Editorial Notes
NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the ICEMIS 2021Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.
ABSTRACT
The aim of this paper is to develop a new approach for The Statistical Learning Methods in image processing and Facial Recognition using the deep learning techniques in python. In the recent years there have been significant advances in face recognition by using deep neural networks. One of the potential next steps is to develop optimized 3D facial recognition. Shifting from 2D to 3D increases complexity of the problem by adding an- other dimension to data, making possible solutions more resource hungry. We will investigate different depth camera based facial recognition techniques and test their performance by deploying them on an embedded processor. We focus on applications for embedded systems and use a small low-resolution time of flight (ToF) camera with our system to keep overall system portable and compact. All faces images are then projected on the feature space (“face space”) to find the corresponding coordinators. The face space is composed of “Eigenfaces” or “Fisherfaces” which are actually eigenvectors found after doing a matrix composition - Eigen decomposition. At the heart of Eigenface method is the Principal Component Analysis (PCA) - one of the most popular unsupervised learning algorithms - while Fisherface is a better version of the previous one which makes use of both Principal Component Analysis and Linear Discrimination Analysis (LDA) to get more reliable results. The algorithms were realized by Python in Anaconda. Given initial images in the database, the program can detect and recognize the human faces in the provided pictures before saving them in the database to improve the calculation accuracy in the future. After evaluation, the recognition general results are exported on the screen with details included in the text files.
- [1]Dang, L.M.; Hassan, S.I.; Im, S.; Lee, J.; Lee, S.; Moon, H. Deep Learning Based Computer Generated Face Identification Using Convolutional Neural Network. Appl. Sci. 2018, 8, 2610.Google ScholarCross Ref
- [2]Bai, W.; Quan, C.; Luo, Z. Uncertainty Flow Facilitates Zero-Shot Multi-Label Learning in Affective Facial Analysis. Appl. Sci. 2018, 8, 300.Google Scholar
- [3]Kang, S.J. Multi-user identification-based eye-tracking algorithm using position estimation. Sensors 2016, 17, 41.Google Scholar
- [4]Ma, L.; Deng, Z.G. Real-time hierarchical facial performance capture. In Proceedings of the Symposium on Interactive 3D Graphics and Games (ACM), New York, NY, USA, 21–23 May 2019.Google ScholarDigital Library
- [5]Weise, T.; Li, H.; Gool, L.V.; Pauly, M. Face/off: Live facial puppetry. In Proceedings of the SIGGRAPH/Eurographics ACM Symposium on Computer animation, New Orleans, LA, USA, 1–2 August 2009.Google Scholar
- [6]Bouaziz, S.; Li, H.; Pauly, M. Realtime performance-based facial animation. ACM Trans. Graph. 2011, 30, 77.Google Scholar
- [7]Li, H.; Weise, T.; Mark, P.X. Example-based facial rigging. ACM Trans. Graph. 2010, 29, 32.Google ScholarDigital Library
- [8]Li, W.; Deng, Z.G. A practical model for live speech driven lip-sync. IEEE Comput. Graph. Appl. 2014, 35, 70–78.Google Scholar
- [9]Li, H.; Yu, J.H.; Ye, Y.T.; Bregler, C. Realtime facial animation with on-the-fly correctives. ACM Trans. Graph 2013, 32, 42. [CrossRef]Google Scholar
- [10]Ouzounis, C.; Kilias, A.; Mousas, C. Kernel projection of latent structures regression for facial animation retargeting. arXiv 2017, arXiv:1707.09629.Google Scholar
- [11]Ma, L.; Deng, Z. Real-time Facial Expression Transormation for Monocular RGB Video. Comput. Graph. Forum Wiley Online Libr. 2019, 38, 470–481. [CrossRef]Google ScholarCross Ref
- [12]Kaewmart, P.; Markus, B. The shape of the face template: Geometric distortions of faces and their detection in natural scenes. Vis. Res. 2015, 109, 99–106.Google ScholarCross Ref
- [13]Gates, K. (2005). Fast and Accurate Face Recognition Using Support Vector Machines. 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops. 163. 10.1109/CVPR.2005.578.Google Scholar
