In todays world, there are number of existing methods for facial recognition. These methods are based on frontal view face data. There are few methods which are based on non-frontal view face recognition method. In most of the face recognition algorithm, œFeature space approach is used. In this approach, different feature vectors are extracted from face. These distances are compared to determine matches. In this paper, it is proposed that how any person can be located in a campus or in a city using a cross pose face recognition method. This paper is focusing on three parts 1) generation of multi-view images 2) comparison of images 3) showing the actual location of a person. Sanjay D. Sawaitul"Cross Pose Facial Recognition Method for Tracking any Persons Location an Approach" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-1 , December 2017, URL: http://www.ijtsrd.com/papers/ijtsrd7186.pdf http://www.ijtsrd.com/computer-science/data-processing/7186/cross-pose-facial-recognition-method-for--tracking-any-persons-location-an-approach/sanjay-d-sawaitul
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...IJERA Editor
This paper describes the technique for real time human face detection and tracking for age rank, weight and gender estimation. Face detection is involved with finding whether there are any faces in a given image and if there are any faces present, track the face and returns the face region with features of each face. Here it describes a simple and convenient hardware implementation of face detection method using Raspberry Pi Processor, which itself is a minicomputer of a credit card size. This paper presents a cost-sensitive ordinal hyperplanes ranking algorithm for human age evaluation based on face images. Two main components for building an efficient age estimator are facial feature extraction and estimator learning. Using feature extraction and comparing with our input database in which we have different age group face images with weight is specified according to that we also specify weight category i.e. under weight, normal weight and overweight . In this article we present gender estimation technique, which effectively integrates the head as well as mouth motion information with facial appearance by taking advantage of a unified probabilistic framework. Facial appearance as well as head and mouth motion possess a potentially relevant discriminatory power, and that the integration of different sources of biometric data from video sequences is the key approach to develop more precise and reliable realization systems.
Abstract: This paper presents a new face parts information analyzer, as a promising model for detecting faces and locating the facial features in images. The main objective is to build fully automated human facial measurements systems from images with complex backgrounds. Detection of facial features such as eye, nose, and mouth is an important step for many subsequent facial image analysis tasks. The main study of face detection is detect the portion of part and mention the circle or rectangular of the every portion of body. In this paper face detection is depend upon the face pattern which is match the face from the pattern reorganization. The study present a novel and simple model approach based on a mixture of techniques and algorithms in a shared pool based on viola jones object detection framework algorithm combined with geometric and symmetric information of the face parts from the image in a smart algorithm.Keywords: Face detection, Video frames, Viola-Jones, Skin detection, Skin color classification, Face reorganization, Pattern reorganization. Skin Color.
Title: Face Detection Using Modified Viola Jones Algorithm
Author: Alpika Gupta, Dr. Rajdev Tiwari
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
CDS is the criminal face identification by capsule neural network.
Solving the common problems in image recognition such as illumination problem, scale variability, and to fight against a most common problem like pose problem, we are introducing Face Reconstruction System.
Scale Invariant Feature Transform Based Face Recognition from a Single Sample...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
Human Face Detection and Tracking for Age Rank, Weight and Gender Estimation ...IJERA Editor
This paper describes the technique for real time human face detection and tracking for age rank, weight and gender estimation. Face detection is involved with finding whether there are any faces in a given image and if there are any faces present, track the face and returns the face region with features of each face. Here it describes a simple and convenient hardware implementation of face detection method using Raspberry Pi Processor, which itself is a minicomputer of a credit card size. This paper presents a cost-sensitive ordinal hyperplanes ranking algorithm for human age evaluation based on face images. Two main components for building an efficient age estimator are facial feature extraction and estimator learning. Using feature extraction and comparing with our input database in which we have different age group face images with weight is specified according to that we also specify weight category i.e. under weight, normal weight and overweight . In this article we present gender estimation technique, which effectively integrates the head as well as mouth motion information with facial appearance by taking advantage of a unified probabilistic framework. Facial appearance as well as head and mouth motion possess a potentially relevant discriminatory power, and that the integration of different sources of biometric data from video sequences is the key approach to develop more precise and reliable realization systems.
Abstract: This paper presents a new face parts information analyzer, as a promising model for detecting faces and locating the facial features in images. The main objective is to build fully automated human facial measurements systems from images with complex backgrounds. Detection of facial features such as eye, nose, and mouth is an important step for many subsequent facial image analysis tasks. The main study of face detection is detect the portion of part and mention the circle or rectangular of the every portion of body. In this paper face detection is depend upon the face pattern which is match the face from the pattern reorganization. The study present a novel and simple model approach based on a mixture of techniques and algorithms in a shared pool based on viola jones object detection framework algorithm combined with geometric and symmetric information of the face parts from the image in a smart algorithm.Keywords: Face detection, Video frames, Viola-Jones, Skin detection, Skin color classification, Face reorganization, Pattern reorganization. Skin Color.
