A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Optimization of Face Recognition System Based on Azure IoT Edg
2019
Computers Materials & Continua
We evaluate our schemes based on the open source Azure IoT Edge, and the experimental results show that the three-tier architecture "Client-Edge-Cloud" face recognition system outperforms the state-of-art ...
Maintaining the accuracy and low latency is critical to face recognition systems. ...
This paper proposes an optimization design of a face recognition system based on edge computing, and a prototype of the system based on Azure IoT Edge, an open source platform, is implemented. ...
doi:10.32604/cmc.2019.06402
fatcat:vutefexf7bc5tcpwutkqgf37u4
Biometrics for Internet-of-Things Security: A Review
2021
Sensors
As for encryption, biometric-cryptographic systems, which integrate biometrics with cryptography and take advantage of both to provide enhanced security for IoT, are thoroughly reviewed and discussed. ...
Regarding authentication, contemporary biometric-based authentication systems for IoT are discussed and classified based on different biometric traits and the number of biometric traits employed in the ...
The proposed scheme is evaluated on several benchmark databases (e.g., WIDER FACE) and the performance in terms of recognition accuracy and latency is compared with state-of-the-art face recognition methods ...
doi:10.3390/s21186163
pmid:34577370
pmcid:PMC8472874
fatcat:urk3rlktjbahvdc5evaanqjn3y
Designing Automated Deployment Strategies of Face Recognition Solutions in Heterogeneous IoT Platforms
2021
Information
In this paper, we tackle the problem of deploying face recognition (FR) solutions in heterogeneous Internet of Things (IoT) platforms. ...
respecting the users' privacy, and the design of appropriate user interaction with facial verification mechanisms for all kinds of users. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/info12120532
fatcat:gfklv5jdtrdt3c3mb6qea4eziq
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
2020
Zenodo
In the end, a voice recognition system is proposed for IoT ecosystem user authentication. The proposed system has two phases. ...
In this paper, we investigated the need and suitability of employing voice recognition systems in the user authentication of the IoT. ...
The researchers have designed their system in order to scale to the limited resources of IoT technologies. ...
doi:10.5281/zenodo.3890915
fatcat:fapzd552evfvtjgwqyvkrwstga
VOICE BIOMETRIC IDENTITY AUTHENTICATION MODEL FOR IOT DEVICES
2020
Zenodo
In the end, a voice recognition system is proposed for IoT ecosystem user authentication. The proposed system has two phases. ...
In this paper, we investigated the need and suitability of employing voice recognition systems in the user authentication of the IoT. ...
The researchers have designed their system in order to scale to the limited resources of IoT technologies. ...
doi:10.5281/zenodo.3955583
fatcat:4okt2rrerbf5vbaoskrnd5adau
Papers by Title
2021
2021 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW)
for Human Activity Recognition Circuits Design Low-Phase Noise Colpitts VCO with Gm-Boosting CMOS Capacitive Fingerprint Sensing Scheme with Transition Band of Low Pass Filter Combined ZnO nanorod humidity ...
Defect Detection Evaluation of Face Recognition with Wearing Mask or Not Evaluations of Fingerprint-based Indoor Positioning System Using IEEE 802.15.4 Eye Movement Analysis for Consumer Devices Feedback ...
doi:10.1109/icce-tw52618.2021.9602951
fatcat:x5phgfzzl5cafcxul53thv5w7e
Table of contents
2021
IEEE Internet of Things Journal
Poor 17308 Sparse Individual Low-Rank Component Representation for Face Recognition in the IoT-Based System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
The Performance Evaluation of Blockchain-Based Security and Privacy Systems for the Internet of Things: A Tutorial . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ...
doi:10.1109/jiot.2021.3123485
fatcat:xjw64poe75dnrnwgexupd67eky
Guest Editorial Special Issue on Internet of Things for Smart Health and Emotion Care
2021
IEEE Internet of Things Journal
The integration of mobile-edge computing (MEC) and IoT is imperative, especially in industries needing real-time data computing, such as smart home, public security, automobile transportation, smart health ...
of the next generation of intelligent medical and rehabilitation systems. ...
