Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2022
DOI: 10.14569/ijacsa.2022.0130663
|View full text |Cite
|
Sign up to set email alerts
|

Face Recognition System Design and Implementation using Neural Networks

Jamil Abedalrahim Jamil Alsyayadeh,
Irianto -,
Azwan Aziz
et al.

Abstract: Face recognition technology is used in biometric security systems to identify a person digitally before granting the access to the system or the data in it. There are many kidnappings or abduction cases happen around us, however, the kidnap suspects will be set free if there is lack of evidence or when the victims are not able to testify in court because they suffer from post-traumatic stress disorder (PTSD). The objectives of this study are, to develop a device that will capture the image of a kidnapper as ev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…Because of this, an ensemble model is proposed, based on the simultaneous division of the search space into subgroups and the evolution of models for such subgroups. As a result, the models were able to identify more specific dependencies and relationships between signals [20][21][22].…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Because of this, an ensemble model is proposed, based on the simultaneous division of the search space into subgroups and the evolution of models for such subgroups. As a result, the models were able to identify more specific dependencies and relationships between signals [20][21][22].…”
Section: Proposed Methodsmentioning
confidence: 99%
“…2. To enable the gadget to connect to Wi-Fi or a mobile hotspot, the author [12] sets the email account that will receive the recorded photo in addition to the device's SSID and password. Deep sleep mode will be the device's first state.…”
Section: Figure 1 Flowchart Of Custom Face Datasetmentioning
confidence: 99%