Face Recognition For Remote Database Backup System
|
|
|
- Herbert Butler
- 10 years ago
- Views:
Transcription
1 Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM College of Arts and Sciences, Universiti Utara Malaysia, 0600 UUM Sintok, Kedah, Malaysia 2 UUM College of Arts and Sciences, Universiti Utara Malaysia, 0600 UUM Sintok, Kedah, Malaysia Abstract- Face recognition is one of the most interesting applications in the image processing field To build a model to recognize the face of different people, we need to do several processes on the image to obtain the most efficient features In this research a face recognition model is developed The dataset used is of different face images Neural Networks technique, specifically Multilayer Perceptron (MLP) model with Back- Propagation learning algorithm and Template Matching approach are implemented in model developed The face recognition model developed is then applied on a remote database backup system Template matching approach is found to give a higher percentage of matching accuracy and a faster result can be obtained compared to MLP as no learning process is required I INTRODUCTION Organizations need to have a good data backup strategy to prevent data loss Unfortunately, saving files in databases does not guarantee safety from threats or disasters Files in a database can be deleted by failure or accident, and data can be destroyed due to hard disk error or virus infection Unexpectedly, computer can be physically destroyed from natural disaster such as fire or flood or even be stolen by maliciously act Since data loss can be a very serious problem to an organization, data backup is an important routine That is, to make one or more copies of the database files regularly and put them in a safe place, such as another machine or server Organizations, such as banks deal with various transactions every day, where this information is critical Business organizations must make backups on a consistent basis to ensure the safety of the transactions data This means that it is essential for organizations to make backups at specific times regardless of location be it in-house or remotely Backing up databases in the organization itself is less threatening than backing up databases remotely In remote backups, greater security measures are needed One method to enhance security measures for remote backup systems is incorporating facial recognition technology A remote database backup system is where users can backup and compress their database servers remotely If the application is run on a machine connected to LAN or WAN, all the servers names will appear in the server list Otherwise, the user can add a server name or IP manually After a connection to a server is made, all the databases names will be listed in the database list view and users can choose the database that they wish to backup This paper proposes a remote database backup system using facial recognition technology The aim of the system is to address current needs for reliable identification and verification of individuals II PREVIOUS WORKS Face recognition is a very interesting and difficult problem because the variations in the image brightness, different faces and different people expressions Sometimes it is hard for the people themselves to recognize the difference between the people s faces, so to develop a program that can reach such objectives is very challenging Many studies have been done in this area and several algorithms have been used and one of them is Neural Networks Neural Networks (NN) can be implemented in many different applications to fulfill the user/s requirements and it has been a very popular tool in image recognition and data classification The facial recognition developed employs Neural Networks method specifically Multilayer Perceptron (MLP) with Backpropagation (BP) algorithm BP shows very strong ability to solve many complex problems in different domain In order to apply Neural Networks on images (face images) an extraction methods should be applied first to extract the features from the images In [9], there are two types of techniques to present input data in face recognition systems, ie, the feature-based technique and the image-based technique In feature-based technique, the 288
2 input data is merely a number of features extracted from the image, while in image-based technique the input data is the processed image itself Usually, features extracted from grayscale images or gray-scale images themselves are used as the input data in face recognition systems A study in [2] combined two basic face detection methods ie skin colorbased method and feature-based method In this approach, both methods are used where the color features and face features are extracted A study about face recognition using artificial neural networks is proposed in [5] The approach consists of two phases which are the enrollment and recognition/verification Images were captured using a webcam and stored in a local dataset After that, the images were processed to extract the features using methods such as Histogram and Homomorphic For classification, Multi-layer feed forward with Backpropagation algorithm was used An accuracy of around 98% was able to be achieved which indicated that the study has produced a good model in term of classification accuracy Another study using artificial neural networks was