- [14]Sivaram, M & Porkodi, V & Mohammed, Amin. (2019). DETECTION OF ACCURATE FACIAL DETECTION USING HYBRID DEEP CONVOLUTIONAL RECURRENT NEURAL NETWORK. 09. 1844-1850. 10.21917/ijsc.2019.0256.Google Scholar
- [15]MOREB, Mohammed; MOHAMMED, Tareq Abed; BAYAT, Oguz. A novel software engineering approach toward using machine learning for improving the efficiency of health systems. IEEE Access, 2020, 8: 23169-23178.Google ScholarCross Ref
- [16]MOHAMMED, Tareq Abed, et al. Feature reduction based on hybrid efficient weighted gene genetic algorithms with artificial neural network for machine learning problems in the big data. Scientific Programming, 2018, 2018.Google Scholar
- [17]MOHAMMED, Tareq Abed, et al. Hybrid efficient genetic algorithm for big data feature selection problems. Foundations of Science, 2020, 25.4: 1009-1025.Google Scholar
- [18]MOHAMMED, Tareq Abed, et al. Neural network behavior analysis based on transfer functions MLP & RB in face recognition. In: Proceedings of the First International Conference on Data Science, E-learning and Information Systems. 2018. p. 1-6.Google Scholar
- [19]SAFI, Hayder H.; MOHAMMED, Tareq Abed; AL-QUBBANCHI, Zena Fawzi. Minimize the cost function in multiple objective optimization by using NSGA-II. In: International Conference on Artificial Intelligence on Textile and Apparel. Springer, Cham, 2018. p. 145-152.Google Scholar
- [20]MOHAMMED, Tareq Abed; HAMODI, Yaser Issam; YOUSIR, Naeem Th. Intelligent enhancement of organization work flow and work scheduling using machine learning approach tree algorithm. 2018.Google Scholar
- [21]Aljawarneh, S.A. and Lara, J.A. 2021. Introduction to the special section on recent advancements in big data fusion. Computers and Electrical Engineering. 89, (2021). DOI:https://doi.org/10.1016/j.compeleceng.2020.106900.Google Scholar
- [22]Lara, J.A. et al. 2021. The Paternity of the Modern Computer. Foundations of Science. (2021). DOI:https://doi.org/10.1007/s10699-021-09797-y.Google Scholar
- [23]Rampérez, V. et al. 2021. From SLA to vendor-neutral metrics: An intelligent knowledge-based approach for multi-cloud SLA-based broker. International Journal of Intelligent Systems. (2021). DOI:https://doi.org/10.1002/int.22638.Google ScholarDigital Library
- [24]Mathura Bai, B. et al. 2021. Mathura (MBI)-A novel imputation measure for imputation of missing values in medical datasets. Recent Advances in Computer Science and Communications. 14, 5 (2021), 1358–1369. DOI:https://doi.org/10.2174/2666255813666191216123352.Google Scholar
- [25]Al-Husainy, M.A.F. et al. 2021. Lightweight cryptography system for IoT devices using DNA. Computers and Electrical Engineering. 95, (2021). DOI:https://doi.org/10.1016/j.compeleceng.2021.107418.Google ScholarDigital Library
- [26]Maatuk, A.M. et al. 2021. The COVID-19 pandemic and E-learning: challenges and opportunities from the perspective of students and instructors. Journal of Computing in Higher Education. (2021). DOI:https://doi.org/10.1007/s12528-021-09274-2.Google Scholar
- [27]Mardini, W. et al. 2021. Using Multiple RPL Instances to Enhance the Performance of New 6G and Internet of Everything (6G/IoE)-Based Healthcare Monitoring Systems. Mobile Networks and Applications. 26, 3 (2021), 952–968. DOI:https://doi.org/10.1007/s11036-020-01662-9.Google ScholarCross Ref
- [28]Aljawarneh, S. and Lara, J.A. 2021. Meteorological forecasting based on big data analysis. ACM International Conference Proceeding Series (2021), 9–11.Google ScholarDigital Library
- [29]Aljawarneh, S. and Lara, J.A. 2021. Editorial: Special Issue onQuality Assessment and Management in Big Data-Part i. ACM Transactions on Embedded Computing Systems. 13, 2 (2021). DOI:https://doi.org/10.1145/3449052.Google ScholarDigital Library
- [30]Yassien, M.B. et al. 2021. Routing protocol for low power and lossy network–load balancing time-based. International Journal of Machine Learning and Cybernetics. (2021). DOI:https://doi.org/10.1007/s13042-020-01261-w.Google Scholar
