The document describes a face recognition attendance system using computer vision techniques. It proposes using the Viola-Jones algorithm to detect faces in images and then recognize individuals based on facial features to automate attendance tracking. The system would work by detecting faces from video frames, extracting features, and matching against a database of registered users to identify and record attendees.
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
Automatic recognition and verification of human faces is a significant problem in the development and application of Human Computer Interaction (HCI).In addition, the demand for reliable personal identification in computerized access control has resulted in an increased interest in biometrics to replace password and identification (ID) card. Over the last couple of years, face recognition researchers have been developing new techniques fuelled by the advances in computer vision techniques, Design of computers, sensors and in fast emerging face recognition systems. In this paper, a Face Recognition and Verification System has been designed which is robust to variations of illumination, pose and facial expression but very sensitive to variations of the features of the face. This design reckons in the holistic or global as well as the analyticor geometric features of the face of the human beings. The global structure of the human face is analysed by Principal Component Analysis while the features of the local structure are computed considering the geometric features of the face such as the eyes, nose and the mouth. The extracted local features of the face are trained and later tested using Artificial Neural Network (ANN). This combined approach of the global and the local structure of the face image is proved very effective in the system we have designed as it has a correct recognition rate of over 90%.
Face Recognition Based Intelligent Door Control Systemijtsrd
This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis PCA and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automatically for the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing ""Face Recognition Based Intelligent Door Control System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23893.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23893/face-recognition-based-intelligent-door-control-system/san-san-naing
Social distance and face mask detector system exploiting transfer learningIJECEIAES
As time advances, the use of deep learning-based object detection algorithms has also evolved leading to developments of new human-computer interactions, facilitating an exploration of various domains. Considering the automated process of detection, systems suitable for detecting violations are developed. One such applications is the social distancing and face mask detectors to control air-borne diseases. The objective of this research is to deploy transfer learning on object detection models for spotting violations in face masks and physical distance rules in real-time. The common drawbacks of existing models are low accuracy and inability to detect in real-time. The MobileNetV2 object detection model and YOLOv3 model with Euclidean distance measure have been used for detection of face mask and physical distancing. A proactive transfer learning approach is used to perform the functionality of face mask classification on the patterns obtained from the social distance detector model. On implementing the application on various surveillance footage, it was observed that the system could classify masked and unmasked faces and if social distancing was maintained or not with accuracies 99% and 94% respectively. The models exhibited high accuracy on testing and the system can be infused with the existing internet protocol (IP) cameras or surveillance systems for real-time surveillance of face masks and physical distancing rules effectively.
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCEvivatechijri
Criminal Identification System allows the user to identify a certain criminal based on their biometrics. With advancements in security technology, CCTV cameras have been installed in many public and private areas to provide surveillance activities. The CCTV footage becomes crucial for understanding of the criminal activities that take place and to detect suspects. Additionallywhen a criminal is found it is difficult to locate and track him with just his image if he is on the run. Currently this procedure consists of finding such people in CCTV surveillance footage manually which is time consuming. It is also a tedious process as the resolution for such CCTV cameras is quite low. As a solution to these issues, the proposed system is developed to go through real time surveillance footage, detect and recognize the criminals based on reference datasets of criminals. The use of facial recognition for identifying criminals proves to bebeneficial. Once the best match is found the real time cropped image of the recognized criminal is saved which can be accessed by authorized officials for locating and tracking criminals or for further investigative use.
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
Innovative Analytic and Holistic Combined Face Recognition and Verification M...ijbuiiir1
Automatic recognition and verification of human faces is a significant problem in the development and application of Human Computer Interaction (HCI).In addition, the demand for reliable personal identification in computerized access control has resulted in an increased interest in biometrics to replace password and identification (ID) card. Over the last couple of years, face recognition researchers have been developing new techniques fuelled by the advances in computer vision techniques, Design of computers, sensors and in fast emerging face recognition systems. In this paper, a Face Recognition and Verification System has been designed which is robust to variations of illumination, pose and facial expression but very sensitive to variations of the features of the face. This design reckons in the holistic or global as well as the analyticor geometric features of the face of the human beings. The global structure of the human face is analysed by Principal Component Analysis while the features of the local structure are computed considering the geometric features of the face such as the eyes, nose and the mouth. The extracted local features of the face are trained and later tested using Artificial Neural Network (ANN). This combined approach of the global and the local structure of the face image is proved very effective in the system we have designed as it has a correct recognition rate of over 90%.