Title: Face Detection Using Modified Viola Jones Algorithm
Author: Alpika Gupta, Dr. Rajdev Tiwari
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
CDS is the criminal face identification by capsule neural network.
Solving the common problems in image recognition such as illumination problem, scale variability, and to fight against a most common problem like pose problem, we are introducing Face Reconstruction System.
Facial image classification and searching –a surveyZac Darcy
Recent developments in the area of image mining have shown the way for incredible growth in
extensively large and detailed image databases. The images which are available in these
databases, if checked, can endow with valuable information to the human users. As one of the
most successful applications of image analysis and understanding, fac
e recognition has
recently gained important attention particularly throughout the past many years. Though
tracking and recognizing face objects is a routine task, building such a system is still an active
research. Among several proposed face rec
ognition schemes, shape based approaches are
possibly the most promising ones. This paper provides an overview of various
classification and retrieval methods that were proposed earlier in literature. Also, this paper
provides a margina
l summary for future research and enhancements in face detection
Graduation Project - Face Login : A Robust Face Identification System for Sec...Ahmed Gad
Face login is my 2015 graduation project started in 2014 and lasted 1.5 years of work.
Generally, it is an identification system using face images. It is a multi-use system but it was mainly created to authorize users to login into their system.
There is an IEEE paper published by the project algorithm used in ICCES 2014 http://ieeexplore.ieee.org/abstract/document/7030929/.
Here is its citation Semary, Noura A., and Ahmed Fawzi Gad. "A proposed framework for robust face identification system." Computer Engineering & Systems (ICCES), 2014 9th International Conference on. IEEE, 2014.
A YouTube video describing the project generally.
https://www.youtube.com/watch?v=OUvaPW70Eko
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today‟s biometric system. The purpose of our paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that may not be possible using a single biometric technology. Pre-processing is done for fingerprint and palmprint images separately in order to remove any noise. The next step is feature extraction. Minutiae algorithm is used for fingerprint feature extraction and Local Binary pattern for palmprint. Wavelet fusion is applied in order to fuse the extracted features and Support Vector Machine is used for matching. The main highlight of the project is multimodal biometrics which will give a better security and accuracy comparing to unimodel system.
A study of techniques for facial detection and expression classificationIJCSES Journal
Automatic recognition of facial expressions is an important component for human-machine interfaces. It
has lot of attraction in research area since 1990's.Although humans recognize face without effort or
delay, recognition by a machine is still a challenge. Some of its challenges are highly dynamic in their
orientation, lightening, scale, facial expression and occlusion. Applications are in the fields like user
authentication, person identification, video surveillance, information security, data privacy etc. The
various approaches for facial recognition are categorized into two namely holistic based facial
recognition and feature based facial recognition. Holistic based treat the image data as one entity without
isolating different region in the face where as feature based methods identify certain points on the face
such as eyes, nose and mouth etc. In this paper, facial expression recognition is analyzed with various
methods of facial detection,facial feature extraction and classification.
A Review on Feature Extraction Techniques and General Approach for Face Recog...Editor IJCATR
In recent time, alongwith the advances and new inventions in science and technology, fraud people and identity thieves are
also becoming smarter by finding new ways to fool the authorization and authentication process. So, there is a strong need of efficient
face recognition process or computer systems capable of recognizing faces of authenticated persons. One way to make face recognition
efficient is by extracting features of faces. Several feature extraction techniques are available such as template based, appearancebased,
geometry based, color segmentation based, etc. This paper presents an overview of various feature extraction techniques
followed in different reasearches for face recognition in the field of digital image processing and gives an approach for using these
feature extraction techniques for efficient face recognition
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly in recent years and it is more direct, user friendly and convenient compared to other methods. But face recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness detection in order to guard against such spoofing. In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works regarding face liveness detection works is presented. The main aim is to provide a simple path for the future development of novel and more secured face liveness detection approach.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
Four feature extraction algorithms are discussed here.
