• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Hybrid Machine Learning Model for Face Recognition Using SVM

    2022-08-24 06:59:26AnilKumarYadavPateriyaNirmalKumarGuptaPunitGuptaDineshKumarSainiandMohammadAlahmadi
    Computers Materials&Continua 2022年8期

    Anil Kumar Yadav,R.K.Pateriya,Nirmal Kumar Gupta,Punit Gupta,Dinesh Kumar Saini and Mohammad Alahmadi

    1IES College of Technology,Bhopal,462044,India

    2Maulana Azad National Institute of Technology,Bhopal,462003,India

    3Department of Information Technology,Manipal University Jaipur,Jaipur,303007,India

    4Department of Computer and Communication Engineering,Manipal University Jaipur,Jaipur,303007,India

    5Department of Software Engineering,College of Computer Science and Engineering,University of Jeddah,Jeddah,23218,Saudi Arabia

    Abstract: Face recognition systems have enhanced human-computer interactions in the last ten years.However,the literature reveals that current techniques used for identifying or verifying faces are not immune to limitations.Principal Component Analysis-Support Vector Machine (PCA-SVM) and Principal Component Analysis-Artificial Neural Network (PCA-ANN) are among the relatively recent and powerful face analysis techniques.Compared to PCA-ANN,PCA-SVM has demonstrated generalization capabilities in many tasks,including the ability to recognize objects with small or large data samples.Apart from requiring a minimal number of parameters in face detection,PCA-SVM minimizes generalization errors and avoids overfitting problems better than PCA-ANN.PCA-SVM,however,is ineffective and inefficient in detecting human faces in cases in which there is poor lighting,long hair,or items covering the subject’s face.This study proposes a novel PCASVM-based model to overcome the recognition problem of PCA-ANN and enhance face detection.The experimental results indicate that the proposed model provides a better face recognition outcome than PCA-SVM.

    Keywords: Face recognition system(FRS);face identification;SVM;discrete cosine transform(DCT);artificial neural network(ANN);machine learning

    1 Introduction

    The past decade has seen a rise in the use of computer and information technologies.This rapid development has spawned the growth of identity identification techniques.Whether in the fields of finance,manufacturing,e-commerce,education,transportation,or energy,accurate user identification is needed to ensure that users can access the Internet while protecting their data and preventing privacy intrusion.Face recognition technology has received the most significant research attention among the biometric technologies available today.From the US,UK,EU to China,face recognition systems (FRSs) have been used in various capacities to identify criminals,maintain social vigilance,and discourage terrorist activities in society.Organizations like Apple,Facebook,Amazon,Alphabet,and the Federal Bureau of Investigation use FRSs for authentications,identifications,and searching information from a database.The need for FRSs for reconnaissance in markets,railways,banks,and other public spaces has been strengthened by the development of smart cities,e-government,eadministration,and Internet-of-Things.By installing FRSs in cities and communities,security experts believe that law enforcement authorities can easily prevent crimes and arrest individuals aiding and abetting illegal activities.This belief stems from the fact that FRSs can identify human faces in a wide domain of circumstances with high precision[1-3].

    Despite the advantages of FRSs for criminal identification,they have many setbacks.Individuals with similar facial features,for instance,could be profiled by FRSs to have the same face.This error is a huge concern because innocent individuals whose faces are similar to individuals who committed a crime could be erroneously labelled as criminals.It is not clear who should be held responsible for the mistakes made by facial recognition technology.The use of FRSs can also result in threats to privacy,data thefts,and violation of rights.Armed with facial recognition techniques,companies can influence consumers’buying decisions based on their historical facial preferences [4-8].The US,China,and India are at the forefront of face recognition technology [9,10].Some government agencies in these nations are employing FRSs to profile citizens based on tribe,race,religion,or beliefs.In China,for instance,face recognition algorithms are trained to identify and distinguish faces of Uyghur people from those of other ethnic groups.For facial recognition technology to succeed,these drawbacks need to be addressed.

    The success of facial recognition technology relies on its ability to detect and recognize faces accurately.Face detection is an essential component of FRSs,and it can be divided into four methods:appearance-based,template-matching,feature-invariant,and knowledge-based methods.These methods are employed by security experts in detecting faces.In contrast to face recognition,two stages are required in face recognition.They include the training process and evaluation process.In the training process,FRSs are fed with samples of images to be learned,and a unique pattern for each image is obtained.In the evaluation process,a newly created model of image datasets is developed and compared with all existing models in the database.This comparison of models is enhanced using facial recognition algorithms such as Principal Component Analysis(PCA),Independent Component Analysis(ICA),Elastic Matching,and Support Vector Machine(SVM).The task of facial recognition algorithms is to distinguish face highlights by extracting significant points from the subject’s face.For instance,an algorithm may break down the relative position of the faces,including the eyes,nose,cheekbones,and jaw.The coordinates of these parts are then used to find completely different photos with coordinative elements.Today’s algorithms can normalize face images and modify them on another plane to separate the elements.With feature extraction methods,researchers can even reduce the facial elements required to recognize a subject from a large pool of individuals[11-15].

    FRS is extremely significant in our life because the pictures give better security to think about that content.The pictures are intense instruments for viable and secure data.Data is assisting us with making better choices [16-20].Therefore,these strategies can be utilized as a security reason for some developing fields.With the headway in the learning of face acknowledgement,biometric has turned into a rising innovation for perceiving people.Biometric[2]is a mechanized acknowledgement arrangement of individuals,which depends on physiological or behavioural qualities.The biometric framework incorporates acknowledgement of unique fingerprint,face,iris,retina,hand geometry,voice,mark,and others.In this manner,it is clear that face recognition has been utilized to a more prominent degree lately,and much accentuation is being put on further research and imaginativeness.

    Among one of the best settled biometric procedures that fall under the umbrella of biometrics is FRS.It will be acknowledged all the more broadly later on because it’s less difficult to set up and utilize furthermore getting less expensive.In the early 1960s[21-23],in the United States(US),open feature reconnaissance was brought into the private division and used essentially by banks.In the following decade,it was broadly spread in spots,for example,doctor’s facilities and comfort stores.Be that as it may,utilization of this innovation was restricted because the remote observing of the feature was generally occupied,and the nature of film and cameras frequently brought about foggy pictures.In the 1980s,another headway has been done included things,for example,zoom lenses and advanced innovation.This permitted camera to gather unmistakable,distinctive pictures without much lighting.With the capacities’development of the camera,the FRS converges with biometric innovation.Once,the defence department of the United States [24]was attempting to discover an innovation that can check hoodlums at the outskirt crossing.Right now,specialists additionally need to take a shot at facial acknowledgement with the state of the budgetary backing from the defence department of the United States.Inevitably,organizations started commercializing the innovation in the mid of 1990s.This innovation stood out as truly newsworthy in February 2001 right away,it was initially utilized as a part of open at Super Bowl XXXV in Tampa by the powers to hunt down criminals and terrorists among a horde of 100,000 onlookers.Quickly,the frameworks are additionally introduced and utilized as a part of Tampa’s Ybor City,a seaside town,and some different places,for example,in the city of Virginia shoreline to search for criminal suspects and missing kids and others.

    In 2001,the FRS [25-30]was utilized for observation at Tampa,Florida and Newham,Great Britain.Trials of the frameworks yielded poor results.The Newham framework didn’t bring about a solitary capture being made in three years.Logan Airport,in Boston,performed two trials of face recognition frameworks.The framework accomplished just 61.7% accuracy [31-33].The Australian traditions revealed its Smart Gate framework to robotize checking countenances with identification photographs in 2004.Google is trying face recognition utilizing a shrouded element as a part of its picture-looking site.Google bought a personal computer (PC) vision organization Neven Vision in 2006 and there were arrangements to actualize its innovation into its Picasa photograph programming.At the present,the Aadhar Card has assembled at most 50% of the number of inhabitants in India till October 2015.The project was propelled in 2009.The focal target is to give general character to each Indian inhabitant.On the other hand,in the early phase of induction,subjects languished a bundle of confusion over occasion specialized obstacles,inaccurate information showed furthermore the noteworthiness of Aadhaar card was indistinct.These days,a significant number of the issues are resolved.Presently,people,in general,can get the card without hardly lifting a finger as its acknowledgement is a necessary record [34-36].The administration needs to include it with Permanent Account Number (PAN),and Voter ID card to make a protected recognizable proof.It has officially connected on account of LPG-sponsored gas administrations,managing an account as Know Your Customer(KYC)for a secure character.In,Pradhan Mantri Jan Dhan Yojana(PMJDY)acknowledges an Aadhaar card number as the main report adequate to open the ledger.The Indian government has started a computerized locker framework for everyone putting away every single private certification on the administration’s server.The proposition visa in 10 days,month-to-month benefits and provident trust are likewise all the while [37-39].The system for counting people on public transport was discussed in 2018 by Patricia Chato and Nancy Velasco.Single-camera processing of camcorder videos is used to perform an algorithm to identify and count people using artificial neural networking(ANNs).The system is based on a single camera[40].In[41]author has proposed a deep learning-based model for image classification.In 2021,Lingxiao Zhang was introduced to Zhiping Wang and Zhang concerning image classification using deep learning discussed multi-level neural network-based feature extraction and analytics algorithm.The project focused particularly on the multi-level neural network with the introduction of the extraction feature pipeline [42].In 2020,Youhui Tian discussed the neural network for the imaging process and established a dual optimization model to optimize the convergence process and the complete connection process in an integrated way[43].Some other related work trying to optimize the problem is also referred to using fuzzy logic[44]and evolutionary models[45].

    Nevertheless,these face recognition techniques cannot perform well in constrained conditions.Principal Component Analysis-Support Vector Machine (PCA-SVM) has demonstrated generalization capabilities in many tasks,including the ability to recognize objects with small or large data samples compared to Principal Component Analysis-Artificial Neural Network (PCA-ANN).However,PCA-SVM is ineffective and inefficient in detecting human faces in cases in which there is poor lighting,long hair,or items covering the subject’s face.Some scholars have emphasized the use of feature extraction techniques,while others have proposed improvements in the classification stage.The eigenfaces method is the most prominent research work in face recognition analysis,and research has been conducted on Gabor wavelets to improve the extraction of human facial features.However,these methods still can reduce the accuracy of face recognition.This paper,therefore,proposes a model of face recognition that trains datasets,extracts face features using DCT,and classifies face data using SVM.The knowledge of this research is important to the research community and forwardthinking organizations as it provides insights into the use of modified PCA-Genetic Kernel SVM for face detection.

    1.1 Principles of FRS

    Face recognition is a key piece of our lives.It is the essential means by which individuals distinguish one another thus it is characteristic to endeavor to instruct PC’s to do likewise.The uses of computerized face recognition are various,for example,from biometric confirmation,observation to feature database indexing and seeking.Our consideration is on biometric confirmation.At present,a few techniques are available to accomplish face acknowledgement,for example,primarily based on histograms,the multi-resolution approach,the information theory approach,and the Eigenface approach.Fig.1 gives a thought regarding the procedure of enlistment,verification and identification of face pictures.Face recognition[7]by machine is essentially a picture investigation issue and is done either by verification or identifications pieces of proof.In verification,we think about a face against an arrangement of countenances.In identification,a face is analyzed against every face in databases.Theoretically,FRS comprises principally three distinct stages.

    1.2 Generic Model of FRS

    Fig.2 gives a thought regarding the phase of a generic model of FRS.In the first stage,concentrate features from face pictures utilizing detection procedure.In the second stage,apply the learning algorithm to train the framework.Resulting in training,referred to the instance is given as information for recognition.The classifier doles out the mark accurately if elements are coordinated.Otherwise,it is needed as an erroneous characterization and suggests that more input is obliged to train the classifier.

