International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Face Recognition Based Intelligent Door Control Systemijtsrd
This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis PCA and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automatically for the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing ""Face Recognition Based Intelligent Door Control System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23893.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23893/face-recognition-based-intelligent-door-control-system/san-san-naing
A novel ensemble modeling for intrusion detection system IJECEIAES
Vast increase in data through internet services has made computer systems more vulnerable and difficult to protect from malicious attacks. Intrusion detection systems (IDSs) must be more potent in monitoring intrusions. Therefore an effectual Intrusion Detection system architecture is built which employs a facile classification model and generates low false alarm rates and high accuracy. Noticeably, IDS endure enormous amounts of data traffic that contain redundant and irrelevant features, which affect the performance of the IDS negatively. Despite good feature selection approaches leads to a reduction of unrelated and redundant features and attain better classification accuracy in IDS. This paper proposes a novel ensemble model for IDS based on two algorithms Fuzzy Ensemble Feature selection (FEFS) and Fusion of Multiple Classifier (FMC). FEFS is a unification of five feature scores. These scores are obtained by using feature-class distance functions. Aggregation is done using fuzzy union operation. On the other hand, the FMC is the fusion of three classifiers. It works based on Ensemble decisive function. Experiments were made on KDD cup 99 data set have shown that our proposed system works superior to well-known methods such as Support Vector Machines (SVMs), K-Nearest Neighbor (KNN) and Artificial Neural Networks (ANNs). Our examinations ensured clearly the prominence of using ensemble methodology for modeling IDSs, and hence our system is robust and efficient.
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONijsc
The word biometrics refers to the use of physiological or biological characteristics of human to recognize
and verify the identity of an individual. Face is one of the human biometrics for passive identification with
uniqueness and stability. In this manuscript we present a new face based biometric system based on neural
networks supervised self organizing maps (SOM). We name our method named SOM-F. We show that the
proposed SOM-F method improves the performance and robustness of recognition. We apply the proposed
method to a variety of datasets and show the results.
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGESIJCI JOURNAL
Template matching technique is useful for searching and finding the location of a template image (Small part of image) in the larger image. This technique is also used in Optical Character Recognition (OCR) tools and these tools are used for converting the scanned document images into normal text. Template matching technique is used to find and recognize the template image which is found in the given input image. In this research work, template matching technique is applied for scanned document images which contains characters (both uppercase and lowercase) and numerals. In order to perform the comparison of the template image with the input image we have used Performance Index method and it is compared with the normalized cross correlation and cross correlation methods. Different types of comparisons done in this work are, (i) comparing single character from a word, sentence and paragraph; (ii) comparing multiple characters (words) from a word, sentence and paragraph.
A Simple Segmentation Approach for Unconstrained Cursive Handwritten Words in...CSCJournals
This paper presents a new, simple and fast approach for character segmentation of unconstrained handwritten words. The developed segmentation algorithm over-segments in some cases due to the inherent nature of the cursive words. However the over segmentation is minimum. To increase the efficiency of the algorithm an Artificial Neural Network is trained with significant amount of valid segmentation points for cursive words manually. Trained neural network extracts incorrect segmented points efficiently with high speed. For fair comparison benchmark database IAM is used. The experimental results are encouraging.
A new model for iris data set classification based on linear support vector m...IJECEIAES
Data mining is known as the process of detection concerning patterns from essential amounts of data. As a process of knowledge discovery. Classification is a data analysis that extracts a model which describes an important data classes. One of the outstanding classifications methods in data mining is support vector machine classification (SVM). It is capable of envisaging results and mostly effective than other classification methods. The SVM is a one technique of machine learning techniques that is well known technique, learning with supervised and have been applied perfectly to a vary problems of: regression, classification, and clustering in diverse domains such as gene expression, web text mining. In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.
On comprehensive analysis of learning algorithms on pedestrian detection usin...UniversitasGadjahMada
Despite the surge of deep learning, deploying the deep learning-based pedestrian detection into the real system faces hurdles, mainly due to the huge resource usages. The classical feature-based detection system still becomes feasible option. There have been many efforts to improve the performance of pedestrian detection system. Among many feature set, Histogram of Oriented Gradient seems to be very effective for person detection. In this research, various machine learning algorithms are investigated for person detection. Different machine learning algorithms are evaluated to obtain the optimal accuracy and speed of the system.
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYIAEME Publication
This Research paper discusses the study and analysis conducted during this research on various techniques in biometric domain. A close glance on biometric enhancement techniques and their limitations are presented in this research paper. This process would enable researcher to understand the research contributions in the area of DCT and DFT based recognition and security, locate some crucial limitations of these notable research. This paper having summary about the different research papers that applicable to our topic of research which mentioned above. Biometric Recognition and security is a most important subject of research in this area of image processing.
Face Recognition Based Intelligent Door Control Systemijtsrd
This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis PCA and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automatically for the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing ""Face Recognition Based Intelligent Door Control System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23893.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23893/face-recognition-based-intelligent-door-control-system/san-san-naing
A novel ensemble modeling for intrusion detection system IJECEIAES
Vast increase in data through internet services has made computer systems more vulnerable and difficult to protect from malicious attacks. Intrusion detection systems (IDSs) must be more potent in monitoring intrusions. Therefore an effectual Intrusion Detection system architecture is built which employs a facile classification model and generates low false alarm rates and high accuracy. Noticeably, IDS endure enormous amounts of data traffic that contain redundant and irrelevant features, which affect the performance of the IDS negatively. Despite good feature selection approaches leads to a reduction of unrelated and redundant features and attain better classification accuracy in IDS. This paper proposes a novel ensemble model for IDS based on two algorithms Fuzzy Ensemble Feature selection (FEFS) and Fusion of Multiple Classifier (FMC). FEFS is a unification of five feature scores. These scores are obtained by using feature-class distance functions. Aggregation is done using fuzzy union operation. On the other hand, the FMC is the fusion of three classifiers. It works based on Ensemble decisive function. Experiments were made on KDD cup 99 data set have shown that our proposed system works superior to well-known methods such as Support Vector Machines (SVMs), K-Nearest Neighbor (KNN) and Artificial Neural Networks (ANNs). Our examinations ensured clearly the prominence of using ensemble methodology for modeling IDSs, and hence our system is robust and efficient.
NEURAL NETWORK BASED SUPERVISED SELF ORGANIZING MAPS FOR FACE RECOGNITIONijsc
The word biometrics refers to the use of physiological or biological characteristics of human to recognize
and verify the identity of an individual. Face is one of the human biometrics for passive identification with
uniqueness and stability. In this manuscript we present a new face based biometric system based on neural
networks supervised self organizing maps (SOM). We name our method named SOM-F. We show that the
proposed SOM-F method improves the performance and robustness of recognition. We apply the proposed
method to a variety of datasets and show the results.
TEMPLATE MATCHING TECHNIQUE FOR SEARCHING WORDS IN DOCUMENT IMAGESIJCI JOURNAL
Template matching technique is useful for searching and finding the location of a template image (Small part of image) in the larger image. This technique is also used in Optical Character Recognition (OCR) tools and these tools are used for converting the scanned document images into normal text. Template matching technique is used to find and recognize the template image which is found in the given input image. In this research work, template matching technique is applied for scanned document images which contains characters (both uppercase and lowercase) and numerals. In order to perform the comparison of the template image with the input image we have used Performance Index method and it is compared with the normalized cross correlation and cross correlation methods. Different types of comparisons done in this work are, (i) comparing single character from a word, sentence and paragraph; (ii) comparing multiple characters (words) from a word, sentence and paragraph.
