And communications the republic of uzbekistan tashkent university of information technologies



Download 0,5 Mb.
Pdf ko'rish
bet23/24
Sana05.06.2022
Hajmi0,5 Mb.
#638263
1   ...   16   17   18   19   20   21   22   23   24
Bog'liq
14 Мавлонов Анвар

Conclusion 
Face recognition technology has come a long way in the last twenty years. 
Today, machines are able to automatically verify identity information for secure 
transactions, for surveillance and security tasks, and for access control to buildings. 
These applications usually work in controlled environments and recognition 
algorithms that can take advantage of the environmental constraints to obtain high 
recognition accuracy. However, next generation face recognition systems are going 
to have widespread application in smart environments, where computers and 
machines are more like helpful assistants. A major factor of that evolution is the 
use of neural networks in face recognition. A different filed of science that also is 
very fast becoming more and more efficient, popular and helpful to other 
applications. 
Face recognition systems used today work very well under constrained 
conditions, although all systems work much better with frontal mug-shot images 
and constant lighting. All current face recognition algorithms fail under the vastly 
varying conditions under which humans need to and are able to identify other 
people. Next generation person recognition systems will need to recognize people 
in real-time and in much less constrained situations. 
In this final bachelor diploma work: 
1. About android mobile system is stated and their developments, some of 
versions is expressed.
2. Authentication systems for protecting system and some types of attacks to 
mobile system are analyzed. 
3. The existing problems of authentication system and some protocols are 
described. 
4. The methods of Facial recognition is presented and analyzed. 
5. Face Recognition software application is created for future development. 
6. In safety of vital activity part, about rational organization of work place and 
emergencies is fully mentioned. 


Reference 
1.
Head First Android Development O’Reilly 2013. 
2.
Analysis and Design of Authentication and Encryption by B Zhu 
2015.
3.
Different types of attacks in Mobile ADHOC network by A 
Bhattacharyya.
4.
Handbook of Face Recognition Stan Li and Anil K 2011y. 
5.
Facial Technology and Culture by Kelly B and Gates S 2012y. 
6.
http://link.springer.com 
7.
http://electronics.howstuffworks.com 
8.
https://en.wikipedia.org. 
9.
Third IEEE Workshop on mobile computing systems and applications 
2012. 
10.
Face Detection with Waldboth algorithm. 
11.
Face Detection and Reconstruction by Martin Sunkel 2014y. 
12.
The implementation of Face Security Authentication implemented on 
mobile phone Emir Kremic and Abdulhamit Subhaji. 
13.
Analysis of mobile security protocols Anita Singhrova and Nupur 
Prakash 2015. 
14.
Yormatov G’ Y., Isamuhamedov Y.U. Protecting of labor, Lessons 
Uzbekistan publisher Tashkent 2012 y. 
15.
Rational organization http://smallbusiness.chron.com 

Download 0,5 Mb.

Do'stlaringiz bilan baham:
1   ...   16   17   18   19   20   21   22   23   24




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish