This article describes the development of DSP as the core of the face recognition system, on the basis of
understanding the background, significance and current research situation at home and abroad of face
recognition issue, having a in-depth study to face detection, Image preprocessing, feature extraction face
facial structure, facial expression feature extraction, classification and other issues during face recognition
and have achieved research and development of DSP-based face recognition system for robotic
rehabilitation nursing beds. The system uses a fixed-point DSP TMS320DM642 as a central processing
unit, with a strong processing performance, high flexibility and programmability.
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDSIJCSES Journal
In order to establish face recognition system in rehabilitation nursing robots beds and achieve real-time
monitor the patient on the bed. We propose a face recognition method based on partial matching Hu
moments which apply for rehabilitation nursing robots beds. Firstly we using Haar classifier to detect
human faces automatically in dynamic video frames. Secondly we using Otsu threshold method to extract
facial features (eyebrows, eyes, mouth) in the face image and its Hu moments. Finally, we using Hu
moment feature set to achieve the automatic face recognition. Experimental results show that this method
can efficiently identify face in a dynamic video and it has high practical value (the accuracy rate is 91%
and the average recognition time is 4.3s).
A Spectral Domain Local Feature Extraction Algorithm for Face RecognitionCSCJournals
In this paper, a spectral domain feature extraction algorithm for face recognition is proposed, which efficiently exploits the local spatial variations in a face image. For the purpose of feature extraction, instead of considering the entire face image, an entropy-based local band selection criterion is developed, which selects high-informative horizontal bands from the face image. In order to capture the local variations within these high-informative horizontal bands precisely, a feature selection algorithm based on two-dimensional discrete Fourier transform (2D-DFT) is proposed. Magnitudes corresponding to the dominant 2D-DFT coefficients are selected as features and shown to provide high within-class compactness and high between-class separability. A principal component analysis is performed to further reduce the dimensionality of the feature space. Extensive experimentations have been carried out upon standard face databases and the recognition performance is compared with some of the existing face recognition schemes. It is found that the proposed method offers not only computational savings but also a very high degree of recognition accuracy.
This document describes a proposed method for automated object detection and suspicious behavior alert in ATMs using an embedded system. The method uses facial recognition with occlusion handling to identify users at an ATM and detect suspicious behaviors in real-time video. It trains a model on sample input images and recognizes faces in video sequences despite occlusions like eyeglasses or masks. When an unknown face or suspicious behaviors like fighting are detected, an alert is triggered. The method was implemented on an ARM 11 embedded system connected to a camera and tested on a database of ATM user images with results showing it can reasonably perform recognition in practical ATM environments.
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGijiert bestjournal
Face recognition is a computer application technique for automatically identifying or
verifying a person from a digital image or a video frame source. To do this is by comparing
selected facial features from the digital image and a face dataset. It is basically used in
security systems and can be compared to other biometrics such as fingerprint recognition or
eye, iris recognition systems. The main limitation of the current face recognition system is
that they only detect straight faces looking at the camera. Separate versions of the system
could be trained for each head orientation, and the results can be combined using arbitration
methods similar to those presented here. In earlier work, the face position must be centerlight
position; any lighting effect will affect the system. Similarly the eyes of person must be
open and without glass.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Asymmetrical Half-Join Method on Dual Vision Face Recognition IJECEIAES
This research proposes a model of face recognition using the method of joining two face images from left and right lens from a stereo vision camera namely half-join method. Half-join method is used in face image normalization processing. The proposed half-join method is a face images joining model, which is called asymmetrical half-join. In asymmetrical halfjoin method, a RoI (region of interest) of face image from left and right lenses are provided based on axis center of each eye in eye detection. The cropping of face image from asymmetrical half-join model has different width depends on eyes coordinate location. The proposed system shows that the asymmetrical half-join method can produce a better of face recognition rate. The experimental results show that the asymmetrical half-join method has a better recognition rate and computation time than single vision method and symmetrical half-join method.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Local Descriptor based Face Recognition SystemIRJET Journal
This document describes a local descriptor-based face recognition system that uses the Asymmetric Region Local Binary Pattern (AR-LBP) operator along with Principal Component Analysis (PCA) for facial expression recognition. The proposed AR-LBP operator addresses limitations of existing LBP operators in terms of scale, feature histogram length, and discriminability. The system divides input face images into regions, extracts AR-LBP histograms from each region, and concatenates them into a feature vector. It was evaluated on three datasets and achieved recognition accuracies of 96.43%, 97.14%, and 86.67%, respectively. Evaluation using different similarity metrics found that Mahalanobis Cosine distance performed best. Experiments varied grid and operator sizes.
PARTIAL MATCHING FACE RECOGNITION METHOD FOR REHABILITATION NURSING ROBOTS BEDSIJCSES Journal
In order to establish face recognition system in rehabilitation nursing robots beds and achieve real-time
monitor the patient on the bed. We propose a face recognition method based on partial matching Hu
moments which apply for rehabilitation nursing robots beds. Firstly we using Haar classifier to detect
human faces automatically in dynamic video frames. Secondly we using Otsu threshold method to extract
facial features (eyebrows, eyes, mouth) in the face image and its Hu moments. Finally, we using Hu
moment feature set to achieve the automatic face recognition. Experimental results show that this method
can efficiently identify face in a dynamic video and it has high practical value (the accuracy rate is 91%
and the average recognition time is 4.3s).
A Spectral Domain Local Feature Extraction Algorithm for Face RecognitionCSCJournals
In this paper, a spectral domain feature extraction algorithm for face recognition is proposed, which efficiently exploits the local spatial variations in a face image. For the purpose of feature extraction, instead of considering the entire face image, an entropy-based local band selection criterion is developed, which selects high-informative horizontal bands from the face image. In order to capture the local variations within these high-informative horizontal bands precisely, a feature selection algorithm based on two-dimensional discrete Fourier transform (2D-DFT) is proposed. Magnitudes corresponding to the dominant 2D-DFT coefficients are selected as features and shown to provide high within-class compactness and high between-class separability. A principal component analysis is performed to further reduce the dimensionality of the feature space. Extensive experimentations have been carried out upon standard face databases and the recognition performance is compared with some of the existing face recognition schemes. It is found that the proposed method offers not only computational savings but also a very high degree of recognition accuracy.
This document describes a proposed method for automated object detection and suspicious behavior alert in ATMs using an embedded system. The method uses facial recognition with occlusion handling to identify users at an ATM and detect suspicious behaviors in real-time video. It trains a model on sample input images and recognizes faces in video sequences despite occlusions like eyeglasses or masks. When an unknown face or suspicious behaviors like fighting are detected, an alert is triggered. The method was implemented on an ARM 11 embedded system connected to a camera and tested on a database of ATM user images with results showing it can reasonably perform recognition in practical ATM environments.
AN IMPROVED TECHNIQUE FOR HUMAN FACE RECOGNITION USING IMAGE PROCESSINGijiert bestjournal
Face recognition is a computer application technique for automatically identifying or
verifying a person from a digital image or a video frame source. To do this is by comparing
selected facial features from the digital image and a face dataset. It is basically used in
security systems and can be compared to other biometrics such as fingerprint recognition or
eye, iris recognition systems. The main limitation of the current face recognition system is
that they only detect straight faces looking at the camera. Separate versions of the system
could be trained for each head orientation, and the results can be combined using arbitration
methods similar to those presented here. In earlier work, the face position must be centerlight
position; any lighting effect will affect the system. Similarly the eyes of person must be
open and without glass.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Asymmetrical Half-Join Method on Dual Vision Face Recognition IJECEIAES
This research proposes a model of face recognition using the method of joining two face images from left and right lens from a stereo vision camera namely half-join method. Half-join method is used in face image normalization processing. The proposed half-join method is a face images joining model, which is called asymmetrical half-join. In asymmetrical halfjoin method, a RoI (region of interest) of face image from left and right lenses are provided based on axis center of each eye in eye detection. The cropping of face image from asymmetrical half-join model has different width depends on eyes coordinate location. The proposed system shows that the asymmetrical half-join method can produce a better of face recognition rate. The experimental results show that the asymmetrical half-join method has a better recognition rate and computation time than single vision method and symmetrical half-join method.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Local Descriptor based Face Recognition SystemIRJET Journal
This document describes a local descriptor-based face recognition system that uses the Asymmetric Region Local Binary Pattern (AR-LBP) operator along with Principal Component Analysis (PCA) for facial expression recognition. The proposed AR-LBP operator addresses limitations of existing LBP operators in terms of scale, feature histogram length, and discriminability. The system divides input face images into regions, extracts AR-LBP histograms from each region, and concatenates them into a feature vector. It was evaluated on three datasets and achieved recognition accuracies of 96.43%, 97.14%, and 86.67%, respectively. Evaluation using different similarity metrics found that Mahalanobis Cosine distance performed best. Experiments varied grid and operator sizes.
