Sie sind auf Seite 1von 39

SMART ATTENDANCE USING FACE RECOGNITION

B.E. Project Report

On

“SMART ATTENDANCE USING


FACE RECOGNITION”
By

SACHIN SHITOLE (B150368602)

SURYANSH TIWARY (B150368624)

GANESH PATIL (B150368592)

RISHAB MISHRA (B150368601)

Under the guidance of

Dr T.A. CHAVAN

Department of Information Technology

Smt. Kashibai Navale College of Engineering, Pune-41


1 Accredited by NBA

SAVITRIBAI PHULE PUNE UNIVERSITY

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

2018-2019

Sinhgad Technical Education Society,


Department of Information Technology

Smt. Kashibai Navale College of Engineering, Pune

Date:

CERTIFICATE

This is to certify that,

SACHIN SHITOLE (B150368602)

SURYANSH TIWARY (B150368624)

GANESH PATIL (B150368592)

RISHAB MISHRA (B150368601)

of class B.E IT; have successfully completed their project work on “ SMART ATTENDANCE USING FACE
RECOGNITION” at Smt. Kashibai Navale College of Engineering, Pune in the partial fulfillment of the
Graduate Degree course in B.E at the Department of Information Technology, in the academic Year 2018-2019
as prescribed by the Savitribai Phule Pune University, Pune.

Dr T.A. Chavan Prof. R.H. Borhade


Project Guide Head of the Department
(Department of Information Technology)

Prof.V.S.Khandekar / Prof. O.S. Dubal (External Examiner)


Project coordinator Savitribai Phule Pune University
2

ACKNOWLEDGEMENT
Department of Information Technology, SKNCOE, Pune
SMART ATTENDANCE USING FACE RECOGNITION

I take this opportunity to thank my internal guide Dr T.A Chavan, for giving me guidance and support
throughout the Seminar. His valuable guidelines and suggestions were very helpful.

I wish to express my thanks to Prof. R. H. Borhade, Head of Information Technology Department, Smt.
Kashibai Navale College of Engineering, Vadgaon for giving me all the help and important suggestions
all over the Seminar Work. I thank all the teaching and non-teaching staff members, for their
indispensable support and priceless suggestions.

I also thank my friends and family for their help in collecting data without which this Seminar report
not have been Completed. At the end my special thanks to Dr. K. R. Borole , Vice-Principal and
Dr. A.V.Deshpande, Principal, Smt. Kashibai Navale College of Engineering, Vadgaon for providing
ambience in the college, which motivate us to work.

SACHIN SHITOLE
SURYANSH TIWARY
GANESH PATIL
RISHAB MISHRA

3
CONTENTS

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

SR. Topic Page


NO. NO.

1 Introduction to SMART ATTENDANCE USING FACE RECOGNITION 7

1.1)Motivation

1.2)Problem Statement

1.3)Objectives

2 Literature Survey 9

2.2)Related Work

2.2)Existing System

3 System Requirement and Specification 10

4 System Design 12
4.1) Basic Architecture
4.2) DFD0
4.3) DFD1
4.4) DFD2
4.5) Sequence Diagram
4.6) Use Case Diagram
4.7) Activity Diagram
4.8) Activity by Faculty

5 Theory and System Design 17

6 System Testing 18

7 Testing Screenshots 18

4 8 Conclusion 32

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

SR. Topic Page


NO. NO.

9 References 33

Figure table
Figure Name Page No.

Basic Architecture 24

DFD0 25

DFD1 25

DFD2 25

Sequence Diagram 26

Use Case Diagram 27

Activity Diagram 28

Activity by Faculty 29

Class Diagram 30

5
Abstract
The conventional method of taking attendance is done manually by the teacher or the administrator

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

which requires considerable amount of time and efforts also involving errors and proxy attendance. As
the number of students is increasing day by day, it is a challenging task for universities or colleges to
monitor and maintain the record of the students. Automated systems involving use of biometrics like
fingerprint and iris recognition are well developed in the recent years however, it is intrusive and cost
required for deployment on large scale gets increased substantially. To overcome these issues,
biometric feature like facial recognition can be used which involves the phases such as image
acquisition, face detection, feature extraction, face classification, face recognition and eventually
marking the attendance. The algorithms like Viola- Jones and HOG features along with SVM classifier
are used to acquire the desired result.

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

Chapter 1

Introduction
In this report, we focus on automatically annotating faces in images based on the ambiguous supervision from
the associated captions given. Some pre-processing steps need to be conducted before performing face naming.
Specifically, faces in the images are automatically detected using face detectors and names in the captions are
automatically extracted using a name entity detector. Here, the list of names appearing in a caption is denoted as
the candidate name set. Even after successfully performing these pre-processing steps, automatic face naming is
still a challenging task. Checking the performance of students and maintaining the attendance is a tedious
process for institute. Each institute has adopted their own method of taking attendance i.e. calling the names or
by passing the sheets. Several very popular automatic attendance systems currently in use are RFID, IRIS,
FINGERPRINT etc. However, making queue is essential in these cases thus requires more time and it is
intrusive in nature. Any damage to RFID card can make inappropriate attendance.

Apart from this deploying these systems on large scale is not cost efficient. In order to have a system both time
and cost efficient with no human intervention, facial recognition is the suitable solution also face is people's
preliminary scheme of person identification. With the rapid development in the fields of image processing such
as pattern recognition, facial recognition and signature recognition the efficiency of this system is keep on
increasing.

This system is attempting to provide an automated attendance system that carries out the face recognition task
through an image/video stream to record the attendance in lectures or sections and keeping the database of
attendance. After creating the database of the students/ candidates, it requires almost zero efforts from the user
side. Thus intrusive nature is absent in this system and makes the system effective.

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

1.1 Motivation

We get motivated of existing system.we have to match user object with database image using Scale invariant
feature transform. In that system first we have pre-processing on that video then select feature extraction and
compare object with database and get the result

1.2 Problem statement


Traditional way of marking attendance involves a typical situation of students sitting in a classroom and the
teacher calling out the names of the students individually to mark their attendance. The attendance is usually
marked using hard resources - pen and paper, which is very time consuming and there is a chance of marking
proxy attendance of another student and Nowadays there are many more technologies have been developed to
take the attendance like Biometric based System, Bluetooth based System, RFID based System but all of them
have certain flaws or defect, like Unauthorized person may make use of authorized ID card and enter into the
organization or passing of the device during the lecture time may distract the attention of the students.

-To overcome all these problems, our SMART ATTENDANCE USING FACE RECOGNITION can be useful.

1.3 Objectives
 To save the time.
 To completely eliminate proxy attendance.
 To provide a weekly survey of student
 To identify the odd person in the class.

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

Chapter 2

LITERATURE SURVEY

2.1 Related Work

Sr Title Year Author name Description limitation


no

1 RFID (Radio 2006 Samuel King System A number of works . This system may give
Frequency Opoku related to Radio Frequency rise to the problem of
fraudulent access.
Identification)- Identification (RFID) based
Unauthorized person
based Attendance Attendance Systems exist in may make use of
System the literature. In the authors authorized ID card and
enter into the
have proposed RFID based
organization
system in which students
carry a RFID tag type ID
card and they need to place
that on the card reader to
record their attendance.
RS232 is used to connect the
system to the computer and
save the recorded attendance
from the database

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

2 . Fingerprint based 2009 D. Ozkan and A portable fingerprint device The problem with this
Attendance System P. Duygulu has been developed which approach is that
passing of the device
can be passed among the
during the lecture time
students to place their finger may distract the
on the sensor during the attention of the
students.
lecture time without the
instructor’s intervention. This
system guarantees a
foolproof method for
marking the attendance.

3 Iris-Recognition 2010 G. Liu, Z. Iris is the bio-metric that can This system uses iris
Based Attendance Lin, and Y. be used for Attendance recognition
management system
System Yu Systems. In [2] the authors
that does capturing the
have proposed Daugmans image of iris
algorithm based Iris recognition, extraction,
storing and matching.
recognition system.
But the difficulty
occurs to lay the
transmission lines in
the places where the
topography is bad. In
authors have proposed
a system based on real
time face recognition
which is reliable,
secure and fast which
needs improvement in
different lighting
conditions.

1
0

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

4 Biometric fingerprint 2010 P. T. Pham, Biometric fingerprint Recognition of an


identification M. Moens, identification systems individual fingerprint
and T. employ fingerprint as a from a set of enrolled
Tuytelaars unique identity. It is one of fingerprints is a
the most accurate systems difficult process. The
running effectively today. fingerprint system does
not reveal any
information regarding
the original fingerprint.
This may have been
proved to be false as
many algorithms reveal
that a fingerprint can
be reconstructed with
minute templates.