proposed in [3] In the study, a new approach to model face images using a state space feature was presented Feature extraction was performed from the grayscale images of the human faces For classification activites, Multi-layer feed forward with Backpropagation algorithm was used For training set, 200 images were used and testing was performed on the set The model managed to obtain accuracy around 98% The important point in the study is that dimensionality reduction was used on the data set which is useful to reduce processing time A survey about the algorithms and techniques used in face recognition was provided in [4] The study investigated many features extraction algorithm such as Edges, Texture, Skin color and shape It also investigated many classification algorithm such as Eignface, Distribution-based, Neural Networks, Support Victor Machine (SVM), Naïve-Bayes classifier, Hidden Markov Model, and Information-Theoritical Approach From the investigation, it is concluded that the following points could affect the classification accuracy: lighting conditions, orientation, pose, partial occlusion, facial expression, presence of glasses, facial hair, and a variety of hair styles Another approach used for face verification is template matching as studied in [6] This approach is performed using an edginess-based representation of the face image Experiments were conducted using a set of face images with different poses (position of the face towards the camera) and different background lightings The approach used is proved to be a promising alternative to other methods when dealing with problems with different poses and background lighting A study by [8] used 30 standard face images, focusing on the eye regions as templates for face detection Template matching approach is applied together with 2DPCA algorithm, an algorithm developed in [7] The results of the experiment conducted produces accurate rate of face detection in a short time III METHOD There are three (3) phases in this research Phase : Reference Database Construction Authorized individuals images are captured using a webcam and stored in bmp format, 22 x 60 pixel, and 32 bit depth The administrator/user can specify the number of images to be taken (20 is the default value) and the sensitivity value, that is used to control similarity acceptance The images captured are in four different poses (position of face towards the camera), background and lighting conditions Each set of individual images is stored in separate folders The output for this phase is a database of authorized personnel images in four different positions This database is known as the reference database Phase 2: Development of Facial Recognition System The aim of this phase is to detect a face and verify users Two methods, Neural Networks and Template Matching are used to produce models Models that produce the highest percentage of accuracy will be chosen for development For Neural, Networks, the image must first be transformed into gray scale image When the image has been cut, its features can be extracted The features extracted are Color Mean, Color Standard Deviation, Gray Mean, Gray Standard Deviation, Luminosity Mean, Luminosity Standard Deviation, Brightness Mean, Brightness Standard Deviation, Saturation Mean, Saturation Standard Deviation, Gabor Mean, Gabor Standard Deviation, Contrast Mean, Edge Detection, Energy, Entropy, Homogeneity Mean, Homogeneity Standard Deviation, Sobel Mean, and Sobel Standard Deviation After the feature extraction process, a normalization technique can be applied on the data Phase 3: Evaluation Evaluations can be conducted in three ways; scenario, operational and technological [] Scenario evaluation is to evaluate the overall capabilities of the entire system for a specific application scenario, designed to model a real-world environment and population Operational evaluation is to evaluate a system in actual operational conditions Technological evaluation is to determine the underlying technical capabilities of the facial recognition system For this research, evaluation on the technological aspect will be conducted Specifically the system will be evaluated for performance on accuracy Other evaluations methods are not in the scope of this research IV PROPOSED SYSTEM The system architecture and the phases of development are shown and described here 289
3 A System Architecture The architecture of the remote database backup system is shown in Fig Computers connected with a webcam must be used to enable the face recognition system to function properly The machine must also be connected to the LAN, WAN, or internet to enable the system to access the database servers remotely The system administrator is the only person responsible to register the images of the users to enable them to access and use the system For neural networks algorithm, the features of the user s image will be extracted and normalized This means that the image must be standardized in terms of size, pose, illumination, etc, relative to the images in the gallery or reference database The diagrams for facial recognition steps using neural networks and template matching are shown in Fig 2 and 3 respectively Detect user s image Database server 2 Database server3 Verify user Extract features Wireless connection Database server Webcam Normalize data Face Recognition application System User Fig 2 