2018 International Conference on Information Management and Technology (ICIMTech) 2018
DOI: 10.1109/icimtech.2018.8528088
|View full text |Cite
|
Sign up to set email alerts
|

Face Detection and Recognition Based E-Learning for Students Authentication: Study Literature Review

Abstract: The Authentication process is highly dependent on Face Detection and Face Recognition during learning activities. In addition, in the E-Learning learning system we must also provide accurate and accurate information. The research method used is literature study and analysis. Literature study was carried out on the face of face detection and recognition in real-Time conditions carried out by various previous studies. Furthermore, analysis was carried out in a literature study studio to find suitable methods for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…Since there are various devices available to connect to online learning platforms, however, such as smartphones, tablets, etc., a user may utilise multiple devices to perform online learning activities including exams. In these cases, the user's face may not be visible using mobile devices such as a mobile phone as the user will move their position frequently [11] and video processing may impact energy consumption [62]. Therefore, an exploration of the dynamic use of authenticators is needed to cover other types of user interaction in online learning environments.…”
Section: A Authenticator Diversity Challengesmentioning
confidence: 99%
“…Since there are various devices available to connect to online learning platforms, however, such as smartphones, tablets, etc., a user may utilise multiple devices to perform online learning activities including exams. In these cases, the user's face may not be visible using mobile devices such as a mobile phone as the user will move their position frequently [11] and video processing may impact energy consumption [62]. Therefore, an exploration of the dynamic use of authenticators is needed to cover other types of user interaction in online learning environments.…”
Section: A Authenticator Diversity Challengesmentioning
confidence: 99%
“…Ref. [13] (item 4 of Table 2) carried out studies and development of experiments in order to meet the needs of COVID-19 in the period between 2020 and 2021: control student access to virtual classrooms, typical of Distance Learning systems. The authors used detection and recognition techniques to control and authenticate the presence of these students.…”
Section: Research Resultsmentioning
confidence: 99%
“…The second research question developed for this SLR addresses the accuracy rates identified in algorithms for real-time facial recognition, which is highlighted below, followed by its considerations. [10] Automatic attendance monitoring system using facial recognition through feature-based methods (PCA, LDA) HR LR LR [11] Automated attendance system using image processing HR LR LR [12] Computer vision on identifying persons under real time surveillance using IOT HR HR HR [13] Face detection and recognition-based e-learning for students' authentication: study literature review HR HR LR [14] Face recognition-based attendance system using machine learning algorithms HR HR LR [15] Human identification recognition in surveillance videos HR HR LR [16] Improving the capability of real-time face masked recognition using cosine distance HR HR LR [17] LBPH based improved face recognition at low resolution HR LR LR [18] Real-time face recognition: A survey HR HR LR [19] Recognizing Very Small Face Images Using Convolution Neural Networks HR HR LR [20] The Real Time Face Recognition HR LR MR [21] Fractional Krill-Lion algorithm-based actor critic neural network for facer recognition in real time surveillance videos HR HR LR [22] Technology: Person Identification MR MR HR…”
Section: Q1 What Are the Most Used Algorithms For Real-time Facial Re...mentioning
confidence: 99%
See 2 more Smart Citations