scholarly journals Human Face Detection Techniques: A Comprehensive Review and Future Research Directions

Electronics ◽  
2021 ◽  
Vol 10 (19) ◽  
pp. 2354
Author(s):  
Md Khaled Hasan ◽  
Md. Shamim Ahsan ◽  
Abdullah-Al-Mamun ◽  
S. H. Shah Newaz ◽  
Gyu Myoung Lee

Face detection, which is an effortless task for humans, is complex to perform on machines. The recent veer proliferation of computational resources is paving the way for frantic advancement of face detection technology. Many astutely developed algorithms have been proposed to detect faces. However, there is little attention paid in making a comprehensive survey of the available algorithms. This paper aims at providing fourfold discussions on face detection algorithms. First, we explore a wide variety of the available face detection algorithms in five steps, including history, working procedure, advantages, limitations, and use in other fields alongside face detection. Secondly, we include a comparative evaluation among different algorithms in each single method. Thirdly, we provide detailed comparisons among the algorithms epitomized to have an all-inclusive outlook. Lastly, we conclude this study with several promising research directions to pursue. Earlier survey papers on face detection algorithms are limited to just technical details and popularly used algorithms. In our study, however, we cover detailed technical explanations of face detection algorithms and various recent sub-branches of the neural network. We present detailed comparisons among the algorithms in all-inclusive and under sub-branches. We provide the strengths and limitations of these algorithms and a novel literature survey that includes their use besides face detection.

2021 ◽  
Vol 23 (2) ◽  
pp. 13-22
Author(s):  
Debmalya Mandal ◽  
Sourav Medya ◽  
Brian Uzzi ◽  
Charu Aggarwal

Graph Neural Networks (GNNs), a generalization of deep neural networks on graph data have been widely used in various domains, ranging from drug discovery to recommender systems. However, GNNs on such applications are limited when there are few available samples. Meta-learning has been an important framework to address the lack of samples in machine learning, and in recent years, researchers have started to apply meta-learning to GNNs. In this work, we provide a comprehensive survey of different metalearning approaches involving GNNs on various graph problems showing the power of using these two approaches together. We categorize the literature based on proposed architectures, shared representations, and applications. Finally, we discuss several exciting future research directions and open problems.


2021 ◽  
pp. 1-21
Author(s):  
Shahela Saif ◽  
Samabia Tehseen

Deep learning has been used in computer vision to accomplish many tasks that were previously considered too complex or resource-intensive to be feasible. One remarkable application is the creation of deepfakes. Deepfake images change or manipulate a person’s face to give a different expression or identity by using generative models. Deepfakes applied to videos can change the facial expressions in a manner to associate a different speech with a person than the one originally given. Deepfake videos pose a serious threat to legal, political, and social systems as they can destroy the integrity of a person. Research solutions are being designed for the detection of such deepfake content to preserve privacy and combat fake news. This study details the existing deepfake video creation techniques and provides an overview of the deepfake datasets that are publicly available. More importantly, we provide an overview of the deepfake detection methods, along with a discussion on the issues, challenges, and future research directions. The study aims to present an all-inclusive overview of deepfakes by providing insights into the deepfake creation techniques and the latest detection methods, facilitating the development of a robust and effective deepfake detection solution.


2022 ◽  
Author(s):  
Farkhanda Zafar ◽  
Hasan Ali Khattak ◽  
Moayad Aloqaily ◽  
Rasheed Hussain

Owing to the advancements in communication and computation technologies, the dream of commercialized connected and autonomous cars is becoming a reality. However, among other challenges such as environmental pollution, cost, maintenance, security, and privacy, the ownership of vehicles (especially for Autonomous Vehicles (AV)) is the major obstacle in the realization of this technology at the commercial level. Furthermore, the business model of pay-as-you-go type services further attracts the consumer because there is no need for upfront investment. In this vein, the idea of car-sharing ( aka carpooling) is getting ground due to, at least in part, its simplicity, cost-effectiveness, and affordable choice of transportation. Carpooling systems are still in their infancy and face challenges such as scheduling, matching passengers interests, business model, security, privacy, and communication. To date, a plethora of research work has already been done covering different aspects of carpooling services (ranging from applications to communication and technologies); however, there is still a lack of a holistic, comprehensive survey that can be a one-stop-shop for the researchers in this area to, i) find all the relevant information, and ii) identify the future research directions. To fill these research challenges, this paper provides a comprehensive survey on carpooling in autonomous and connected vehicles and covers architecture, components, and solutions, including scheduling, matching, mobility, pricing models of carpooling. We also discuss the current challenges in carpooling and identify future research directions. This survey is aimed to spur further discussion among the research community for the effective realization of carpooling.


Author(s):  
Sajid Nisar ◽  
Osman Hasan

Telesurgical robotic systems allow surgeons to perform surgical operations from remote locations with enhanced comfort and dexterity. Introduction of robotic technology has revolutionized operation theaters but its multidisciplinary nature and high associated costs pose significant challenges. This chapter provides a comprehensive survey of the current progress in the field of surgical robotics with a detailed discussion on various state-of-the-art telesurgical robotic systems. The key design approaches and challenges are identified, and their solutions are recommended. A set of parameters that can be used to assess usefulness of a telesurgical robot are discussed. Finally, guidelines for selection of a suitable surgical system and the future research directions are described.


2021 ◽  
Author(s):  
Hajer Ghodhbani ◽  
Adel Alimi ◽  
Mohamed Neji ◽  
Imran Razzak

<p>Our work aims to conduct a comprehensive literature review of deep learning methods applied in the fashion industry and, especially, the image-based virtual fitting task by citing research works published in the last years. We have summarized their challenges, their main frameworks, the popular benchmark datasets, and the different evaluation metrics. Also, some promising future research directions are discussed to propose improvements in this research field.</p>


Author(s):  
Sajid Nisar ◽  
Osman Hasan

Telesurgical robotic systems allow surgeons to perform surgical operations from remote locations with enhanced comfort and dexterity. Introduction of robotic technology has revolutionized operation theaters but it's multidisciplinary nature and high associated costs pose significant challenges. This chapter provides a comprehensive survey of the current progress in the field of surgical robotics with a detailed discussion on various state-of-the-art telesurgical robotic systems. The key design approaches and challenges are identified and their solutions are recommended. A set of parameters that can be used to assess usefulness of a telesurgical robot are discussed. Finally, guidelines for selection of a suitable surgical system and the future research directions are described.


Author(s):  
Shahid Alam

As corporations are stepping into the new digital transformation age and adopting leading-edge technologies such as cloud, mobile, and big data, it becomes crucial for them to contemplate the risks and rewards of this adoption. At the same time, the new wave of malware attacks is posing a severe impediment in implementing these technologies. This chapter discusses some of the complications, challenges, and issues plaguing current malware analysis and detection techniques. Some of the key challenges discussed are automation, native code, obfuscations, morphing, and anti-reverse engineering. Solutions and recommendations are provided to solve some of these challenges. To stimulate further research in this thriving area, the authors highlight some promising future research directions. The authors believe that this chapter provides an auspicious basis for future researchers who intend to know more about the evolution of malware and will act as a motivation for enhancing the current and developing the new techniques for malware analysis and detection.


Sign in / Sign up

Export Citation Format

Share Document