SlideShare a Scribd company logo
Local Receptive Fields Based Extreme Learning
Machine For Face Recognition
By
Aras M. Ismael
14 February 2018
Outline
• Introduction
• Brief introduction to the Humans Brain
• How humans brain work
• Biological inspiration
• Artificial Neural network
• Neural network modules
• Type of Neurons
• Face recognition algorithms
• Extreme learning machine
• Testing
• Conclusion
Introduction
As the necessity for higher levels of security rises, technology is bound
to swell to fulfill these needs. Any new creation, enterprise, or
development should be uncomplicated and acceptable for end users in
order to spread worldwide. This strong demand for user-friendly
systems which can secure our assets and protect our privacy without
losing our identity in a sea of numbers.
Introduction (cont.)
Biometrics is the emerging area of bioengineering; it is the automated
method of recognizing person based on a physiological or behavioral
characteristic. There exist several biometric systems such as signature,
finger prints, voice…etc
Brief introduction to Humans Brain
• The knowledge concerning how a human brain works perfectly has
remained unknown over time.
• However, much is known about information is processed. The
function of neurons is to gather signals emanating from other
neurons through dendrites
How humans brain work
Biological inspiration
synapses
axon
dendrites
 The information transmission happens at the synapses.
 electrochemical stimulation received from other neural cells to the
cell body by dendrites.
Biological inspiration
 The spikes travelling along the axon of the pre-synaptic neuron trigger the release of
neurotransmitter substances at the synapse.
 The neurotransmitters cause excitation or inhibition in the dendrite of the post-synaptic
neuron.
 The contribution of the signals depends on the strength of the synaptic connection.
Artificial neurons
Neurons work by processing information. They receive and provide information in form of
spikes.
Neural networks
Neural network modules(cont.)
Multi layer Neural network
Back propagation
Back propagation problem(cont.)
 Delta(learning rule): which it implements weight changes and The learning rule in a multilayer
perceptron is not guaranteed to produce convergence, and it is possible for the network to fall into a
situation (the so called local minima) in which it is unable to learn the correct output.
 Isolation
Applications of neural networks
Character Recognition - The idea of character recognition has become
very important as handheld devices like the Palm Pilot are becoming
increasingly popular. Neural networks can be used to recognize
handwritten characters.
• Image Compression - Neural networks can receive and process vast
amounts of information at once, making them useful in image
compression. With the Internet explosion and more sites using more
images on their sites, using neural networks for image compression is
worth a look.
Applications of neural networks(cont.)
• Stock Market Prediction - The day-to-day business of the stock
market is extremely complicated.
• Medicine, Electronic Nose, Security, and Loan Applications.
• Health usage
• Face recognition applications
Neural network in face recognition
Local Receptive Fields Based Extreme Learning
Machine For Face Recognition
Extreme learning machine
• ELM was proposed for single-hidden layer feedforward neural
networks (SLFNs). It is very different from conventional neural
network learning algorithms. It randomly chooses the parameters of
hidden nodes and analytically determines the output weights. Thus
the training is extremely fast and efficiently completed without time-
consuming iterations.
Extreme learning machine(cont)
• The name "extreme learning machine" (ELM) found by Guang-Bin
Huang.
• these models are able to produce good generalization performance
and learn thousands of times faster than networks trained
using backpropagation.
Extreme learning machine (cont.)
 the input weights and hidden biases are randomly generated, and
the output weights are analytically determined by regularized least
square method,
 It presents better accuracy and high efficiency, in various
applications such as system modelling, biomedical analysis, power
systems, etc.
Local respective fields
LRF-ELM introduces local receptive field to the input layer, thus
obtaining a locally connected ELM. The hidden layers of LRF-ELM
consists of a convolution layer and a pooling layer. They are composed
of several feature maps. The input weights between input and
convolution layers are first randomly generated according to some
continuous probability distribution and then orthogonalized in order to
obtain a more complete set of features
ELM-LRF implementation using the following datasets
• Caltech face dataset
• Cbcl face dataset
• UFI face dataset
Caltech face dataset
The dataset has 10,524 human appearances of different resolutions
and in various settings
The Caltech confront dataset has 450 images of 27 people. Every ha
diverse helping qualities and a size of 64×64 pixels.
Caltech face dataset(cont.)
• Based on ELM-LRF testing accuracy in the given dataset can see that
ELM-LRF has more advantage over face recognition compare to other
methods test in this dataset.
Method Testing Accuracy (%)
NR MODEL 32.36
SCSPM 82.83
TSR 37.45
SPARSE BASED NN 92.91
ELM-LRF 98.15
CBCL face dataset
The training set comprises of 6,977 images (2,429 faces and 4,548
nonfaces), and the test set comprises of 24,045 images (472
countenances and 23,573 nonfaces).
 The MIT-CBCL dataset contains 2,000 face pictures. The calculation
utilized 150 images for training (15 images for each class with right,
left, and frontal perspectives).
CBCL face dataset(cont.)
Methods Testing Accuracy (%)
ELM-LRF 98.34
Pose invariant 95.40
Original C2 features [14] 87.05
MPCALDA [15] 88.53
UFI dataset
This dataset contain images of 605 people.
The images are cropped to a size of 128 x 128 pixels.
UFI face dataset(cont.)
• In testing accuracy by using UFI dataset can be seen that the testing
accuracy of the proposed ELM-LRF method is an enhancement on
LBPHS is 55.44 %, LDPHS, and FS-LBP, although it achieved the face
size also significantly differs and the faces are not localized after that
it slightly lower test accuracy than that of POEMHS which reduced
12.06% difference.
Method Testing Accuracy (%)
LBPHS 55.04
LDPHS 50.25
POEMHS 67.11
FS-LBP 63.31
ELM-LRF 66.11
Result of ELM-LRF
Conclusion
Reduced training time
Fast result
No isolation in this method
The outcome can be found in one iteration
Conclusion (cont.)
based on our result by using ELM-LRF in face recognition the
proposed method can have more advantage in face recognition
systems because it will set the best weight for the given input
Because the input has local connection with the desired output, it
can set the best weight for the given output.
Based on our result , we can say that the ELM-LRF can pass back-
propagation problems which it can not find its weight easily.
Thesis presentation

