|
[1]Grandviewresearch. (2021, Apr). Smart Lock Market Size, Share & Trends Analysis Report By Type (Deadbolt, Lever Handle, Padlock), By Application (Residential, Hospitality, Enterprise, Critical Infrastructure, Others), By Region, And Segment Forecasts, 2021 - 2028. Grandviewresearch. United States. [Online] Available: https://www.grandviewresearch.com/industry-analysis/smart-lock-market [2]R. S. Sandhu and P. Samarati, “Access control: principle and practice,” IEEE communications magazine, vol. 32, no. 9, pp. 40-48, 1994. [3]M. Ababneh, D. Wijesekera, and J. B. Michael, “A Policy-Based Dialogue System for Physical Access Control,” in STIDS, 2012, pp. 57-63. [4]U. Farooq, M. ul Hasan, M. Amar, A. Hanif, and M. U. Asad, “RFID based security and access control system,” International Journal of Engineering and Technology, vol. 6, no. 4, p. 309, 2014. [5]K. S. Ravi, G. Varun, T. Vamsi, and P. Pratyusha, “RFID based security system,” International Journal of Innovative Technology and Exploring Engineering, vol. 2, no. 5, pp. 132-134, 2013. [6]D. Ramsbrock, S. Moskovchenko, and C. Conroy, “Magnetic swipe card system security,” A case study of the University of Maryland, College Park, 2006. [7]Y. Gil, D. Ahn, S. Pan, and Y. Chung, “Access control system with high level security using fingerprints,” in 32nd Applied Imagery Pattern Recognition Workshop, 2003. Proceedings., 2003: IEEE, pp. 238-243. [8]K. O. Okokpujie, M. Odusami, E. Noma-Osaghae, O. Abayomi-Alli, and E. Oluwawemimo, “A Bimodal Biometric Bank Vault Access Control System,” International Journal of Mechanical Engineering and Technology (IJMET), vol. 9, no. 9, pp. 596-607, 2018. [9]A. Saint, “Go green at home: Researchers worldwide are coming up with new ideas to make our homes more eco-friendly. For sustainably-minded households, these 2020 innovations could be a good place to start,” Engineering & Technology, vol. 15, no. 11/12, pp. 56-59, 2020. [10]C. Yan, G. Zhang, X. Ji, T. Zhang, T. Zhang, and W. Xu, “The feasibility of injecting inaudible voice commands to voice assistants,” IEEE Transactions on Dependable and Secure Computing, 2019. [11]N. M. S. M. Zaini, N. A. Zakaria, I. Roslan, H. Nahar, K. W. M. Ghazali, and N. Harum, “IoT System Design using Voice Recognition Technique for Door Access Control System,” in Proceedings of the 3rd International Conference on Intelligent and Interactive Computing 2021 (UTeM Press), 2021: UTeM Press, p. 145. [12]E. Kaliappan, B. Ponkarthika, R. Manibharathi, R. K. Kumar, and E. Manikandan, “Voice-Based Intelligent Door Access security System Using Embedded systems,” European Journal of Molecular & Clinical Medicine, vol. 7, no. 4, pp. 2552-2557, 2020. [13]P. Viola and M. Jones, “Rapid object detection using a boosted cascade of simple features,” in Proceedings of the 2001 IEEE computer society conference on computer vision and pattern recognition. CVPR 2001, 2001, vol. 1: Ieee, pp. I-I. [14]W. Chen, H. Huang, S. Peng, C. Zhou, and C. Zhang, “YOLO-face: a real-time face detector,” The Visual Computer, vol. 37, no. 4, pp. 805-813, 2021. [15]L. Wang and A. A. Siddique, “Facial recognition system using LBPH face recognizer for anti-theft and surveillance application based on drone technology,” Measurement and Control, vol. 53, no. 7-8, pp. 1070-1077, 2020. [16]S. A. Radzi, M. M. F. Alif, Y. N. Athirah, A. Jaafar, A. Norihan, and M. Saleha, “IoT based facial recognition door access control home security system using raspberry pi,” International Journal of Power Electronics and Drive Systems, vol. 11, no. 1, p. 417, 2020. [17]S. Pandey, V. Chouhan, R. P. Mahapatra, D. Chhettri, and H. Sharma, “Real-Time Safety and Surveillance System Using Facial Recognition Mechanism,” in Intelligent Computing and Applications: Springer, 2021, pp. 497-506. [18]K. B. Shaik, P. Ganesan, V. Kalist, B. Sathish, and J. M. M. Jenitha, “Comparative study of skin color detection and segmentation in HSV and YCbCr color space,” Procedia Computer Science, vol. 57, pp. 41-48, 2015. [19]D.-Y. Huang, C.-H. Chen, T.-Y. Chen, W.-C. Hu, Z.-B. Guo, and C.-K. Wen, “High-efficiency face detection and tracking method for numerous pedestrians through face candidate generation,” Multimedia Tools and Applications, vol. 80, no. 1, pp. 1247-1272, 2021. [20]A. F. A. Nasir, A. S. A. Ghani, M. A. Zakaria, A. P. A. Majeed, and A. N. Ibrahim, “Automated Face Detection Using Skin Color Segmentation and Viola-Jones Algorithm,” Mekatronika, vol. 1, no. 1, pp. 58-63, 2019. [21]L. Sirovich and M. Kirby, “Low-dimensional procedure for the characterization of human faces,” Josa a, vol. 4, no. 3, pp. 519-524, 1987. [22]M. Turk and A. Pentland, “Eigenfaces for recognition,” Journal of cognitive neuroscience, vol. 3, no. 1, pp. 71-86, 1991. [23]V. Vansh, K. Chandrasekhar, C. Anil, and S. S. Sahu, “Improved Face Detection Using YCbCr and Adaboost,” in Computational Intelligence in Data Mining: Springer, 2020, pp. 689-699. [24]S. Lawrence, C. L. Giles, A. C. Tsoi, and A. D. Back, “Face recognition: A convolutional neural-network approach,” IEEE transactions on neural networks, vol. 8, no. 1, pp. 98-113, 1997. [25]H. Li, Z. Lin, X. Shen, J. Brandt, and G. Hua, “A convolutional neural network cascade for face detection,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 5325-5334. [26]G. Guo, H. Wang, Y. Yan, J. Zheng, and B. Li, “A fast face detection method via convolutional neural network,” Neurocomputing, vol. 395, pp. 128-137, 2020. [27]A. Howard, M. Zhu, B. Chen, D. Kalenichenko, W. Wang, and T. Weyand, “MobileNets: Efficient convolutional neural networks for mobile vision applications,” arXiv:1704. 