scholarly journals PENERAPAN EIGENFACE UNTUK COMPUTER BASED TEST (CBT) PENERIMAAN MAHASISWA BARU SEKOLAH TINGGI TEKNOLOGI ADISUTJIPTO

Compiler ◽  
2017 ◽  
Vol 6 (2) ◽  
Author(s):  
Haruno Sajati ◽  
Astika Ayuningtyas ◽  
Dwi Kholistyanto

One of the development of computer technology is the availability of systems or applications that help human work everyday so that can be resolved quickly and correctly. The system, one of which is Computer Based Test (CBT). CBT is an application used for tests conducted using computers that are in the application there are some features of CBT security when working on the problem. CBT can use a stand-alone computer, a computer connected to a network or a computer connected to the internet. Facial recognition is a type of biometric application that can identify specific individuals in a digital image by analyzing and developing face patterns. In its implementation, CBT has a weakness in the security system that becomes the gap of CBT users to commit fraud, therefore required a good security system with the creation of CBT applications that use eigenface algorithm. It is necessary to have a security system that overcomes the problem that is required identification of face recognition of participants during the test so that cheating can be reduced. The results of the test using eigenface algorithm accuracy rate reached 82%, some things that affect the level of accuracy is, the intensity of light, facial position and the use of accessories on the face.

2014 ◽  
Vol 971-973 ◽  
pp. 1710-1713
Author(s):  
Wen Huan Wu ◽  
Ying Jun Zhao ◽  
Yong Fei Che

Face detection is the key point in automatic face recognition system. This paper introduces the face detection algorithm with a cascade of Adaboost classifiers and how to configure OpenCV in MCVS. Using OpenCV realized the face detection. And a detailed analysis of the face detection results is presented. Through experiment, we found that the method used in this article has a high accuracy rate and better real-time.


Author(s):  
Noradila Nordin ◽  
Nurul Husna Mohd Fauzi

Attendance marking in a classroom is one of the methods used to track the student’s presence in the lecture. The conventional method that is being enforced has shown to be vulnerable, inaccurate and time-consuming especially in a large classroom. It is difficult to identify absentees and proxy attendees based on the conventional attendance marking method. In order to overcome the challenges faced in the conventional method, a web-based mobile attendance system with facial recognition feature is proposed. It incorporated the existing mobile devices with a camera and the face recognition system to allow the attendance system to be used in classrooms automatically and efficiently with minor implementation requirements. The system prototype received positive responses from the volunteers who tested the system to replace the conventional attendance marking.


2020 ◽  
Vol 39 (3) ◽  
pp. 896-904
Author(s):  
J.A. Popoola ◽  
C.O. Yinka-Banjo

Systems and applications embedded with facial detection and recognition capabilities are founded on the notion that there are differences in face structures among individuals, and as such, we can perform face-matching using the facial symmetry. A widely used application of facial detection and recognition is in security. It is important that the images be processed correctly for computer-based facial recognition, hence, the usage of efficient, cost-effective algorithms and a robust database. This research work puts these measures into consideration and attempts to determine a cost-effective and reliable algorithm out of three algorithms examined. Keywords: Haar-Cascade, PCA, Eigenfaces, Fisherfaces, LBPH, Face Recognition.


Author(s):  
M. Syuib ◽  
Maisarah Maisarah

This research is motivated by the number of internet (Wi-Fi) stealing around Syiah Kuala Sub District, Banda Aceh, in which this action can disserve the owner of the internet and against to the law. The method of this research is qualitative in which it describes the result of research objectively to conditions encountered in the gorund. The research problems are how the Wi-Fi internet is theft (modus operandi) and what are juridical consequences of the act according to Article 30 of Law No. 19/2016 concerning Electronic Information and Transactions, and how is the Islamic law perspective on the act of internet stealing. The result showed that the modus operandi of Wi-Fi internet stealing is by using a laptop or mobile phone and downloading certain software or applications they need to break through the security system and obtain a username and password. Theft or internet (Wi-Fi) stealing in Syiah Kuala District, Banda Aceh City, can be punished under Article 30 paragraph (1), (2) and (3) in conjunction with Article 46 paragraph (1), (2) and (3) Law No. 19/2016 concerning Electronic Information and Transactions. The action categorized as illegal access. The theft of the Wi-Fi internet in Islamic law perspective is clearly prohibited (haram) due to someone has used other people property without permission. So, it is expected that the perpetrators or other people in order not to do the actin because it is against to the law, and also expected the Wi-Fi owner could report the case to the police.