    Figure 1:Idea about the FRS

    Figure 2:Generic model of FRS

    1.3 Framework of a Reorganized FRS

    The study in programmed face recognition has been done after the 1960s.This issue is still essentially unsettled.Current years have seen real advances around the inferable from advances in face recognition techniques.The strategy that has been produced for dependable face recognition still proposes an excellent test to computer vision canvases.The different reason has expanded the enthusiasm for face recognition.It comprises public concern toward security,the requirement for identity and verification in the advanced world,the requirement for face analysis methods and a few others.

    In the early stage,face affirmation is finished by the simple technique of geometric algorithmic models.At present,the verification way has formed into an exploratory improvement of troublesome geometric representation and indistinguishable procedure.As of late,the advances have upgraded FRS into a lively centre.Researchers are experiencing solid examination on discovering FRS for more extensive territory data,for example,a factual base procedure of feature extraction and classification strategies.We have checked the face recognition in different lighting conditions and areas.Preprocessing,image detection,feature extraction and face recognition are the routines utilized for FRS.In this way,a commonplace FRS contains a sensor to recognize the face picture.A preprocessing component is utilized for improving inputs for feature extraction steps.This stride reduced the span of features.The learning algorithms are utilized to prepare the framework.Succeeding in training performs order to characterize the elements.Later than characterization,we might likewise utilize post-processing strategies to assess the consequences of the framework.For the most part,classification methods are utilized in post-processing.

    In Fig.3,the system is used to speak to in five stages.Firstly,detection may be characterized as obtaining a specimen in which a sensor is obliged to catch an optical picture,then changing over it,into a computerized picture.The second system is preprocessing,which standardized a picture called.The third procedure is feature extraction,where elements are removed from appearances.In fourth,learning provides training to the framework.The fifth procedure is classification,the procedure of masterminding information in gatherings or class as per comparability in attributes is called classification(characterization).At long last,output speaks to yield in a specific structure and the process is called post-processing.As of now,different scrutinies are introducing diverse sorts of face recognition frameworks.Some are offered with change and others through extension.To convey another framework,we have to think about the sorts of FRS.

    Figure 3:Reorganized FRS

    1.4 Challenges in FRS

    The execution of FRS is influenced by diverse variables,however,in every one of them the feature extraction and classification are the root elements.

    1.4.1 Feature Extraction

    Feature extraction is the procedure of characterizing an arrangement of picture qualities,which will most effectively or seriously speak to the data that is essential for investigation and characterization.The objective of feature extraction is to enhance the viability and effectiveness of investigation and arrangement.This may be finished by disposing of repetition in the picture information,taking out variability in the picture information that is of little or no quality in grouping notwithstanding tossing whole pictures if that is fitting,rebuilding the information(in feature space)to improve the classifier’s execution,removing spatial data(texture,size,shape)which is pivotal to target distinguishing proof.That is,one might want to minimize the number of components and augment design separation.

    In FRS the normal for face elements considers as variation in illumination,poses,expressions,background,and occultation,RTS(Rotation,Scaling and interpretation).The given underneath Tab.1 illuminate the elements that influence feature extraction ventures of FRS.A few systems of surely understand for feature extraction as mean,standard deviation,kurtosis,histogram,PCA,Independent Component Analysis(ICA)and Linear Discriminant Analysis(LDA).

    Table 1:Considerable Issues in face detection and feature extractions

    1.4.2 Classification

    A face recognition method is the blend of algorithms that includes distinctive strides of the FRS.Since classification is the most vital stride in all strides,hence the classification of face recognition procedures relies on the classifier name.Be that as it may,more often than not,the classifier name is called a face recognition strategy.To build up the classifiers’consensus,it needs to assess a differing arrangement of expressions,lighting conditions,and subjects.The classification forces of a classifier are expanded utilizing a few changes or augmentation as a part of the existing order algorithm of the classifier.Usually,the methodology used as a district of the configuration of FRS has been to tentatively look into the execution of some classifiers keeping in mind the top goal to decide on the most effective one.Some samples of classifiers are K-neighbors,theorem classifier,PCA,ANN,and SVM.On the opposite hand,a choice methodology visible of consolidating varied classifiers has developed.This technique goes below completely different names,for example,multiple classifier frameworks or committees or ensembles of the classifier.This method is to a fault unpredictable could also be experiencing lower execution.

    1.5 Mathematical Background

    Face recognition is matched application that consequently recognizes or checks an individual from an advanced picture.In check,the framework looks like a face against a bunch of appearances while in recognizable proof a face is analyzed against each face in information bases.The image recognition framework takes a shot at the base of summed-up advances.Right off the bat distinguishing or choosing improved the countenances.A short time later,makes two arrangements of faces,one of them is preparing the set and another is trying the set.Concentrate the highlights and prepare them with a suitable classifier.At long last,contrast the prepared highlights with the highlights of the test picture and note down the results.

    Appearances are distinguished in genuine words or chosen from a setup information base.The framework chips away at two stages,preparing and testing.In preparing,the framework extricates the highlights from appearances of the preparing set.Two sorts of highlight extraction procedures,the spatial area and recurrence space are in patterns.Face acknowledgement is a constant application and thus,it requires quicker calculation.The recurrence area holds the key to the speed and straight forwardness of tasks that are the necessity of quicker calculation.In the spatial area,the estimation of the pixels of the picture change regarding the scene.Though,in the recurrence area,it is treated with the rate at which the pixel esteems are evolving.Spatial space isn’t given a lot of data about a face image.Face picture is first changed from spatial area to recurrence area.Different fundamental change methods are utilized,for example,Discrete Wavelet Transformation(DWT)and DCT.DCT[9]is utilized for highlight extraction because of its information compaction property.2-D DCT is considered as distinct administrator premise work for 8*8 pixels are appeared in condition[1].

    2-D DCT is given as with assumption that the data array has finite rectangular support on[0,N1,-1]x[0,N2-1]then the 2-D DCT is given as[10]

    Where the most elevated frequencies happen at the most elevated indices.Where X is a genuine esteemed sign,in the wake of separating the highlights,a framework prepared these highlights utilizing fitting classifiers.Order strategies are classified into three different ways:measurable,non-factual and hybrid.It is hard to recognize the right element for the acknowledgement of the item.The detailing of highlight vectors utilizing measurable and non-factual methods is hard to arrange the non-distinct highlights.Consequently,cross-breed methods with a blend of measurement and non-static strategies are utilized for acknowledgement,regardless of whether neural network(NN)organization is one of them.NN is a famous strategy utilized for mixture order.As per the study,SVM is more worthwhile than ANN because of its liner or non-direct applicability.SVM takes a shot at the high dimensional element space of double plan terms of the kernel.SVM is utilized as an enormous edge portion-based classifier.It is determined ideal hyperplanes augment the edge between classes.The classification of sample X is given by Eq.(3)of SVM.

    Where K is the portion work,xi is the preparation tests and yi (-1,+1) their class names,αi and b is the boundary of the model in the wake of preparing in testing stage extricate the feature from countenances of testing set and look at it from prepared highlights.Thereafter,measures the exhibition of FRS.Taking into account current realities,FRS doesn’t work well to consolidate helpless lighting,conceals,long hair,or various articles decently covering the subject’s face,and low goal pictures.These requirements give low exactness and more prominent preparing time.Since FRS contains two fundamental advances feature extraction and grouping.The element extractor is answerable for the right and decreased type of info highlight.Classifiers are mindful to prepare and think about the highlights.Subsequently,the blend of feature extractor and classifier are the foundation of FRS.To make a productive FRS,it is required to evaluate the blend of spines contended that DCT as feature extractor and SVM as Classifier.

    2 Proposed Strategy and Model

    The greatest issue in face recognition is to streamline the boundaries of a portion of SVM.The exploration is utilized the radial basis function part.It is a decent heuristic to discover the arrangement and the radial basis function piece takes just one information boundary.Another central explanation,when the face order of face information is intricate and the hyperplane follows as a circle then it very well may be utilized.Along these lines,it is utilized.The kernel of the radial basis function is defined as Eq.(4).

    Whereγ=Present work attempts to optimize theσparameter of kernel function using a genetic algorithm.The genetic technique utilizes goal work,probabilistic progress rules.It effectively handles the discrete variable.Consequently,it is used.Planned methodology contained in different advances.Fig.4 shows a proposed model of face recognition.The square of the model demonstrates the selection of the dataset.Preparing and testing sets of pictures are apportioned with each picture divided into the equivalent size of squares.Subsequently,the DCT coefficient is determined for each square.They received coefficients are changed over into include vectors.Presently,the highlights vectors of the preparing set are prepared by radial basis function bit-based SVM.In this,the radial basis function portion boundary of SVMσis streamlined by hereditary tasks.If the conditions,for example,proposed wellness work are met,then the yields are shown.Something else,hereditary tasks are applied once more.

    In face recognition structure wellness work is described from different perspectives.For instance,the exactness of ID,number of parts and highlight cost be the three rules used to layout a wellness work in face recognition.By making a solitary target wellness work that joins these three destinations into one.Each segment has a substitute component that incurred significant damage in the dataset.If we don’t have the included incurred significant damage information,the cost can be set to some consistent regard,for example,1 or another number.The chromosomes with the most amazing wellness esteem have a high probability to be secured for the following time.

    Figure 4:Planned representation of the model

    A framework of wellness capacities is given as f=accuracy+*Number of generations.Where accuracy is considered at upgrade estimation of optimize valueσand taking several generations to find the optimized value.

    3 Experimental Results and Analysis

    The example frontal face pictures have been taken from the AT&T (ORL) information base for the investigation reason.The information base contains ten unique pictures of every one of 40 unmistakable subjects.All the pictures were taken in the same lighting condition with the subjects in an upstanding frontal position.Each picture is of size 112*92 pixels.For the trial assessment,scarcely any boundaries were fixed as square size as 8.The resilience,populace size,Maximum age,Maximum time,Minimum sigma and most extreme sigma were set as 0.1,16,100,20,0.05,and 1 individually.All these were set with standard qualities dependent on the most recent examination results.

    Tab.2 is exhibiting the trial estemates on the ORL information base for the proposed model.The trials were done on the quantity of faces 10,15,20,30,and 40.Six examples of each picture were utilized in all investigations.Test 4 discovered 98.67%precision that is better in all other analyses on 180 pictures.It discovered 3.5212 s training time that is more noteworthy than others.It additionally noticed that.0012 s low testing time in performed tests.It is noted here expanding of the number of faces exactness rate is high however training time expanded.Although testing time is decreasing.Relatively,expiring of testing time makes a degree to decreasing the all-out classification time.

    Table 2:Outcome summary of planned model discrete cosine transform-support vector machine(DCT-SVM)

    Examine the planned algorithm,we have been contrasted and left approaches PCA-SVM and MODIFIED PCA-GENETIC KERNEL SVM.Five examinations were performed on recently characterized boundaries in the proposed model.Tab.3 is being showing the exploratory estimations of proficiency boundaries on the ORL information base for past models PCA-SVM,PCA-KGSVM.The most elevated precision for the PCA-SVM blend was discovered 93.33%in experiment no 3.The least training time was found in experiment No 2.For the mix,MODIFIED PCA-GENETIC KERNEL SVM,98.83% exactness was found in experiment no5.Training time was discovered at 2.3121 s in trial no2.It is noted here expanding of the number of faces accuracy rate is high however training time expanded for this situation moreover.Although,testing time is decreasing.Similarly,expiring of testing time makes a degree to decreasing the total classification time.For a better examination of the planned model with the existing one,we can draw the diagrams of exactness,training time and order time as for the number of appearances.Figs.5-7 are shown the near examination.

