skip to main content
10.1145/3492547.3492656acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicemisConference Proceedingsconference-collections
research-article

The Statistical Learning Methods In image processing and Facial Recognition

Published:14 December 2021Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the ICEMIS 2021Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

ABSTRACT

The aim of this paper is to develop a new approach for The Statistical Learning Methods in image processing and Facial Recognition using the deep learning techniques in python. In the recent years there have been significant advances in face recognition by using deep neural networks. One of the potential next steps is to develop optimized 3D facial recognition. Shifting from 2D to 3D increases complexity of the problem by adding an- other dimension to data, making possible solutions more resource hungry. We will investigate different depth camera based facial recognition techniques and test their performance by deploying them on an embedded processor. We focus on applications for embedded systems and use a small low-resolution time of flight (ToF) camera with our system to keep overall system portable and compact. All faces images are then projected on the feature space (“face space”) to find the corresponding coordinators. The face space is composed of “Eigenfaces” or “Fisherfaces” which are actually eigenvectors found after doing a matrix composition - Eigen decomposition. At the heart of Eigenface method is the Principal Component Analysis (PCA) - one of the most popular unsupervised learning algorithms - while Fisherface is a better version of the previous one which makes use of both Principal Component Analysis and Linear Discrimination Analysis (LDA) to get more reliable results. The algorithms were realized by Python in Anaconda. Given initial images in the database, the program can detect and recognize the human faces in the provided pictures before saving them in the database to improve the calculation accuracy in the future. After evaluation, the recognition general results are exported on the screen with details included in the text files.

