Face Recognition using Principle Component Analysis for Biometric Security System
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 9
Abstract
Face recognition is an application area where computer vision research is utilized in both military and commercial products. It is a process of identifying or verifying a person from an image and comparing the selected features from the image with a given database. This paper provides a critical survey of researches on image-based face recognition. The principle Component Analysis (PCA) technique of face recognition are comprehensively reviewed and discussed. Their strategies , advantages / disadvantages and performances are elaborated.
Authors and Affiliations
Raman Kumar#1, Satnam Singh
Implementation and Bit Error Rate analysis of BPSK Modulation and Demodulation Technique using MATLAB
This paper presents the theoretical background of digital modulation and evaluate the performance of BPSK system with respect to Bit error Rate and finally implement Binary Phase shift Keying modulation technique i...
Real Time Object Visual Inspection Based On Template Matching Using FPGA
In similarity measure, normalized cross-correlation has found application in broad range of in image processing. This work proposes a novel technique aimed at improving the performance of exhaustive template m...
Optimization of Geometry of Microfabricated Piezoelectric Actuator
This paper focuses on optimization of the geometry of piezoelectric actuator for maximization of output for applications such as micro-pump. The device structure consists of a piezoelectric disk/plate which is glue...
Cup Segmentation by Gradient Method for the Assessment of Glaucoma from Retinal Image
Automatic analysis of retinal images is emerging as an important tool for early detection of eye diseases. Glaucoma is one of the main causes of blindness in recent times. Deformation of Optic Disk (OD) and the C...
Controlling various network based ADoS Attacks in cloud computing environment: By Using Port Hopping Technique
Cloud computing security is sub-domain of computer security, network security, and information security. It refers to a broad set of security policies, technologies, and flow controls deployed to protect data, appl...