A Simple Segmentation Approach for Unconstrained Cursive Handwritten Words in...CSCJournals
This paper presents a new, simple and fast approach for character segmentation of unconstrained handwritten words. The developed segmentation algorithm over-segments in some cases due to the inherent nature of the cursive words. However the over segmentation is minimum. To increase the efficiency of the algorithm an Artificial Neural Network is trained with significant amount of valid segmentation points for cursive words manually. Trained neural network extracts incorrect segmented points efficiently with high speed. For fair comparison benchmark database IAM is used. The experimental results are encouraging.
A new model for iris data set classification based on linear support vector m...IJECEIAES
Data mining is known as the process of detection concerning patterns from essential amounts of data. As a process of knowledge discovery. Classification is a data analysis that extracts a model which describes an important data classes. One of the outstanding classifications methods in data mining is support vector machine classification (SVM). It is capable of envisaging results and mostly effective than other classification methods. The SVM is a one technique of machine learning techniques that is well known technique, learning with supervised and have been applied perfectly to a vary problems of: regression, classification, and clustering in diverse domains such as gene expression, web text mining. In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.
On comprehensive analysis of learning algorithms on pedestrian detection usin...UniversitasGadjahMada
Despite the surge of deep learning, deploying the deep learning-based pedestrian detection into the real system faces hurdles, mainly due to the huge resource usages. The classical feature-based detection system still becomes feasible option. There have been many efforts to improve the performance of pedestrian detection system. Among many feature set, Histogram of Oriented Gradient seems to be very effective for person detection. In this research, various machine learning algorithms are investigated for person detection. Different machine learning algorithms are evaluated to obtain the optimal accuracy and speed of the system.
DCT AND DFT BASED BIOMETRIC RECOGNITION AND MULTIMODAL BIOMETRIC SECURITYIAEME Publication
This Research paper discusses the study and analysis conducted during this research on various techniques in biometric domain. A close glance on biometric enhancement techniques and their limitations are presented in this research paper. This process would enable researcher to understand the research contributions in the area of DCT and DFT based recognition and security, locate some crucial limitations of these notable research. This paper having summary about the different research papers that applicable to our topic of research which mentioned above. Biometric Recognition and security is a most important subject of research in this area of image processing.
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
Biometric matching involves finding similarity between fingerprint images.The accuracy and speed of the
matching algorithmdetermines its effectives. This researchaims at comparing two types of matching
algorithms namely(a) matching using global orientation features and (b) matching using minutia triangulation.The comparison is done using accuracy, time and number of similar features. The experiment is conducted on a datasets of 100 candidates using four (4) fingerprints from each candidate. The data is sampled from a mass registration conducted by a reputable organization in Kenya.Theresearch reveals that fingerprint matching based on algorithm (b) performs better in speed with an average of 38.32 milliseconds
as compared to matching based on algorithm (a) with an average of 563.76 milliseconds. On accuracy,algorithm(a) performs better with an average accuracy of 0.142433 as compared to algorithm (b) with an average accuracy score of 0.004202.
Face recognition using gaussian mixture model & artificial neural networkeSAT Journals
Abstract
Face recognition is a non-contact and friendly biometric identification technology. It has broad application prospects in the
military, public security and economic security. In this work, we also consider illumination variable database. The images have
taken from far distance and do not consider the close view face of the individual as in most of the face databases, clear face view
has been considered. In this first we located face as region of interest and then LBP and LPQ descriptors are used which is
illuminance invariant in nature. After this GMM has been used to reduce feature set by taking negative log-likelihood from each
LBP and LPQ descripted image histograms. After this ANN consumes stayed used for organization purposes. The investigational
consequencesshow excellent correctness rates in overall testing of input data.
Keywords: Illumination invariant, face recognition, LBP, LPQs,GMM,ANN
Comparison on PCA ICA and LDA in Face Recognitionijdmtaiir
Face recognition is used in wide range of application.
In recent years, face recognition has become one of the most
successful applications in image analysis and understanding.
Different statistical method and research groups reported a
contradictory result when comparing principal component
analysis (PCA) algorithm, independent component analysis
(ICA) algorithm, and linear discriminant analysis (LDA)
algorithm that has been proposed in recent years. The goal of
this paper is to compare and analyze the three algorithms and
conclude which is best. Feret Dataset is used for consistency
Review and comparison of tasks scheduling in cloud computingijfcstjournal
Recently, there has been a dramatic increase in the popularity of cloud computing systems that rent
computing resources on-demand, bill on a pay-as-you-go basis, and multiplex many users on the same
physical infrastructure. It is a virtual pool of resources which are provided to users via Internet. It gives
users virtually unlimited pay-per-use computing resources without the burden of managing the underlying
infrastructure. One of the goals is to use the resources efficiently and gain maximum profit. Scheduling is a
critical problem in Cloud computing, because a cloud provider has to serve many users in Cloud
computing system. So scheduling is the major issue in establishing Cloud computing systems. The
scheduling algorithms should order the jobs in a way where balance between improving the performance
and quality of service and at the same time maintaining the efficiency and fairness among the jobs. This
paper introduces and explores some of the methods provided for in cloud computing has been scheduled.
Finally the waiting time and time to implement some of the proposed algorithm is evaluated
DataEngConf: Feature Extraction: Modern Questions and Challenges at GoogleHakka Labs
By Dmitry Storcheus (Engineer, Google Research)
Feature extraction, as usually understood, seeks an optimal transformation from raw data into features that can be used as an input for a learning algorithm. In recent times this problem has been attacked using a growing number of diverse techniques that originated in separate research communities: from PCA and LDA to manifold and metric learning. The goal of this talk is to contrast and compare feature extraction techniques coming from different machine learning areas as well as discuss the modern challenges and open problems in feature extraction. Moreover, this talk will suggest novel solutions to some of the challenges discussed, particularly to coupled feature extraction.
Fuzzy Logic based Edge Detection Method for Image Processing IJECEIAES
Edge detection is the first step in image recognition systems in a digital image processing. An effective way to resolve many information from an image such depth, curves and its surface is by analyzing its edges, because that can elucidate these characteristic when color, texture, shade or light changes slightly. Thiscan lead to misconception image or vision as it based on faulty method. This work presentsa new fuzzy logic method with an implemention. The objective of this method is to improve the edge detection task. The results are comparable to similar techniques in particular for medical images because it does not take the uncertain part into its account.
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
This paper presents a fuzzy type image fusion technique using Set Partitioning in Hierarchical Trees (SPIHT).
It is concluded that fusion with higher single levels provides better fusion quality. This technique can be used
for fusion of fuzzy images as well as multi model image fusion. The proposed algorithm is very simple, easy to
implement and could be used for real time applications. This is paper also provided comparatively studied
between proposed and previous existing technique and validation of the proposed algorithm as Peak Signal to
Noise Ratio (PSNR), Root Mean Square Error (RMSE).
Pattern recognition using context dependent memory model (cdmm) in multimodal...ijfcstjournal
Pattern recognition is one of the prime concepts in current technologies in both private and public sectors.
The analysis and recognition of two or more patterns is a complex task due to several factors. The
consideration of two or more patterns requires huge space for keeping the storage media as well as
computational aspect. Vector logic gives very good strategy for recognition of patterns. This paper
proposes pattern recognition in multimodal authentication system with the use of vector logic and makes
the computation model hard and less error rate. Using PCA two to three biometric patterns will be fusion
and then various key sizes will be extracted using LU factorization approach. The selected keys will be
combined using vector logic, which introduces a memory model often called Context Dependent Memory
Model (CDMM) as computational model in multimodal authentication system that gives very accurate and
very effective outcome for authentication as well as verification. In the verification step, Mean Square
Error (MSE) and Normalized Correlation (NC) as metrics to minimize the error rate for the proposed
model and the performance analysis will be presented.
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...CSCJournals
Handwritten text and character recognition is a challenging task compared to recognition of handwritten numeral and computer printed text due to its large variety in nature. As practical pattern recognition problems uses bulk data and there is a one step self sufficient deterministic theory to resolve recognition problems by calculating inverse of Hessian Matrix and multiplication the inverse matrix it with first order local gradient vector. But in practical cases when neural network is large the inversing operation of the Hessian Matrix is not manageable and another condition must be satisfied the Hessian Matrix must be positive definite which may not be satishfied. In these cases some repetitive recursive models are taken. In several research work in past decade it was experienced that Neural Network based approach provides most reliable performance in handwritten character and text recognition but recognition performance depends upon some important factors like no of training samples, reliable features and no of features per character, training time, variety of handwriting etc. Important features from different types of handwriting are collected and are fed to the neural network for training. It is true that more no of features increases test efficiency but it takes longer time to converge the error curve. To reduce this training time effectively proper train algorithm should be chosen so that the system provides best train and test efficiency in least possible time that is to provide the system fastest intelligence. We have used several second order conjugate gradient algorithms for training of neural network. We have found that Scaled Conjugate Gradient Algorithm , a second order training algorithm as the fastest for training of neural network for our application. Training using SCG takes minimum time with excellent test efficiency. A scanned handwritten text is taken as input and character level segmentation is done. Some important and reliable features from each character are extracted and used as input to a neural network for training. When the error level reaches into a satisfactory level (10 -12 ) weights are accepted for testing a test script. Finally a lexicon matching algorithm solves the minor misclassification problems.
Implementation of Face Recognition in Cloud Vision Using Eigen FacesIJERA Editor
Cloud computing comes in several different forms and this article documents how service, Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The papers discuss a methodology for face recognition based on information theory approach of coding and decoding the face image. Proposed System is connection of two stages – Feature extraction using principle component analysis and recognition using the back propagation Network. This paper also discusses our work with the design and implementation of face recognition applications using our mobile-cloudlet-cloud architecture named MOCHA and its initial performance results. The dispute lies with how to performance task partitioning from mobile devices to cloud and distribute compute load among cloud servers to minimize the response time given diverse communication latencies and server compute powers
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIJERA Editor
The aim of this paper is to implement a Multilayer Perceptron (MLP) Neural Network to recognize and predict handwritten digits from 0 to 9. A dataset of 5000 samples were obtained from MNIST. The dataset was trained using gradient descent back-propagation algorithm and further tested using the feed-forward algorithm. The system performance is observed by varying the number of hidden units and the number of iterations. The performance was thereafter compared to obtain the network with the optimal parameters. The proposed system predicts the handwritten digits with an overall accuracy of 99.32%.
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...IJERD Editor
Advancements of Computer technology has made every organization to implement the automatic processing systems for its activities. One of the examples is the recognition of handwritten characters, which has always been a challenging task in image processing and pattern recognition. In this paper we propose Zone based features for recognition of the handwritten characters. In this zoning approach a digit image is divided into 8x8 zones and centre pixel is computed for each zone. This procedure is sequentially repeated for entire zone. Finally features are extracted for classification and recognition.
SVM Based Identification of Psychological Personality Using Handwritten Text IJERA Editor
Identification of Personality is a complex process. To ease this process, a model is developed using cursive
handwriting. Area based, width based and height based thresholds are set for only character selection, word
selection and line selection. The rest is considered as noise. Followed by feature vector construction. Slope
feature using slope calculation, shape features and edge detection done using Sobel filter and direction
histogram is considered. Based on the direction of handwriting the analysis was done. Writing which rises to
the right shows optimism and cheerfulness. Sagging to the right shows physical or mental weariness. The lines
which are straight, reveals over-control to compensate for an inner fear of loss of control.The analysis was done
using single line and multiple lines. Simple techniques have provided good results. The results using single line
were 95% and multiple lines were 91%.The classification is done using SVM classifier.
Facial expression recognition based on wapa and oepa fasticaijaia
Face is one of the most important biometric traits
for its uniqueness and robustness. For this reason
researchers from many diversified fields, like: sec
urity, psychology, image processing, and computer
vision, started to do research on face detection as
well as facial expression recognition. Subspace le
arning
methods work very good for recognizing same facial
features. Among subspace learning techniques PCA,
ICA, NMF are the most prominent topics. In this wor
k, our main focus is on Independent Component
Analysis (ICA). Among several architectures of ICA,
we used here FastICA and LS-ICA algorithm. We
applied Fast-ICA on whole faces and on different fa
cial parts to analyze the influence of different pa
rts for
basic facial expressions. Our extended algorithm WA
PA-FastICA and OEPA-FastICA are discussed in
proposed algorithm section. Locally Salient ICA is
implemented on whole face by using 8x8 windows to
find the more prominent facial features for facial
expression. The experiment shows our proposed OEPA-
FastICA and WAPA-FastICA outperform the existing pr
evalent Whole-FastICA and LS-ICA methods
MATLAB Code + Description : Very Simple Automatic English Optical Character R...Ahmed Gad
This file contains a simple description about what I have created about how to recognize characters using feed forward back propagation neural network as a pattern recognition project when being undergraduate student at 2013.
The MATLAB code of the system is also available in the document.
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
COMPARATIVE ANALYSIS OF MINUTIAE BASED FINGERPRINT MATCHING ALGORITHMSijcsit
Biometric matching involves finding similarity between fingerprint images.The accuracy and speed of the
matching algorithmdetermines its effectives. This researchaims at comparing two types of matching
algorithms namely(a) matching using global orientation features and (b) matching using minutia triangulation.The comparison is done using accuracy, time and number of similar features. The experiment is conducted on a datasets of 100 candidates using four (4) fingerprints from each candidate. The data is sampled from a mass registration conducted by a reputable organization in Kenya.Theresearch reveals that fingerprint matching based on algorithm (b) performs better in speed with an average of 38.32 milliseconds
as compared to matching based on algorithm (a) with an average of 563.76 milliseconds. On accuracy,algorithm(a) performs better with an average accuracy of 0.142433 as compared to algorithm (b) with an average accuracy score of 0.004202.
Face recognition using gaussian mixture model & artificial neural networkeSAT Journals
Abstract
Face recognition is a non-contact and friendly biometric identification technology. It has broad application prospects in the
military, public security and economic security. In this work, we also consider illumination variable database. The images have
taken from far distance and do not consider the close view face of the individual as in most of the face databases, clear face view
has been considered. In this first we located face as region of interest and then LBP and LPQ descriptors are used which is
illuminance invariant in nature. After this GMM has been used to reduce feature set by taking negative log-likelihood from each
LBP and LPQ descripted image histograms. After this ANN consumes stayed used for organization purposes. The investigational
consequencesshow excellent correctness rates in overall testing of input data.