References

  1. [1]Dang, L.M.; Hassan, S.I.; Im, S.; Lee, J.; Lee, S.; Moon, H. Deep Learning Based Computer Generated Face Identification Using Convolutional Neural Network. Appl. Sci. 2018, 8, 2610.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2]Bai, W.; Quan, C.; Luo, Z. Uncertainty Flow Facilitates Zero-Shot Multi-Label Learning in Affective Facial Analysis. Appl. Sci. 2018, 8, 300.Google ScholarGoogle Scholar
  3. [3]Kang, S.J. Multi-user identification-based eye-tracking algorithm using position estimation. Sensors 2016, 17, 41.Google ScholarGoogle Scholar
  4. [4]Ma, L.; Deng, Z.G. Real-time hierarchical facial performance capture. In Proceedings of the Symposium on Interactive 3D Graphics and Games (ACM), New York, NY, USA, 21–23 May 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5]Weise, T.; Li, H.; Gool, L.V.; Pauly, M. Face/off: Live facial puppetry. In Proceedings of the SIGGRAPH/Eurographics ACM Symposium on Computer animation, New Orleans, LA, USA, 1–2 August 2009.Google ScholarGoogle Scholar
  6. [6]Bouaziz, S.; Li, H.; Pauly, M. Realtime performance-based facial animation. ACM Trans. Graph. 2011, 30, 77.Google ScholarGoogle Scholar
  7. [7]Li, H.; Weise, T.; Mark, P.X. Example-based facial rigging. ACM Trans. Graph. 2010, 29, 32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8]Li, W.; Deng, Z.G. A practical model for live speech driven lip-sync. IEEE Comput. Graph. Appl. 2014, 35, 70–78.Google ScholarGoogle Scholar
  9. [9]Li, H.; Yu, J.H.; Ye, Y.T.; Bregler, C. Realtime facial animation with on-the-fly correctives. ACM Trans. Graph 2013, 32, 42. [CrossRef]Google ScholarGoogle Scholar
  10. [10]Ouzounis, C.; Kilias, A.; Mousas, C. Kernel projection of latent structures regression for facial animation retargeting. arXiv 2017, arXiv:1707.09629.Google ScholarGoogle Scholar
  11. [11]Ma, L.; Deng, Z. Real-time Facial Expression Transormation for Monocular RGB Video. Comput. Graph. Forum Wiley Online Libr. 2019, 38, 470–481. [CrossRef]Google ScholarGoogle ScholarCross RefCross Ref
  12. [12]Kaewmart, P.; Markus, B. The shape of the face template: Geometric distortions of faces and their detection in natural scenes. Vis. Res. 2015, 109, 99–106.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13]Gates, K. (2005). Fast and Accurate Face Recognition Using Support Vector Machines. 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. 163. 10.1109/CVPR.2005.578.Google ScholarGoogle Scholar
  14. [14]Sivaram, M & Porkodi, V & Mohammed, Amin. (2019). DETECTION OF ACCURATE FACIAL DETECTION USING HYBRID DEEP CONVOLUTIONAL RECURRENT NEURAL NETWORK. 09. 1844-1850. 10.21917/ijsc.2019.0256.Google ScholarGoogle Scholar
  15. [15]MOREB, Mohammed; MOHAMMED, Tareq Abed; BAYAT, Oguz. A novel software engineering approach toward using machine learning for improving the efficiency of health systems. IEEE Access, 2020, 8: 23169-23178.Google ScholarGoogle ScholarCross RefCross Ref
  16. [16]MOHAMMED, Tareq Abed, et al. Feature reduction based on hybrid efficient weighted gene genetic algorithms with artificial neural network for machine learning problems in the big data. Scientific Programming, 2018, 2018.Google ScholarGoogle Scholar
  17. [17]MOHAMMED, Tareq Abed, et al. Hybrid efficient genetic algorithm for big data feature selection problems. Foundations of Science, 2020, 25.4: 1009-1025.Google ScholarGoogle Scholar
  18. [18]MOHAMMED, Tareq Abed, et al. Neural network behavior analysis based on transfer functions MLP & RB in face recognition. In: Proceedings of the First International Conference on Data Science, E-learning and Information Systems. 2018. p. 1-6.Google ScholarGoogle Scholar
  19. [19]SAFI, Hayder H.; MOHAMMED, Tareq Abed; AL-QUBBANCHI, Zena Fawzi. Minimize the cost function in multiple objective optimization by using NSGA-II. In: International Conference on Artificial Intelligence on Textile and Apparel. Springer, Cham, 2018. p. 145-152.Google ScholarGoogle Scholar
  20. [20]MOHAMMED, Tareq Abed; HAMODI, Yaser Issam; YOUSIR, Naeem Th. Intelligent enhancement of organization work flow and work scheduling using machine learning approach tree algorithm. 2018.Google ScholarGoogle Scholar
  21. [21]Aljawarneh, S.A. and Lara, J.A. 2021. Introduction to the special section on recent advancements in big data fusion. Computers and Electrical Engineering. 89, (2021). DOI:https://doi.org/10.1016/j.compeleceng.2020.106900.Google ScholarGoogle Scholar
  22. [22]Lara, J.A. et al. 2021. The Paternity of the Modern Computer. Foundations of Science. (2021). DOI:https://doi.org/10.1007/s10699-021-09797-y.Google ScholarGoogle Scholar