Face Recognition Based Intelligent Door Control Systemijtsrd
This paper presents the intelligent door control system based on face detection and recognition. This system can avoid the need to control by persons with the use of keys, security cards, password or pattern to open the door. The main objective is to develop a simple and fast recognition system for personal identification and face recognition to provide the security system. Face is a complex multidimensional structure and needs good computing techniques for recognition. The system is composed of two main parts face recognition and automatic door access control. It needs to detect the face before recognizing the face of the person. In face detection step, Viola Jones face detection algorithm is applied to detect the human face. Face recognition is implemented by using the Principal Component Analysis PCA and Neural Network. Image processing toolbox which is in MATLAB 2013a is used for the recognition process in this research. The PIC microcontroller is used to automatic door access control system by programming MikroC language. The door is opened automatically for the known person according to the result of verification in the MATLAB. On the other hand, the door remains closed for the unknown person. San San Naing | Thiri Oo Kywe | Ni Ni San Hlaing ""Face Recognition Based Intelligent Door Control System"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23893.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/23893/face-recognition-based-intelligent-door-control-system/san-san-naing
Social distance and face mask detector system exploiting transfer learningIJECEIAES
As time advances, the use of deep learning-based object detection algorithms has also evolved leading to developments of new human-computer interactions, facilitating an exploration of various domains. Considering the automated process of detection, systems suitable for detecting violations are developed. One such applications is the social distancing and face mask detectors to control air-borne diseases. The objective of this research is to deploy transfer learning on object detection models for spotting violations in face masks and physical distance rules in real-time. The common drawbacks of existing models are low accuracy and inability to detect in real-time. The MobileNetV2 object detection model and YOLOv3 model with Euclidean distance measure have been used for detection of face mask and physical distancing. A proactive transfer learning approach is used to perform the functionality of face mask classification on the patterns obtained from the social distance detector model. On implementing the application on various surveillance footage, it was observed that the system could classify masked and unmasked faces and if social distancing was maintained or not with accuracies 99% and 94% respectively. The models exhibited high accuracy on testing and the system can be infused with the existing internet protocol (IP) cameras or surveillance systems for real-time surveillance of face masks and physical distancing rules effectively.
CRIMINAL IDENTIFICATION FOR LOW RESOLUTION SURVEILLANCEvivatechijri
Criminal Identification System allows the user to identify a certain criminal based on their biometrics. With advancements in security technology, CCTV cameras have been installed in many public and private areas to provide surveillance activities. The CCTV footage becomes crucial for understanding of the criminal activities that take place and to detect suspects. Additionallywhen a criminal is found it is difficult to locate and track him with just his image if he is on the run. Currently this procedure consists of finding such people in CCTV surveillance footage manually which is time consuming. It is also a tedious process as the resolution for such CCTV cameras is quite low. As a solution to these issues, the proposed system is developed to go through real time surveillance footage, detect and recognize the criminals based on reference datasets of criminals. The use of facial recognition for identifying criminals proves to bebeneficial. Once the best match is found the real time cropped image of the recognized criminal is saved which can be accessed by authorized officials for locating and tracking criminals or for further investigative use.
