Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-1 of 1 total results
RFID and Face Recognition Based Security and Access ...
The researcher expect to increase strength of security by 50%. Face recognition under constrained condition and RFID are contactless processes. The approach presented in this paper for face recognition uses DWT and Euclidean distance method. Face recognition is a very important component in many applications like search engine and emotion detector....