Face Detection & Recognition using Tensor Flow: A Review
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2018, Vol 18, Issue 0
Abstract
Face recognition has become a popular topic of research recently due to increases in demand for security as well as the rapid development of mobile devices. There are many applications which face recognition can be applied to such as access control, identity verification, security systems, surveillance systems, and social media networks. Access control includes offices, computers, phones, ATMs, etc. Most of these forms currently do not use face recognition as the standard form of granting entry, but with advancing technologies in computers along with more refined algorithms, facial recognition is gaining some traction in replacing passwords and fingerprint scanners. Ever since the events of 9/11 there has been a more concerned emphasis on developing security systems to ensure the safety of innocent citizens. Namely in places such as airports and border crossings where identification verification is necessary, face recognition systems potentially have the ability to mitigate the risk and ultimately prevent future attacks from occurring. As for surveillance systems, the same point can be made if there are criminals on the loose. Surveillance cameras with face recognition abilities can aide in efforts of finding these individuals. Alternatively, these same surveillance systems can also help identify the whereabouts of missing persons, although this is dependent on robust facial recognition algorithms as well as a fully developed database of faces. And lastly, facial recognition has surfaced in social media applications on platforms such as Facebook which suggest users to tag friends who have been identified in pictures. It is clear that there are many applications the uses for facial recognition systems. In general, the steps to achieve this are the following: face detection, feature extraction, and lastly training a model.
Authors and Affiliations
Ishaan Chawla
Developing a Genetic Fuzzy System Model for Cost-Benefit Analysis.
Cost benefit analysis is a systematic approach for calculation and analyzing the cost of a project. Soft computing approaches are also applicable to deal with cost benefit analysis. In this paper Mamdani fuzzy system has...
Improved Adaptive Huffman Compression Algorithm
In information age, sending the data from one end to another endneed lot of space as well as time. Data compression is atechnique to compress the information source (e.g. a data file, aspeech signal, an image, or a video...
On the Performance of PF, MLWDF and EXP/PF algorithms in LTE
This paper explores the performance of three packet scheduling algorithms, namely, Proportional Fair (PF) algorithm, Exponential/Proportional Fair (EXP/PF) algorithm and Maximum Largest Weighted Delay First (MLWDF), from...
Role of Taxation in Formulation of Fiscal Plan (Case study of Pakistan)
Research on the role of taxation in formulation of fiscal plan was started from the idea of data collection from the ministry of finance government of Pakistan for the purpose of checking the inter correlation and degree...
Development and Simulation of Next Generation SDH Network Management System
In present scenario Network Management System of Next Generation SDH is not performing Offline reporting, offline analysis of alarms, offline performance management and Configurations of network like real time. Any offli...