Keywords: Illumination invariant, face recognition, LBP, LPQs,GMM,ANN
Comparison on PCA ICA and LDA in Face Recognitionijdmtaiir
Face recognition is used in wide range of application.
In recent years, face recognition has become one of the most
successful applications in image analysis and understanding.
Different statistical method and research groups reported a
contradictory result when comparing principal component
analysis (PCA) algorithm, independent component analysis
(ICA) algorithm, and linear discriminant analysis (LDA)
algorithm that has been proposed in recent years. The goal of
this paper is to compare and analyze the three algorithms and
conclude which is best. Feret Dataset is used for consistency
Review and comparison of tasks scheduling in cloud computingijfcstjournal
Recently, there has been a dramatic increase in the popularity of cloud computing systems that rent
computing resources on-demand, bill on a pay-as-you-go basis, and multiplex many users on the same
physical infrastructure. It is a virtual pool of resources which are provided to users via Internet. It gives
users virtually unlimited pay-per-use computing resources without the burden of managing the underlying
infrastructure. One of the goals is to use the resources efficiently and gain maximum profit. Scheduling is a
critical problem in Cloud computing, because a cloud provider has to serve many users in Cloud
computing system. So scheduling is the major issue in establishing Cloud computing systems. The
scheduling algorithms should order the jobs in a way where balance between improving the performance
and quality of service and at the same time maintaining the efficiency and fairness among the jobs. This
paper introduces and explores some of the methods provided for in cloud computing has been scheduled.
Finally the waiting time and time to implement some of the proposed algorithm is evaluated
DataEngConf: Feature Extraction: Modern Questions and Challenges at GoogleHakka Labs
By Dmitry Storcheus (Engineer, Google Research)
Feature extraction, as usually understood, seeks an optimal transformation from raw data into features that can be used as an input for a learning algorithm. In recent times this problem has been attacked using a growing number of diverse techniques that originated in separate research communities: from PCA and LDA to manifold and metric learning. The goal of this talk is to contrast and compare feature extraction techniques coming from different machine learning areas as well as discuss the modern challenges and open problems in feature extraction. Moreover, this talk will suggest novel solutions to some of the challenges discussed, particularly to coupled feature extraction.
Fuzzy Logic based Edge Detection Method for Image Processing IJECEIAES
Edge detection is the first step in image recognition systems in a digital image processing. An effective way to resolve many information from an image such depth, curves and its surface is by analyzing its edges, because that can elucidate these characteristic when color, texture, shade or light changes slightly. Thiscan lead to misconception image or vision as it based on faulty method. This work presentsa new fuzzy logic method with an implemention. The objective of this method is to improve the edge detection task. The results are comparable to similar techniques in particular for medical images because it does not take the uncertain part into its account.
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
This paper presents a fuzzy type image fusion technique using Set Partitioning in Hierarchical Trees (SPIHT).
It is concluded that fusion with higher single levels provides better fusion quality. This technique can be used
for fusion of fuzzy images as well as multi model image fusion. The proposed algorithm is very simple, easy to
implement and could be used for real time applications. This is paper also provided comparatively studied
between proposed and previous existing technique and validation of the proposed algorithm as Peak Signal to
Noise Ratio (PSNR), Root Mean Square Error (RMSE).
Pattern recognition using context dependent memory model (cdmm) in multimodal...ijfcstjournal
Pattern recognition is one of the prime concepts in current technologies in both private and public sectors.
The analysis and recognition of two or more patterns is a complex task due to several factors. The
consideration of two or more patterns requires huge space for keeping the storage media as well as
computational aspect. Vector logic gives very good strategy for recognition of patterns. This paper
proposes pattern recognition in multimodal authentication system with the use of vector logic and makes
the computation model hard and less error rate. Using PCA two to three biometric patterns will be fusion
and then various key sizes will be extracted using LU factorization approach. The selected keys will be
combined using vector logic, which introduces a memory model often called Context Dependent Memory
Model (CDMM) as computational model in multimodal authentication system that gives very accurate and
very effective outcome for authentication as well as verification. In the verification step, Mean Square
Error (MSE) and Normalized Correlation (NC) as metrics to minimize the error rate for the proposed
model and the performance analysis will be presented.
Faster Training Algorithms in Neural Network Based Approach For Handwritten T...CSCJournals
Handwritten text and character recognition is a challenging task compared to recognition of handwritten numeral and computer printed text due to its large variety in nature. As practical pattern recognition problems uses bulk data and there is a one step self sufficient deterministic theory to resolve recognition problems by calculating inverse of Hessian Matrix and multiplication the inverse matrix it with first order local gradient vector. But in practical cases when neural network is large the inversing operation of the Hessian Matrix is not manageable and another condition must be satisfied the Hessian Matrix must be positive definite which may not be satishfied. In these cases some repetitive recursive models are taken. In several research work in past decade it was experienced that Neural Network based approach provides most reliable performance in handwritten character and text recognition but recognition performance depends upon some important factors like no of training samples, reliable features and no of features per character, training time, variety of handwriting etc. Important features from different types of handwriting are collected and are fed to the neural network for training. It is true that more no of features increases test efficiency but it takes longer time to converge the error curve. To reduce this training time effectively proper train algorithm should be chosen so that the system provides best train and test efficiency in least possible time that is to provide the system fastest intelligence. We have used several second order conjugate gradient algorithms for training of neural network. We have found that Scaled Conjugate Gradient Algorithm , a second order training algorithm as the fastest for training of neural network for our application. Training using SCG takes minimum time with excellent test efficiency. A scanned handwritten text is taken as input and character level segmentation is done. Some important and reliable features from each character are extracted and used as input to a neural network for training. When the error level reaches into a satisfactory level (10 -12 ) weights are accepted for testing a test script. Finally a lexicon matching algorithm solves the minor misclassification problems.
Implementation of Face Recognition in Cloud Vision Using Eigen FacesIJERA Editor
Cloud computing comes in several different forms and this article documents how service, Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult. The papers discuss a methodology for face recognition based on information theory approach of coding and decoding the face image. Proposed System is connection of two stages – Feature extraction using principle component analysis and recognition using the back propagation Network. This paper also discusses our work with the design and implementation of face recognition applications using our mobile-cloudlet-cloud architecture named MOCHA and its initial performance results. The dispute lies with how to performance task partitioning from mobile devices to cloud and distribute compute load among cloud servers to minimize the response time given diverse communication latencies and server compute powers
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIJERA Editor
The aim of this paper is to implement a Multilayer Perceptron (MLP) Neural Network to recognize and predict handwritten digits from 0 to 9. A dataset of 5000 samples were obtained from MNIST. The dataset was trained using gradient descent back-propagation algorithm and further tested using the feed-forward algorithm. The system performance is observed by varying the number of hidden units and the number of iterations. The performance was thereafter compared to obtain the network with the optimal parameters. The proposed system predicts the handwritten digits with an overall accuracy of 99.32%.
A Novel Framework For Numerical Character Recognition With Zoning Distance Fe...IJERD Editor
Advancements of Computer technology has made every organization to implement the automatic processing systems for its activities. One of the examples is the recognition of handwritten characters, which has always been a challenging task in image processing and pattern recognition. In this paper we propose Zone based features for recognition of the handwritten characters. In this zoning approach a digit image is divided into 8x8 zones and centre pixel is computed for each zone. This procedure is sequentially repeated for entire zone. Finally features are extracted for classification and recognition.
