Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "503cde59-fad3-4281-a2d4-ff77cd7c6c8b"}, "_deposit": {"id": "3537", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "3537"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/3537", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Face Recognition for Biometric Security System", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "Biometrics is used for human recognition whichconsists of identification and verification. In anidentification application, the biometric device readsa sample and compares that sample against everyrecord or template in the database. Identificationapplications are common when the goal is to identifycriminals, terrorists, or other particularly throughsurveillance. Personal face recognition is crucial forapplications such as access control, smart cardverification, surveillance, human-computerinteraction, etc. Also, faces are integral to humaninteraction. Manual facial recognition is alreadyused in everyday authentication applications.In this paper, a novel subspace method isproposed for face recognition. A new facerecognition method DiaPCA is based on PCA(principal Component Analysis) and KNN (Kthnearest neighbor classifier). The recognition processconsists of three stages: preprocessing, dimensionreduction by using PCA, and matching of theextracted feature using KNN. Combination ofDiaPCA and KNN is used for improving thecapability of PCA when a few samples of images areavailable. In contrast to standard PCA, DiaPCAdirectly seeks the optimal projective vectors fromdiagonal face images without image-to-vectortransformation. DiaPCA reserves the correlationsbetween variations of rows and those of columns ofimages. DiaPCA is much more accurate than PCA.The motivation of this research is to provide thepersonal identification from the NationalRegistration Card (NRC card)."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_access", "date": [{"dateType": "Available", "dateValue": "2019-07-25"}], "displaytype": "preview", "download_preview_message": "", "file_order": 0, "filename": "psc2010paper (77).pdf", "filesize": [{"value": "172 Kb"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_free", "mimetype": "application/pdf", "size": 172000.0, "url": {"url": "https://meral.edu.mm/record/3537/files/psc2010paper (77).pdf"}, "version_id": "7c94df20-d4fa-4787-bcaa-9d31a5b45487"}]}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Fifth Local Conference on Parallel and Soft Computing", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Wai, Ei Phyo"}, {"subitem_authors_fullname": "Sein, Myint Myint"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2010-12-16"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/1278"}, "item_title": "Face Recognition for Biometric Security System", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000003537", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-25"}, "publish_date": "2019-07-25", "publish_status": "0", "recid": "3537", "relation": {}, "relation_version_is_last": true, "title": ["Face Recognition for Biometric Security System"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Face Recognition for Biometric Security System

http://hdl.handle.net/20.500.12678/0000003537
http://hdl.handle.net/20.500.12678/0000003537
ee77f5b7-830a-440c-b9ce-67c1af0c586b
503cde59-fad3-4281-a2d4-ff77cd7c6c8b
None
Preview
Name / File License Actions
psc2010paper psc2010paper (77).pdf (172 Kb)
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 13:07:10.969058
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL