Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Methods of Portable Low-Cost Facial Recognition

Category: Engineering Paper Type: Dissertation & Thesis Writing Reference: APA Words: 2200

In this section, some research papers, websites and other links are reviewed as well as the main basic and significant points are mentioned. The upcoming projects related research articles are reviewed especially for this purpose. The literature review is telling that what methods are using in related works as well as best ever techniques, researchers are going to use in the facial recognition project. The limitations as well as the description of the database of faces which are saved in, used for testing the system performance by using the algorithm for facial recognition. A line edge map is used in the recent method of the face recognition which recognize faces and shapes of the faces through the recognition algorithm.

Some tests are performed to see how effective the recognition system is. The results were very interesting. Proposed facial recognition system gave results in the Bern database ninety seven percent. Support vector machine (SVM) was used which is considered effective method for the general recognition pattern of system’s high performance without enhancing the knowledge. Support Vector machine (SVM) identifies the hyperplane which distinguishes the biggest possible fraction of possible points.

Technology Effective of Portable Low-Cost Facial Recognition

The technology can be harmful because for animal beings sometimes. Most of the technological equipment or the products can harm animals. The main purpose to make sure that the proposed technology will not be harmful for animals. If the recognition system gave pause then consider this thing is being used in the animal world. The studies show that the proposed approach is not harmful for the animals. The technology can be effective on animals. For example, in the recent researches, the biometric recognition system for the animals was introduced which used to manage animals like drag them to cage or sort them without harming them. There are some key things are used in the system to make system efficient and effective.

These were the related recognition systems which were make for the animals but the project is all about the recognition of human faces on low cost to maximize the security in baking sector. The technology will be very effective which will be very low cost as well as can effectively recognize. The technology which is used in the project is very small and is not harmful for people or not harmful for the other electric wiring systems. The first effect of this technology is that the system will take picture or every person who will be in front of the system. Some people are so much conscious as well as conserved and avoid showing their identity openly, they may have some kind of issues. The proposed solution is very effective overall which will take pictures of ever suspicious people at the prohibited area or the sensitive area. There are some key things or requirements of the proposed technique and project which will make the project fully functional.

Camera of Portable Low-Cost Facial Recognition

A camera will be used in the project to take pictures of the suspicious persons at the sensitive areas. The camera is used because the recognition operation is not possible and cannot match the faces. The camera is detachable and can be fixed in the Arduino chip. This camera is used because this camera is cheaper than other cameras as well as in case of any improvement, the camera can be changed easily. For example, some cameras are not for night vision and they are useless in the low light. So, the detachable camera will be used in the Raspberry pi facial recognition project.

Electricity of Portable Low-Cost Facial Recognition

Electricity is the main and major component of every electronic as well as the computer related or software related projects or products because every electric device require electricity to power up the devices. By having electric power, the device will be turned on and usable and fully functional. Raspberry Pi project will take very low electric power for being functional. A charger which has the mini android USB cable is enough to power it. This low power will not be harmful for humans and other related or engaged systems like computer or any other hardware or additional hardware if it will be fixed or attached with the project device in future. Furthermore, to make the wiring and connections safe, some kind of protective coating will also be applied to the wires and the bear prominent joints where necessary.

Wi-Fi of Portable Low-Cost Facial Recognition

Wi-Fi or internet is the very essential part of this project because the Wi-Fi or internet is the only factors that connect the system to other system. In the system words, Raspberry Pi will be connected with the computer and the server with the help of Wi-Fi or internet. It plays a role of a bridge in this project because when the camera fixed in the board of raspberry pi, take the picture of the suspicious person then the device will use the internet to access the server and database to store the picture into the database. Sometimes the system can be damaged due to the internet speed. For example sometimes the internet may be slower due to some unexpected issues and due to this reason the system will not be able to save the record to database. This can be more significant issue in the system.

 Database of Portable Low-Cost Facial Recognition

The database will be used in the proposed technique to save and store the record into the database. The database is very essential part of any computerized system or application where the user or system can easily save the record as well as retrieve the data from the database. Sometimes one issue may occur into the database. For example, the system is not saving the record into the database because of the accessibility. In the failure of accessibility, the system cannot be able to retrieve any kind of data as well as not able to save new data into the database. Sometimes, the databases other kind of issues like server down can be faced. It is challengeable thing and unexpected error which can cause some kind of troubles for some times.

Security Issues with the Internet of Things

Some problems may occur due to the internet. Some cyber attacker or any kind of hacker always search any flaw in the system as well as take the tires to break the security system of the sensitive area. The professional and ethical studies says that every security in the world is not complete. So a large number of issues may occur in the system. Some issues like not accessible with the database or the computer. Sometimes the user’s computer like the admin computer cannot access or handle the things like it was handling before. A number of issues such as saving data or retrieving data from the database may occur. The report says that facial recognition with follow the same rules which are company for the recognition system.

 Overview of Portable Low-Cost Facial Recognition

Mostly systems are not so secure because many online systems running through internet as well as it can damage the whole system. The proposed technique may also be vulnerable by using internet but we are using python language and the Linux based environment for this purpose. The overall study tells that security and every lock of the work is breakable. So the online hackers can attack easily as well as can damage the system.

 Some kind of scripts, viruses, additional drivers as well as other kind of additional tools or toolkits may be harmful for the security. So the attackers can use these things to hack or damage system. When they succeeded in this purpose, they can easily break this the security and as well as easily access the database which will be more harmful for the bank, device as well as for the personal information of the persons which are saved by the device into the system. There are some key factors which can play a role to damage the system as well as to damage the information which is saved in the database. The main factors are listed below with the brief explanation.

Virus and Malware of Portable Low-Cost Facial Recognition

The malware is the combination of two things such as the software as well as malicious. Malware can damage the system very easily. There are many methods to place the malicious scripts into the system by using internet. The hacker, breaches as well as the attacker’s leave the malicious scripts into the admin or main computer that handles the complete system. They place the malicious scripts into the computer through using the email or any other kind of online services. When the user open up that email or try to open that malicious thing, the inserted scripts executed automatically and spread into the computer. It is enough to take the control of the computer.

SQL injection of Portable Low-Cost Facial Recognition

The SQL injections are very effective and damageable attacks which are used to steal the information from the database. In the SQL injections the attacker attacks on the authentication when the data flows and going to be saved into the database. The main work of the SQL injection is to access data and steal information when the data will be passed from the internet to be saved. The injection successfully makes a hole where it can pick the data and information. This is very harmful for the data security.

Similar Products / Solutions of Portable Low-Cost Facial Recognition

This section will discuss some products / solutions that have been produced, which share definite resemblances.

The first similar solution is a mobile phone camera. Nowadays, almost all of the smart phones have been implementing this advanced technology, as another option from fingerprint or PIN. However, the technique of how facial recognition works in smart phones is still cannot consider being a secure one. The reason is due to smartphones only rely on a 2D facial recognition system which is quite cheap and simple to be implemented (Fathy, Patel, & Chellappa, 2015). Another similar product is the Microsoft Services face API which offers an algorithm to be used in detecting, recognizing, as well as analyzing the human face within images (Maheshwari, 2017).

Since the project features various different elements, thus, there are some hurdles to be similar solutions associated with these many elements. For this reason, the similar products mentioned above are the most applicable ones related to the project.

Conclusion of Portable Low-Cost Facial Recognition

In the conclusion, there are many significant thing found in this chapter which is all about the literature review. Many articles are reviewed as well as the researches on the facial recognition are also studied. First of all a brief introduction was written in this chapter. Which tells about the what the actual technology is, where can we use this as well as how what the things and methods are required for this purpose. The items like hardware, programming languages, information storing methods are also discussed in this report. Raspberry Pi is Linux based device is used in this project as the hardware as well as a camera is also used that will be fixed in the Raspberry Pi device to capture the picture of the suspicious person, process on that picture, extract and then match that picture with those pictures that are saved in the Raspberry Pi database.

Secondly, some methods are also used for this purpose. Some related researches on this topic are also shared in this chapter. Proposed facial recognition system gave results in the Bern database ninety seven percent. Support vector machine (SVM) was used which is considered effective method for the general recognition pattern of system’s high performance without enhance the knowledge. Support Vector machine (SVM) identifies the hyper plane which distinguishes the biggest possible fraction of possible points.

Some kind of basic information which on the vulnerabilities or the system security issues are also discussed such as the basic knowledge about the viruses, malware, SQL injections as well as the attackers or hackers. The hacker, breaches as well as the attacker’s leave the malicious scripts into the admin or main computer that handles the complete system. They place the malicious scripts into the computer through using the email or any other kind of online services. When the user open up that email or try to open that malicious thing, the inserted scripts executed automatically and spread into the computer. It is enough to take the control of the computer. All of the things which are discussed here cant impactful on the security.

Based on the review above, there is more knowledge in specific fields such as 2D as a cheap and easy face recognition system to be applied, and analyzing the human face within images. Hence, the review has supported to recognize the right way to be conducted in the project.

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed