Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2013, Article ID 519074, 6 pages
Research Article

Research on Face Recognition Based on Embedded System

School of Computer and Communication, Lanzhou University of Technology, Lanzhou 730050, China

Received 8 July 2013; Revised 5 September 2013; Accepted 25 September 2013

Academic Editor: Wuhong Wang

Copyright © 2013 Hong Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. Jafri and H. R. Arabnia, “A survey of face recognition techniques,” Journal of Information Processing Systems, vol. 5, no. 2, pp. 41–68, 2009. View at Publisher · View at Google Scholar
  2. X. Liu, T. Chen, and B. V. K. Vijaya Kumar, “Face authentication for multiple subjects using eigenflow,” Pattern Recognition, vol. 36, no. 2, pp. 313–328, 2003. View at Publisher · View at Google Scholar · View at Scopus
  3. D. Bryliuk and V. Starovoitov, “Access control by face recognition using neural networks and negative examples,” in Proceedings of the 2nd International Conference on Artificial Intelligence, pp. 428–436, Crimea, Ukraine, September 2002.
  4. W. Ping, “Research on the embedded system teaching,” in Proceedings of the International Workshop on Education Technology and Training and the International Workshop on Geoscience and Remote Sensing, vol. 1, pp. 19–21, Shanghai, China, December 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. M.-T. Pham and T.-J. Cham, “Fast training and selection of Haar features using statistics in boosting-based face detection,” in Proceedings of the 11th IEEE International Conference on Computer Vision (ICCV '07), pp. 1–7, Rio de Janeiro, Brazil, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. S. Nedevschi, I. R. Peter, and A. Mandrut, “PCA type algorithm applied in face recognition,” in Proceedings of IEEE International Conference on Intelligent Computer Communication and Processing (ICCP '12), pp. 167–171, Cluj-Napoca, Romania, 2012.
  7. J. Javed, H. Yasin, and S. F. Ali, “Human movement recognition using euclidean distance: a tricky approach,” in Proceedings of the 3rd International Congress on Image and Signal Processing (CISP '10), vol. 1, pp. 317–321, Yantai, China, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  8. P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,” in Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition, vol. 1, pp. 511–518, Kauai, Hawaii, USA, December 2001. View at Scopus
  9. R. Lienhart and J. Maydt, “An extended set of Haar-like features for rapid object detection,” in Proceedings of the International Conference on Image Processing (ICIP '02), vol. 1, pp. 900–903, September 2002. View at Scopus
  10. E. Gumus, N. Kilic, A. Sertbas et al., “Eigenfaces and support vector machine approaches for hybrid face recognition,” The Online Journal on Electronics and Electrical Engineering, vol. 2, no. 4, pp. 308–310, 2010. View at Google Scholar
  11. M. Effros, H. Feng, and K. Zeger, “Suboptimality of the Karhunen-Loève transform for transform coding,” IEEE Transactions on Information Theory, vol. 50, no. 8, pp. 1605–1619, 2004. View at Publisher · View at Google Scholar · View at Scopus
  12. L. Yinli, Y. Hongli, and Z. Pengpeng, “The implementation of embedded image acquisition based on V4L2,” in Proceedings of the International Conference on Electronics, Communications and Control (ICECC '11), pp. 549–552, Ningbo, China, September 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. Z. Hong, S. Chao, and C. Jie, “Integration schemes for IoT application systems with diverse domain,” Journal of Beijing Institute of Technology, vol. 32, no. 12, pp. 201–204, 2012 (Chinese). View at Google Scholar