COMPARATIVE STUDY OF THE METHODS USING HAAR-LIKE FEATURES
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 2015, Vol 4, Issue 4
Abstract
Object detection is a topic which takes a great extent in the field of computer vision. Is the first step in many visual processing systems like face recognition, encoding recognition and lip reading. The detection of an object passes through three stages: The first is the extraction of information that characterize the object, the second is the processing of this information and the last step is to construct the final detector. We will focus on the first stage. Various approaches have been utilized such as Haar-Like features, color information, texture, edge orientation, etc. While numerous methods have been proposed to extract information using Haar-like feature, we are unaware of any surveys on this particular topic. For this reason this paper present a comparative study of different research on HaarLike features.
Authors and Affiliations
Mohamed OUALLA, Dr. Abdelalim SADIQ, Dr. Samir MBARKI
A REVIEW OF TECHNIQUES OF LANDSLIDE SUSCEPTIBILITY MAPPING USING GIS
Landslides are a big problem in the hilly areas. If the slopes along the roads are failed then these can create the jamming of traffic and also sometimes results in the fatal accidents. In the residential areas th...
Performance Comparison of Wavelet Packet Modulation and OFDM over Mobile Communication Channel
ficient solution for mobile communication. Wavelet Packet based Multi-Carrier Modulation (WPMCM) offers an alternative to the well-established OFDM as an efficient multicarrier modulation technique. Wavelet Packet Modu...
Implementation of College Web Portal - An E-Learning System
College web portal is a web based application that enables effective student teacher interaction. It is a user friendly, GUI based application that will help users for storing, retrieving and sharing resources onl...
A Survey on Performance Analysis of AODV and DSR
A Wireless network is a collection of autonomous mobile nodes that communicate with each other over wireless links without any fixed infrastructure. It is a method by which homes, telecommunications networks and...
A REVIEW ON ENCODING AND RECONSTUCTION OF ENCRYPTED IMAGES
This paper gives a scheme of encoding of encrypted greyscale images while transmission of images for security purpose. In the encryption phase, the original pixel values are masked by a modulo-256 addition with pseudora...