SVM Based Identification of Psychological Personality Using Handwritten Text IJERA Editor
Identification of Personality is a complex process. To ease this process, a model is developed using cursive
handwriting. Area based, width based and height based thresholds are set for only character selection, word
selection and line selection. The rest is considered as noise. Followed by feature vector construction. Slope
feature using slope calculation, shape features and edge detection done using Sobel filter and direction
histogram is considered. Based on the direction of handwriting the analysis was done. Writing which rises to
the right shows optimism and cheerfulness. Sagging to the right shows physical or mental weariness. The lines
which are straight, reveals over-control to compensate for an inner fear of loss of control.The analysis was done
using single line and multiple lines. Simple techniques have provided good results. The results using single line
were 95% and multiple lines were 91%.The classification is done using SVM classifier.
Facial expression recognition based on wapa and oepa fasticaijaia
Face is one of the most important biometric traits
for its uniqueness and robustness. For this reason
researchers from many diversified fields, like: sec
urity, psychology, image processing, and computer
vision, started to do research on face detection as
well as facial expression recognition. Subspace le
arning
methods work very good for recognizing same facial
features. Among subspace learning techniques PCA,
ICA, NMF are the most prominent topics. In this wor
k, our main focus is on Independent Component
Analysis (ICA). Among several architectures of ICA,
we used here FastICA and LS-ICA algorithm. We
applied Fast-ICA on whole faces and on different fa
cial parts to analyze the influence of different pa
rts for
basic facial expressions. Our extended algorithm WA
PA-FastICA and OEPA-FastICA are discussed in
proposed algorithm section. Locally Salient ICA is
implemented on whole face by using 8x8 windows to
find the more prominent facial features for facial
expression. The experiment shows our proposed OEPA-
FastICA and WAPA-FastICA outperform the existing pr
evalent Whole-FastICA and LS-ICA methods
MATLAB Code + Description : Very Simple Automatic English Optical Character R...Ahmed Gad
This file contains a simple description about what I have created about how to recognize characters using feed forward back propagation neural network as a pattern recognition project when being undergraduate student at 2013.
The MATLAB code of the system is also available in the document.
Find me on:
AFCIT
http://www.afcit.xyz
YouTube
https://www.youtube.com/channel/UCuewOYbBXH5gwhfOrQOZOdw
Google Plus
https://plus.google.com/u/0/+AhmedGadIT
SlideShare
https://www.slideshare.net/AhmedGadFCIT
LinkedIn
https://www.linkedin.com/in/ahmedfgad/
ResearchGate
https://www.researchgate.net/profile/Ahmed_Gad13
Academia
https://www.academia.edu/
Google Scholar
https://scholar.google.com.eg/citations?user=r07tjocAAAAJ&hl=en
Mendelay
https://www.mendeley.com/profiles/ahmed-gad12/
ORCID
https://orcid.org/0000-0003-1978-8574
StackOverFlow
http://stackoverflow.com/users/5426539/ahmed-gad
Twitter
https://twitter.com/ahmedfgad
Facebook
https://www.facebook.com/ahmed.f.gadd
Pinterest
https://www.pinterest.com/ahmedfgad/
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Utilization of Industrial Waste Material in GSB LayerIJERA Editor
India has series of steel plant clusters located along its length and breadth of the territory. Several million metric tons of iron and steel are produced in these plants annually. Along with the production of iron and steel, huge quantities of solid wastes like blast furnace slag and steel slag as well as other wastes such as flue dust, blast furnace sludge, and refractories are also being produced in these plants. These solid wastes can be used as non-traditional/non-conventional aggregates in pavement construction due to acute scarcity of traditional/conventional road construction materials. A study was conducted to investigate the possibility of using Granulated Blast Furnace Slag (GBFS) with various blended mixes of traditional/conventional aggregates in subbase layer with different percentages. This study also presents the result of experimental investigation on the influence of Rice husk ash (RHA) on the index properties of Red soil which is used as filler material in subbase layer.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Design and Simulation of First Order Sigma-Delta Modulator Using LT spice ToolIJERA Editor
A switched-capacitor single-stage Sigma-Delta ADC with a first-order modulator is proposed. Efficient low power first Order 1-Bit Sigma-Delta ADC designed which accepts input signal bandwidth of 10 MHz. This circuitry performs the function of an analog-to-digital converter. A first-order 1-Bit Sigma-Delta (Σ-Δ) modulator is designed, simulated and analyzed using LTspice standard 250nm CMOS technology power supply of 1.8V. The modulator is proved to be robustness, the high performance in stability. The simulations are compared with those from a traditional analog-to-digital converter to prove that Sigma-Delta is performing better with low power and area.
Experimental Study for the Different Methods of Generating Millimeter WavesIJERA Editor
In this paper a analytical comparison and experimental implementation of different methods used in generating a low phase noise millimeter wave signals is presented. Four techniques were experimented and compared, Multiplication, phase lock loop (PLL), Injection locking (IL), and Injection locking with phase lock loop (ILPLL). The comparison and experimental results of a laboratory discussed.
Ship Detection from SAR Imagery Using CUDA and Performance Analysis of the Sy...IJERA Editor
Synthetic aperture radar (SAR) Ship Detection System SDS is an important application from the point of view of Maritime Security monitoring. It allows monitoring traffic, fisheries, naval warfare. Since full-resolution SAR images are heavily affected by the presence of speckle, ship detection algorithms generally employ speckle reduced SAR images at the expense of a degradation of the spatial resolution. The proposed Parzen-window-kernel-based algorithm and CFAR algorithm can be considered an alternative to manual inspection for large ocean areas. Promising results and high detection rates for the ships have been achieved. In Parzen-window-kernel-based algorithm for ship detection in synthetic aperture radar (SAR) images, first, the data-driving kernel functions of Parzen window are utilized to approximate the histogram of real SAR image, in order to complete the accurate modeling of SAR images. Then ship detection is implemented using a Constant False Alarm Rate (CFAR). After detecting threshold, the output is added to edge detection algorithm employed on SAR image. Clearer detection of ship candidates is obtained by applying Parzen-window-kernel-based algorithm by changing its window size. Experimental results show that SDS implemented using CUDA is faster than on CPU.
MHD convection flow of viscous incompressible fluid over a stretched vertical...IJERA Editor
The effect of thermal radiation, viscous dissipation and hall current of the MHD convection flow of the viscous incompressible fluid over a stretched vertical flat plate has been discussed by using regular perturbation and homotophy perturbation technique with similarity solutions. The influence of various physical parameters on velocity, cross flow velocity and temperature of fluid has been obtained numerically and through graphs.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Synthesis and Structural Characterization of Cu Substituted Ni-Zn Nano-Ferrit...IJERA Editor
The ferrite nano particles having chemical formula Ni0.2CuxZn0.8-xFe2O4 (where x=0.0 to 0.8 with step of 0.2) were synthesized by Citrate-Gel Auto Combustion method at low temperature. The synthesized powders were sintered at 500oC for 4 hours in air and characterised by XRD, SEM with EDS. XRD analysis of prepared samples were confirmed the single phase cubic spinel Structure. The crystallite size (D) of prepared ferrites were in the range of 24-73nm. The values of lattice parameter (a) decreased and X-ray density (dx) were increased with the increasing of Cu substitution. The surface morphology of the prepared samples was investigated by Scanning Electron Microscope(SEM). An elemental composition of the samples was studied by Energy Dispersive Spectroscopy(EDS). The observed results can be explained on the basis of composition and crystal size.
