Contact Us

For Marketing, Sales and Subscriptions Inquiries
2637 E Atlantic Blvd #43110
Pompano Beach, FL 33062

Conference List

Review of Computer Engineering Research

June 2019, Volume 6, 2, pp 76-83

Exploring Internet of Thing on PCA Algorithm for Optimization of Facial Detection and Tracking

Adeniji, Kehinde


Awosika, Olawoyin


Ajibade, Adedayo


Onibonoje, Moses

Adeniji, Kehinde 1 ,

Awosika, Olawoyin 1 Ajibade, Adedayo 1 Onibonoje, Moses 1 
  1. Department of Electrical/Electronic and Computer Engineering, Afe Babalola University, Ado Ekiti, Nigeria. 1

Pages: 76-83

DOI: 10.18488/journal.76.2019.62.76.83

Share :

Article History:

Received: 17 July, 2019
Revised: 19 August, 2019
Accepted: 23 September, 2019
Published: 30 October, 2019


This work was able to integrate Internet of Things expertise on Principal Count Analysis (PCA) algorithm for facial recognition optimization. An internet-based real-time facial recognition system was developed using PCA algorithm that can detect and track faces, a label name that indicates the face identified was also incorporated to easily track the face in situations where multiple faces are identified at the same time. A router was used to set up a wireless connection with an internet protocol (IP)-camera via the IP-camera firmware. As the router broadcast this connection, a link is set up with a personal computer through the network and sharing centre tab on the computer system, thereby creating a wireless connection between the computer and the camera on the internet. Graphical interface designed on MATLAB was used to access the feed from the camera which PCA algorithm explored in detecting and tracking faces in real-time. Security features such as timestamp and database were also integrated with the system developed.
Contribution/ Originality
This study integrates PCA algorithm to detect, recognize and match faces detected with a GUI design on MATLAB in real-time. Most importantly a label was created to easily identify the face when multiple faces are detected concurrently.


IOT, IP- Camera, MATLAB, PCA, Real time, Router.


[1]          M. Follman, G. Aronsen, and D. Pan, A guide to mass shootings in America, 2nd ed. Washington: Mojo Readers, 2012.

[2]          J. Fox and M. DeLateur, "Mass shootings in America," Homicide Studies, vol. 18, pp. 125-145, 2013.

[3]          A. Lankford, "Public mass shooters and firearms: A cross-national study of 171 countries," Violence and Victims, vol. 31, pp. 187-199, 2016.

[4]          R. Middleton, Piracy in Somalia threatening global trade, feeding local wars. London: Chatham House, 2018.

[5]          H. Onapajo and U. Uzodike, "Your haram terrorism in Nigeria," African Security Review, vol. 21, pp. 24-39, 2012.

[6]          B. Obichie, "Oil exploration in Chad Basin: NNPC seeks collaboration with - Nigeria news." Available: [Accessed 19 Aug. 2019], 2019.

[7]          M. A. O. Vasilescu and D. Terzopoulos, "Multilinear image analysis for facial recognition. In Object recognition supported by user interaction for service robots," IEEE, vol. 2, pp. 511-514, 2002.

[8]          E. M. Hand and R. Chellappa, "Attributes for improved attributes: A multi-task network utilizing implicit and explicit relationships for facial attribute classification," in AAAI-17. Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence, 2017, pp. 1-3.

[9]          A. Jadhav, V. Namboodiri, and K. Venkatesh, Deep attributes for one-shot face recognition, 1st ed.: 2-4, n.d.

[10]        C. Gurel and A. Erden, "Design of a face recognition system," in International Conference on Machine Design and Production. [online] Denizli: Researcher Gate, 2012, pp. 1-20.

[11]        H. Kanchwala and V. Vaidyanathan, "Facial recognition: Definition, history, working, and applications." Science ABC. Available at: [Accessed 4 Aug. 2019], 2019.

[12]        Z. Liu, Z. You, A. Jain, and Y. Wang, "Face detection and facial feature extraction in color image," in International Conference on Computational Intelligence and Multimedia Applications, 2003, pp. 126-130.

[13]        C. Lin, "Face detection in complicated backgrounds and different illumination conditions by using YCbCr color space and neural network," Pattern Recognition Letters, vol. 28, pp. 2190-2200, 2007. Available at:

[14]        Q.-X. Ye, J.-B. Jiao, and S.-Q. Jiang, "Fast and robust pedestrian detection algorithm with multi-scale orientation features," Ruanjian Xuebao Journal of Software, vol. 22, pp. 3004-3014, 2011. Available at:

[15]        S.-H. Lin, S.-Y. Kung, and L.-J. Lin, "Face recognition/detection by probabilistic decision-based neural network," IEEE Transactions on Neural Networks, vol. 8, pp. 114-132, 1997. Available at:

[16]        S. Ufldl, "PCA - Ufldl." Available:, 2018.

[17]        Dezyre, "Principal component analysis tutorial. Available:," n.d.

[18]        K. Susheel Kumar, S. Prasad, V. Bhaskar Semwal, and R. Tripathi, "Real time face recognition using Ada Boost improved fast PCA algorithm," International Journal of Artificial Intelligence & Applications, vol. 2, pp. 45-58, 2011. Available at:

[19]        A. Lakhina, M. Crovella, and C. Diot, "Diagnosing network-wide traffic anomalies. In ACM SIGCOMM computer communication review," Association for Computing Machinery, vol. 34, pp. 219-230, 2004.