1. Principal Component Analysis
2. Discreet LInear Transform
3. Independent Component Analysis
4. Linear Discriminant Aalysis
Comparative Study of Lip Extraction Feature with Eye Feature Extraction Algor...Editor IJCATR
In recent time, along with the advances and new inventions in science and technology, fraud people and identity thieves are
also becoming smarter by finding new ways to fool the authorization and authentication process. So, there is a strong need of efficient
face recognition process or computer systems capable of recognizing faces of authenticated persons. One way to make face recognition
efficient is by extracting features of faces. This paper is to compare the relative efficiency of Lip Extraction and Eye extraction feature
for face recognition in biometric devices. Importance of this paper is to bring to the light which Feature Extraction method provides
better results under various conditions. For recognition experiments, I used face images of persons from different sets of YALE
database. In my dataset, there are total 132 images consisting of 11 persons & 12 face images of each person.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
Security and authentication of a person is a vital part of any business. There are many techniques use d for this purpose. One of technique is human face recognition . Human Face recognition is an effective means of authenticating a person. The benefit of this approa ch is that,it enables us to detect changes in the face pattern of an individual to substantial extent. The recognition s ystem can tolerate local variations in the face exp ression of an individual. Hence Human face recognition can be use d as a key factor in crime detection mainly to iden tify criminals. There are several approaches to Human fa ce recognition of which Image Processing Principal Component Analysis (PCA) and Neural Networks have been includ ed in our project. The system consists of a databas e of a set of facial patterns for each individual. The charact eristic features called �eigenfaces� are extracted from the stored images using which the system is trained for subseq uent recognition of new images.
Facial image classification and searching –a surveyZac Darcy
Recent developments in the area of image mining have shown the way for incredible growth in
extensively large and detailed image databases. The images which are available in these
databases, if checked, can endow with valuable information to the human users. As one of the
most successful applications of image analysis and understanding, fac
e recognition has
recently gained important attention particularly throughout the past many years. Though
tracking and recognizing face objects is a routine task, building such a system is still an active
research. Among several proposed face rec
ognition schemes, shape based approaches are
possibly the most promising ones. This paper provides an overview of various
classification and retrieval methods that were proposed earlier in literature. Also, this paper
provides a margina
l summary for future research and enhancements in face detection
Graduation Project - Face Login : A Robust Face Identification System for Sec...Ahmed Gad
Face login is my 2015 graduation project started in 2014 and lasted 1.5 years of work.
Generally, it is an identification system using face images. It is a multi-use system but it was mainly created to authorize users to login into their system.
There is an IEEE paper published by the project algorithm used in ICCES 2014 http://ieeexplore.ieee.org/abstract/document/7030929/.
Here is its citation Semary, Noura A., and Ahmed Fawzi Gad. "A proposed framework for robust face identification system." Computer Engineering & Systems (ICCES), 2014 9th International Conference on. IEEE, 2014.
A YouTube video describing the project generally.
https://www.youtube.com/watch?v=OUvaPW70Eko
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Advanced Authentication Scheme using Multimodal Biometric SchemeEditor IJCATR
Fingerprint recognition has attracted various researchers and achieved great success. But, fingerprint alone may not be able to meet the increasing demand of high accuracy in today‟s biometric system. The purpose of our paper is to inspect whether the integration of palmprint and fingerprint biometric can achieve performance that may not be possible using a single biometric technology. Pre-processing is done for fingerprint and palmprint images separately in order to remove any noise. The next step is feature extraction. Minutiae algorithm is used for fingerprint feature extraction and Local Binary pattern for palmprint. Wavelet fusion is applied in order to fuse the extracted features and Support Vector Machine is used for matching. The main highlight of the project is multimodal biometrics which will give a better security and accuracy comparing to unimodel system.
A study of techniques for facial detection and expression classificationIJCSES Journal
Automatic recognition of facial expressions is an important component for human-machine interfaces. It
has lot of attraction in research area since 1990's.Although humans recognize face without effort or
delay, recognition by a machine is still a challenge. Some of its challenges are highly dynamic in their
orientation, lightening, scale, facial expression and occlusion. Applications are in the fields like user
authentication, person identification, video surveillance, information security, data privacy etc. The
various approaches for facial recognition are categorized into two namely holistic based facial
recognition and feature based facial recognition. Holistic based treat the image data as one entity without
isolating different region in the face where as feature based methods identify certain points on the face
such as eyes, nose and mouth etc. In this paper, facial expression recognition is analyzed with various
methods of facial detection,facial feature extraction and classification.
A Review on Feature Extraction Techniques and General Approach for Face Recog...Editor IJCATR
In recent time, alongwith the advances and new inventions in science and technology, fraud people and identity thieves are
also becoming smarter by finding new ways to fool the authorization and authentication process. So, there is a strong need of efficient
face recognition process or computer systems capable of recognizing faces of authenticated persons. One way to make face recognition
efficient is by extracting features of faces. Several feature extraction techniques are available such as template based, appearancebased,
geometry based, color segmentation based, etc. This paper presents an overview of various feature extraction techniques
followed in different reasearches for face recognition in the field of digital image processing and gives an approach for using these
feature extraction techniques for efficient face recognition
Face Liveness Detection for Biometric Antispoofing Applications using Color T...rahulmonikasharma
Face recognition is a widely used biometric approach. Face recognition technology has developed rapidly in recent years and it is more direct, user friendly and convenient compared to other methods. But face recognition systems are vulnerable to spoof attacks made by non-real faces. It is an easy way to spoof face recognition systems by facial pictures such as portrait photographs. A secure system needs Liveness detection in order to guard against such spoofing. In this work, face liveness detection approaches are categorized based on the various types techniques used for liveness detection. This categorization helps understanding different spoof attacks scenarios and their relation to the developed solutions. A review of the latest works regarding face liveness detection works is presented. The main aim is to provide a simple path for the future development of novel and more secured face liveness detection approach.