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...ijtsrd
In todays world, there are number of existing methods for facial recognition. These methods are based on frontal view face data. There are few methods which are based on non-frontal view face recognition method. In most of the face recognition algorithm, œFeature space approach is used. In this approach, different feature vectors are extracted from face. These distances are compared to determine matches. In this paper, it is proposed that how any person can be located in a campus or in a city using a cross pose face recognition method. This paper is focusing on three parts 1) generation of multi-view images 2) comparison of images 3) showing the actual location of a person. Sanjay D. Sawaitul"Cross Pose Facial Recognition Method for Tracking any Persons Location an Approach" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-1 , December 2017, URL: http://www.ijtsrd.com/papers/ijtsrd7186.pdf http://www.ijtsrd.com/computer-science/data-processing/7186/cross-pose-facial-recognition-method-for--tracking-any-persons-location-an-approach/sanjay-d-sawaitul
The document summarizes face recognition techniques. It discusses how face recognition involves detecting faces, extracting and matching features. Common feature extraction methods discussed include principal component analysis, linear discriminant analysis, and neural networks. The document also summarizes different categories of face recognition approaches, such as template-based, statistical, neural network-based, and hybrid approaches. Local geometry-based features and other approaches like using range, infrared, or profile images are also mentioned.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Review of face detection systems based artificial neural networks algorithmsijma
This document provides a review of face detection systems that are based on artificial neural network algorithms. It summarizes several studies that have used different types of neural networks for face detection, including:
1) Retinal connected neural networks and rotation invariant neural networks.
2) Principal component analysis combined with neural networks.
3) Convolutional neural networks, multilayer perceptrons, backpropagation neural networks, and polynomial neural networks.
4) Fast neural networks, evolutionary optimization of neural networks, and Gabor wavelet features with neural networks. Strengths and limitations of these different approaches are discussed.
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)’s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris. FFT is also applied on ROI to extract the features. These features are added arithmetically to obtain final features. The features of the database are compared with test iris using Euclidian Distance(ED) to compute performance parameters. It is observed that the values of CRR and EER are better in the case of propsed algorithm compared to existing algorithms.
The document discusses challenges and approaches for facial emotion recognition. It aims to develop a model-based approach for real-time driver emotion recognition on an embedded platform using parallel processing. Model-based approaches can overcome issues like illumination and pose variations. The document reviews several state-of-the-art methods and discusses challenges like occlusion, lighting distortions, and complex backgrounds. It describes exploring both 2D and 3D techniques for facial feature extraction and expression recognition.
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document reviews various techniques for iris segmentation in iris recognition systems. It discusses integrodifferential operator and Hough transform approaches, as well as the Masek, fuzzy clustering, and pulling and pushing methods. Each approach has advantages and disadvantages. The Masek method achieves circular iris and pupil localization but has lower accuracy and speed. Fuzzy clustering provides better segmentation for non-cooperative iris recognition but requires an extensive search. The pulling and pushing method aims to develop a more accurate and rapid iris segmentation algorithm.
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the
security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed
systems, make it a good candidate to replace most of thesecurity systems around. By making use of the
distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person.
Identification of this person is possible by applying appropriate matching algorithm.In this paper,
Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical
analysis of different feature detection operators is performed, features extracted is encoded using Haar
wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on
the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of
the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and
False Reject Rate is 10%.
Facial image classification and searching –a surveyZac Darcy
Recent developments in the area of image mining have shown the way for incredible growth in
extensively large and detailed image databases. The images which are available in these
databases, if checked, can endow with valuable information to the human users. As one of the
most successful applications of image analysis and understanding, fac
e recognition has
recently gained important attention particularly throughout the past many years. Though
tracking and recognizing face objects is a routine task, building such a system is still an active
research. Among several proposed face rec
ognition schemes, shape based approaches are
possibly the most promising ones. This paper provides an overview of various
classification and retrieval methods that were proposed earlier in literature. Also, this paper
provides a margina
l summary for future research and enhancements in face detection
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document summarizes a research paper on face recognition using image processing techniques. It begins with an introduction to biometrics and face detection methods. It then describes principal component analysis (PCA) and the "eigenface" approach, in which faces are represented as combinations of eigenvectors corresponding to variations in face images. The document also discusses using the Radon transform to capture directional features and the wavelet transform to provide multi-resolution analysis. It presents the methodology used, including applying these transforms to face images and classifying them. The paper aims to develop an efficient and robust system for face recognition.
This document summarizes a research paper on face recognition using image processing techniques. It begins with an introduction to biometrics and face detection methods. It then describes principal component analysis (PCA) and the "eigenface" approach, in which faces are represented as combinations of eigenvectors derived from training images. The document also discusses using the Radon transform to capture directional features, and applying the wavelet transform to the Radon space for multi-resolution features. It provides equations for these transforms. The paper was implemented and tested on databases of faces to evaluate recognition accuracy of different methods including PCA, Radon transform, wavelet transform, and their combination via Radon-wavelet transform.
IRJET- Survey on Face Detection MethodsIRJET Journal
The document reviews 15 papers on various face detection methods published between 2013 and 2018. It finds that the most popular feature extraction method is skin color segmentation, which achieves detection rates of 88-98%. The Viola-Jones method typically detects face regions as well as other body parts at a rate of 80-90%. Common face detection methods reviewed include skin color segmentation, Viola-Jones, Haar features, 3D mean shift, and Cascaded Head and Shoulder Detection. OpenCV, Python or MATLAB are typically used to implement real-time face detection systems.
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...IJCSES Journal
One common cause of visual impairment among people of working age in the industrialized countries is
Diabetic Retinopathy (DR). Automatic recognition of hard exudates (EXs) which is one of DR lesions in
fundus images can contribute to the diagnosis and screening of DR.The aim of this paper was to
automatically detect those lesions from fundus images. At first,green channel of each original fundus image
was segmented by improved Otsu thresholding based on minimum inner-cluster variance, and candidate
regions of EXs were obtained. Then, we extracted features of candidate regions and selected a subset which
best discriminates EXs from the retinal background by means of logistic regression (LR). The selected
features were subsequently used as inputs to a SVM to get a final segmentation result of EXs in the image.
Our database was composed of 120 images with variable color, brightness, and quality. 70 of them were
used to train the SVM and the remaining 50 to assess the performance of the method. Using a lesion based
criterion, we achieved a mean sensitivity of 95.05% and a mean positive predictive value of 95.37%. With
an image-based criterion, our approach reached a 100% mean sensitivity, 90.9% mean specificity and
96.0% mean accuracy. Furthermore, the average time cost in processing an image is 8.31 seconds. These
results suggest that the proposed method could be a diagnostic aid for ophthalmologists in the screening
for DR.
A R ISK - A WARE B USINESS P ROCESS M ANAGEMENT R EFERENCE M ODEL AND IT...IJCSES Journal
Due to the environmental pressures on organizations, the demand on Business Process Management
(BPM) automation suites has increased. This led to the arising need for managing process
-
related risks.
Theref
ore the management of risks in business processes has been the subject of many researches during
the past few years. However, most of these researches focused mainly on one or two stages of the BPM
life
cycle and introduced a support for it. This paper aim
s to provide a reference model for Risk
-
Aware BPM
which addresses the whole stages of the BPM life cycle, as well as some current techniques are liste
d for
the implementation of this model. Additionally, a case study for a business process in an Egyptian
university is introduced, in order to apply this model in realworld environment. The results will be
analyzed and concluded
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONIJCSES Journal
Recently, different kinds of computer systems like smart phones, embedded systems and cloud servers, are more and more widely used and the system development and validation is under great pressure. Hardware device, firmware and device driver development account for a significant portion of system development and validation effort. In traditional device, firmware and driver development largely has to wait until a stable version of the device becomes available. This dependency often leaves not enough time for software validation.
MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like
dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges
allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of issues in
MANET security. Based on MANET’s special characteristics, we define three security parameters for
MANET. In addition we divided MANET security into two different aspects and discussed each one in
details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In
addition, defeating approaches against attacks have been evaluated in some important metrics. After
analyses and evaluations, future scopes of work have been presented.
Detection system design of subsea tree controllerIJCSES Journal
To meet the requirements of the detection system of underwater controller of subsea tree, this paper adopts
the data acquisition and control mode of “HMI+ SIEMENS PLC+SQL ".Using the configuration software,
completed the development and design of production tree detection system to monitor, control and data
communication. The monitoring function has realized the process simulation of oil tree, the control
function has realized the remote control of oil tree, and database SQL has realized the management and
analysis of data in oil well, achieving real-time tracking, rapid response, improve speed , quality and
reporting level of oil production engineering design .At the same time the design center can make full use
of the database to complete the design of required query, statistical analysis and the output function of
related form .
Cross Pose Facial Recognition Method for Tracking any Person's Location an Ap...ijtsrd
In todays world, there are number of existing methods for facial recognition. These methods are based on frontal view face data. There are few methods which are based on non-frontal view face recognition method. In most of the face recognition algorithm, œFeature space approach is used. In this approach, different feature vectors are extracted from face. These distances are compared to determine matches. In this paper, it is proposed that how any person can be located in a campus or in a city using a cross pose face recognition method. This paper is focusing on three parts 1) generation of multi-view images 2) comparison of images 3) showing the actual location of a person. Sanjay D. Sawaitul"Cross Pose Facial Recognition Method for Tracking any Persons Location an Approach" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-1 , December 2017, URL: http://www.ijtsrd.com/papers/ijtsrd7186.pdf http://www.ijtsrd.com/computer-science/data-processing/7186/cross-pose-facial-recognition-method-for--tracking-any-persons-location-an-approach/sanjay-d-sawaitul
The document summarizes face recognition techniques. It discusses how face recognition involves detecting faces, extracting and matching features. Common feature extraction methods discussed include principal component analysis, linear discriminant analysis, and neural networks. The document also summarizes different categories of face recognition approaches, such as template-based, statistical, neural network-based, and hybrid approaches. Local geometry-based features and other approaches like using range, infrared, or profile images are also mentioned.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Review of face detection systems based artificial neural networks algorithmsijma
This document provides a review of face detection systems that are based on artificial neural network algorithms. It summarizes several studies that have used different types of neural networks for face detection, including:
1) Retinal connected neural networks and rotation invariant neural networks.
2) Principal component analysis combined with neural networks.
3) Convolutional neural networks, multilayer perceptrons, backpropagation neural networks, and polynomial neural networks.
4) Fast neural networks, evolutionary optimization of neural networks, and Gabor wavelet features with neural networks. Strengths and limitations of these different approaches are discussed.
Transform Domain Based Iris Recognition using EMD and FFTIOSRJVSP
Iris is one of the physiological trait which is used to identify the individuals. In this paper Transform Domain Based Iris Recognition using EMD and FFT is proposed. Circular Hough Transform is used in the Preprocessing stage to extract circular part of eye. The circular iris part is converted into rectangular rubber sheet model in Region of Interest (ROI).Empirical Mode Functions (EMF)’s are obtained by applying Empirical Mode Decomposition (EMD) on the Iris. FFT is also applied on ROI to extract the features. These features are added arithmetically to obtain final features. The features of the database are compared with test iris using Euclidian Distance(ED) to compute performance parameters. It is observed that the values of CRR and EER are better in the case of propsed algorithm compared to existing algorithms.
The document discusses challenges and approaches for facial emotion recognition. It aims to develop a model-based approach for real-time driver emotion recognition on an embedded platform using parallel processing. Model-based approaches can overcome issues like illumination and pose variations. The document reviews several state-of-the-art methods and discusses challenges like occlusion, lighting distortions, and complex backgrounds. It describes exploring both 2D and 3D techniques for facial feature extraction and expression recognition.
Real time voting system using face recognition for different expressions and ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document reviews various techniques for iris segmentation in iris recognition systems. It discusses integrodifferential operator and Hough transform approaches, as well as the Masek, fuzzy clustering, and pulling and pushing methods. Each approach has advantages and disadvantages. The Masek method achieves circular iris and pupil localization but has lower accuracy and speed. Fuzzy clustering provides better segmentation for non-cooperative iris recognition but requires an extensive search. The pulling and pushing method aims to develop a more accurate and rapid iris segmentation algorithm.
Biometrics refers to metrics related to human characteristics. Biometrics authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to identify individuals in groups that are under surveillance.
EFFECTIVENESS OF FEATURE DETECTION OPERATORS ON THE PERFORMANCE OF IRIS BIOME...IJNSA Journal
Iris Recognition is a highly efficient biometric identification system with great possibilities for future in the
security systems area.Its robustness and unobtrusiveness, as opposed tomost of the currently deployed
systems, make it a good candidate to replace most of thesecurity systems around. By making use of the
distinctiveness of iris patterns, iris recognition systems obtain a unique mapping for each person.
Identification of this person is possible by applying appropriate matching algorithm.In this paper,
Daugman’s Rubber Sheet model is employed for irisnormalization and unwrapping, descriptive statistical
analysis of different feature detection operators is performed, features extracted is encoded using Haar
wavelets and for classification hammingdistance as a matching algorithm is used. The system was tested on
the UBIRIS database. The edge detection algorithm, Canny, is found to be the best one to extract most of
the iris texture. The success rate of feature detection using canny is 81%, False Accept Rate is 9% and
False Reject Rate is 10%.
Facial image classification and searching –a surveyZac Darcy
Recent developments in the area of image mining have shown the way for incredible growth in
extensively large and detailed image databases. The images which are available in these
databases, if checked, can endow with valuable information to the human users. As one of the
most successful applications of image analysis and understanding, fac
e recognition has
recently gained important attention particularly throughout the past many years. Though
tracking and recognizing face objects is a routine task, building such a system is still an active
research. Among several proposed face rec
ognition schemes, shape based approaches are
possibly the most promising ones. This paper provides an overview of various
classification and retrieval methods that were proposed earlier in literature. Also, this paper
provides a margina
l summary for future research and enhancements in face detection
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
This document summarizes a research paper on face recognition using image processing techniques. It begins with an introduction to biometrics and face detection methods. It then describes principal component analysis (PCA) and the "eigenface" approach, in which faces are represented as combinations of eigenvectors corresponding to variations in face images. The document also discusses using the Radon transform to capture directional features and the wavelet transform to provide multi-resolution analysis. It presents the methodology used, including applying these transforms to face images and classifying them. The paper aims to develop an efficient and robust system for face recognition.
This document summarizes a research paper on face recognition using image processing techniques. It begins with an introduction to biometrics and face detection methods. It then describes principal component analysis (PCA) and the "eigenface" approach, in which faces are represented as combinations of eigenvectors derived from training images. The document also discusses using the Radon transform to capture directional features, and applying the wavelet transform to the Radon space for multi-resolution features. It provides equations for these transforms. The paper was implemented and tested on databases of faces to evaluate recognition accuracy of different methods including PCA, Radon transform, wavelet transform, and their combination via Radon-wavelet transform.
IRJET- Survey on Face Detection MethodsIRJET Journal
The document reviews 15 papers on various face detection methods published between 2013 and 2018. It finds that the most popular feature extraction method is skin color segmentation, which achieves detection rates of 88-98%. The Viola-Jones method typically detects face regions as well as other body parts at a rate of 80-90%. Common face detection methods reviewed include skin color segmentation, Viola-Jones, Haar features, 3D mean shift, and Cascaded Head and Shoulder Detection. OpenCV, Python or MATLAB are typically used to implement real-time face detection systems.
