Professional Documents
Culture Documents
Textbook Emerging Research in Computing Information Communication and Applications Ercica 2016 1St Edition N R Shetty Ebook All Chapter PDF
Textbook Emerging Research in Computing Information Communication and Applications Ercica 2016 1St Edition N R Shetty Ebook All Chapter PDF
https://textbookfull.com/product/emerging-research-in-computing-
information-communication-and-applications-
ercica-2018-volume-1-n-r-shetty/
https://textbookfull.com/product/biota-grow-2c-gather-2c-cook-
loucas/
https://textbookfull.com/product/emerging-trends-and-
applications-in-cognitive-computing-pradeep-kumar-mallick/
https://textbookfull.com/product/advances-in-information-
communication-technology-and-computing-proceedings-of-
aictc-2019-vishal-goar/
https://textbookfull.com/product/information-and-communication-
technology-proceedings-of-icict-2016-1st-edition-durgesh-kumar-
mishra/
https://textbookfull.com/product/information-science-and-
applications-icisa-2016-1st-edition-kuinam-j-kim/
https://textbookfull.com/product/emerging-trends-in-photonics-
signal-processing-and-communication-engineering-proceedings-of-
icpspct-2018-govind-r-kadambi/
N.R. Shetty
L.M. Patnaik
N.H. Prasad
N. Nalini Editors
Emerging Research
in Computing,
Information,
Communication and
Applications
ERCICA 2016
Emerging Research in Computing, Information,
Communication and Applications
N.R. Shetty L.M. Patnaik
•
Editors
Emerging Research
in Computing, Information,
Communication
and Applications
ERCICA 2016
123
Editors
N.R. Shetty N.H. Prasad
Nitte Meenakshi Institute of Technology Master of Computer Applications
Nitte Education Trust Nitte Meenakshi Institute of Technology
Bengaluru, Karnataka Bengaluru, Karnataka
India India
and N. Nalini
Nitte Meenakshi Institute of Technology
Central University of Karnataka Bengaluru, Karnataka
Gulbarga, Karnataka India
India
L.M. Patnaik
IISc and INSA
National Institute of Advanced Studies
Bengaluru, Karnataka
India
v
Organizing Committee
ERCICA-2016
The Fourth International Conference on “Emerging Research in Computing,
Information, Communication and Applications”, (ERCICA-2016) was held during
29–30 July 2016 at Nitte Meenakshi Institute of Technology(NMIT), Bangalore
and organized by the Departments of CSE and MCA, NMIT.
Chief Patrons
Dr. N.V. Hegde, President, Nitte Education Trust
Dr. N.R. Shetty, Advisor, Nitte Education Trust
Conference Chair
Dr. H.C. Nagaraj, Principal, NMIT, Bangalore
Program Chairs
Dr. Prasad N. Hamsavath, HOD, MCA, NMIT, Bangalore
Dr. Nalini N., Professor, CSE, NMIT, Bangalore
Publisher
Springer Nature
Advisory Chairs
Dr. Jharna Majumdar, Dean (R&D), NMIT, Bangalore
Prof. Ranganatha Setty, Dean (Academic), NMIT, Bangalore
Advisory Committee
Prof. L.M. Patnaik, INSA Senior Scientist, NIAS, Bangalore
Dr. Kalidas Shetty Founding Director of Global Institute of Food Security and
International Agriculture (GIFSIA), Professor of Plant Science and Associate
Vice-President of International Partnerships and Collaborations, North Dakota State
University, Fargo, USA
Dr. K.D. Nayak, OS and CC, RandD (MED and MIST), DRDO, India
Dr. Sathish Udpa, Dean and Professor, Michigan State University, Michigan
vii
viii Organizing Committee
Program Committee
Dr. Savitri Bevinakoppa, Professional Development and Scholarship Coordinator,
School of IT and Engineering, Melbourne Institute of Technology (MIT), Australia
Dr. Ramprasad P., Professor, Department of CSE and IT, Manipal University,
Dubai
Prof. Uma Shama, Professor of Mathematics and Computer Science, Co-Director,
GeoGraphics Laboratory, Science and Mathematics Center, Bridgewater State
University, USA
Dr. P.V. Ananda Mohan, Advisor CDAC
Prof. Zuriati Binti Ahmad Zukarnain, Professor, Department of Communication
Technology and Networks, University Putra Malaysia, Malaysia
Dr. Narushan Pillay, School of Engineering, University of KWAZULU-Natul,
Durban, South Africa
Prof. Sonajharia Minz, Professor, School of Computer and Systems Sciences,
Jawaharlal Nehru University, New Delhi
Dr. Vikram Goyal, Associate Professor, CSE, IIIT-New Delhi
Dr. K.N. Hari Bhat, Department of ECE, NMIT, Bangalore
Organizing Co-Chairs
Dr. Venkatesh K., Professor and Head, CSE, NMIT
Prof. Sitaram Yaji, Professor, ECE, NMIT
Dr. Sanjay H.A., Professor and Head, ISE, NMIT
Dr. M.N. Thippeswamy, Professor, CSE, NMIT
Prof. Sankar Dasiga, Professor, ECE, NMIT
Dr. Kavitha Sooda, Associate Professor, CSE, NMIT
Acknowledgements
First of all, we would like to thank Prof. N.R. Shetty who has always been the
guiding force behind this event’s success. It was his dream that we have striven to
make a reality. Our thanks to Prof. L.M. Patnaik, who has monitored the whole
activity of the conference from the beginning till its successful end.
Our special thanks to Springer Nature and especially the editorial staff who were
patient, meticulous, and friendly with their constructive criticism on the quality of
papers and outright rejection at times without compromising the quality of the
papers as they are always known for publishing the best international papers.
We would like to express our gratitude to all the review committee members of
all the themes of Computing, Information, Communication, and Applications and
the best paper award review committee members.
Finally, we would like to express our heartfelt gratitude and warmest thanks to
the ERCICA 2016 organizing committee members for their hard work and out-
standing efforts. We know how much time and energy this assignment demanded,
and we deeply appreciate all the efforts to make it a grand success.
Our special thanks to all the authors who have contributed to publish their
research work in this conference and participated to make this conference a grand
success. Thanks to everyone who have directly or indirectly contributed to the
success of this conference ERCICA 2016.
Regards
Program Chairs
ERCICA 2016
ix
About the Conference
ERCICA 2016
The Fourth International Conference on “Emerging Research in Computing,
Information, Communication and Applications”, ERCICA-2016 is an annual event
jointly organized by the Departments of CSE and MCA during 29–30 july, 2016 at
Nitte Meenakshi Institute of Technology (NMIT), Yelahanka, Bangalore, India.
The conference is supported by the Technical Education Quality Improvement
Program (TEQIP-II).
ERCICA-2016 is organized under the patronage of Prof. N.R. Shetty, Advisor, Nitte
Education Trust, Dr. L.M. Patnaik, Technical Advisor, NMIT, Dr. H.C. Nagaraj,
Principal served as the Conference Chair and the Program Chairs of the conference were
Dr. N.H. Prasad, Professor and Head, MCA and Dr. N. Nalini, Professor, CSE, NMIT,
Bangalore, Karnataka.
ERCICA aims to provide an interdisciplinary forum for researchers, engineers,
and scientists to discuss and promote research and technology in the thrust areas of
computing, information, communication, and applications. The conference will
bring researchers, educators, professional engineers, and technologists into a single
forum in order to discuss and debate the emerging research in the above areas.
For ERCICA 2017, authors are invited to submit the manuscripts of their
original and unpublished research contributions to ercica.chair@gmail.com
(ERCICA website: http://nmit.ac.in/ercica.html). All the submitted papers will go
through a peer review process, and the corresponding authors will be notified about
the outcome of the review process. There will be six rounds of quality checks on
each paper before selection for Presentation/Publication. Authors of the selected
papers may present their papers during the conference.
xi
Contents
Part I Computing
Development of Accurate Face Recognition Process Flow
for Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Tripty Singh and C. Josna Mary
Simulation and Performance Evaluation of WSN-Based Architecture
for Animal Health Monitoring Using NS2 . . . . . . . . . . . . . . . . . . . . . . . . . 17
Ankit Bhavsar and Harshal Arolkar
Random Route Adoption Algorithm to Provide Source Location
Privacy in Wireless Sensor Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
N. Abhilash and S. Kuzhalvaimozhi
Improving Energy Efficiency and Reliability of Wireless Sensor
Networks with MC-AODV Routing Protocol . . . . . . . . . . . . . . . . . . . . . . 37
K. Imrana Banu, K. Rabiya Bashrin, K. Ummay Kulsum
and Mohammed Ummar
Aspect Based Sentiment Analysis Using R Programming . . . . . . . . . . . . 47
K.V. Akhil Kumar, G.V. Manikanth Sai, Nisha P. Shetty, Chetana Pujari
and Aiswarya Bhat
Frequency Domain Technique to Remove Herringbone Artifact
from Magnetic Resonance Images of Brain and Morphological
Segmentation for Detection of Tumor . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
T.D. Vishnumurthy, Vaibhav A. Meshram, H.S. Mohana
and Pramod Kammar
Face Recognition Through Symbolic Data Modeling of Local
Directional Gradient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Shanmukhappa Angadi and Vishwanath Kagawade
xiii
xiv Contents
Part II Information
SDaaS: Framework of Sensor Data as a Service for Leveraging
Services in Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351
B.C. Manujakshi and K.B. Ramesh
An Approach for Efficient Capacity Management in a Cloud . . . . . . . . . 365
T. Roseline Philomine, Clarence J.M. Tauro and Melisa Miranda
Automated Negotiation of QOS Parameters Using Fuzzy Logic Based
Concession Strategy for Cloud Computing Environments . . . . . . . . . . . . 377
B. Sunil Kamath and Rio D’Souza
Intrusion Detection System Based on BCS-GA
in Cloud Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393
Partha Ghosh, Supriya Jha, Rahul Dutta and Santanu Phadikar
Unsupervised Document-Level Sentiment Analysis of Reviews Using
Macaronic Parser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Sukhnandan Kaur and Rajni Mohana
Efficient Speech Compression Using Waveform Coding
in Time Domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
Subham Paul and Debashis Chakraborty
Model Based Algorithm Validation Approach for Safety Critical
Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
R. Krishnaprasad, Manju Nanda, J. Jayanthi and Shyam Sundhar Dhage
Impact of Different Ground Plane Structures on Sierpinski Monopole
Antenna . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
D.M.K. Chaitanya and N.V. Koteswara Rao
Smart Authentication Using Graphical Password
for Android Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Aaroh Gala and Somdev Mehta
New Security Architecture for Big Data Hadoop . . . . . . . . . . . . . . . . . . . 469
Madhvaraj M. Shetty and D.H. Manjaiah
An Overview of Bio-Inspired Computing . . . . . . . . . . . . . . . . . . . . . . . . . 481
K. Lakshmaiah, S. Murali Krishna and B. Eswara Reddy
Providing Cloud Services to an Autonomous Robotic Car
in Real-Time Traffic Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
Prachi Sablani, Saurabh Kumar Prasad, Ashish Kumar Pandey
and Rajesh Doriya
Contents xvii
Part IV Applications
Enhancing Security of Stature System by Using Sybil Detection . . . . . . . 571
Neha Chauhan, Ankita Thadani and Jalpa Baria
Word Sense Disambiguation for Indian Languages . . . . . . . . . . . . . . . . . 583
Mitul Sheth, Shivang Popat and Tarjni Vyas
Discovery of Fuzzy Hierarchical Classification Rules (FHCRs):
A Genetic Algorithm Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595
Renu Bala and Saroj Ratnoo
Classification of Fashionwear Using Deep Learning . . . . . . . . . . . . . . . . . 605
Akshayvarun Subramanya, Prajwal Srinivas, V.M. Pramod
and S.S. Shylaja
An Efficient Algorithm for Frequent Trajectory Itemset . . . . . . . . . . . . . 613
P. Geetha and E. Ramaraj
Intelligent Transparent Email Security as Security-as-a-Service
from Cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
Deepak H. Sharma, C.A. Dhote and Manish M. Potey
A Novel Hardware Selection Algorithm for Aerial Vehicles
with Multi-rotors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
K.R. Narahari, B.S. Aruna Prabha, M.S. Goutham, V. Rohit,
Damodhar S. Kamath and P. Vaishak
xviii Contents
xix
xx About the Editors
Abstract Rapid and tough tracking of multiple faces have many crucial applica-
tions in various fields like video surveillance and video conferencing. Hence, it
gained lot of momentum from computer vision researchers. Initialization, tracking
and display are the three important steps in real-time tracking of multiple faces in
high-resolution videos. Out of which, tracking is quite intensive in computation.
Object detection and tracking are important in many computer vision applications
including activity recognition, automotive safety, and surveillance. In this paper, a
computational model of real-time face tracking has been presented. The tracking
problem into three parts: the region extractor is based on the integration of
skin-color, motion, and silhouette features, while the face detector uses a simple,
rule-based face detection algorithm, and SVM. Real-time detection and tracking
implementation has been carried out and results presented.