Iris Encryption using (2, 2) Visual cryptography & Average Orientation Circul...AM Publications
Biometric authentication scheme used for person identification. Biometric authentication scheme consists of
uniqueness for identifying human using physiological and behavioral characteristics. So this technique is used for
criminal identification and this technique is used in civil service areas. In order to provide security to the data (2, 2)
secret sharing scheme. Basically iris recognition is the most secured scheme. Visual cryptography is the techniques
that divide the secret into shares.
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Hybrid Approach to Face Detection And Feature Extractioniosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A comparative review of various approaches for feature extraction in Face rec...Vishnupriya T H
Four feature extraction algorithms are discussed here.
1. Principal Component Analysis
2. Discreet LInear Transform
3. Independent Component Analysis
4. Linear Discriminant Aalysis
Comparative Study of Lip Extraction Feature with Eye Feature Extraction Algor...Editor IJCATR
In recent time, along with the advances and new inventions in science and technology, fraud people and identity thieves are
also becoming smarter by finding new ways to fool the authorization and authentication process. So, there is a strong need of efficient
face recognition process or computer systems capable of recognizing faces of authenticated persons. One way to make face recognition
efficient is by extracting features of faces. This paper is to compare the relative efficiency of Lip Extraction and Eye extraction feature
for face recognition in biometric devices. Importance of this paper is to bring to the light which Feature Extraction method provides
better results under various conditions. For recognition experiments, I used face images of persons from different sets of YALE
database. In my dataset, there are total 132 images consisting of 11 persons & 12 face images of each person.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
Security and authentication of a person is a vital part of any business. There are many techniques use d for this purpose. One of technique is human face recognition . Human Face recognition is an effective means of authenticating a person. The benefit of this approa ch is that,it enables us to detect changes in the face pattern of an individual to substantial extent. The recognition s ystem can tolerate local variations in the face exp ression of an individual. Hence Human face recognition can be use d as a key factor in crime detection mainly to iden tify criminals. There are several approaches to Human fa ce recognition of which Image Processing Principal Component Analysis (PCA) and Neural Networks have been includ ed in our project. The system consists of a databas e of a set of facial patterns for each individual. The charact eristic features called �eigenfaces� are extracted from the stored images using which the system is trained for subseq uent recognition of new images.
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
Automatic recognition and verification of human faces is a significant problem in the development and application of Human Computer Interaction (HCI).In addition, the demand for reliable personal identification in computerized access control has resulted in an increased interest in biometrics to replace password and identification (ID) card. Over the last couple of years, face recognition researchers have been developing new techniques fuelled by the advances in computer vision techniques, Design of computers, sensors and in fast emerging face recognition systems. In this paper, a Face Recognition and Verification System has been designed which is robust to variations of illumination, pose and facial expression but very sensitive to variations of the features of the face. This design reckons in the holistic or global as well as the analyticor geometric features of the face of the human beings. The global structure of the human face is analysed by Principal Component Analysis while the features of the local structure are computed considering the geometric features of the face such as the eyes, nose and the mouth. The extracted local features of the face are trained and later tested using Artificial Neural Network (ANN). This combined approach of the global and the local structure of the face image is proved very effective in the system we have designed as it has a correct recognition rate of over 90%.
Comparative Studies for the Human Facial Expressions Recognition Techniquesijtsrd
This article reviews the different techniques for recognizing facial expressions. First, it gives a description of the emotions their types and the techniques to measure the emotions. Then it talks about the identification of the face and then the techniques for extracting the features from the face. Then the various classifiers designed to classify these extracted features are discussed. Finally, a comparative study of some of the recent studies has been presented. Sheena Gaur | Mayank Dixit | Sayed Nasir Hasan | Anwaar Wani | Tanveer Kazi | Ahsan Z Rizvi "Comparative Studies for the Human Facial Expressions Recognition Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd28027.pdfPaper URL: https://www.ijtsrd.com/computer-science/other/28027/comparative-studies-for-the-human-facial-expressions-recognition-techniques/sheena-gaur
Facial Image Classification And Searching - A SurveyZac Darcy
Recent developments in the area of image mining have shown the way for incredible growth in
extensively large and detailed image databases. The images which are available in these
databases, if checked, can endow with valuable information to the human users. As one of the
most successful applications of image analysis and understanding, face recognition has
recently gained important attention particularly throughout the past many years. Though
tracking and recognizing face objects is a routine task, building such a system is still an active
research. Among several proposed face recognition schemes, shape based approaches are
possibly the most promising ones. This paper provides an overview of various
classification and retrieval methods that were proposed earlier in literature. Also, this paper
provides a marginal summary for future research and enhancements in face detection.
