Property premises intruders detection using face recognition method / Joveni Henry
Nowadays, many issues and news reported about property premises intrusion have raise major concern among the property premises owner and occupants to protect their safety. Every property premises owner have already taken some action to protect their property premises and safety by using all kinds of...
| Main Author: | Joveni Henry |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2017
|
| Online Access: | https://ir.uitm.edu.my/id/eprint/18152/ |
Similar Items
Intruder detection
by: Muhamad Haffiz, Muhamad Adlin
Published: (2013)
by: Muhamad Haffiz, Muhamad Adlin
Published: (2013)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
Intruder detection using histogram and edge detection algorithms
by: Tan, Kai Yang
Published: (2016)
by: Tan, Kai Yang
Published: (2016)
Robbery Scene Detection Detect Intruders to Home Area
by: Chin, Wai Kit
Published: (2016)
by: Chin, Wai Kit
Published: (2016)
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)
by: Ahmed, Tarem, et al.
Published: (2014)
Low Cost Night Vision System for Intruder Detection
by: Ng Liang, Shing, et al.
Published: (2015)
by: Ng Liang, Shing, et al.
Published: (2015)
Intruder detection in camera networks using the one-class neighbor machine
by: Ahmed, Tarem Ozair, et al.
Published: (2011)
by: Ahmed, Tarem Ozair, et al.
Published: (2011)
Automated intruder detection from image sequences using minimum volume sets
by: Ahmed, Tarem, et al.
Published: (2012)
by: Ahmed, Tarem, et al.
Published: (2012)
Night vision camera system for intruder detection in indoor and outdoor environment
by: Sak, Jenn Shin
Published: (2015)
by: Sak, Jenn Shin
Published: (2015)
Tackling Intruders in Wireless Mesh Networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
by: Pathan, Al-Sakib Khan, et al.
Published: (2013)
Intruding the forbidden sea of money laundering
by: Chen, Kendra Jing Wen, et al.
Published: (2018)
by: Chen, Kendra Jing Wen, et al.
Published: (2018)
Tailoring services / Holysteve Henry... [et al.]
by: Henry, Holysteve, et al.
Published: (2015)
by: Henry, Holysteve, et al.
Published: (2015)
Anime character face detection and recognition
by: Ng, Hui Chin
Published: (2022)
by: Ng, Hui Chin
Published: (2022)
Face detection and recognition in an unconstrained environment
by: Chin, Ariana Sue Rei
Published: (2022)
by: Chin, Ariana Sue Rei
Published: (2022)
Intellectual capital and financial performance of commercial banks in Malaysia / Emerline Carol Henry
by: Henry, Emerline Carol
Published: (2011)
by: Henry, Emerline Carol
Published: (2011)
Multi-sensor fusion and deep learning framework for automatic human activity detection and health monitoring using motion sensor data / Henry Friday Nweke
by: Henry Friday , Nweke
Published: (2019)
by: Henry Friday , Nweke
Published: (2019)
Linear subspace methods in face recognition
by: Nguyen, Hieu
Published: (2011)
by: Nguyen, Hieu
Published: (2011)
Unmanned aerial vehicle with night vision for tracking intruder
by: Dhinesh, Ramotharan
Published: (2015)
by: Dhinesh, Ramotharan
Published: (2015)
Coincidence detection using spiking neurons with application to face recognition
by: Kamaruzaman, Fadhlan, et al.
Published: (2015)
by: Kamaruzaman, Fadhlan, et al.
Published: (2015)
Professional Premises
by: O'Connell, Andrew
Published: (2020)
by: O'Connell, Andrew
Published: (2020)
Anger mood detection based on face recognition and heartbeat
by: Mohamed, Masnani, et al.
Published: (2013)
by: Mohamed, Masnani, et al.
