A face recognition application for Alzheimer's patients using ESP32-CAM and Raspberry Pi
This paper proposes a real-time face recognition application to aid people living with
Alzheimer's in identifying the people around them. This is achieved by developing a portable …
Alzheimer's in identifying the people around them. This is achieved by developing a portable …
Vehicle security systems using face recognition based on internet of things
Nowadays, the automobile sector is one of the hottest applications, where vehicles can be
intelligent by using IoT technology. But unfortunately, these vehicles suffer from many …
intelligent by using IoT technology. But unfortunately, these vehicles suffer from many …
Effecting of environmental conditions to accuracy rates of face recognition based on IoT solution
M Rukhiran, P Netinant, T Elrad - Journal of Current Science and …, 2020 - ph04.tci-thaijo.org
There are an increasing number of Internet of Thing (IoT) solutions that are treated and
supported us in communication, data storage, maintenance, monitoring, privacy, and …
supported us in communication, data storage, maintenance, monitoring, privacy, and …
Integrating face recognition security system with the internet of things
IM Sayem, MS Chowdhury - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
A perennial need for safety in the community depends on country, city, and district. In some
instances, feeling safe is required on a 24/7 basis. A popular and cost-effective solution …
instances, feeling safe is required on a 24/7 basis. A popular and cost-effective solution …
A Smart Assistive System for Visually Impaired to Inform Acquaintance Using Image Processing (ML) Supported by IoT
C Aravindan, R Arthi, R Kishankumar, V Gokul… - … Artificial Intelligence and …, 2021 - Springer
The proposed work suggests to provide a new interface support system for visually impaired
person to independently handle everyday life activities like recognizing and greeting a friend …
person to independently handle everyday life activities like recognizing and greeting a friend …
Application of Facial Recognition with PCA and Raspberry Pi for Access Control to Luggage Lockers
The human face is considered to be one of the most used metrics for identification, along
with prints and irises. It provides sufficient information for identification. The usage of …
with prints and irises. It provides sufficient information for identification. The usage of …
Design and Implementation of an Internet of Things-Based Real-Time Five-Layer Security Surveillance System
K Narwani, F Liaquat, AA Laghari, AK Jumani… - … Conference on Artificial …, 2023 - Springer
Abstract The Internet of Things (IoT) is one the major part of the fourth Industrial Revolution;
it's the process to enable things to gather data and get controlled remotely from anywhere in …
it's the process to enable things to gather data and get controlled remotely from anywhere in …
Maximizing the prediction accuracy of vehicle theft and enable alert signal using Novel Resnet-50 in comparison with stochastic gradient descent classifier
SG Subash, S Kalaiarasi… - AIP Conference …, 2024 - pubs.aip.org
The purpose of this project is to analyze and improve performance of automated vehicle theft
detection to enhance the security system of vehicles parked in public places using two …
detection to enhance the security system of vehicles parked in public places using two …
A Novel Implementation of an Interactive Smart Mirror
SA Desai, PD Mistry, JP Kahar… - 2021 6th …, 2021 - ieeexplore.ieee.org
Finding new ways and devices to integrate with Home Automation Systems has led to the
inception of the Smart Mirror. Every day, new technology has been developed, new robots …
inception of the Smart Mirror. Every day, new technology has been developed, new robots …
[PDF][PDF] A DECENTRALIZED MULTI-FACTOR USER AUTHENTICATION SCHEME FOR THE INTERNET OF THINGS SYSTEM
IR CHIADIGHIKAOBI - etd.uum.edu.my
User authentication is an essential part of communication in an Internet of Things (IoT)
environment. For example, it is necessary for a smart home to utilize user authentication as a …
environment. For example, it is necessary for a smart home to utilize user authentication as a …