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGijiert bestjournal
Face recognition is a computer application technique for automatically identifying or
verifying a person from a digital image or a video frame source. To do this is by comparing
selected facial features from the digital image and a face dataset. It is basically used in
security systems and can be compared to other biometrics such as fingerprint recognition or
eye, iris recognition systems. The main limitation of the current face recognition system is
that they only detect straight faces looking at the camera. Separate versions of the system
could be trained for each head orientation, and the results can be combined using arbitration
methods similar to those presented here. In earlier work, the face position must be centerlight
position; any lighting effect will affect the system. Similarly the eyes of person must be
open and without glass.
The foundations for biometrics or identification systems were laid long ago. Today these developments have contributed to the identification of people, access to private sites and all places that need security and order with the help of computerized computers that perform biometric facial recognition, exclusively based on images of human faces for their function. With the extraction of facial midst characteristics of each person provides information used for the detection of the face. This communication also addresses the different processes, stages and methods of feature extraction operated by facial recognition systems. Including the positive and negative aspects of the implementation of these, the advantages and disadvantages, peoples criteria in this respect. Tovbaev Sirojiddin | Karshiboev Nizomiddin "Image Based Facial Recognition" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31330.pdf Paper Url :https://www.ijtsrd.com/computer-science/artificial-intelligence/31330/image-based-facial-recognition/tovbaev-sirojiddin
Face Recognition Based Attendance System with Auto Alert to Guardian using Ca...ijtsrd
Now a days the wise attending management system victimization face detection techniques. Daily attending marking could also be a typical and vital activity in colleges and colleges for checking the performance of students. Manual attending maintaining is tough methodology, significantly for large cluster of students. Some machine driven systems developed to x beat these difficulties, have drawbacks like worth, faux attending, accuracy, meddlesomeness. To beat these drawbacks, there is need of good and automatic attending system. We've a bent to unit implementing attending system victimization face recognition. Since face is exclusive identity of person, the problem of pretend attending and proxies could also be resolved. The system uses native binary pattern face recognition technique because it is fast, straightforward and has larger success rate. Also, its pro vision to have an effect on intensity of sunshine draw back and head produce draw back that produces it effective. This wise system could also be degree effective because of maintain the degree will less squat recognition system is planned supported appearance based choices that concentrate on the shortened squatter image rather than native countenance. The remainder step in squatter recognition system is squatter detection Viola Jones squatter detection methodology that capable of method photos terribly whereas achieving higher detection rates is utilized. The complete squatter recognition methodology could also be divided into a pair of parts squatter detection and squatter identification. For face detection, Viola Jones face detection methodology has been used out of the many face detection ways that. Once face detection, face is cropped from the actual image to urge obviate the background. Chemist faces and shear faces ways that are used for face identification. Average photos of subjects area unit used as coaching job set to spice up the accuracy of identification. Diksha Ghare | Prajakta Katakdhod | Shraddha Ujgare | Komal Suskar | Prof. Amruta Surana ""Face Recognition Based Attendance System with Auto Alert to Guardian using Call and SMS"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23928.pdf
Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/23928/face-recognition-based-attendance-system-with-auto-alert-to-guardian-using-call-and-sms/diksha-ghare
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Similar to Cross Pose Facial Recognition Method for Tracking any Person's Location an Approach (20)
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Cross Pose Facial Recognition Method for Tracking any Person's Location an Approach
1. @ IJTSRD | Available Online @ www.ijtsrd.com
ISSN No: 2456
International
Research
Cross Pose Facial Recognition Method for
Tracking any Person’
Department of Computer Technology, K.I.T.S., Ramtek, Nagpur, India
ABSTRACT
In today’s world, there are number of existing methods
for facial recognition. These methods are based on
frontal view face data. There are few methods which
are based on non-frontal view face recognition method.
In most of the face recognition algorithm, “Feature
space” approach is used. In this approach, different
feature vectors are extracted from face. These distances
are compared to determine matches. In this paper, it is
proposed that how any person can be located in a
campus or in a city using a cross pose face recognition
method. This paper is focusing on three parts 1)
generation of multi-view images 2) comparison of
images 3) showing the actual location of a person.
Keywords: Feature Space, Face Recognition, Cross
Pose method.