5 Bluetooth based 2007 Arulogun O. This system has high Bluetooth do not allow
System T., usability and proxy removal more than 8
Olatunbosun methods can be included to connections at a time
A., Fakolujo make the system perfect. this is due to a master
O. A., and However, the system is not and slave concept. This
Olaniyi O. M scalable and requires 8 redundancy makes it a
connections active at a time. feasible resource for a
limited population

1
1

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

2.2 Existing System


Usually in institutes, the number of students is significant and by using conventional method of taking
attendance will lead to considerable time consumption and amount of manual work gets increased significantly.
Traditional way of marking attendance involves a typical situation of students sitting in a classroom and the
teacher calling out the names of the students individually to mark their attendance. The attendance is usually
marked using hard resources - pen and paper. The huge attendance records that maintained are then used for
later references.

The automated systems like IRIS, FINGERPRINT, and RFID provide better percentage of accuracy but have
some limitations like intrusive nature and time inefficient. First step in automatic face recognition is face
detection. In 2001, Paul Viola and Michael Jones proposed a real time object detection with very high image
processing rate. It is capable of detecting a variety of object classes and was greatly inspired by the problem of
face detection. Computer vision is the field that makes computer to gain high level of understanding from
digital images or videos. It includes schemes of acquiring, processing, analyzing and understanding digital
images and extracts high dimensional data to produce symbolic information. Machine learning is another
important area that evolved from the study of pattern recognition and computational learning theory in artificial
intelligence. Computer vision and machine learning together provides excellent tool in the process of
recognition. The overall configuration can be described by a vector which representing the position and size of
the main facial features like eyes and eyebrows, nose, mouth, and an outline of face.

1
2

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

2.2.1 Architecture of Existing System

Fig 2.1: Architecture of Existing System

2.2.2 Disadvantages of Existing System:


 It is cumbersome to maintain a huge set of records.
 It is time Consuming
1
 Error-prone
3
 Its leads to wastage of Resources.

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

Chapter 3
System Requirement and Specification

3.1. Hardware Requirement

There should be required devices to interact with software.

 System : Pentium IV 2.4 GHz.


 Hard Disk : 40 GB.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 256 Mb.
 Camera : Webcam

3.2. Software Requirement

 Operating system : Windows XP Professional/7.


 Coding language : MATLAB

3.3 Project Planning And Scheduling

The system consists of a camera that captures the images of the employee and sends it to the image
enhancement module. After enhancement the image comes in the Face Detection and Recognition modules and
then the attendance is marked on the database server. This is shown in the experimental setup. At the time of
enrolment, templates of face images of individual employees are stored in the Face database. Here all the faces
are detected from the input image and the algorithm compares them one by one with the face database. If any
1
4 face is recognized the attendance is marked on the server from where anyone can access and use it for different
purposes. Fig. 1 Experimental Setup In this way a lot of time is saved and this is highly secure process no one

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

can mark the attendance of other. Attendance is maintained on the server so anyone can access it for purposes
like administration, employees themselves. In order to avoid the false detectionProject planning is a procedural
step in project management, where required documentation is created to ensure successful project completion.
Documentation includes all actions required to define, prepare, integrate and coordinate additional plans. The
project plan clearly defines how the project is executed, monitored, controlled and closed.

Scheduling

In project management, a schedule is a listing of a project's milestones, activities, and deliverables, usually with
intended start and finish dates. Those items are often estimated by other information included in the project
schedule of resource allocation, budget, task duration, and linkages of dependencies and scheduled events. A
schedule is commonly used in the project planning and project portfolio management parts of project
management

1
5

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

Chapter 4
System Design

4.1.1

1
6

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

1
7

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

4.2.2

DFD LEVEL 1

DFD LEVEL 2

1
8

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

DFD LEVEL 3

1
9

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

SEQUENCE DIAGRAM

2
0

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

USE CASE DIAGRAM

2
1

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

ACTIVITY DIAGRAM

2
2

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

2
3

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

Class diagram

2
4

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

Chapter 4
Theory and System Design

4.1. Proposed system


The system consists of a camera that captures the image of the classroom and sends it to the image processing
module which then forwards it to the comparison module at the beginning of the session. In the processing
module the image is enhanced to facilitate the matching process. After this face detection and recognition is
performed. The image is captured again at the end of the session, sent to the processing module and forwarded
to the comparison module again. At this junction both the images are compared and the students who are
present in both the images are marked present in the database. In case a student is present whose face is not

recognized, the lecturer can update the system manually.

