logo

Face Detection and IoT Security

Investigate objective measurement of seat discomfort for long distance drivers in lightweight vehicles by comparing subjective rating with correlation between full body vibration and pressure distribution on a seated body.

14 Pages3846 Words91 Views
   

Added on  2022-12-30

About This Document

This study explores the enhancement of face detection technology in the context of IoT security. It includes a literature review, research questions, methodologies, experimental set-up, and project planning.

Face Detection and IoT Security

Investigate objective measurement of seat discomfort for long distance drivers in lightweight vehicles by comparing subjective rating with correlation between full body vibration and pressure distribution on a seated body.

   Added on 2022-12-30

ShareRelated Documents
Running head: FACE DETECTION AND IOT SECURITY
Face Detection and IOT Security
Name of the student:
Name of the university:
Author Note
Face Detection and IoT Security_1
FACE DETECTION AND IOT SECURITY
1
Executive summary
The following study is a research proposal that is performed o understand face detection technology.
This identification is intended to be done under the security of the Internet of Things or IoT. To
conduct the research, at first various literature are reviewed. Then, in this proposal, the research
questions are evaluated along with discussing the methodologies. Furthermore, the analysis
investigates various experimental set-ups to be done. Then the results are examined along with a
demonstration of the project planning for the current research.
Face Detection and IoT Security_2
FACE DETECTION AND IOT SECURITY
2
Table of Contents
1. Introduction:......................................................................................................................................3
2. Literature review:...............................................................................................................................3
3. Research questions, aims and sub-goals:...........................................................................................4
3.1. Research questions:....................................................................................................................4
3.2. Discussion on aims:....................................................................................................................5
3.3. Analyzing sub-goals:..................................................................................................................5
4. Analyzing theoretical content:...........................................................................................................6
5. Discussion on experimental set-up:...................................................................................................7
6. Evaluating the results, outcome and relevance:.................................................................................7
6.1. Discussing the results:................................................................................................................7
6.2. Analyzing the outcomes:............................................................................................................8
6.3. The relevance of the results:.......................................................................................................8
7. Project Planning and Gantt Charts:....................................................................................................9
8. Conclusion:......................................................................................................................................10
10. References:....................................................................................................................................11
Face Detection and IoT Security_3
FACE DETECTION AND IOT SECURITY
3
1. Introduction:
IoT is a rising field. In this way the face recognitions is deployed. The standard Picamera that
has been capturing the image for determining the identity of the person. This is the prototype
identifying the visitors. For instance, as the door identifies the visitors, the doors get unlocked and
opened. As they are never determined the door gets locked firmly. In the system has been
performing the recognition and detection quickly at real time. In this way the project uses the
primary Pi cam, there is the online connection for creating the door unlocking that through facial
identification.
The following research proposal is made on face detection enhancement included under IoT
security. Further, literature reviews are conducted with research questions, methodologies.
Moreover, the study evaluates the experimental set-us, outcomes and project planning.
2. Literature review:
Sarigiannidis, Karapistoli and Economides (2015) highlights within IoT, all the gadgets have
been behaving like a small art of the Internet node. Here, all the nodes have been interacting and
making communications. Next, security cameras have been used for developing security places,
cities and homes. Apart from this, the technology has been requiring individuals detecting the issue
taken from the camera. Conti et al. (2017) analyzes the IoT assimilated with the computer vision.
This is to find out individual faces. For executing the system, the authors have mentioned about the
credit card computers using the distinct camera broad for security system. Here, the Rasberry Pi 3 is
mentioned. Again, Motlagh, Bagaa and Taleb (2017) argues that likewise PIR or Passive Infrared
Sensor can be mounted on that Rasberry PI to detect movements. Thus, it helps to monitor and
receives notifications while the motion is determined. Apart from this the image can be captured and
find the faces. It helps in sending images to Smartphones by using various applications of telegrams.
Face Detection and IoT Security_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Smart Attendance Monitoring System using Face Recognition
|8
|2034
|64

Efficient and Robust Driver Assistance System
|11
|3457
|470

Challenges of the Internet of Things (IoT) in Term of Security
|81
|22608
|228

Joystick Controlled Steering Mechanism Vehicle
|10
|3413
|479

Medical Image Processing
|20
|3990
|298

Engineering Project: Importance of Using Sida Acuta
|21
|4348
|201