Keywords Face detection Skin recognition Color Tracking
Feature extraction Color segmentation Noise filtering
1 Introduction
Faces
Transform to Integral Face
Images Detection
Non-Faces
employed for the training of the detectors. For the proposed method in face
authentication technique, the requirements which satisfies the authentication are:
• Invariable to the face size and face slant
• Invariable to lighting variations
• New subject can be integrated into the system without considering others
features
A. Brief Overview of Video Surveillance: Using video analytics is the latest
development in video surveillance. DVRs can store digital video and can
analyze their captured images. Therefore, they can automatize the tasks related
to investigation purposes. For developing Video Surveillance and Monitoring
(VSAM) [3], the Defense Advanced Research Projects Agency (DARPA)
Information System Office starts a program in the year 1997 which was a 3-year
program. The main goal was to establish a technology based on video for using
in civic and battleground areas. The work here briefly covered the basic
problems in tracking face, detection, and in case of multi-camera system.
B. Related Work: There are a lot of methods proposed to improve the face detection
over last decades which are mainly classified into two: (a) Knowledge-based
method (b) Feature invariant approaches. In knowledge-based method, the main
goal is to find the invariable face features in a complex environment. Hence
localizing the face position. Determining whether a face is appeared in an image or
not by studying the relationships among the features [4]. The invariant method
approaches to invariant features, positions, brightness, etc. for detecting the
human faces.
Different approaches have been proposed for segmentation of moving objects and
features, like frame difference, double frame difference, and background suppression.
Background suppression has been the most extensively applied technique in case of
lack of a priori knowledge about the objective. Jain and Bolle’s work has demon-
strated [5] good achievement in video sequence analysis. Processes mentioned in the
above-mentioned work has selected updating of background [6], steps for verification
in order to include ghosts into the background model and usage of HSV color space in
order to deal shadows. The method proposed by Jones and Viola [5] exceeds the other
systems. The processing speed is high for the system proposed by Viola and Jones.
Rectangular features which is a type of Haar Wavelets, uses deluge of filters which
eliminates the images of non-face. The strategy for boosting is taken as asymmetrical
adaboost for the training of detectors. In addition, there has been a module for color
analysis which is rooted upon a standard skin detector algorithm and it has been found
that by using color images there is an improvement in the efficiency of the system.
Also, there has been a proposal for multiple-person tracking as seen in the work of Li
and Chellappa [7]. The multi-person tracking system has two modules—1. Face
detector module 2. Region extractor module. The face detector module uses a face
detection algorithm, SVM, etc. The region extractor uses motion, silhouette features,
integration of skin color, etc. The face detector module is simple than region extractor
module. This system has been found to be less robust to in real world.
6 T. Singh and C. Josna Mary
2 Background Study
A. Evolution in Face Detection: The work for face detection begun as the com-
mencement of 1970s. In the beginning, simple approaches were used. Due to
various thinking about plain background, passport size frontal face scenario, the
work becomes rigid. Hence, the development in research area remained dormant
since 1990s. The work becomes a reality after the evolution of face recognition and
video coding systems. Decades back a research on face detection had taken place.
Segmentation ideas were presented on that by using motion, color, etc. For face
detection from large crowded situation neural networks and statistics are also used.
The technique of face detection is categorized into two since the technique requires
a priori information about the face [12, 13, 14]. These categories are differentiated
by various methods used for handling the knowledge about face. Feature-based and
image-based techniques are the two major detection methods used. Feature-based
method involves low-level analysis and feature analysis; whereas in image-based
analysis involves liner subspace methods and neural networks. Statistical approa-
ches also come under image-based analysis.
B. Knowledge base for Face Recognition: The first technique uses knowledge of
face and it follows detection methodology. From knowledge base analysis the
low-level features are obtained. The color of the face skin and its geometry is
analyzed at various levels. The next class has image-based representations which
have been classified directly into group of face by using some training algorithms. It
uses mapping schemes and training schemes for incorporating knowledge into the
system. On compared to feature-based approach, image-based techniques have
better performance. Mainly, there exists three methods for localization of facial
features: appearance, geometry, and structure. Preprocessing is the first stage in
almost all localization. It uses vertical and horizontal grey level or edge field
projections. Coarse-to-fine localization is another approach used for reducing the
computational load [8]. Sometimes uses color-based Segmentation schemes for
identifying face first and then for lips. The important method is to extend the whole
face detection methods in order to search for small features at a high resolution.
