The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Some challenges of developing face recognition system is to train examples of different poses, illuminations, contrast and background conditions. Even though if the system works okay with the tested data set; it fails big time to perform accurately with new data set with different attributes. This manuscript is focusing on the mentioned problem statement by deploying PCA and implementing the concept...
The paper explains an approach that tries to predict the gestational diabetes of the patient using association rule mining. We address the basic risk factors in Gestational Diabetes Mellitus of pregnant ladies leading to abnormality in delivery and post and pre-delivery conditions. The existing approaches deal with social economy conditions of the GEM patients. Medical examinations records can be...
Pedestrian detection is one of the significant task in any intelligent systems involving video surveillance, since it provides essential information regarding the semantic behavior of pedestrians from video footages. Pedestrian detection along with tracking serves as an obvious extension to automotive applications in design and improvement of safety systems. However, various challenges arise while...
In this digital world, we are facing the flood of data, but depriving for knowledge. The eminent need of mining is useful to extract the hidden pattern from the wide availability of vast amount of data. Clustering is one such useful mining tool to handle this unfavorable situation by carrying out crucial steps refers as cluster analysis. It is the process of a grouping of patterns into clusters based...
Association Rule Mining is a Data Mining technique used to uncover the hidden interesting relationships between item-sets in a large database. Many algorithms have been proposed to find association rules in various fields. In General, values associated with data items need not be the same type in all the databases. Applying a single algorithm for all the types of data items may not feasible. To solve...
Identity management through biometrics provides huge advantage over traditional systems. This paper provides an extensive review of various biometrics technologies. A wide variety of biometric modalities like finger print, palm print, iris, facial features etc. are discussed in detail. Later these modalities are compared using various parameters. We have also discussed various multimodal biometric...
Till date, the community evaluation in the field of scientific collaboration network, have been taken place on an individuals' impact. Very less findings have been done on the community detection and community evaluation considering the acquaintances of co-authors. This paper comprises of network in which the database of author's publications is used. The authors are the nodes and they are connected...
Ransomware has become the most threatening malware which takes out money from their victims by threatening them that they have been caught accessing illegal websites or in other illegitimate activities. Ransomware has not spared even a single operating system. Windows, IOS, Android and even Linux have been attacked by ransomware and none of them was able to protect its users from its threat. Since...
We have presented the real time database management in mobile computing system and supported by mobile computing system. The process of the system including various mobile system those are wireless network, the database management, disconnection.
Enterprises are moving into cloud, so deployment and configuration of virtual machines and application software are becoming highly complex. The solution to this problem is to automate the deployment and configuration using templates. These templates allow the users to specify the information about resource requirements of an application. In this paper, firstly, we present the methods for development...
Public Distribution System is a government-sponsored chain of shops entrusted with the work of distributing basic food and non-food commodities to the needy sections of the society at very cheap prices. It is also an important constituent of the strategy for poverty eradication and is intended to serve as a safety net for the poor people whose number is more than 33 Crores and are nutritionally at...
Nowadays research has explored to extracting auxiliary information from various biometrie techniques such as fingerprints, face, iris, palm, voice etc. This information contains some features like gender, age, beard, mustache, scars, height, hair, skin color, glasses, weight, facial marks, tattoos etc. All this information contributes more and more to identification. The major changes that come across...
Facial Expression Recognition performs a primary role Human computer interaction (HCI) field. The author proposed hybrid approach which performed better in recognizing facial expression. In the paper, the emotions are detected by calculating the feature vector of the input facial image using Hybrid approach and distinguish or classify the features using SVM classifier. The performance of recognition...
The primary objective of this paper is to explore the applicability of sparse representation based classification (SRC), particularly at the fingerprint recognition problem. This paper proposes sparse proximity based fingerprint matching methodology. The sparse representation based classification problem can be solved as representing the test sample in terms of training set with some sparse residual...
Biometrie systems face several limitations like low accuracy, less robustness, low applicability and non-universality which can be minimized by the adoption of Fusion at different levels of Biometric systems. Fusion can be applied at sensor level, features level, score level as well as decision level. In this paper, we have compared the performance of a Face Recognition system without fusion and with...
In this paper we describe a unique video database which consists of the real life moments of people and objects, captured under various illumination conditions and camera positions. We have classified all the videos of our database into six categories, out of which four categories are based on the movements of camera and objects (captured by the camera). The remaining categories of the database are...
In the last 57 years, face biometrie researchers have achieved many successes. Face recognition systems have been extensively used in government as well as commercial applications such as mobile, banking and surveillance systems etc. In the last 10 years, the whole biometric community such as researchers, developers, and retailers have worked on challenging tasks to develop a more accurate protection...
A facial expression is exhibited by the movement of muscles underneath the face skin. Automatic Facial Expression Recognition comprises of three main phases: Feature Extraction, Feature Selection and Expression Classification. Facial Expression Recognition (FER) has a very important role in computer vision, human machine interaction and modern gaming. The objective of this research work is to explore...
Internet of things (IoT) has provided a technological platform for purposeful connectivity. IoT allows smart devices and sensors to sense, connect and control the devices even remotely. The development in the field of Internet of Things has been enormous and the application of these solutions is scalable to high limits. The quantum of Internet of Things (IoT) is developing fast and is predicted to...
The next technological disruption in the field of Internet of Things (IoT) is the predictive analytics on IoT. The predictive analytics on IoT not only helps us in achieving the goal of smart IoT devices but also reduces the time required to configure the IOT appliances. The branch of predictive analytics came into existence very recently after extensive research in the field of Data Analytics. Although...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.