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
Face Recognition and Increased Reality System for Mobile Devicesijtsrd
The objective of this article is to explain the problems of using the facial recognition functions in current mobile devices, as well as to give a possible solution based on a client server design. Sirojiddin Tavboev | Tavboev Islom "Face Recognition and Increased Reality System for Mobile Devices" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31384.pdf Paper Url :https://www.ijtsrd.com/computer-science/artificial-intelligence/31384/face-recognition-and-increased-reality-system-for-mobile-devices/sirojiddin-tavboev
facial recognition system is a technology capable of matching a human face from a digital image or a video frame against a database of faces, typically employed to authenticate users through ID verification services, works by pinpointing and measuring facial features from a given image.[1]
Development began on similar systems in the 1960s, beginning as a form of computer application. Since their inception, facial recognition systems have seen wider uses in recent times on smartphones and in other forms of technology, such as robotics. Because computerized facial recognition involves the measurement of a human's physiological characteristics, facial recognition systems are categorized as biometrics. Although the accuracy of facial recognition systems as a biometric technology is lower than iris recognition and fingerprint recognition, it is widely adopted due to its contactless process.[2] Facial recognition systems have been deployed in advanced human–computer interaction, video surveillance and automatic indexing of images.[3]
Facial recognition systems are employed throughout the world today by governments and private companies.[4] Their effectiveness varies, and some systems have previously been scrapped because of their ineffectiveness. The use of facial recognition systems has also raised controversy, with claims that the systems violate citizens' privacy, commonly make incorrect identifications, encourage gender norms and racial profiling, and do not protect important biometric data. The appearance of synthetic media such as deepfakes has also raised concerns about its security.[5] These claims have led to the ban of facial recognition systems in several cities in the United States.[6] As a result of growing societal concerns, Meta announced[7] that it plans to shut down Facebook facial recognition system, deleting the face scan data of more than one billion users.[8] This change will represent one of the largest shifts in facial recognition usage in the technology's history Facial recognition systems are employed throughout the world today by governments and private companies.[4] Their effectiveness varies, and some systems have previously been scrapped because of their ineffectiveness. The use of facial recognition systems has also raised controversy, with claims that the systems violate citizens' privacy, commonly make incorrect identifications, encourage gender norms and racial profiling, and do not protect important biometric data. The appearance of synthetic media such as deepfakes has also raised concerns about its security.[5] These claims have led to the ban of facial recognition systems in several cities in the United States.[6] As a result of growing societal concerns, Meta announced[7] that it plans to shut down Facebook facial recognition system, deleting the face scan data of more than one billion users.[8] This change will represent one of the largest shifts in facial recognition usage in the technology's history. Pleasure.
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
REVIEW ON GENERIC OBJECT RECOGNITION TECHNIQUES: CHALLENGES AND OPPORTUNITIES IAEME Publication
Recognizing objects automatically from an image is a fundamental step for many real-world computer vision applications. It is the task of identifying an instance of object in an image or video sequence without or least human intervention and assistance. In-spite of very high complexity, human beings perform this task with very less effort and even in the state of least attention. Little effort is needed for the humans to recognize huge number of and various categories of objects in images, though ‘object’ in the image may be different with respect to size / scale, viewpoint, position or orientation. We are even able to recognize the objects from an image, when they are only partially visible or present against cluttered background. Not only this, the recognition can be for specific instance of object or object category/class. When the task is done for classes of the object it is known as Generic object recognition or object-class detection or category-level object recognition. It has been found that over the years many techniques have evolved for recognizing object classes from images, but any automated object recognition system till date has not gained this capability fully at par with human beings. This very fact makes recognition of objects from an image, the most basic and fundamental challenge in the field of computer vision research. The purpose of this study is to give an overview and categorization of the approaches used in the literature for the purpose of Generic Object Recognition and various technical advancements achieved in the field. Mostly the survey focusses on the leading work since year 2000.
Adversarial Multi Scale Features Learning for Person Re Identificationijtsrd
Person re identification Re ID is the task of matching a target person across different cameras, which has drawn extensive attention in computer vision and has become an essential component in the video surveillance system. Pried can be considered as a problem of image retrieval. Existing person re identification methods depend mostly on single scale appearance information. In this work, to address issues, we demonstrate the benefits of a deep model with Multi scale Feature Representation Learning MFRL using Convolutional Neural Networks CNN and Random Batch Feature Mask RBFM is proposed for pre id in this study. The RBFM is enlightened by the drop block and Batch Drop Block BDB dropout based approaches. However, great challenges are being faced in the pre id task. First, in different scenarios, appearance of the same pedestrian changes dramatically by reason of the body misalignment frequently, various background clutters, large variations of camera views and occlusion. Second, in a public space, different pedestrians wear the same or similar clothes. Therefore, the distinctions between different pedestrian images are subtle. These make the topic of pre id a huge challenge. The proposed methods are only performed in the training phase and discarded in the testing phase, thus, enhancing the effectiveness of the model. Our model achieves the state of the art on the popular benchmark datasets including Market 1501, duke mtmc re id and CUHK03. Besides, we conduct a set of ablation experiments to verify the effectiveness of the proposed methods. Mrs. D. Radhika | D. Harini | N. Kirujha | Dr. M. Duraipandiyan | M. Kavya "Adversarial Multi-Scale Features Learning for Person Re-Identification" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42562.pdf Paper URL: https://www.ijtsrd.comengineering/computer-engineering/42562/adversarial-multiscale-features-learning-for-person-reidentification/mrs-d-radhika
Face detection and recognition has been prevalent with research scholars and diverse approaches have been
incorporated till date to serve purpose. The rampant advent of biometric analysis systems, which may be full body
scanners, or iris detection and recognition systems and the finger print recognition systems, and surveillance systems
deployed for safety and security purposes have contributed to inclination towards same. Advances has been made with
frontal view, lateral view of the face or using facial expressions such as anger, happiness and gloominess, still images
and video image to be used for detection and recognition. This led to newer methods for face detection and recognition
to be introduced in achieving accurate results and economically feasible and extremely secure. Techniques such as
Principal Component analysis (PCA), Independent component analysis (ICA), Linear Discriminant Analysis (LDA),
have been the predominant ones to be used. But with improvements needed in the previous approaches Neural Networks
based recognition was like boon to the industry. It not only enhanced the recognition but also the efficiency of
the process. Choosing Backpropagation as the learning method was clearly out of its efficiency to recognize non linear
faces with an acceptance ratio of more than 90% and execution time of only few seconds.
