scholarly journals Smart Identity Management System by Face Detection Using Multitasking Convolution Network

2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Lubna Farhi ◽  
Hira Abbasi ◽  
Rija Rehman

Identity management system in most academic and office environments is presently achieved primarily by a manual method where the user has to input their attendance into the system. The manual method sometimes results in human error and makes the process less efficient and time-consuming. The proposed system highlights the implementation and design of a smart face identification-based management system while taking into account both the background luminosity and distance. This system detects and recognizes the person and marks their attendance with the timestamp. In this methodology, the face is initially resized to 3 different sizes of 256, 384, and 512 pixels for multiscale testing. The overall outcome size descriptor is the overall mean for these characteristic vectors, and the deep convolution neural network calculates 22 facial features in 128 distinct embeddings in 22-deep network layers. The pose of the 2D face from −15 to +15° provides identification with 98% accuracy in low computation time. Another feature of the proposed system is that it is able to accurately perform identification with an accuracy of 99.92% from a distance of 5 m under optimal light conditions. The accuracy is also dependent on the light intensity where it varies from 96% to 99% under 100 to 1000 lumen/m2, respectively. The presented model not only improves accuracy and identity under realistic conditions but also reduces computation time.

2014 ◽  
Vol 548-549 ◽  
pp. 1334-1338
Author(s):  
Li Shun Ni ◽  
Bing Chen

This paper presents a quickly locate the query methods in the face of huge amounts of data. The method by analyzing the data relationship, split the database, the formation of cross-database quickly Hash positioning table, and by analyzing the query cost to build double weighted graph and weight table. Each query is given based on the node weight table fast cross-database query path, and quickly locate the target from the cross-database positioning Hash table Hash calculation, in order to achieve fast positioning method.


TEM Journal ◽  
2020 ◽  
pp. 1338-1347
Author(s):  
Belkacem Athamena ◽  
Zina Houhamdi

This paper describes the identity management system (IdMS) by defining system and user requirements. Additionally, it introduces the IdMS concept that approaches the things identity management. Moreover, the paper deeply describes the IdMS features using unified modelling language (UML) diagrams such as class, system, and sequence diagrams to show the main system functionalities. Ultimately, the suggested system is evaluated by comparing it with the existing systems and discussing the fulfilment of user and system requirements.


Author(s):  
A. Shobanadevi ◽  
Sumegh Tharewal ◽  
Mukesh Soni ◽  
D. Dinesh Kumar ◽  
Ihtiram Raza Khan ◽  
...  

Author(s):  
Kenneth J. Giuliani ◽  
V. Kumar Murty

The purpose of this chapter is to examine the strengths and weaknesses of the most commonly used model for digital identities. It is compared to other models which have preceded it, thus giving a background on its development. The models are measured against a set of criteria which it is desirable for an identity management system to have. The underlying hope is that understanding this model will help improve it or even lead to a different model.


Author(s):  
Reema Bhatt ◽  
Manish Gupta ◽  
Raj Sharman

Identity management is the administration of an individual's access rights and privileges in the form of authentication and authorization within or across systems and organizations. An Identity Management system (IdM) helps manage an individual's credentials through the establishment, maintenance, and eventual destruction of their digital identity. Numerous products, applications, and platforms exist to address the privacy requirements of individuals and organizations. This chapter highlights the importance of IdM systems in the highly vulnerable security scenario that we live in. It defines and elaborates on the attributes and requirements of an effective identity management system. The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models. The latter part of this chapter elaborates on some of today's most popular IdM solutions.


Sign in / Sign up

Export Citation Format

Share Document