What techniques are used for face detection

Assignment Help Computer Engineering
Reference no: EM132109203

Project : Face Detection

Face detection and recognition is a classical AI topic. It can be used in a variety of applications that identifies human faces in digital images or videos.

For example, it is used in video surveillance, human computer interface, and image database management. In addition, face detection is gaining the interest of marketers. Face detection is an important object detection technique in commercial environment like Amazon Go.

Task 1: Study the paper attached in the project 2. The paper is "A survey on face detection in the wild: Past, present and future".

Read this paper and understand some questions like what the face detection is and what techniques of face detection are.

You can focus on one technique, such as deep neural network based method in the paper. Then, list some relevant documents like theory description, open source software, and relevant libraries.

The following items are a group of examples focusing on deep neural network based face detection method. You can also use other methods listed in the paper.

Study the convolutional neural network code (any programming language is fine). There are a lot of open source convolutional neural network code online. For example, the following link provides a Python version of convolutional neural network.

In order to get frame images from a streaming video, you can reference the following article and source code. You can also use any other programming languages and tools to extract frames.

After the task 1, you would provide the answers

(1) What techniques are used for face detection?

(2) What is difference between these techniques in the above question?

(3) What technique you use to solve face detection in the project? List theory description, open source software or libraries. (Like examples of deep neural network technique list above)

Reference no: EM132109203

Questions Cloud

Write a public static method named static long tribonacci : Write a public static method named static long tribonacci(int n, long a, long b, long c)
Create an sql or access database with all your friends : Create an SQL or Access database with all your friends' information and write a program to load the names in the combo box and also search the database.
Summarize the recommended instructional strategies : Summarize and explain how you plan to involve Marias parents in meeting her goals. Include a specific at-home activity to help in her continued success
Write a public static method named static long : Write a public static method named static long fibFast(int n, long a, long b) that returns the nth fibonacci number.
What techniques are used for face detection : Face detection and recognition is a classical AI topic. It can be used in a variety of applications that identifies human faces in digital images or videos.
Give a scenario that can cause lost heap-dynamic variables : Give a scenario that can cause lost heap-dynamic variables. Support your scenario with sample codes in your favorite language.
Explore the different methods of calculating subnets : Research some of the options these various methods provide, and create your own "cheat sheet" to help pre-pare you for subnetting on the CompTIA Networkþ exam.
Design and develop an app for australian rent a car office : Android App Development - design and develop an App for Australian rent a car office - design and develop an App for Australian rent a car office
Display how many of each denomination would be needed : Write a C++ program that prompts the user for a cash value and an amount of purchases made against that amount.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd