Real Time Embedded Face Recognition using ARM7
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 5
Abstract
Face recognition is a widely used biological recognition technology. In comparison with other identification methods, this type of recognition has direct, friendly and convenient features. The embedded face recognition system is based on LPC ARM 2148 development board, using Windows operating system, detecting face by using HAAR feature, and then recognizing face by using LBP features. Matlab is used as a front end process and keil code runs at back end in ARM 7 Processor.
Authors and Affiliations
B. koteswar rao, P. Rama Krishna, MA. Wajeed
Effective Integration of Voltage Source Converters (VSCs) in weak grids
A New control topology is presented in this paper to have an effective integration of voltage source converters (VSCs) in weak grids. Even though the controller emulates the dynamic performance of synchronous machine...
Enhanced Representation Of Data Flow Anomaly Detection For Teaching Evaluation
In this paper we propose three letter sequence of action for dataflow anomaly detection and representing data flow model for each data object. When we represent the CFG for data object, it is not giving the informatio...
Implementation Of Fast rate Power Allocation Utilizing Duality gap in OFDM Systems
In this letter, we propose a power allocation strategy for orthogonal frequency division multiplexing (OFDM) systems. To achieve the maximum capacity, the proposed power allocation strategy iteratively tunes the amoun...
Implementation and Analysis of Image Contrast Enhancement using Gaussian Mixture Model
In this paper, we propose a new global contrast enhancement algorithm using the histogram color and depth images. On the basis of the histogram-modification framework, the color and depth image histograms are first p...
A Framework for Refusal DDOS Attack Location Procuring Into Account Multivariate Relationship Assessment
This paper discussed the consequences of MCA on the Distributed DoS discovery and recommends an illustration, a covariance examination model for recognizing SYN flooding assaults. The impersonation final results demo...