Feris et al. [9] uses Gabor wavelet networks (GWNs) for identifying the region of
face approximately. It then uses smaller GWNs for looking into almost eight
individual features, such as corners of eyes, nostrils, mouth corners, etc. The goal of
the appearance-based method is the representation of facial features.
Geometric-based methods have been found to have more information about
position of face, searching of landmark by angles, distances, areas, etc. [15, 16].
There are many methods for the improvement of detection of face that are classified
mainly into two: (a) Knowledge-based method (b) Feature invariant approaches. In
order to describe the relations from features of a face and the face which is detected,
a statistical model was built. (c) Matching of Template: The template employed
with features of face has a better matching operation.
Development of Accurate Face Recognition Process Flow … 7
C. Face Identification: The face detection and recognition have a wide variety of
approaches, out of which it is a great difficult task to concentrate on a general case
in much detail. Mostly, there are three stages. The first stage is known as image
processing. In this stage, somehow the input images are transformed and extract
only the information which is important. Thus, it is more accurate. The classifi-
cation stage needs the information which is obtained from the extraction done by
processing stage. The major two tasks are lighting correction and filtering. The
function of lighting task is to reduce the variation of intensity in lighting and
orientation. The task of filtering is to obtain the needed information at some par-
ticular frequencies and directions. The second stage is known as image search. For
the detailed evaluation in further this stage chooses only the needed portion of the
image which are transformed. The next two stages is known as pattern classifica-
tion. In this stage, valuation is done for the outputs obtained from first two stages. It
then classifies it as background or target, face, or non face. The face detec-
tionprocess flow is as shown in Fig. 2. To identify a person, facial images are best
in biometric. This is more relevant in application areas, where secret or under-
ground works are going on. The face recognition can be applicable from static to
dynamic and identification of face from the crowded background such as airport.
The face recognition is based on the following facts: (a) Features of eyes, eyebrows,
lips, nose, chin, etc. (b) By comprehensive analysis, the face can be shown as the
combination of the weighted canonical faces [10]. A question will arise when the
face become enough for analyzing the tasks of real-time, real-world tracking, etc.
A related multiple-person tracking proposed here has two modules such as face
detector module [2] and region extractor module.
A. Method Description: The basic processing steps in a face recognition scheme
are as follows:
1. Collect and capture the frame for input.
2. Observe the faces in the input frame.
3. Analyze whether the face observed is existing or not.
Database of Enrolled
3 System Study
Fig. 3 a Original image captured, b Future analysis in spatio domain, c 32-grey level mapping of
original image captured, d 2-grey level mapping of original image captured, e (255-n) grey level
mapping of original image captured, f (255-n) grey level mapping of original image captured
(i) Identifying the region of skin: All images especially RGB images are
transformed into 256 greyscale images with respect to the color distribution
by multilayer perceptron. A low density point describes that the possibility to
be a skin point is low, if not, the possibility is high. This greyscale image is
to be segmented by choosing a threshold that result in binary image.
(ii) Skin Expansion: A 5 5 morphological opening technique is applied in
order to eliminate some noise signals from selected points. After that dilation
process of 3 3 square structuring is done.
(iii) Detection of skin blob: Labeling based on the region is performed here in
order to compute the blobs of skin. Some portions of the blobs are noise.
(iv) Verification of face: This procedure includes:
(a) Choosing the portion of face. (b) Cosine transformation and choosing low
frequency coefficient. (c) Dividing the face area into various subareas. (d) Choosing
negative samples. (e) SVM training. The correlation property among the samples
must be small for choosing negative sample. The images of such samples are
produced in random way which contains vast information about various patterns.
C. Subsystem for Face Analysis: This approach has been the section neural
network is developed based on the function related to radial.
(i) Detection of Face: For detecting the face the system has a detector that has a
group of filters that rejects the non-faces. It permits the faces to move on to
10 T. Singh and C. Josna Mary
Extract Key
Video frames(Frame Movement Analysis Foreground
Acquire from Processing) Face Points
Source Video
Face differentiate Background Process
Detection
AcquireVideo
from Background Suppression
from Source
Acquire
Acquire Colour Sample
NOISE FILTER
from Source Background
Colour Model Processing Particle Select Based Tracking Points
Update
Error Diffusion Based Tracking
the next stage of cascade. The areas of hand and face are detected and tracked
using propagated pixel hypothesis algorithm. This algorithm has the property
to alter their shapes, to move in complex paths etc.