    Table 3:Outcome summary of PCA-SVM&MODIFIED PCA-GENETIC KERNEL SVM model

    Table 3:Continued

    Figure 5:Total number of faces vs.accuracy

    Fig.6.is speaking to a relative chart that is drawn between the number of countenances and precision.The normal exactness of DCT-GENETIC KERNEL SVM is relatively high to the blend PCA-SVM and MODIFIED PCA-GENETIC KERNEL SVM.Even though,the fifth path of MODIFIED PCA-GENETIC KERNEL SVM has discovered 98.83% accuracy that is greatest if MODIFIED PCA-GENETIC KERNEL SVM.Fig.7 is speaking to a near diagram that indicated the training time relating the number of countenances.The DCT-GENETIC KERNEL SVM is taken less training time relative to PCA-SVM and PCA-GENETIC KERNEL SVM.Fig.7 is speaking to a relative chart that investigation done among three in the particulars of complete classification time.The DCT GENETIC KERNEL SVM is taken less classification time.Remembering the ultimate objective to additional outline the viability of the proposed,we are made assessments with direct PCA-SVM and MODIFIED PCA-GENETIC KERNEL SVM made strategies.Shown strategies are giving better outcomes.Thus,the preparing season of the proposed model is more prominent than the current model,while the testing time is lesser.The proposed strategy was discovered generally speaking classification time not exactly leaving model.As the number countenances are expanded,the training time is moreover extended in the proposed model.Notwithstanding,the mistake rate has fallen.As we were expanded the information compared to posture and light changes,it has expanded the normal accuracy.Subsequently,the proposed calculation exhibits a strong Classification.

    4 Conclusions

    Test results exhibit the adequacy and proficiency of the proposed strategies.At last,the proposed technique streamlined the piece boundaries of SVM by the generic algorithm with DCT was discovered with agreeable outcomes.The fifth path of MODIFIED PCA-GENETIC KERNEL SVM is discovered with 98.83%accuracy that is most extreme for MODIFIED PCA-GENETIC KERNEL SVM.It discovered more noteworthy accuracy,lower training time and less classification time if there should arise an occurrence of DCT-GENETIC KERNEL SVM.Test outcomes display the sufficiency and proficiency of the planned methodologies.Finally,the planned method smoothened the piece limits of SVM by conventional calculation with DCT and found pleasant results.

    In the Future,some accommodation may be changed or added to the planned model.In the arranged model,DCT is utilized as highlight extractor and genetic kernel as Optimization.Both can expand the training time.Some part extractors as changes,dissipating,skewness,kurtosis and others may be utilized as an improvement in the spot of DCT.The phony huge number,underground bug settlement,MEB,cushioned reasoning and different methods may be utilized as headway.The offered structure performs on restricted size and kind of database.Later on,it may apply to huge databases and noisy pictures.In any case,we pondered just factors of lighting,present,illuminating,and verbalization in the database.We may additionally fuse the age and sex-bearing fragments.To make a secure framework,the proposed model may get together with other biometric structures as Iris,Fingerprint,Retina and others.