Author(s):  
Amal Seralkhatem Osman Ali ◽  
Vijanth Sagayan Asirvadam ◽  
Aamir Saeed Malik ◽  
Mohamed Meselhy Eltoukhy ◽  
Azrina Aziz

Whilst facial recognition systems are vulnerable to different acquisition conditions, most notably lighting effects and pose variations, their particular level of sensitivity to facial aging effects is yet to be researched. The face recognition vendor test (FRVT) 2012's annual statement estimated deterioration in the performance of face recognition systems due to facial aging. There was about 5% degradation in the accuracies of the face recognition systems for each single year age difference between a test image and a probe image. Consequently, developing an age-invariant platform continues to be a significant requirement for building an effective facial recognition system. The main objective of this work is to address the challenge of facial aging which affects the performance of facial recognition systems. Accordingly, this work presents a geometrical model that is based on extracting a number of triangular facial features. The proposed model comprises a total of six triangular areas connecting and surrounding the main facial features (i.e. eyes, nose and mouth). Furthermore, a set of thirty mathematical relationships are developed and used for building a feature vector for each sample image. The areas and perimeters of the extracted triangular areas are calculated and used as inputs for the developed mathematical relationships. The performance of the system is evaluated over the publicly available face and gesture recognition research network (FG-NET) face aging database. The performance of the system is compared with that of some of the state-of-the-art face recognition methods and state-of-the-art age-invariant face recognition systems. Our proposed system yielded a good performance in term of classification accuracy of more than 94%.


2019 ◽  
Vol 16 (8) ◽  
pp. 3290-3295 ◽  
Author(s):  
M. D. Anto Praveena ◽  
Mohana Krishna Eriki ◽  
Dharma Teja Enjam

Uniqueness or individuality of a person is his face. In this paper, face of an individual is used for the purpose of attendance taking automatically. Maintaining attendance of a student is very important task in all the institutes to check the performance of students. Every institute has its own way for taking attendance. Some of the institutes use paper or file based approach, and some are using methods of automatic attendance taking using biometrics methods which is very time consuming process. There are many methods available for this purpose. Facial recognition may be a unambiguously distinctive or corroboratory an individual by comparison and analysing the patterns supported person’s facial contours. Facial recognition is mostly used for security purposes at so many places. This process can be divided into two phases, processing before recognition where face detection takes place, and afterwards face recognition takes place through feature extraction and matching steps. This system uses the face recognition for taking automatic attendance of students in the classroom without student’s intervention. This attendance is recorded by using a camera that captures images of students and detect the faces after which it compares and faces are detected with the database and mark the attendance for the students. Attendance sheet will be generated and message will be sent to the parents.


Author(s):  
A. BELÉN MORENO ◽  
ÁNGEL SÁNCHEZ ◽  
ENRIQUE FRÍAS-MARTÍNEZ

Automatic face recognition is becoming increasingly important due to the security applications derived from it. Although the facial recognition problem has focused on 2D images, recently, due to the proliferation of 3D scanning hardware, 3D face recognition has become a feasible application. This 3D approach does not need any color information. In this way, it has the following main advantages in comparison to more traditional 2D approaches: (1) being robust under lighting variations and (2) providing more relevant information. In this paper we present a new 3D facial model based on the curvature properties of the surface. Our system is able to detect the subset of the characteristics of the face with higher discrimination power from a large set. The robustness of the model is tested by comparing recognition rates using both controlled and noncontrolled environments regarding facial expressions and facial rotations. The difference between the recognition rates of the two environments of only 5% proves that the model has a high degree of robustness against pose and facial expressions. We consider that this robustness is enough to implement facial recognition applications, which can achieve up to 91% correct recognition rate. A publish 3D face database containing face rotations and expressions has been created to achieve the recognition experiments.


2020 ◽  
Vol 13 (2) ◽  
pp. 27-36 ◽  
Author(s):  
Ade Supriatna

Rice production and productivity in Subang district must be easily informed by the Department of Agriculture in accordance with advances in information technology and the internet. This study is about data and information that is integrated into a computer-based information system related to the yield of rice crops. The computer-based rice yield report is intended to make it easier to enter data sourced from the corm area online. Then from the user (community) side it will be more practical and easier to get information. And services at the subang agriculture service do not always have to be directly in the office but can be done online. That way the reporting process, fast and structured.Reporting, which was originally still manual, was to recapitulate paper-based transactions and then switch to the application of web-based computer technology and the research method was quantitative.


Author(s):  
Julius Yong Wu Jien ◽  
Aslina Baharum ◽  
Shaliza Hayati A. Wahab ◽  
Nordin Saad ◽  
Muhammad Omar ◽  
...  

Face recognition is the use of biometric innovations that can see or validate a person by seeing and investigating designs depending on the shape of the individual. Face recognition is used largely for the purpose of well-being, despite the fact that passion for different areas of use is growing. Overall, face recognition innovations are worth considering because they have the potential for broad legal jurisdiction and different business applications. It is widely used in many spaces. How it works is a product of facial recognition processing facial geometry. The hole between the ear and the good way from the front to the jaw are the main variables. This code distinguishes the highlight of the face that is important for your facial separation and creates your facial expression. Therefore, this study gives an overview of age detection using a different combination of machine learning and image processing methods on the image dataset.


Sign in / Sign up

Export Citation Format

Share Document