I. INTRODUCTION
Image processing concept plays an important role in
aspects of all science and technology field. Face
recognition is one of the biggest challenges for today’s
scientist in real applications. A facial recognition
system is a system which identifies and verifies a
person automatically from a digital image or a video
frame from a video source. One of the methods to do
this is by comparing selected facial features from the
image and a facial database. Face recognition is one of
the most pertinent applications of image analysis. It is
really a true challenge for the developer to build an
automated system which can recognize faces same like
a human being. “Face geometry” was the first way to
recognize people. There are number of algorithms
which can be used for identifying the faces.
Recognition algorithm can be divided into two main
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 1 | Nov-Dec 2017
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
Cross Pose Facial Recognition Method for
Tracking any Person’s Location an Approach
Sanjay D. Sawaitul
f Computer Technology, K.I.T.S., Ramtek, Nagpur, India
In today’s world, there are number of existing methods
for facial recognition. These methods are based on
frontal view face data. There are few methods which
ace recognition method.
In most of the face recognition algorithm, “Feature
space” approach is used. In this approach, different
feature vectors are extracted from face. These distances
are compared to determine matches. In this paper, it is
how any person can be located in a
campus or in a city using a cross pose face recognition
method. This paper is focusing on three parts 1)
view images 2) comparison of
images 3) showing the actual location of a person.
re Space, Face Recognition, Cross
Image processing concept plays an important role in
aspects of all science and technology field. Face
recognition is one of the biggest challenges for today’s
facial recognition
system is a system which identifies and verifies a
person automatically from a digital image or a video
frame from a video source. One of the methods to do
this is by comparing selected facial features from the
se. Face recognition is one of
the most pertinent applications of image analysis. It is
really a true challenge for the developer to build an
automated system which can recognize faces same like
a human being. “Face geometry” was the first way to
ber of algorithms
which can be used for identifying the faces.
Recognition algorithm can be divided into two main
approaches those are Geometric and Photometric.
Geometric is a process which keeps a track on
distinguishing features. Photometric is process that
arranges the data into statistical form. This process
converts an image into values, then it compares those
values with predefined templates to eliminate
variations[1].
In recent years, Biometric based techniques were
widely used to identify individuals. Face recognition is
having number of practical applications in the area of
biometrics, smart cards, law enforcement, information
security, access control and surveillance
Face recognition method can also be used for security
purpose. Instead of remembering any password or PIN
number, a user can feed the image of face, which can
be identified by the system and the access will be
granted. A good face recognition
proper preprocessing of image can remove the noise
and compensate the slight variations in scale
orientation. An automated human facial expression
recognition system can benefit multiple research fields.
Face recognition system perform
a) DETECTION(it finds the area of face or extracts a
face from an image or a video frame).
b) SEGMENTATION(it analyze the distances
between different points on face i.e. eyes, nose jaws
etc.).
c) RECOGNITION/VERIFICATION
the statistical data with database).
Dec 2017 Page: 1428
| www.ijtsrd.com | Volume - 2 | Issue – 1
Scientific
(IJTSRD)
International Open Access Journal
Cross Pose Facial Recognition Method for
Location an Approach
f Computer Technology, K.I.T.S., Ramtek, Nagpur, India
approaches those are Geometric and Photometric.
Geometric is a process which keeps a track on
Photometric is process that
arranges the data into statistical form. This process
n image into values, then it compares those
values with predefined templates to eliminate
In recent years, Biometric based techniques were
widely used to identify individuals. Face recognition is
having number of practical applications in the area of
biometrics, smart cards, law enforcement, information
security, access control and surveillance system [2].
Face recognition method can also be used for security
purpose. Instead of remembering any password or PIN
number, a user can feed the image of face, which can
be identified by the system and the access will be
granted. A good face recognition algorithm along with
proper preprocessing of image can remove the noise
and compensate the slight variations in scale
orientation. An automated human facial expression
recognition system can benefit multiple research fields.
Face recognition system performs three steps
(it finds the area of face or extracts a
face from an image or a video frame).
(it analyze the distances
between different points on face i.e. eyes, nose jaws
RECOGNITION/VERIFICATION(it compares
data with database).
2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 1 | Nov-Dec 2017 Page: 1429
In spite of number of methods for face recognition,
there are few challenges in face recognition method as
1) POSE VARIATIONS: The existing system
recognizes based on frontal images which can be
considered as the ideal image to detect he person.
The performance of face detection algorithm drops
when there are large pose variations.
2) FEATURE OCCLUSION: Beards, hats, glasses or
moustache may cause a problem for face
identification. These elements may introduce high
variability.
3) FACIAL EXPRESSION: Due to different facial
expressions, the features of face varies, which also
arises problem for face identification.
