Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.

Size: px
Start display at page:

Download "Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control."

Transcription

1 Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram, RTM Nagpur University A B S T R A C T Attendance management of students in any institution is a very lengthy process and even time consuming. Furthermore, biometrics attendance system is also available. These methods too are time consuming, since each time students have to form a queue for scanning their thumb impression. In this paper, we have proposed a system which deals in terms of face recognition using real time camera. The work presented in this paper proposes a method to automatically take the attendance of student using face recognition. Continuous observation improves the precision of attendance. The attendance will be recorded by using camera(s), attached in front of the class which is continuously capturing images of the students. It will then compare the faces with the student s database and marks the attendance. The important key of this paper is to design a better student attendance system with ease interface and accurate results. Regarding to the student and lecturer sides, the system is working without any preparation and no extra effort and the most important thing is to increase the quality of our educational system. Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control. I. INTRODUCTION Nowadays, taking attendance in any field is very important task so as to maintained the record of student, employee etc. Traditionally, student attendance is taken manually by using attendance sheet given by faculty member in class which is very time consuming. We observed that the technique used was very time consuming and even many demerits has been observed by us such as wastage of paper, interruption in classroom etc. previously a system has been proposed by continues observation which improves the performance for the estimation of the attendance. Implementation of the system has to be carried out on accordance of some techniques named as face detection and face recognition. The Face detection and face recognition are very advanced in terms of computer authentication technology. The technology of student attendance system is used to support the teacher for checking student attendance in modern way. It is gradually evolving to a universal biometric solution since it requires virtually zero effort from the user end while compared with other biometric options. The system is going to work by some techniques such as the picture is taken by camera then processed towards the detection as the detected face image is obtained face recognition has to be done which is divided into further parts namely face alignment, preprocessing, feature extraction, face matching where the image is converted into gray scale image and the result has to be seen. This has been done by using PCA algorithm. This technique is considered to be one of the most successful for image processing or analysis. Face recognition is a biometric method for identifying any individual by the features of their face. Applications of face detection are widely used in areas such as security systems, criminal identification etc. Using a pre stored database, we can identify one or more identities in the scene. The general block , IJAFRSE All Rights Reserved

2 diagram for face detection system consists of three blocks. The first is the Face Detection, the second is feature extraction, and the third is Face recognition. The general block diagram is as shown in below figure 1. Figure 1. General Block Diagram of Face Recognition The paper is organized in this way: Section I gives the introduction of the paper. Literature survey is given in the section II. The method is explained in this section III. Implementation techniques are explained in section IV. The algorithms used are explained in section V. Concludes the paper. II. LITERATURE REVIEW Here the details about the referred paper, author are given below Identification of human faces [11] Author: A.J. GoldStein, L. D. Harmon, and A.B. Lesk Lesk used 21 different facial marks such as hair color and lip thickness for processing the image recognition. The problem was, it had to be manually compute the measurements and location. Integrated system for monitoring and recognition student during class session Author: Mohammad A. Alia, Abdelfatah Aref Tamimi and Omaima N. A. Al-Allaf In this paper, the proposed attendance system is based on face detection and recognition authentication methods. The system is minimizing the lecturer exhaustion since the lecturer can check their student s attendance by their own systems. The camera changes its direction to monitor the students during the lecture. Classroom Attendance System Using Facial Recognition System [2] Author: Abhishek Jha The PCA algorithm for face detection and PCA and LDA for feature extraction has been used. The whole system is implemented in MATLAB. The main advantage of their system is that, the student can also keep track of their attendance by their own login id. A Biometric Authentication Approach using Face Recognition System [12] Authors: Pallabi Saikia, and Margaret Kathing Here the feature extraction was carried out using PCA algorithm. The eigenface method was implemented for feature extraction and classification , IJAFRSE All Rights Reserved

3 A MatLab based face recognition system using image processing Author: Jawad Nagi, Syed Khaleel Ahmed, Farrukh Nagi They have presented a novel face recognition technique which uses feature from Discrete Cosine Transform (DCT) coefficient along with a SOM based classifier. This makes there system well suited for low cost, real time hardware implementation. Face Recognition Based on Principal Component Analysis [3] Author: Ali Javed The paper was a research work of face recognition system by using PCA which is eigenvector based multivariate analyses. Real Time Face Recognition Using AdaBoost Improved Fast PCA Algorithm [1] Author: K. Susheel Kumar, Shitala Prasad, Vijay Bhaskar Semwal, R C Tripathi. For the detection of face a real time human face AdaBoost and haar cascade has been used and PCA along with LDA algorithm for face recognition which imparts the high accuracy rate. III. PROPOSED SYSTEM In the earlier systems the attendance of the students has been marked for the whole day at once. Thus if a student is present for only a lecture and then left the class, even then he will be marked as present for whole day. We propose a system for automated attendance of the student which will mark the attendance for each lecture in the classroom via face detection and face recognition. We will create the database of face of each of the student of each classroom. A digital camera in the center of front wall on the classroom is placed. The camera will get automatically ON for some time period in the mid the lecture and it captures the image of the student in the classroom. The image with the best localization of faces of student will be considered for further processing. The image is then processed for face detection via Viola and Jones face detection methods. It will detect all the faces present in the image with maximum efficiency. Then the detected face images are been compared with the images of the student in the database for recognition process. The database contains the record of all of the students in each class. If any of the face in the picture taken in the classroom is matched with the image in the database then the student with that face is marked as present in the classroom , IJAFRSE All Rights Reserved

