Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
1998, IECON '98. Proceedings of the 24th Annual Conference of the IEEE Industrial Electronics Society (Cat. No.98CH36200)
In our globally connected world, threats from various aspects are going at an alarming rate. These are controlling with different security systems such as metal detector, closed circuit cameras, and scanning systems. All these aids are meant to recognize and identify the explosives and others weapons. Here, it is more important to identify the particular person or persons, who were planning to distract the society or particular event. This paper is aimed to design that to control the threats by identifying the suspected people by a simple face recognition technique using simple PC or laptop with the help of scientific software MATLAB and its neural network tool box. In general, all major events are fully securitized with welldeveloped protection systems but only problem with non-major and small events, where security systems are matter of financial issues. So, militants and other destroyers are taking advantage of these situations and creating a panic and terror situations. This paper is also designed like that a PC or laptop with camera can be a face recognition system to identify the suspected peoples and most wanted criminal. By recognizing the people, we can mostly avoid the threats from these people and dangerous situations. Neural network is a science that has been extensively applied to numerous pattern recognition problems such as character recognition, object recognition, and face recognition, where this paper has programmed for face recognition with the back-propagation algorithm and simulated with the software MATLAB and its neural network tool box. Here, the back propagation plays the central operation role to get the key features were extracted from the picture for training the network. Since the major role of the project is mainly focusing on the training of the neural network, already extracted key features of the person’s image from the database were taken for training the back-propagation network. Here, we have taken 7 input units, 6 hidden units, and 4 output units contained back-propagation network. The output unit, 4 output units, generates the 4-bit output which gives the person identity.
Proceedings of International Conference on Circuit, Power and Computing Technologies [ICCPCT] 2014, 2014
Developing a security module with accurate, effective face recognition and fingerprint recognition is dealt in my paper. Personal safety and unique identification of a individual is necessary and it plays an vital role in certain situations where only the authorized persons can access the resources particularly in the secured storage of medicines, jewels, documentations, mines, militaries, laboratories, ATMs, ration shops, universities and places were harmful items were placed and dealt on it. Government organizations are nowadays investing huge money and looking for improving security systems in feedback with the recent terrorism that affects the country's safety mechanism. Thus to prevent mishandling of secured data and misuse of it by unauthorized persons particularly hackers and anti social elements. My paper deals with the technology to prevent unauthorized usage of secured resources, ensuring unique identity and safety with the usage of fuzzy logic, and neural networks in implementing face recognition techniques and also an advanced technique on fingerprint recognition. Fingerprint recognition technique is used for allowing access only to the stored fingerprints, and my proposed system can be effectively utilized in the event of complete shut down or drained battery, thus retaining all stored fingerprints for cross verification with the data and access can be allowed. Face recognition technique is effectively used in place of failure of biometrie technology. Where, it is not applicable to non-consistent people, so incorporating neural algorithms thus enabling secure access. Effective face recognition methodologies and improved fingerprint recognition techniques are dealt in this paper with effectiveness.
… Cybernetics, Laboratory of Image …, 2002
A Multilayer Perceptron Neural Network (NN) is considered for access control based on face image recognition. We studied robustness of NN classifiers with respect to the False Acceptance and False Rejection errors. A new thresholding approach for rejection of unauthorized persons is proposed. Ensembles of NN with different architectures were studied too. Advantages of the ensembles are shown, and the best architecture parameters are given. The usage of negative examples was explored. We have shown that by using negative examples we can improve performance for access control task. The explored NN architectures may be used in real-time applications.
2021
Background: Authentication is one of the major challenges of the information systems era. From Among other things, recognizing the human face is one of the known techniques that can be user authentication. Aim: The main purpose of this paper is to study the application of the facial recognition algorithms as a security system for the examination office at Omar Al-Mukhtar University (OMU) for the first time in Libyan universities. It can detect intruders into restricted or highly secure areas, and help reduce human errors. Methods: This system consists of two parts: the hardware part and the software part. The device part consists of a camera, while the software part consists of the face detection and facial recognition algorithms program. The face was detect using the Viola Jones method and face recognition is performed by Use of independent component analysis (ICA). When a person enters the area in question, his photos are taken by the camera and sent to the program for analysis an...
Kitabın bu bölümünde; uluslararası finansal piyasaların önemli bir parçası olan para piyasaları detaylıca incelenmiştir. Para piyasaları sis- temi içerisinde her biri bir unsur olan para piyasası aracıları, araçları, fon arz edenleri ve fon talep edenleri tek tek açıklanmış, Türkiye’deki para piyasalarının tarihi gelişimi, işleyişi ve düzenlemelerine yer verilmiştir. Ayrıca, bu bölümde gelişmiş ve gelişmekte olan bazı ülkelerin para piyasalarına dair genel görünüm, seçilmiş veriler ile anlatılmıştır.
Presentazione del numero speciale di "Nuovi Studi. Rivista di Arte antica e moderna" dedicato alla pittura lombarda del '400 e al problema di Zanetto Bugatto
Annali Scuola Normale Superiore di Pisa (Cl. Lettere e Filosofia), s. III, XIX, pp. 471-501 e tavv. VI-XIV, 1989
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Journal of Surfactants and Detergents, 2016
Brill's Encyclopedia of Jainism, 2020
More Connected than it Seems: Cross Cultural Contacts and Exchanges between the Ancient Mediterranean and the East, 2023
Phoinix, 2023
Revista de Processo, 2020
American International Journal of Computer Science and Information Technology, 2024
Journal of Indian Philosophy 47, 749−777, 2019
Art-Sanat, 8/2017
Psychology and Psychotherapy: Theory, Research and Practice, 2005
Clinical Neurophysiology, 2006
Molecular BioSystems, 2017
RIG-Kulturhistorisk tidskrift, 2000
Romanian Journal of Rheumatology, 2020
IEEJ Transactions on Industry Applications, 1999
Chemical Engineering and Processing: Process Intensification, 2005
The Journal of Antibiotics, 1999
Journal of the Dermatology Nurses’ Association, 2014