Facial recognition steps using neural networks algorithm User 3 User 2 Detect user s image Fig Architecture of Remote Database Backup System B Face Recognition System Verify user The system has been developed in two steps: detect user s image and verification Detect user s image: A webcam that is attached to a computer will capture the user s image and stored temporarily Verify user: In this step, the system will trigger every time a user wishes to perform database backup Image of user s current position will be captured during login via a webcam The image captured (test image) must be in the same format and size as the reference image Two algorithms are used to verify the images The template matching algorithm will match this image with the images in the reference database This approach is an exhaustive matching process, which performs complete scan of source image and comparing each pixel with corresponding pixel of template Therefore here, it will match the pixels between the test image and the reference image If a match is found, the user can start performing backup on the desired database remotely Fig 3 Facial recognition steps using template matching algorithm C Database Backup System Modelling Database backup system is where users can backup and compress their database servers remotely as shown in the flow diagram in Fig 4 If the application is run on a machine connected to LAN or WAN, all the servers names will appear in the server list Otherwise, the user can add a server name or IP manually After a connection to a server is made, all the databases names will be listed in the database list view and users can choose the database that they wish to backup This application will generate the backup file in compressed format by default For automatic backup, a user can set all the parameters similar to a manual backup Then, check the check-box titled Daily Auto Backup, where a time setting component will be enabled to set the time for daily backup A report of the 290
4 scheduled backup dates and list or errors, if any, that occurs during the connection to server, database selection or backup failure can be generated for reference In this paper, we are going to focus on the development of the face recognition system, which is the security aspect of the database backup system V FINDINGS Experiments were conducted to test the performance of both methods used Images of all authorized personnel for the database backup server must be taken for the experiments For each user, 20 images were captured via a webcam For Neural Networks, after the feature extraction process is performed, the data must be prepared for the learning process where it will be normalized to the range from 0 to For the learning process, Multilayer Perceptron with Backpropagation learning algorithm is employed where the number of input units used is 20 units, while the hidden units used is 0 units Learning rate and momentum values applied is 0 A structure of a Multilayer Perceptron is shown in Fig 5 x Z x 2 Z 0 Y X 20 Input Layer Hidden Layer Output Layer Fig 5 A Structure of a Multilayer Perceptron Model The data is trained for 5000 epochs or until the error rate is 000 The final weights of the model from the learning process must then be stored in a database To test the performance of the model built, new images of the authorized personnel are captured via a webcam The features of each image are extracted and normalized The final weights stored are then used to classify the images For this model, the percentage of accuracy for classification achieved is in the range of 70% to 75% The low percentage of accuracy may be due to the variety of poses and background lighting captured in the images used in the training and testing phases Fig 4 Database Backup System Flow Diagram For template matching, no features extraction or learning process needs to be done Images of all authorized personnel are captured via a webcam and stored in a database Even though the number of images used in the experiments is 20 by default, in this method, the administrator can determine the number of images to be captured for each user However, for 29
5 comparison purposes, the default value is used It is important to note that the more images used, the more processing time taken during the process of image matching The images of each personnel are stored in a separate location in the database Those set of images are considered as templates or reference images For testing, new images of the personnel are taken via a webcam The image format must be in the same format as the templates, which are in bmp format, 22 x 60 pixel, and 32 bit depth However, the background, light and illumination can be different than those in the template images because a user could login from a different location and environment Based on the sensitivity value specified to control the similarity acceptance during the matching process, the percentage of accuracy for the image classification is in the range of 80% to 85% If a closer image of the face is captured, better accuracy can be achieved The difference in performance is probably due to the ability of template matching to match any image with template images by doing a complete scan of a new image and comparing each pixel with the corresponding pixel of a template Therefore, this technique is practical for a situation when we do not want to