<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2019-4-1-0-6</article-id><article-id pub-id-type="publisher-id">1642</article-id><article-categories><subj-group subj-group-type="heading"><subject>SYSTEM ANALYSIS AND PROCESSING OF KNOWLEDGE</subject></subj-group></article-categories><title-group><article-title>CLASSIFICATION OF DETECTION AND RECOGNITION METHODS OF THE PERSON ON THE IMAGE</article-title><trans-title-group xml:lang="en"><trans-title>CLASSIFICATION OF DETECTION AND RECOGNITION METHODS OF THE PERSON ON THE IMAGE</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kuznetsov</surname><given-names>Denis Andreevich</given-names></name><name xml:lang="en"><surname>Kuznetsov</surname><given-names>Denis Andreevich</given-names></name></name-alternatives><email>wvxp@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Nikolsky</surname><given-names>Pavel Gennadyevich</given-names></name><name xml:lang="en"><surname>Nikolsky</surname><given-names>Pavel Gennadyevich</given-names></name></name-alternatives><email>pavlusha.golova@gmail.com</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Rachkov</surname><given-names>Daniil Sergeevich</given-names></name><name xml:lang="en"><surname>Rachkov</surname><given-names>Daniil Sergeevich</given-names></name></name-alternatives><email>rachkov@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Kuznetsov</surname><given-names>Andrey Viktorovich</given-names></name><name xml:lang="en"><surname>Kuznetsov</surname><given-names>Andrey Viktorovich</given-names></name></name-alternatives><email>kvaa77@mail.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Khakhamov</surname><given-names>Anton Pavlovich</given-names></name><name xml:lang="en"><surname>Khakhamov</surname><given-names>Anton Pavlovich</given-names></name></name-alternatives><email>Anton1233333@yandex.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2019</year></pub-date><volume>4</volume><issue>1</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2019/1/ит6.pdf" /><abstract xml:lang="ru"><p>The concept of the intellectual hall of meetings means implementation of a subsystem of control and access control. The number of the functions which are carried out by this subsystem includes identification and authentication of users. One of ways of implementation of these procedures is carrying out detection and facial recognition on the images received by means of the installed video cameras. Other scope of methods of detection and facial recognition is the touch plane of the intellectual hall of meetings where the specified methods are used for identification of participants and also their automatic accounting. The problem of detection of the person is the first step in the course of a solution of a problem of recognition of the person. The following process step of user identification after detection of the person is directly its recognition. It is made by comparison of the calculated signs with the standards put in the database. The variety of different algorithms of detection and recognition of the person causes need of the choice of optimum methods in terms of the speed of detection, accuracy of recognition and simplicity of implementation.</p></abstract><trans-abstract xml:lang="en"><p>The concept of the intellectual hall of meetings means implementation of a subsystem of control and access control. The number of the functions which are carried out by this subsystem includes identification and authentication of users. One of ways of implementation of these procedures is carrying out detection and facial recognition on the images received by means of the installed video cameras. Other scope of methods of detection and facial recognition is the touch plane of the intellectual hall of meetings where the specified methods are used for identification of participants and also their automatic accounting. The problem of detection of the person is the first step in the course of a solution of a problem of recognition of the person. The following process step of user identification after detection of the person is directly its recognition. It is made by comparison of the calculated signs with the standards put in the database. The variety of different algorithms of detection and recognition of the person causes need of the choice of optimum methods in terms of the speed of detection, accuracy of recognition and simplicity of implementation.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>intellectual space</kwd><kwd>room</kwd><kwd>detection of the person</kwd><kwd>authentication</kwd><kwd>automation</kwd><kwd>recognition</kwd><kwd>access control</kwd></kwd-group><kwd-group xml:lang="en"><kwd>intellectual space</kwd><kwd>room</kwd><kwd>detection of the person</kwd><kwd>authentication</kwd><kwd>automation</kwd><kwd>recognition</kwd><kwd>access control</kwd></kwd-group></article-meta></front><back><ack><p>Работа выполнена при финансовой поддержке фонда РФФИ (проект №&amp;nbsp;18-07-00380)</p></ack><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>Kuznetsov D. A. Prerequisites of creation of the intellectual hall Meetings / Kuznetsov D.A., Ofitserov&amp;nbsp;A.I., Kuznetsov A.V., Chistyakov S.V., Basov O.O. //Scientific result. Information technologies. 