Face Recognition System Based on Kernel Discriminant Analysis, K-Nearest Neighbor and Support Vector Machine
Journal Title: International Journal of Research and Engineering - Year 2018, Vol 5, Issue 3
Abstract
Although many methods have been implemented in the past, face recognition is still an active field of research especially after the current increased interest in security. In this paper, a face recognition system using Kernel Discriminant Analysis (KDA) and Support Vector Machine (SVM) with K-nearest neighbor (KNN) methods is presented. The kernel discriminates analysis is applied for extracting features from input images. Furthermore, SVM and KNN are employed to classify the face image based on the extracted features. This procedure is applied on each of Yale and ORL databases to evaluate the performance of the suggested system. The experimental results show that the system has a high recognition rate with accuracy up to 95.25% on the Yale database and 96% on the ORL, which are considered very good results comparing with other reported face recognition systems.
Authors and Affiliations
Mustafa Zuhaer Nayef Al-Dabagh, Mustafa H. Mohammed Alhabib, Firas H. AL-Mukhtar
CPU cooling using PWM interfaced peltier unit
With the increase in the processing power of the computer, there is an increase in operating temperature. Even though newer processors have the ability to handle high temperatures up to 80 or 100 degree C, CPU intensive...
A Comparative Study of Vector Control and Model Predictive Control Technique for Grid Connected Battery System
Advancements made to battery energy storage technologies have led to increasing integration of battery systems with the grid. This paper presents a comparative study of the well-established vector control technique and t...
LABEL BASED PICTURE FINDING
Sites like the facebook which shares the media socially allows the site clients to focus on the pictures which utilizes the marks with the expectation of complimentary which essentially advisers for develop a framework t...
A Survey on Confidential Cloud Data under Secure Key Exposure
Latest records display a effective attacker which breaks facts confidentiality with the resource of obtaining cryptographic keys, by using the usage of way of coercion or backdoors in cryptographic software program. As s...
Growth Inhibition of Various Pathogenic Microorganisms Using Effective Microorganisms (EM)
In recent years, researchers focus on treatment of wastewater using low-cost treatment processes. Several studies showed that using effective microorganisms (EM) is a promising technology in the treatment of wastewater....