AUTOMATED DETECTION OF HARD EXUDATES IN FUNDUS IMAGES USING IMPROVED OTSU THR...IJCSES Journal
One common cause of visual impairment among people of working age in the industrialized countries is
Diabetic Retinopathy (DR). Automatic recognition of hard exudates (EXs) which is one of DR lesions in
fundus images can contribute to the diagnosis and screening of DR.The aim of this paper was to
automatically detect those lesions from fundus images. At first,green channel of each original fundus image
was segmented by improved Otsu thresholding based on minimum inner-cluster variance, and candidate
regions of EXs were obtained. Then, we extracted features of candidate regions and selected a subset which
best discriminates EXs from the retinal background by means of logistic regression (LR). The selected
features were subsequently used as inputs to a SVM to get a final segmentation result of EXs in the image.
Our database was composed of 120 images with variable color, brightness, and quality. 70 of them were
used to train the SVM and the remaining 50 to assess the performance of the method. Using a lesion based
criterion, we achieved a mean sensitivity of 95.05% and a mean positive predictive value of 95.37%. With
an image-based criterion, our approach reached a 100% mean sensitivity, 90.9% mean specificity and
96.0% mean accuracy. Furthermore, the average time cost in processing an image is 8.31 seconds. These
results suggest that the proposed method could be a diagnostic aid for ophthalmologists in the screening
for DR.
A R ISK - A WARE B USINESS P ROCESS M ANAGEMENT R EFERENCE M ODEL AND IT...IJCSES Journal
Due to the environmental pressures on organizations, the demand on Business Process Management
(BPM) automation suites has increased. This led to the arising need for managing process
-
related risks.
Theref
ore the management of risks in business processes has been the subject of many researches during
the past few years. However, most of these researches focused mainly on one or two stages of the BPM
life
cycle and introduced a support for it. This paper aim
s to provide a reference model for Risk
-
Aware BPM
which addresses the whole stages of the BPM life cycle, as well as some current techniques are liste
d for
the implementation of this model. Additionally, a case study for a business process in an Egyptian
university is introduced, in order to apply this model in realworld environment. The results will be
analyzed and concluded
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
The paper presents the way to provide the security to one of the recent development in computing, cloud
computing. The main interest is to investigate the impact of using Virtual Private Network VPN together
with firewall on cloud computing performance. Therefore, computer modeling and simulation of cloud
computing with OPNET modular simulator has been conducted for the cases of cloud computing with and
without VPN and firewall. To achieve clear idea on these impacts, the simulation considers different
scenarios and different form application traffic applied. Simulation results showing throughput, delay,
servers traffic sent and received have been collected and presented. The results clearly show that there is
impact in throughput and delay through the use of VPN and firewall. The impact on throughput is higher
than that on the delay. Furthermore, the impact show that the email traffic is more affected than web
traffic.
A SURVEY OF VIRTUAL PROTOTYPING TECHNIQUES FOR SYSTEM DEVELOPMENT AND VALIDATIONIJCSES Journal
Recently, different kinds of computer systems like smart phones, embedded systems and cloud servers, are more and more widely used and the system development and validation is under great pressure. Hardware device, firmware and device driver development account for a significant portion of system development and validation effort. In traditional device, firmware and driver development largely has to wait until a stable version of the device becomes available. This dependency often leaves not enough time for software validation.
MANET is a kind of Ad Hoc network with mobile, wireless nodes. Because of its special characteristics like
dynamic topology, hop-by-hop communications and easy and quick setup, MANET faced lots of challenges
allegorically routing, security and clustering. The security challenges arise due to MANET’s selfconfiguration
and self-maintenance capabilities. In this paper, we present an elaborate view of issues in
MANET security. Based on MANET’s special characteristics, we define three security parameters for
MANET. In addition we divided MANET security into two different aspects and discussed each one in
details. A comprehensive analysis in security aspects of MANET and defeating approaches is presented. In
addition, defeating approaches against attacks have been evaluated in some important metrics. After
analyses and evaluations, future scopes of work have been presented.
Detection system design of subsea tree controllerIJCSES Journal
To meet the requirements of the detection system of underwater controller of subsea tree, this paper adopts
the data acquisition and control mode of “HMI+ SIEMENS PLC+SQL ".Using the configuration software,
completed the development and design of production tree detection system to monitor, control and data
communication. The monitoring function has realized the process simulation of oil tree, the control
function has realized the remote control of oil tree, and database SQL has realized the management and
analysis of data in oil well, achieving real-time tracking, rapid response, improve speed , quality and
reporting level of oil production engineering design .At the same time the design center can make full use
of the database to complete the design of required query, statistical analysis and the output function of
related form .
Process and product quality assurance are very important aspects in development of software. Process
and product quality assurance monitor the software engineering processes and methods to ensure quality.
It is the process of confirming and verifying that whether services and products meet the customer
expectation or not.
This research will identify general measures for the specific goals and its specific practices of Process and
Product Quality Assurance Process Area in Capability Maturity Model Integration (CMMI). CMMI is
developed by Software Engineering Institute (SEI) in Carnegie Mellon University in USA. CMMI is a
framework for assessment and improvement of computer information systems. The procedure we used to
determine the measures is to apply the Goal Questions Metrics (GQM) approach to the two specific goals
and its four specific practices of Process and Product Quality Assurance Process Area in CMMI.
Dynamic K-Means Algorithm for Optimized Routing in Mobile Ad Hoc Networks IJCSES Journal
The document proposes a dynamic K-means clustering algorithm to improve routing in mobile ad hoc networks (MANETs). It aims to address limitations of the basic K-means algorithm like fixed cluster heads and members. The dynamic algorithm elects cluster heads periodically based on distance to cluster center and node energy. It allows any node to serve as cluster head for a time slot to address head mobility. Experimental results show the dynamic approach enhances MANET routing performance metrics like route discovery time, delay, and packet delivery rate compared to basic K-means routing.
SIMULATION AND COMPARISON ANALYSIS OF DUE DATE ASSIGNMENT METHODS USING SCHED...IJCSES Journal
This paper presents a simulation and comparison analysis conducted to investigate the due-date
assignment methods through various scheduling rules. The due date assignment methods investigated are
flow time due date (FTDD) and total work content (TWK) method. Three scheduling rules are integrated in
the simulation for scheduling of jobs on machines. The performance of the study is evaluated based on the
configuration system of Hibret manufacturing and machine building Industry, subsidiary company of
Metals and Engineering Corporation were thoroughly considered. The performance of the system is
evaluated based on maximum tardiness, number of tardy jobs and total weighted tardiness. Simulation
experiments are carried in different scenarios through combining due-date assignment methods and
scheduling rules. A two factor Analysis of variance of the experiment result is performed to identify the
effect of due-date assignment methods and scheduling rules on the performance of the job shop system. The
least significant difference (LSD) method was used for performing comparisons in order to determine
which means differ from the other. The finding of the study reveals that FTDD methods gives less mean
value compared to TWK when evaluated by the three scheduling rules.
F ACIAL E XPRESSION R ECOGNITION B ASED ON E DGE D ETECTIONIJCSES Journal
Relational Over the last two decades, the
advances in computer vision and pattern recognition power have
opened the door to new opportunity of automatic facial expression recognition system[1]. This paper
use
Canny edge detection method for facial expression recognition. Image color space transfor
mation in the
first place and then to identify and locate human face .Next pick up the edge of eyes and mouth's fe
atures
extraction. Last we judge the facial expressions after compared with the expressions we known in the
database. This proposed approach p
rovides full automatic solution of human expressions as well as
overcoming facial expressions variation and intensity problems.
DETECTING BRAIN TUMOUR FROM MRI IMAGE USING MATLAB GUI PROGRAMMEIJCSES Journal
Engineers have been actively developing tools to detect tumors and to process medical images. Medical image segmentation is a powerful tool that is often used to detect tumors. Many scientists and researchers are working to develop and add more features to this tool. This project is about detecting Brain tumors from MRI images using an interface of GUI in Matlab. Using the GUI, this program can use various combinations of segmentation, filters, and other image processing algorithms to achieve the best results.