The article "Emotion recognition for cognitive edge computing using deep learning" proposes an emotion recognition system from facial images based on edge computing. ...
doi:10.1109/jiot.2021.3116407
fatcat:5k2awtzq2ra3lorfwpguw2hdhm
Guest Editorial Special Issue on Collaborative Edge Computing for Social Internet of Things Systems
2022
IEEE Transactions on Computational Social Systems
for social IoT systems," where they explored the practice of outsourcing computation from the client to nearby edge servers and proposed a secure edge-assisted computing scheme for social IoT systems, ...
In [A24], Gao et al. proposed a deep feature and attention mechanism-based method for dish health evaluation, aiming to apply the designed hand-deep local-global network to dish image recognition. ...
Meng Chu Zhou (Fellow, IEEE) received the Ph.D. degree in computer and systems engineering from the Rensselaer Polytechnic Institute, Troy, NY, USA, in 1990. ...
doi:10.1109/tcss.2022.3145152
fatcat:5okp5dd7vjcknf6aaxho4gxx34
Future computing with IoT and cloud computing
2018
Journal of Supercomputing
[6] proposed schemes of the design and implantation of IT convergence framework for games as a service of IoT using lego-typed sensor module. ...
[17] presented compact deep neural network-based face recognition method for visual Internet of things to solve a problem that current state-of-the-art face recognition methods based on huge deep neural ...
doi:10.1007/s11227-018-2652-7
fatcat:nu54rsct6vh2hbbtyb4yyg33we
Crowdsourcing for Mobile Networks and IoT
2018
Wireless Communications and Mobile Computing
This method applies discrete wavelet transform to extract the low-pass component of network traffic. ...
Meng et al. demonstrate an optimal real-time pricing strategy for computing resource management in mobile crowdsourcing. ...
This designed system can be applied as an intelligent device in transport systems. M. ...
doi:10.1155/2018/6231236
fatcat:r7i2xg4u4jdbbh5a7egstkmsri
DMUAS-IoT: A Decentralised Multi-Factor User Authentication Scheme for IoT Systems
2022
International Scientific Journal of Computing
DMUAS-IoT adopted PRESENT for face image encryption and elliptic curve cryptography for data exchange. ...
The results show that the scheme is secure against man-in-the-middle and impersonation attacks, provides mutual authentication and has a low computation cost. ...
The design of a decentralised multi-factor user authentication scheme for IoT systems called DMUAS-IoT. The scheme uses PRESENT encryption for face image template encryption. 2. ...
doi:10.47839/ijc.21.4.2777
fatcat:7yocqan6qzen5moip25p7t2xci
Authentication and Authorization for Mobile IoT Devices using Bio-features: Recent Advances and Future Trends
[article]
2019
arXiv
pre-print
More specifically, We analyze the state of the art of the existing biometric-based authentication schemes for IoT devices. ...
Based on the current taxonomy, We conclude our paper with different types of challenges for future research efforts in biometrics-based authentication schemes for IoT devices. ...
Rattani and Derakhshani [17] provided the state-ofthe-art related to face biometric authentication schemes that are designed for mobile devices. ...
arXiv:1901.09374v1
fatcat:tglfqlpnczhufoutjae6ogunz4
Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends
2019
Security and Communication Networks
More specifically, we analyze the state of the art of the existing biometric-based authentication schemes for IoT devices. ...
Based on the current taxonomy, we conclude our paper with different types of challenges for future research efforts in biometrics-based authentication schemes for IoT devices. ...
Conflicts of Interest The authors declare that there are no conflicts of interest regarding the publication of this paper. ...
doi:10.1155/2019/5452870
fatcat:wvabztvuvndoloe3p2gyvoy5ha
Multimedia security and privacy protection in the internet of things: research developments and challenges
2022
International Journal of Multimedia Intelligence and Security
With the rapid growth of the internet of things (IoT), huge amounts of multimedia data are being generated from and/or exchanged through various IoT devices, systems and applications. ...
The security and privacy of multimedia data have, however, emerged as key challenges that have the potential to impact the successful deployment of IoT devices in some data-sensitive applications. ...
Thilagavathi and Suthendran (2018) designed an innovative method for automatic real-time face recognition from videos captured by IoT devices. ...
doi:10.1504/ijmis.2022.10044461
fatcat:xdliezm2kbe3vkrpgnso74xtba
« Previous
Showing results 1 — 15 out of 7,111 results