Computer Vision Based Advanced Cloud Security Using Face Recognition
نویسندگان
چکیده
منابع مشابه
Human Computer Interaction Using Vision-Based Hand Gesture Recognition
With the rapid emergence of 3D applications and virtual environments in computer systems; the need for a new type of interaction device arises. This is because the traditional devices such as mouse, keyboard, and joystick become inefficient and cumbersome within these virtual environments. In other words, evolution of user interfaces shapes the change in the Human-Computer Interaction (HCI). In...
متن کاملHuman Computer Interaction Using Vision-Based Hand Gesture Recognition
With the rapid emergence of 3D applications and virtual environments in computer systems; the need for a new type of interaction device arises. This is because the traditional devices such as mouse, keyboard, and joystick become inefficient and cumbersome within these virtual environments. In other words, evolution of user interfaces shapes the change in the Human-Computer Interaction (HCI). In...
متن کاملForensic Face Sketch Recognition Using Computer Vision
Now-a-days need for technologies for identification, detection and recognition of suspects has increased. One of the most common biometric techniques is face recognition, since face is the convenient way used by the people to identify each-other. Understanding how humans recognize face sketches drawn by artists is of significant value to both criminal investigators and forensic researchers in C...
متن کاملhuman computer interaction using vision-based hand gesture recognition
with the rapid emergence of 3d applications and virtual environments in computer systems; the need for a new type of interaction device arises. this is because the traditional devices such as mouse, keyboard, and joystick become inefficient and cumbersome within these virtual environments. in other words, evolution of user interfaces shapes the change in the human-computer interaction (hci). in...
متن کامل3-Layer Security Using Face Recognition in Cloud
In cloud computing databases are the centralized large data centers, where the management of the data and services may not be fully trust worthy which is provided by large amount of computing and storage to customers provisioned as a service over the internet. Due lack of proper security and weakness in safeguard which lead to many vulnerability in cloud computing. This paper has been written t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Innovative Research in Applied Sciences and Engineering
سال: 2020
ISSN: 2456-8910
DOI: 10.29027/ijirase.v3.i10.2020.534-539