bother with features extraction and understand which features to be selected for certain type of images Results can also be obtained in a short time as no learning process is required in this approach [2] N Jamil, S Lqbal, and N Iqbal, Face recognition using neural networks, Proceedings of IEEE INMIC 200, IEEE International Multi Topic Conference 200: Technology for the 2st Century, pp , 200 [3] V Kabeer, and N K Narayanan, Face recognition using state space parameters and artificial neural network classifier, Proceedings of International Conference on Computational Intelligence and Multimedia Applications, pp , 2007 [4] Y Ming-Hsuan, D J Kriegman, and N Ahuja, Detecting faces in images: a survey, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(), pp 34-58, 2002 [5] S A Nazeer, N Omar, and M Khalid, Face recognition system using artificial neural networks approach, Proceedings of International Conference on Signal Processing, Communications and Networking (CSCN '07), pp , 2007 [6] A K Sao and B Yegnanarayana, Face verification using template matching, IEEE Transactions on Information Forensics and Security, vol 2, no 3, pp , September 2007 [7] J Wang and H Yang, Face detection based on template matching and 2DPCA algorithm, IEEE Congress on Image and Signal Processing, pp , 2008 [8] J Yang, D Zhang, and J Yang, Two-dimensional PCA: A new approach to appearance-based face representation and recognition, IEEE Transactions on Pattern Analysis and Machine Intelligence, 26(), pp 3-37, 2004 [9] K Youssef, and W Peng-Yung, A new method for face recognition based on color information and a neural network, Proceedings of The Third International Conference on Natural Computation (ICNC 2007), 2007 VI CONCLUSION This paper proposes a remote backup system using facial recognition technology The aim of the system is to address current needs for reliable identification and verification of individuals The facial recognition model is conducted in three phases: Reference Database Construction, Development of Facial Recognition System and Evaluation Two algorithms Neural Networks and Template Matching are used to produce models Models with the highest percentage of accuracy will be chosen for developing the remote database backup system Template matching approach is found to give a higher percentage of matching accuracy compared to MLP Results can also be obtained in a short time as no learning process is required This research will extend the literature on face recognition domain ACKNOWLEDGMENT This research is supported by the Leadership Development Schemes (LEADS) grant We thank Universiti Utara Malaysia and the Ministry of Higher Education Malaysia for financing the research REFERENCES [] L D Introna, and H Nissenbaum, Face recognition technology: a survey of policy and implementation issues, Center for Catastrophe Preparedness and Response, New York University,
Analecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
The Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
An Energy-Based Vehicle Tracking System using Principal Component Analysis and Unsupervised ART Network
Proceedings of the 8th WSEAS Int. Conf. on ARTIFICIAL INTELLIGENCE, KNOWLEDGE ENGINEERING & DATA BASES (AIKED '9) ISSN: 179-519 435 ISBN: 978-96-474-51-2 An Energy-Based Vehicle Tracking System using Principal
Application of Neural Network in User Authentication for Smart Home System
Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart
HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS
COMPARISON OF OBJECT BASED AND PIXEL BASED CLASSIFICATION OF HIGH RESOLUTION SATELLITE IMAGES USING ARTIFICIAL NEURAL NETWORKS B.K. Mohan and S. N. Ladha Centre for Studies in Resources Engineering IIT
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK
DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK J.Pradeep 1, E.Srinivasan 2 and S.Himavathi 3 1,2 Department of ECE, Pondicherry College Engineering,
Neural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
Digital image processing
746A27 Remote Sensing and GIS Lecture 4 Digital image processing Chandan Roy Guest Lecturer Department of Computer and Information Science Linköping University Digital Image Processing Most of the common
An Approach for Utility Pole Recognition in Real Conditions
6th Pacific-Rim Symposium on Image and Video Technology 1st PSIVT Workshop on Quality Assessment and Control by Image and Video Analysis An Approach for Utility Pole Recognition in Real Conditions Barranco
How To Filter Spam Image From A Picture By Color Or Color
Image Content-Based Email Spam Image Filtering Jianyi Wang and Kazuki Katagishi Abstract With the population of Internet around the world, email has become one of the main methods of communication among
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
Feature Subset Selection in E-mail Spam Detection
Feature Subset Selection in E-mail Spam Detection Amir Rajabi Behjat, Universiti Technology MARA, Malaysia IT Security for the Next Generation Asia Pacific & MEA Cup, Hong Kong 14-16 March, 2012 Feature
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp
SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS Nitin Khanna and Edward J. Delp Video and Image Processing Laboratory School of Electrical and Computer Engineering Purdue University West Lafayette,
Keywords: Image complexity, PSNR, Levenberg-Marquardt, Multi-layer neural network.