(ii) Overlapping of detection: From the face detection process a window known
as face windows are obtained. It is then processed further for estimating the
size and orientation of finally detected face. This method is for removing the
incorrect detections occurred and grouping the right detections.
(iii) Tracking Face: This approach is for removing the incorrect detections. This
task is applied for inter frame operation. The detections belonging to
sequence of frames is considered as same face, which uses same heuristic for
overlapping of detection [3] (Fig. 4).
4 System Design
The major steps covered under the system design have been found to be:
(i) Preparing input/output specifications.
(ii) Detail about the plan of implementation.
(iii) Determine the design before implementing the system.
Step 1 Detection of Object: In this step the objects are detected. The process of
detection is then applied to those cameras kept in those surroundings.
Step 2 Dimensional Object Tracking: From the above step we got the objects
which are detected. These are tracked in all cameras on the basis of
appearance model of objects [11].
Step 3 3 Dimensional Tracking of Object: Objects in two dimensions is joined
together for locating and tracing objects in a three-dimensional system.
The result obtained in this method is clubbed within the same objects.
Development of Accurate Face Recognition Process Flow … 11
5 System Implementation
ASP.NET is the programming platform used for the multi face tracking system
implementation. This platform is better for the implementation of the system since it
is able to do the addition of libraries and for drawing forms fastly. System uses the
real-world sequence videos which are of 320 240 size of pixel. Those videos are
taken with a digital camera of 29.4 frames per second arrival rate and the com-
pression is done in .avi resulting images of low quality. Those videos having more
than four faces occur on at least 30 frames each face. Athlon 1.2 GHz computer was
used. The rates of frame were 8.5 frames per second. It generates exact output for
the inputs given. The accuracy of the expected result is verified. All the code units
are to be verified before giving to the software. Testing procedure was done and
successful tests produce the correct results. The position and location of eyes, area
of face, are to be observed. The feature vector for the face can be obtained from the
images of face,
where P[q, r] is image; Q is the reflectance map; s[q, r] and t[x, y] are shape
gradients. With an assumption of a Lambertian area and light source the formula
can be equated as given below:
12 T. Singh and C. Josna Mary
qmM s nNs
q cos h or I ¼ ð2Þ
m þ n þ M þ N2
The Gradient Measure has 2 2 kernels of pairs are represented in the figure
below. The other kernel is rotated by 90° (Figs. 5 and 6).
Those kernels are architecture in such a way that it responds to those edges
which are running at 45° proportional to grid of pixel. The kernels can be applicable
to those input images separately. It is applicable for obtaining the unique gradient
measurement in each and every (say Gx & Gy). The gradient measure can be
computed by the combination of these two which can be shown as:
G ¼ Gx þ Gy
Here, the determining method for Discrete Cosine Transformation for an image
is presented briefly [7]. The interpretation of DCT for 2 dimensional images are
shown below, where, x(m, n) are the images and NN is the dimension.
C ðk; lÞ ¼ 0\k; l N 1
Development of Accurate Face Recognition Process Flow … 13
The low sub band (YLL) for the image is shown as:
Let SLL (m, n), 0 m, 1 N/2−1 be the 2D DCT of YLL(p, q). Approximate
sub band for DCT is shown as:
pk
pl
4 cos 2N cos 2N CLL ðk; lÞ; k; l ¼ 0; 1; . . .. . .; N2 1
Cðk; lÞ ¼ ð4Þ
0; otherwise
1D DCT is computed for the rows and then for the columns are computed. This
is computed by differentiating the Eq. 1 into column and row.
6 Performance Estimation
Surveillance system has a great effort in associating and describing the explanations
for the measuring the performance. Hence, performance measurement is a great task
[2, 17, 18]. Surveillance scheme has errors of two types:
False Positive: The error which occurs due to the false detection by a system or a
false recognition which does not exists in that scenario. An example is given here.
Consider, a system which monitors a guarded area may detect the physical
movement in a particular area even if there is no physical object but there has
lighting variations.
False Negative: The error occurs when a system fails to identify an object which
is to actually identify. For example, a system which checks the guarded area is
failed to detect the peoples wearing a dress with the same color and background of
the environment given. Different methods for the detecting and tracking of faces are
presented. The main aim is to capture the best close up images of the people. Its
quality depends on the underlying components accuracy.