- [31][Qasaimeh, M. et al. 2020. A novel simplified aes algorithm for lightweight real-time applications: Testing and discussion. Recent Advances in Computer Science and Communications. 13, 3 (2020), 435–445. DOI:https://doi.org/10.2174/2213275912666181214152207.Google ScholarCross Ref
- [32]Lara, J.A. et al. 2020. Developing big data projects in open university engineering courses: Lessons learned. IEEE Access. 8, (2020), 22988–23001. DOI:https://doi.org/10.1109/ACCESS.2020.2968969.Google ScholarCross Ref
- [33]Aljawarneh, S.A. 2020. Reviewing and exploring innovative ubiquitous learning tools in higher education. Journal of Computing in Higher Education. 32, 1 (2020), 57–73. DOI:https://doi.org/10.1007/s12528-019-09207-0.Google Scholar
- [34]Aljawarneh, S. et al. 2020. A visual big data system for the prediction of weather-related variables: Jordan-Spain case study. Multimedia Tools and Applications. (2020). DOI:https://doi.org/10.1007/s11042-020-09848-9.Google ScholarDigital Library
- [35]Aljawarneh, S.A. et al. 2020. IEEE Access Special Section Editorial: Machine Learning Designs, Implementations and Techniques. IEEE Access. 8, (2020), 120548–120552. DOI:https://doi.org/10.1109/ACCESS.2020.3005820.Google ScholarCross Ref
- [36]Lara, J.A. et al. 2020. Special issue on the current trends in E-learning Assessment. Journal of Computing in Higher Education. 32, 1 (2020). DOI:https://doi.org/10.1007/s12528-019-09235-w.Google ScholarCross Ref
- [37]Lizcano, D. et al. 2020. Blockchain-based approach to create a model of trust in open and ubiquitous higher education. Journal of Computing in Higher Education. 32, 1 (2020), 109–134. DOI:https://doi.org/10.1007/s12528-019-09209-y.Google ScholarCross Ref
- [38]Meqdadi, O. and Aljawarneh, S. 2020. A study of code change patterns for adaptive maintenance with AST analysis. International Journal of Electrical and Computer Engineering. 10, 3 (2020), 2719–2733. DOI:https://doi.org/10.11591/ijece.v10i3.pp2719-2733.Google Scholar
- [39]Aljawarneh, S.A. and Vangipuram, R. 2020. GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things. Journal of Supercomputing. 76, 6 (2020), 4376–4413. DOI:https://doi.org/10.1007/s11227-018-2397-3.Google ScholarDigital Library
- [40]Vangipuram, R. et al. 2020. Krishna Sudarsana—A Z-Space Interest Measure for Mining Similarity Profiled Temporal Association Patterns. Foundations of Science. 25, 4 (2020), 1027–1048. DOI:https://doi.org/10.1007/s10699-019-09590-y.Google ScholarCross Ref
- [41]Aljawarneh, S.A. et al. 2020. Ultimate: Unearthing Latent Time Profiled Temporal Associations. Foundations of Science. 25, 4 (2020), 1147–1171. DOI:https://doi.org/10.1007/s10699-019-09594-8.Google Scholar
- [42]Vangipuram, R. et al. 2020. Krishna Sudarsana—A Z-Space Interest Measure for Mining Similarity Profiled Temporal Association Patterns. Foundations of Science. 25, 4 (2020). DOI:https://doi.org/10.1007/s10699-019-09590-y.Google ScholarCross Ref
- [43]Aljawarneh, S.A. et al. 2020. VRKSHA: a novel tree structure for time-profiled temporal association mining. Neural Computing and Applications. 32, 21 (2020). DOI:https://doi.org/10.1007/s00521-018-3776-7.Google ScholarDigital Library
- [44]Radhakrishna, V. et al. 2019. ASTRA - A Novel interest measure for unearthing latent temporal associations and trends through extending basic gaussian membership function. Multimedia Tools and Applications. 78, 4 (2019), 4217–4265. DOI:https://doi.org/10.1007/s11042-017-5280-y.Google ScholarDigital Library
- [45]Radhakrishna, V. et al. 2019. Discovery of time profiled temporal patterns. ACM International Conference Proceeding Series (2019).Google Scholar
- [46]Aljawarneh, S. et al. 2019. A recent survey on challenges in security and privacy in internet of things. ACM International Conference Proceeding Series (2019).Google Scholar
- [47]Radhakrishna, V. et al. 2019. Tree based data fusion approach for mining temporal patterns. ACM International Conference Proceeding Series (2019).Google Scholar
- [48]Aljawarneh, S. et al. 2019. An imputation measure for data imputation and disease classification of medical datasets. AIP Conference Proceedings (2019).Google Scholar
