International Journal of Computer Application Issue 5, Volume 1 (Jan.- Feb. 2015) Available online on http://www.rspublication.com/ijca/ijca_index.htm ISSN: 2250-1797
نویسنده
چکیده
The recognition of a person based on biological features are efficient compared with traditional knowledge based recognition system. In this paper we propose Face Recognition using Wrapping Curvelet Transform (FRWCT). The Wrapping Curvelet Transform (WCT) is applied on face images of database and test images to derive coefficients. The obtained coefficient matrix is rearranged to form WCT features of each image. The test image WCT features are compared with database images using Euclidian Distance (ED) to compute Equal Error Rate (EER) and True Success Rate (TSR). The proposed algorithm with WCT performs better than Curvelet Transform algorithms used in [28], [39] and [40].
منابع مشابه
International Journal of Computer Application Issue 4, Volume 6 (Nov.- Dec. 2014) Available online on http://www.rspublication.com/ijca/ijca_index.htm ISSN: 2250-1797
Cloud Computing is growing in real time environment and provides shared resources, information, software packages and other resources as pay per use at specific time. Resources are needed to be equally balanced between various computing processes and to obtain proper utilization of resources load balancing is required. In this paper, various load balancing algorithms are compared on the basis o...
متن کاملInternational Journal of Computer Application Issue 4, Volume 1 (February 2014) Available online on http://www.rspublication.com/ijca/ijca_index.htm ISSN: 2250-1797
By increasing use of computer network and internet using Intrusion Detection System has become more popular. The main drawback of IDS is to generate alert to system administrator based on malicious activities that violates security policies. Recently fuzzy logic plays a vital role in detecting attacks using various rule generation technique. This paper proposed a new concept of using various fu...
متن کاملInternational Journal of Computer Application Issue 3, Volume 2 (April 2013) Available online on http://www.rspublication.com/ijca/ijca_index.htm ISSN: 2250-1797
MANET is wireless mobile ad hoc network, having different routing protocol reactive, proactive and hybrid protocol. Zone Routing Protocol (ZRP) is among one of them, it is hybrid protocol i.e. combination of reactive and proactive routing protocol to maintain valid routing without too much overhead. It use pro-active protocol within a node's local zone and use reactive protocol out of node‟s zo...
متن کاملInternational Journal of Computer Application Issue 4, Volume 4 (July-August 2014) Available online on http://www.rspublication.com/ijca/ijca_index.htm ISSN: 2250-1797
Digital images have been a major form of transmission of visual information, but due to the presence of noise, the image gets corrupted. Thus, processing of the received image needs to be done before being used in an application. Denoising of image involves data manipulation in order to produce a good quality image. This paper introduces a new technique that is formed by hybridizing the thresho...
متن کاملInternational Journal of Computer Application Issue 3, Volume 3 (May-June 2013) Available online on http://www.rspublication.com/ijca/ijca_index.htm ISSN: 2250-1797
In medical image analysis, classification plays an imperative role and the accessible corporeal classification plunge to congregate the requisites. Automatic image classification is emergent thriving research area and contribution diagnostician for malady to ascertain the echelon of malignant cells of brain tumor using artifical intellect Since manual classification is time devastating and best...
متن کامل