4 Figure 2. Block Diagram of Attendance system using Face Recognition IV. METHODS We have proposed a system in which we will mark the attendance of the student for each lecture. The camera attached in the class room will click the image of the students in the classroom in the mid of each lecture. The clicked image is then processed for face detection. This process separates the facial area from the rest of the image. The facial area of all of the students is extracted then segmentation is done to align the image properly. This process is done to find the best localization and normalization of the image. Then face recognition is done which has following steps- Face alignment, feature extraction, feature matching. If the face image is matched with an image of student in the database, then the student has attended the lecture and is marked as present in the classroom. Figure 3: System Architecture V. IMPLEMENTATION TECHNIQUES Principal Component analysis (PCA) is based on information theory approach. It identifies the subspace of image space spanned by the training face image data and de-correlates the pixel values. As compared to Linear Discriminant Analysis (LDA), PCA algorithm does more of feature classification and LDA does data classification A. Face Detection Face detection is a technology that determines the location and sizes of human faces in an image. It detects faces and ignores anything else, such as building, chairs, and trees. It is a starting point for face recognition. Most of the face detection methods focus on detecting frontal faces. These methods are categorized [6] into four types: Knowledgebase, Feature invariant, Template matching and Appearance- Based. Each method involves color segmentations, pattern matching, statistical analysis and complex transform. Face detection is an important part of face recognition as to implement the automatic face recognition. And therefore we will use the algorithm based on Ada Boost and Haar cascade in which we will detect the face by the face model. Face model contains the shapes and motions of faces. In this technique we found different shapes on face models such as rectangle, triangle, circle, heart, and square. And again if some other techniques are used to implement this the high level of accuracy rate will impart. B. Face Segmentation Segmentation is one of the very first steps in automatic face recognition system. The aim of the segmentation is to make the image more represent able. As the camera will click the picture of the , IJAFRSE All Rights Reserved

5 students in the classroom which will goes through the process for face recognition where we found face image of the whole classroom, thus it will segments face of the each student and preprocess the features of each student and removes the noise from the picture. C. Face Recognition Face Recognition is automatic identification or verification of a person from an image/video. It is one of the most active and widely used techniques because of its reliability, accuracy in the process of recognizing and verifying the person s identity. Problem that may occur with face recognition aredifferent people may look similar, characteristic of the face may change with time. Face can be recognized by two approaches that are based on geometry of face and based on appearance of face. The recognition process is done by comparing the extracted features from the image with the one previously stored in the database. Face recognition can be implemented bay using Principal Component Analysis (PCA), Linear Discriminant Analysis (LDA) and Discrete Cosine Transform (DCT) etc. Figure 4: Block diagram of Face Recognition Face Recognition has been divided in following parts: 1. Preprocessing The detected image is processed for removing the noise and sets the unique intensity of light for the face image. Preprocessing is also known Normalization. The input colored image is converted into gray scale image 2. Face Alignment After face segmentation the normalization and localization has to found out of the face. Alignment has to perform to estimate the outline of the facial components such as nose, eyes, mouth and ears as after detection the position of the face is roughly estimated. Thus after normalization the face image is converted into gray scale image. 3. Feature Extraction After the previous two steps feature extraction has been performed which enhances the various segments of the face namely eyebrows, nose, mouth, ears. Feature extraction includes two algorithms: , IJAFRSE All Rights Reserved

6 Facial component are to be selected with high level of accuracy. Normal center of gravity (NCG) is to be determined. Normal center of gravity is determined of each features of the face denoted by asterisk (*). Figure 5: Determination of NCG VI. ALGORITHMS USED A. Viola and Jones Face Detection For Viola and Michael Jones in their 2003 article titled Robust Real Time Face Detection, proposed the face detection methods. They describe how one can use machine-learning technique to construct sets of meaningful feature that encode image properties and will detect faces. It is quite fast method but optimization can further speed up the detection. Viola and Jones had made three key innovations: the first was the new representation of image call the integral image, for faster feature computation, the second was the use of the AdaBoost (Adaptive Boosting) machine learning algorithm for selecting simple and efficient classifiers and the third and last was a method of combining classifiers into a Cascade that quickly eliminates background regions and focus computational attention on more promising areas of the image. 1. Haar- Like Feature Haar-like features are rectangular digital image that provide a method for encoding the properties of the image in a form that can be computed much more quickly as compared to individual pixels. Simple Haarlike features are composed of two adjacent rectangles, located at any scale and position within an image, and is referred to as 2-rectangle feature. The feature is defined as the difference between the some of image intensities within each rectangle. Viola and Jones also extended this set by defining similar features composed of 3 and 4 rectangles. This types of features are quite course when compared to alternatives such as steerable filters, however, there computational efficiency more than makes for their limitations. 2. Integral Image , IJAFRSE All Rights Reserved

