Application of 3D face recognition in the access control system

QD Le, TTC Vu, TQ Vo - Robotica, 2022 - cambridge.org
Over the years, face recognition has been the research topic that has attracted many
researchers around the world. One of the most significant applications of face recognition is …

Identifying users from the interaction with a door handle

J Vegas, C Llamas, MA González… - Pervasive and Mobile …, 2021 - Elsevier
Ambient intelligence pursues the integration of intelligent approaches on an IoT
infrastructure, mainly using everyday objects of the environment. The main hypothesis of the …

Face recognition, NFC and voice controlled door lock system

K Adalan, B Erkmen - 2016 national conference on electrical …, 2016 - ieeexplore.ieee.org
Door lock system was controlled with Face recognition, NFC and voice controlled as
wireless communication by mobile application that is developed on Android operating …

Implementación de un sistema de control de acceso basado en reconomiento facial

M Poveda, F Merchán - Prisma Tecnológico, 2015 - revistas.utp.ac.pa
Resumen" En este artículo se presentan aspectos de la implementación de un sistema de
control de acceso basado en reconocimiento facial. El mismo verifica en tiempo real si las …

Internet-enabled access control system using a mobile application

A Agape, M Postolache - 2018 22nd International conference …, 2018 - ieeexplore.ieee.org
The need to secure property or restrict entrance in special areas by controlling access to
them has always been extremely important for life safety and personal assets, as well as …

[PDF][PDF] Video Digital Doorlock System for Recognition and Transmission of Approaching Objects

SR Lee, JT Park, BH Woo… - KIPS transactions on …, 2014 - scholar.archive.org
Current digital door lock systems are mainly designed for users' convenience, so they have
weakness in security. Thus, this paper suggests a video digital doorlock system grouped …

[PDF][PDF] Smart home security system

F Phaltanwala, S Banawadikar, S Burse… - … Research Journal of …, 2020 - academia.edu
Technology has drastically upgraded home security system with use of internet of things,
artificial intelligence, machine learning algorithm and web crawling. These technologies …

Co-simulation method for hardware/software evaluation using xilinx system generator: a case study on image compression algorithms for capsule endoscopy

Q Al-Shebani, P Premaratne, PJ Vial… - 2018 12th …, 2018 - ieeexplore.ieee.org
Testing using the co-simulation method of an algorithm is important to visualize the
hardware performance of the algorithm. This study aims to introduce a method for comparing …

[PDF][PDF] Enhancing Role-Based Access Control with Embedded Facial Recognition RBAC-EFR System

J Essien - researchgate.net
Over time, a range of control mechanisms have been devised to deter unauthorised
individuals from gaining entry to restricted facilities. The principal objective of implementing …

[PDF][PDF] РАЗРАБОТКА СИСТЕМЫ КОНТРОЛЯ ДОСТУПА НА ОСНОВЕ РАСПОЗНАВАНИЯ ЛИЦ НА УСТРОЙСТВЕ С ОГРАНИЧЕННОЙ ВЫЧИСЛИТЕЛЬНОЙ …

ЮН Богданова - ТЕХНОЛОГИИ, МОДЕЛИ И АЛГОРИТМЫ …, 2023 - aeterna-ufa.ru
Аннотация В настоящее время все больше и больше предприятий внедряют в свою
инфраструктуру системы контроля доступа на основе распознавания лиц. Исполнение …