Anti-theft security system using face recognition
| Main Author: | Chong, Guang Yu |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2018
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/3058/ http://eprints.utar.edu.my/3058/1/fyp_CT_2018_CGY_%2D_1305524.pdf |
Similar Items
INTI International University Campus (INTI-IU) Security Monitoring System With Face Recognition Technology
by: Yap, Choi Sen, et al.
Published: (2020)
by: Yap, Choi Sen, et al.
Published: (2020)
Automotive anti-theft system using fuzzy logic method
by: Kahtan, Hasan, et al.
Published: (2017)
by: Kahtan, Hasan, et al.
Published: (2017)
Face recognition and identification system (FaceRec) / Khew Jye Huei
by: Khew , Jye Huei
Published: (2004)
by: Khew , Jye Huei
Published: (2004)
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022)
by: Yap, Choi Sen, et al.
Published: (2022)
Application of Fuzzy Logic Controller for Safe Braking System: An Anti-Theft Tracking
by: Kahtan, Hasan, et al.
Published: (2018)
by: Kahtan, Hasan, et al.
Published: (2018)
Face Recognition For Home Security System Using Hybrid Fisher Linear Discriminant Algorithm
by: Zhi, Chua Min Zhi
Published: (2009)
by: Zhi, Chua Min Zhi
Published: (2009)
Face recognition using Eigenface/PCA / Muhammad Fadzli Ahmad Jalalulmahalli
by: Muhammad Fadzli, Ahmad Jalalulmahalli
Published: (2005)
by: Muhammad Fadzli, Ahmad Jalalulmahalli
Published: (2005)
Integration of blcm and flbp in low resolution face recognition
by: Mohammed, Ahmed Talab
Published: (2022)
by: Mohammed, Ahmed Talab
Published: (2022)
Face recognition using PZMI, ANN and Ant colony algorithms / Milad Miri
by: Milad , Miri
Published: (2018)
by: Milad , Miri
Published: (2018)
Face recognition using laplacian completed local ternary pattern (LapCLTP)
by: Sam, Yin Yee, et al.
Published: (2020)
by: Sam, Yin Yee, et al.
Published: (2020)
Feature selection method based on sparse representation classification for face recognition
by: Boon, Yinn Xi *, et al.
Published: (2014)
by: Boon, Yinn Xi *, et al.
Published: (2014)
A watermarking technique to improve the security level in face recognition systems: An experiment with Principal Component Analysis (PCA) for face recognition and Discrete Cosine Transform (DCT) for watermarking
by: Isa, Mohd Rizal Mohd Mohd, et al.
Published: (2017)
by: Isa, Mohd Rizal Mohd Mohd, et al.
Published: (2017)
Home security system using face recognition
by: Syed Syafiq, Syed Alias, et al.
Published: (2021)
by: Syed Syafiq, Syed Alias, et al.
Published: (2021)
A robust face recognition system
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Contractor And Visitor Management System Using Biometric Recognition (Vizika System)
by: Nur Alia Hidayah, Rohaya Udin
Published: (2023)
by: Nur Alia Hidayah, Rohaya Udin
Published: (2023)
Feature fusion using a modified genetic algorithm for face and signature recognition system
by: Suryanti, Awang
Published: (2015)
by: Suryanti, Awang
Published: (2015)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Face recognition using eigenfaces and neural networks
by: Saad, Puteh, et al.
Published: (2006)
by: Saad, Puteh, et al.
Published: (2006)
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
by: Nor Alia Syuhada, Shaharudin
Published: (2018)
New consumer load prototype for electricity theft monitoring
by: Abdullateef, Adoyele Isqeel, et al.
Published: (2013)
by: Abdullateef, Adoyele Isqeel, et al.
Published: (2013)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
Facial recognition-based attendance monitoring system for educational institution
by: Tan, Shu Jing
Published: (2018)
by: Tan, Shu Jing
Published: (2018)
A Household Solid Waste Sorting And Recognition Recycling System
by: Yew, Jia Yie
Published: (2022)
by: Yew, Jia Yie
Published: (2022)
Binarized revocable biometrics in face recognition
by: Pang, Ying Han, et al.
Published: (2005)
by: Pang, Ying Han, et al.
Published: (2005)
Kernel Discriminant Embedding in face recognition
by: Han, Pang Ying, et al.
Published: (2011)
by: Han, Pang Ying, et al.
Published: (2011)
Isolated Malay speech recognition using fuzzy logic
by: Normiza, Mohd Yusof
Published: (2019)
by: Normiza, Mohd Yusof
Published: (2019)
Coincidence detection using spiking neurons with application to face recognition
by: Kamaruzaman, Fadhlan, et al.
Published: (2015)
by: Kamaruzaman, Fadhlan, et al.
Published: (2015)
Editorial article: on the boundaries of trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Secured email using steganography / Syaiful Annuar Omar
by: Syaiful Annuar, Omar
Published: (2005)
by: Syaiful Annuar, Omar
Published: (2005)
Face Detection System / Chan Beh Teng
by: Chan, Beh Teng
Published: (2004)
by: Chan, Beh Teng
Published: (2004)
Face recognition using wavelet transform and non-negative matrix factorization
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
KJ Fashion Shoes E-Commerce Mobile-Based Application with Implementation of Image Recognition System
by: Soh, Kai Jie
Published: (2022)
by: Soh, Kai Jie
Published: (2022)
Arabic words recognition technique for pattern matching using SIFT, SURF and ORB
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
by: Mohd Zailani, Syarah Munirah, et al.
Published: (2017)
Object class recognition using combination of colour dense SIFT and texture descriptors
by: Rassem, Taha H., et al.
Published: (2019)
by: Rassem, Taha H., et al.
Published: (2019)
Development of a face recognition system using artificial intelligent techniques based on hybrid feature selection
by: Chu, Kai Chuan, et al.
Published: (2006)
by: Chu, Kai Chuan, et al.
Published: (2006)
Regularized locality preserving discriminant embedding for face recognition
by: Pang, Ying Han, et al.
Published: (2012)
by: Pang, Ying Han, et al.
Published: (2012)
A discriminant pseudo Zernike moments in face recognition
by: Pang, Ying Han, et al.
Published: (2006)
by: Pang, Ying Han, et al.
Published: (2006)
An advanced and secure framework for conducting online examination using blockchain method
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
by: Sattar, Md Rahat Ibne, et al.
Published: (2023)
Handwritten character recognition using convolutional neural network
by: Khandokar, I., et al.
Published: (2021)
by: Khandokar, I., et al.
Published: (2021)
Jawi Character Recognition / Omar Abdul Rahim
by: Omar, Abdul Rahim
Published: (2002)
by: Omar, Abdul Rahim
Published: (2002)
Similar Items
-
INTI International University Campus (INTI-IU) Security Monitoring System With Face Recognition Technology
by: Yap, Choi Sen, et al.
Published: (2020) -
Automotive anti-theft system using fuzzy logic method
by: Kahtan, Hasan, et al.
Published: (2017) -
Face recognition and identification system (FaceRec) / Khew Jye Huei
by: Khew , Jye Huei
Published: (2004) -
Virtual On-Premise Shopping System with Face Recognition Authentication
by: Yap, Choi Sen, et al.
Published: (2022) -
Application of Fuzzy Logic Controller for Safe Braking System: An Anti-Theft Tracking
by: Kahtan, Hasan, et al.
Published: (2018)