4) IMAGING CONDITIONS: Different weather
conditions and the quality of a camera may also
affect the quality of an image, affecting the
appearance of a face.[3]
II. RELATED WORK
In the beginning of the 1970's, face recognition was
treated as a 2D pattern recognition problem [4].The
distances between important points were used to
recognize known faces, e.g. measuring the distance
between the eyes or other important points or
measuring different angles of facial components. The
following methods are used in face recognition process.
1. Holistic Matching Methods
2. Feature-Based (structural) Methods
3. Hybrid Methods
1. HOLISTIC MATCHING METHODS: In holistic
approach, the complete face region is taken into
account as input data into face catching system.
One of the best example of holistic methods are
Eigenfaces[5], Principal Component Analysis,
Linear Discriminant Analysis [6] and Independent
Component Analysis etc.
2. FEATURE-BASED (STRUCTURAL)
METHODS: In this method, local features such as
eyes, nose and mouth are extracted and their
locations and local statistics are feed into a
structural classifier. A big challenge for feature
extraction methods is feature "restoration".[7]
3. HYBRID METHODS: Hybrid Face Recognition
Systems uses a combination of both Holistic and
Feature Extraction methods. Generally 3D Images
are used in hybrid methods. The image of a person's
face is caught in 3D, allowing the system to note
the curves of the eye sockets or the shapes of the
chin or forehead. The 3D system usually proceeds
through different terms as: Detection, Position,
Measurement, Representation and Matching.
DETECTION: Capturing a face either by scanning
a photograph or photographing a person's face in
real time.
POSITION: Determining the location, size and
angle of the head.
MEASUREMENT: Assigning measurements to
each curve of the face to make a template with
specific focus on the outside of the eye, the inside
of the eye and the angle of the nose.
REPRESENTATION: Converting the template
into a code - a numerical representation of the face.
MATCHING: Comparing the received data with
faces in the existing database. In this case, the 3D
image is to be compared with an existing 3D
image.[8]
Geometric approach is another way for face
recognition. The first historical way to recognize people
was based on face geometry. There are lots of
geometric features based on the points. Geometric
features may be generated by segments, perimeters and
areas of some figures formed by the points. The feature
set are described in detail “Human and machine
recognition of faces: a survey”[9], which helps in
comparing the recognition result. It includes 15
segments between the points and the mean values of 15
symmetrical segment pairs.[10]
III. PROPOSED METHODOLOGY
The proposed system can track a person’s location.
This can be done by using image processing, cross pose
OUTPUT
FACE DETECTION
FACE SEGMENTATION
FACE VERIFICATION
INPUT IMAGE
fig 1: Face Recognition System
3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 1 | Nov-Dec 2017 Page: 1430
multi-view image generation and pattern matching
concept.
In this process a 2D image of a person is given as an
input, by using partial least square method, this 2D
image is converted into multi-view image i.e. cross
pose image in different angles(0º, 30º, 45º, 60º & 90º
degrees), which will give an idea of 3D image. In the
proposed system, there is a single database which is
connected with several cameras and this database will
store the images extracted from the videos captured by
the cameras. This database is having four attributes
(image, date, time &camera_id). The multi-view
images generated from input image are compared with
database. By using geometric and photometric
approach the images are compared, wherever the
images are matched, the corresponding row is fetched.
The numbers of fetched rows are stored in separate file.
This separate file is having three attributes(date, time &
camera_id). The records of this file is arranged in
descending order, giving the higher priority to date and
then to time. After sorting, the first row is fetched and
the address corresponding to that camera_id is
displayed on the output screen. The proposed system is
explained with the help of following flowchart,
IV. STEP-BY-STEP DESCRIPTION OF
OPERATION
a) INPUT: A 2D image of a person is given as an
input as shown in fig 3. This image must be a
person to be located. Enter the name of the person
as an input so that the name can be displayed on the
output screen.
b) PREPROCESSING: This step will remove all the
noise present in the input image.
c) GENERATE CROSS POSE IMAGES: A 2D
images is converted into multi-view images using
partial least square method. It will generate multi-
view images of facial expressions from the
available 3D data. The data in this experiment
includes images at five different angles(0°,30°, 45°,
60° & 90° degrees).
d) CAMERA INTERFACING: In this system, a high
storing capacity database is required, which will
store the images extracted from videos captured by
different cameras. These cameras are placed at
different locations having unique id. All the
cameras are connected with a single database. This
database is having separate subparts, which will
store the images extracted from videos of each
camera.
e) FACE RECOGNITION: The output of Partial
least square method (cross pose images) of input is
Displaying the Locations
Stop
Sorting of Records
camera
camera
camera
camera
Generate a File
Database
Start
Take Image as an
Input
Generate Cross Pose
fig2: Flowchart
fig 3: Input Image[11]
fig 4: Preprocessed Image[11]
fig 5: Multi-View Image[11]
4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 1 | Nov-Dec 2017 Page: 1431
compared with the database. Wherever the images
are matched, its date, time and camera_ id are
stored in different variables of same file. There are
number of algorithms for identifying the faces. This
may be done by analyzing the relative positive, size
and shape of eyes, nose, cheekbones and jaws. This
can be achieved either by using Eigenfaces or by
Line Edge Map technique.
f) GENERATION OF FILE: In this step, the system
will generate a file, which includes information in a
tabular form as below.
