An Intelligent handcrafted feature selection using Archimedes optimization algorithm for facial analysis

I Neggaz, H Fizazi - Soft Computing, 2022 - Springer
Human facial analysis (HFA) has recently become an attractive topic for computer vision
research due to technological progress and mobile applications. HFA explores several …

Face gender recognition in the wild: an extensive performance comparison of deep-learned, hand-crafted, and fused features with deep and traditional models

A Althnian, N Aloboud, N Alkharashi, F Alduwaish… - Applied Sciences, 2020 - mdpi.com
Face gender recognition has many useful applications in human–robot interactions as it can
improve the overall user experience. Support vector machines (SVM) and convolutional …

Deep-learning-based adaptive advertising with augmented reality

MA Moreno-Armendáriz, H Calvo, CA Duchanoy… - Sensors, 2021 - mdpi.com
In this work we describe a system composed of deep neural networks that analyzes
characteristics of customers based on their face (age, gender, and personality), as well as …

A robust similarity based deep siamese convolutional neural network for gait recognition across views

ML George, T Govindarajan… - Computational …, 2020 - Wiley Online Library
Gait recognition has been considered as the emerging biometric technology for identifying
the walking behaviors of humans. The major challenges addressed in this article is …

Comparative study of distributed deep learning tools on supercomputers

X Du, D Kuang, Y Ye, X Li, M Chen, Y Du… - … and Architectures for …, 2018 - Springer
With the growth of the scale of data set and neural networks, the training time is increasing
rapidly. Distributed parallel training has been proposed to accelerate deep neural network …

A review of content-based video retrieval techniques for person identification

SSA Ridzuan, Z Omar, UU Sheikh - ELEKTRIKA-Journal of …, 2019 - elektrika.utm.my
The rise of technology spurs the advancement in the surveillance field. Many commercial
spaces reduced the patrol guard in favor of Closed-Circuit Television (CCTV) installation …

[PDF][PDF] CONTROL DE ACCESO A UN CENTRO DE DATOS USANDO TRES MECANISMOS DE SEGURIDAD

VLJ Ignacio, LAM Alberto, SRF Javier, CA José… - itchihuahua.mx
Se presenta un sistema de acceso para un centro de datos usando una tarjeta RFiD, un
lector de huellas digitales y verificación de rostro. El objetivo fue diseñar un sistema …