SlideShare uma empresa Scribd logo
1 de 4
GLOBALSOFT TECHNOLOGIES 
IEEE PROJECTS & SOFTWARE DEVELOPMENTS 
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE 
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS 
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com 
A Markov Random Field Groupwise Registration 
Framework for Face Recognition 
Abstract 
We have implemented an efficient system to recognize faces from images with 
some near real-time variations. The face recognition cycle starts with the capturing 
of an individual’s face (normally either by still cameras, surveillance cameras or 
web cameras captured pictures). After wards the captured image is manipulated 
using a combination of algorithms and neural network technology to match face 
prints against others stored in a populated back-end database. As comparisons are 
made, the system assigns a value to the comparison using a predetermined 
threshold, a match is declared. This form of face recognition is used today to make 
accurate facial matches. Currently, this technology is being implemented in parks, 
airports, arenas and other popular tourist locations. 
In this paper, we propose a linear approach, called pixel Matching, for face 
recognition. This system “Eigen faces” takes eight points on the face and performs 
some algebraic manipulations to secure a match. Neural Networks is used to 
increase reliability and offer a accurate match. Another form of facial recognition
is survival exponential entropy which uses graphic algorithms to trace points for 
object recognition. 
Existing System 
 Face is a complex multidimensional visual model and developing a 
computational model for face recognition is difficult. 
 Facial recognition systems are computer-based security systems that are able 
to automatically detect and identify human faces. 
 These systems depend on a recognition algorithm. Principal Component 
Analysis (PCA) is a statistical method under the broad title of factor 
analysis. 
 The Trace transform is a very rich representation of an image and in order to 
use it directly for recognition, one has to produce a much simplified version 
of it. 
 This will not yield accurate recognition system. 
 Less accurate 
 It does not deal with biometric characteristics.
Proposed System 
 In this paper, we propose a linear approach, called pixel Matching, for face 
recognition. 
 Another form of facial recognition is survival exponential entropy matching 
which uses graphic algorithms to trace points for object recognition. 
 The transformed probe image is then matched with the gallery images which 
display neutral expression. 
 Neural Networks is used to increase reliability and offer a accurate match 
are used as inputs for positive and negative values variations. 
 New test image is taken for recognition (from test dataset) and its face 
descriptor is calculated from the Eigen faces found before.
SOFTWARE REQUIREMENTS 
 Platform : JAVA (JDK 1.5) 
 Front End : JAVA Swing 
 Back End : MySql 
 IDE : NETBEANS 6.9 
 Operating System : Microsoft Windows 2000 or XP 
HARDWARE REQUIREMENTS 
 Processor : Pentium IV Processor 
 RAM : 512 MB 
 Monitor : 14” VGA COLOR MONITOR 
 Keyboard : 104 Keys 
 Capturing Device : Web cam

Mais conteúdo relacionado

Mais de IEEEFINALSEMSTUDENTSPROJECTS

2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...IEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Boundary cutting for packet classification
2014 IEEE JAVA NETWORKING PROJECT Boundary cutting for packet classification2014 IEEE JAVA NETWORKING PROJECT Boundary cutting for packet classification
2014 IEEE JAVA NETWORKING PROJECT Boundary cutting for packet classificationIEEEFINALSEMSTUDENTSPROJECTS
 
2014 IEEE JAVA NETWORKING PROJECT Automatic test packet generation
2014 IEEE JAVA NETWORKING PROJECT Automatic test packet generation2014 IEEE JAVA NETWORKING PROJECT Automatic test packet generation
2014 IEEE JAVA NETWORKING PROJECT Automatic test packet generationIEEEFINALSEMSTUDENTSPROJECTS
 

Mais de IEEEFINALSEMSTUDENTSPROJECTS (18)

2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
 
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
2014 IEEE DOTNET NETWORKING PROJECT A proximity aware interest-clustered p2p ...
 
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
2014 IEEE JAVA NETWORKING PROJECT Stars a statistical traffic pattern discove...
 
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
2014 IEEE JAVA NETWORKING PROJECT Secure continuous aggregation in wireless s...
 
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
2014 IEEE JAVA NETWORKING PROJECT Secure and efficient data transmission for ...
 
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
 
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
2014 IEEE JAVA NETWORKING PROJECT Qos aware geographic opportunistic routingi...
 
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
2014 IEEE JAVA NETWORKING PROJECT Optimal multicast capacity and delay tradeo...
 
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
2014 IEEE JAVA NETWORKING PROJECT On the excess bandwidth allocation in isp t...
 
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
2014 IEEE JAVA NETWORKING PROJECT Mobile data offloading how much can wi-fi d...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop routing in wireless mesh network...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message Authentication and sourc...
 
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
2014 IEEE JAVA NETWORKING PROJECT Hop by-hop message uthenticationand source ...
 
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
2014 IEEE JAVA NETWORKING PROJECT Fair scheduling in cellular systems in the ...
 
