scholarly journals Cloud Computing Based Masked Face Recognition Application

Author(s):  
Berk YILMAZER ◽  
Serdar SOLAK

The present data time targets digitizing data and executing effective, instinctive and easy to understand frameworks to unravel human life. Making a canny truck that deals with quick charging is a jump towards an advanced and totally computerized shopping knowledge. Buying thing in enormous supermarkets with a gigantic assortment of things is time taking procedure. It can be optimized through motorizing the charging framework. A shopping truck contains a versatile computational gadget (like raspberry pi) and a customized thing recognizable proof innovation (like the radio recurrence distinguishing proof innovation). Minute charging without long lines at counters and monitoring consumption constant are the two goals of this canny truck. This paper depends on building up a venture through the intend to lessen point in time used up on shopping of regular things and make the procedure less repetitive. Besides, it empowers the customers to use their point in time on other gainful and increasingly huge exercises.


Web Services ◽  
2019 ◽  
pp. 2115-2137
Author(s):  
Santosh Kumar ◽  
Debanjan Sadhya ◽  
Durgesh Singh ◽  
S. K. Singh

Establishing identity has become very difficult in the vastly crowded cloud computing environment. The need for a trustworthy cloud authentication phenomenon has increased in the wake of heightened concerns about authentication and rapid advancements in cloud computing, database access, and Internet communication. Face recognition is a non-intrusive method, and facial characteristics are probably most common biometrics features used by humans to identify others. Authentication for cloud computing using face recognition is based on security issues related to data access and cloud database in a cloud. It can provide a satisfactory level of security measures to users and service providers, cloud consumers, and different organizations. In this chapter, the authors cover different research aspects related to cloud security.


2022 ◽  
pp. 394-414
Author(s):  
Mohamed ElSayed ElAraby ◽  
Ahmed M. Anter

Web content is diverse and is regarded as the primary source of accessible information that can be accessed through reference links. Web facial images are one type of web content that relates to important web pages and is considered important information for individuals. This chapter proposes face recognition as a service architecture that is based on real-world images from the web. The proposed service is implemented as a service for other third parties via cloud computing; additionally, its architecture is built via cloud using virtual machines that can be expanded based on resource demands. Web crawlers crawl web pages and retrieve images for elastic cloud storage. The collected images are then used to remove human faces and prepare the face images for identification and identifying the matched face of the set through successive phases. This chapter used PCA for features extraction and KNN for identification. Experiments show that increasing the number of crawler instances improves crawling speed and improves face recognition accuracy by preferring Euclidean over other metrics.


2016 ◽  
Vol 2016 ◽  
pp. 1-21 ◽  
Author(s):  
Dakshina Ranjan Kisku ◽  
Srinibas Rana

Faces are highly challenging and dynamic objects that are employed as biometrics evidence in identity verification. Recently, biometrics systems have proven to be an essential security tools, in which bulk matching of enrolled people and watch lists is performed every day. To facilitate this process, organizations with large computing facilities need to maintain these facilities. To minimize the burden of maintaining these costly facilities for enrollment and recognition, multinational companies can transfer this responsibility to third-party vendors who can maintain cloud computing infrastructures for recognition. In this paper, we showcase cloud computing-enabled face recognition, which utilizes PCA-characterized face instances and reduces the number of invariant SIFT points that are extracted from each face. To achieve high interclass and low intraclass variances, a set of six PCA-characterized face instances is computed on columns of each face image by varying the number of principal components. Extracted SIFT keypoints are fused using sum and max fusion rules. A novel cohort selection technique is applied to increase the total performance. The proposed protomodel is tested on BioID and FEI face databases, and the efficacy of the system is proven based on the obtained results. We also compare the proposed method with other well-known methods.


Author(s):  
Prasetyawidi Indrawan ◽  
Slamet Budiyatno ◽  
Nur Muhammad Ridho ◽  
Riri Fitri Sari

Sign in / Sign up

Export Citation Format

Share Document