5 research outputs found

    Face Plastic Surgery Recognition Model Based on Neural Network and Meta-Learning Model 

    Get PDF
    Facial recognition is a procedure of verifying a person's identity by using the face, which is considered one of the biometric security methods. However, facial recognition methods face many challenges, such as face aging, wearing a face mask, having a beard, and undergoing plastic surgery, which decreases the accuracy of these methods.This study evaluates the impact of plastic surgery on face recognition models. The motivation for conducting the research in that aspect is because plastic surgery treatments do not only change the shape and texture of any face but also have increased rapidly in this era. This paper proposes a model based on an artificial neural network with model-agnostic meta-learning (ANN-MAML) for plastic surgery face recognition. This study aims to build a framework for face recognition before and after undergoing plastic surgery based on an artificial neural network. Also, the study seeks to clarify the collaboration between facial plastic surgery and facial recognition software to determine the issues. The researchers evaluated the proposed ANN-MAML's performance using the HDA dataset. The experimental results show that the proposed ANN-MAML learning model attained an accuracy of 90% in facial recognition using Rhinoplasty (Nose surgery) images, 91% on Blepharoplasty surgery (Eyelid surgery) images, 94% on Brow lift (Forehead surgery) images, as well as 92% on Rhytidectomy (Facelift) images. Finally, the results of the proposed model were compared with the baseline methods by the researchers, which showed the superiority of the ANN-MAML over the baselines.&nbsp

    A systematic literature review on vision based gesture recognition techniques

    No full text
    Human Computer Interaction (HCI) technologies are rapidly evolving the way we interact with computing devices and adapting to the constantly increasing demands of modern paradigms. One of the most useful tools in this regard is the integration of Human-to-Human Interaction gestures to facilitate communication and expressing ideas. Gesture recognition requires the integration of postures, gestures, face expressions and movements for communicating or conveying certain messages. The aim of this study is to aggregate and synthesize experiences and accumulated knowledge about Vision-Based Recognition (VBR) techniques. The major objective of conducting this Systematic Literature Review (SLR) is to highlight the state-of-the-art in the context of vision-based gesture recognition with specific focus on hand gesture recognition (HGR) techniques and enabling technologies. After a careful systematic selection process, 100 studies relevant to the four research questions were selected. This process was followed by data collection, a detailed analysis, and a synthesis of the selected studies. The results reveal that among the VBR techniques, HGR is a predominant and highly focused area of research. Research focus is also found to be converging towards sign language recognition. Potential applications of HGR techniques include desktop applications, smart environments, entertainment, sign language interpretation, virtual reality and gamification. Although various experimental research efforts have been devoted to gestures recognition, there are still numerous open issues and research challenges in this field. Lastly, considering the results from this SLR, potential future research directions are suggested, including a much needed focus on grammatical interpretation, hybrid approaches, smartphone devices, normalization, and real-life systems

    Optimizing Document Classification: Unleashing the Power of Genetic Algorithms

    No full text
    Many individuals, including researchers, professors, and students, encounter difficulties when searching for scholarly documents, papers, and journals within a specific domain. Consequently, scholars have begun to focus on document classification problem, offering various methods to address this issue. Researchers have utilized diverse data sources, such as citations, metadata, content, and hybrids, in their approaches.In these sources, the meta-data-based approach stands out for research paper classification due to its availability at no cost. Various scholars have employed different metadata parameters of research articles, including the title, abstract, keywords, and general terms, for research paper classification. In this study, we chose four meta-data-based features such as, title, keyword, abstract, and general terms from the SANTOS dataset, which was prepared by ACM. To represent these features numerically, we employed a semantic-based model called BERT instead of the commonly used count-based models. BERT generates a 768-dimensional vector for each record, which introduces significant time complexity during computation. Additionally, our proposed model optimizes the features using a genetic algorithm. Optimal feature selection performances a crucial role in this domain, enhancing the overall accuracy of the document classification system while reducing the time complexity associated with selecting the most relevant features from this large-dimensional space. For classification purposes, we employed GNB and SVM classifiers. The outcomes of our study exposed that the combination of title and keywords outperformed other combinations

    A Comprehensive Analysis of Security-Based Schemes in Underwater Wireless Sensor Networks

    No full text
    Underwater wireless sensor networks (UWSNs) are comprised of sensor nodes that are deployed under the water having limited battery power and other limited resources. Applications of UWSNs include monitoring the quality of the water, mine detection, environment monitoring, military surveillance, disaster prediction, and underwater navigation. UWSNs are more vulnerable to security attacks as compared to their counterparts such as wireless sensor networks (WSNs). The possible attacks in UWSNs can abrupt the operation of entire network. This research work presents the analysis of relevant research done on security-based schemes in UWSNs. The security-based schemes are categorized into five sub-categories. Each technique in each category is analyzed in detail. The major contribution in each security-based scheme along with technique used, possible future research issues and implementation tool are discussed in detail. The open research issues and future trends identified and presented in this research can be further explored by the research community

    Delay optimization in LoRaWAN by employing adaptive scheduling algorithm with unsupervised learning

    No full text
    Low Power Wide Area Network (LPWAN) technologies have been exponentially growing because of the tremendous growth of the Internet of Things (IoT) devices across the globe. Several LPWAN technologies have been utilized by the researchers to address certain issues like increased number of collisions, retransmissions, delay, and energy consumption. However, Long Range Wide Area Network (LoRaWAN) is the most suitable and attractive technology in terms of delay optimization, low cost and efficient energy consumption. The main issue which arises in LoRaWAN is because of its high packet drop rate due to collision. The reason behind this packet drop rate is the MAC scheme known as Pure Aloha used by LoRaWAN for the transmission of the frames. Long Range (LoRa) End Devices (EDs) initiate communication with Pure Aloha that leads to a high number of retransmissions. These retransmissions further enhance the delay in LoRa networks. This paper aims to optimize the delay in LoRaWAN by using an Adaptive Scheduling Algorithm (ASA) with an unsupervised probabilistic approach called Gaussian Mixture Model (GMM). By using ASA with GMM, the retransmissions are reduced which optimizes the delay in LoRaWAN. The results show that in our approach, Packet Collision Rate (PCR) is reduced by 39% as compared to conventional LoRaWAN. In addition, the Packet Success Ratio (PSR) is also increased by 39% as compared to the conventional LoRaWAN and Dynamic Priority Scheduling Technique (PST). Further, the delay is optimized by 91% and 79%. This research could be effective for the environments where the critical data of patients need to be sent with optimised retransmissions and minimum delay towards gateways.</p
    corecore