A Review on Face Recognition and Video Databases
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Abstract: Each And Every Face Databases Have Its Own Limitations And Description To Test The Performance Of Face Recognition Technique. Even Though, Current Machine Recognition Systems Have Approached To Certain Level Of Recognition Rate. Their Success Is Limited By The Conditions Imposed By Many Real Applications And Constraint Imposed On Databases Such As Recognition Of Faces Acquired In An Outdoor Environment With Changes Of Illumination And Or Poses Remains A Largely Unsolved Problem. In View Of These This Paper Discusses Most Of The Video Databases And Face Recognition Methods. The Performance Of The Existing Methods On Video Datasets, NRC-IIT Video Data Set , The Honda/UCSD Video Data Set ,Choke Point And Mcgill Face Dataset Are Studied, Compare Their Performance In Terms Of Recognition Rate And Conclusion Reveals Future Development Of The Work.
Authors and Affiliations
Sandeep Saxena , B Mohd Jabarullah , Dr. Mansaf Alam
Energy Efficient Query Optimization in WSN usingThreeLevel Modelling
Abstract:With advancement in microprocessor technology, wireless sensor networks is playing vital role in different types of applications such as health care monitoring, fire detection etc. In these applications, large a...
Real Time Zetta Bytes -Universal Memory ASIC SOC IP Core Design Implementation using VHDL and Verilog HDL for High Capacity Data Computing Processors like Cloud/Cluster/Super VLIW Parallel Distributing Pipelined Array Computing Processors
Abstract: The main intention is RTL Design Architecture and HDL Design Implementation of Zetta Bytes Memory ASIC SOC IP Core for Advanced Parallel Array Distributed Pipelined Array Computing /Cloud Computing / Super VLIW...
A Study of Geographic Adaptive Fidelity Routing Protocol in Wireless Sensor Network
Abstract: The Energy consumption is a great challenge in the field on Wireless Sensor Network (WSN). It affects the performance of the whole network. There are two basic functions of nodes in the WSN. First is to c...
Internet Worm Classification and Detection using Data MiningTechniques
Abstract: Internet worm means separate malware computer programs that repeated itself and in order to spreadone computer to another computer. Malware includes computer viruses, worms, root kits, key loggers, Trojan...
[u][/u]Design and Implementation of SOA Enhanced Semantic Information Retrieval web service using Domain Ontology, WCF and .NET Technologies for a Distributed Environment
Abstract: Information retrieval services serve a critical role in numerous business knowledge systems. There are different mature IR algorithms that have been implemented and it is by all seems to be a waste of resources...