Published: (2013)
Face recognition for location detection of occupants in a building
by: Cheong, Kok Siong
Published: (2023)
by: Cheong, Kok Siong
Published: (2023)
Multi-camera face detection and recognition in an unconstrained environment
by: Lee, Kian Huang
Published: (2023)
by: Lee, Kian Huang
Published: (2023)
Intruder avoidance system via short message service (SMS)
by: Toha, Siti Fauziah, et al.
Published: (2011)
by: Toha, Siti Fauziah, et al.
Published: (2011)
Long-term intruding effects of acid rain on engineering properties of primary and secondary kaolinite clays
by: Bakhshipour, Zeinab, et al.
Published: (2016)
by: Bakhshipour, Zeinab, et al.
Published: (2016)
Three-dimensional (3D) reconstruction of ultrasound foetal images using visualisation toolkit (VTK) / Grace Anabela Henry Dusim
by: Grace Anabela , Henry Dusim
Published: (2020)
by: Grace Anabela , Henry Dusim
Published: (2020)
Face mask wear detection by using facial recognition system for entrance authorization
by: Ahmad Azraai, Munirah, et al.
Published: (2022)
by: Ahmad Azraai, Munirah, et al.
Published: (2022)
An experimental research on GPS based boundary intruding boat monitoring system
by: Puviarasi, R., et al.
Published: (2019)
by: Puviarasi, R., et al.
Published: (2019)
Face recognition using neural network
by: Alfatihah, Abdullah
Published: (2010)
by: Alfatihah, Abdullah
Published: (2010)
Face recognition using deep learning
by: Ooi, Zi Xen
Published: (2019)
by: Ooi, Zi Xen
Published: (2019)
Transivity choices in the Malaysian prime minister's 2009 national day blog posting / Daphne Rosaline Henry Thomas
by: Henry Thomas, Daphne Rosaline
Published: (2010)
by: Henry Thomas, Daphne Rosaline
Published: (2010)
Migrating objects: John Henry Foley and empire
by: Cullen, Fintan
Published: (2017)
by: Cullen, Fintan
Published: (2017)
The cult of Henry VI: sainthood, kingship and memory
by: Lloyd Williams, Frederick A. S.
Published: (2024)
by: Lloyd Williams, Frederick A. S.
Published: (2024)
Complexity and biology: Edgar Morin and Henri Atlan
by: Marks, John
Published: (2016)
by: Marks, John
Published: (2016)
The effects of collaborative versus individual writing on fluency, complexity and accuracy among refugee learners / Jessica Thevamalar Rummy@ Henry
by: Jessica Thevamalar , Rummy@ Henry
Published: (2018)
by: Jessica Thevamalar , Rummy@ Henry
Published: (2018)
A pay-and-stay model for tackling intruders in hybrid wireless mesh networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
Conflicting values in organizations: local versus intruder managerial values / Boufeldja Ghiat
by: Ghiat, Boufeldja
Published: (2020)
by: Ghiat, Boufeldja
Published: (2020)
Intruder localization wireless sensor network radar design with virtual reference tags
by: Abdullah, Hadi
Published: (2014)
by: Abdullah, Hadi
Published: (2014)
Presentation attack detection for face recognition on smartphones: a comprehensive review
by: Abdul Ghaffar, Idris, et al.
Published: (2017)
by: Abdul Ghaffar, Idris, et al.
Published: (2017)
Use of experiment design methods to determine unseen data in face recognition problems
by: Abdullah, Shahrum Shah, et al.
Published: (2009)
by: Abdullah, Shahrum Shah, et al.
Published: (2009)
Similar Items
-
Intruder detection
by: Muhamad Haffiz, Muhamad Adlin
Published: (2013) -
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022) -
Intruder detection using histogram and edge detection algorithms
by: Tan, Kai Yang
Published: (2016) -
Robbery Scene Detection Detect Intruders to Home Area
by: Chin, Wai Kit
Published: (2016) -
Adaptive algorithms for automated intruder detection in surveillance networks
by: Ahmed, Tarem, et al.
Published: (2014)