Techniques for Face Detection & Recognition Systema Comprehensive Review
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 5
Abstract
Face detection and Facial recognition technology has emerged as a striking solution to address many contemporary prerequisites for identification and the verification of identity prerogatives. It brings together the potential of supplementary biometric systems, which attempt to link identity to individually distinctive features of the body, and the more acquainted functionality of visual surveillance systems. In current decades face recognition has experienced significant consideration from both research communities and the marketplace, conversely still remained very electrifying in real applications. The assignment of face detection and recognition has been dynamically researched in current eternities. This paper offers a conversant evaluation of foremost human face recognition research. We first present a summary of face detection, face recognition and its solicitations. Then, a literature review of the predominantly used face recognition techniques is accessible. Clarification and restrictions of the performance of these face recognition algorithms are specified. Here we present a vital assessment of the current researches concomitant with the face recognition process. In this paper, we present a broad range review of major researches on face recognition process based on various circumstances. In addition, we present a summarizing description of Face detection and recognition process and development along with the techniques connected with the various influences that affects the face recognition process.
Authors and Affiliations
Vandana S. Bhat
A Survey Report on Distributed System Using Load Balancing Approach
Abstract:A number of load balancing algorithm were developed in order to improve the execution of a distributed application in any kind of distributed architecture. Load balancing involves assigning tasks to each process...
Study of Java Access Control Mechanism
a class as "a collection of data and methods." One of the important object-oriented techniques is hiding the data within the class and making it available only through the methods. This technique is known as &nbs...
Bank Locker Securty System Using Iot
Personal Security is one of the main concern when it comes to office, personal workplace in home,banketc.Soto over come this problem, this project suggest the use of Internet of Things(IoT) to provide secure access only...
TPDS: A Heuristic Approach for Traffic Pattern Discovery System in Mobile Ad-hoc Network
Abstract : There is absence of centralized coordination among nodes in Mobile Ad-hoc Network (MANET). This makes MANET vulnerable to attacks especially passive attacks. Security is one of the major concerns inmilitary ap...
Cloud Computing Networks with Poisson Arrival Process-Dynamic Resource Allocation
Abstract: In this article we considered a cloud computing network model which acts as a tool for dynamic resource allocation problem in cloud computing. Every successful servicing of cloud paradigm need an optima...