Tuesday, January 28, 2020

Face Recognition Using PCA Algorithm

Face Recognition Using PCA Algorithm Bollini Lokesh, Abhishek Nallamothu, Mr.S.Planiappan ABSTRACT Day by day technology is changing and way of securing and automation is also trending. Facial recognition (or face recognition) is a type of biometric software application that can identify a specific individual in a digital image by analyzing and comparing patterns. Facial recognition systems are commonly used for security purposes but are increasingly being used in a variety of other automation applications. In real time, face recognition algorithms deal with large data base. Execution of these face recognition algorithms take high computational power and time on large database. Our objective is to improve speed of face recognition on large data base by using PCA algorithm. The goal of our proposing PCA algorithm is to reduce the dimensionality of the data by mapping the data into a lower dimensionality subspace while retaining as much as possible of the variation present in the original dataset. We formally prove this algorithm on ORL face data base with best precision. Keywords: PCA: Principle Component Analysis, MATLAB: Matrix Laboratory, ORL: Olivetti Research Laboratory INTRODUCTION Facial recognition (or face recognition) is a type of biometric software application that can identify a specific individual in a digital image by analyzing and comparing patterns. Facial recognition systems are commonly used for security purposes but are increasingly being used in a variety of other applications. The Kinect motion gaming system, for example, uses facial recognition to differentiate among players. Currently, a lot of facial recognition development is focused on smartphone applications. Smartphone facial recognition capacities include image tagging and other social networking integration purposes as well as personalized marketing. A research team at Carnegie Mellon has developed a proof-of-concept iPhone app that can take a picture of an individual and within seconds return the individuals name, date of birth and social security number. Facebook uses facial recognition software to help automate user tagging in photographs. Here’s how facial recognition works in Facebook: Each time an individual is tagged in a photograph, the software application stores information about that person’s facial characteristics. When enough data has been collected about a person to identify them, the system uses that information to identify the same face in different photographs, and will subsequently suggest tagging those pictures with that person’s name. Facial recognition software also enhances marketing personalization. For example, billboards have been developed with integrated software that identifies the gender, ethnicity and approximate age of passersby to deliver targeted advertising. The main aim of this project is to improve the computational speed of face recognition by using PCA algorithm. This can be done by reducing the dimensionality of images, while doing computations on images in data base. We propose a PCA algorithm with reduced dimensionality in calculations, and we formally prove this algorithm on ORL face data base of ten different images of each of 40 distinct subjects with best precision. RELATED WORK The proposed face recognition system by using PCA algorithm overcomes certain limitations of the existing face recognition system. It is based on reduction of dimensionality and extracting the dominating features of a set of human faces stored in the database and performing mathematical operations on the values corresponding to them. Hence when a new image is fed into the system for recognition then it will reduce dimensionality of new image and extract the main features to compute and find the distance between the input image and the stored images. Thus, some variations in the new face image to be recognized can be tolerated. When the new image of a person differs from the images of that person stored in the database, the system will be able to recognize the new face and identify who the person is. The proposed system is better mainly due to the use of facial features rather than the entire face. Its advantages are in terms of: Recognition accuracy and better discriminatory power Computational cost because of reduction in dimensionality and removing of noise from data set Concentrating on main features require less processing to train the PCA. Because of the use of dominant features and hence can be used as an effective means of authentication Principle Component Analysis Principal Components Analysis (PCA) was invented by Karl Pearson in 1901 and is now used in many fields of science. It is a way of identifying patterns in data, and expressing the data in such a way as to highlight their similarities and differences. Since patterns in data can be hard to find in data of high dimension, where the luxury of graphical representation is not available, PCA is a powerful tool for analyzing