Global Journal of Computer Science and Technology Volume 11 Issue 3 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172
Efficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
FACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
Face Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
Back Propagation Neural Networks User Manual
Back Propagation Neural Networks User Manual Author: Lukáš Civín Library: BP_network.dll Runnable class: NeuralNetStart Document: Back Propagation Neural Networks Page 1/28 Content: 1 INTRODUCTION TO BACK-PROPAGATION
A comparative study on face recognition techniques and neural network
A comparative study on face recognition techniques and neural network 1. Abstract Meftah Ur Rahman Department of Computer Science George Mason University [email protected] In modern times, face
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals
The Role of Size Normalization on the Recognition Rate of Handwritten Numerals Chun Lei He, Ping Zhang, Jianxiong Dong, Ching Y. Suen, Tien D. Bui Centre for Pattern Recognition and Machine Intelligence,
A Dynamic Flooding Attack Detection System Based on Different Classification Techniques and Using SNMP MIB Data
International Journal of Computer Networks and Communications Security VOL. 2, NO. 9, SEPTEMBER 2014, 279 284 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S A Dynamic Flooding Attack Detection
OPTIMUM LEARNING RATE FOR CLASSIFICATION PROBLEM
OPTIMUM LEARNING RATE FOR CLASSIFICATION PROBLEM WITH MLP IN DATA MINING Lalitha Saroja Thota 1 and Suresh Babu Changalasetty 2 1 Department of Computer Science, King Khalid University, Abha, KSA 2 Department
Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems
2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems
Performance Evaluation of Artificial Neural. Networks for Spatial Data Analysis
Contemporary Engineering Sciences, Vol. 4, 2011, no. 4, 149-163 Performance Evaluation of Artificial Neural Networks for Spatial Data Analysis Akram A. Moustafa Department of Computer Science Al al-bayt
ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION
1 ARTIFICIAL INTELLIGENCE METHODS IN EARLY MANUFACTURING TIME ESTIMATION B. Mikó PhD, Z-Form Tool Manufacturing and Application Ltd H-1082. Budapest, Asztalos S. u 4. Tel: (1) 477 1016, e-mail: [email protected]
Comparison of K-means and Backpropagation Data Mining Algorithms
Comparison of K-means and Backpropagation Data Mining Algorithms Nitu Mathuriya, Dr. Ashish Bansal Abstract Data mining has got more and more mature as a field of basic research in computer science and
Power Prediction Analysis using Artificial Neural Network in MS Excel
Power Prediction Analysis using Artificial Neural Network in MS Excel NURHASHINMAH MAHAMAD, MUHAMAD KAMAL B. MOHAMMED AMIN Electronic System Engineering Department Malaysia Japan International Institute
GLOVE-BASED GESTURE RECOGNITION SYSTEM
CLAWAR 2012 Proceedings of the Fifteenth International Conference on Climbing and Walking Robots and the Support Technologies for Mobile Machines, Baltimore, MD, USA, 23 26 July 2012 747 GLOVE-BASED GESTURE
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS Breno C. Costa, Bruno. L. A. Alberto, André M. Portela, W. Maduro, Esdras O. Eler PDITec, Belo Horizonte,
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks
Method of Combining the Degrees of Similarity in Handwritten Signature Authentication Using Neural Networks Ph. D. Student, Eng. Eusebiu Marcu Abstract This paper introduces a new method of combining the
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL Garkal Bramhraj 1, palve Atul 2, Ghule Supriya 3, Misal sonali 4 1 Garkal Bramhraj mahadeo, 2 Palve Atule Vasant, 3 Ghule Supriya Shivram, 4 Misal Sonali Babasaheb,
Image Classification for Dogs and Cats
Image Classification for Dogs and Cats Bang Liu, Yan Liu Department of Electrical and Computer Engineering {bang3,yan10}@ualberta.ca Kai Zhou Department of Computing Science [email protected] Abstract
Lecture 6. Artificial Neural Networks