We start with filtering the image using Prewitt horizontal edge-emphasizing filter. The next step for detecting tumor is "watershed pixels." The most important part of this project is that all the Matlab programs work with GUI “Matlab guide”. This allows us to use various combinations of filters, and other
image processing techniques to arrive at the best result that can help us detect brain tumors in their early stages.
A SURVEY ON VARIOUS APPROACHES TO FINGERPRINT MATCHING FOR PERSONAL VERIFICAT...IJCSES Journal
Automatic Fingerprint authentication for personal identification and verification has received considerable
attention over the past decades among various biometric techniques because of the distinctiveness and
persistence properties of fingerprints. Now fingerprints are set to explode in popularity as they are being
used to secure smart phones and to authorize payments in online stores. The main objective of this paper is
to review the extensive research work that has been done over the past decade and discuss the various
approaches proposed for fingerprint matching. The proposed methods were based on 2D correlation in the
spatial and frequency domains, Artificial Neural Networks, Hough transform, Fourier transform, graphs,
local texture, ridge geometry etc. All these different techniques have their pros and cons. This paper also
provides the performance comparison of several existing methods proposed by researchers in fing
EVALUATION OF MIMO SYSTEM CAPACITY OVER RAYLEIGH FADING CHANNELIJCSES Journal
High transmission data rate, spectral efficiency and reliability are essential for future wireless
communications systems. MIMO (multi-input multi-output) diversity technique is a band width efficient
system achieving high data transmission which eventually establishing a high capacity communication
system. Without needing to increase the transmitted power or the channel bandwidth, gain in capacity can
be considerably improved by varying the number of antennas on both sides. Correlated and uncorrelated
channels MIMO system was considered in this paper for different number of antennas and different SNR
over Rayleigh fading channel. At the transmitter both CSI(channel state information) technique and Water
filling power allocation principle was also considered in this paper.
The aim of this paper is to design a convenient system that is helpful for the people who have hearing difficulties and in general who use very simple and effective method; sign language. This system can be used for converting sign language to voice and also voice to sign language. A motion capture system is used for sign language conversion and a voice recognition system for voice conversion. It captures the
signs and dictates on the screen as writing. It also captures the voice and displays the sign language meaning on the screen as motioned image or video.
This document summarizes a study on biclustering tools, bicluster validation, and evaluation functions. It begins with definitions of biclustering and types of biclusters in microarray data. It then discusses intra-bicluster and inter-bicluster evaluation functions that measure bicluster coherence and accuracy, respectively. The document outlines statistical and biological methods for validating biclusters, including using gene ontology. Finally, it lists some R tools for biclustering microarray data and association rule mining.
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...IJCSES Journal
M
obile computing
and
Mobile Commerce is
most popular now a days because of t
he service offered during
the mobility
.
Mobile computing has become the reality today rather than the luxury.
Mobile wireless market
is increasing by leaps and bounds. The quality and speeds available in the mobile environment must
match the fixed network
s if the convergence of the mobile wireless and fixed communication network is to
happen in the real sense. The
challenge for mobile network lies
in providing very large footprint of mobile
services with high speed and security. Online transactions using m
obile devices must ensure high security
for user credentials
and it
should not be possible for misuse.
M
-
Commerce is the electronic commerce
performed using mobile devices.
Since user credentials to be kept secret, a high level of security should be
ensured
During forensic examination, analysis of unallocated space of seized storage media is essential to extract the previously deleted or overwritten files when the file system metadata is missing or corrupted. The process of recovering files from the unallocated space based on file type-specific information (header and footer) and/or file contents is known as Data Carving. The research in this domain has witnessed various
technological enhancements in terms of tools and techniques over the past years. This paper surveys various data carving techniques, in particular multimedia files and classifies the research in the domain into three categories: classical carving techniques, smart carving techniques and modern carving
techniques. Further, seven popular multimedia carving tools are empirically evaluated. We conclude with the need to develop the new techniques in the field for carving multimedia files due to the fact that the fragmentation and compression are very common issues for these files
STATE OF THE ART SURVEY ON DSPL SECURITY CHALLENGESIJCSES Journal
The Dynamic Software Product Line (DSPL) is becoming the system with high vulnerability and high confidentiality in which the adaptive security is a challenging task and critical for it to operate. Adaptive security is able to automatically select security mechanisms and their parameters at runtime in order to preserve the required security level in a changing environment. This paper presents a literature review of
security adaptation approaches for DSPL, and evaluates them in terms of how well they support critical
security services and what level of adaptation they achieve. This work will be done following the Systematic
Review approach. Our results concluded that the research field of security approaches for DSPL is still
poor of methods and metrics for evaluating and comparing different techniques. The comparison reveals
that the existing adaptive security approaches widely cover the information gathering. However, comparative approaches do not describe how to decide on a method for performing adaptive security DSPL or how to provide knowledge input for adapting security. Therefore, these areas of research are promising.
REVIEW OF FACE DETECTION SYSTEMS BASED ARTIFICIAL NEURAL NETWORKS ALGORITHMSijma
Face detection is one of the most relevant applications of image processing and biometric systems.
Artificial neural networks (ANN) have been used in the field of image processing and pattern recognition.
There is lack of literature surveys which give overview about the studies and researches related to the using
of ANN in face detection. Therefore, this research includes a general review of face detection studies and
systems which based on different ANN approaches and algorithms. The strengths and limitations of these
literature studies and systems were included also.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Face detection is one of the most suitable applications for image processing and biometric programs. Artificial neural networks have been used in the many field like image processing, pattern recognition, sales forecasting, customer research and data validation. Face detection and recognition have become one of the most popular biometric techniques over the past few years. There is a lack of research literature that provides an overview of studies and research-related research of Artificial neural networks face detection. Therefore, this study includes a review of facial recognition studies as well systems based on various Artificial neural networks methods and algorithms.
HUMAN FACE RECOGNITION USING IMAGE PROCESSING PCA AND NEURAL NETWORKijiert bestjournal
Security and authentication of a person is a vital part of any business. There are many techniques use d for this purpose. One of technique is human face recognition . Human Face recognition is an effective means of authenticating a person. The benefit of this approa ch is that,it enables us to detect changes in the face pattern of an individual to substantial extent. The recognition s ystem can tolerate local variations in the face exp ression of an individual. Hence Human face recognition can be use d as a key factor in crime detection mainly to iden tify criminals. There are several approaches to Human fa ce recognition of which Image Processing Principal Component Analysis (PCA) and Neural Networks have been includ ed in our project. The system consists of a databas e of a set of facial patterns for each individual. The charact eristic features called �eigenfaces� are extracted from the stored images using which the system is trained for subseq uent recognition of new images.
A study of techniques for facial detection and expression classificationIJCSES Journal
Automatic recognition of facial expressions is an important component for human-machine interfaces. It
has lot of attraction in research area since 1990's.Although humans recognize face without effort or
delay, recognition by a machine is still a challenge. Some of its challenges are highly dynamic in their
orientation, lightening, scale, facial expression and occlusion. Applications are in the fields like user
authentication, person identification, video surveillance, information security, data privacy etc. The
various approaches for facial recognition are categorized into two namely holistic based facial
recognition and feature based facial recognition. Holistic based treat the image data as one entity without
isolating different region in the face where as feature based methods identify certain points on the face
such as eyes, nose and mouth etc. In this paper, facial expression recognition is analyzed with various
methods of facial detection,facial feature extraction and classification.
Face recognition systems are becoming increasingly important for security applications like surveillance cameras. They use biometric facial features which are easier for non-collaborating individuals compared to other biometrics. The document outlines the steps for a face recognition system as acquiring an image, detecting faces, recognizing faces to identify individuals. It discusses challenges like illumination, occlusion and methods are categorized as knowledge-based or appearance-based. The problem is to design a system for a robotics lab to detect and recognize frontal faces under changing lighting of at least 50 people, excluding sunglasses. The thesis outline covers literature review, proposed system theory, experiments and results, discussion and future work.
IRJET- Free & Generic Facial Attendance System using AndroidIRJET Journal
This document proposes a free and generic facial attendance system using Android that can automatically detect students' faces and mark attendance. It uses face detection and recognition algorithms to capture images from a camera and identify students by matching faces to a database. If a face is detected, attendance is marked as present. The system then creates a Google Sheet to store and access attendance records. This provides a low-cost alternative to commercial biometric systems for tracking student attendance.
