user cooperation
Recently Published Documents


TOTAL DOCUMENTS

226
(FIVE YEARS 48)

H-INDEX

19
(FIVE YEARS 4)

Robotica ◽  
2021 ◽  
pp. 1-19
Author(s):  
Quoc Dien Le ◽  
Tran Thanh Cong Vu ◽  
Tuong Quan Vo

Abstract Over the years, face recognition has been the research topic that has attracted many researchers around the world. One of the most significant applications of face recognition is the access control system. The access control system allows authorized persons to enter or exit certain or restricted areas. As a result, it will increase the security situation without over-investment in staff security. The access information can be the identification, time, and location, etc. It can be used to carry out human resource management tasks such as attendance and inspection of employees in a more fair and transparent manner. Although face recognition has been widely used in access control systems because of its better accuracy and convenience without requiring too much user cooperation, the 2D-based face recognition systems also retain many limitations due to the variations in pose and illumination. By analyzing facial geometries, 3D facial recognition systems can theoretically overcome the disadvantages of prior 2D methods and improve robustness in different working conditions. In this paper, we propose the 3D facial recognition algorithm for use in an access control system. The proposed algorithm includes the preprocessing, feature extraction, and classification stages. The application of the proposed access control system is the automatic sliding door, the controller of the system, the web-based monitoring, control, and storage of data.


2021 ◽  
Author(s):  
◽  
Binwei Yin

<p>Purpose – The purpose of this paper is to study the issues occurred and benefits gained during this recent Electronic Document and Records Management System (EDRMS) implementation within the resolution team, legal team and ministerial services team of a New Zealand public organisation so that it can benefit future organisation-wide implementation.  Design/Methodology/approach – Interview questions were developed based on literature review and semi-structured interview was used to collect data from key users of affected business units as well as EDRMS administrators. Interview results were then compared with pre-defined critical successful factors (CSFs) which include: top management support, mature recordkeeping practices, business classification schemes and effective user cooperation, on-going training and support, Well-planned change strategy and communication to find if there is any potential gap within this implementation.  Findings – Issue such as: Lack of early user buy-in or Lack of senior management support arising during the implementations was direct result of violating EDRMS CSFs. Thus, for future deployment, project team needs to correct the issue based on CSFs. However, there are also benefits gained during this implementation which include: Improves overall information quality and efficiency and Enhancing the retention of knowledge base, etc.  Practical implications – Before creating a new file in the EDRMS system, users need to do a search first to check if there is any existing file to avoid duplication. Moreover, business rules around naming convention should be in place before the implementation to guide the users to properly name EDRMS files or folders to avoid duplication.  Originality/value – This paper will assist the case organisation or any other NZ public organisations for any future EDRMS deployment.</p>


2021 ◽  
Author(s):  
◽  
Binwei Yin

<p>Purpose – The purpose of this paper is to study the issues occurred and benefits gained during this recent Electronic Document and Records Management System (EDRMS) implementation within the resolution team, legal team and ministerial services team of a New Zealand public organisation so that it can benefit future organisation-wide implementation.  Design/Methodology/approach – Interview questions were developed based on literature review and semi-structured interview was used to collect data from key users of affected business units as well as EDRMS administrators. Interview results were then compared with pre-defined critical successful factors (CSFs) which include: top management support, mature recordkeeping practices, business classification schemes and effective user cooperation, on-going training and support, Well-planned change strategy and communication to find if there is any potential gap within this implementation.  Findings – Issue such as: Lack of early user buy-in or Lack of senior management support arising during the implementations was direct result of violating EDRMS CSFs. Thus, for future deployment, project team needs to correct the issue based on CSFs. However, there are also benefits gained during this implementation which include: Improves overall information quality and efficiency and Enhancing the retention of knowledge base, etc.  Practical implications – Before creating a new file in the EDRMS system, users need to do a search first to check if there is any existing file to avoid duplication. Moreover, business rules around naming convention should be in place before the implementation to guide the users to properly name EDRMS files or folders to avoid duplication.  Originality/value – This paper will assist the case organisation or any other NZ public organisations for any future EDRMS deployment.</p>


2021 ◽  
Author(s):  
Rui Wang ◽  
Jian Chen ◽  
Bingtao He ◽  
Lu Lv ◽  
Yuchen Zhou ◽  
...  

Author(s):  
Jayakrishnan S Kumar

Abstract: On-line palmprint recognition and latent palmprint identification unit two branches of palmprint studies. The previous uses middle-resolution footage collected by a camera in an exceedingly} very well-controlled or contact-based surroundings with user cooperation for industrial applications and so the latter uses high resolution latent palmprints collected in crime scenes for rhetorical investigation. However, these two branches do not cowl some palmprint footage that have the potential for rhetorical investigation. Attributable to the prevalence of smartphone and shopper camera, further proof is at intervals the variability of digital footage taken in uncontrolled and uncooperative surroundings. However, their palms area unit typically noticeable. To visualize palmprint identification on footage collected in uncontrolled and uncooperative surroundings, a novel palmprint info is established Associate in nursing AN end-to-end deep learning rule is projected. The new data named NTU Palmprints from the net (NTU-PI-v1) contains 7881 footage from 2035 palms collected from the net. The projected rule consists of Associate in Nursing alignment network and a feature extraction network and is end-to-end trainable. The projected rule is compared with the progressive on-line palmprint recognition ways that and evaluated on three public contactless palmprint infos, IITD, CASIA, and PolyU and a couple of new databases, NTU-PI-v1 and NTU contactless palmprint info. The experimental results showed that the projected rule outperforms the current palmprint recognition ways that. Keywords: Biometrics, criminal and victim identification, forensics, palmprint recognition


Author(s):  
Gui Zhou ◽  
Cunhua Pan ◽  
Hong Ren ◽  
Kangda Zhi ◽  
Sheng Hong ◽  
...  

Electronics ◽  
2021 ◽  
Vol 10 (12) ◽  
pp. 1386
Author(s):  
Muhammad Waseem Akhtar ◽  
Syed Ali Hassan ◽  
Haejoon Jung

Due to the ability to handle a large number of users, low latency, and high data rates, NON-orthogonal multiple access (NOMA) is considered a promising access technology for next-generation communication systems. However, as the number of users increases, each user experiences a greater number of successive interference cancellations (SIC), causing the system’s performance to decline. With the increase in the number of users, the fraction of power allocated to each user becomes smaller. Cooperative communication in downlink NOMA is considered as a potential approach to enhance the reliability, capacity, and performance over wireless channels. Space-time block code (STBC)-aided cooperative NOMA (CNOMA) offers an opportunity to improve the weak users’ signal-to-interference-plus-noise (SINR) through strong user cooperation. In this paper, we study the symbol error probability (SEP) performance of the STBC-NOMA and derive the asymptotic expression for SEP when the network is impaired with imperfect SIC (ipSIC) and timing offsets. The simulation results show that the performance of STBC-NOMA was degraded significantly with an increase in the imperfection of SIC and timing errors and that traditional orthogonal access schemes, such as orthogonal frequency division multiple access (OFDMA) and time division multiple access (TDMA), should be used after a threshold SIC level.


Sign in / Sign up

Export Citation Format

Share Document