7 Haar-like features can be calculated quickly by using an image representation known as integral image. It is an application of summed area tables. The integral image can be calculated in single pass. Each feature can be calculated in a constant time by using it. 3. Feature Selection Viola and Jones hypothesized and discovered through experimentation that a very small number of feature can be form into effective classifier. For a classifier to be effective the set it is trained on must contain a good range of facial variation. No single feature can be used as an effective classification function. The AdaBoost algorithm creates the striner classifiers by searching the set of all weighted combinations of weak classifier and selective the most successful combination. The newly obtained strong classifier is combined with the optimal threshold which enables it to best separate faces from non faces. 4. Attentional Cascade The advent of the attentional cascade is the most important innovation of Viola and Jones methods. Its focuses first on removal of negative regions of the image while including all positive ones. The method was to use two neural networks: the algorithm first uses the faster neural network to select regions of interest before running the slower neural network which is from complex then first network and is used to pick out the faces from the image. The initial stages are created by adjusting the AdaBoost by latest staged use more complex classifier to reduce overall falls positive weights. 5. Algorithm and Implementation By the above steps the training process is completed and a classifier cascade has been created with desire properties. The detection algorithm simply scans all possible sub windows of an image at a range of scales, running the cascade on each window. If a sub window passes the final level of the cascade then the sub window will contain a face. In some steps normalization may occur. Firstly the image intensities of both the images (training and test images)must be normalized to the same scale. Then, while running the cascade on the sub windows, the rectangle sums within each feature must be scaled accordingly. Lastly training is done on variance normalized images and therefore, the test windows must be variance normalized as well. B. Principal Component Analysis (PCA) Principal Component Analysis (PCA) algorithm [2] is used to recognize the faces in the image. It is mathematically defined as an orthogonal linear transformation that transforms the data to a new coordinate system. It involves the procedure that transforms the number of possibly correlated variables called Principal components. It involves the calculation of the Eigen value decomposition of a data covariance matrix or singular value decomposition of a data matrix, after mean centering the data for each attribute. The results of PCA are in terms of component scores and loading. PCA is theoretically the optimal linear scheme for compressing a set of high dimensional vectors into a set of lower dimensional vectors and then reconstructing the original sets. PCA algorithm is as follows: A data matrix (m x n) for each image is created which is then converted into an m * n x 1 matrix having rows equal to the product of number of rows and columns of the original matrix , IJAFRSE All Rights Reserved

8 A mean matrix is created for all the different image matrices. The mean matrix is calculated by adding all the columns of data matrix divided by the total number of columns. The mean subtracted data matrix is obtained by subtracting the mean image from all the image matrices. The covariance matrix is obtained by multiplying the mean subtracted matrix by its transpose to make it a square matrix in next phase. The system then finds the Eigen vectors and Eigen values. For N dimensional vectors there will be N Eigen values and Eigen vectors Then the Eigen image is created by multiplying mean subtracted data matrix with the Eigen vectors. Eigen vectors with highest Eigen value is the principal component of the data set having maximum information. The weight matrix is then calculated by multiplying the transposed large Eigen image with the mean subtracted data matrix. After these steps the system can recognize any face image by comparing it with the main weight matrix. IV. ADVANTAGES Database of all the students is located in central database. Only one camera is to be connected to accessing PC. Saving of our resources (such as paper) and time. VIII. CONCLUSION In order to obtain the attendance in classroom lecture, we proposed the attendance management system based on face recognition in the classroom lecture. The system estimates the attendance of each student by continuous clicking of images for some time period and finds the best localized image for processing. The system allows the lecturer to check his/her student attendance automatically by using personal computer (PC) without any extra cost and effort. As well as, the proposed system needs only the basic requirements such as; camera, PC, and local network. The overall system is implemented in MATLAB. IX. REFERENCES [1] K. Susheel Kumar, Shitala Prasad, Vijay Bhaskar Semwal and R.C Tripathi, Real Time Face Recognition Using Adaboost Improved Fast PCA Algorithm, Internatinal journal of Artificial intelligence and Application, Application, Vol. 2, No.3, july.2011, DOI: /ijaia [2] Abhishek Jha, Classroom Attendance System Using Face Recognition System, The International journal of Mathematics, science, technology and Management, Vol. 2, ISSD: , IJAFRSE All Rights Reserved

