This website uses cookies to ensure you have the best experience. Learn more

B.1.2. Feature Based Algorithms Analysis

1823 words - 8 pages

Aging is an inevitably process in the development of the body that involve physical changes of various parts of the body. It is characterized by an uncontrolled alteration of various organs and tissue that consequently affect the physical appearance. Facial aging involves a series of bone movements and growths as well as skin transformations that alter the appearance of the face. Other changes include the thinning of the skin and loss of fats underneath it, leading to a loss of skin elasticity. Fat is especially loss below the skin in the cheeks, temples, chin, nose and eye resulting to sunken eye and skeletal appearance. Consequently, the skin texture is altered due to the development of wrinkles as fats can no longer holds on to the skin surface providing cushioning to the skin making its surface smooth. Aging also promotes the re-shaping of certain bones (skeletal bones). Notable change in bone shape is observable on the upper and lower jaw, eye socket and nose.
The development of the body during the aging process does not follow is strict model where the type and rate of changes are constant from person to person. Instead, the rate of these changes varies with person, age, region, life choices (nutrition, stress management, physical activity), genetic and environment. This variation causes the challenge of face recognitions across uncontrolled facial alterations due to the inability to build a universal model that can depict pre- and post-aging appearances of an input face.
PLASTIC SURGERY
Plastic surgery is a medical procedure involving the various types of alteration of the outer appearance of organs through cosmetic and reconstructive procedures. Alterations vary from reconstructive processes (such as altering birth deformities or traumatic injuries) to cosmetic processes such as an increase in an organ size, a modification of an organ shape, a repositioning of an organ or a total removal/replacement of an organ. Some facial plastic surgery procedures include eyelid surgery, laser skin resurfacing, and nose job.
Plastic surgery is becoming more popular and is mostly used to counteract the damages left by aging on the exposed parts of the body, notably, the face. According to the results of the study published in the Archives of Facial Plastic Surgery, the more procedures a patient has, the greater the difference between estimates of their age before and after surgery. The author of the study noted that the effect was "unrelated to the preoperative age of a patient and unaffected by other variables that we investigated".
Plastic surgery is therefore a procedure that redefines a given face at various extents. This redefinition can meet some extremities that render the altered faced unidentifiable to the initial face input by visual inspection. Such extreme alterations pose a challenge on face recognition algorithms which are built to use existing unaltered input about a face to correctly recognize a new input.
POPULAR FACE RECOGNITION...

Find Another Essay On B.1.2. FEATURE-BASED ALGORITHMS ANALYSIS

Face Recognition System Essay

1645 words - 7 pages . 1586–1695, Dec. 2001. [4] J. Lu, K. N. Plataniotis, and A. N. Venetsanopoulos, face recognition using kernel direct discriminant analysis algorithms. IEEE Transactions On Neural Networks, Vol. 14, No. 1, January 2003, 117-126. [5] M. Kirby and L. Sirovich, “Application of Karhunen-Loeve Procedure for the Characterization of Human Faces,” IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 12, no. 1, pp. 103-108, Jan. 1990. [6] B

Enhancements of the software for Time Performance Analysis of Recursive Algorithms

1075 words - 5 pages Introduction Algorithm analysis plays a crucial role in broader computational complexity theory, which provides theoretical estimates for the resources needed by any algorithm that solves a given computational problem. Algorithm analysis provides an insight into reasonable directions of search for efficient algorithms. It can be used in practice to choose an efficient algorithm which leads to better performance. Analyzing the efficiency of an

Face Recognition

548 words - 2 pages Over the last thirty years or so, face recognition is an active research area in computer vision and one of the most successful applications of image analysis and understanding. Different algorithms have been proposed by researchers for solving this problem and many of them are considered as the state of the art. Nowadays, the face recognition problem is not only important in the research area, but it is vital in the commercial applications. A

Clustering: Keeping Malware Out in Android Applications

592 words - 3 pages operating system. To cluster the malware behavior clustering algorithms such as hierarchical and partitioning-based clustering like K-Means or K-Medoids are used. Various clustering algorithms are discussed below: Clustering ensemble is a process to get a better clustering solution from dierent clusters as input. It aggregates clustering solutions obtained by hierarchical and partitional clustering algorithms. The main idea is to rst introduce a sample

Non-negative Patch Alignment Framework

2647 words - 11 pages space and plays an important role in pattern recognition and machine learning. However, the bases obtained by most frequently used dimension reduction algorithms, e.g., principal component analysis (PCA, Hotelling 1933), Fisher linear discriminant analysis (FLDA, Fisher 1936), and manifold learning based algorithms such as Laplacian eigenmaps (LE, Belkin and Niyogi 2002), locally linear embedding (LLE, Roweis et al. 2000), Hessian eigenmaps

