Analysis of Face Recognition Methods
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2021, Vol 9, Issue 6
Abstract
Face recognition has emerged as a promising field in computer-based applications in recent years, owing to the wide range of applications that it has found in a variety of fields. Due to the obvious wide variety of variances across people's faces, face recognition utilizing database photos, actual data, record images, and sensor photographs is a tough task. Image segmentation, cognition, and data analysis, to mention a few areas of research, all have ties to facial identification. The development of new techniques associated with face authentication technologies is an ongoing process that contributes to the development of more long-lasting face recognition algorithms. Many facial recognition techniques are often divided into two categories: feature-based approaches and holistic methods. At the present, there is a relatively small number of research that have been conducted that have linked both of these techniques. Face recognition algorithms have been developed in large numbers over the course of the past few decades. The purpose of this article is to provide a systematic evaluation of a wide variety of facial recognition methods that are currently on the market. This includes neural networks, fuzzy-based methodologies, and the eigenvalues approach, among other things.
Authors and Affiliations
Dr. Anubhav Soni, Mr. Pooran Singh
A Review of Data Mining Techniques and Its Applications
Knowledge Discovery in Databases (KDD) is another name for data mining. It's also known as the process of extracting interpretable, intriguing and valuable statistics from unstructured data. There are a variety of resour...
Secure Cloud Storage Privacy-Preserving In Public Auditing
Cloud computing is a technology that is both efficient and cost-effective, thanks to its low maintenance requirements. This paper implemented a approach is used to share group resources across cloud users. Regrettably, a...
Analysis of Customer Behavior in Online Retail Marketplace Using Hadoop
To provide a modernized technology foundation for transforming the retail experience, retail CIOs and IT leaders need to support the "seven Cs" of customer interaction: connected, continuous, convenient, contiguous, cons...
Animal and Human Chronobiology Study: Ethical Considerations, Guidelines, and Methods
The bulk of Chronobiology International research articles describe results from studies on laboratory animals and humans. The editors and readers of the journal expect writers to have made significant contributions to bi...
Detecting and Preventing ARP Spoofing Attacks Using Real-Time Data Analysis and Machine Learning
ARP spoofing attacks contain certain risks in networks as they seem to intercept traffic and can lead the leakage of intellectual information. This research paper focuses on enhancing the method through which five algori...