4.2 Face Detection


The main function of this step is to determine whether human faces appear in a given image, and where these
faces are located at. The expected outputs of this step are patches containing each face in the input image. In
order to make further face recognition system more robust and easy to design, face alignment are performed to
justify the scales and orientations of these patches. Besides serving as the pre-processing for face recognition,
face detection could be used for region-of-interest detection, retargeting, video and image classification, etc.

4.3Feature Extraction
After the face detection step, human-face patches are extracted from images. Directly using these patches for
face recognition have some disadvantages, first, each patch usually contains over 1000 pixels, which are too
2 large to build a robust recognition system. Second, face patches may be taken from different camera alignments,
5
with different face expressions, illuminations, and may suffer from occlusion and clutter. To overcome these
drawbacks, feature extractions are performed to do information packing, dimension reduction, salience
Department of Information Technology, SKNCOE, Pune
SMART ATTENDANCE USING FACE RECOGNITION

extraction, and noise cleaning. After this step, a face patch is usually transformed into a vector with fixed
dimension or a set of fiducially points and their corresponding locations. In some literatures, feature extraction
is either included in face detection or face recognition.

4.4. Face Recognition


After formulizing the representation of each face, the last step is to recognize the identities of these faces. In
order to achieve automatic recognition, a face database is required to build. For each person, several images are
taken and their features are extracted and stored in the database. Then when an input face image comes in, we
perform face detection and feature extraction, and compare its feature to each face class stored in the database.
There are two general applications of face recognition, one is called identification and another one is called
verification. Face identification means given a face image, we want the system to tell who he / she is or the
most probable identification, while in face verification, given a face image and a guess of the identification, we
want the system to tell true or false about the guess

2
6

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

Architecture of Proposed System

 The system consists of a camera, installed in the classroom capturing the photo frames followed by the
detection of multiple faces.

 These faces are cropped and converted to gray scale causing reduction in the number of bits to be
processed. These faces are then compared with the database faces and display the result and mark the
2
7 attendance.

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

4.5 Advantage of proposed system:

 We perform a detailed security analysis and performance evaluation of the proposed data

 Required less time


 Increase Efficiency
 improve the accuracy

2
8

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

Chapter 5

System Testing
5.1 Testing

Software testing is defined as an activity to check whether the actual results match the expected results and to
ensure that the software system is Defect free. It involves execution of a so of component or system component
to evaluate one or more properties of interest.Software testing also helps to identify errors, gaps or missing
requirements in contrary to the actual requirements. It can be either done manually or using automated tools.
Some prefer saying Software testing as a White Box and Black Box Testing .In simple terms, Software Testing
means Verification of Application Under Test (AUT).This tutorial introduces testing software to the audience
and justifies it's importance. Testing is important because software bugs could be expensive or even dangerous.
Software bugs can potentially cause monetary and human loss, and history is full of such examples.

5.2 Goals and Objectives of Testing

GOAL:

 The goal of interface the correct name and body are recognised then it will check the database, the user is
normal or criminal .

OBJECTIVE:

 New scheme for body with Viola jones Algorithm.


 To identify the persons in the video.
 To improve the face performances in the system.

2
9

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

5.3 Scope of Testing


Traditional waterfall development model A common practice in waterfall development is that testing is
performed by an independent group of testers.

 after the functionality is developed, but before it is shipped to the customer. This practice often results in the
testing phase being used as a project buffer to compensate for project delays, thereby compromising the
time devoted to testing.
 at the same moment the development project starts, as a continuous process until the project finishes.

However, even in the waterfall development model, unit testing is often done by the software development team
even when further

Agile or XP development model

In contrast, some emerging software disciplines such as extreme programming and the agile software
development movement, adhere to a "test-driven software development" model. In this process, unit tests are
written first, by the software engineers (often with pair programming in the extreme programming
methodology). The tests are expected to fail initially. Each failing test is followed by writing just enough code
to make it pass.[63] This means the test suites are continuously updated as new failure conditions and corner
cases are discovered, and they are integrated with any regression tests that are developed. Unit tests are
maintained along with the rest of the software source code and generally integrated into the build process (with
inherently interactive tests being

5.4 Black Box Testing

Black box testing is defined as a testing technique in which functionality of the Application Under Test (AUT)
is tested without looking at the internal code structure, implementation details and knowledge of internal paths
of the software. This type of testing is based entirely on software requirements and specifications.

3
0

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

5.5 White Box Testing

White-box testing (also known as clear box testing, glass box testing, transparent box testing, and structural
testing) is a method of testing software that tests internal structures or workings of an application, as opposed to
its functionality (i.e. black-box testing). In white-box testing an internal perspective of the system, as well as
programming skills, are used to design test cases. The tester chooses inputs to exercise paths through the code
and determine the expected outputs. This is analogous to testing nodes in a circuit, e.g. in-circuit testing (ICT).
White-box testing can be applied at the unit, integration and system levels of the software testing process.