2018. Volume 3. Issue 2. P. 44-50.</mixed-citation></ref><ref id="B2"><mixed-citation>Tropchenko A.Yu. Methods of secondary processing and images recognition / Tropchenko A.Yu., Tropchenko A.A. // ITMO university, 2015. P. 215.</mixed-citation></ref><ref id="B3"><mixed-citation>Tatarenkov D.A. The analysis of methods of detection of persons on Image / Tatarenkov D.A. // Young scientist. 2015. P. 270-276.</mixed-citation></ref><ref id="B4"><mixed-citation>Rakhmankulov V.Z. Processing and recognition of images of industrial details. // Rakhmankulov V.Z., Akhr A.A., Gerasimov V.V., Lebedev V.V.//Works IZA RAHN. 2005. P. 99-129.</mixed-citation></ref><ref id="B5"><mixed-citation>Valyukh A.A. An algorithm of search of images on the basis of histograms. / Valyukh A.A., Tonkoshkur Yu.O. // [Electronic resource]. - the access Mode: http://ea.donntu.org:8080/bitstream/123456789/12866/1/Валюх%20А.А..pdf (date of the address: 10.01.2019).</mixed-citation></ref><ref id="B6"><mixed-citation>Alkilar-Gonzalez P.M. The automated detection of objects on the noisy image. / Alkilar-Gonzalez P.M., Karnaukhov V.N., Kober V.I. // Information processes. 2014. Volume 14. Vyp 1. P. 1-8.</mixed-citation></ref><ref id="B7"><mixed-citation>Pomerantsev A. Method main component. / Pomerantsev A. // Russian hemometrichesky society. [Electronic resource]. - the access Mode: http://rcs.chemometrics.ru/Tutorials/pca (date of the address: 10.01.2019).</mixed-citation></ref><ref id="B8"><mixed-citation>Harman G. Modern factorial analysis / Harman G. // M.: Statistics. 1972. P. 489.</mixed-citation></ref><ref id="B9"><mixed-citation>Tymoshenko D.M. Methods of automatic identification of the personality according to the images of persons received in uncontrollable conditions / Tymoshenko D.M.//Abstract thesis. cand. of sciences. Petrozavodsk. 2014. P. 16.</mixed-citation></ref><ref id="B10"><mixed-citation>Vorontsov K.V. Lectures on statistical algorithms of classification / Vorontsov K.V. // FUPM MIPT. 2005.</mixed-citation></ref><ref id="B11"><mixed-citation>T.F. cutis. Active models of appearance / F. Kutes, G. J. Edwards, K. J. Taylor // IEEE Conference on the analysis of images and computer vision. 2001. P. 681-685.</mixed-citation></ref><ref id="B12"><mixed-citation>Double I.R. The comparative analysis of structures of the hidden Markov models used in a problem of identification of the person of the image of the person / Double I.R., Sealing glands. I.I. // [Electronic resource] Modern problems of science and education. 2013. URL: www.scienceeducation.ru/113-10751 (date of the address: 10.01.2019).</mixed-citation></ref><ref id="B13"><mixed-citation>Ivanov Yu.S. Algorithms of recognition of mobile objects for the intellectual systems of security video surveillance. / Ivanov Yu.S. // Abstract yew. canal of sciences. Komsomolsk-on-Amur. 2014. P. 159.</mixed-citation></ref><ref id="B14"><mixed-citation>Burakov M.V. Neural networks and Neurocontrollers / Beets M. B. // Manual. SPb.: GUAP. 2013. P.&amp;nbsp;284.</mixed-citation></ref><ref id="B15"><mixed-citation>Viol of River. Fast detection of an object, using the strengthened cascade of simple signs. / P. Viola, M.D. Jones // Conference on computer sight and recognition of images. 2001.</mixed-citation></ref><ref id="B16"><mixed-citation>T.F. cutis. Comparison of active models of a form with active models of appearance / T.F. Kutes, G.J.&amp;nbsp;Edwards, K. J. Taylor // Conference: the British hearings on computer sight. 1999. P. 10.</mixed-citation></ref><ref id="B17"><mixed-citation>Murashov D.M. A method of localization of informative areas with texture of a special look / Murashov&amp;nbsp;D.M., Murashov F.D. // Machine learning and analysis of data. 2018. Page 122-135.</mixed-citation></ref><ref id="B18"><mixed-citation>Zenin A.V. Analysis of methods of recognition of images. / Zenin A.V. // Young scientist. 2017. P.&amp;nbsp;125-130.</mixed-citation></ref><ref id="B19"><mixed-citation>Yakimenko Yu.I. Methods of automatic identification of persons. / Yakimenko Yu.I., Dzyuba V.G. // the Fourth international student&amp;#39;s conference &amp;quot;Light to Young People Young People to Light&amp;quot;. 2004. Page 85-90.</mixed-citation></ref><ref id="B20"><mixed-citation>Kim. J. Factorial discriminant and cluster analysis. / Kim. J., Myyuller Ch.U., Klekka U.R. // Finance and statistics. 1989. P. 215.</mixed-citation></ref></ref-list></back></article>