- [49]Aljawarneh, S. et al. 2019. Nirnayam - Fusion of iterative rule based decisions to build decision trees for efficient classification. ACM International Conference Proceeding Series (2019).Google Scholar
- [50]Al-Abdi, A. et al. 2019. Using of multiple RPL instances for enhancing the performance of IoT-based systems. ACM International Conference Proceeding Series (2019).Google Scholar
- [51]Mouchili, M.N. et al. 2019. Call data record based big data analytics for smart cities. ACM International Conference Proceeding Series (2019).Google Scholar
- [52]Mohammed, T.A. et al. 2019. Big data challenges and achievements: Applications on smart cities and energy sector. ACM International Conference Proceeding Series (2019).Google Scholar
- [53]Meqdadi, O. and Aljawarneh, S. 2019. Bug types fixed by api-migration: A case study. ACM International Conference Proceeding Series (2019).Google ScholarDigital Library
- [54]Meqdadi, O. and Aljawarneh, S. 2019. A study of code change patterns for adaptive maintenance with AST analysis. International Journal of Electrical and Computer Engineering. 10, 3 (2019). DOI:https://doi.org/10.11591/ijece.v10i3.pp2719-2733.Google Scholar
- [55]Kalpana, G. et al. 2018. Shifted Adaption Homomorphism Encryption for Mobile and Cloud Learning. Computers and Electrical Engineering. 65, (2018), 178–195. DOI:https://doi.org/10.1016/j.compeleceng.2017.05.022.Google ScholarCross Ref
- [56]Aljawarneh, S.A. et al. 2018. Finding similar patterns in time stamped temporal datasets. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 (2018), 1–5.Google Scholar
- [57]Aljawarneh, S.A. 2018. Formulating models to survive multimedia big content from integrity violation. Journal of Ambient Intelligence and Humanized Computing. (2018). DOI:https://doi.org/10.1007/s12652-018-1090-y.Google Scholar
- [58]Radhakrishna, V. et al. 2018. Design and analysis of a novel temporal dissimilarity measure using Gaussian membership function. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 (2018), 1–5.Google Scholar
- [59]Aljawarneh, S.A. et al. 2018. Extending the Gaussian membership function for finding similarity between temporal patterns. Proceedings - 2017 International Conference on Engineering and MIS, ICEMIS 2017 (2018), 1–6.Google Scholar
- [60]Aljawarneh, S. et al. 2018. A multithreaded programming approach for multimedia big data: Encryption system. Multimedia Tools and Applications. 77, 9 (2018), 10997–11016. DOI:https://doi.org/10.1007/s11042-017-4873-9.Google ScholarDigital Library
- [61]Esposito, C. et al. 2018. Securing collaborative deep learning in industrial applications within adversarial scenarios. IEEE Transactions on Industrial Informatics. 14, 11 (2018), 4972–4981. DOI:https://doi.org/10.1109/TII.2018.2853676.Google ScholarCross Ref
- [62]Mouchili, M.N. et al. 2018. Smart city data analysis. ACM International Conference Proceeding Series (2018).Google Scholar
- [63]Nagaraja, A. et al. 2018. Pareeksha - A machine learning approach for intrusion and anomaly detection. ACM International Conference Proceeding Series (2018).Google Scholar
- [64]Muslmani, B.K. et al. 2018. Reducing integration complexity of cloud-based ERP systems. ACM International Conference Proceeding Series (2018).Google Scholar
- [65]Dabowsa, N.I.A. et al. 2018. A hybrid intelligent system for skin disease diagnosis. Proceedings of 2017 International Conference on Engineering and Technology, ICET 2017 (2018).Google Scholar
- [66]Meddeb, O. et al. 2017. Hybrid modelling of an off line Arabic handwriting recognition system: results and evaluation. International Journal of Intelligent Enterprise. 4, 1–2 (2017), 168–189. DOI:https://doi.org/10.1504/IJIE.2017.087017.Google ScholarCross Ref
- [67]Haffar, N. et al. 2017. Pedagogical indexed Arabic text in cloud e-learning system. International Journal of Cloud Applications and Computing (IJCAC). 7, 1 (2017), 32–46.Google Scholar