[20]        I. Abdel-Qader, S. Pashaie-Rad, O. Abudayyeh, and S. Yehia, "PCA-based algorithm for unsupervised bridge crack detection," Advances in Engineering Software, vol. 37, pp. 771-778, 2006. Available at:


Google Scholor ideas Microsoft Academic Search bing Google Scholor


This study received no specific financial support.

Competing Interests:

The authors declare that they have no competing interests.


All authors contributed equally to the conception and design of the study.

Related Article

( 1 ) Exploring Internet of Thing on PCA Algorithm for Optimization of Facial Detection and Tracking
( 3 ) Creation of Algoritms for Recommendation System Based on Users Data on Internet Advertisement Marketing
( 4 ) Identification of Privacy and Security Risks of Internet of Things: An Empirical Investigation
( 9 ) Predict Survival of Patients with Lung Cancer Using an Ensemble Feature Selection Algorithm and Classification Methods in Data Mining
( 10 ) Real-Time Workload Scheduling (RTWS) Algorithm for Cloud
( 11 ) Solving Nonlinear Single-Unit Commitment Problem by Genetic Algorithm Based Clustering Technique
( 12 ) OFDM Channel Estimation Based on Novel Local Search Particle Swarm Optimization Algorithm
( 13 ) PAPR Reduction Using Eight Factors Rotating Phase Shift Technique Based on Local Search Algorithm in OFDM
( 14 ) Comprehensive Analysis & Performance Comparison of Clustering Algorithms for Big Data
( 15 ) Detection and Prevention of Phishing Attack Using Linkguard Algorithm
( 16 ) Development and Performance Analysis of Bisection Method-Based Optimal Path Length Algorithm for Terrestrial Microwave Link
( 17 ) A Survey on Sentiment Analysis Algorithms and Datasets
( 18 ) Application of Ant Algorithm for Software Optimization
( 19 ) Interactive Algorithms for the Verification of the Equality between Complex and Simplified Boolean-Algebra Expressions in Digital Decoders
( 20 ) LMS Algorithm for Adaptive Transversal Equalization of a Linear Dispersive Communication Channel
( 21 ) Forecasting Air Passengers of Changi Airport Based on Seasonal Decomposition and an LSSVM Model
( 23 ) Feasibility of Chatbot for Mehran UET Examination Department
( 24 ) Information and Communication Technology (Ict) As a Necessity for Libraries and Librarians of Nigerian Universities in the 21st Century
( 25 ) A Study on Commensal Mortality Rate of a Typical Three Species Syn-Eco-System with Unlimited Resources for Commensal
( 26 ) Information and Communication Technology in Classroom Situations in Rural and Urban Areas in Zimbabwe: A Comparative Study on the Use of Digital and Projected Media in Teaching and Learning at Six Secondary Schools in Masvingo
( 27 ) Postbuckling Analysis of Functionally Graded Beams Using Hyperbolic Shear Deformation Theory
( 28 ) Classification and Identification of Risk Management Techniques for Mitigating Risks with Factor Analysis Technique in Software Risk Management
( 29 ) Information about Simulation Software for Testing of Wireless Network
( 30 ) Investigation on the Dependence of TCP Upstream Throughput on Snr for Single and Multiple Links in a Wlan System
( 31 ) RLS Fixed-Lag Smoother Using Covariance Information Based on Innovation Approach in Linear Continuous Stochastic Systems
( 33 ) Performance Analysis of Routing Protocols for CBR Traffic in Mobile Ad-Hoc Networks
( 34 ) Enhanced Isolation Mimo Antenna with DGS Structures for Long Term Evolution Systems
( 35 ) High Isolation Microstrip Mimo Antennas for Wlan Systems
( 36 ) Generalized Quantum Key Distribution for WDM Router Applications
( 37 ) Selection of Appropriate Equipment for Designing Effective Vacuum System
( 38 ) Web Service Composition for E-Commerce Web Application
( 39 ) Role of Library and Information Science Professionals in the Knowledge Society
( 40 ) A Comprehensive Review of Semiconductor-Type Gas Sensors for Environmental Monitoring
( 41 ) Analysis of Suitable Security Protocols for Apply a Model of Identity in the Civil Registry of Ecuador
( 42 ) Path Loss Measurement and Modeling for Lagos State G.S.M Environments
( 43 ) Simulation of the Performance of CdTe/CdS/ZnO Multi- Junction Thin Film Solar Cell
( 44 ) Perturbation Functions for Compact Database
( 45 ) Chaotic Particle Swarm Optimization for Imprecise Combined Economic and Emission Dispatch Problem
( 46 ) Using ICT Policy Framework as a Panacea for Economic Recession and Instability in Nigeria
( 47 ) A Common Operational Picture in Support of Situational Awareness for Efficient Emergency Response Operations
( 48 ) Development Problems of Information Provision on the Management of High Technology Park
( 50 ) A Security Scheme for Protecting Agent Societies
( 53 ) Development of Facilitated Participatory Spatial Information System for Selected Urban Management Services
( 54 ) Stanford University Interim Propagation Loss Model for a Gmelina Arborea Tree-Lined Road
( 55 ) Characterisation of Propagation Loss for a 3G Cellular Network in a Crowded Market Area Using CCIR Model
( 56 ) Development of Web Application for University of Uyo Post UTME Examination Timetable