Computer Vision Based Advanced Cloud Security Using Face Recognition

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Human Computer Interaction Using Vision-Based Hand Gesture Recognition

With the rapid emergence of 3D applications and virtual environments in computer systems; the need for a new type of interaction device arises. This is because the traditional devices such as mouse, keyboard, and joystick become inefficient and cumbersome within these virtual environments. In other words, evolution of user interfaces shapes the change in the Human-Computer Interaction (HCI). In...

متن کامل

Human Computer Interaction Using Vision-Based Hand Gesture Recognition

With the rapid emergence of 3D applications and virtual environments in computer systems; the need for a new type of interaction device arises. This is because the traditional devices such as mouse, keyboard, and joystick become inefficient and cumbersome within these virtual environments. In other words, evolution of user interfaces shapes the change in the Human-Computer Interaction (HCI). In...

متن کامل

Forensic Face Sketch Recognition Using Computer Vision

Now-a-days need for technologies for identification, detection and recognition of suspects has increased. One of the most common biometric techniques is face recognition, since face is the convenient way used by the people to identify each-other. Understanding how humans recognize face sketches drawn by artists is of significant value to both criminal investigators and forensic researchers in C...

متن کامل

human computer interaction using vision-based hand gesture recognition

with the rapid emergence of 3d applications and virtual environments in computer systems; the need for a new type of interaction device arises. this is because the traditional devices such as mouse, keyboard, and joystick become inefficient and cumbersome within these virtual environments. in other words, evolution of user interfaces shapes the change in the human-computer interaction (hci). in...

متن کامل

3-Layer Security Using Face Recognition in Cloud

In cloud computing databases are the centralized large data centers, where the management of the data and services may not be fully trust worthy which is provided by large amount of computing and storage to customers provisioned as a service over the internet. Due lack of proper security and weakness in safeguard which lead to many vulnerability in cloud computing. This paper has been written t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Innovative Research in Applied Sciences and Engineering

سال: 2020

ISSN: 2456-8910

DOI: 10.29027/ijirase.v3.i10.2020.534-539