Abstract: This paper presents a new face parts information analyzer, as a promising model for detecting faces and locating the facial features in images. The main objective is to build fully automated human facial measurements systems from images with complex backgrounds. Detection of facial features such as eye, nose, and mouth is an important step for many subsequent facial image analysis tasks. The main study of face detection is detect the portion of part and mention the circle or rectangular of the every portion of body. In this paper face detection is depend upon the face pattern which is match the face from the pattern reorganization. The study present a novel and simple model approach based on a mixture of techniques and algorithms in a shared pool based on viola jones object detection framework algorithm combined with geometric and symmetric information of the face parts from the image in a smart algorithm.Keywords: Face detection, Video frames, Viola-Jones, Skin detection, Skin color classification, Face reorganization, Pattern reorganization. Skin Color.
Title: Face Detection Using Modified Viola Jones Algorithm
Author: Alpika Gupta, Dr. Rajdev Tiwari
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Face Recognition and Increased Reality System for Mobile Devicesijtsrd
The objective of this article is to explain the problems of using the facial recognition functions in current mobile devices, as well as to give a possible solution based on a client server design. Sirojiddin Tavboev | Tavboev Islom "Face Recognition and Increased Reality System for Mobile Devices" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31384.pdf Paper Url :https://www.ijtsrd.com/computer-science/artificial-intelligence/31384/face-recognition-and-increased-reality-system-for-mobile-devices/sirojiddin-tavboev
facial recognition system is a technology capable of matching a human face from a digital image or a video frame against a database of faces, typically employed to authenticate users through ID verification services, works by pinpointing and measuring facial features from a given image.[1]
Development began on similar systems in the 1960s, beginning as a form of computer application. Since their inception, facial recognition systems have seen wider uses in recent times on smartphones and in other forms of technology, such as robotics. Because computerized facial recognition involves the measurement of a human's physiological characteristics, facial recognition systems are categorized as biometrics. Although the accuracy of facial recognition systems as a biometric technology is lower than iris recognition and fingerprint recognition, it is widely adopted due to its contactless process.[2] Facial recognition systems have been deployed in advanced human–computer interaction, video surveillance and automatic indexing of images.[3]
Facial recognition systems are employed throughout the world today by governments and private companies.[4] Their effectiveness varies, and some systems have previously been scrapped because of their ineffectiveness. The use of facial recognition systems has also raised controversy, with claims that the systems violate citizens' privacy, commonly make incorrect identifications, encourage gender norms and racial profiling, and do not protect important biometric data. The appearance of synthetic media such as deepfakes has also raised concerns about its security.[5] These claims have led to the ban of facial recognition systems in several cities in the United States.[6] As a result of growing societal concerns, Meta announced[7] that it plans to shut down Facebook facial recognition system, deleting the face scan data of more than one billion users.[8] This change will represent one of the largest shifts in facial recognition usage in the technology's history Facial recognition systems are employed throughout the world today by governments and private companies.[4] Their effectiveness varies, and some systems have previously been scrapped because of their ineffectiveness. The use of facial recognition systems has also raised controversy, with claims that the systems violate citizens' privacy, commonly make incorrect identifications, encourage gender norms and racial profiling, and do not protect important biometric data. The appearance of synthetic media such as deepfakes has also raised concerns about its security.[5] These claims have led to the ban of facial recognition systems in several cities in the United States.[6] As a result of growing societal concerns, Meta announced[7] that it plans to shut down Facebook facial recognition system, deleting the face scan data of more than one billion users.[8] This change will represent one of the largest shifts in facial recognition usage in the technology's history. Pleasure.