Lecture 6 Artificial Neural Networks 1 1 Artificial Neural Networks In this note we provide an overview of the key concepts that have led to the emergence of Artificial Neural Networks as a major paradigm
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Artificial Neural Network Approach for Classification of Heart Disease Dataset
Artificial Neural Network Approach for Classification of Heart Disease Dataset Manjusha B. Wadhonkar 1, Prof. P.A. Tijare 2 and Prof. S.N.Sawalkar 3 1 M.E Computer Engineering (Second Year)., Computer
Image Normalization for Illumination Compensation in Facial Images
Image Normalization for Illumination Compensation in Facial Images by Martin D. Levine, Maulin R. Gandhi, Jisnu Bhattacharyya Department of Electrical & Computer Engineering & Center for Intelligent Machines
Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network
General Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Impelling
Novelty Detection in image recognition using IRF Neural Networks properties
Novelty Detection in image recognition using IRF Neural Networks properties Philippe Smagghe, Jean-Luc Buessler, Jean-Philippe Urban Université de Haute-Alsace MIPS 4, rue des Frères Lumière, 68093 Mulhouse,
Utilization of Neural Network for Disease Forecasting
Utilization of Neural Network for Disease Forecasting Oyas Wahyunggoro 1, Adhistya Erna Permanasari 1, and Ahmad Chamsudin 1,2 1 Department of Electrical Engineering and Information Technology, Gadjah
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
Honey Bee Intelligent Model for Network Zero Day Attack Detection
Honey Bee Intelligent Model for Network Zero Day Attack Detection 1 AMAN JANTAN, 2 ABDULGHANI ALI AHMED School of Computer Sciences, Universiti Sains Malaysia (USM), Penang, Malaysia 1 [email protected],
LIST OF CONTENTS CHAPTER CONTENT PAGE DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK
vii LIST OF CONTENTS CHAPTER CONTENT PAGE DECLARATION DEDICATION ACKNOWLEDGEMENTS ABSTRACT ABSTRAK LIST OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF NOTATIONS LIST OF ABBREVIATIONS LIST OF APPENDICES
High-Performance Signature Recognition Method using SVM
High-Performance Signature Recognition Method using SVM Saeid Fazli Research Institute of Modern Biological Techniques University of Zanjan Shima Pouyan Electrical Engineering Department University of
Extracting a Good Quality Frontal Face Images from Low Resolution Video Sequences
Extracting a Good Quality Frontal Face Images from Low Resolution Video Sequences Pritam P. Patil 1, Prof. M.V. Phatak 2 1 ME.Comp, 2 Asst.Professor, MIT, Pune Abstract The face is one of the important
Price Prediction of Share Market using Artificial Neural Network (ANN)
Prediction of Share Market using Artificial Neural Network (ANN) Zabir Haider Khan Department of CSE, SUST, Sylhet, Bangladesh Tasnim Sharmin Alin Department of CSE, SUST, Sylhet, Bangladesh Md. Akter
Supply Chain Forecasting Model Using Computational Intelligence Techniques
CMU.J.Nat.Sci Special Issue on Manufacturing Technology (2011) Vol.10(1) 19 Supply Chain Forecasting Model Using Computational Intelligence Techniques Wimalin S. Laosiritaworn Department of Industrial
Index Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.
Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary
SUCCESSFUL PREDICTION OF HORSE RACING RESULTS USING A NEURAL NETWORK
SUCCESSFUL PREDICTION OF HORSE RACING RESULTS USING A NEURAL NETWORK N M Allinson and D Merritt 1 Introduction This contribution has two main sections. The first discusses some aspects of multilayer perceptrons,
Evaluation of Feature Selection Methods for Predictive Modeling Using Neural Networks in Credits Scoring
714 Evaluation of Feature election Methods for Predictive Modeling Using Neural Networks in Credits coring Raghavendra B. K. Dr. M.G.R. Educational and Research Institute, Chennai-95 Email: [email protected]
Automatic Detection of PCB Defects
IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 6 November 2014 ISSN (online): 2349-6010 Automatic Detection of PCB Defects Ashish Singh PG Student Vimal H.