More Related Content

PPTX
FACE RECOGNITION USING ELM-LRF
Aras Masood
 
PPTX
Automatic Brain Tumor Segmentation on Multi-Modal MRI with Deep Neural Networks
Andrew Tsuei
 
PPTX
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION
khanam22
 
PDF
Learning of robot navigation tasks by
csandit
 
PPTX
Face recognition using artificial neural network
Sumeet Kakani
 
PDF
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
PDF
3D localization methods for intracranial electrodes
Brian Owens
 
PDF
MULTI-LEVEL FEATURE FUSION BASED TRANSFER LEARNING FOR PERSON RE-IDENTIFICATION
gerogepatton
 
FACE RECOGNITION USING ELM-LRF
Aras Masood
 
Automatic Brain Tumor Segmentation on Multi-Modal MRI with Deep Neural Networks
Andrew Tsuei
 
PPT on BRAIN TUMOR detection in MRI images based on IMAGE SEGMENTATION
khanam22
 
Learning of robot navigation tasks by
csandit
 
Face recognition using artificial neural network
Sumeet Kakani
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
ijceronline
 
3D localization methods for intracranial electrodes
Brian Owens
 
MULTI-LEVEL FEATURE FUSION BASED TRANSFER LEARNING FOR PERSON RE-IDENTIFICATION
gerogepatton
 

What's hot (17)

PDF
From Bio-Intelligence BI to Artificial-Intelligence AI in Engineering and STE...
Dr. Fayçal Saffih
 