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
REVIEW ON GENERIC OBJECT RECOGNITION TECHNIQUES: CHALLENGES AND OPPORTUNITIES IAEME Publication
Recognizing objects automatically from an image is a fundamental step for many real-world computer vision applications. It is the task of identifying an instance of object in an image or video sequence without or least human intervention and assistance. In-spite of very high complexity, human beings perform this task with very less effort and even in the state of least attention. Little effort is needed for the humans to recognize huge number of and various categories of objects in images, though ‘object’ in the image may be different with respect to size / scale, viewpoint, position or orientation. We are even able to recognize the objects from an image, when they are only partially visible or present against cluttered background. Not only this, the recognition can be for specific instance of object or object category/class. When the task is done for classes of the object it is known as Generic object recognition or object-class detection or category-level object recognition. It has been found that over the years many techniques have evolved for recognizing object classes from images, but any automated object recognition system till date has not gained this capability fully at par with human beings. This very fact makes recognition of objects from an image, the most basic and fundamental challenge in the field of computer vision research. The purpose of this study is to give an overview and categorization of the approaches used in the literature for the purpose of Generic Object Recognition and various technical advancements achieved in the field. Mostly the survey focusses on the leading work since year 2000.
Adversarial Multi Scale Features Learning for Person Re Identificationijtsrd
Person re identification Re ID is the task of matching a target person across different cameras, which has drawn extensive attention in computer vision and has become an essential component in the video surveillance system. Pried can be considered as a problem of image retrieval. Existing person re identification methods depend mostly on single scale appearance information. In this work, to address issues, we demonstrate the benefits of a deep model with Multi scale Feature Representation Learning MFRL using Convolutional Neural Networks CNN and Random Batch Feature Mask RBFM is proposed for pre id in this study. The RBFM is enlightened by the drop block and Batch Drop Block BDB dropout based approaches. However, great challenges are being faced in the pre id task. First, in different scenarios, appearance of the same pedestrian changes dramatically by reason of the body misalignment frequently, various background clutters, large variations of camera views and occlusion. Second, in a public space, different pedestrians wear the same or similar clothes. Therefore, the distinctions between different pedestrian images are subtle. These make the topic of pre id a huge challenge. The proposed methods are only performed in the training phase and discarded in the testing phase, thus, enhancing the effectiveness of the model. Our model achieves the state of the art on the popular benchmark datasets including Market 1501, duke mtmc re id and CUHK03. Besides, we conduct a set of ablation experiments to verify the effectiveness of the proposed methods. Mrs. D. Radhika | D. Harini | N. Kirujha | Dr. M. Duraipandiyan | M. Kavya "Adversarial Multi-Scale Features Learning for Person Re-Identification" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42562.pdf Paper URL: https://www.ijtsrd.comengineering/computer-engineering/42562/adversarial-multiscale-features-learning-for-person-reidentification/mrs-d-radhika
Face detection and recognition has been prevalent with research scholars and diverse approaches have been
incorporated till date to serve purpose. The rampant advent of biometric analysis systems, which may be full body
scanners, or iris detection and recognition systems and the finger print recognition systems, and surveillance systems
deployed for safety and security purposes have contributed to inclination towards same. Advances has been made with
frontal view, lateral view of the face or using facial expressions such as anger, happiness and gloominess, still images
and video image to be used for detection and recognition. This led to newer methods for face detection and recognition
to be introduced in achieving accurate results and economically feasible and extremely secure. Techniques such as
Principal Component analysis (PCA), Independent component analysis (ICA), Linear Discriminant Analysis (LDA),
have been the predominant ones to be used. But with improvements needed in the previous approaches Neural Networks
based recognition was like boon to the industry. It not only enhanced the recognition but also the efficiency of
the process. Choosing Backpropagation as the learning method was clearly out of its efficiency to recognize non linear
faces with an acceptance ratio of more than 90% and execution time of only few seconds.