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Neural network software tool development: exploring programming language options
INEB- PSI Technical Report 2006-1 Neural network software tool development: exploring programming language options Alexandra Oliveira [email protected] Supervisor: Professor Joaquim Marques de Sá June 2006
Keywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
Steven C.H. Hoi School of Information Systems Singapore Management University Email: [email protected]
Steven C.H. Hoi School of Information Systems Singapore Management University Email: [email protected] Introduction http://stevenhoi.org/ Finance Recommender Systems Cyber Security Machine Learning Visual
A Neural Network Based System for Intrusion Detection and Classification of Attacks
A Neural Network Based System for Intrusion Detection and Classification of Attacks Mehdi MORADI and Mohammad ZULKERNINE Abstract-- With the rapid expansion of computer networks during the past decade,
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches
Modelling, Extraction and Description of Intrinsic Cues of High Resolution Satellite Images: Independent Component Analysis based approaches PhD Thesis by Payam Birjandi Director: Prof. Mihai Datcu Problematic
Handwritten Signature Verification using Neural Network
Handwritten Signature Verification using Neural Network Ashwini Pansare Assistant Professor in Computer Engineering Department, Mumbai University, India Shalini Bhatia Associate Professor in Computer Engineering
Robust Real-Time Face Detection
Robust Real-Time Face Detection International Journal of Computer Vision 57(2), 137 154, 2004 Paul Viola, Michael Jones 授 課 教 授 : 林 信 志 博 士 報 告 者 : 林 宸 宇 報 告 日 期 :96.12.18 Outline Introduction The Boost
Open Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to [email protected] The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network
Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the
How To Predict Web Site Visits
Web Site Visit Forecasting Using Data Mining Techniques Chandana Napagoda Abstract: Data mining is a technique which is used for identifying relationships between various large amounts of data in many
Neural Network Add-in
Neural Network Add-in Version 1.5 Software User s Guide Contents Overview... 2 Getting Started... 2 Working with Datasets... 2 Open a Dataset... 3 Save a Dataset... 3 Data Pre-processing... 3 Lagging...
NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.)
Revised 5/2010 NOVA COLLEGE-WIDE COURSE CONTENT SUMMARY ITE 115 - INTRODUCTION TO COMPUTER APPLICATIONS & CONCEPTS (3 CR.) Course Description Covers computer concepts and Internet skills and uses a software
Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition
Synthetic Aperture Radar: Principles and Applications of AI in Automatic Target Recognition Paulo Marques 1 Instituto Superior de Engenharia de Lisboa / Instituto de Telecomunicações R. Conselheiro Emídio
Adaptive Face Recognition System from Myanmar NRC Card
Adaptive Face Recognition System from Myanmar NRC Card Ei Phyo Wai University of Computer Studies, Yangon, Myanmar Myint Myint Sein University of Computer Studies, Yangon, Myanmar ABSTRACT Biometrics is
Neural Networks and Back Propagation Algorithm
Neural Networks and Back Propagation Algorithm Mirza Cilimkovic Institute of Technology Blanchardstown Blanchardstown Road North Dublin 15 Ireland [email protected] Abstract Neural Networks (NN) are important
APPLICATION OF ARTIFICIAL NEURAL NETWORKS USING HIJRI LUNAR TRANSACTION AS EXTRACTED VARIABLES TO PREDICT STOCK TREND DIRECTION
LJMS 2008, 2 Labuan e-journal of Muamalat and Society, Vol. 2, 2008, pp. 9-16 Labuan e-journal of Muamalat and Society APPLICATION OF ARTIFICIAL NEURAL NETWORKS USING HIJRI LUNAR TRANSACTION AS EXTRACTED
Pattern Recognition of Japanese Alphabet Katakana Using Airy Zeta Function
Pattern Recognition of Japanese Alphabet Katakana Using Airy Zeta Function Fadlisyah Department of Informatics Universitas Malikussaleh Aceh Utara, Indonesia Rozzi Kesuma Dinata Department of Informatics
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
A secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
Unconstrained Handwritten Character Recognition Using Different Classification Strategies
Unconstrained Handwritten Character Recognition Using Different Classification Strategies Alessandro L. Koerich Department of Computer Science (PPGIA) Pontifical Catholic University of Paraná (PUCPR) Curitiba,
Face detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
Neural Network Approach to Web Application Protection
Neural Network Approach to Web Application Protection Jane Jaleel Stephan, Sahab Dheyaa Mohammed, and Mohammed Khudhair Abbas Abstract The rapid growth of internet has created many services, which have
What is the Right Illumination Normalization for Face Recognition?
