Robust Face Recognition Using Artificial Neural Network
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 4
Abstract
Face recognition is done naturally by humans. However, developing a computer algorithm to do the same thing is difficult. Assume for the moment we start with images, and we want to distinguish between images of different people. One class of methods presupposes the existence of certain features in the image, i.e. eyes, nose, mouth, hair, and an algorithm is devised to find and characterize these features. FACE recognition is an important research problem spanning numerous fields and disciplines. This because face recognition, in additional to having numerous practical applications such as bankcard identification, access control, Mug shots searching, security monitoring, and surveillance system, is a fundamental human behavior that is essential for effective communications and interactions among people.
Authors and Affiliations
Priyanka Patidar , Sameeksha Barve
Review Report on Semantic web service composition using Petri nets
Petri nets are graphical and mathematical modelling tool helpful for representation of semantic web service composition. Semantic web service composition explained by OWL-S language. OWL-S language supports control const...
AUTOMATIC DETECTION AND PREVENTION OF VIRUS IN MOBILE ENVIRONMENT
Mobile phone becomes an essential device for everyone due to the need and drastic growth of technology. Mobile phones have truly transformed the mode of communications. It becomes the basic requirement of life. It is ver...
Privacy preservation for Neural Network Training
Data mining enables us to extract interesting patterns from huge volumes of data. This can be a security/privacy issue, if we make sensitive information available to unintended users as a result of mining. Preserving the...
An Implementation of Load Balancing Policy for Virtual Machines Associated With a Data Center
The main aspect of any cloud application is to provide simultaneous access to number of users by reducing the cost of maintenance. This is mainly achieved by the process of implementing virtualization effectively. Virtua...
Deblocking Filtering Method Based on Separate Modes
The compression of digital images has received wide attention of researchers since it reduces the memory, bandwidth and transmission requirements. One of the major drawbacks of the block-based DCT compression methods is...