International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 6 | Views: 92

Research Paper | Computer Science | Morocco | Volume 10 Issue 9, September 2021 | Rating: 5.1 / 10


The Application of Machine Learning Techniques for Public Security: An Intelligent Monitoring System to Identify the Faces of Wanted and Sought - After People by Studying the Facial Features through Neural Network Mechanisms

Imane Rahil | Walid Bouarifi | Mustapha Oujaoura


Abstract: Detection recognition and analysis of human faces are some of the most interesting subjects of computer vision, especially in a video stream. In the last few years, the algorithms of learning facial features have evolved in many ways, and since the capacity of detecting and reading the human facial features is extremely powerful and is becoming more and more efficient, it will lead us to detect a certain specific data that can be used for security purposes. On the other hand, the appearance of the special bases of command and coordination that enter in the political safe cities projects makes it a huge deal of interest to use these models for empowering those cameras to detect and identify target people. In This article, we propose a real-time intelligent monitoring system that has as objective to detect a specific accuracy of figures of wanted people that had already been studied and learned by a pre-trained model that describe the data in the learning stage through extracting feature vectors from The electronic identity pictures available in the database given by the new generation of the national electronic identity card and to set an alarm for the bases of command and coordination to take the necessary measures in the stage of positive inference.


Keywords: Machine learning, Convolutional Neural Network (CNN), Face Recognition (FG)


Edition: Volume 10 Issue 9, September 2021,


Pages: 1539 - 1542



How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top