Content uploaded by C K Gomathy
Author content
All content in this area was uploaded by C K Gomathy on Dec 31, 2021
Content may be subject to copyright.
International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 05 Issue: 10 | Oct - 2021 ISSN: 2582-3930
© 2021, IJSREM | www.ijsrem.com | Page 1
AGE AND GENDER DETECTION
DR.C.K.Gomathy , Mr.A.Lokesh ,Mr.CH.HARSHAVARDHAN REDDY, Mr.A.SAI KIRAN
Sri Chandrasekharendra Saraswathi Viswa Mahavidyalaya , Kanhipuram
ABSTRACT:
The massive use of the social media and the
huge number of messages that are shared on
the internet,create a countless need to
automatically detect the age and gender of
the people who write the messages.Several
types of platforms uses several ways for
finding the truth about a message .Here we
used a few machine learning algorithms to
classify them and detect them.
KEYWORDS:
Age,Gender,Machine learning
I. Introduction:
Nowadays,with the rapid spread in the use of
internet resources and the huge amount of
data shared on the internet,most of them were
almost untrustable ,and were not recognized
by people.Even a few People were afraid of
those messages ,even some messages are
leading to death of people.so as to detect
them this project is used to detect the peoples
who sent that message and classifies their age
and gender.So as we can control and stop
these kind of works.
II. LITERATURE SURVEY:
We already have several approaches to detect
gender and age through facial images.We
can do these classification on Gender Based
on Human faces has been detected.We have
collected certain datas of equipped work and
worked through it to detect age and gender
and mentioned the methods used below.Here
fig 1 indicates the Proposed age and gender
detection.
Fig. 1. The proposed age and gender
methodology
III.METHODOLOGY
In the section,we present the methodology of the
proposed age and gender detection system.The
first step is to input the data.The second step is
tokenization and extraction of the feature sets that
we will use later to build the classifier,where
tokenization of the data means chopping the text
into words,The third step is appling string to word
vector which is very important as it cleans the
data by removing unnecessary information in
order to improve system performance.The fourth
step is applying feature selection to the data.The
fifth step is applying the classifier using different
algorithm namely(random forest,naive
bayes,decision tree).The last step is producing the
output class and evaluating the results.
International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 05 Issue: 10 | Oct - 2021 ISSN: 2582-3930
© 2021, IJSREM | www.ijsrem.com | Page 2
IV.PROPOSED SYSTEM
Here the algorithms we used are
RandomForestClassifier:
Random forests or random decision forests are
an ensemble learning method for classification
,regression and other tasks that operate by
constructing a multitude of decision trees at
training time.
Naive Bayes:
It is used to classify objects .It assumes strong,
independent attributes of data points.it also
includes spam filters, text analysis and even
medical diagnosis.
Decision tree classifier
A decision tree is a decision support tool that
uses a tree-like model of decision and their
possible
Consequences ,including chance event
outcomes, resource costs, and utility. It is one
way to display an algorithm that only contains
conditional control statements.
V.REQUIREMENTS:
● Python
● Jupyter notebook
DATA SETS:
The data is collected from project details ,By
classifying the data which satisfies all
requirements , the result is evolved
Fig2.dataset
fig3.datasets
VI.RESULTS:
The obtained acquired results are
fig.4. experimental data analysis for two
combined classifiers.
International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 05 Issue: 10 | Oct - 2021 ISSN: 2582-3930
© 2021, IJSREM | www.ijsrem.com | Page 3
Fig.5 Age prediction
Fig.6 Age prediction with accuracy and
frequency.
Fig 7 Analysis of Face Score
Fig 8:Classification of data
Fig 9:Face detection
fig:10 Removing undetected option
International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 05 Issue: 10 | Oct - 2021 ISSN: 2582-3930
© 2021, IJSREM | www.ijsrem.com | Page 4
fig:11 Final result
VII.CONCLUSION:
So we can Say that by using these algorithms to
certain data sets we can get the acquired results.
REFERENCES:
[1] Warkentin, Darcy, Michael Woodworth,
Jeffrey T. Hancock, and Nicole Cormier. (2010)
"Warrants and deception in computer mediated
communication." In Proceedings of the ACM
conference on Computer supported cooperative
work, pp. 9-12.
[2] Witten, Ian H., Eibe Frank, and A. Mark. "Hall,
and Christopher J Pal. 2016. Data Mining: Practical
machine learning tools and techniques."
AUTHOR’S PROFILE:
Mr. A.Lokesh, Student, B.E. Computer Science and
Engineering, Sri Chandrasekharendra SaraswathiViswa
Mahavidyalaya deemed to be university, Enathur,
Kanchipuram, India. Her Area of Big data analytics
Mr.Ch.Harsha Vardhan Reddy, Student, B.E. Computer
Science and Engineering, Sri Chandrasekharendr
saraswathi Viswa Mahavidyalaya deemed to be
university, Enathur, Kanchipuram, India. His Area of
Big data analytics
International Journal of Scientific Research in Engineering and Management (IJSREM)
Volume: 05 Issue: 10 | Oct - 2021 ISSN: 2582-3930
© 2021, IJSREM | www.ijsrem.com | Page 5
Mr. A.Sai kiran Student, B.E. Computer Science and
Engineering, Sri Chandrasekharendra SaraswathiViswa
Mahavidyalaya deemed to be university, Enathur,
Kanchipuram, India. Her Area of Big data analytics
Dr.C.K.Gomathy is Assistant Professor in
Computer Science and Engineering at Sri
Chandrasekharendra SaraswathiViswa
Mahavidyalaya deemed to be university,
Enathur, Kanchipuram, India. Her area of
interest is Software Engineering, Web Services,
Knowledge Management and IOT.