Implementasi deep learning berbasis keras untuk pengenalan wajah
A Santoso, ST Gunawan Ariyanto - 2018 - eprints.ums.ac.id
Sistem pengenalan wajah merupakan aspek penting dalam bidang computer vision yang
mendukung terhadap perkembangan teknologi yang serba canggih seperti era sekarang …
mendukung terhadap perkembangan teknologi yang serba canggih seperti era sekarang …
Host-based misuse intrusion detection using PCA feature extraction and kNN classification algorithms
This paper presents the design and performance evaluation of a host-based misuse
intrusion detection system for the Linux operating system. The proposed system employs a …
intrusion detection system for the Linux operating system. The proposed system employs a …
[PDF][PDF] Improve face recognition rate using different image pre-processing techniques
NH Barnouti - American Journal of Engineering Research (AJER), 2016 - academia.edu
Face recognition become one of the most important and fastest growing area during the last
several years and become the most successful application of image analysis and broadly …
several years and become the most successful application of image analysis and broadly …
Illumination compensation for face recognition using adaptive singular value decomposition in the wavelet domain
Lighting variations are a challenge in face recognition. To overcome this problem, this paper
proposes a novel illumination compensation method called adaptive singular value …
proposes a novel illumination compensation method called adaptive singular value …
Face recognition based on illumination invariant techniques model
HM Maw, SM Thu, MT Mon - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
In modern years, face recognition is becoming popular in many applications in different
areas being video conferencing, security, banking, law requirement, and human-computer …
areas being video conferencing, security, banking, law requirement, and human-computer …
Machine learning for host-based misuse and anomaly detection in UNIX environment
E Aghaei - 2017 - rave.ohiolink.edu
This thesis focuses on three individual studies about intrusion detection systems using
different pre-processing techniques and classifiers on ADFA-LD dataset. ADFA-LD entails …
different pre-processing techniques and classifiers on ADFA-LD dataset. ADFA-LD entails …
[PDF][PDF] Study of face recognition techniques
S Kaushik, RB Dubey, A Madan - International Journal of …, 2014 - researchgate.net
A study of both face recognition and detection techniques is carried out using the algorithms
like Principal Component Analysis (PCA), Kernel Principal Component Analysis (KPCA) …
like Principal Component Analysis (PCA), Kernel Principal Component Analysis (KPCA) …
[PDF][PDF] Pengenalan Wajah Menggunakan Metode Deep Neural Networks Dengan Perpaduan Metode Discrete Wavelet Transform, Stationary Wavelet Transform, Dan …
AL Akbar, C Fatichah, A Saikhu - JUTI J. Ilm. Teknol. Inf, 2020 - repository.its.ac.id
Metode pengenalan identitas dilakukan dengan menggunakan wajah, sidik jari, telapak
tangan, retina mata, atau suara yang umum dikenal dengan metode biometric. Wajah …
tangan, retina mata, atau suara yang umum dikenal dengan metode biometric. Wajah …
Face Recognition Using Deep Neural Networks with The Combination of Discrete Wavelet Transform, Stationary Wavelet Transform, And Discrete Cosine Transform …
AL Akbar, C Fatichah, A Saikhu - Jurnal Ilmiah Teknologi Informasi, 2020 - juti.if.its.ac.id
Personal identification can be done by using face, fingerprint, palm prints, eye's retina, or
voice recognition which commonly called as biometric methods. Face recognition is the most …
voice recognition which commonly called as biometric methods. Face recognition is the most …
Analysis and prototype sequences of face recognition techniques in real-time picture processing
GDK Kishore, M Babureddy - … of the 6th International Conference on FICTA, 2018 - Springer
The present-day implementation and demand of some real-time image processing
applications are to be increased in various recent technologies. Some of these techniques …
applications are to be increased in various recent technologies. Some of these techniques …