Search Results - (( developing security face algorithm ) OR ( java implication based algorithm ))
Search alternatives:
- developing security »
- implication based »
- java implication »
- face algorithm »
- security face »
-
1
Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor
Published 2013“…Integration of multimodal biometrics is one of the well known techniques for security enhancement. Hence, in this research the integration of car plate and face recognition as security enhancement in private parking area has been developed to ensure the car is driven by the authorized or registered owner. …”
Get full text
Get full text
Thesis -
2
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Several different algorithms have been proposed for computer recognition of human faces. …”
Get full text
Get full text
Thesis -
3
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
Published 2018“…Algorithms developed for face recognition are tightly related to the rate of extracted face features. …”
Get full text
Get full text
Get full text
Thesis -
4
Face recognition door lock system / Danial Haziq Hakimi Salahuddin
Published 2023“…The project aims to develop a secure and convenient door lock system that utilizes face recognition technology. …”
Get full text
Get full text
Student Project -
5
Microcontroller-based face recognition system with web-based application for car security
Published 2023“…Hardware and software designs were carried out to develop a car security system using microcontroller-based face recognition system. …”
Article -
6
-
7
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
Get full text
Get full text
Final Year Project -
8
Enhanced Continuous Face Recognition Algorithm for Bandwidth Constrained Network in Real Time Application
Published 2023Conference Paper -
9
Property premises intruders detection using face recognition method / Joveni Henry
Published 2017“…This project will focus mainly on the Viola-Jones algorithm for face and facial parts detection, facial geometry distance measure for feature extraction and Similarity Measure algorithm using the Euclidian Distance to perform face recognition. …”
Get full text
Get full text
Thesis -
10
-
11
An optimized attack tree model for security test case planning and generation
Published 2018“…Although, many researches have been dedicated to security testing with attack tree models, test case redundancy using this threat modeling technique has been a major issue faced leading to poor test coverage and expensive security testing exercises. …”
Get full text
Get full text
Article -
12
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…Thus, to develop an efficient scheme to generate non fixed iteration in the image scrambling algorithm in order to eliminate the problem of visual leakage. …”
Get full text
Get full text
Get full text
Article -
13
Modified spectral clustering algorithm for semisupervised face annotation modeling
Published 2025“…Recent advancements in facial recognition have impacted security, healthcare, and identity verification, with face annotation — labeling facial features for training datasets - being crucial. …”
Get full text
Get full text
Thesis -
14
Deep Learning Based Face Attributes Recognition
Published 2018“…Face Recognition is a recently developing technology with numerous real life applications. …”
Get full text
Get full text
Monograph -
15
Evaluation of Security Metric for Artificial Internet of Things Smart Locking System
Published 2023“…In terms of hardware implementation, a microcontroller is chose, and a testing environment is established to explore and enhances security measures. This thesis outlines the architectural model of the smart locking system, the design of the face recognition algorithm, and the development of face recognition reader using the Raspberry Pi 3 model B microcontroller. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…The result shows that the enhanced PRESENT outperformed the original, particularly in terms of the security and computation cost. Besides, the Mann-Whitney U test statistically shows a significant difference in security and computation cost between the two algorithms. …”
Get full text
Get full text
Get full text
Thesis -
17
Adaptive artificial neural network for power system security assessment and control action
Published 2012“…Furthermore,an AANN for power system security assessment was developed for steady state and dynamic security assessments. …”
Get full text
Get full text
Thesis -
18
An immune-genetic algorithm with tabu local search for network intrusion detection system / Hamizan Suhaimi
Published 2021“…Due to the nature of borderless connection, all parties face huge challenges in providing the best quality of services especially in terms of security. …”
Get full text
Get full text
Thesis -
19
Smart room system with dual authentication
Published 2025“…This system depends on cloudbased storage, which is Firebase to improve security in a variety of situations. At its center, a Raspberry Pi with a webcam performs face scanning and captures face. …”
Get full text
Get full text
Get full text
Article -
20
Development and analysis of face recognition system on a mobile robot environment / Jit Shen Quah and Mariam Md Ghazaly
Published 2018“…In today’s society, face recognition technology is widely used and applied in various fields such as biometric identification and security surveillance. …”
Get full text
Get full text
Get full text
Article