9 [3] Ali Javed, Face Recognition Based on Principal Component Analysis, I. J. Image, Graphics and Signal Processing. Vol. 2, DOI: /ijigsp , pp [4] W. Zhao, R. Chellappa, P. J. Phillips and A. Rosenfeld, Face recognition: A literature survey, ACM Computing Surveys, 2003, vol. 35, no. 4, pp [5] Yang J, Zhang D, Alejandro F F, Yang J Y, Two dimensional PCA: a new approach to appearancebased face representation and recognition, Pattern Analysis and Machine Intelligence, 2004, 26: [6] Balwant Singh, Sunil Kumar, Paurush Bhulania, Lecture Attendance System WITH Face Recognition And Image Processing, International Journal Of Advance Research In Science And Engineering, Vol. No.2, Issue No.3, March, 2013 ISSN (E), IJARSE [7] Dayanand S. Shilwant,Dr. A.R.Karwankar, Student Monitoring By Face Recognition System, International Journal of Electronics, Communication & Soft Computing Science and Engineering, Vol. 2, Issue 2, ISSN: , 24 [8] D. Cristinacce and T. Cootes, Facial feature detection using adaboost with shape constraints, in Proc. 14th British Machine Vision Conference, Norwich, UK, Sep.2003, pp [9] E. Hjelmås, and B. K. Low, Face detection: A survey,computer Vision and Image Understanding, Vol. 83, No. 3, Sept. 2001, pp [10] S. Rao, and K. J. Satoa. An Attendance MonitorinG System Using Biometrics Authentication. International Journal of Advanced Research in Computer Science and Software Engineering. Volume. 3, Issue 4, pp [11] A. J. Goldstein, L. D. Harmon, and A. B. Lesk, Identification of human faces, Proc IEEE, May 1971, Vol. 59, No. 5, [12] Pallabi Saikia, Margaret Kathing, A Biometric Authentication Approach using Face Recognition System, International Journal of Advanced Research in Computer Science and Software Engineering, March 2014, Vol. 4, Issue , IJAFRSE All Rights Reserved

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014

International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014 Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College

More information

Efficient Attendance Management: A Face Recognition Approach

Efficient Attendance Management: A Face Recognition Approach Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely

More information

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM

FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES

BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents

More information

Classroom Monitoring System by Wired Webcams and Attendance Management System

Classroom Monitoring System by Wired Webcams and Attendance Management System Classroom Monitoring System by Wired Webcams and Attendance Management System Sneha Suhas More, Amani Jamiyan Madki, Priya Ranjit Bade, Upasna Suresh Ahuja, Suhas M. Patil Student, Dept. of Computer, KJCOEMR,

More information

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com

LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA

More information

A secure face tracking system

A secure face tracking system International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking

More information

AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA)

AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA) AUTOMATIC THEFT SECURITY SYSTEM (SMART SURVEILLANCE CAMERA) Veena G.S 1, Chandrika Prasad 2 and Khaleel K 3 Department of Computer Science and Engineering, M.S.R.I.T,Bangalore, Karnataka veenags@msrit.edu

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Object Recognition and Template Matching

Object Recognition and Template Matching Object Recognition and Template Matching Template Matching A template is a small image (sub-image) The goal is to find occurrences of this template in a larger image That is, you want to find matches of

More information

HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT

HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika

More information

Adaptive Face Recognition System from Myanmar NRC Card

Adaptive Face Recognition System from Myanmar NRC Card Adaptive Face Recognition System from Myanmar NRC Card Ei Phyo Wai University of Computer Studies, Yangon, Myanmar Myint Myint Sein University of Computer Studies, Yangon, Myanmar ABSTRACT Biometrics is

More information

Face Recognition in Low-resolution Images by Using Local Zernike Moments

Face Recognition in Low-resolution Images by Using Local Zernike Moments Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie

More information

Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems

Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary

More information

IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS

IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS Ajinkya Patil 1, Mrudang Shukla 2 1 Mtech (E&TC), 2 Assisstant Professor Symbiosis institute of Technology, Pune, Maharashtra,

More information

Subspace Analysis and Optimization for AAM Based Face Alignment

Subspace Analysis and Optimization for AAM Based Face Alignment Subspace Analysis and Optimization for AAM Based Face Alignment Ming Zhao Chun Chen College of Computer Science Zhejiang University Hangzhou, 310027, P.R.China zhaoming1999@zju.edu.cn Stan Z. Li Microsoft

More information

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human

Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative

More information

Analecta Vol. 8, No. 2 ISSN 2064-7964

Analecta Vol. 8, No. 2 ISSN 2064-7964 EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,

More information

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION

AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.