7 Results
The performance result is obtained for 25 subjects with a 160 120 resolution
camera. For the detection of face area the movement information is also needed
because humans cannot sit for a long while. The face area varies only when the
Another random document with
no related content on Scribd:
TO CLEAR VEGETABLES FROM INSECTS.
Lay them for half an hour or more into a pan of strong brine, with
the stalk ends uppermost; this will destroy the small snails and other
insects which cluster in the leaves, and they will fall out and sink to
the bottom. A pound and a half of salt to the gallon of water will
answer for this purpose, and if strained daily it will last for some time.
TO BOIL VEGETABLES GREEN.
After they have been properly prepared and washed, throw them
into plenty of boiling water which has been salted and well skimmed;
and keep them uncovered and boiling fast until they are done, taking
every precaution against their being smoked. Should the water be
very hard, a small half-teaspoonful of carbonate of soda, may be
added with the salt, for every two quarts, and will greatly improve the
colour of the vegetables; but if used in undue proportion it will injure
them; green peas especially will be quickly reduced to a mash if
boiled with too large a quantity.
Water, 1 gallon; salt, 2 oz.; soda, 1/4 oz.; or carbonate of soda, 1
teaspoonful.
POTATOES.
104. We cannot refrain from a few words of remark here on the daily waste of
wholesome food in this country which constitutes one of the most serious
domestic abuses that exist amongst us; and one which it is most painful to
witness while we see at the same time the half-starvation of large masses of
our people. It is an evil which the steady and resolute opposition of the
educated classes would soon greatly check; and which ought not vainly to
appeal to their good sense and good feeling, augmenting, as it must, the
privations of the scantily-fed poor; for the “waste” of one part of the
community cannot fail to increase the “want” of the remainder.
TO BOIL POTATOES.
(As in Ireland.)
Potatoes, to boil well together, should be all of the same sort, and
as nearly equal in size as may be. Wash off the mould, and scrub
them very clean with a hard brush, but neither scoop nor apply a
knife to them in any way, even to clear the eyes.[105] Rinse them
well, and arrange them compactly in a saucepan, so that they may
not lie loose in the water, and that a small quantity may suffice to
cover them. Pour this in cold, and when it boils, throw in about a
large teaspoonful of salt to the quart, and simmer the potatoes until
they are nearly done, but for the last two or three minutes let them
boil rapidly. When they are tender quite through, which may be
known by probing them with a fork, pour all the water from them
immediately, lift the lid of the saucepan to allow the steam to escape,
and place them on a trivet, high over the fire, or by the side of it, until
the moisture has entirely evaporated; then peel, and send them to
table as quickly as possible, either in a hot napkin, or in a dish, of
which the cover is so placed that the steam can pass off. There
should be no delay in serving them after they are once taken from
the fire. Irish families always prefer them served in their skins. Some
kinds will be sufficiently boiled in twenty minutes, others in not less
than three quarters of an hour.
105. “Because,” in the words of our clever Irish correspondent, “the water through
these parts is then admitted into the very heart of the vegetable; and the
latent heat, after cooking, is not sufficient to throw it off; this renders the
potatoes very unwholesome.”
These are never good unless freshly dug. Take them of equal size,
and rub off the skins with a brush or a very coarse cloth, wash them
clean, and put them without salt into boiling, or at least, quite hot
water; boil them softly, and when they are tender enough to serve,
pour off the water entirely, strew some fine salt over them, give them
a shake, and let them stand by the fire in the saucepan for a minute;
then dish and serve them immediately. Some cooks throw in a small
slice of fresh butter, with the salt, and toss them gently in it after it is
dissolved. This is a good mode, but the more usual one is to send
melted butter to table with them, or to pour white sauce over them
when they are very young, and served early in the season.
Very small, 10 to 15 minutes: moderate sized, 15 to 20 minutes.
Obs.—We always, for our own eating, have new potatoes
steamed for ten minutes or longer after the water is poured from
them, and think they are much improved by the process. They
should be thoroughly boiled before this is done.
NEW POTATOES IN BUTTER.
Rub off the skins, wash the potatoes well and wipe them dry; put
them with three ounces of good butter, for a small dish, and with four
ounces or more for a large one, into a well-tinned stewpan or Keep
them well shaken or tossed, that they may be equally done, and
throw in some salt when they begin to stew. This is a good mode of
dressing them when they are very young and watery.
TO BOIL POTATOES.
108. Vegetables and fruit are now so generally forced and brought so early into
our markets, that there is little need of these expedients at present.
CRISPED POTATOES, OR POTATO-RIBBONS. (ENTREMETS.)
