R Ibrahim, ZM Zin - 2011 IEEE 3rd International Conference on …, 2011 - ieeexplore.ieee.org
The security currently become a very important issue in public or private institutions in which various security systems have been proposed and developed for some crucial processes …
BY Park, EJ Jin, BG Lee, SM Lee - Journal of the Institute of …, 2018 - koreascience.kr
Currently, various security technologies such as fingerprint recognition and face recognition are being developed. However, although many technologies have been developed, the field …
C Kolluru, GV Akhil, K Reddy… - 2023 14th International …, 2023 - ieeexplore.ieee.org
Security in the home is more crucial than ever for safeguarding personal belongings and avoiding identity theft. Key loss or theft occurrences have been shown to be vulnerable to …
This study focuses on enhancing office security through a smart door system, designed to protect sensitive documents and critical data. Emphasizing exclusive access for authorized …
S Jogdand, M Karanjkar - … Journal of Science and Research (IJSR), 2015 - academia.edu
Most doors are controlled by persons with the use of keys, security cards, password or pattern to open the door. The aim of this paper is to help users for improvement of the door …
The need for a robust and secured access control system using a suitable algorithm is highly inevitable to forestall daily online harkers that are responsible in defrauding people of …
A Najmurrokhman, K Kusnandar… - MATEC Web of …, 2018 - matec-conferences.org
Security issues are an important part of everyday life. A vital link in security chain is the identification of users who will enter the room. This paper describes the prototype of a …
X Wang, Y Teng, Y Chi, H Hu - Symmetry, 2022 - mdpi.com
With the rapid development of the Internet of Things (IoT) industry, the smart home is fully integrated with people's shelter and transportation, which facilitates people's daily life. A …
TS Ibiyemi, SA Aliyu, AG Akintola - International Journal of Computer …, 2012 - Citeseer
Security personnel manning access points most often based their access authorisation on recognition of faces. And it is also very common to base access decision for a person …