2021
DOI: 10.1088/1757-899x/1052/1/012060
|View full text |Cite
|
Sign up to set email alerts
|

Automated door with face recognition: using artificial neural network approach

Abstract: The implementation of an accurate face recognition system in a hardware device is a very important aspect of various security applications. In a security system, any type of password is used to access private and confidential data, some are hard to remember and can be stolen or guessed, misplaced, forgotten, purloined or duplicated, or become corrupted and unreadable. While there have been significant improvements in the algorithms with increasing recognition accuracy, only a few types of research were conduct… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…Security risks is on the increase as the due to the ever increasing need to do things smartly. The need therefore arises to make issues of privacy and security a more general concern during the design phase to limit moderate risks (Bashir et al 2021). Monitoring access into a building is a vital issue as it helps to keep lives and properties safe robbery of theft.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Security risks is on the increase as the due to the ever increasing need to do things smartly. The need therefore arises to make issues of privacy and security a more general concern during the design phase to limit moderate risks (Bashir et al 2021). Monitoring access into a building is a vital issue as it helps to keep lives and properties safe robbery of theft.…”
Section: Introductionmentioning
confidence: 99%
“…In access control, three main features are necessary: identification, authentication, and authorization. Traditional access methods use keys, passwords, pattern drawings, cards, or identification (ID) (Bashir et al 2021). Advances in science and technology and the consequent emergence of fields such as machine learning and artificial intelligence have led to the development of even more robust access control measures which use face recognition.…”
Section: Introductionmentioning
confidence: 99%