- [68] Meddeb, O. et al. 2017. Hybrid modelling of an off line Arabic handwriting recognition system: results and evaluation. International Journal of Intelligent Enterprise. 4, 1–2 (2017), 168–189.Google ScholarCross Ref
- [69]Radhakrishna, V. et al. 2017. Optimising business intelligence results through strategic application of software process model. International Journal of Intelligent Enterprise. 4, 1–2 (2017). DOI:https://doi.org/10.1504/IJIE.2017.087013.Google ScholarCross Ref
- [70]Tang, M. et al. 2016. An official publication of the Information Resources Management Association. Journal of Electronic Commerce in Organizations. 14, 1 (2016).Google Scholar
- [71]Imran, A. et al. 2016. Web data amalgamation for security engineering: Digital forensic investigation of open source cloud. Journal of Universal Computer Science. 22, 4 (2016).Google Scholar
- [72] Gunupudi Rajesh Kumar, Nimmala Mangathayaru, Gugulothu Narsimha, “An Approach for Intrusion Detection Using Novel Gaussian Based Kernel Function”, Journal of Universal Computer Science, Volume 22, Issue 4, 2016, pp 589-604 ISSN: 0948-6968Google Scholar
- [73] G. Narsimha Gunupudi Rajesh Kumar, N. Mangathayaru, “Intrusion Detection – A Text Mining Based Approach”, International Journal of Computer Science and Information Security (IJCSIS), Special issue on “Computing Application”, Volume 14, 2016, pp 76-88Google Scholar
- [74] Gunupudi Rajesh Kumar, Nimmala Mangathayaru, Gugulothu Narsimha, and Aravind Cheruvu. 2018. Feature Clustering for Anomaly Detection Using Improved Fuzzy Membership Function. In Proceedings of the Fourth International Conference on Engineering & MIS 2018 (ICEMIS ’18). ACM, New York, NY, USA, Article 35, 9 pages. DOI: https://doi.org/10.1145/3234698.3234733Google ScholarDigital Library
- [75] Gunupudi Rajesh Kumar, Mangathayaru Nimmala, G Narsimha, “A Novel Similarity Measure for Intrusion Detection using Gaussian Function”, Technical Journal of the Faculty of Engineering, TJFE, Volume 39, Issue 2, 2016, pp 173-183Google Scholar
- [76] Rajesh Kumar Gunupudi, Mangathayaru Nimmala, Narsimha Gugulothu, Suresh Reddy Gali, CLAPP: A self constructing feature clustering approach for anomaly detection, Future Generation Computer Systems, Volume 74, 2017, Pages 417-429Google ScholarCross Ref
- [77] Kumar, Gunupudi Rajesh; Mangathayaru, Nimmala; Narsimha, Gugulothu, “A Feature Clustering Based Dimensionality Reduction For Intrusion Detection (FCBDR)”, IADIS International Journal on Computer Science & Information Systems. 2017, Vol. 12 Issue 1, p26-44.Google Scholar
- [78] Vangipuram Radhakrishna; Gunupudi Rajesh Kumar; Shadi Aljawarneh, “Optimising business intelligence results through strategic application of software process model”, Int. J. of Intelligent Enterprise, 2017 Vol.4, No.1/2, pp.128 – 142Google Scholar
- [79] Kumar, G. R., Gugulothu, N., & Nimmala, M. (2019). An Evolutionary Feature Clustering Approach for Anomaly Detection Using Improved Fuzzy Membership Function: Feature Clustering Approach for Anomaly Detection. International Journal of Information Technology and Web Engineering (IJITWE), 14(4), 19-49. doi:10.4018/IJITWE.2019100102Google ScholarCross Ref
- [80] Arun Nagaraja, B Uma Gunupudi Rajesh kumar, UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation, Foundations of Science, 2019, https://doi.org/10.1007/s10699-019-09589-5Google Scholar
- [81] Vangipuram Radhakrishna, Gunupudi Rajesh Kumar, Shadi Aljawarneh, “Optimising business intelligence results through strategic application of software process model”, International Journal of Intelligent Enterprise, Jan 2017, Vol. 4, Issue 1-2, pp. 128-142Google Scholar
- [82] Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. An approach for Intrusion Detection using Text Mining Techniques. In Proceedings of the The International Conference on Engineering & MIS 2015 (ICEMIS ’15). ACM, New York, NY, USA,, Article 63, 6 pages. DOI: http://dx.doi.org/10.1145/2832987.2833076Google ScholarDigital Library