Abstract: This paper presents a new face parts information analyzer, as a promising model for detecting faces and locating the facial features in images. The main objective is to build fully automated human facial measurements systems from images with complex backgrounds. Detection of facial features such as eye, nose, and mouth is an important step for many subsequent facial image analysis tasks. The main study of face detection is detect the portion of part and mention the circle or rectangular of the every portion of body. In this paper face detection is depend upon the face pattern which is match the face from the pattern reorganization. The study present a novel and simple model approach based on a mixture of techniques and algorithms in a shared pool based on viola jones object detection framework algorithm combined with geometric and symmetric information of the face parts from the image in a smart algorithm.Keywords: Face detection, Video frames, Viola-Jones, Skin detection, Skin color classification, Face reorganization, Pattern reorganization. Skin Color.
Title: Face Detection Using Modified Viola Jones Algorithm
Author: Alpika Gupta, Dr. Rajdev Tiwari
International Journal of Recent Research in Mathematics Computer Science and Information Technology
ISSN 2350-1022
Paper Publications
Adjusting primitives for graph : SHORT REPORT / NOTESSubhajit Sahu
Graph algorithms, like PageRank Compressed Sparse Row (CSR) is an adjacency-list based graph representation that is
Multiply with different modes (map)
1. Performance of sequential execution based vs OpenMP based vector multiply.
2. Comparing various launch configs for CUDA based vector multiply.
Sum with different storage types (reduce)
1. Performance of vector element sum using float vs bfloat16 as the storage type.
Sum with different modes (reduce)
1. Performance of sequential execution based vs OpenMP based vector element sum.
2. Performance of memcpy vs in-place based CUDA based vector element sum.
3. Comparing various launch configs for CUDA based vector element sum (memcpy).
4. Comparing various launch configs for CUDA based vector element sum (in-place).
Sum with in-place strategies of CUDA mode (reduce)
1. Comparing various launch configs for CUDA based vector element sum (in-place).
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Explore our comprehensive data analysis project presentation on predicting product ad campaign performance. Learn how data-driven insights can optimize your marketing strategies and enhance campaign effectiveness. Perfect for professionals and students looking to understand the power of data analysis in advertising. for more details visit: https://bostoninstituteofanalytics.org/data-science-and-artificial-intelligence/
1. Face recognition Attendance System Using Face
Recognition Technique
Indranath Sarkar *,Subhankar Pal, Sourav Mondal, Sayantan Mitra, Soumyajit khan ,
Pritam Chakraborty, Kousik Maity
Associate Professor of ECE : JIS College of Engineering, Kalyani, Nadia, West Bengal
Student : Dept. of ECE, JIS College of Engineering; Kalyani, West Bengal
ABSTRACT :
The main purpose of this project is to build a human face recognition for an institute or
organization to mark the attendance of their students or employees. It is a subdomain of
Object Detection, where we try to observe the instance of semantic objects. This system is
fully automated and easily deployable.
Index : Automated, Face Detection, Face Recognition, Voila and Jones Algorithm, Correlation,
Attendance.
I. INTRODUCTION :
The applications of this sub-domain of
computer vision are vast and businesses
around the world are already reaping the
benefits. The usage of face recognition
models is only going to increase in the next
few years Face recognition is as old as
computer vision, both because of the practical
importance of the topic and theoretical interest
from cognitive scientists. Despite the fact that
other methods of identification (such as
fingerprints, or iris scans) can be more accurate,
face recognition has always remains a major
focus of research because of its noninvasive
nature and because it is people's primary
method of person identification. Face
recognition technology is gradually evolving to a
universal biometric solution since it requires
virtually zero effort from the user end while
compared with other biometric options.
Biometric face recognition is basically used in
three main domains: time attendance systems
and employee management; visitor
management systems; and last but not the least
of the authorization systems and access control
systems. Traditionally, student’s attendances
are taken manually by using attendance sheet
given by the faculty members in class, which is a
time consuming event. Moreover, it is very
difficult to verify one by one student in a large
classroom environment with distributed
branches whether the authenticated students
are actually responding or not.
II. PROPOSED SYSTEM ARCHITECTURE :
A. Application layer :
Face detection is used in biometrics, often as a
part of (or together with) a facial recognition
system. It is also used in video surveillance,
human computer interface and image database
management. There is the capturing phase in
this the user captures the frames and using a
web app that runs on almost all platforms
upload the file to the server. Authentication is
provided to the users. This web app is used to
2. upload captured frames as well as to view the
attendance.
B. System layer :
This is the layer where the processing is done
that is the detection and recognition part at the
server side. Viola and Jones algorithm is used to
detect images from the frames. Initially an
integral image is generated from the frame
which simply assigns numbers to the pixels
generated by summing up the values. Further to
detect the objects from the frames the Haar-like
feature is generated and as millions of features
being generated Adaboost (boosting algorithm)
is used to enhance the performance. The
extracted features are passed through a trained
classifier which detects the faces from the
objects. These detected faces are cropped and
passed through the recognition module which
by applying correlation to the cropped images
and the images in the databases recognizes the
faces.
III. AND JONES ALGORITHM :
The Viola-Jones algorithm first detects the face
on the grayscale image and then finds the
location on the colored image. Viola-Jones
outlines a box (as you can see on the right) and
searches for a face within the box. It is
essentially searching for these haar-like
features, which will be explained later.
CONCEPTUAL DIAGRAM
IV. Eigenface :
Eigenface is based on PCA that classify images
to extract features using a set of images. It is
important that the images are in the same
lighting condition and the eyes match in each
image. Also, images used in this method must
contain the same number of pixels and in
grayscale. For this example, consider an
image with n x n pixels as shown in figure 4.
Each raw is concatenated to create a vector,
resulting a 1 × n
2
matrix. All the images in
the dataset are stored in a single matrix
resulting a matrix with columns
corresponding the number of images. The
matrix is averaged (normalised) to get an
average human face. By subtracting the
average face from each image vector unique
features to each face are computed. In the
resulting matrix, each column is a
representation of the difference each face has
to the average human face.
V. Cascade Training:
After the initial algorithm, it was understood
that training the cascade as a whole can be
optimized, to achieve a desired true detection
rate with minimal complexity. Examples of such
algorithms are RCBoost, ECBoost or RCECBoost.
This can be used for rapid object detection of
more specific targets, including non-human
3. objects with Haar-like features. The process
requires two sets of samples: negative and
positive, where the negative samples
correspond to arbitrary non-object images. The
time constraint in training a cascade classifier
can be circumvented using cloud-computing
methods.
VI. Cascade Detection:
After dealing with training We have to take the
face and also detect them. Cascade classifiers
are available in OpenCV, with pre-trained
cascades for frontal faces and upper body.
When we add eye detect
classifier(haarcascade_eye.xml) then it detects
the eye also.
VII. Tool Kits: Matplolib:
Matplotlib is a python 2D plotting library which
produces publication quality figures in a variety
of hard copy formats and interactive
environments across platforms. Matplotlib can
be used in Python scripts. Numpy: Numpy is a
library for the Python Programming language,
adding support for large multi-dimensional
matrices and array, along with a large collection
of high level mathematical function to operate
on these arrays. It’s a numerical python module.
VIII OpenCV :
OpenCV-Python is a library of Python bindings
designed to solve computer vision problems.
Python is a general purpose programming
language started by Guido van Rossum that
became very popular very quickly, mainly
because of its simplicity and code readability.
For open cv now the coding for the facial
recognition is easier than ever in open cv there
are three easy steps for the coding of facial
recognition. That is similar to the how us brain
used to recognize the face. Data Gathering:
gather the facial data by useful algorithms.
Train the recognizer: feed the facial data and
unique id so that the recognizer can detect.
Recognition: take the new faces and test it how
recognizer can recognize the face or not.
IX. OUTPUT :
X. CONCLUSION :
In order to obtain the attendance of individual
and to record their time of entry and exit, the
authors proposed the attendance management
system based on face recognition technology in
the institutions/organizations. The system takes
attendance of each student by continuous
observation at the entry and exit points. The
result of our preliminary experiment shows
improved performance in the estimation of the
attendance compared to the traditional black
and white attendance systems. Current work is
focused on the face detection algorithms from
images or video frames.
4. REFERENCES :
[1] A. J. Goldstein, L. D. Harmon, and A. B. Lesk,
“Identification of Human Faces,” in Proc. IEEE
Conference on Computer Vision and Pattern
Recognition, vol. 59, pp 748 – 760, May 1971
[2] M. A. Fischler and R. A. Elschlager, “The
Representation and Matching of Pictorial
Structures,” IEEE Transaction on Computer,vol.