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
2014 IEEE JAVA NETWORKING PROJECT Cost effective resource allocation of overl...
 
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...
2014 IEEE JAVA NETWORKING PROJECT Compactdfa scalable pattern matching usingl...
 
2014 IEEE JAVA NETWORKING PROJECT Boundary cutting for packet classification
2014 IEEE JAVA NETWORKING PROJECT Boundary cutting for packet classification2014 IEEE JAVA NETWORKING PROJECT Boundary cutting for packet classification
2014 IEEE JAVA NETWORKING PROJECT Boundary cutting for packet classification
 
2014 IEEE JAVA NETWORKING PROJECT Automatic test packet generation
2014 IEEE JAVA NETWORKING PROJECT Automatic test packet generation2014 IEEE JAVA NETWORKING PROJECT Automatic test packet generation
2014 IEEE JAVA NETWORKING PROJECT Automatic test packet generation
 

Último

Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solidnamansinghjarodiya
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfNainaShrivastava14
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptJohnWilliam111370
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming languageSmritiSharma901052
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
Industrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsIndustrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsAlirezaBagherian3
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsapna80328
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substationstephanwindworld
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfChristianCDAM
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfBalamuruganV28
 

Último (20)

Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Engineering Drawing section of solid
Engineering Drawing     section of solidEngineering Drawing     section of solid
Engineering Drawing section of solid
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdfPaper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
Paper Tube : Shigeru Ban projects and Case Study of Cardboard Cathedral .pdf
 
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.pptROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
ROBOETHICS-CCS345 ETHICS AND ARTIFICIAL INTELLIGENCE.ppt
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
OOP concepts -in-Python programming language
OOP concepts -in-Python programming languageOOP concepts -in-Python programming language
OOP concepts -in-Python programming language
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
Industrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal CompressorsIndustrial Applications of Centrifugal Compressors
Industrial Applications of Centrifugal Compressors
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
signals in triangulation .. ...Surveying
signals in triangulation .. ...Surveyingsignals in triangulation .. ...Surveying
signals in triangulation .. ...Surveying
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Earthing details of Electrical Substation
Earthing details of Electrical SubstationEarthing details of Electrical Substation
Earthing details of Electrical Substation
 
Ch10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdfCh10-Global Supply Chain - Cadena de Suministro.pdf
Ch10-Global Supply Chain - Cadena de Suministro.pdf
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
CS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdfCS 3251 Programming in c all unit notes pdf
CS 3251 Programming in c all unit notes pdf
 

2014 IEEE JAVA NETWORKING PROJECT A markov random field groupwise registration

  • 1. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmai l.com A Markov Random Field Groupwise Registration Framework for Face Recognition Abstract We have implemented an efficient system to recognize faces from images with some near real-time variations. The face recognition cycle starts with the capturing of an individual’s face (normally either by still cameras, surveillance cameras or web cameras captured pictures). After wards the captured image is manipulated using a combination of algorithms and neural network technology to match face prints against others stored in a populated back-end database. As comparisons are made, the system assigns a value to the comparison using a predetermined threshold, a match is declared. This form of face recognition is used today to make accurate facial matches. Currently, this technology is being implemented in parks, airports, arenas and other popular tourist locations. In this paper, we propose a linear approach, called pixel Matching, for face recognition. This system “Eigen faces” takes eight points on the face and performs some algebraic manipulations to secure a match. Neural Networks is used to increase reliability and offer a accurate match. Another form of facial recognition
  • 2. is survival exponential entropy which uses graphic algorithms to trace points for object recognition. Existing System  Face is a complex multidimensional visual model and developing a computational model for face recognition is difficult.  Facial recognition systems are computer-based security systems that are able to automatically detect and identify human faces.  These systems depend on a recognition algorithm. Principal Component Analysis (PCA) is a statistical method under the broad title of factor analysis.  The Trace transform is a very rich representation of an image and in order to use it directly for recognition, one has to produce a much simplified version of it.  This will not yield accurate recognition system.  Less accurate  It does not deal with biometric characteristics.
  • 3. Proposed System  In this paper, we propose a linear approach, called pixel Matching, for face recognition.  Another form of facial recognition is survival exponential entropy matching which uses graphic algorithms to trace points for object recognition.  The transformed probe image is then matched with the gallery images which display neutral expression.  Neural Networks is used to increase reliability and offer a accurate match are used as inputs for positive and negative values variations.  New test image is taken for recognition (from test dataset) and its face descriptor is calculated from the Eigen faces found before.
  • 4. SOFTWARE REQUIREMENTS  Platform : JAVA (JDK 1.5)  Front End : JAVA Swing  Back End : MySql  IDE : NETBEANS 6.9  Operating System : Microsoft Windows 2000 or XP HARDWARE REQUIREMENTS  Processor : Pentium IV Processor  RAM : 512 MB  Monitor : 14” VGA COLOR MONITOR  Keyboard : 104 Keys  Capturing Device : Web cam