  23. [23]Rampérez, V. et al. 2021. From SLA to vendor-neutral metrics: An intelligent knowledge-based approach for multi-cloud SLA-based broker. International Journal of Intelligent Systems. (2021). DOI:https://doi.org/10.1002/int.22638.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24]Mathura Bai, B. et al. 2021. Mathura (MBI)-A novel imputation measure for imputation of missing values in medical datasets. Recent Advances in Computer Science and Communications. 14, 5 (2021), 1358–1369. DOI:https://doi.org/10.2174/2666255813666191216123352.Google ScholarGoogle Scholar
  25. [25]Al-Husainy, M.A.F. et al. 2021. Lightweight cryptography system for IoT devices using DNA. Computers and Electrical Engineering. 95, (2021). DOI:https://doi.org/10.1016/j.compeleceng.2021.107418.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26]Maatuk, A.M. et al. 2021. The COVID-19 pandemic and E-learning: challenges and opportunities from the perspective of students and instructors. Journal of Computing in Higher Education. (2021). DOI:https://doi.org/10.1007/s12528-021-09274-2.Google ScholarGoogle Scholar
  27. [27]Mardini, W. et al. 2021. Using Multiple RPL Instances to Enhance the Performance of New 6G and Internet of Everything (6G/IoE)-Based Healthcare Monitoring Systems. Mobile Networks and Applications. 26, 3 (2021), 952–968. DOI:https://doi.org/10.1007/s11036-020-01662-9.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28]Aljawarneh, S. and Lara, J.A. 2021. Meteorological forecasting based on big data analysis. ACM International Conference Proceeding Series (2021), 9–11.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29]Aljawarneh, S. and Lara, J.A. 2021. Editorial: Special Issue onQuality Assessment and Management in Big Data-Part i. ACM Transactions on Embedded Computing Systems. 13, 2 (2021). DOI:https://doi.org/10.1145/3449052.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30]Yassien, M.B. et al. 2021. Routing protocol for low power and lossy network–load balancing time-based. International Journal of Machine Learning and Cybernetics. (2021). DOI:https://doi.org/10.1007/s13042-020-01261-w.Google ScholarGoogle Scholar
  31. [31][Qasaimeh, M. et al. 2020. A novel simplified aes algorithm for lightweight real-time applications: Testing and discussion. Recent Advances in Computer Science and Communications. 13, 3 (2020), 435–445. DOI:https://doi.org/10.2174/2213275912666181214152207.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32]Lara, J.A. et al. 2020. Developing big data projects in open university engineering courses: Lessons learned. IEEE Access. 8, (2020), 22988–23001. DOI:https://doi.org/10.1109/ACCESS.2020.2968969.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33]Aljawarneh, S.A. 2020. Reviewing and exploring innovative ubiquitous learning tools in higher education. Journal of Computing in Higher Education. 32, 1 (2020), 57–73. DOI:https://doi.org/10.1007/s12528-019-09207-0.Google ScholarGoogle Scholar
  34. [34]Aljawarneh, S. et al. 2020. A visual big data system for the prediction of weather-related variables: Jordan-Spain case study. Multimedia Tools and Applications. (2020). DOI:https://doi.org/10.1007/s11042-020-09848-9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35]Aljawarneh, S.A. et al. 2020. IEEE Access Special Section Editorial: Machine Learning Designs, Implementations and Techniques. IEEE Access. 8, (2020), 120548–120552. DOI:https://doi.org/10.1109/ACCESS.2020.3005820.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36]Lara, J.A. et al. 2020. Special issue on the current trends in E-learning Assessment. Journal of Computing in Higher Education. 32, 1 (2020). DOI:https://doi.org/10.1007/s12528-019-09235-w.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37]Lizcano, D. et al. 2020. Blockchain-based approach to create a model of trust in open and ubiquitous higher education. Journal of Computing in Higher Education. 32, 1 (2020), 109–134. DOI:https://doi.org/10.1007/s12528-019-09209-y.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38]Meqdadi, O. and Aljawarneh, S. 2020. A study of code change patterns for adaptive maintenance with AST analysis. International Journal of Electrical and Computer Engineering. 10, 3 (2020), 2719–2733. DOI:https://doi.org/10.11591/ijece.v10i3.pp2719-2733.Google ScholarGoogle Scholar
  39. [39]Aljawarneh, S.A. and Vangipuram, R. 2020. GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things. Journal of Supercomputing. 76, 6 (2020), 4376–4413. DOI:https://doi.org/10.1007/s11227-018-2397-3.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40]Vangipuram, R. et al. 2020. Krishna Sudarsana—A Z-Space Interest Measure for Mining Similarity Profiled Temporal Association Patterns. Foundations of Science. 25, 4 (2020), 1027–1048. DOI:https://doi.org/10.1007/s10699-019-09590-y.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41]Aljawarneh, S.A. et al. 2020. Ultimate: Unearthing Latent Time Profiled Temporal Associations. Foundations of Science. 25, 4 (2020), 1147–1171. DOI:https://doi.org/10.1007/s10699-019-09594-8.Google ScholarGoogle Scholar