    Funding Statement:The authors received no specific funding for this study.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲精品粉嫩美女一区| 水蜜桃什么品种好| 亚洲人成电影免费在线| 欧美激情 高清一区二区三区| 亚洲成人免费电影在线观看| 两个人看的免费小视频| av在线播放精品| 高清欧美精品videossex| 男女高潮啪啪啪动态图| 国产一区二区三区在线臀色熟女 | 日韩免费高清中文字幕av| 男人操女人黄网站| 亚洲伊人色综图| 欧美大码av| 久久这里只有精品19| 一区二区三区精品91| 亚洲人成电影观看| 男女午夜视频在线观看| av在线播放精品| 亚洲天堂av无毛| 啪啪无遮挡十八禁网站| 中文字幕另类日韩欧美亚洲嫩草| 无限看片的www在线观看| 爱豆传媒免费全集在线观看| 中国美女看黄片| 大陆偷拍与自拍| 亚洲性夜色夜夜综合| 久久久精品区二区三区| 免费不卡黄色视频| 精品福利永久在线观看| 90打野战视频偷拍视频| 国产精品 国内视频| 国产精品av久久久久免费| 999精品在线视频| 午夜免费鲁丝| 国产精品秋霞免费鲁丝片| 在线av久久热| 免费av中文字幕在线| 性色av乱码一区二区三区2| 97在线人人人人妻| 欧美 亚洲 国产 日韩一| 女人爽到高潮嗷嗷叫在线视频| 咕卡用的链子| 国产精品一区二区免费欧美 | 婷婷丁香在线五月| 两性夫妻黄色片| 男人操女人黄网站| 国产区一区二久久| 国产男女超爽视频在线观看| 婷婷色av中文字幕| 国产精品99久久99久久久不卡| 国产成人免费无遮挡视频| 久久久精品区二区三区| 性高湖久久久久久久久免费观看| 国产成人av教育| 91精品伊人久久大香线蕉| 成人av一区二区三区在线看 | 99国产精品99久久久久| 亚洲成人免费av在线播放| 中文字幕另类日韩欧美亚洲嫩草| 多毛熟女@视频| 在线观看舔阴道视频| 国产日韩欧美视频二区| 性色av一级| 成人国语在线视频| 免费高清在线观看日韩| 无遮挡黄片免费观看| 国产深夜福利视频在线观看| 人人妻,人人澡人人爽秒播| 国产成人系列免费观看| 亚洲成人国产一区在线观看| 99精国产麻豆久久婷婷| 老司机午夜福利在线观看视频 | www.精华液| 最近最新中文字幕大全免费视频| www.999成人在线观看| 久久久精品免费免费高清| 最近中文字幕2019免费版| 久久久久久久久久久久大奶| 考比视频在线观看| 在线观看www视频免费| 老司机深夜福利视频在线观看 | 亚洲av成人不卡在线观看播放网 | 亚洲精品美女久久av网站| 91精品伊人久久大香线蕉| 男女国产视频网站| 一本—道久久a久久精品蜜桃钙片| e午夜精品久久久久久久| 人人妻人人澡人人看| 五月开心婷婷网| 12—13女人毛片做爰片一| 黄色视频在线播放观看不卡| 侵犯人妻中文字幕一二三四区| 久久久久久久大尺度免费视频| 日韩精品免费视频一区二区三区| 久久中文看片网| 亚洲少妇的诱惑av| 午夜福利影视在线免费观看| 一级毛片精品| 50天的宝宝边吃奶边哭怎么回事| 99国产精品一区二区三区| 久久综合国产亚洲精品| 免费人妻精品一区二区三区视频| 日韩欧美免费精品| 成人免费观看视频高清| 午夜老司机福利片| 色老头精品视频在线观看| 欧美av亚洲av综合av国产av| 久久久水蜜桃国产精品网| avwww免费| 亚洲精品在线美女| 不卡av一区二区三区| 国产1区2区3区精品| 啦啦啦视频在线资源免费观看| 亚洲伊人色综图| 俄罗斯特黄特色一大片| 亚洲熟女精品中文字幕| 国产97色在线日韩免费| 午夜激情久久久久久久| 日日爽夜夜爽网站| 老司机福利观看| 女警被强在线播放| 人成视频在线观看免费观看| 18在线观看网站| 亚洲国产av新网站| 熟女少妇亚洲综合色aaa.| 老鸭窝网址在线观看| 精品人妻在线不人妻| 亚洲精品一区蜜桃| 欧美日韩黄片免| 亚洲欧洲精品一区二区精品久久久| 久久精品成人免费网站| 午夜福利在线观看吧| 国产一区二区在线观看av| 丝袜人妻中文字幕| 精品亚洲成国产av| 乱人伦中国视频| 国产亚洲精品第一综合不卡| 日本黄色日本黄色录像| 一级,二级,三级黄色视频| 天天操日日干夜夜撸| 在线观看免费视频网站a站| 好男人电影高清在线观看| 美女视频免费永久观看网站| 男人添女人高潮全过程视频| 国产av精品麻豆| 国产成人精品久久二区二区91| 中文字幕人妻丝袜一区二区| 新久久久久国产一级毛片| 成人国产一区最新在线观看| 人妻 亚洲 视频| 久久精品成人免费网站| 91麻豆av在线| 桃花免费在线播放| 国产精品秋霞免费鲁丝片| 欧美日韩福利视频一区二区| 一区二区三区精品91| 一本色道久久久久久精品综合| 精品国产国语对白av| 免费在线观看影片大全网站| 一本大道久久a久久精品| 久久国产精品人妻蜜桃| 亚洲欧洲精品一区二区精品久久久| 国产人伦9x9x在线观看| 美女福利国产在线| 91九色精品人成在线观看| 性色av一级| 欧美成人午夜精品| 亚洲国产欧美网| 丝袜脚勾引网站| 亚洲国产精品成人久久小说| 每晚都被弄得嗷嗷叫到高潮| 久久久久久免费高清国产稀缺| 女人高潮潮喷娇喘18禁视频| 欧美激情极品国产一区二区三区| 又大又爽又粗| 美女大奶头黄色视频| 少妇裸体淫交视频免费看高清 | 国产亚洲欧美精品永久| 美女主播在线视频| 天堂中文最新版在线下载| 啦啦啦 在线观看视频| 国产精品久久久人人做人人爽| 久久久国产欧美日韩av| a级片在线免费高清观看视频| 黄片小视频在线播放| 日韩电影二区| 丝袜在线中文字幕| 亚洲国产精品成人久久小说| 美女国产高潮福利片在线看| 国产精品久久久久久精品古装| 丝袜脚勾引网站| 欧美另类亚洲清纯唯美| 女人精品久久久久毛片| 成人影院久久| 丝袜脚勾引网站| 五月天丁香电影| 搡老熟女国产l中国老女人| 少妇猛男粗大的猛烈进出视频| 