Performance Comparison of Face Recognition Using DCT Against Face Recognition...CSCJournals
In this paper, a face recognition system using simple Vector quantization (VQ) technique is proposed. Four different VQ algorithms namely LBG, KPE, KMCG and KFCG are used to generate codebooks of desired size. Euclidean distance is used as similarity measure to compare the feature vector of test image with that of trainee images. Proposed algorithms are tested on two different databases. One is Georgia Tech Face Database which contains color JPEG images, all are of different size. Another database used for experimental purpose is Indian Face Database. It contains color bitmap images. Using above VQ techniques, codebooks of different size are generated and recognition rate is calculated for each codebook size. This recognition rate is compared with the one obtained by applying DCT on image and LBG-VQ algorithm which is used as benchmark in vector quantization. Results show that KFCG outperforms other three VQ techniques and gives better recognition rate up to 85.4% for Georgia Tech Face Database and 90.66% for Indian Face Database. As no Euclidean distance computations are involved in KMCG and KFCG, they require less time to generate the codebook as compared to LBG and KPE
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Improving face recognition by artificial neural network using principal compo...TELKOMNIKA JOURNAL
The face-recognition system is among the most effective pattern recognition and image analysis techniques. This technique has met great attention from academic and industrial fields because of its extensive use in detecting the identity of individuals for monitoring systems, security and many other practical fields. In this paper, an effective method of face recognition was proposed. Ten person's faces images were selected from ORL dataset, for each person (42) image with total of (420) images as dataset. Features are extracted using principle component analysis PCA to reduce the dimensionality of the face images. Four models where created, the first one was trained using feed forward back propagation learning (FFBBL) with 40 features, the second was trained using 50 features with FFBBL, the third was trained using the same features but using Elman Neural Network. For each person (24) image used as training set for the neural networks, while the remaining images used as testing set. The results showed that the proposed method was effective and highly accurate. FFBBL give accuracy of (98.33,97.14) with (40, 50) features respectively, while Elman gives (98.33, 98.80) for with (40, 50) features respectively.
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
With the increase in Internet users the number of malicious users are also growing day-by-day posing a
serious problem in distinguishing between normal and abnormal behavior of users in the network. This
has led to the research area of intrusion detection which essentially analyzes the network traffic and tries
to determine normal and abnormal patterns of behavior.In this paper, we have analyzed the standard
NSL-KDD intrusion dataset using some neural network based techniques for predicting possible
intrusions. Four most effective classification methods, namely, Radial Basis Function Network, Self-
Organizing Map, Sequential Minimal Optimization, and Projective Adaptive Resonance Theory have been
applied. In order to enhance the performance of the classifiers, three entropy based feature selection
methods have been applied as preprocessing of data. Performances of different combinations of classifiers
and attribute reduction methods have also been compared.
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...IJNSA Journal
With the increase in Internet users the number of malicious users are also growing day-by-day posing a serious problem in distinguishing between normal and abnormal behavior of users in the network. This has led to the research area of intrusion detection which essentially analyzes the network traffic and tries to determine normal and abnormal patterns of behavior.In this paper, we have analyzed the standard NSL-KDD intrusion dataset using some neural network based techniques for predicting possible intrusions. Four most effective classification methods, namely, Radial Basis Function Network, SelfOrganizing Map, Sequential Minimal Optimization, and Projective Adaptive Resonance Theory have been applied. In order to enhance the performance of the classifiers, three entropy based feature selection methods have been applied as preprocessing of data. Performances of different combinations of classifiers and attribute reduction methods have also been compared.
Analysis of machine learning algorithms for character recognition: a case stu...nooriasukmaningtyas
This paper covers the work done in handwritten digit recognition and the
various classifiers that have been developed. Methods like MLP, SVM,
Bayesian networks, and Random forests were discussed with their accuracy
and are empirically evaluated. Boosted LetNet 4, an ensemble of various
classifiers, has shown maximum efficiency among these methods.
A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videosijtsrd
The paper presents a novel algorithm for object classification in videos based on improved support vector machine (SVM) and genetic algorithm. One of the problems of support vector machine is selection of the appropriate parameters for the kernel. This has affected the accuracy of the SVM over the years. This research aims at optimizing the SVM Radial Basis kernel parameters using the genetic algorithm. Moving object classification is a requirement in smart visual surveillance systems as it allows the system to know the kind of object in the scene and be able to recognize the actions the object can perform. This paper presents an GA-SVM machine learning approach for real time object classification in videos. Radial distance signal features are extracted from the silhouettes of object detected in videos. The radial distance signals features are then normalized and fed into the GA-SVM model. The classification rate of 99.39% is achieved with the genetically trained SVM algorithm while 99.1% classification accuracy is achieved with the normal SVM. A comparison of this classifier with some other classifiers in terms of classification accuracy shows a better performance than other classifiers such as the normal SVM, Artificial neural network (ANN), Genetic Artificial neural network (GANN), K-nearest neighbor (K-NN) and K-Means classifiers. Akintola Kolawole G."A Novel GA-SVM Model For Vehicles And Pedestrial Classification In Videos" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-4 , June 2017, URL: http://www.ijtsrd.com/papers/ijtsrd109.pdf http://www.ijtsrd.com/computer-science/artificial-intelligence/109/a-novel-ga-svm-model-for-vehicles-and-pedestrial-classification-in-videos/akintola-kolawole-g
Real Time Implementation Of Face Recognition SystemIJERA Editor
This paper proposes face recognition method using PCA for real time implementation. Nowadays security is
gaining importance as it is becoming necessary for people to keep passwords in their mind and carry cards. Such
implementations however, are becoming less secure and practical, also is becoming more problematic thus
leading to an increasing interest in techniques related to biometrics systems. Face recognition system is amongst
important subjects in biometrics systems. This system is very useful for security in particular and has been
widely used and developed in many countries. This study aims to achieve face recognition successfully by
detecting human face in real time, based on Principal Component Analysis (PCA) algorithm.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Leading Change strategies and insights for effective change management pdf 1.pdf
K044065257
1. Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57
www.ijera.com 52 | P a g e
Face Recognition Based Door Lock System Using Opencv and C#
with Remote Access and Security Features
Prathamesh Timse**,
Pranav Aggarwal**
, Prakhar Sinha**
,Neel Vora**
,
**Student, Department of Electronics and Telecommunication Engineering, K.J Somaiya College Of
Engineering, Vidyanagar, Vidyavihar(E), Mumbai - 400 077, Maharashtra, India.
ABSTRACT
This paper investigates the accuracy and effectiveness of the face detection and recognition algorithms using
OpenCV and C# computer language. The adaboost algorithm [2] is used for face detection and PCA
algorithm[1] is used for face recognition. This paper also investigates the robustness of the face recognition
system when an unknown person is being detected, wherein the system will send an email to the owner of the
system using SMTP [7]. The door lock can also be accessed remotely from any part of the world by using a
Dropbox [8] account.
Keywords – Recognition, Detection, OpenCV, C#, Adaboost [2], PCA [1], SMTP [7] , Dropbox [8] .
I. INTRODUCTION
Human beings are recognized by their unique facial
characteristics. In the face recognition approach, a
given face is compared with the faces stored in the
database in order to identify the person. The purpose
is to find a face in the database, which has the highest
similarity with the given face. In the field of
biometrics, facial recognition technology is one of
the fastest growing fields.
