Handbook of Smart Cities 2020
DOI: 10.1007/978-3-030-15145-4_37-1
|View full text |Cite
|
Sign up to set email alerts
|

Technology: Person Identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 87 publications
0
2
0
Order By: Relevance
“…Ref. [22] (item 13 of Table 2) highlighted that the technologies used in a smart city improve the quality of life, but pointed out that there may be an increase in information security risks resulting from the great demand caused, for example, by access control systems used by different services in the city. They also considered that Internet of Things (IoT) oriented systems are the basis for the success of smart cities cases, directing special attention to the authentication system, in addition to suggesting the use of the NIST 800-63 standard that can be used in surveillance cameras, both for detection and for real-time facial recognition.…”
Section: Research Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Ref. [22] (item 13 of Table 2) highlighted that the technologies used in a smart city improve the quality of life, but pointed out that there may be an increase in information security risks resulting from the great demand caused, for example, by access control systems used by different services in the city. They also considered that Internet of Things (IoT) oriented systems are the basis for the success of smart cities cases, directing special attention to the authentication system, in addition to suggesting the use of the NIST 800-63 standard that can be used in surveillance cameras, both for detection and for real-time facial recognition.…”
Section: Research Resultsmentioning
confidence: 99%
“…The second research question developed for this SLR addresses the accuracy rates identified in algorithms for real-time facial recognition, which is highlighted below, followed by its considerations. [10] Automatic attendance monitoring system using facial recognition through feature-based methods (PCA, LDA) HR LR LR [11] Automated attendance system using image processing HR LR LR [12] Computer vision on identifying persons under real time surveillance using IOT HR HR HR [13] Face detection and recognition-based e-learning for students' authentication: study literature review HR HR LR [14] Face recognition-based attendance system using machine learning algorithms HR HR LR [15] Human identification recognition in surveillance videos HR HR LR [16] Improving the capability of real-time face masked recognition using cosine distance HR HR LR [17] LBPH based improved face recognition at low resolution HR LR LR [18] Real-time face recognition: A survey HR HR LR [19] Recognizing Very Small Face Images Using Convolution Neural Networks HR HR LR [20] The Real Time Face Recognition HR LR MR [21] Fractional Krill-Lion algorithm-based actor critic neural network for facer recognition in real time surveillance videos HR HR LR [22] Technology: Person Identification MR MR HR…”
Section: Q1 What Are the Most Used Algorithms For Real-time Facial Re...mentioning
confidence: 99%