More information

The Implementation of Face Security for Authentication Implemented on Mobile Phone

The Implementation of Face Security for Authentication Implemented on Mobile Phone The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,

More information

Face Recognition For Remote Database Backup System

Face Recognition For Remote Database Backup System Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM

More information

Review Jeopardy. Blue vs. Orange. Review Jeopardy

Review Jeopardy. Blue vs. Orange. Review Jeopardy Review Jeopardy Blue vs. Orange Review Jeopardy Jeopardy Round Lectures 0-3 Jeopardy Round $200 How could I measure how far apart (i.e. how different) two observations, y 1 and y 2, are from each other?

More information

How To Filter Spam Image From A Picture By Color Or Color

How To Filter Spam Image From A Picture By Color Or Color Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among

More information

Computer Vision Based Employee Activities Analysis

Computer Vision Based Employee Activities Analysis Volume 03 Issue 05, September 2014 Computer Vision Based Employee Activities Analysis Md. Zahangir Alom, Nabil Tahmidul Karim, Shovon Paulinus Rozario *, Md. Rezwanul Hoque, Md. Rumman Bin Ashraf, Saikat

More information

Automated Attendance Management System using Face Recognition

Automated Attendance Management System using Face Recognition Automated Attendance Management System using Face Recognition Mrunmayee Shirodkar Varun Sinha Urvi Jain Bhushan Nemade Student, Thakur College Of Student, Thakur College Of Student, Thakur College of Assistant

More information

Face detection is a process of localizing and extracting the face region from the

Face detection is a process of localizing and extracting the face region from the Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.

More information

HAND GESTURE BASEDOPERATINGSYSTEM CONTROL

HAND GESTURE BASEDOPERATINGSYSTEM CONTROL HAND GESTURE BASEDOPERATINGSYSTEM CONTROL Garkal Bramhraj 1, palve Atul 2, Ghule Supriya 3, Misal sonali 4 1 Garkal Bramhraj mahadeo, 2 Palve Atule Vasant, 3 Ghule Supriya Shivram, 4 Misal Sonali Babasaheb,

More information

Component Ordering in Independent Component Analysis Based on Data Power

Component Ordering in Independent Component Analysis Based on Data Power Component Ordering in Independent Component Analysis Based on Data Power Anne Hendrikse Raymond Veldhuis University of Twente University of Twente Fac. EEMCS, Signals and Systems Group Fac. EEMCS, Signals

More information

TIETS34 Seminar: Data Mining on Biometric identification

TIETS34 Seminar: Data Mining on Biometric identification TIETS34 Seminar: Data Mining on Biometric identification Youming Zhang Computer Science, School of Information Sciences, 33014 University of Tampere, Finland Youming.Zhang@uta.fi Course Description Content

More information

Handwritten Character Recognition from Bank Cheque

Handwritten Character Recognition from Bank Cheque International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Handwritten Character Recognition from Bank Cheque Siddhartha Banerjee*

More information

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition

Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary

More information

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD

DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

Image Authentication Scheme using Digital Signature and Digital Watermarking

Image Authentication Scheme using Digital Signature and Digital Watermarking www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for

More information

ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM

ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM ARM 9 BASED REAL TIME CONTROL AND VEHICLE THEFT IDENTITY SYSTEM Ms. Radhika D. Rathi 1, Assistant Prof. Ashish Mulajkar 2, Assistant Prof. S. S. Badhe 3 1 Student, E&TCDepartment, Dr.D.Y.Patil School of

More information

Architecture for Mobile based Face Detection / Recognition

Architecture for Mobile based Face Detection / Recognition Architecture for Mobile based Face Detection / Recognition Shishir Kumar, Priyank Singh, Vivek Kumar Department of CSE, Jaypee Institute of Engineering & Technology Guna, India Abstract In this paper a

More information

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan

ECE 533 Project Report Ashish Dhawan Aditi R. Ganesan Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification

More information

Application of Face Recognition to Person Matching in Trains

Application of Face Recognition to Person Matching in Trains Application of Face Recognition to Person Matching in Trains May 2008 Objective Matching of person Context : in trains Using face recognition and face detection algorithms With a video-surveillance camera

More information

Building an Advanced Invariant Real-Time Human Tracking System

Building an Advanced Invariant Real-Time Human Tracking System UDC 004.41 Building an Advanced Invariant Real-Time Human Tracking System Fayez Idris 1, Mazen Abu_Zaher 2, Rashad J. Rasras 3, and Ibrahiem M. M. El Emary 4 1 School of Informatics and Computing, German-Jordanian

More information

A comparative study on face recognition techniques and neural network

A comparative study on face recognition techniques and neural network A comparative study on face recognition techniques and neural network 1. Abstract Meftah Ur Rahman Department of Computer Science George Mason University mrahma12@masonlive.gmu.edu In modern times, face

More information

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches

Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic

More information

Haar Features Based Face Detection and Recognition for Advanced Classroom and Corporate Attendance