data. The other main advantage of PCA is that once you have found these patterns in the data, and you compress the data, ie. by reducing the number of dimensions, without much loss of information. The main aim of this project is to improve the computational speed of face recognition by using PCA algorithm. This can be done by reducing the dimensionality of images, while doing computations on images in data base. We propose a PCA algorithm with reduced dimensionality in calculations, and we formally prove this algorithm on ORL face data base of ten different images of each of 40 distinct subjects with best precision. Actually issues arise once performing arts face recognition in a very high-dimensional area (curse of dimensionality). therefore we have a tendency to area unit managing spatiality issues in face recognition performance. important enhancements will be achieved by 1st mapping the information into a lower-dimensional sub-space. Mapping knowledge|of knowledge|of information} into lower dimensional data is feasible by PCA formula. In PCA formula, 1st itll convert all face pictures (N X N pixel) in knowledge base into face vector (N2X1 dimensionality).It hundreds of these face vectors into one matrix (N2X M matrix; here M=number of face pictures in database).It cipher average face vector(N2X1 dimensionality) by doing mean on all face vectors. It calculate normalized face vectors matrix (N2X M dimensionality) by subtracting average face vector from every face vector. It calculate variance matrix to search out out best Eigen|chemist}|chemist} vectors (best Eigen vectors represent best Eigen faces).It calculate signature of image and place it in( M X S dimensionality; here S=number of signatures). PCA converts input image (image for face recognition) into face vector, then it converts into normalized face vector and thereby it verify weight vector of input image. Finally it compare weight vectors and thereby it verify the person. Face recognition bioscience is that the science of programming a laptop to acknowledge a personalitys face. once someone is listed during a face recognition system, a video camera takes a series of snapshots of the face and so represents it by a singular holistic code. once somebody has their face verified by the pc, it captures their current look and compares it with the facial codes already hold on within the system. The faces match, the person receives authorization; otherwise, the person wont be known. the prevailing face recognition system identifies solely static face pictures that just about specifically match with one among the photographs hold on within the information. once this image captured nearly specifically matches with one among the photographs hold on then the person is known and granted access. once this image of someone is significantly totally different, say, in terms of facial features from the photographs of that person that area unit already hold on within the information the system doesnt acknowledge the person and thence access are denied. The existing or ancient face recognition system has some limitations which may  be overcome by adopting new ways of face recognition: The existing system cannot tolerate variations within the new face image. It needs the new image to be nearly specifically matching with one among the photographs within the information which can otherwise end in denial of access for the individual. The performance level of the prevailing system isnt considerable. CONCLUSION The PCA method is an unsupervised technique of learning that is mostly suitable for databases that contain images with no class labels. PCA improve speed of face recognition by mapping higher dimensionality of face image into lower dimensionality. PCA provides best precision in face recognition process. In future we are planning to implement automation in security and automation in attendance by using this algorithm. We will try to get more efficiency and precision by combining this algorithm with other algorithms. We are planning to implement this algorithm for recognizing multi faces by combining this algorithm with other face recognition algorithms. REFERENCES: [1] A.S Syed navaz, T. Dhevi sri Pratap mazumdar â€Å"Face recognition using principle component analysis and neural networks† International Journal of Computer Networking, Wireless and Mobile Communications (IJCNWMC) ISSN 2250-1568 Vol. 3, Issue 1, Mar 2013, 245-256 [2] Lindsay I Smith â€Å"A tutorial on Principal Components Analysis†February 26, 2002 [3] Sasan Karamizadeh, Shahidan M. Abdullah, Azizah A. Manaf, Mazdak Zamani, Alireza Hooman â€Å" An Overview of Principal Component Analysis† Journal of Signal and Information Processing 2013, 4, 173-175 [4] Toshiyuki Sakai, M. Nagao, Takeo Kanade, â€Å"Computer analysis and classification of photographs of human face,† First USA Japan Computer Conference, 1972 [5] Yuille, A. L., Cohen, D. S., and Hallinan, P. W., Feature extraction from faces using deformable templates, Proc. of CVPR, (1989).

Sunday, January 19, 2020

Eulogy for Mother :: Eulogies Eulogy

Eulogy for Mother My mother gave me a very special gift before she left. A gift that I don't need to decide how to pass down & divide evenly to my 3 beautiful children (her grandchildren Jessica, Emily and Julia) A gift that I don't need to worry about keeping on a safe shelf so it doesn't break. My mother (and father) gave me the gift of faith. Anyone who knew my mother knew she always prayed. Over these past few days my brothers and I have discussed this and wondered how many hours during the day she prayed. We've concluded it wasn't how many hours she prayed, but how many minutes during the day she wasn't praying. I'd tell my mom about someone sick in my family, or a friend of mine or my husband Jerry's friends and when I'd talk to her the next day she'd say, "how's so and so doing - I've been praying for them." Over these past few weeks I've realized the power of prayer & the power of my mother's prayers. For I had this special peace before and during this holiday season. I didn't get "holidayitis" as my brothers well know this term. I wasn't stressed out and I kept saying, "there are 12 days of Christmas." This peace allowed us to have such a wonderful Christmas day with my mother and I know she enjoyed it greatly & saw the peace in me. That day was the last time I saw my mother and again, I realize now how her prayers were answered. For how much better does a departure from this worldly existence get by seeing and talking to your family for the last time on Christmas day, speaking her final words to her grandchildren by saying "I love you" for that is how she always said goodbye to them, and in her final moments†¦praying with her beloved husband of 57 years. And look around you now at this church-the celebration of the birth of Christ and everlasting life. Today when I cry I'm not crying for my mother for she always told us "Don't worry about me when I die, I'll be very happy with the Lord.

Saturday, January 11, 2020

Cyber-Bullying Essay

Bullying has become an epidemic that the educational system has been campaigning to cease through the establishment of school wide anti-bullying policies. In recent years the federal government has implemented the National Safe Schools Framework and the Civil Liability Act of 2002, to assist educators with diminishing schoolyard bullying (Campbell 64). Since the development and rise of technological resources, cyber-bullying has expanded the opportunity for the act of bullying to take place; bullying is no longer isolated face to face. Students’ abilities of escaping to a safe haven, away from their harasser, are almost nonexistent. The use of the internet and cellphones has extended the capability of students to be targeted in private places, such as their homes. Due to the extremities and serious effects of cyber-bullying, school policies concerning bullying need to address and incorporate cyber-bullying. † The effects of cyber-bullying on a victim are similar to those effects of school bullying. Mathew Campbell, author of †School Policy Reponses to the Issue of Cyber-Bullying agrees, victims of cyber-bullying expressed feelings of depression and anxiety, thoughts of and attempts of suicide, self-mutilation, lower self-esteem, and a hatred of school (63). It can also be said that these effects can be more severe in cases of cyber-bulling because there is no escape for the victim. The internet and use of cell phones has enabled the harasser to intrude into the victim’s home and eliminate places of security. This has also allowed anonymity of the harasser which in turn, increases the likeliness that cyber-bullying will take place over the confrontational, school yard bullying scenarios. Although the acts of cyber-bullying may not always take place during school hours or on the premises of the school, research shows that there is a direct correlation between cyber-bullying and school yard bullying. After interviewing 20,000 students, it