Technology & Cjs

Read Complete Research Material

TECHNOLOGY & CJS

Technology & CJS

Technology and Criminal Justice System

Databases

The set of information stored on a computer readable and organized internally by records (consisting of all fields relating to an entity or object stored) and fields (each of the elements of a record). It allows you to retrieve any kind of information: references, text documents, images, statistics, etc.

Facial Recognition System

Humans often use faces to recognize individuals and progress in computer capabilities in recent decades now allow similar surveys automatically. The previous facial recognition algorithms used simple geometric models, but the recognition process has now matured into a sophisticated mathematical representations Science and matching processes. Advances and initiatives in the past ten to fifteen years have propelled the facial recognition technology at the center of attention.

The facial recognition system is an application run by computer that automatically identifies a person in a digital image. This is possible by analyzing the subject's facial features extracted from the image or key frame in a video source, and comparing with a database.

Facial recognition has become in recent years an active research area spanning several disciplines such as image processing, pattern recognition, computer vision and neural networks. It involves both researchers in the field of computer science as neuroscientists and psychologists. It could also be considered within the field of object recognition , where the face is a three dimensional object subject to variations in lighting, pose, etc., and must be identified based on its 2D projection (except when using 3D techniques).

The purpose of a facial recognition system is generally as follows: given an image of a face "unknown" or test image, find an image of the same face in a set of images "known" or training images. The great difficulty is to ensure that this process can be performed in real time. The system will identify the faces present in images or videos automatically. It can operate in two modes:

* Verification or authentication of faces: comparing a face image with another image with the face we want to know the identity. The system will confirm or deny the identity of the face.

* Identification or face recognition: compare the image of an unfamiliar face with all the images of familiar faces found in the database to determine their identity.

It is mainly used in security systems for the recognition of users. These systems use a reader to define the characteristics of the face, and when requesting access, is verified by comparing the data from the database. However, these systems are not useful in the long term because, as the years pass, the facial features vary and to request access no longer match the image in the database. To solve this problem you can use an algorithm to interpret the passage of time, but also still not completely reliable), or renew the database frequently.

It is also used in applications of human-computer interaction, multimedia management, and software like Google's Picasa, Apple iPhoto, Sony's Picture Motion Browser (PMB), Facebook and ASUS Smart ...
Related Ads
  • Technology
    www.researchomatic.com...

    Technology , Technology Essay writing h ...

  • Technology
    www.researchomatic.com...

    Technology , Technology Assignment writ ...

  • Technology Management
    www.researchomatic.com...

    Technology Management, Technology Mana ...

  • Technology
    www.researchomatic.com...

    Technology , Technology Assignment writ ...