scholarly journals Door Access System Using Face Recognition

2021 ◽  
Vol 794 (1) ◽  
pp. 012127
Author(s):  
J Mae ◽  
F Rabbaanii ◽  
R B Nasza
Connectivity ◽  
2020 ◽  
Vol 145 (3) ◽  
Author(s):  
V. S. Orlenko ◽  
◽  
I. I. Kolosinsʹkyy

The article deals with the technical side of face recognition — the neural network. The advantages of the neural network for identification of the person are substantiated, the stages of comparison of two images are considered. The first step is defined as the face search in the photo. Using several tests, the best neural network was identified, which allowed to effectively obtain a normalized image of a person’s face. The second step is to find the features of the person, for which the comparative analysis is performed. It was this stage that became the main point in this article — 16 sets of tests were carried out, each test set has 12 tests inside. Two large datasets were used for the study to evaluate the effectiveness of the algorithms not only in ideal circumstances but also in the field. The results of the study allowed us to determine the best method and neural model for finding a face and dividing it into parts. It is determined which part of the face the algorithm recognizes best — it will allow making adjustments to the location of the camera.


2018 ◽  
Vol 197 ◽  
pp. 11008 ◽  
Author(s):  
Asep Najmurrokhman ◽  
Kusnandar Kusnandar ◽  
Arief Budiman Krama ◽  
Esmeralda Contessa Djamal ◽  
Robbi Rahim

Security issues are an important part of everyday life. A vital link in security chain is the identification of users who will enter the room. This paper describes the prototype of a secured room access control system based on face recognition. The system comprises a webcam to detect faces and a solenoid door lock for accessing the room. Every user detected by the webcam will be checked for compatibility with the database in the system. If the user has access rights then the solenoid door lock will open and the user can enter the room. Otherwise, the data will be sent to the master user via Android-based smartphone that installed certain applications. If the user is recognized by the master user, then the solenoid door lock will be opened through the signal sent from the smartphone. However, if the user is not recognized, then the buzzer will alert. The main control circuit on this system is Raspberry pi. The software used is OpenCV Library which is useful to display and process the image produced by webcam. In this paper, we employ Haar Cascade Classifier in an image processing of user face to render the face detection with high accuracy.


Author(s):  
Mayuri Jadhav ◽  
Kruti Pathak ◽  
Gayatri Paradkar ◽  
Ashwini Rajurkar

Security has become a very crucial issue in various countries. Many techniques were came into use to resolve the issues related to security. So these various techniques were mostly used by higher organizations like MNC's, still there are some issues related to Attendance marking. Traditional ways of attendance marking were of no use. The reason behind that is the increase in number of proxy attendance. As the payment of employee is based on his attendance as well as on his work, so there is an increment in number of proxies by the employees, of their colleagues. So to overcome this issue, a system has to be there which will keep track of attendance, where the attendance will be taken by a system and on the basis of that attendance the payment will be calculated. This paper proposes a system where the attendance of employees will be taken by the system by using face recognition technology and on the basis of that, the payment will be calculated. It also includes a door access system for security purpose, where the access will be given to only authorized employees, the one who will be recognized by the system.


2019 ◽  
Author(s):  
Amey Bairolu ◽  
Sanjukta Sheth ◽  
Binay Hazra ◽  
Arpit Rawankar

2010 ◽  
Vol 69 (3) ◽  
pp. 161-167 ◽  
Author(s):  
Jisien Yang ◽  
Adrian Schwaninger

Configural processing has been considered the major contributor to the face inversion effect (FIE) in face recognition. However, most researchers have only obtained the FIE with one specific ratio of configural alteration. It remains unclear whether the ratio of configural alteration itself can mediate the occurrence of the FIE. We aimed to clarify this issue by manipulating the configural information parametrically using six different ratios, ranging from 4% to 24%. Participants were asked to judge whether a pair of faces were entirely identical or different. The paired faces that were to be compared were presented either simultaneously (Experiment 1) or sequentially (Experiment 2). Both experiments revealed that the FIE was observed only when the ratio of configural alteration was in the intermediate range. These results indicate that even though the FIE has been frequently adopted as an index to examine the underlying mechanism of face processing, the emergence of the FIE is not robust with any configural alteration but dependent on the ratio of configural alteration.


Author(s):  
Chrisanthi Nega

Abstract. Four experiments were conducted investigating the effect of size congruency on facial recognition memory, measured by remember, know and guess responses. Different study times were employed, that is extremely short (300 and 700 ms), short (1,000 ms), and long times (5,000 ms). With the short study time (1,000 ms) size congruency occurred in knowing. With the long study time the effect of size congruency occurred in remembering. These results support the distinctiveness/fluency account of remembering and knowing as well as the memory systems account, since the size congruency effect that occurred in knowing under conditions that facilitated perceptual fluency also occurred independently in remembering under conditions that facilitated elaborative encoding. They do not support the idea that remember and know responses reflect differences in trace strength.


Sign in / Sign up

Export Citation Format

Share Document