2021
DOI: 10.11591/ijeecs.v23.i2.pp811-820
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-based architecture for face identification with deep learning using convolutional neural network

Abstract: The use of a face as a biometric to identify a person in order to keep the system safe from an unauthorized person has advantages over other biometric characteristics. The face as a biometric has more structure and a wider area than other biometrics, while can be retrieved in a non-invasive manner. We proposed a cloud-based architecture for face identification with deep learning using convolutional neural network. Face identification in this study used a cloud-based engine with four stages, namely face detecti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 19 publications
(24 reference statements)
0
4
0
Order By: Relevance
“…The main idea of constructing such codes is based on the use of redundant information. So, to transmit one of 2 4 code ISSN: 2302-9285  Distributed memory of neural networks and the problem of the intelligence`s … (Ibragim E. Suleimenov) 513 combinations, the binary (7,4) Hamming code uses 7 binary variables [24]. To simplify, one can say that 7 bits are used in order to convey the same amount of information that could be transmitted (with the deliberate absence of errors) using only 4 bits.…”
Section: Ann Research Methods By Comparison With Error-correcting Coding Algorithmsmentioning
confidence: 99%
See 2 more Smart Citations
“…The main idea of constructing such codes is based on the use of redundant information. So, to transmit one of 2 4 code ISSN: 2302-9285  Distributed memory of neural networks and the problem of the intelligence`s … (Ibragim E. Suleimenov) 513 combinations, the binary (7,4) Hamming code uses 7 binary variables [24]. To simplify, one can say that 7 bits are used in order to convey the same amount of information that could be transmitted (with the deliberate absence of errors) using only 4 bits.…”
Section: Ann Research Methods By Comparison With Error-correcting Coding Algorithmsmentioning
confidence: 99%
“…To simplify, one can say that 7 bits are used in order to convey the same amount of information that could be transmitted (with the deliberate absence of errors) using only 4 bits. From the point of view of set theory as shown in Figure 3, the use of error correction code can be interpreted as; the set A of all possible code combinations (in the example of the binary (7,4) Hamming code considered above-2 7 ) is divided into subsets A i , the number of which is equal to the number of code combinations r, treated as a code with an error corrected (in this example, 2 4 ). Any a ∈ A i is associated with a code combination with an absent error from the set B.…”
Section: Ann Research Methods By Comparison With Error-correcting Coding Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…Major states in India produce tomatoes [2] Figure 2. Sample of major diseases of tomato in India (NHB, India database) Several studies were done earlier that show the capability of technology using algorithms of machine learning to identify objects in various sectors like retail, human behavior, face recognition [3], facial expressions [4], handwriting recognition [5], intrusion detection [6], movie recommendation [7], and food segmentation [8]. The health sector is also using it to identify/detect/predict various diseases like diabetes prediction, cancer detection [9], [10], heart disease, skin problems, Parkison's disease identification [11], COVID-19 from chest X-rays [12], and many more.…”
Section: Introductionmentioning
confidence: 99%