C-22, pp. 67-92, 1973.
[3] Y. Cui, J. S. Jin, S. Luo, M. Park, and S. S. L.
Au, “Automated Pattern Recognition and Defect
Inspection System,” in proc. 5 th International
Conference on Computer Vision and Graphical
Image, vol. 59, pp. 768 – 773, May 1992.
[4] M. H. Yang, N. Ahuja, and D. Kriegmao, “Face
recognition using kernel eigenfaces,” IEEE
International Conference on Image Processing,
vol. 1, pp. 10-13, Sept. 2000.
[5] Y.-W. Kao, H.-Z. Gu, and S.-M. Yuan
“Personal based authentication by face
recognition,” in proc. Fourth International
Conference on Networked Computing and
Advanced Information Management, pp 81-85,
2008.
[6] P. Sinha, B. Balas, Y. Ostrovsky, and R.
Russell, “Face Recognition by Humans: Nineteen
Results All Computer Vision Researchers Should
Know About,” in Proceedings of the IEEE, vol.
94, Issue 11,2006.
[7] Paul Viola, Michael Jones, ‘Rapid Object
Detection using a Boosted Cascade of Simple
Features’, Accepted Conference on Computer
Vision and Pattern Recognition, 2001 .
[8]
FacedetectionWikipediahttps://en.wikipedia.or
g/wiki/Face_detection
[9] Face detection – facedetection.com.
[10] Inseong Kim, Joon Hyung Shim and Jinkyu
Yang (2016)Face Detection, Stanford University,
International Journal of Engineering Research
and Applications, Vol. 6, Issue 1, pp145-150.
[11]
tutroals.readthedocs.io/en/latest/py_tutorials/
py_objdete
ct/py_face_detection/py_face_detection.html?
highlight=opencv%20f ace#haar-cascade-
detection-in-opencv.
[12] R.O. Duda, P.E. Hart, Pattern Classification
and Scene Analysis., New York::, 1973.
[13] W.E.L. Grimson, T. Lozano-Perez, "Model-
Based Recognition and Localization From Sparse
Range Data",Techniques for 3-D Machine
Perception., 1985.
[14] M. Turk, A. Pentland, "Eigenfaces for
Recognition",J. Cognitive Neuroscience, vol. 3,
no. 1, pp. 71-86, 1991.
[15] A.Yuille,P.Hallinan, D. Cohen, "Feature
ExtractionFromFacesUsingDeformableTemplate
s",Int'l J. Computer Vision, vol. 8, no. 2, pp. 99-
111, 1992.
[16] K. Sung,Learning and Example Selection
forObject and Pattern Detection, 1995.
[17] D. Rumelhart, J. McClelland, Parallel
Distributed Processing, Cambridge, Mass.::, vol.
1, 1986.
[18] T. Poggio, T. Vetter, "Recognition
andStructure From One (2D) Model
View:Observations on Prototypes Object
Classesand Symmetries", 1992.
5. AUTHORS PROFILE :
Dr. Indranath Sarkar is
presently working as an Associate Professor of
JIS College of Engineering, Kalyani, Nadia, West
Bengal. He has worked 19 years in the Academic
Sector. He completed his Master of Engineering
degree in Electronics and Communication
Engineering and BE degree in ECE from National
Institute of Technology Durgapur.
Subhankar Pal is a final year UG
student of Electronics and Communication
Engineering from JIS College of Engineering,
Kalyani, Nadia, West Bengal. India
Sourav Mondal is a final year UG
student of Electronics and Communication
Engineering from JIS College of Engineering,
Kalyani, Nadia, West Bengal. India
Sayantan Mitra is a final year UG
student of Electronics and Communication
Engineering from JIS College of Engineering,
Kalyani, Nadia, West Bengal. India
Soumyajit khan is a final year UG
student of Electronics and Communication
Engineering from JIS College of Engineering,
Kalyani, Nadia, West Bengal. India
Pritam Chakraborty is a final year
UG student of Electronics and Communication
Engineering from JIS College of Engineering,
Kalyani, Nadia, West Bengal. India
Kousik Maity is a final year UG
student of Electronics and Communication
Engineering from JIS College of Engineering,
Kalyani, Nadia, West Bengal. India