(A Plainer Receipt.)
After having washed them, wipe and pare some raw potatoes, cut
them in slices of equal thickness, or into thin shavings, and throw
them into plenty of boiling butter, or very pure clarified dripping. Fry
them of a fine light brown, and very crisp; lift them out with a
skimmer, drain them on a soft warm cloth, dish them very hot, and
sprinkle fine salt over them. This is an admirable way of dressing
potatoes, very common on the Continent, but less so in England
than it deserves to be. Pared in ribbons or shavings of equal width,
as in the receipt above, and served dry and well fried, lightly piled in
a dish, they make a handsome appearance, and are excellent
eating. If sliced they should be something less than a quarter of an
inch thick.
MASHED POTATOES.
Boil them perfectly tender quite through, pour off the water, and
steam them very dry by the directions already given in the receipt of
page 310, peel them quickly, take out every speck, and while they
are still hot, press the potatoes through an earthen cullender, or
bruise them to a smooth mash with a strong wooden fork or spoon,
but never pound them in a mortar, as that will reduce them to a close
heavy paste. Let them be entirely free from lumps, for nothing can be
more indicative of carelessness or want of skill on the part of the
cook, than mashed potatoes sent to table full of these. Melt in a
clean saucepan a slice of good butter with a few spoonsful of milk,
or, better still, of cream; put in the potatoes after having sprinkled
some fine salt upon them, and stir the whole over a gentle fire with a
wooden spoon, until the ingredients are well-mixed, and the whole is
very hot. It may then be served directly; or heaped high in a dish, left
rough on the surface, and browned before the fire; or it may be
pressed into a well buttered mould of handsome form, which has
been strewed with the finest bread-crumbs, and shaken free from the
loose ones, then turned out, and browned in a Dutch or common
oven. More or less liquid will be required to moisten sufficiently
potatoes of various kinds.
Potatoes mashed, 2 lbs.; salt, 1 teaspoonful; butter, 1 to 2 oz.; milk
or cream, 1/4 pint.
Obs.—Mashed potatoes are often moulded with a cup, and then
equally browned: any other shape will answer the purpose as well,
and many are of better appearance.
(Good.)
Boil some good potatoes as dry as possible, or let them be
prepared by Captain Kater’s receipt; mash a pound of them very
smoothly, and mix with them while they are still warm, two ounces of
fresh butter, a teaspoonful of salt, a little nutmeg, the beaten and
strained yolks of four eggs, and last of all the whites thoroughly
whisked. Mould the mixture with a teaspoon and drop it into a small
pan of boiling butter, or of very pure lard, and fry the boulettes for
five minutes over a moderate fire: they should be of a fine pale
brown, and very light. Drain them well and dish them on a hot
napkin.
Potatoes, 1 lb.; butter, 2 oz.; salt, 1 teaspoonful; eggs, 4: 5
minutes.
Obs.—These boulettes are exceeding light and delicate, and make
an excellent dish for the second course; but we think that a few
spoonsful of sweet fresh cream boiled with them until the mixture
becomes dry, would both enrich them and improve their flavour. They
should be dropped into the pan with the teaspoon, as they ought to
be small, and they will swell in the cooking.
POTATO RISSOLES.
(French.)
Mash and season the potatoes with salt, and white pepper or
cayenne, and mix with them plenty of minced parsley, and a small
quantity of green onions, or eschalots; add sufficient yolks of eggs to
bind the mixture together, roll it into small balls, and fry them in
plenty of lard or butter over a moderate fire, or they will be too much
browned before they are done through. Ham, or any other kind of
meat finely minced, may be substituted for the herbs, or added to
them.
POTATOES À LA MAÎTRE D’HÔTEL.
Boil in the usual manner some potatoes of a firm kind, peel, and
let them cool; then cut them equally into quarter-inch slices. Dissolve
in a very clean stewpan or saucepan from two to four ounces of
good butter, stir to it a small dessertspoonful of flour, and shake the
pan over the fire for two or three minutes; add by slow degrees a
small cupful of boiling water, some pepper, salt, and a tablespoonful
of minced parsley; put in the potatoes, and toss them gently over a
clear fire until they are quite hot, and the sauce adheres well to
them: at the instant of serving add a dessertspoonful of strained
lemon-juice. Pale veal gravy may be substituted for the water; and
the potatoes after being thickly sliced, may be quickly cut of the
same size with a small round cutter.
POTATOES À LA CRÈME.