  42. [42]Vangipuram, R. et al. 2020. Krishna Sudarsana—A Z-Space Interest Measure for Mining Similarity Profiled Temporal Association Patterns. Foundations of Science. 25, 4 (2020). DOI:https://doi.org/10.1007/s10699-019-09590-y.Google ScholarGoogle ScholarCross RefCross Ref
  43. [43]Aljawarneh, S.A. et al. 2020. VRKSHA: a novel tree structure for time-profiled temporal association mining. Neural Computing and Applications. 32, 21 (2020). DOI:https://doi.org/10.1007/s00521-018-3776-7.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44]Radhakrishna, V. et al. 2019. ASTRA - A Novel interest measure for unearthing latent temporal associations and trends through extending basic gaussian membership function. Multimedia Tools and Applications. 78, 4 (2019), 4217–4265. DOI:https://doi.org/10.1007/s11042-017-5280-y.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45]Radhakrishna, V. et al. 2019. Discovery of time profiled temporal patterns. ACM International Conference Proceeding Series (2019).Google ScholarGoogle Scholar
  46. [46]Aljawarneh, S. et al. 2019. A recent survey on challenges in security and privacy in internet of things. ACM International Conference Proceeding Series (2019).Google ScholarGoogle Scholar
  47. [47]Radhakrishna, V. et al. 2019. Tree based data fusion approach for mining temporal patterns. ACM International Conference Proceeding Series (2019).Google ScholarGoogle Scholar
  48. [48]Aljawarneh, S. et al. 2019. An imputation measure for data imputation and disease classification of medical datasets. AIP Conference Proceedings (2019).Google ScholarGoogle Scholar
  49. [49]Aljawarneh, S. et al. 2019. Nirnayam - Fusion of iterative rule based decisions to build decision trees for efficient classification. ACM International Conference Proceeding Series (2019).Google ScholarGoogle Scholar
  50. [50]Al-Abdi, A. et al. 2019. Using of multiple RPL instances for enhancing the performance of IoT-based systems. ACM International Conference Proceeding Series (2019).Google ScholarGoogle Scholar
  51. [51]Mouchili, M.N. et al. 2019. Call data record based big data analytics for smart cities. ACM International Conference Proceeding Series (2019).Google ScholarGoogle Scholar
  52. [52]Mohammed, T.A. et al. 2019. Big data challenges and achievements: Applications on smart cities and energy sector. ACM International Conference Proceeding Series (2019).Google ScholarGoogle Scholar
  53. [53]Meqdadi, O. and Aljawarneh, S. 2019. Bug types fixed by api-migration: A case study. ACM International Conference Proceeding Series (2019).Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54]Meqdadi, O. and Aljawarneh, S. 2019. A study of code change patterns for adaptive maintenance with AST analysis. International Journal of Electrical and Computer Engineering. 10, 3 (2019). DOI:https://doi.org/10.11591/ijece.v10i3.pp2719-2733.Google ScholarGoogle Scholar
  55. [55]Kalpana, G. et al. 2018. Shifted Adaption Homomorphism Encryption for Mobile and Cloud Learning. Computers and Electrical Engineering. 65, (2018), 178–195. DOI:https://doi.org/10.1016/j.compeleceng.2017.05.022.Google ScholarGoogle ScholarCross RefCross Ref
  56. [56]Aljawarneh, S.A. et al. 2018. Finding similar patterns in time stamped temporal datasets. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 (2018), 1–5.Google ScholarGoogle Scholar
  57. [57]Aljawarneh, S.A. 2018. Formulating models to survive multimedia big content from integrity violation. Journal of Ambient Intelligence and Humanized Computing. (2018). DOI:https://doi.org/10.1007/s12652-018-1090-y.Google ScholarGoogle Scholar
  58. [58]Radhakrishna, V. et al. 2018. Design and analysis of a novel temporal dissimilarity measure using Gaussian membership function. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 (2018), 1–5.Google ScholarGoogle Scholar
  59. [59]Aljawarneh, S.A. et al. 2018. Extending the Gaussian membership function for finding similarity between temporal patterns. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 (2018), 1–6.Google ScholarGoogle Scholar
  60. [60]Aljawarneh, S. et al. 2018. A multithreaded programming approach for multimedia big data: Encryption system. Multimedia Tools and Applications. 77, 9 (2018), 10997–11016. DOI:https://doi.org/10.1007/s11042-017-4873-9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  61. [61]Esposito, C. et al. 2018. Securing collaborative deep learning in industrial applications within adversarial scenarios. IEEE Transactions on Industrial Informatics. 14, 11 (2018), 4972–4981. DOI:https://doi.org/10.1109/TII.2018.2853676.Google ScholarGoogle ScholarCross RefCross Ref