- [83] Vangipuram Radhakrishna, Gunupudi Rajesh Kumar, and Shadi Aljawarneh. 2015. Strategic Application of Software Process Model to Optimize Business Intelligence Results. In Proceedings of the The International Conference on Engineering & MIS 2015 (ICEMIS ’15). ACM, New York, NY, USA,, Article 44, 6 pages. DOI: http://dx.doi.org/10.1145/2832987.2833053Google ScholarDigital Library
- [84] Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. Intrusion Detection Using Text Processing Techniques: A Recent Survey. In Proceedings of the The International Conference on Engineering & MIS 2015 (ICEMIS ’15). ACM, New York, NY, USA,, Article 55, 6 pages. DOI: http://dx.doi.org/10.1145/2832987.2833067Google ScholarDigital Library
- [85] Gunupudi Rajesh Kumar, N. Mangathayaru, and G. Narasimha. 2015. An improved k-Means Clustering algorithm for Intrusion Detection using Gaussian function. In Proceedings of the The International Conference on Engineering & MIS 2015 (ICEMIS ’15). ACM, New York, NY, USA,, Article 69, 7 pages. DOI: http://dx.doi.org/10.1145/2832987.2833082Google ScholarDigital Library
- [86] G. R. Kumar, N. Mangathayaru and G. Narsimha, ”An approach for intrusion detection using fuzzy feature clustering,” 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, 2016, pp. 1-8. doi: 10.1109/ICEMIS.2016.7745345Google ScholarCross Ref
- [87] N. Mangathayaru, G. R. Kumar and G. Narsimha, ”Text mining based approach for intrusion detection,” 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, 2016, pp. 1-5. doi: 10.1109/ICEMIS.2016.7745351Google ScholarCross Ref
- [88] G. R. Kumar, N. Mangathayaru and G. Narsimha, ”Design of novel fuzzy distribution function for dimensionality reduction and intrusion detection,” 2016 International Conference on Engineering & MIS (ICEMIS), Agadir, 2016, pp. 1-6.Google ScholarCross Ref
- [89] Nagaraja, Arun, Gunupudi, Rajesh Kumar, Saravana Kumar, R., Mangathayaru, N., “Optimization of Access Points in Wireless Sensor Network: An Approach towards Security”, Intelligent Systems in Cybernetics and Automation Theory, 2015, Volume 348, pp 299-306Google ScholarCross Ref
- [90] G. R. Kumar, N. Mangathayaru, G. Narsimha and G. S. Reddy, ”Evolutionary approach for intrusion detection,” 2017 International Conference on Engineering & MIS (ICEMIS), Monastir, 2017, pp. 1-6. doi: 10.1109/ICEMIS.2017.8273116Google ScholarCross Ref
- [91] S. A. Aljawarneh, V. RadhaKrishna and G. R. Kumar, ”A fuzzy measure for intrusion and anomaly detection,” 2017 International Conference on Engineering & MIS (ICEMIS), Monastir, 2017, pp. 1-6. doi: 10.1109/ICEMIS.2017.8273113Google ScholarCross Ref
- [92] Shadi Aljawarneh, Vangipuram Radhakrishna, and Gunupudi Rajesh Kumar. 2019. A recent survey on challenges in security and privacy in internet of things. In Proceedings of the 5th International Conference on Engineering and MIS (ICEMIS ’19). ACM, New York, NY, USA, Article 25, 9 pages. DOI: https://doi.org/10.1145/3330431.3330457Google ScholarDigital Library
Index Terms
- The Statistical Learning Methods In image processing and Facial Recognition
Recommendations
Facial Recognition using Enhanced Facial Features k-Nearest Neighbor (k-NN) for Attendance System
ITCC '20: Proceedings of the 2020 2nd International Conference on Information Technology and Computer CommunicationsThis paper discusses the developments of employee attendance system via face detection and facial recognition, using the enhanced featured supervised learning technique. The main goal of the proposed system, FaceAuth is to uniquely identify a person ...
Facial expression recognition with Convolutional Neural Networks
Facial expression recognition has been an active research area in the past 10 years, with growing application areas including avatar animation, neuromarketing and sociable robots. The recognition of facial expressions is not an easy problem for machine ...
Facial expression recognition using ASM-based post-processing technique
Facial expression recognition is a challenging field in numerous researches, and impacts important applications in many areas such as human-computer interaction and data-driven animation, etc. Therefore, this paper proposes a facial expression ...
Comments