The goal of this paper is to present a critical survey of existing literatures on human face detection and recognition over the last 4-5 years. An application for automatic face detection and tracking in video streams from surveillance cameras in public or commercial places is discussed in this paper. Prototype is designed to work with web cameras for the face detection and tracking system based on Visual 2010 C# and Open CV. This system can be used for security purpose to record the visitor face as well as to detect and track the face.
Keywords:- Face Detection, Face Recognition, Open CV, Face Tracking, Video Streams.
This document presents a method for real-time facial expression analysis using principal component analysis (PCA). The method involves detecting faces, extracting expression features from the eye and mouth regions, applying PCA to extract texture features, and using a support vector machine classifier to classify expressions. The proposed approach was tested on a database of facial images with expressions categorized as happy, angry, disgust, sad, or neutral. PCA was used to select the most relevant eigenfaces and reduce the dimensionality of the feature space for more efficient classification of expressions in real-time.
This document describes a face detection method using principal component analysis. It first preprocesses images using histogram equalization to address illumination issues. It then detects faces using skin segmentation to identify skin regions. Finally, it recognizes the extracted facial features using principal component analysis and a neural network, which reduces the dimensionality of the images for efficient recognition.
A novel approach for performance parameter estimation of face recognition bas...IJMER
This document presents a novel approach for face recognition based on clustering, shape detection, and corner detection. The approach first clusters face key points and applies shape and corner detection methods to detect the face boundary and corners. It then performs both face identification and recognition on a large face database. The method achieves lower false acceptance rates, false rejection rates, and equal error rates compared to previous works, and also calculates recognition time. It provides a concise 3-sentence summary of the key aspects of the document.
The document describes an algorithm for eye detection in face images. It begins with face detection using skin color detection in HSV color space. Then it finds the symmetric axis of the extracted face region using gradient orientation histograms to determine the location of the eyes. It further finds the symmetric axis within the eye region to locate the center of the eyes. The algorithm aims to accurately detect the eyes even when the face is rotated, which is important for applications like face recognition and gaze tracking.
A Novel Mathematical Based Method for Generating Virtual Samples from a Front...CSCJournals
This paper deals with one sample face recognition which is a new challenging problem in pattern recognition. In the proposed method, the frontal 2D face image of each person divided to some sub-regions. After computing the 3D shape of each sub-region, a fusion scheme is applied on sub-regions to create a total 3D shape for whole face image. Then, 2D face image is added to the corresponding 3D shape to construct 3D face image. Finally by rotating the 3D face image, virtual samples with different views are generated. Experimental results on ORL dataset using nearest neighbor as classifier reveal an improvement about 5% in recognition rate for one sample per person by enlarging training set using generated virtual samples. Compared with other related works, the proposed method has the following advantages: 1) only one single frontal face is required for face recognition and the outputs are virtual images with variant views for each individual 2) need only 3 key points of face (eyes and nose) 3) 3D shape estimation for generating virtual samples is fully automatic and faster than other 3D reconstruction approaches 4) it is fully mathematical with no training phase and the estimated 3D model is unique for each individual.
This document summarizes a research paper that proposes a new face recognition method capable of recognizing faces with expressions, glasses, and/or rotation. The method uses variance estimation of the red, green, and blue color components to compare extracted faces to those in a database. It also uses Euclidean distance to compare extracted facial features (eyes, nose, mouth) to those in the database. The method is divided into three steps: 1) variance estimation of color components, 2) facial feature extraction based on feature locations, and 3) identifying similar faces by scanning the database. Experimental results showed the method achieved good accuracy, speed, and used simple computations for face recognition.
This document discusses face recognition using the PCA algorithm. It begins with an introduction to face recognition and its challenges. It then provides background on face recognition techniques, including PCA. The document outlines an improved PCA (IPCA) algorithm that aims to address issues like orientation and lighting variations. It presents results of the IPCA algorithm on two test cases, showing it can accurately recognize faces even at 90 degree orientations. The document discusses advantages of face recognition but also limitations like sensitivity to expressions, lighting and angle. It raises privacy concerns about widespread use of facial recognition technology.
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...AM Publications
This document discusses facial expression recognition using local binary patterns and support vector machines. It begins by introducing facial expression recognition and its importance. It then describes preprocessing face images, detecting faces, extracting features using local binary patterns, and classifying expressions with support vector machines. Specifically, it details extracting LBP histograms from local regions of faces, concatenating them into a feature vector, and using an SVM for multi-class classification of expressions like happy, sad, angry, etc. Overall, the document provides an overview of the key steps involved in an automatic facial expression recognition system using LBP features and SVM classification.
Facial Expression Recognition Using Local Binary Pattern and Support Vector M...AM Publications
Facial expression analysis is a remarkable and demanding problem, and impacts significant applications in various fields like human-computer interaction and data-driven animation. Developing an efficient facial representation from the original face images is a crucial step for achieving facial expression recognition. Facial representation based on statistical local features, Local Binary Patterns (LBP) is practically assessed. Several machine learning techniques were thoroughly observed on various databases. LBP features- which are effectual and competent for facial expression recognition are generally used by researchers Cohn Kanade is the database for present work and the programming language used is MATLAB. Firstly, face area is divided in small regions, by which histograms, Local Binary Patterns (LBP) are extracted and then concatenated into single feature vector. This feature vector outlines a well-organized representation of face and is helpful in determining the resemblance among images.
This document provides a literature review of face recognition techniques using face alignment and PCA. It discusses how face alignment techniques like Active Appearance Models (AAM) and Active Shape Models (ASM) are used to accurately align faces, which is important for face recognition. PCA is also discussed as a commonly used feature extraction and dimensionality reduction technique for face recognition. The document surveys recent research on face recognition using AAM for tasks like minimizing error between input and model images, modeling a wide range of facial appearances, and exploiting temporal correlations across image frames. It also discusses improvements to AAM modeling and fitting robustness.
Facial expression identification by using features of salient facial landmarkseSAT Journals
Abstract
Facial expression recognition/identification (FER) systems plays vital role in the field of biometrics. Localizing the facial components accurately is a challenging task in image analysis and computer vision. Accurate detection of face and facial components gives effective performance with classification of expressions. This paper proposes feature based facial recognition system using JAFFE and CK databases. 18 facial landmarks were located using Haar cascade classifier. The distances between 12 points were extracted as features. These features were classified using SVM and K-NN classifier and comparison based on accuracy and execution time is done. The proposed algorithm gives better performance.
Facial expression identification by using features of salient facial landmarkseSAT Journals
Abstract
Facial expression recognition/identification (FER) systems plays vital role in the field of biometrics. Localizing the facial components accurately is a challenging task in image analysis and computer vision. Accurate detection of face and facial components gives effective performance with classification of expressions. This paper proposes feature based facial recognition system using JAFFE and CK databases. 18 facial landmarks were located using Haar cascade classifier. The distances between 12 points were extracted as features. These features were classified using SVM and K-NN classifier and comparison based on accuracy and execution time is done. The proposed algorithm gives better performance.
Similar to Research and Development of DSP-Based Face Recognition System for Robotic Rehabilitation Nursing Beds (20)
Build the Next Generation of Apps with the Einstein 1 Platform.
Rejoignez Philippe Ozil pour une session de workshops qui vous guidera à travers les détails de la plateforme Einstein 1, l'importance des données pour la création d'applications d'intelligence artificielle et les différents outils et technologies que Salesforce propose pour vous apporter tous les bénéfices de l'IA.
Tools & Techniques for Commissioning and Maintaining PV Systems W-Animations ...Transcat
Join us for this solutions-based webinar on the tools and techniques for commissioning and maintaining PV Systems. In this session, we'll review the process of building and maintaining a solar array, starting with installation and commissioning, then reviewing operations and maintenance of the system. This course will review insulation resistance testing, I-V curve testing, earth-bond continuity, ground resistance testing, performance tests, visual inspections, ground and arc fault testing procedures, and power quality analysis.