FPGA Implementation of Image Processing Architecture for Target Detection

1047 words - 5 pages often can be based on the nature of the problem. When a priori information is not available, the procedure is to compute at every pixel or subregion. The same set of properties that ultimately will be used for the selection of seed and also for the growing process. The implementation of the sub-image block of size 16 x 16, with the maximum of combined normalized feature values of contrast, cluster shade, and cluster prominence (Shigh) is identified

Effective Intrusion Detection System (IDS) with GA based Feature Selection using Data Mining Classification techniques

1096 words - 5 pages measured in bits logarithm has its base 2. (3) where, a is variable value. The above equation calculates Information Gain that training example S obtains from observation that a random variable V takes some value a. B. Genetic algorithm Genetic algorithms (GA) are adaptive heuristic search method based on the idea of natural selection. They are inspired by Darwin’s theory of evolution – “survival of the fittest”. They are

Classifying the Arabic Language Texts Part 2

2847 words - 12 pages oversimplified assumptions, naive Bayes classifiers have worked quite well in many complex real-world situations. In 2004, an analysis of the Bayesian classification problem showed that there are sound theoretical reasons for the apparently implausible efficacy of naive Bayes classifiers Still, a comprehensive comparison with other classification algorithms in 2006 showed that Bayes classification is outperformed by other approaches, such as boosted

Various Brain Tumor Detection Techniques

4541 words - 18 pages value for the threshold T [14]. Threshold-based algorithms can be broadly classified as single-level thresholding and multi-level thresholding categories. Multi-thresholding approach generalizes the image thresholding by finding multiple thresholds which aim to separate multiple objects [15]. For example, the image in Figure 1-a has one object and background. The result of image segmentation is shown in Figure 1-b. Figure 1: Original

Data Mining

1758 words - 7 pages used to calculate k-mer frequencies from three successive windows. The three windows are: (1) window A, from -75 to -26 bp before the polyA site, (2) window B, from -25 to -1 bp before the polyA site, and (3) window C, from 1 to 25 bp after the polyA site. The highly informative k-mer frequencies (HIK) feature vector consisted of cumulated frequencies of all monomer, dimmer, and trimer frequencies for the three regions. This results in 3 regions

What is Cutting Stock?

1289 words - 6 pages ). The main feature of this approach is its ability to fix suitable parameters by analysis and learning of information. Belov et al. (2008) presented two heuristic namely Sequential Value Correct (change knapsack job) (SVC (subKP)) and Bubble Search (bottom-left-right) (BS (BLR)). The coercive rule of SVC proved to perform well in many instances. Zhang, & Chen (2009) gave least waste first heuristic (LWF) based on the position evaluation which is

Similar Essays

Analysis Power Of Computers

1249 words - 5 pages features. After extraction of features, Eigen-features of them are obtained. Then each input feature is transformed to the Eigen space and based on Euclidean distance four similar feature classes provide the best description for the input feature is selected. Efficiency of proposed method is compared with the statistics collected from 29 individuals. The results indicate that the analysis power of computers in many cases is more than human. Keywords

Log Analysis

2121 words - 9 pages messages make it difficult to retrieve correct meaning. b. Log quality and excessive logging can put adverse effect on analysis. c. Sampling based logging can miss out on crucial and rare events. d. Power of analysis is limited by the information in logs [5]. e. A mechanism to distinguish adversary from a legitimate user performing correct operation. 1.2. Introduction to Big Data In 2010, Apache Hadoop defined it as, “Datasets which could not be

Recent Trends In Document Clustering With Evolutionary Based Algorithms

2695 words - 11 pages feature selection methods. The authors are currently working in these directions. Finally, there is a need to incorporate and assess these algorithms with the document clustering applications such as the query expansion and cluster-based browsing. Works Cited 1. Xiao, Y., A Survey of Document Clustering Techniques & Comparison of LDA and moVMF. 2010: p. 2-6. 2. P., I. and G. D.K., A Survey on Different Clustering Algorithms in Data Mining

Preventing Tag Collision In Radio Frequency Identification

3883 words - 16 pages are allowed to choose its Ac value randomly from 0 to Tc. From the discussions, it is observed that ABS can prevent collisions among the staying tags but it cannot prevent the collision caused by staying tags with the arriving tags. In order to solve this problem, the following two algorithms are proposed based on ABS. B. Blocking Algorithms 1) SRB Single Resolution Blocking (SRB) [1], [5] algorithm is based on ABS. The same set of counters