  62. [62]Mouchili, M.N. et al. 2018. Smart city data analysis. ACM International Conference Proceeding Series (2018).Google ScholarGoogle Scholar
  63. [63]Nagaraja, A. et al. 2018. Pareeksha - A machine learning approach for intrusion and anomaly detection. ACM International Conference Proceeding Series (2018).Google ScholarGoogle Scholar
  64. [64]Muslmani, B.K. et al. 2018. Reducing integration complexity of cloud-based ERP systems. ACM International Conference Proceeding Series (2018).Google ScholarGoogle Scholar
  65. [65]Dabowsa, N.I.A. et al. 2018. A hybrid intelligent system for skin disease diagnosis. Proceedings of 2017 International Conference on Engineering and Technology, ICET 2017 (2018).Google ScholarGoogle Scholar
  66. [66]Meddeb, O. et al. 2017. Hybrid modelling of an off line Arabic handwriting recognition system: results and evaluation. International Journal of Intelligent Enterprise. 4, 1–2 (2017), 168–189. DOI:https://doi.org/10.1504/IJIE.2017.087017.Google ScholarGoogle ScholarCross RefCross Ref
  67. [67]Haffar, N. et al. 2017. Pedagogical indexed Arabic text in cloud e-learning system. International Journal of Cloud Applications and Computing (IJCAC). 7, 1 (2017), 32–46.Google ScholarGoogle Scholar
  68. [68] Meddeb, O. et al. 2017. Hybrid modelling of an off line Arabic handwriting recognition system: results and evaluation. International Journal of Intelligent Enterprise. 4, 1–2 (2017), 168–189.Google ScholarGoogle ScholarCross RefCross Ref
  69. [69]Radhakrishna, V. et al. 2017. Optimising business intelligence results through strategic application of software process model. International Journal of Intelligent Enterprise. 4, 1–2 (2017). DOI:https://doi.org/10.1504/IJIE.2017.087013.Google ScholarGoogle ScholarCross RefCross Ref
  70. [70]Tang, M. et al. 2016. An official publication of the Information Resources Management Association. Journal of Electronic Commerce in Organizations. 14, 1 (2016).Google ScholarGoogle Scholar
  71. [71]Imran, A. et al. 2016. Web data amalgamation for security engineering: Digital forensic investigation of open source cloud. Journal of Universal Computer Science. 22, 4 (2016).Google ScholarGoogle Scholar
  72. [72] Gunupudi Rajesh Kumar, Nimmala Mangathayaru, Gugulothu Narsimha, “An Approach for Intrusion Detection Using Novel Gaussian Based Kernel Function”, Journal of Universal Computer Science, Volume 22, Issue 4, 2016, pp 589-604 ISSN: 0948-6968Google ScholarGoogle Scholar
  73. [73] G. Narsimha Gunupudi Rajesh Kumar, N. Mangathayaru, “Intrusion Detection – A Text Mining Based Approach”, International Journal of Computer Science and Information Security (IJCSIS), Special issue on “Computing Application”, Volume 14, 2016, pp 76-88Google ScholarGoogle Scholar
  74. [74] Gunupudi Rajesh Kumar, Nimmala Mangathayaru, Gugulothu Narsimha, and Aravind Cheruvu. 2018. Feature Clustering for Anomaly Detection Using Improved Fuzzy Membership Function. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 (ICEMIS ’18). ACM, New York, NY, USA, Article 35, 9 pages. DOI: https://doi.org/10.1145/3234698.3234733Google ScholarGoogle ScholarDigital LibraryDigital Library
  75. [75] Gunupudi Rajesh Kumar, Mangathayaru Nimmala, G Narsimha, “A Novel Similarity Measure for Intrusion Detection using Gaussian Function”, Technical Journal of the Faculty of Engineering, TJFE, Volume 39, Issue 2, 2016, pp 173-183Google ScholarGoogle Scholar
  76. [76] Rajesh Kumar Gunupudi, Mangathayaru Nimmala, Narsimha Gugulothu, Suresh Reddy Gali, CLAPP: A self constructing feature clustering approach for anomaly detection, Future Generation Computer Systems, Volume 74, 2017, Pages 417-429Google ScholarGoogle ScholarCross RefCross Ref
  77. [77] Kumar, Gunupudi Rajesh; Mangathayaru, Nimmala; Narsimha, Gugulothu, “A Feature Clustering Based Dimensionality Reduction For Intrusion Detection (FCBDR)”, IADIS International Journal on Computer Science & Information Systems. 2017, Vol. 12 Issue 1, p26-44.Google ScholarGoogle Scholar
  78. [78] Vangipuram Radhakrishna; Gunupudi Rajesh Kumar; Shadi Aljawarneh, “Optimising business intelligence results through strategic application of software process model”, Int. J. of Intelligent Enterprise, 2017 Vol.4, No.1/2, pp.128 – 142Google ScholarGoogle Scholar
  79. [79] Kumar, G. R., Gugulothu, N., & Nimmala, M. (2019). An Evolutionary Feature Clustering Approach for Anomaly Detection Using Improved Fuzzy Membership Function: Feature Clustering Approach for Anomaly Detection. International Journal of Information Technology and Web Engineering (IJITWE), 14(4), 19-49. doi:10.4018/IJITWE.2019100102Google ScholarGoogle ScholarCross RefCross Ref
  80. [80] Arun Nagaraja, B Uma Gunupudi Rajesh kumar, UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation, Foundations of Science, 2019, https://doi.org/10.1007/s10699-019-09589-5Google ScholarGoogle Scholar
  81. [81] Vangipuram Radhakrishna, Gunupudi Rajesh Kumar, Shadi Aljawarneh, “Optimising business intelligence results through strategic application of software process model”, International Journal of Intelligent Enterprise, Jan 2017, Vol. 4, Issue 1-2, pp. 128-142Google ScholarGoogle Scholar
  82. [82] Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. An approach for Intrusion Detection using Text Mining Techniques. In Proceedings of the The International Conference on Engineering & MIS 2015 (ICEMIS ’15). ACM, New York, NY, USA,, Article 63, 6 pages. DOI: http://dx.doi.org/10.1145/2832987.2833076Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. [83] Vangipuram Radhakrishna, Gunupudi Rajesh Kumar, and Shadi Aljawarneh. 2015. Strategic Application of Software Process Model to Optimize Business Intelligence Results. In Proceedings of the The International Conference on Engineering & MIS 2015 (ICEMIS ’15). ACM, New York, NY, USA,, Article 44, 6 pages. DOI: http://dx.doi.org/10.1145/2832987.2833053Google ScholarGoogle ScholarDigital LibraryDigital Library
  84. [84] Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. Intrusion Detection Using Text Processing Techniques: A Recent Survey. In Proceedings of the The International Conference on Engineering & MIS 2015 (ICEMIS ’15). ACM, New York, NY, USA,, Article 55, 6 pages. DOI: http://dx.doi.org/10.1145/2832987.2833067Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. [85] Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. An improved k-Means Clustering algorithm for Intrusion Detection using Gaussian function. In Proceedings of the The International Conference on Engineering & MIS 2015 (ICEMIS ’15). ACM, New York, NY, USA,, Article 69, 7 pages. DOI: http://dx.doi.org/10.1145/2832987.2833082Google ScholarGoogle ScholarDigital LibraryDigital Library
  86. [86] G. R. Kumar, N. Mangathayaru and G. Narsimha, ”An approach for intrusion detection using fuzzy feature clustering,” 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, 2016, pp. 1-8. doi: 10.1109/ICEMIS.2016.7745345Google ScholarGoogle ScholarCross RefCross Ref
  87. [87] N. Mangathayaru, G. R. Kumar and G. Narsimha, ”Text mining based approach for intrusion detection,” 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, 2016, pp. 1-5. doi: 10.1109/ICEMIS.2016.7745351Google ScholarGoogle ScholarCross RefCross Ref
  88. [88] G. R. Kumar, N. Mangathayaru and G. Narsimha, ”Design of novel fuzzy distribution function for dimensionality reduction and intrusion detection,” 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, 2016, pp. 1-6.Google ScholarGoogle ScholarCross RefCross Ref
  89. [89] Nagaraja, Arun, Gunupudi, Rajesh Kumar, Saravana Kumar, R., Mangathayaru, N., “Optimization of Access Points in Wireless Sensor Network: An Approach towards Security”, Intelligent Systems in Cybernetics and Automation Theory, 2015, Volume 348, pp 299-306Google ScholarGoogle ScholarCross RefCross Ref
  90. [90] G. R. Kumar, N. Mangathayaru, G. Narsimha and G. S. Reddy, ”Evolutionary approach for intrusion detection,” 2017 International Conference on Engineering & MIS (ICEMIS), Monastir, 2017, pp. 1-6. doi: 10.1109/ICEMIS.2017.8273116Google ScholarGoogle ScholarCross RefCross Ref
  91. [91] S. A. Aljawarneh, V. RadhaKrishna and G. R. Kumar, ”A fuzzy measure for intrusion and anomaly detection,” 2017 International Conference on Engineering & MIS (ICEMIS), Monastir, 2017, pp. 1-6. doi: 10.1109/ICEMIS.2017.8273113Google ScholarGoogle ScholarCross RefCross Ref
  92. [92] Shadi Aljawarneh, Vangipuram Radhakrishna, and Gunupudi Rajesh Kumar. 2019. A recent survey on challenges in security and privacy in internet of things. In Proceedings of the 5th International Conference on Engineering and MIS (ICEMIS ’19). ACM, New York, NY, USA, Article 25, 9 pages. DOI: https://doi.org/10.1145/3330431.3330457Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The Statistical Learning Methods In image processing and Facial Recognition
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ICEMIS'21: The 7th International Conference on Engineering & MIS 2021
          October 2021
          566 pages
          ISBN:9781450390446
          DOI:10.1145/3492547

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 14 December 2021

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

          Acceptance Rates

          Overall Acceptance Rate215of605submissions,36%
        • Article Metrics

          • Downloads (Last 12 months)42
          • Downloads (Last 6 weeks)3

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format