The recent interest in face recognition can
be attributed to the increase of commercial interest
and the development of feasible technologies to
support the development of face recognition. Major
areas of commercial interest include biometrics, law
enforcement and surveillance, human-computer
interaction, multimedia management (for example,
automatic tagging of a particular individual within a
collection of digital photographs) smart cards,
passport check, Criminal investigations, access
control.
However, face detection is more challenging
because of some unstable characteristics, for
example, glasses and beard will impact the detecting
effectiveness. Moreover, different kinds and angles
of lighting will make detecting face generate uneven
brightness on the face, which will have influence on
the detection process.
To overcome these problems, the system used
adaboost algorithm [2] implemented using Haar
classifiers for face detection and PCA algorithm [1]
for face recognition implemented using face
recognizer function of OpenCV.
Rest of the paper is organized as follows:
Section II describes the proposed face recognition
system. Face detection mechanism is explained in
Section III. Section IV describes the face recognition
mechanism, Section V states the Remote access and
security features of the system, Section VI provides
the results and observations and the last section gives
the conclusion.
II. SETUP OF FACE RECOGNITION SYSTEM
III. FACE DETECTION BY HAAR
CASCADED CLASSIFIER USING
VIOLA JONES METHOD
Viola and Jones devised an algorithm, called
Haar Classifiers, to rapidly detect any object,
including human faces, using Adaboost [2]classifier
cascades that are based on Haar-like features and not
pixels.[4]
Open CV uses Viola Jones method
published in 2001, to detect faces using 4 key
concepts
Simple rectangular features called haar features
An integral image for rapid face detection
The adaboost machine learing method
A cascaded classifier to combine many
classifiers efficiently[6]
RESEARCH ARTICLE OPEN ACCESS
2. Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57
www.ijera.com 53 | P a g e
Extended Haar-like features are chosen to
enhance detecting precision, which is divided into
edge feature, linear feature and center surround
feature. And the above features comprise feature
module, in which there are two kinds of rectangle,
white and black, as in Fig 1[3]
Integral image is a method used to quickly
calculate the characteristic value: the difference
between the sum of white pixels and the sum of black
pixels. In Fig 2, it shows that the characteristic value
composed by II and IV is the variation between the
sum of IV pixels and the sum of II pixels. The former
is the difference between the sum of integral image
value of A and D and the sum of integral image value
of B and C. The later is the sum of integral image
value of B and integral image value of A.
The cascaded classifier used by OpenCV is
Haar cascade classifier which is trained on thousands
of human faces. The training data is stored in an xml
file which is later used by the classifier to detect
faces. This paper uses the Haar cascade classifier
haarcascade_frontalface_alt_tree.xml created by
Rainer Lienhart.
Adaboost [2]is from high dimensional space
and large amounts of data to train a strong classifier.
Strong classifier is composed by multiple weak
classifiers, the bias direction ( j p ), the threshold (θ j)
and characteristic function j f are consist of a weak
classifier. The Binary weak classifier as follows:
The steps of Strong classifier training
algorithm are as follows:
(1) About the samples (x1,y1) ,(x2,y2)…(xn,yn) and
,yi=-1 and yi=1 are corresponding to the counter-
samples and positive-samples
(2)The Initialize the sample weights about yi=-1 and
yi=1 are
m and l is the number about counter-samples and
positive-samples;
(3) Iterate T times: t=1,2,…T :
(4) Training the strong classifier is:
Strong classifier can be achieved arbitrarily
low error rate for training data. When the training
samples are representative comparison, the strong
classifier can be also achieved the ideal true error
rate.[5]
3. Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57
www.ijera.com 54 | P a g e
The detection process was completed by us
with an accuracy of 95%. The system could also
detect multiple faces as is evident from the following
figure:
IV. FACE RECOGNITION
Open CV (Open Source Computer Vision) is a
popular computer vision library. The Eigenfaces
method takes a holistic approach to face recognition:
A facial image is a point from a high-dimensional
image space and a lower-dimensional representation
is found, where classification becomes easy. The
lower-dimensional subspace is found with Principal
Component Analysis, which identifies the axes with
maximum variance. A class-specific projection with a
Linear Discriminant Analysis is applied to face
recognition . The basic idea is to minimize the
variance within a class, while maximizing the
variance between the classes at the same time. A
database of 25 persons was created for research
purpose. After acquiring the data the images were
read from a very simple CSV file because it is a
simple platform-independent approach. The problem
with the image representation is its high
dimensionality. Two-dimensional pxq grayscale
images span a m=pq –dimensional vector space, so
an image with 100X100 pixels lies in a 10,000-
dimensional image space already. Only a decision if
there‟s any variance in data can be made, so there‟s a
need to look for the components that account for
most of the information. The Principal Component
Analysis (PCA) [1] turns a set of possibly correlated
variables into a smaller set of uncorrelated variables.
The idea is, that a high-dimensional dataset is often
described by correlated variables and therefore only a
few meaningful dimensions account for most of the
information. The PCA method [1] finds the directions
with the greatest variance in the data, called principal
components.
Algorithm Description
Let X = {x1,x2,…,xn} be a random vector
with observations .
1. Compute the mean
2. Compute the Covariance Matrix S
3. Compute the eigenvalues and
eigenvectors of
4. Order the eigenvectors descending by their
eigenvalue. The principal components
are the eigenvectors corresponding to the
largest eigenvalues.
The principal components of the
observed vector are then given by:
where .
The reconstruction from the PCA basis is
given by:
where .
The Eigenfaces method then performs face
recognition by:
Projecting all training samples into the PCA
subspace.
Projecting the query image into the PCA
subspace.
Finding the nearest neighbor between the
projected training images and the projected
query image.
There emerges a problem. Suppose there are
400 images sized 100X100 pixel. The Principal
Component Analysis solves the covariance
matrix where ..
We would end up with a matrix,
roughly . Solving this problem isn‟t feasible,
so there‟s a need to apply a trick. From the linear
algebra lessons we know that a matrix
with can only have non-zero
eigenvalues. So it‟s possible to take the eigenvalue
decomposition of size instead:
and get the original eigenvectors
of
with a left multiplication of the data matrix:
4. Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57
www.ijera.com 55 | P a g e
The resulting eigenvectors are orthogonal, to
get orthonormal eigenvectors they need to be
normalized to unit length.
Face recognition operations
V. REMOTE ACCESS AND SECURITY
FEATURES
This paper also brings out the possibility for
remote access and sending out an email to the user in
case of an intruder trying to access the door.
The remote access is done by using Dropbox
[8] (service) operated by Dropbox, Inc.
The user has a predefined text file which he
can upload to his Dropbox folder[8]. The system
periodically reads the Dropbox folder [8] for that text
file and if it‟s found the system allows the door lock
to be opened.
In case of an intruder trying to access the
door, the unsuccessful attempts made by the intruder
is taken count of and his/her image is stored in a
folder. These images are then sent to the user by
email using SMTP server [7]. The mechanism is
explained below:
The .Net and .Mail libraries are to be added
in C#. This will allow us to access SMTPClient,
MailMessage [7] and NetworkCredentials. A valid
email account (with password) is needed to give the
program a place to send the mail from. To send an
email first a new mailMessage (an email) to send is
to be created. To include an attachment with an e-
mail message, first create the attachment by using
the Attachment class, and then add it to the message
by using the MailMessage attachments property. The
attachment in our case is the image of the
unauthorized user. The information that has to be
specified is the SMTP host server[7] that you use to
send e-mail, credentials for authentication, if required
by the SMTP server and the e-mail address of the
sender. A new SMTP client[7] to send our email is to
be created. We created a new client which has two
parameters (Host, Port). The host is where we'll be
sending the mail from; this should be the same as
your email account. The only reason we use port 25
is because it's the default SMTP port, although
another port may be used. Now we fill in the client
details and send the email. Enabling SSL (Secure
Sockets Layer, encryption) is required by most email
providers to send mail.
VI. RESULTS AND OBSERVATIONS
The parameters for face recognition system
in OpenCV Haar classifier[3] and face recognizer
functions are as follows:
1. Scale increase rate: This parameter in the call to
DetectHaarCascade() specifies how quickly OpenCV
should increase the scale for face detections with
each pass it makes over an image. Setting this higher
makes the detector run faster (by running fewer
passes), but if it's too high, you may jump too quickly
between scales and miss faces. The default in
OpenCV is 1.1, in other words, scale increases by a
factor of 1.1 (10%) each pass.
This parameter may have a value of 1.1 , 1.2
, 1.3 or 1.4. We have set it to 1.2, which means it will
run the moderate number of passes, thus will accurate
as well as fast. The lower the value, the more
"thoroughly" Haar detector will check the image for
the “face", but naturally will take more time.
2. Minimum neighbors threshold:
The next parameter in the call to
DetectHaarCascade() is the „The minimum-neighbors
threshold‟ which sets the cutoff level for discarding
or keeping rectangle groups as “face” or not, based
on how many raw detections are in the group. This
parameter‟s value ranges from 0 to 10.
We have used minimum neighbors = 10 i.e.
we want only an object to be marked as a face if it
has the highest probability and vote of being the
"face”. If we set minimum neighbor to a value n, then
detector will mark an object as "face" in any image IF
there is a group of n rectangles (hits) identifying it as
a "face".
3. Minimum Detection scale:
The third parameter in the call to Detect
Haar Cascade () is the size of the smallest face to
search for. We can change the default for this by
changing its value from the Haar cascade classifier
xml file .We have set it to 25X25,which gives us the
best results.
A good rule of thumb is to use some fraction
of your input image's width or height as the minimum
scale - for example, 1/4 of the image width. If you
specify a minimum scale other than the default, be
sure its aspect ratio (the ratio of width to height) is
the same as the defaults. i.e., aspect ratio should
be 1:1.
5. Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57
www.ijera.com 56 | P a g e
4. Threshold:
Threshold is the maximum value of the
Euclidean distance between the database image and
input image.
A database of 25 persons was created
wherein 50 images of each person were stored.
For simulation we tested the face
recognition system for 3 known persons and 1
unknown person.
The observations were carried out in
artificial fluorescent lighting conditions.
We kept the scale increase rate at 1.2,
minimum neighbors threshold at 10 and minimum
detection scale at 25X25.
The subjects were asked to show their face
10 times in the camera
The results obtained were as follows:
Known person 1:
Threshold Correct
recognition
False
recognition
Not
recognize
d
2000 8 0 2
2250 9 0 1
2500 9 0 1
2750 8 0 2
3000 10 0 0
3500 10 0 0
4000 9 1 0
4500 7 3 0
5000 5 5 0
It is observed that for the Known
person1,the threshold value in the range 3000-3500 is
highly accurate giving us a 100% accuracy under the
conditions. Also as the threshold value is increased
the false recognition of the person increases thus
deteriorating the performance.
Known person 2:
Threshed Correct
recognition
False
recognition
Not
recognized
2000 0 0 10
2250 0 0 10
2500 0 0 10
2750 1 0 9
3000 6 1 3
3500 8 1 1
4000 5 4 1
4500 5 5 0
5000 4 6 0
For Known person2, initially there is no
recognition in the threshold value up to 2500. The
optimum performance is obtained at the value 3500
giving us 80% accuracy. Performance weakened for
higher threshold values.
Known person 3:
Threshold Correct
recognition
False
recognition
Not
recognized
2000 0 0 10
2250 0 0 10
2500 2 0 8
2750 4 0 6
3000 7 0 3
3500 10 0 0
4000 5 4 1
4500 3 6 1
5000 2 8 0
Considering the results obtained for Known
person3, the threshold value of 3500 gave an
excellent result providing a 100% accuracy. Again
the range 3000-3500 provided high efficiency. At
further increase in the threshold values the subject
was falsely recognized.
Unknown person:
Threshold Correct
recognition
False
recognition
2000 10 0
2250 10 0
2500 10 0
2750 10 0
3000 10 0
3500 10 0
4000 10 0
4500 7 3
5000 2 8
As per the results, the subject was correctly
recognized as unknown up till a threshold value of
4000 providing an accurate system of recognition.
The image of the unknown person was sent as an
attachment to the Gmail account through SMTP.
However beyond the threshold of 4000 the subject
was recognized as a known person degrading the
performance.
VII. CONCLUSION
The paper suggests that the face detection
process under controlled lighting conditions
(fluorescent light) gives an accuracy of 95% with
scale increase rate at 1.2 ,minimum neighbors
6. Prathamesh Timse et al Int. Journal of Engineering Research and Applications www.ijera.com
ISSN : 2248-9622, Vol. 4, Issue 4( Version 6), April 2014, pp.52-57
www.ijera.com 57 | P a g e
threshold at 10 and minimum detection scale at
25X25.
The recognition process is subject to the
threshold value which is the maximum value of the
Euclidean distances between the database images and
input image. The threshold value was different for
different persons ranging from 3000-3500.In this
range the recognition rate is at 85%.
Also the SMTP and Dropbox service are
used for added security and remote access features.
REFERENCES
[1] M. Turk and A. Pentland, “Eigenfaces for
Recognition”, Journal of Cognitive Neuro
science, March 1991.
[2] P. Viola and Michael J. Jones. "Robust real-
time face detection", International Journal of
Computer Vision, 57(2):137-154, 2004.
[3] “The System of Face Detection Based on
OpenCV” Xianghua Fan, Fuyou Zhang,
Haixia Wang, Xiao Lu Key Laboratory for
Robot & Intelligent Technology of
Shandong Province, Shandong University of
Science and Technology, Qingdao 266590
[4] “Facial feature detection using haar
classifiers*”Phillip Ian Wilson Dr. John
Fernandez Texas A&M University – Corpus
Christi 6300 Ocean Dr. CI334, Corpus
Christi, TX 78412 361-825-3622.
[5] “ Miner Face Detection is Based on
Improved AdaBoost Algorithm “Chao
JIANG ,Gu-yong HAN ,Lei TIAN ,Song
LU, Wei-xing HUANG Air Force Service
College XuZhou JiangSu China.
[6] http://www.cognotics.com/opencv/servo_20
07_series/part_2/sidebar.html
[7] ”Active e-mail system SMTP protocol
monitoring algorithm”, Sureswaran, R.
Nat. Adv. IPv6 Centre (NAv6), Univ. Sains
Malaysia, Minden, Malaysia
Al Bazar, H. ; Abouabdalla, O. ; Manasrah,
A.M. ; El-Taj, H.
[8] ”On the impact of virtualization on
Dropbox-like cloud file storage/
synchronization services”, Haiyang Wang
Sch. of Comput. Sci., Simon Fraser Univ.,
Burnaby, BC, Canada
Shea, R. ; Feng Wang ; Jiangchuan Liu