https://ak3.sarpras.unair.ac.id/assets/rekomendasi/ https://sdm.unpad.ac.id/-/contact/ https://bce.unpad.ac.id/top/ https://pendfisika.ulm.ac.id/wp-content/thai/ https://sapasko.kemenpora.go.id/ https://ak3.sarpras.unair.ac.id/assets/berita/ https://lms.stmik-dci.ac.id/blog/cache/ https://elitbang.depok.go.id/user/sbo/ http://p4m.pnl.ac.id/ https://pastiberaksi.sulselprov.go.id/ https://elitbang.depok.go.id/ https://wonosari.bondowosokab.go.id/pelayanan/ slot gacor situs slot gacor pertanian.bondowosokab.go.id/ https://elitbang.depok.go.id/assets/ https://simaster.wonosobokab.go.id/obc4d/ https://cms-bpsdubm.kemenkumham.go.id/json/ https://elakip2023.slemankab.go.id/modules/obc4d/ https://kinerja.iainambon.ac.id/ https://corinnemartin.com/ https://thedevilsrejects.com/ https://www.ehazira.net/ https://henantwinespirits.com/ https://majormagnetgame.com/ https://grunkamunka.com/ https://villatente.com/ https://exper-tr.com/ https://bkd.iainambon.ac.id/assets/ https://mi.aikom.ac.id/assets/ https://www.gorevdeyukselmesinavi.com.tr/ https://bkad.bengkuluutarakab.go.id/wp-content/themes/ https://compchem.ub.ac.id/ https://pastiberaksi.sulselprov.go.id/sgacor/ https://lihtr.unair.ac.id/assets/ https://geliatairlangga.unair.ac.id/toto/ https://e-kkn.unila.ac.id/assets/ https://simlp2mv2.unm.ac.id/gacor/ https://e-kkn.unila.ac.id/gacor/ https://e-kkn.unila.ac.id/about/ https://pafirembang.com/ https://pafijaktim.org/ https://pafislawi.org/ https://pafilasem.org/ https://dinkes.bondowosokab.go.id/dinkes/x777/ https://guvenlunapark.com/ https://pafikediri.com/
PENGGUNAAN MODEL HIDDEN MARKOV DAN METODE NEURAL NETWORK SEBAGAI PENERAPAN TEKNOLOGI PENGENALAN WAJAH | Hendrawan | ScientiCO : Computer Science and Informatics Journal

PENGGUNAAN MODEL HIDDEN MARKOV DAN METODE NEURAL NETWORK SEBAGAI PENERAPAN TEKNOLOGI PENGENALAN WAJAH

Aria Hendrawan, Basworo Ardi Pramono, Whisnumurti Adhiwibowo

Abstract

The human face recognition system is one of the fields that is quite developed at this time, where applications can be applied in the field of security (security system) such as permission to access room, surveillance (surveillance), as well as the search for individual identities in the police database. The face recognition approach aims to detect faces in 2-dimensional images and sequential images of videos that have many methods such as local, global, and hybrid approaches.  Hidden Model Markov (HMM) is another promising method that works well for images with different lighting variations, facial expressions, and orientations. HMM is a set of statistical models used to characterize signal properties. An artificial neural network-based approach is learned from image examples and relies on techniques from machine learning to find relevant facial image characteristics. The characteristics studied were in the form of discriminant functions (ie non-linear decision surfaces), then used for face recognition. In this study there will be an application to compare Hidden Markov Models and Neural Network Method as a Face Recognition Technology Algorithm Model. 

 

Keywords

Image Processing; Face Recognition; Artificial Intelligence;

Full Text:

PDF

References

[1]. Lu J., Yuan X., and Yahagi T., A method of Face recognition based on Fuzzy c-Means clutering and associated sub-NNs. Proc. IEEE, 18(1), 2007, 150-159.

[2]. Kelly M. D., Visual Identification of People by Computer. Stanford AI Project, Stanford, CA, Technical Report, 1970, AI-130.

[3]. Zhang J., Yan Y., and Lades M., Face Recognition: Eigenfaces, Elastic Matching, and Neural Nets, Proc. IEEE, l.85(9), 1997, 1423-1435.

[4]. Chellappa R., Wilson C.L., and Sirohey S., Human and Machinr Recognition of Faces: A Survey, Proc. IEEE, (83), 1995, 705-741.

[5]. Torres L., Is there any hope for face recognition. Technical University of Catalonia, Spain, 2004, 1-4.

[6]. Kim H. H., Survey paper: Face Detection and Face Recognition. Department of Computer science, University of Saskatchewan, South Korea, 2004, 1-7.

[7]. Zhao W., Chellappa R., and Rosenfeld A., Face recognition: a literature survey. ACM Computing Surveys, 35:399-458, December 2003.

[8]. Nefian A.V., and al et., Hidden markov models for face recognition, In Proceedings, International Conference on Acoustics, Speech and Signal Proceeding, 1998, 2721-2724.

[9]. Turk M. A., and Pentland A. P., Eigenfaces for recognition, Cognitive Neurosci, 3(1), 1991, 71-86.

[10]. Rowley H., Baluja S., and Kanade T., Neural network-based face detection, IEEE Trans. Pattern Anal. Mach. Intell, 20, 1998, 23-38.

[11]. Er M.J., Wu S., Lu J., Toh H.L., Face recognition with radial basis function (RBF) neural networks, IEEE Trans. Neural Net,13, 2002, 697- 710.

[12]. Osuna E., Freund R., Girosi F., Training support vector machines: an application to face detection, in: Proceedings of the IEEE Conference Computer Vision and Pattern Recognition,1997, 130-136.

[13]. Yang F., Paindovoine M., Implementation of an RBF neural network on embedded systems: real-time face tracking and identity verification, IEEE Trans. Neural Network, (14), 2003, 1162-1175.

[14]. Valentin D., Abdi H., O’Toole A.J., and Cottrell G.W., Connectionist models for face processing: a survey, Pattern Recognition, 27, (1994), 1209–1230.

[15]. Moody J., and Darken C.J., Fast learning in network of locallytuned processing units, Neural Computing, vol 1, page 281–294, 1989.

[16]. Girosi F., and Poggio T., Networks and the best approximation property, Biol. Cybern, (63), 1990, 169-176.

[17]. Ranganath S., and Arun K., Face recognition using transform features and neural networks, Pattern Recognition, l 30, 1997, 1615-1622.

Refbacks

  • There are currently no refbacks.