Version-1 (Jul-Aug 2018)
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Overview of Biometric and Facial Recognition Techniques |
| Country | : | India |
| Authors | : | Omoyiola || Bayo Olushola |
| : | 10.9790/0661-2004010105 ![]() |
Abstract: Security has become a major issue globally and in order to manage the security challenges and reduce the security risks in the world, biometric systems such as face detection and recognition systems have been built. These systems are capable of providing biometric security, crime prevention and video surveillance services because of their inbuilt verification and identification capabilities(Hjelmas & Kee Low, 2001). This has become possible due to technological advancement in the fields of automated face analysis, machine learning and pattern recognition (Wojcik et al, 2016). In the paper, we review some biometric and facial recognition techniques.
Keywords–Biometrics, Face recognition, Face detection, Algorithms, Techniques, System, Verification, Identification, Faces and Image
[1]. Abboud B, Davoine F & Dang M (2004). Facial expression recognition and synthesis based on an appearance model. Signal Processing: Image Communication, 19(8), pp723–740.
[2]. Chunhua S., Paisitkriangkrai S., Zhang J., (2008), Face detection from few training examples. ICIP 15th IEEE International Conference on Image Processing, San Diego, CA, USA, pp. 2764 – 2767, 2008.
[3]. Down M.P, Sands R.J. (2004). Biometrics: An overview of the technology, challenges and control considerations. Information Systems Control Journal, 4 (2004), pp.53-56.
[4]. Guo J.M, Lin C.C., Wu M.F, Chang C.H, Lee H. (2011). Complexity reduced face detection using probability-based face mask prefiltering and pixel-based hierarchical-feature
[5]. Hjelmas E., Kee Low B. (2001). Face detection: A survey. Computer Vision and Image Understanding, 83(2001). pp.236 - 274..
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Bayesian Classification Model in Predicting Tuberculosis Infection |
| Country | : | India |
| Authors | : | Bukola Badeji – Ajisafe |
| : | 10.9790/0661-2004010616 ![]() |
Abstract:Predictive model for predicting Tuberculosis infection risk in individuals who came to receive treatment in Tuberculosis and leprosy centre (TBL) Ado – Ekiti was developed. The risk variables were identified and developed a predictive model based on the idenified factors. Interviewed were conducted with the staff of of TBL centre to identify risk variables, individuals that come for treatments at the TBL centres with one of the risk factors data set were generated which amounted to 699 patients data were preprocessed and 10-fold cross validation technique was used to partition the dataset into training and testing data. The model was developed using machine learning technique (Naïve Bayes' classifiers) and the result show that Naïve Bayes' classifiers was suitable in carrying out the task for predicting risk with minimum 92% accuracy of predictive model. Receiver Operating Characteristics area for the model was also 0.959 showing the level of bias was low.
[1]. Amor, N.B., Beferhat, S. and Elouedi, Z.(2004) Naïve Bayes vs Decision Trees in Intrusion
[2]. Detection Systems, ACM Symposium on Applied Computing, pp. 420 – 424
[3]. Benko, A & Wilson, B. (2003) online decision support gives plans an edge. Managed healthcare executive, Vol. 13 No. 5, p.20
[4]. Christopher, K., Darren, M., William, R.and Fredik, V. (2003) "Bayesian Event classification for intrusion detection", Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC‟03), 2003
[5]. Rupali .R. Patil (2014) Heart Disease Prediction system using Naïve Bayes‟ and Jlinck Mercer Smoothing Kumar V. et al 2007. Robbins basic pathology (8th ed.). Saunders Elsevier. pp. 516–522. ISBN 978-1-4160-2973-1..
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Investigation on Distribution of Nodal Multiplications on T3 Tree |
| Country | : | |
| Authors | : | Guihong Chen || Jianhui Li |
| : | 10.9790/0661-2004011722 ![]() |
Abstract: The article investigates distribution law of node-multiplications of T3 tree that is an important valuated binary tree. It exhibits the multiplication of two nodes of the T3 tree merely distributes in specific range on specific levels of the tree. By intuitive figures the paper makes it easy to know what range of the multiplication is. Mathematical deductions are showed in detail ,which can enhance the theory of valuated binary tree.
[1]. WANG, X. B. Valuated Binary Tree: A New Approach in Study of Integers. International Journal of Scientific and Innovative Mathematical Research, 2016,4(3), 63-67
[2]. WANG, X. B. Amusing Properties of Odd Numbers Derived From Valuated Binary Tree, IOSR Journal of Mathematics, 2016, 12 (6), 53-57
[3]. WANG, X. B. Genetic Traits of Odd Numbers With Applications in Factorization of Integers, Global Journal of Pure and Applied Mathematics, 2017, 13 (2), 493-517
[4]. WANG, X. B. Two More Symmetric Properties of Odd Numbers, IOSR Journal of Mathematics, 2017, 13(3, ver. II), 37-40
[5]. WANG, X. B. T3 Tree and Its Traits in Understanding Integers, Advances in Pure Mathematics, 2018, 8(5),494-507..