Haar Features Based Face Detection and Recognition for Advanced Classroom and Corporate Attendance Haar Features Based Face Detection and Recognition for Advanced Classroom and Corporate Attendance Tiwari Priti Anilkumar 1, Kalyani Jha 2, Karishma P Uchil 3, Naveen H 4 U.G. Student, Dept. of ECE, M

More information

3D head model from stereo images by a self-organizing neural network

3D head model from stereo images by a self-organizing neural network Journal for Geometry and Graphics Volume VOL (YEAR), No. NO, 1-12. 3D head model from stereo images by a self-organizing neural network Levente Sajó, Miklós Hoffmann, Attila Fazekas Faculty of Informatics,

More information

Multimodal Biometric Recognition Security System

Multimodal Biometric Recognition Security System Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security

More information

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall

Assessment. Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Automatic Photo Quality Assessment Presenter: Yupu Zhang, Guoliang Jin, Tuo Wang Computer Vision 2008 Fall Estimating i the photorealism of images: Distinguishing i i paintings from photographs h Florin

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

A new Method for Face Recognition Using Variance Estimation and Feature Extraction

A new Method for Face Recognition Using Variance Estimation and Feature Extraction A new Method for Face Recognition Using Variance Estimation and Feature Extraction Walaa Mohamed 1, Mohamed Heshmat 2, Moheb Girgis 3 and Seham Elaw 4 1, 2, 4 Faculty of science, Mathematical and Computer

More information

SIGNATURE VERIFICATION

SIGNATURE VERIFICATION SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

Adaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement

Adaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement Adaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement Toshio Sugihara Abstract In this study, an adaptive

More information

An Active Head Tracking System for Distance Education and Videoconferencing Applications

An Active Head Tracking System for Distance Education and Videoconferencing Applications An Active Head Tracking System for Distance Education and Videoconferencing Applications Sami Huttunen and Janne Heikkilä Machine Vision Group Infotech Oulu and Department of Electrical and Information

More information

Audience Analysis System on the Basis of Face Detection, Tracking and Classification Techniques

Audience Analysis System on the Basis of Face Detection, Tracking and Classification Techniques Audience Analysis System on the Basis of Face Detection, Tracking and Classification Techniques Vladimir Khryashchev, Member, IAENG, Alexander Ganin, Maxim Golubev, and Lev Shmaglit Abstract A system of

More information

Biometric Authentication using Online Signatures

Biometric Authentication using Online Signatures Biometric Authentication using Online Signatures Alisher Kholmatov and Berrin Yanikoglu alisher@su.sabanciuniv.edu, berrin@sabanciuniv.edu http://fens.sabanciuniv.edu Sabanci University, Tuzla, Istanbul,

More information

T-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier. Santosh Tirunagari : 245577

T-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier. Santosh Tirunagari : 245577 T-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier Santosh Tirunagari : 245577 January 20, 2011 Abstract This term project gives a solution how to classify an email as spam or

More information

Parallelized Architecture of Multiple Classifiers for Face Detection

Parallelized Architecture of Multiple Classifiers for Face Detection Parallelized Architecture of Multiple s for Face Detection Author(s) Name(s) Author Affiliation(s) E-mail Abstract This paper presents a parallelized architecture of multiple classifiers for face detection

More information

Open-Set Face Recognition-based Visitor Interface System

Open-Set Face Recognition-based Visitor Interface System Open-Set Face Recognition-based Visitor Interface System Hazım K. Ekenel, Lorant Szasz-Toth, and Rainer Stiefelhagen Computer Science Department, Universität Karlsruhe (TH) Am Fasanengarten 5, Karlsruhe

More information

Neural Network based Vehicle Classification for Intelligent Traffic Control

Neural Network based Vehicle Classification for Intelligent Traffic Control Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN

More information

Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning

Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning Non-negative Matrix Factorization (NMF) in Semi-supervised Learning Reducing Dimension and Maintaining Meaning SAMSI 10 May 2013 Outline Introduction to NMF Applications Motivations NMF as a middle step

More information

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network

An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal

More information

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap

Palmprint Recognition. By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palmprint Recognition By Sree Rama Murthy kora Praveen Verma Yashwant Kashyap Palm print Palm Patterns are utilized in many applications: 1. To correlate palm patterns with medical disorders, e.g. genetic

More information

Palmprint as a Biometric Identifier

Palmprint as a Biometric Identifier Palmprint as a Biometric Identifier 1 Kasturika B. Ray, 2 Rachita Misra 1 Orissa Engineering College, Nabojyoti Vihar, Bhubaneswar, Orissa, India 2 Dept. Of IT, CV Raman College of Engineering, Bhubaneswar,

More information

Mean-Shift Tracking with Random Sampling

Mean-Shift Tracking with Random Sampling 1 Mean-Shift Tracking with Random Sampling Alex Po Leung, Shaogang Gong Department of Computer Science Queen Mary, University of London, London, E1 4NS Abstract In this work, boosting the efficiency of

