slugRobust & Accurate Face Recognition using Histograms
Journal Title: International Journal of Management, IT and Engineering - Year 2012, Vol 2, Issue 4
Abstract
A large number of face recognition algorithms have been developed from decades. Face recognition systems have been grabbing high attention from commercial market point of view as well as pattern recognition field. It also stands high in researchers community. Face recognition have been fast growing, challenging and interesting area in real-time applications. This face recognition system detects the faces in a picture taken by web-cam or a digital camera, and these face images are then checked with training image dataset based on descriptive features. In this paper, we use a histogram approach for human face detection. Since different faces contains different facial features, having the features which are unique. In this paper the vector machine is used for skin detection and face detection.
Authors and Affiliations
Sarbjeet Singh, Meenakshi Sharma and Dr. N. Suresh Rao
Elliptic Curve Cryptography in Sensor Networks with Hidden Generator Point for Speedup Scalar Multiplication
In Network Security, Cryptography mechanism is used to secure communication with the help of various kind of algorithms provides applicability and s u i t a b i l i t y for constraint environment such as mobile sensor...
slugChallenges in Indian Financial Sector to become Economic Super Power in the Coming Decade
Presently India is borrowing heavily from World Bank and ADB for Government Projects. The Private ventures are looking for FDIs but the ceiling is restricted by government policy. Hence a considerable fiscal from GDP i...
slugQuantitative Marketing Research in Product Sales Data Analysis Using Development and Diffusion of the Innovation Concept
Quantitative marketing research is the application of quantitative research techniques to the field of marketing. in the modern marketing viewpoint[16] that marketing is an interactive process in which both the buyer a...
slugAN EFFICIENT ROUTING SCHEME FOR ICMN
In this paper, intermittently connected mobile networks are sparse wireless networks where most of the time there does not exist a complete path from the source to the destination. These networks fall into the general...
M-COMMERCE: SECURITY CHALLENGES ISSUES AND RECOMMENDED SECURE PAYMENT METHOD
As mobile technologies and services are in stable development, many wonder on whether or not mobile payments will be a destroyer function for mobile commerce. To have an improved considerate of the market, presently th...