3D-3D Superimposition Techniques in Personal Identification: A Ten-year Systematic Literature Review

X Wang, S Wei, Z Zhao, X Luo, F Song, Y Li - Forensic Science International, 2024 - Elsevier
The 3D-3D superimposition technique offers a comprehensive comparison and
quantification of the similarity between two 3D models, making it a promising approach for …

Proctor net: An AI framework for suspicious activity detection in online proctored examinations

P Tejaswi, S Venkatramaphanikumar, KVK Kishore - Measurement, 2023 - Elsevier
Due to recent pandemic and other factors, global Education System transiting from
traditional paradigm to online paradigm in learning as well as assessment. Online proctored …

Computationally intelligent real-time security surveillance system in the education sector using deep learning

MM Abid, T Mahmood, R Ashraf, CMN Faisal… - PloS one, 2024 - journals.plos.org
Real-time security surveillance and identity matching using face detection and recognition
are central research areas within computer vision. The classical facial detection techniques …

Application of artificial neural networks in atomic force microscopy

AK Sokolov, OK Garishin… - Mechanics of Advanced …, 2023 - Taylor & Francis
The paper describes a method of artificial neural network application to build a computer
database for numerical simulation of the process of indentation of an atomic force …

Systematic Review on Profile-Based Criminal Identification through Partial Face Recognition and Advanced Technologies

SI Weerarathne, D Abeysinghe… - … on Smart Computing …, 2024 - ieeexplore.ieee.org
Criminal identification has evolved significantly in recent years, with profile-based
methodologies providing a comprehensive approach to suspect recognition. This research …

Futuristic study of a criminal facial recognition: A open-source face image dataset

A Kumar, R Gupta - Science Talks, 2023 - sciencetalks-journal.com
Open face recognition provides an uncertain challenge to criminal face identification. Thus,
this recognition has many uses, from security to entertainment. Even if other biometric …

Enhancement of Criminal Facial Image Using Multistage Progressive V-Net for Facial Recognition by Pixel Restoration

SSB Benslet, P Parameswar - EAI Endorsed Transactions on …, 2024 - publications.eai.eu
INTRODUCTION: Criminal activity is expanding exponentially in modern society, which
leads towards a great concern about security issues. Facial recognition technology (FRT) is …

Futuristic study of a criminal facial recognition system using open-source images

A Kumar, R Gupta - 2023 - preprints.opticaopen.org
Face recognition provides an uncertainty challenge to criminal face identification. Thus, this
recognition has many uses, from security to entertainment. Even if other bio-metric …

Efficient Method of Road Outlier Recognition Using Deep Learning Coupled with Data Augmentation Approach

S Natha, FA Jokhio, M Shafique… - Sir Syed University …, 2024 - sirsyeduniversity.edu.pk
In recent years, Closed-circuit Television (CCTV) cameras have been playing a vital role in
the surveillance of both public and private areas. The primary objective of surveillance is to …

Cloud based Threat Intelligence Sharing for Collective Defence

MS Roobini, MB Chowdary, Y Srinivas… - 2024 Ninth …, 2024 - ieeexplore.ieee.org
To improve cybersecurity, cloud-based threat intelligence sharing for collective defense is
essential. Organizations must work together to effectively detect and respond to the variety of …