Sr. Date Time Camera_id
1. 12/04/2013 13:00 3
2. 13/05/2014 02:00 4
3. 14/05/2011 17:00 1
4. 16/07/2013 18:00 2
table 1: File showing details about an input image
g) SORTING OF RECORDS: The number of
readings stored in a file in the previous step are
sorted in descending order giving the first priority
to "date" and then "time" as shown below.
Sr. Date Time Camera_id
1. 13/05/2014 02:00 4
2. 12/04/2013 13:00 3
3. 16/07/2012 18:00 2
4. 14/05/2011 17:00 1
table 2: Records in sorted order
h) FINAL OUTPUT (displaying the location): After
generating the sorted list, the first row is fetched
from the file and the address corresponding to the
camera_id present at that row is displayed on the
screen as shown below.
V. CONCLUSION AND FUTURE SCOPE
In the field of image analysis and computer vision, face
recognition is really a challenging problem. Face
recognition has received a great deal of attention
because of its many applications in various domains.
The analysis of face from non-frontal view is largely
unexplored research. This paper includes an
introductory survey from face recognition technology
and cross pose generation method. A proposed system
can track a location of any individual simply by using
2D image. A system can generate multi-view images or
cross pose images which can give a 3D effect of an
input image.
Recognizing a face accurately in all poses is still a great
challenge which can be implemented in future. In
future the system can be extended all over the country
that requires large database which belongs to the
concept of Bigdata.
REFERENCES
1) RahimehRouhi, MehranAmiri and
BehzadIrannejad, “A Review on Feature Extraction
Techniques in Face Recognition”, Signal & Image
Processing : An International Journal (SIPIJ),
Vol.3, No.6, December 2012.
2) RabiaJafri and Hamid R. Arabnia, “A Survey of
Face Recognition Techniques”, Journal of
Information Processing Systems, Vol.5, No.2, June
2009, pp- 41-61.
3) Dr. Pramod Kumar, Mrs. Monika Agarwal, Miss.
Stuti Nagar, “A Survey onFace Recognition System
- A Challenge”, International Journal of Advanced
Research in Computer and Communication
Engineering, Vol. 2, Issue 5, May 2013.
4) C. A. Hansen, “Face Recognition”, Institute for
Computer Science University of Tromso, Norway.
5) M. A. Turk and A. P. Pentland, "Face Recognition
Using Eigenfaces", IEEE, 1991.
6) S. Suhas, A. Kurhe, Dr. P. Khanale, “Face
Recognition Using Principal Component Analysis
and Linear Discriminant Analysis on Holistic
Approach in Facial Images Database”, IOSR
Journal of Engineering e-ISSN: 2250-3021, p-ISSN:
2278-8719, Vol. 2, Issue 12 (Dec. 2012).
7) W. Zhao, R. Chellappa, P. J. Phillips & A.
Rosenfeld, “Face Recognitions Literature Survey”,
MESSAGE
Name: Ms. Subject
Last seen
Date: 13/05/2017
Time: 02:00
Camera_id: 4
Location: 3rd floor
Computer Technology
Department KITS, Ramtek.
fig 6: Message Displaying Location
5. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 1 | Nov-Dec 2017 Page: 1432
ACM Computing Surveys, Vol. 35, No. 4,
December 2003, pp. 399–458.
8) Divyarajsinh N Parmar et al , “Face Recognition
Methods & Applications”, International Journal
Computer Technology & Applications, Vol. 4
(1),84-86.
9) R. Chellapa, C.L. Wilson, S. Sirohey and C.S.
Barnes, “Human and machine recognition of faces:
a survey”, Proc. of IEEE.-1995, Vol. 83.- P.705-
739.
10) Manish Choudhary et al, “An Application of Face
Recognition System using Image Processing and
Neural Networks”, International Journal Computer
Technology & Application, Vol. 3 (1), 45-49.
11) MahdiJampour, et al, “Multi-view Facial
Expressions Recognition using Local Linear
Regression of Sparse Codes”, 20th Computer
Vision Winter Workshop Paul Wohlhart, Vincent
Lepetit (eds.) Seggau, Austria, February 9-11, 2015.