Fluke Solar Application Specialist Will White is presenting on this engaging topic:
Will has worked in the renewable energy industry since 2005, first as an installer for a small east coast solar integrator before adding sales, design, and project management to his skillset. In 2022, Will joined Fluke as a solar application specialist, where he supports their renewable energy testing equipment like IV-curve tracers, electrical meters, and thermal imaging cameras. Experienced in wind power, solar thermal, energy storage, and all scales of PV, Will has primarily focused on residential and small commercial systems. He is passionate about implementing high-quality, code-compliant installation techniques.
Levelised Cost of Hydrogen (LCOH) Calculator ManualMassimo Talia
The aim of this manual is to explain the
methodology behind the Levelized Cost of
Hydrogen (LCOH) calculator. Moreover, this
manual also demonstrates how the calculator
can be used for estimating the expenses associated with hydrogen production in Europe
using low-temperature electrolysis considering different sources of electricity
Open Channel Flow: fluid flow with a free surfaceIndrajeet sahu
Open Channel Flow: This topic focuses on fluid flow with a free surface, such as in rivers, canals, and drainage ditches. Key concepts include the classification of flow types (steady vs. unsteady, uniform vs. non-uniform), hydraulic radius, flow resistance, Manning's equation, critical flow conditions, and energy and momentum principles. It also covers flow measurement techniques, gradually varied flow analysis, and the design of open channels. Understanding these principles is vital for effective water resource management and engineering applications.
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Determination of Equivalent Circuit parameters and performance characteristic...pvpriya2
Includes the testing of induction motor to draw the circle diagram of induction motor with step wise procedure and calculation for the same. Also explains the working and application of Induction generator
Research and Development of DSP-Based Face Recognition System for Robotic Rehabilitation Nursing Beds
1. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
DOI:10.5121/ijcses.2016.7204 35
RESEARCH AND DEVELOPMENT OF DSP-BASED
FACE RECOGNITION SYSTEM FOR ROBOTIC
REHABILITATION NURSING BEDS
Ming XING and Wushan CHENG
College of Mechanical Engineering, Shanghai University of Engineering Science, Shanghai
201620, China
ABSTRACT
This article describes the development of DSP as the core of the face recognition system, on the basis of
understanding the background, significance and current research situation at home and abroad of face
recognition issue, having a in-depth study to face detection, Image preprocessing, feature extraction face
facial structure, facial expression feature extraction, classification and other issues during face recognition
and have achieved research and development of DSP-based face recognition system for robotic
rehabilitation nursing beds. The system uses a fixed-point DSP TMS320DM642 as a central processing
unit, with a strong processing performance, high flexibility and programmability.
KEYWORDS
DSP; face detection; face recognition; facial expression recognition.
1. INTRODUCTION
The current situation of aging population more serious, the proportion of incapacitating and half
disabling elderly people increased the utilization rate of the robot rehabilitation nursing bed in the
home and medical institutions have also increased significantly. In addition, the good and bad
quality of care industry personnel, the vocational skills and responsibility nursing staff vary a lot,
how to implement real-time monitoring of the patient's condition, avoiding unforeseen
circumstances have become an important issue faced by families and caregivers. If it can add face
recognition system in rehabilitation nursing robots bed, not only can provide the patient's real-
time situation for the family or caregiver, norm professional ethics of care workers, to avoid
abusing the elderly and other serious incidents occurred, but also to improve the productivity of
medical institutions’ health care workers (Implement the centralized management and distributed
control of multiple wards and multiple beds) . Health care workers can monitor patients directly
through the network in the computer terminals, health care workers immediately take appropriate
medical measures after detecting an abnormal condition, , especially has an extremely important
role for the care of critically ill patients . Additionally, it can provide remote medical care and
reduce the costs of health care(Wherever important physiological information of the patient can
be delivered to a remote medical center or home care expert through wireless communication in
real time, accurate and fast and achieve automatic monitoring ).
2. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
36
Face Recognition, especially the computer technology of using analysis and comparison feature
information of facial visual to identification.
Face recognition uses images or video streams containing human faces collected by a camera or
camera , and automatically detecting and tracking human faces in the image, and then a series of
related technology for the detected human face , often called the Face Recognition , Facial
Recognition[1].
Face recognition based on the geometric characteristics is the oldest and popular recognition. The
method is mainly using geometrical features of the facial, first positioning major organs of face
images, such as the eyes, eyebrows, nose, mouth, face contour and chin, then select a set of
features that can be characterized by the distance, the angle, the shape of the region and so on,
then use the distance, ratio and other parameters as the identification of the characteristic
information to deal with the face recognition. Face recognition system in rehabilitation nursing
robot bed, efficiency and accuracy is the performance index that must be considered
simultaneously. Based on this, a method of face recognition based on local matching is proposed.
This method is based on the use of Haar classifier to realize the automatic detection of human
face in dynamic video frames, extracting the Hu moments feature of facial features, using Hu
moments feature collection to achieve the automatic recognition of human face and achieve real-
time tracking [2].
2. THE RESEARCH OF FACE RECOGNITION SYSTEM
Face recognition system in Rehabilitation Nursing Robot bed is composed of face detection, face
recognition, and face tracking, facial expression recognition. Face recognition system flow chart
is shown in Figure 1.The specific process of face recognition system as follows: After the camera
is powered on, automatically reset to the preset position, and then began to cruise along the fixed
route, to get a picture of a video from the surveillance video each 1s.To obtain the image of
human face detection and location, to detect the face is to enter the face recognition process, or to
continue to get the image. After the face is detected, the face image is pre processed, and the
sample quality is improved without losing the main information of the sample. Then, the pre
processed face images are segmented to segment the target area. Secondly, feature extraction is
carried out on the separated target area. The extracted features are matched with the features of
the human face image template database, and output the recognition results. When the user is
identified as the database has been stored, the camera to stop cruising and start the face tracking.
Then start to get a frame of video images every 2S from the surveillance video, recognition of
facial expressions. The feature extraction of facial expression image , and to match with the
features of facial expression template database .The obtained expression results were combined
with the user's vital sign parameters, compared with the data in DSP rules to determine the
physiological needs of users, and drive the implementation of the corresponding operation
machine. When an expression lasts for four seconds or more, it is judged to be a valid expression.
3. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
37
Figure 1 flow chart of face recognition system
1.1 Face Detection
Face detection uses face detection method of Haar classifier in the rehabilitation nursing bed
robot.Compared with other face detection methods, Haar classifier is more effective for face
detection in complex background, in the case of the same recognition rate of real-time better, is
the most practical one of the most practical face detection method [3].As the base of face
recognition, the accuracy of face detection plays an important role in face recognition. For the
face detection in the rehabilitation nursing robot bed, the Haar classifier which trained by
Adaboost is used to detect the human face in the dynamic video frame ,to determine whether the
video contains the face object, and finally give the information of location and size[4]. The
specific detection process is shown in Figure 2(Figure 2 (b) in the red box marked for the human
face of detection and localization.
(a) a frame image in dynamic video (b) face detection results
4. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
38
(c) face images
Figure 2 process and results of face detection
1.2 Face Recognition
The face recognition in the rehabilitation nursing robot bed is composed of three parts, which are
image pre-processing, image segmentation and feature extraction. The image pre-processing is
conducted before the training and test in the use of the sample, the sample image acquisition to
the pre-treatment, improving the sample quality. Bilateral filtering can remove acnode noise and
keep image edge features, doesn't make the image produce significant fuzzy, is suitable for the
treatment of facial images, so we have bilateral filtering on human faces of background
segmentation. Image segmentation is to the human face image after median filtering, use Otsu
threshold method, image binarization, respectively in the face image extracted the eyebrows, eyes
and mouth regions of facial features [5]. Otsu method can save the image information features for
subsequent feature extraction. Feature extraction is in face image segmentation in the eyebrows,
eyes, mouth region, extract the feature points on the contour of the region. The feature points
meet the requirements that make maximum use the minimum feature points to characterize the
shape information of the region contour[6].Using 8 feature points on both sides of the eyebrows
contours shape representation of the eyebrows. Through these 16 points can distinguish different
contours of the eyebrows. Because movement of the eye , right and left eyes of each with 5
points, 10 points to express the main shape of eyes[7].The left corner and left the corners of the
mouth are the benchmark points of using face reference coordinate system when the feature
representation. This paper selects the following characteristics: as shown in Figure 3, the eyebrow
has selected 8 feature points, the eye has selected 5 feature points and the mouth has selected 12
feature points, a total of 38 selected feature points to represent the face.