PDF
Hand Gesture Recognition using OpenCV and Python
ijtsrd
 
PDF
40120140507006
IAEME Publication
 
PPTX
FACE RECOGNITION USING NEURAL NETWORK
TITHI DAN
 
PDF
Zeeshan.ali.presentations
Zeeshan Ali
 
PPT
Term11566
Mukesh0420
 
PPTX
MRI Image Processing Matlab Projects Research Assistance
Matlab Simulation
 
PDF
An automated approach for the recognition of bengali license plates presentation
MD Abdullah Al Nasim
 
PDF
B04530612
IOSR-JEN
 
PDF
IEEE EED2021 AI use cases in Computer Vision
SAMeh Zaghloul
 
PDF
Analog signal processing solution
csandit
 
PPT
2017 07 03_meetup_d
Dana Brophy
 
DOCX
Ieee brain tumor
Prakash Mhaske
 
DOCX
Computer vision
Shiva Krishna Chandra Shekar
 
PPTX
Artificial Neural Network for hand Gesture recognition
Vigneshwer Dhinakaran
 
PDF
Ijetcas14 329
Iasir Journals
 
PPTX
Detection of medical instruments project- PART 2
Sairam Adithya
 
From Bio-Intelligence BI to Artificial-Intelligence AI in Engineering and STE...
Dr. Fayçal Saffih
 
Hand Gesture Recognition using OpenCV and Python
ijtsrd
 
40120140507006
IAEME Publication
 
FACE RECOGNITION USING NEURAL NETWORK
TITHI DAN
 
Zeeshan.ali.presentations
Zeeshan Ali
 
Term11566
Mukesh0420
 
MRI Image Processing Matlab Projects Research Assistance
Matlab Simulation
 
An automated approach for the recognition of bengali license plates presentation
MD Abdullah Al Nasim
 
B04530612
IOSR-JEN
 
IEEE EED2021 AI use cases in Computer Vision
SAMeh Zaghloul
 
Analog signal processing solution
csandit
 
2017 07 03_meetup_d
Dana Brophy
 
Ieee brain tumor
Prakash Mhaske
 
Artificial Neural Network for hand Gesture recognition
Vigneshwer Dhinakaran
 
Ijetcas14 329
Iasir Journals
 
Detection of medical instruments project- PART 2
Sairam Adithya
 
Ad

Similar to Thesis presentation (20)

PPTX
Face recognization using artificial nerual network
Dharmesh Tank
 
PDF
Study on Different Human Emotions Using Back Propagation Method
ijiert bestjournal
 
PDF
Facebook Deep face
Emanuele Santellani
 
PPTX
Biometric Recognition using Deep Learning
SahithiKotha2
 
PDF
IRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET Journal
 
PDF
Facial expression recognition
ElyesMiri
 
PPTX
Facial emotion detection on babies' emotional face using Deep Learning.
Takrim Ul Islam Laskar
 
PDF
238 243
Editor IJARCET
 
PDF
238 243
Editor IJARCET
 
PDF
IRJET- Development of a Face Recognition System with Deep Learning and Py...
IRJET Journal
 
PPTX
Deep Learning: Evolution of ML from Statistical to Brain-like Computing- Data...
Impetus Technologies
 
PDF
Top Cited Article in Informatics Engineering Research: October 2020
ieijjournal
 
PPT
Face recogntion
Karan Gupta
 
PDF
TFFN: Two Hidden Layer Feed Forward Network using the randomness of Extreme L...
Nimai Chand Das Adhikari
 
PPT
L008.Eigenfaces And Nn Som
ramesh kumar
 
PDF
NETWORK LEARNING AND TRAINING OF A CASCADED LINK-BASED FEED FORWARD NEURAL NE...
ijaia
 
PDF
DSRLab seminar Introduction to deep learning
Poo Kuan Hoong
 
PDF
IRJET- Face Recognition using Machine Learning
IRJET Journal
 
PDF
A Parallel Framework For Multilayer Perceptron For Human Face Recognition
CSCJournals
 
PDF
Big Data Malaysia - A Primer on Deep Learning
Poo Kuan Hoong
 
Face recognization using artificial nerual network
Dharmesh Tank
 
Study on Different Human Emotions Using Back Propagation Method
ijiert bestjournal
 
Facebook Deep face
Emanuele Santellani
 
Biometric Recognition using Deep Learning
SahithiKotha2
 
IRJET-Facial Expression Recognition using Efficient LBP and CNN
IRJET Journal
 
Facial expression recognition
ElyesMiri
 
Facial emotion detection on babies' emotional face using Deep Learning.
Takrim Ul Islam Laskar
 
IRJET- Development of a Face Recognition System with Deep Learning and Py...
IRJET Journal
 
Deep Learning: Evolution of ML from Statistical to Brain-like Computing- Data...
Impetus Technologies
 
Top Cited Article in Informatics Engineering Research: October 2020
ieijjournal
 
Face recogntion
Karan Gupta
 
TFFN: Two Hidden Layer Feed Forward Network using the randomness of Extreme L...
Nimai Chand Das Adhikari
 
L008.Eigenfaces And Nn Som
ramesh kumar
 
NETWORK LEARNING AND TRAINING OF A CASCADED LINK-BASED FEED FORWARD NEURAL NE...
ijaia
 
DSRLab seminar Introduction to deep learning
Poo Kuan Hoong
 
IRJET- Face Recognition using Machine Learning
IRJET Journal
 
A Parallel Framework For Multilayer Perceptron For Human Face Recognition
CSCJournals
 
Big Data Malaysia - A Primer on Deep Learning
Poo Kuan Hoong
 
Ad

Recently uploaded (20)

PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
Doc9.....................................
SofiaCollazos
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Doc9.....................................
SofiaCollazos
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
Simple and concise overview about Quantum computing..pptx
mughal641
 