What is the Right Illumination Normalization for Face Recognition? Aishat Mahmoud Dan-ali Department of Computer Science and Engineering The American University in Cairo AUC Avenue, P.O. Box 74, New Cairo
A Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource
Identification of File Integrity Requirement through Severity Analysis
Identification of File Integrity Requirement through Severity Analysis Zul Hilmi Abdullah a, Shaharudin Ismail a, Nur Izura Udzir b a Fakulti Sains dan Teknologi, Universiti Sains Islam Malaysia, Bandar
AUTOMATED CLASSIFICATION OF BLASTS IN ACUTE LEUKEMIA BLOOD SAMPLES USING HMLP NETWORK
AUTOMATED CLASSIFICATION OF BLASTS IN ACUTE LEUKEMIA BLOOD SAMPLES USING HMLP NETWORK N. H. Harun 1, M.Y.Mashor 1, A.S. Abdul Nasir 1 and H.Rosline 2 1 Electronic & Biomedical Intelligent Systems (EBItS)
FPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
Neural Networks and Support Vector Machines
INF5390 - Kunstig intelligens Neural Networks and Support Vector Machines Roar Fjellheim INF5390-13 Neural Networks and SVM 1 Outline Neural networks Perceptrons Neural networks Support vector machines
A New Approach For Estimating Software Effort Using RBFN Network
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.7, July 008 37 A New Approach For Estimating Software Using RBFN Network Ch. Satyananda Reddy, P. Sankara Rao, KVSVN Raju,
REVIEW OF HEART DISEASE PREDICTION SYSTEM USING DATA MINING AND HYBRID INTELLIGENT TECHNIQUES
REVIEW OF HEART DISEASE PREDICTION SYSTEM USING DATA MINING AND HYBRID INTELLIGENT TECHNIQUES R. Chitra 1 and V. Seenivasagam 2 1 Department of Computer Science and Engineering, Noorul Islam Centre for
XIV. Title. 2.1 Schematics of the WEP. 21. 2.2 Encryption in WEP technique 22. 2.3 Decryption in WEP technique. 22. 2.4 Process of TKIP 25
XIV LIST OF FIGURES Figure Title Page 2.1 Schematics of the WEP. 21 2.2 Encryption in WEP technique 22 2.3 Decryption in WEP technique. 22 2.4 Process of TKIP 25 2.5 IEEE 802.1x Structure 30 2.6 RSNA Architecture
SYMMETRIC EIGENFACES MILI I. SHAH
SYMMETRIC EIGENFACES MILI I. SHAH Abstract. Over the years, mathematicians and computer scientists have produced an extensive body of work in the area of facial analysis. Several facial analysis algorithms
Vision-based Real-time Driver Fatigue Detection System for Efficient Vehicle Control
Vision-based Real-time Driver Fatigue Detection System for Efficient Vehicle Control D.Jayanthi, M.Bommy Abstract In modern days, a large no of automobile accidents are caused due to driver fatigue. To
Computer Forensics Application. ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification
Computer Forensics Application ebay-uab Collaborative Research: Product Image Analysis for Authorship Identification Project Overview A new framework that provides additional clues extracted from images
An Introduction to Neural Networks
An Introduction to Vincent Cheung Kevin Cannons Signal & Data Compression Laboratory Electrical & Computer Engineering University of Manitoba Winnipeg, Manitoba, Canada Advisor: Dr. W. Kinsner May 27,
