2019
DOI: 10.24086/cuesj.v3n2y2019.pp80-84
|View full text |Cite
|
Sign up to set email alerts
|

Exploiting Wavelet Transform, Principal Component Analysis, Support Vector Machine, and K-Nearest Neighbors for Partial Face Recognition

Abstract: Facial analysis has evolved to be a process of considerable importance due to its consequence on the safety and security, either individually or generally on the society level, especially in personal identification. The paper in hand applies facial identification on a facial image dataset by examining partial facial images before allocating a set of distinctive characteristics to them. Extracting the desired features from the input image is achieved by means of wavelet transform. Principal component analysis i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…In the realm of the governmental problems, it's relied upon to make disarray for competitors and authorities with videos of things they didn't state to diminish their believability. Deep-fake videos can prompt genuine risks surprisingly fast and encourage various perils if not cautious [19]. In the past decade, facial detection has progressed considerably, mainly because of progress on deep learning and CNNs.…”
Section: Methodsmentioning
confidence: 99%
“…In the realm of the governmental problems, it's relied upon to make disarray for competitors and authorities with videos of things they didn't state to diminish their believability. Deep-fake videos can prompt genuine risks surprisingly fast and encourage various perils if not cautious [19]. In the past decade, facial detection has progressed considerably, mainly because of progress on deep learning and CNNs.…”
Section: Methodsmentioning
confidence: 99%
“…Such vulnerabilities lead to weakening the network's security and allowing the attackers to execute several security attacks. http://journals.cihanuniversity.edu.iq/index.php/cuesj CUESJ 2021, 5 (1): [20][21][22][23][24][25][26][27] There are also instances in which the attackers create their controllers as per their set of policies and protocols and trick the network elements through the same. The network elements trust the fake controller as the original and various attacks are executed.…”
Section: Attacks At Controller Layermentioning
confidence: 99%
“…Various tools are now available for the management of the APIs, the execution of the security controls, and the management of the security attacks associated with the SDN traffic. [23,24]…”
Section: Advanced Toolsmentioning
confidence: 99%
“…In this article, we will discuss the current state of AI in the health sector in the United States and its future prospects (Al-Mukhtar, 2003) (William et al, 2022). The use of Artificial Intelligence (AI) in the health sector has seen significant growth in recent years, and the United States is at the forefront of this trend (Alhabib et al, 2019) (Firas & AL-Dabagh, 2017). AI has the potential to revolutionize healthcare by improving patient outcomes, reducing costs, and increasing access to care.…”
Section: Introductionmentioning
confidence: 99%