Thesis presentation

  • 1. Local Receptive Fields Based Extreme Learning Machine For Face Recognition By Aras M. Ismael 14 February 2018
  • 2. Outline • Introduction • Brief introduction to the Humans Brain • How humans brain work • Biological inspiration • Artificial Neural network • Neural network modules • Type of Neurons • Face recognition algorithms • Extreme learning machine • Testing • Conclusion
  • 3. Introduction As the necessity for higher levels of security rises, technology is bound to swell to fulfill these needs. Any new creation, enterprise, or development should be uncomplicated and acceptable for end users in order to spread worldwide. This strong demand for user-friendly systems which can secure our assets and protect our privacy without losing our identity in a sea of numbers.
  • 4. Introduction (cont.) Biometrics is the emerging area of bioengineering; it is the automated method of recognizing person based on a physiological or behavioral characteristic. There exist several biometric systems such as signature, finger prints, voice…etc
  • 5. Brief introduction to Humans Brain • The knowledge concerning how a human brain works perfectly has remained unknown over time. • However, much is known about information is processed. The function of neurons is to gather signals emanating from other neurons through dendrites
  • 7. Biological inspiration synapses axon dendrites  The information transmission happens at the synapses.  electrochemical stimulation received from other neural cells to the cell body by dendrites.
  • 8. Biological inspiration  The spikes travelling along the axon of the pre-synaptic neuron trigger the release of neurotransmitter substances at the synapse.  The neurotransmitters cause excitation or inhibition in the dendrite of the post-synaptic neuron.  The contribution of the signals depends on the strength of the synaptic connection.
  • 9. Artificial neurons Neurons work by processing information. They receive and provide information in form of spikes.
  • 11. Neural network modules(cont.) Multi layer Neural network
  • 13. Back propagation problem(cont.)  Delta(learning rule): which it implements weight changes and The learning rule in a multilayer perceptron is not guaranteed to produce convergence, and it is possible for the network to fall into a situation (the so called local minima) in which it is unable to learn the correct output.  Isolation
  • 14. Applications of neural networks Character Recognition - The idea of character recognition has become very important as handheld devices like the Palm Pilot are becoming increasingly popular. Neural networks can be used to recognize handwritten characters. • Image Compression - Neural networks can receive and process vast amounts of information at once, making them useful in image compression. With the Internet explosion and more sites using more images on their sites, using neural networks for image compression is worth a look.
  • 15. Applications of neural networks(cont.) • Stock Market Prediction - The day-to-day business of the stock market is extremely complicated. • Medicine, Electronic Nose, Security, and Loan Applications. • Health usage • Face recognition applications
  • 16. Neural network in face recognition
  • 17. Local Receptive Fields Based Extreme Learning Machine For Face Recognition
  • 18. Extreme learning machine • ELM was proposed for single-hidden layer feedforward neural networks (SLFNs). It is very different from conventional neural network learning algorithms. It randomly chooses the parameters of hidden nodes and analytically determines the output weights. Thus the training is extremely fast and efficiently completed without time- consuming iterations.
  • 19. Extreme learning machine(cont) • The name "extreme learning machine" (ELM) found by Guang-Bin Huang. • these models are able to produce good generalization performance and learn thousands of times faster than networks trained using backpropagation.
  • 20. Extreme learning machine (cont.)  the input weights and hidden biases are randomly generated, and the output weights are analytically determined by regularized least square method,  It presents better accuracy and high efficiency, in various applications such as system modelling, biomedical analysis, power systems, etc.
  • 21. Local respective fields LRF-ELM introduces local receptive field to the input layer, thus obtaining a locally connected ELM. The hidden layers of LRF-ELM consists of a convolution layer and a pooling layer. They are composed of several feature maps. The input weights between input and convolution layers are first randomly generated according to some continuous probability distribution and then orthogonalized in order to obtain a more complete set of features
  • 22. ELM-LRF implementation using the following datasets • Caltech face dataset • Cbcl face dataset • UFI face dataset
  • 23. Caltech face dataset The dataset has 10,524 human appearances of different resolutions and in various settings The Caltech confront dataset has 450 images of 27 people. Every ha diverse helping qualities and a size of 64×64 pixels.
  • 24. Caltech face dataset(cont.) • Based on ELM-LRF testing accuracy in the given dataset can see that ELM-LRF has more advantage over face recognition compare to other methods test in this dataset. Method Testing Accuracy (%) NR MODEL 32.36 SCSPM 82.83 TSR 37.45 SPARSE BASED NN 92.91 ELM-LRF 98.15
  • 25. CBCL face dataset The training set comprises of 6,977 images (2,429 faces and 4,548 nonfaces), and the test set comprises of 24,045 images (472 countenances and 23,573 nonfaces).  The MIT-CBCL dataset contains 2,000 face pictures. The calculation utilized 150 images for training (15 images for each class with right, left, and frontal perspectives).
  • 26. CBCL face dataset(cont.) Methods Testing Accuracy (%) ELM-LRF 98.34 Pose invariant 95.40 Original C2 features [14] 87.05 MPCALDA [15] 88.53
  • 27. UFI dataset This dataset contain images of 605 people. The images are cropped to a size of 128 x 128 pixels.
  • 28. UFI face dataset(cont.) • In testing accuracy by using UFI dataset can be seen that the testing accuracy of the proposed ELM-LRF method is an enhancement on LBPHS is 55.44 %, LDPHS, and FS-LBP, although it achieved the face size also significantly differs and the faces are not localized after that it slightly lower test accuracy than that of POEMHS which reduced 12.06% difference. Method Testing Accuracy (%) LBPHS 55.04 LDPHS 50.25 POEMHS 67.11 FS-LBP 63.31 ELM-LRF 66.11
  • 30. Conclusion Reduced training time Fast result No isolation in this method The outcome can be found in one iteration
  • 31. Conclusion (cont.) based on our result by using ELM-LRF in face recognition the proposed method can have more advantage in face recognition systems because it will set the best weight for the given input Because the input has local connection with the desired output, it can set the best weight for the given output. Based on our result , we can say that the ELM-LRF can pass back- propagation problems which it can not find its weight easily.