5.6 Results from Testing

"Results-Based Testing" (RBT) is an alternative pricing system for software testing which allows companies to
pay for the bugs which are detected, instead of for time spent on a project. This was adopted in response to
dissatisfaction which clients expressed toward the pricing structure employed by most testing companies, and
has led to higher customer satisfaction and better accuracy in bug detection.

Results Based Testing usually involves three elements

1. A Scope of work
2. A contractual SLA
3. A pricing mechanism

RBT is normally utilized when part or all of the software testing process is outsourced to a third party and a
core contractual SLA together with a pricing mechanism sets the exact payment made at each SLA level. The
pricing mechanism may be a flexible rate for each SLA level or a Penalty/Reward mechanism, all with the goal
of creating an incentive for the Testing Supplier to meet the business targets (results) set forth. However, RBT
may (and should) also be used for internal testing teams even though in such cases a penalty/reward mechanism
is harder to implement. Another good use of RBT is for establishing the necessary framework for measured
continuous improvement in which results from previous periods can serve as a baseline for following period’s
3
targets.
1

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

Chapter 6

Testing Screenshots

3
2

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

3
3

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

3
4

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

3
5

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

3
6

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

Chapter 7

Conclusion
The attendance management system estimates the attendance of each student by continuous clicking of images
for some time period and finds the best localized image for processing. The system allows the teacher to check
student’s attendance automatically without any extra cost and effort whereas the proposed system needs very
elementary things such as; camera, laptop or personal computer and local network. This method is secure,
reliable and easy to use. Automated Attendance Systems based on face recognition techniques thus proved to be
time saving and secured. This system can also be used to identify an unknown person. An automatic attendance
management system is a necessary tool for any organization. Most of the existing systems are time consuming
and require for a semi manual work from the teacher or students. This approach aims to solve the issues by
integrating face recognition in the process.

3
7

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

Chapter 8

References
[1] S. Kadry and K. Smaili, “A design and implementation of a wireless iris recognition attendance
management system”, Information Technology and control, vol. 36, no. 3, pp. 323–329, 2007
[2] B. Bhanu, X. Tan, “Learned templates for feature extraction in fingerprint images”, Proceedings of the IEEE
Conference on Computer Vision and Pettern recognition, vol.2, 2001, pp.591-596.

[3] T. Lim, S. Sim, and M. Mansor, “Rfid based attendance system”, in Industrial Electronics & Applications,
2009. ISIEA 2009. IEEE Symposium on, vol. 2. IEEE, 2009, pp. 778–782

[4] P. Viola and M. J. Jones, “Robust real-time face detection”, International journal of computer vision, vol.
57, no. 2, pp. 137– 154, 2004

[5] P.N. Belhumeour, J.P. Hespanha, and D.J. Kriegman, “Eigenfaces vsFisherfaces: Recognition using class
specific linear projection”, IEEE
Transactions on Pattern Analysis and Machine Intelligence, 19(7):711–720, 1997

[6] Z. Hafed, “Face Recognition Using DCT”, International Journal of Computer Vision, 2001, pp. 167-188.

[7] Face recognition by linear discriminant analysis suman kumar bhattacharyya1, kumar
rahul2”(FISHERFACES)

[8] C. Olson “A General Method for Geometric Feature Matching and Model Extraction”, International Journal
of Computer Vision 45(1), 39–54, 2001

3 [9] R. Klette , Concise Computer Vision, Springer, ISBN 978-1-4471-6320- 6,2000


8
[10]http://www.britannica.com/EBchecked/topic/1116194/machine-learning access on March 3, 2016.

Department of Information Technology, SKNCOE, Pune


SMART ATTENDANCE USING FACE RECOGNITION

[11] https://books.google.co.in/books?isbn=3319070649 access on January 11, 2016.

[12] https://software.intel.com/en-us/node/529070 access on November 20, 2016.

[13] B. Boser, I. Guyon and V. Vapnik, ”A training algorithm for optimal margin classifiers”, In Proceedings of
the Fifth Annual Workshop on
Computational Learning Theory, pages. 144 -152. ACM International Conference on Computer Graphics,
Image and Visualization (CGIV04), 2004 IEEE.

3
9

Department of Information Technology, SKNCOE, Pune

Das könnte Ihnen auch gefallen