91大片在线观看| 国产精品99久久99久久久不卡| 美女高潮喷水抽搐中文字幕| tocl精华| 欧美另类一区| 亚洲av男天堂| 免费看十八禁软件| a在线观看视频网站| 人人妻人人澡人人看| av一本久久久久| 久久ye,这里只有精品| 在线观看免费午夜福利视频| 欧美精品一区二区免费开放| 久久这里只有精品19| 精品国内亚洲2022精品成人 | 夜夜夜夜夜久久久久| 老司机午夜十八禁免费视频| 日韩大片免费观看网站| 亚洲av电影在线观看一区二区三区| 侵犯人妻中文字幕一二三四区| 午夜福利视频在线观看免费| 涩涩av久久男人的天堂| 久久久久久免费高清国产稀缺| 欧美日韩国产mv在线观看视频| 欧美日韩国产mv在线观看视频| 久热这里只有精品99| 国产熟女午夜一区二区三区| 成人影院久久| 黄色片一级片一级黄色片| av网站免费在线观看视频| 亚洲一码二码三码区别大吗| 亚洲熟女精品中文字幕| 欧美日韩亚洲国产一区二区在线观看 | 精品人妻1区二区| 亚洲国产欧美一区二区综合| 午夜久久久在线观看| 正在播放国产对白刺激| 日韩制服骚丝袜av| 亚洲综合色网址| 久久ye,这里只有精品| 青青草视频在线视频观看| 九色亚洲精品在线播放| tube8黄色片| 搡老岳熟女国产| 亚洲国产日韩一区二区| 女警被强在线播放| 中文字幕av电影在线播放| 国产成+人综合+亚洲专区| 久久人人97超碰香蕉20202| av视频免费观看在线观看| www.av在线官网国产| 肉色欧美久久久久久久蜜桃| 亚洲国产av影院在线观看| 日韩免费高清中文字幕av| 国产在线一区二区三区精| 午夜福利一区二区在线看| 成年动漫av网址| 热99久久久久精品小说推荐| 99精品欧美一区二区三区四区| 国产一区二区三区在线臀色熟女 | 一边摸一边做爽爽视频免费| 精品乱码久久久久久99久播| 亚洲精华国产精华精| 国产亚洲午夜精品一区二区久久| 一本大道久久a久久精品| 在线十欧美十亚洲十日本专区| 国产精品一区二区精品视频观看| 另类精品久久| 日本a在线网址| 在线av久久热| 一级毛片女人18水好多| 天堂俺去俺来也www色官网| 日本黄色日本黄色录像| 两性夫妻黄色片| 色综合欧美亚洲国产小说| 久久久久久久精品精品| www日本在线高清视频| 不卡一级毛片| 热99久久久久精品小说推荐| 美女大奶头黄色视频| 50天的宝宝边吃奶边哭怎么回事| 久久精品aⅴ一区二区三区四区| 两性夫妻黄色片| 国产免费视频播放在线视频| 少妇猛男粗大的猛烈进出视频| 淫妇啪啪啪对白视频 | 亚洲va日本ⅴa欧美va伊人久久 | 女人久久www免费人成看片| 91麻豆av在线| 侵犯人妻中文字幕一二三四区| 91字幕亚洲| 亚洲第一av免费看| 在线天堂中文资源库| 亚洲av欧美aⅴ国产| 国产成人欧美在线观看 | 欧美人与性动交α欧美精品济南到| 美女福利国产在线| 精品人妻1区二区| 亚洲精品久久成人aⅴ小说| 亚洲精品粉嫩美女一区| 国产成人精品久久二区二区91| 久久久国产成人免费| 啦啦啦在线免费观看视频4| 日韩制服丝袜自拍偷拍| 久久免费观看电影| 人人澡人人妻人| 亚洲精品在线美女| 狠狠精品人妻久久久久久综合| 日韩欧美一区视频在线观看| 亚洲国产日韩一区二区| 久久久久久久久久久久大奶| 国产片内射在线| 中文字幕制服av| 91精品三级在线观看| 久久久精品免费免费高清| 亚洲精品自拍成人| 久久精品人人爽人人爽视色| 国产一区二区三区综合在线观看| 亚洲av日韩在线播放| 菩萨蛮人人尽说江南好唐韦庄| 男男h啪啪无遮挡| 国产精品久久久久久精品古装| 少妇被粗大的猛进出69影院| 欧美精品人与动牲交sv欧美| 久久久精品94久久精品| 不卡一级毛片| 香蕉丝袜av| 亚洲av电影在线观看一区二区三区| 欧美 日韩 精品 国产| 亚洲男人天堂网一区| 香蕉丝袜av| 操出白浆在线播放| 青青草视频在线视频观看| 国产精品免费视频内射| 午夜福利一区二区在线看| 免费观看a级毛片全部| 欧美日韩精品网址| 中亚洲国语对白在线视频| 男人爽女人下面视频在线观看| 久久人妻熟女aⅴ| 精品久久久精品久久久| 亚洲成av片中文字幕在线观看| 日韩大片免费观看网站| 一级a爱视频在线免费观看| 国产精品影院久久| 久久精品熟女亚洲av麻豆精品| 黄片小视频在线播放| 热99re8久久精品国产| 色播在线永久视频| 欧美在线黄色| 久久久久久亚洲精品国产蜜桃av| 男女午夜视频在线观看| 黄色片一级片一级黄色片| 国产精品熟女久久久久浪| kizo精华| a在线观看视频网站| 国产一区二区 视频在线| 久久久精品区二区三区| 国产免费现黄频在线看| 色婷婷av一区二区三区视频| 在线观看舔阴道视频| 涩涩av久久男人的天堂| 国产男女超爽视频在线观看| 欧美少妇被猛烈插入视频| 丁香六月天网| 欧美精品一区二区免费开放| 丁香六月欧美| 国产精品99久久99久久久不卡| 亚洲欧美色中文字幕在线| 午夜福利在线免费观看网站| 黄色片一级片一级黄色片| 一级毛片精品| av在线app专区| 国产精品偷伦视频观看了| 国产视频一区二区在线看| 交换朋友夫妻互换小说| 国产成人精品久久二区二区免费| 美女午夜性视频免费| 大香蕉久久网| 国产免费福利视频在线观看| 最黄视频免费看| 男男h啪啪无遮挡| 国产在线观看jvid| 亚洲天堂av无毛| 黄网站色视频无遮挡免费观看| 久久中文字幕一级| 亚洲欧洲日产国产| 91精品国产国语对白视频| 亚洲五月色婷婷综合| 美女中出高潮动态图| 久9热在线精品视频| 午夜日韩欧美国产| 免费黄频网站在线观看国产| 国产免费福利视频在线观看| 日本猛色少妇xxxxx猛交久久| 99热全是精品| 中文字幕另类日韩欧美亚洲嫩草| 我的亚洲天堂| 亚洲精品国产av蜜桃| 久久亚洲国产成人精品v| 免费高清在线观看日韩| 最新的欧美精品一区二区| 老司机福利观看| 97精品久久久久久久久久精品| 99精品欧美一区二区三区四区| 国产精品秋霞免费鲁丝片| 悠悠久久av| 亚洲色图 男人天堂 中文字幕| 国产亚洲一区二区精品| 久久99一区二区三区| 久久综合国产亚洲精品| 老熟妇仑乱视频hdxx| 男女床上黄色一级片免费看| 波多野结衣一区麻豆| √禁漫天堂资源中文www| 在线 av 中文字幕| 黄片小视频在线播放| 色婷婷av一区二区三区视频| av线在线观看网站| 精品欧美一区二区三区在线| 热99久久久久精品小说推荐| 亚洲 欧美一区二区三区| 色94色欧美一区二区| 日韩免费高清中文字幕av| 女人久久www免费人成看片| av一本久久久久| 每晚都被弄得嗷嗷叫到高潮| 性高湖久久久久久久久免费观看| 大片电影免费在线观看免费| 日本五十路高清| 69精品国产乱码久久久| 久久久精品区二区三区| 亚洲欧美激情在线| 一个人免费看片子| tocl精华| 日韩 亚洲 欧美在线| 日本a在线网址| 国产精品1区2区在线观看. | 在线av久久热| 亚洲精品一卡2卡三卡4卡5卡 | 国产精品久久久久久人妻精品电影 | 五月开心婷婷网| 欧美少妇被猛烈插入视频| 亚洲第一av免费看| 久久香蕉激情| 亚洲精品国产av成人精品| 午夜免费成人在线视频| 老司机影院毛片| 老司机福利观看| 动漫黄色视频在线观看| 69av精品久久久久久 | 国产成人免费无遮挡视频| 天天影视国产精品| 一级,二级,三级黄色视频| 我的亚洲天堂| 亚洲国产欧美日韩在线播放| 亚洲av电影在线进入| √禁漫天堂资源中文www| 国产亚洲av片在线观看秒播厂| 国产成人啪精品午夜网站| 国产精品 欧美亚洲| 亚洲精品国产区一区二| 欧美激情高清一区二区三区| 91精品国产国语对白视频| 亚洲久久久国产精品| 久久ye,这里只有精品| 日本91视频免费播放| 亚洲熟女精品中文字幕| 9191精品国产免费久久| 无遮挡黄片免费观看| 天天操日日干夜夜撸| 国产高清videossex| 搡老岳熟女国产| 可以免费在线观看a视频的电影网站| 精品人妻在线不人妻| 亚洲精品久久午夜乱码| 黄色视频,在线免费观看| 手机成人av网站| 久久九九热精品免费| 精品亚洲乱码少妇综合久久| 国产精品 欧美亚洲| 欧美日本中文国产一区发布| 两性午夜刺激爽爽歪歪视频在线观看 | 十八禁人妻一区二区| 成人免费观看视频高清| 最近中文字幕2019免费版| 制服人妻中文乱码| 国产精品影院久久| 日韩大码丰满熟妇| 老司机深夜福利视频在线观看 | 久久影院123| 午夜免费观看性视频| 色综合欧美亚洲国产小说| 亚洲中文字幕日韩| 黑丝袜美女国产一区| 黄色a级毛片大全视频| 丁香六月天网| 亚洲一区二区三区欧美精品| 亚洲成人手机| 国产91精品成人一区二区三区 | 久久国产精品人妻蜜桃| 亚洲国产看品久久| 一区在线观看完整版| 国产在视频线精品| 99re6热这里在线精品视频| 欧美一级毛片孕妇| 纯流量卡能插随身wifi吗| 成人手机av| 少妇 在线观看| 亚洲av欧美aⅴ国产| 下体分泌物呈黄色| 男女免费视频国产| xxxhd国产人妻xxx| 久久狼人影院| 大香蕉久久成人网| 一区二区三区乱码不卡18| 中文字幕人妻丝袜一区二区| 国产人伦9x9x在线观看| 在线观看人妻少妇| 精品熟女少妇八av免费久了| 国产精品国产三级国产专区5o| 狠狠狠狠99中文字幕| 搡老熟女国产l中国老女人| 黄色视频,在线免费观看| 欧美精品亚洲一区二区| 亚洲av日韩精品久久久久久密| 看免费av毛片| 人人妻人人爽人人添夜夜欢视频| 亚洲avbb在线观看| 好男人电影高清在线观看| 亚洲精品日韩在线中文字幕| 一本久久精品| 91成年电影在线观看| 99国产精品99久久久久| 黄色视频不卡| 黄色怎么调成土黄色| 久久久水蜜桃国产精品网| 国产一区二区 视频在线| 久久精品国产亚洲av香蕉五月 | 午夜两性在线视频| 一级片免费观看大全| 欧美精品亚洲一区二区| 亚洲欧美精品自产自拍| 免费日韩欧美在线观看| 欧美xxⅹ黑人| 另类精品久久| 久久久精品国产亚洲av高清涩受| 国产欧美日韩一区二区三区在线| 免费在线观看黄色视频的| 丝袜脚勾引网站| 精品国产乱码久久久久久男人| 亚洲精品久久午夜乱码| 午夜福利一区二区在线看| 国产精品亚洲av一区麻豆| 免费黄频网站在线观看国产| 日本撒尿小便嘘嘘汇集6| 狠狠精品人妻久久久久久综合| 免费观看a级毛片全部| 国产日韩欧美亚洲二区| 日韩中文字幕视频在线看片| av天堂在线播放| 午夜老司机福利片| 韩国精品一区二区三区| 精品熟女少妇八av免费久了| 啦啦啦啦在线视频资源| 电影成人av| 国产精品99久久99久久久不卡| 日本a在线网址| 美女国产高潮福利片在线看| 这个男人来自地球电影免费观看| a 毛片基地| 18在线观看网站| 亚洲一区中文字幕在线| 国产精品一区二区在线观看99| 精品少妇久久久久久888优播| 在线永久观看黄色视频| 老司机福利观看| 精品一品国产午夜福利视频| 2018国产大陆天天弄谢| 国产激情久久老熟女| 999精品在线视频| 国产av又大| 国产日韩欧美视频二区| 一区二区三区精品91| 久久久久国产精品人妻一区二区| 老鸭窝网址在线观看| 又紧又爽又黄一区二区| 国产黄频视频在线观看| 悠悠久久av| 久久精品久久久久久噜噜老黄| 自线自在国产av| 国产国语露脸激情在线看| 国产在线一区二区三区精| 国产成人av教育| 悠悠久久av| 国产精品偷伦视频观看了| 久久久精品区二区三区| 国产黄色免费在线视频| 丝袜在线中文字幕| 少妇人妻久久综合中文| 国产xxxxx性猛交| 国产精品 欧美亚洲| 亚洲av美国av| 精品国内亚洲2022精品成人 | 男女之事视频高清在线观看| 精品国产乱子伦一区二区三区 | 老司机福利观看| 日韩欧美一区视频在线观看| 成人18禁高潮啪啪吃奶动态图| 91精品三级在线观看| 啦啦啦中文免费视频观看日本| 精品久久久久久久毛片微露脸 | 亚洲av成人不卡在线观看播放网 | 人人妻,人人澡人人爽秒播| 国产男人的电影天堂91| 国产伦理片在线播放av一区|