Login / Signup
Unauthorized access detection system to the equipments in a room based on the persons identification by face recognition.
Yahya Zennayi
Soukayna Benaissa
Hatim Derrouz
Zouhair Guennoun
Published in:
Eng. Appl. Artif. Intell. (2023)
Keyphrases
</>
face recognition
unauthorized access
person identification
face images
object detection
access control
database
detection method
computer vision
face detection
intrusion detection system
data model
peer to peer
file system
security policies