More information

Mehtap Ergüven Abstract of Ph.D. Dissertation for the degree of PhD of Engineering in Informatics

Mehtap Ergüven Abstract of Ph.D. Dissertation for the degree of PhD of Engineering in Informatics INTERNATIONAL BLACK SEA UNIVERSITY COMPUTER TECHNOLOGIES AND ENGINEERING FACULTY ELABORATION OF AN ALGORITHM OF DETECTING TESTS DIMENSIONALITY Mehtap Ergüven Abstract of Ph.D. Dissertation for the degree

More information

The Scientific Data Mining Process

The Scientific Data Mining Process Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In

More information

Video Surveillance System for Security Applications

Video Surveillance System for Security Applications Video Surveillance System for Security Applications Vidya A.S. Department of CSE National Institute of Technology Calicut, Kerala, India V. K. Govindan Department of CSE National Institute of Technology

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Mouse Control using a Web Camera based on Colour Detection

Mouse Control using a Web Camera based on Colour Detection Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,

More information

FPGA Implementation of Human Behavior Analysis Using Facial Image

FPGA Implementation of Human Behavior Analysis Using Facial Image RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering

More information

Robust Real-Time Face Detection

Robust Real-Time Face Detection Robust Real-Time Face Detection International Journal of Computer Vision 57(2), 137 154, 2004 Paul Viola, Michael Jones 授 課 教 授 : 林 信 志 博 士 報 告 者 : 林 宸 宇 報 告 日 期 :96.12.18 Outline Introduction The Boost

More information

Implementation of OCR Based on Template Matching and Integrating it in Android Application

Implementation of OCR Based on Template Matching and Integrating it in Android Application International Journal of Computer Sciences and EngineeringOpen Access Technical Paper Volume-04, Issue-02 E-ISSN: 2347-2693 Implementation of OCR Based on Template Matching and Integrating it in Android

More information

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.

Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines. International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer

More information

CS231M Project Report - Automated Real-Time Face Tracking and Blending

CS231M Project Report - Automated Real-Time Face Tracking and Blending CS231M Project Report - Automated Real-Time Face Tracking and Blending Steven Lee, slee2010@stanford.edu June 6, 2015 1 Introduction Summary statement: The goal of this project is to create an Android

More information

Fuzzy based Pixel wise Information Extraction for Face Recognition

Fuzzy based Pixel wise Information Extraction for Face Recognition Fuzzy based Pixel wise Information Extraction for Face Recognition Virendra P. Vishwakarma, Member, IACSIT, Sujata Pandey, Member, IEEE and M. N. Gupta Abstract This paper brings out a new approach of

More information

How To Cluster

How To Cluster Data Clustering Dec 2nd, 2013 Kyrylo Bessonov Talk outline Introduction to clustering Types of clustering Supervised Unsupervised Similarity measures Main clustering algorithms k-means Hierarchical Main

More information

Low-resolution Image Processing based on FPGA

Low-resolution Image Processing based on FPGA Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,

More information

Keywords: Image complexity, PSNR, Levenberg-Marquardt, Multi-layer neural network.

Keywords: Image complexity, PSNR, Levenberg-Marquardt, Multi-layer neural network. Global Journal of Computer Science and Technology Volume 11 Issue 3 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172

More information

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm

How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode

More information

A Real Time Driver s Eye Tracking Design Proposal for Detection of Fatigue Drowsiness

A Real Time Driver s Eye Tracking Design Proposal for Detection of Fatigue Drowsiness A Real Time Driver s Eye Tracking Design Proposal for Detection of Fatigue Drowsiness Nitin Jagtap 1, Ashlesha kolap 1, Mohit Adgokar 1, Dr. R.N Awale 2 PG Scholar, Dept. of Electrical Engg., VJTI, Mumbai

More information

Unsupervised and supervised dimension reduction: Algorithms and connections

Unsupervised and supervised dimension reduction: Algorithms and connections Unsupervised and supervised dimension reduction: Algorithms and connections Jieping Ye Department of Computer Science and Engineering Evolutionary Functional Genomics Center The Biodesign Institute Arizona

More information

Tracking Moving Objects In Video Sequences Yiwei Wang, Robert E. Van Dyck, and John F. Doherty Department of Electrical Engineering The Pennsylvania State University University Park, PA16802 Abstract{Object

More information

Simultaneous Gamma Correction and Registration in the Frequency Domain

Simultaneous Gamma Correction and Registration in the Frequency Domain Simultaneous Gamma Correction and Registration in the Frequency Domain Alexander Wong a28wong@uwaterloo.ca William Bishop wdbishop@uwaterloo.ca Department of Electrical and Computer Engineering University

