed by neural network gives high
recognition rate and eliminates the variations due to pose.
REFERENCES
[1]. D. Osten, H.M.Carin, M.R.Arneson and B.L.Blan,
“Biometric personal authentication system”, U.S. Patent #571,
9950, Feb 1998.
[2]. Kin- Man Lam and Hong Yan,”An Analytic – to – Holistic
Approach for Face Recognition Based on a Single Frontal View”,
IEEE Trans., on Pattern Analysis and Machine Intelligence,
Vol.20, no. 7, July 1998.
[3]. K.I. Diamantaras and S.Y.Kung,”Principal Component Neural
Network:Theory and Applications”, John Wiley & Sons,Inc.,
1996.
[4]. R. Brunelli, T. Poggio, “Face recognition: Features versus
templates”, IEEE Trans. Pattern Analysis and Machine
Intelligence, vol. 15(10), pp.1042-1052, 1998.
[5]. M.Turk and A.Pentland,” Eigenfaces for recognition”,
J.Cognitive Neuroscience, vol.3, 71-86., 1991.
[6]. Sirovich, L, Penev, P.S., “The global dimensionality
of face space”, 4th
IEEE International conference, 2000.
[7]. A. Hyvaerinen, E. Oja.,” A fast fixed-point algorithm
for independent component analysis”, MIT Press, Neural
Computation, vol. 9, pp.1483-1492, 1997.
[8]. Rahman , M.T, Bhuiyan, M.A, “ Face Recognition
using Gabor Filters”, 11th
International Conference, 24-
27, Dec 2008.
[9].http://www.uk.research.att.com/facedatabase.html.
[10]. http://www.mathworks.in.
[11]. Fattah,S.A, ”Spatial Domain Entropy based local
feature extraction scheme for face recognition”, 7th
International Conference, 24-27, Dec 2012.
[12]. Shuiwang Ji, Jieping Ye, “A Unified framework for
generalized linear Discriminant Analysis”, IEEE
International conference on Computer vision and Pattern
Recognition, 2008.
5