was found that approximately 26% of students are victims of bullying that took place during school hours (Schneider, O’Donnell, Stueve, and Coulter 173). This same research documented that in addition to school bullying, approximately 16% of students are victims of cyber-bullying. When researchers compared students being bullied at school to those being cyber-bullied, it was found that 59% of those victims being cyb er-bullied were also victims of school bullying and 39% of students being bullied at school were also cyber-bullied (Schneider, O’Donnell, Stueve, Coulter 173). It is evident that there is a correspondence between school bullying and cyber-bullying. Currently, most schools have a non-tolerance policy concerning acts of bullying taking place during school hours or on school grounds, but have yet to incorporate the aspect of cyber-bullying. With the use of technology in schools, the act of cyber-bullying is taking place more often in school than just outside of school. The internet use in schools allows students to access social-networking sites, such as Facebook or Twitter, because of their educational purposes, but these sites are some of the origins where harassing comments and intimidating posts are being seen. Along with the internet, the increase in the use of cell phones in school, whether it is against school policy or not, has created another outlet for students to be bullied. These technology sources are eliminating the physical or confrontational aspect of bullying and allowing it to be less visible and easily feasible. Educators are not always aware of what is taking place in schools and less likely to be able to prevent it without victims reporting it, and because there is no policy against cyber-bullying victims are less likely to report it. An educational system’s sole responsibility is to provide a quality education for all students. In doing so, it has taken on the role of creating a safe learning environment which includes preventing students from being harassed and/or intimidated by their peers. Some questions have been raised on whether the jurisdictional boundaries put limitations on what a school may actually do to prevent cyber-bullying without intruding on the legal rights of students. Campbell states, â€Å"Legally a school does not have any responsibility for the care of students within the home†¦ However, a social responsibility of schools is to ensure that their students are cared for beyond that which is legally prescribed† (66). Therefore, any act of bullying that may eventually disrupt a student’s ability to learn or feel comfortable at school, is still the school’s responsibility to prevent. Educators and administrators need to educate students and parents on identifying acts of bullying, as well as the effects of bullying. Parents and students must also be encouraged to report acts of bullying. To ensure that the prevention of cyber-bullying and school yard bullying, the school needs to enforce cyber-bullying rules and set consequences for those who break those rules. The traditional scenario of a child being verbally or physically intimidated in the school yard is no longer the only form of bullying. Technology has opened the doors to a new and less apparent form of harassment. Its emotional and psychological effects are just as severe, if not more lasting. Children have lost the security and comfort of their homes and can no longer escape their harasser. With cyber-bullying being increasingly wide-spread, it is essential that schools incorporate cyber-bullying prevention into their anti-bullying policies. Works Cited Campbell, Matthew. â€Å"School Policy Responses to the Issue of Cyber-Bullying.† Journal of Catholic School Studies 83.2 (2011): 62-69. Print. Schneider, Shari K., Lydia O’Donnell, Ann Stueve, and Robert W. S. Coulter. â€Å"Cyberbullying, School Bullying, and Psychological Distress: A Regional Census of High School Students.† American Journal of Public Health 102.1 (2012): 171-177. Print.

Friday, January 3, 2020

Essay On Internet Privacy - 1658 Words

Internet Privacy: An introduction (Mike Campbell) A famous and often misunderstood quote from Benjamin Franklin says that those who would give up an essential liberty to purchase a small, temporary safety, deserve neither the liberty nor the safety (Wittes, 2015) . This quote is usually used in the opposite of its original intent, according to historical context (Wittes, 2015) but it’s easy to see why it may be misused. The sentiment we likely draw from it is that sacrificing privacy for safety can be a serious risk. Society today is more likely to sacrifice privacy for convenience. Consider the convenience of online shopping, social media, and digital medical records, and you can see the level of convenience we have gained is†¦show more content†¦The Nightingale Pledge is mainly intended for Registered Nurses and states, I will do everything in my power to maintain and elevate the standard of my profession, and will hold in confidence all personal matters committed to my keeping (Nightingale). A person s privacy is a basic right whether in the hospital or not. As a health provider they are the advocate for their patient and being loyal is a must. It is a legal and ethical obligation to patients who depend on others to take care of them (2005). It is so easily taken for granted so all health care providers need to be aware of patient privacy especially nowadays with advancing technology. Health care workers must be diligent when communicating patients personal information over the Internet and always keep in mind that they could be held liable in court if found guilty of violating these delicate rights. Privacy and Data Mining (Trenton Branham) Data mining is the analyzing of large data sets to gather new information. It combines the fields of statistics with computer science to make decisions and info usually used by business. New products to sell and improvements to current ones usually are results from this field. Companies usually have these data sets together on large servers. As you can imagine, this makes it tempting for hackers to get access to. Depending on the type of data, users privacyShow MoreRelatedEssay On Internet Privacy1471 Words   |  6 Pages331531789 IST 618 Summer 2017 online Policy Essay #2 Privacy In today’s world, Privacy and Security comes hand in hand with internet. Technology allows us free speech and freedom of information over the internet, by imposing strict laws and policies regulating the privacy and security of our information. According to Richard Clarke, free expression over the internet and its privacy are two sides of the same coin (Privacy and security(n.d.)). Writing blogs, uploadingRead MorePrivacy on Internet Essay1587 Words   |  7 PagesIII April 1st, 2012 Internet Privacy Essay With the internet gaining such popularity, privacy has become a thing of the past. People have come to accept that strangers can view personal information about them on social networks such as facebook, and companies and the government are constantly viewing peoples’ activity online for a variety of reasons. The government has attempted to help the consumer regain their privacy online by passing the Consumer Internet Privacy Protection Act of 1997Read More Essay on Internet Privacy - Invasion of Privacy on the Internet964 Words   |  4 PagesInvasion of Privacy on the Internet       Invasion of privacy is a serious issue concerning the Internet, as e-mails can be read if not encrypted, and cookies can track a user and store personal information. Lack of privacy policies and employee monitoring threatens security also. Individuals should have the right to protect themselves as much as possible from privacy invasion and shouldnt have to give in to lowered standards of safety being pursued by the government.    EncryptionRead More Internet Privacy Essay2427 Words   |  10 PagesThis essay will discuss the way social networking sites affect the nature and limits of privacy. There are various social networking websites e.g. Facebook, MySpace, Youtube, Twitter, Google Buzz, and many others with various privacy settings and in the past several years billions of people have joined these social networking sites. Social networking sites give their users an easy way to share information about themselves. However, many users are quickly finding that the information they intendRead More Essay on Internet Privacy - Cookies and Privacy on the Internet1385 Words   |  6 PagesCookies: Privacy on the Internet?      Ã‚   Today, many web sites on the internet can use cookies to keep track of passwords and usernames and track the sites a particular user visits (Cookiecentral.com). But, the use of cookies to track users browsing habits is becoming a concern of many internet users. These concerned people are beginning to think of cookies as an invasion of privacy. Companies with web sites can use cookies to track what sites you visit frequently and then select specificRead More Privacy On The Internet Essay1588 Words   |  7 Pages Privacy on the Internet nbsp;nbsp;nbsp;nbsp;nbsp;Ever feel like you are being watched? How about having the feeling like some one is following you home from school? Well that is what it will be like if users do not have the privacy on the Internet they deserve. EPIC (Electronic Privacy Information Center), a advocacy group that has been fighting the Clinton Administration for tougher online consumer protection laws, and other privacy protection agencies have formed to protect the rights andRead More Internet Privacy Essay699 Words   |  3 Pagesabout privacy and security? Im not a criminal or a terrorist. Ive got nothing to hide. These are things that most people think. They also believe the internet is much more secure and that their personal information is only available to them, whereas this is actually quite wrong. There are more reasons to want to protect your privacy than can be named. The important principal is that you have a right to privacy as long as that right is used within the bounds of the law. Seeking privacy shouldRead MoreEssay on Internet Privacy1325 Words   |  6 PagesInternet Privacy It has become a sad and upsetting fact that in today’s society the truth is that the right to one’s privacy in the I.T (information technological) world has become, simply a joke. In an electronic media article â€Å"No place to hide†, written by James Norman, two interesting and debatable questions were raised: ‘Are we witnessing the erosion of the demarcation of public and private spaces brought on by the networked economy and new technology?’ Also, ‘What roles do government, industryRead MoreEssay on Privacy on the Internet1281 Words   |  6 PagesPrivacy is mentioned in the Bill of Rights, but in which amendment does privacy on the Internet fall. In the website â€Å"The Right of Privacy† it says that â€Å"The U.S. Constitution contains no express right to privacy† (n. pag.). Freedom of religion is given to us in the First Amendment. The Fourth Amendment protects you from searches and seizures unless the officials possess a warrant. The Fifth Amendment gives us the right to interpret the first eight amendments in ways that can protect the people.Read More Privacy in the Internet Essay2034 Words   |  9 PagesPrivacy in the Internet How would you feel if I told you that I know almost everything there is to know about you – from your occupation to the brand of toothpaste you use, from your IQ to your culinary tastes, and so on – even though you have never met me, and possibly were not even aware of my existence? Most people would immediately state that they would feel violated, stripped of their individuality. Yet millions of people browse the Net day after day, blissfully ignorant of the fact that