More information

Face Model Fitting on Low Resolution Images

Face Model Fitting on Low Resolution Images Face Model Fitting on Low Resolution Images Xiaoming Liu Peter H. Tu Frederick W. Wheeler Visualization and Computer Vision Lab General Electric Global Research Center Niskayuna, NY, 1239, USA {liux,tu,wheeler}@research.ge.com

More information

Super-resolution method based on edge feature for high resolution imaging

Super-resolution method based on edge feature for high resolution imaging Science Journal of Circuits, Systems and Signal Processing 2014; 3(6-1): 24-29 Published online December 26, 2014 (http://www.sciencepublishinggroup.com/j/cssp) doi: 10.11648/j.cssp.s.2014030601.14 ISSN:

More information

Intelligent Face Recognition

Intelligent Face Recognition International Journal of Computer Sciences and Engineering Open Access Technical Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Intelligent Face Recognition Akram Qureshi 1* and Ashok Kajla 2 1*,2 RTU Kota

More information

SYMMETRIC EIGENFACES MILI I. SHAH

SYMMETRIC EIGENFACES MILI I. SHAH SYMMETRIC EIGENFACES MILI I. SHAH Abstract. Over the years, mathematicians and computer scientists have produced an extensive body of work in the area of facial analysis. Several facial analysis algorithms

More information

Alabama Department of Postsecondary Education

Alabama Department of Postsecondary Education Date Adopted 1998 Dates reviewed 2007, 2011, 2013 Dates revised 2004, 2008, 2011, 2013, 2015 Alabama Department of Postsecondary Education Representing Alabama s Public Two-Year College System Jefferson

More information

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection

A Survey on Outlier Detection Techniques for Credit Card Fraud Detection IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. VI (Mar-Apr. 2014), PP 44-48 A Survey on Outlier Detection Techniques for Credit Card Fraud

More information

Accurate and robust image superresolution by neural processing of local image representations

Accurate and robust image superresolution by neural processing of local image representations Accurate and robust image superresolution by neural processing of local image representations Carlos Miravet 1,2 and Francisco B. Rodríguez 1 1 Grupo de Neurocomputación Biológica (GNB), Escuela Politécnica

More information

Signature Region of Interest using Auto cropping

Signature Region of Interest using Auto cropping ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,

More information

Ensemble Methods. Knowledge Discovery and Data Mining 2 (VU) (707.004) Roman Kern. KTI, TU Graz 2015-03-05

Ensemble Methods. Knowledge Discovery and Data Mining 2 (VU) (707.004) Roman Kern. KTI, TU Graz 2015-03-05 Ensemble Methods Knowledge Discovery and Data Mining 2 (VU) (707004) Roman Kern KTI, TU Graz 2015-03-05 Roman Kern (KTI, TU Graz) Ensemble Methods 2015-03-05 1 / 38 Outline 1 Introduction 2 Classification

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

Data Mining: A Preprocessing Engine

Data Mining: A Preprocessing Engine Journal of Computer Science 2 (9): 735-739, 2006 ISSN 1549-3636 2005 Science Publications Data Mining: A Preprocessing Engine Luai Al Shalabi, Zyad Shaaban and Basel Kasasbeh Applied Science University,

More information

Nonlinear Iterative Partial Least Squares Method

Nonlinear Iterative Partial Least Squares Method Numerical Methods for Determining Principal Component Analysis Abstract Factors Béchu, S., Richard-Plouet, M., Fernandez, V., Walton, J., and Fairley, N. (2016) Developments in numerical treatments for

More information

Principal Component Analysis

Principal Component Analysis Principal Component Analysis ERS70D George Fernandez INTRODUCTION Analysis of multivariate data plays a key role in data analysis. Multivariate data consists of many different attributes or variables recorded

More information

Template-based Eye and Mouth Detection for 3D Video Conferencing

Template-based Eye and Mouth Detection for 3D Video Conferencing Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer

More information

Introduction to Matrix Algebra

Introduction to Matrix Algebra Psychology 7291: Multivariate Statistics (Carey) 8/27/98 Matrix Algebra - 1 Introduction to Matrix Algebra Definitions: A matrix is a collection of numbers ordered by rows and columns. It is customary

More information

Data, Measurements, Features

Data, Measurements, Features Data, Measurements, Features Middle East Technical University Dep. of Computer Engineering 2009 compiled by V. Atalay What do you think of when someone says Data? We might abstract the idea that data are

More information

JPEG Image Compression by Using DCT

JPEG Image Compression by Using DCT International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*

More information

Predict Influencers in the Social Network

Predict Influencers in the Social Network Predict Influencers in the Social Network Ruishan Liu, Yang Zhao and Liuyu Zhou Email: rliu2, yzhao2, lyzhou@stanford.edu Department of Electrical Engineering, Stanford University Abstract Given two persons

More information

Hybrid Lossless Compression Method For Binary Images

Hybrid Lossless Compression Method For Binary Images M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering

More information