Figure 3 Schematic diagram of the main facial feature points
5. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
To determine the profile information of the corresponding characteristic parameters by
the feature points on the contour and face recognition in the standard library and complete face
recognition finally.
1.3 Face Tracking
Face tracking is the direction of movement of camera can automatically follow the face to move.
After recognizing the corresponding user, judging whether the human face area is in the center of
the image. The blue area is shown in the center area of the image.
of the image (Figure 4.1), the calculation of relative distance between th
center region, regional approaches are used to automatically move the camera to make the final
face in the image center area (Figure 4.2)[8].
Figure 4.1 in the face outside the center of the image
Fig. 4.2 results of region
1.4 Facial Expression Recognition
Facial expression recognition is based on face recognition, calculating the offset of the
characteristic value of the facial features in various facial expressions with respect to the standard
face database. The storage standard face database is coordinates of the geometric features of the
eyes, eyebrows and lips in no case of facial expression. Using the calculated facial features offset
and real time four vital sign parameters (blood pressure, pulse, body tem
the former order of the rule base of the expert system is stored in the rule base. According to the
medical staff on experience diagnosis of the disabled semi and disabled patients and field
debugging experience, establishing the
real-time measurement characteristic parameters of facial expression and vital signs parameters,
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
To determine the profile information of the corresponding characteristic parameters by
the feature points on the contour and face recognition in the standard library and complete face
Face tracking is the direction of movement of camera can automatically follow the face to move.
the corresponding user, judging whether the human face area is in the center of
The blue area is shown in the center area of the image. If the face is outside the center
calculation of relative distance between the current position and the
regional approaches are used to automatically move the camera to make the final
face in the image center area (Figure 4.2)[8].
Figure 4.1 in the face outside the center of the image
Fig. 4.2 results of region approximation
Facial Expression Recognition
Facial expression recognition is based on face recognition, calculating the offset of the
characteristic value of the facial features in various facial expressions with respect to the standard
he storage standard face database is coordinates of the geometric features of the
eyes, eyebrows and lips in no case of facial expression. Using the calculated facial features offset
and real time four vital sign parameters (blood pressure, pulse, body temperature, respiration) as
the former order of the rule base of the expert system is stored in the rule base. According to the
medical staff on experience diagnosis of the disabled semi and disabled patients and field
debugging experience, establishing the corresponding reasoning mechanism. According to the
time measurement characteristic parameters of facial expression and vital signs parameters,
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
39
To determine the profile information of the corresponding characteristic parameters by matching
the feature points on the contour and face recognition in the standard library and complete face
Face tracking is the direction of movement of camera can automatically follow the face to move.
the corresponding user, judging whether the human face area is in the center of
If the face is outside the center
e current position and the
regional approaches are used to automatically move the camera to make the final
Facial expression recognition is based on face recognition, calculating the offset of the
characteristic value of the facial features in various facial expressions with respect to the standard
he storage standard face database is coordinates of the geometric features of the
eyes, eyebrows and lips in no case of facial expression. Using the calculated facial features offset
perature, respiration) as
the former order of the rule base of the expert system is stored in the rule base. According to the
medical staff on experience diagnosis of the disabled semi and disabled patients and field
corresponding reasoning mechanism. According to the
time measurement characteristic parameters of facial expression and vital signs parameters,
6. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
40
reasoning and deduction based on facial expression recognition expert system knowledge
database, get the judgment and decision, output patient's facial expression results, to control the
lower machine driver, to meet the physiological needs of patients( Figure 5).
Figure 5 flow chart of expert system for facial expression recognition
Facial expression recognition is based on the face recognition, when the extraction of different
expressions, offset of shape, size, position information of eyebrows, eyes and lips of facial
features relative to standard expression (Figure 6).In the image below, the expression of surprise
or anxiety compared to the normal state, changes in the external contour of eyes, eyebrows and
lips are shapes and relative displacement. Through the camera to get the image and directly
transfer to the DSP processing. The result of the treatment is matched with the expression in the
standard database, and then combined with vital signs parameters to judge the physiological
needs of patients and execute the corresponding operation.
Figure 6 the relative changes of facial features in different expressions
7. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
41
2. EXPERIMENTAL RESULTS AND ANALYSIS
2.1 Experimental Materials and Equipment
The face recognition system in the rehabilitation nursing robot bed adopts the independent
development infrared network camera to monitor the patient's patients in real-time. Image
processing uses fixed point DSP TMS320DM642.The experimental system is configured as: Intel
(R) Core (TM) CPU I3, RAM 2.00GB computer, c++ Visual 6 software environment.
2.2 Experimental Results and Analysis
The 10 face recognition of each of the 10 test subjects were made by using the self-developed
infrared network camera. There are 9 times failure,2 times of which is caused by the face
detection error. The specific identification results are shown in Table 2(The recognition time is
the required time that a complete face detection and recognition process to complete).
Table 1 results of face recognition
Total
number of
recognition
Recognition
error times
accuracy
rate/%
Recognition
time/s
100 9 91% 4.3
From table 1,the local matching face recognition method based on Hu moments can effectively
recognize the human face in dynamic video frames, it has a high practical value.
3. CONCLUSIONS
Rehabilitation nursing robot bed adds intelligent system, especially the face recognition system
can effectively solve the nursing problem which the aging of the population bring about. A face
recognition system based on DSP is proposed in this paper. The system makes full use of the
characteristics ability of the geometric features of facial features, based on the realization of
automatic detection of human face in dynamic video frames using Haar classifier. The face image
captured use Hu moments feature collection for automatic recognition and real-time tracking. The
whole process is carried out in DSP, and the upper computer is not required.DSP gets the image
through the serial port from the camera, recognition of expression is in DSP. The identification
results combine with the vital signs parameters which vital signs measuring instrument
transmitted. Both of them determine the physiological needs of patients. The result of the
judgment is directly transmitted to the ARM control board through the serial port, which drives
the slave computer to execute the corresponding operation. The method combines the expression
recognition result, the vital sign parameter and the control system of the rehabilitation nursing
robot bed. It improves further the intelligence and practicality of the rehabilitation nursing robot
bed.
ACKNOWLEDGEMENTS
This work is supported by the Shanghai Science and Technology Committee.
8. International Journal of Computer Science & Engineering Survey (IJCSES) Vol.7, No.2, April 2016
42
REFERENCES
[1] Yang G, Huang T S. Human face detection in complex background. Pattern Recognition[J], 1994,
27(1):53-63.
[2] Yuille A, Hallinan P and Cohen D. Feature extraction from faces using deformable templates.
International Journal of Computer Vision, 1992, 8(2): 99-111.
[3] Jolliffe I T. Principal Component Analysis. Springer0Verlag, New York, 1986.
[4] Lin SH, Kung SY, Lin L J. Face recognition/detection by probabilistic decision-based neural network.
IEEE Transactions on Neural networks, 1997, 8(1): 114-132.
[5] Agarwal M, Agrawal H, Jain N, et al. Face recognition using principle component analysis,
eigenfaceand neural network[C]. Signal Acquisition and Processing, 2010. ICSAP'IO. International
Conferenceon. IEEE, 2010:310-314.
[6] Yu Y, Li Z M. Improvement of Feature-based Face Recognition Algorithm by Elastic Graph
Matching[J]. Computer Engineering, 2011, 5: 075.
[7] Yang J, Zhang D, Frangi A F, et al. Two-dimensional PCA: a new approach to appearance-based face
representation and recognition [J]. Pattern Analysis and Machine Intelligence. IEEE Transactions
on,2004, 26(1):131-137.
[8] Wong Y R. Scene Matching with Invariant Moments [J]. Computer Graphics and Image Processing,
1978, 8(1): 16-24.
AUTHOR
Ming XING was born in 1990, and now the Shanghai University of Engineering Science
postgraduate. His present research interest is image analysis and processing.