04861, 2017. [28]R. Girshick, “Fast r-cnn,” in Proceedings of the IEEE international conference on computer vision, 2015, pp. 1440-1448. [29]V. Bazarevsky, Y. Kartynnik, A. Vakunov, K. Raveendran, and M. Grundmann, “Blazeface: Sub-millisecond neural face detection on mobile gpus,” arXiv preprint arXiv:1907.05047, 2019. [30]S. Zhao, Y. Gao, and B. Zhang, “Gabor feature constrained statistical model for efficient landmark localization and face recognition,” Pattern Recognition Letters, vol. 30, no. 10, pp. 922-930, 2009. [31]X. P. Burgos-Artizzu, P. Perona, and P. Dollár, “Robust face landmark estimation under occlusion,” in Proceedings of the IEEE international conference on computer vision, 2013, pp. 1513-1520. [32]P. Dollár, P. Welinder, and P. Perona, “Cascaded pose regression,” in 2010 IEEE Computer Society Conference on Computer Vision and Pattern Recognition, 2010: IEEE, pp. 1078-1085. [33]Y. Kartynnik, A. Ablavatski, I. Grishchenko, and M. Grundmann, “Real-time facial surface geometry from monocular video on mobile GPUs,” arXiv preprint arXiv:1907.06724, 2019. [34]S. Chopra, R. Hadsell, and Y. LeCun, “Learning a similarity metric discriminatively, with application to face verification,” in 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR'05), 2005, vol. 1: IEEE, pp. 539-546. [35]Y. Taigman, M. Yang, M. A. Ranzato, and L. Wolf, “Deepface: Closing the gap to human-level performance in face verification,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2014, pp. 1701-1708. [36]F. Schroff, D. Kalenichenko, and J. Philbin, “Facenet: A unified embedding for face recognition and clustering,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2015, pp. 815-823. [37]D. E. King, “Dlib-ml: A machine learning toolkit,” The Journal of Machine Learning Research, vol. 10, pp. 1755-1758, 2009. [38]F. Magoulès and Q. Zou, “A novel contactless human machine interface based on machine learning,” in 2017 16th International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES), 2017: IEEE, pp. 137-140. [39]H.-S. Yeo, B.-G. Lee, and H. Lim, “Hand tracking and gesture recognition system for human-computer interaction using low-cost hardware,” Multimedia Tools and Applications, vol. 74, no. 8, pp. 2687-2715, 2015. [40]O. Mazhar, S. Ramdani, B. Navarro, R. Passama, and A. Cherubini, “Towards real-time physical human-robot interaction using skeleton information and hand gestures,” in 2018 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS), 2018: IEEE, pp. 1-6. [41]P. Kumar, R. Saini, P. P. Roy, and D. P. Dogra, “Study of text segmentation and recognition using leap motion sensor,” IEEE Sensors Journal, vol. 17, no. 5, pp. 1293-1301, 2016. [42]Y. Hernandez-Mella, A. Marin-Hernandez, E. J. Rechy-Ramirez, and L. F. Marin-Urias, “A Study of Contactless Human Computer Interaction with Virtual Environments,” in 2019 5th Experiment International Conference (exp. at'19), 2019: IEEE, pp. 16-21. [43]K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, “Joint face detection and alignment using multitask cascaded convolutional networks,” IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1499-1503, 2016. [44]F. Zhang et al., “Mediapipe hands: On-device real-time hand tracking,” arXiv preprint arXiv:2006.10214, 2020. [45]I. Oikonomidis, N. Kyriazis, and A. A. Argyros, “Efficient model-based 3D tracking of hand articulations using Kinect,” in BmVC, 2011, vol. 1, no. 2, p. 3. [46]A. Tagliasacchi, M. Schröder, A. Tkach, S. Bouaziz, M. Botsch, and M. Pauly, “Robust articulated‐icp for real‐time hand tracking,” in Computer Graphics Forum, 2015, vol. 34, no. 5: Wiley Online Library, pp. 101-114. [47]L. Ge, H. Liang, J. Yuan, and D. Thalmann, “Robust 3d hand pose estimation in single depth images: from single-view cnn to multi-view cnns,” in Proceedings of the IEEE conference on computer vision and pattern recognition, 2016, pp. 3593-3601. [48]L. Ge, H. Liang, J. Yuan, and D. Thalmann, “Robust 3D hand pose estimation from single depth images using multi-view CNNs,” IEEE Transactions on Image Processing, vol. 27, no. 9, pp. 4422-4436, 2018. [49]C. Wan, T. Probst, L. V. Gool, and A. Yao, “Self-supervised 3d hand pose estimation through training by fitting,” in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2019, pp. 10853-10862. [50]T. Simon, H. Joo, I. Matthews, and Y. Sheikh, “Hand keypoint detection in single images using multiview bootstrapping,” in Proceedings of the IEEE conference on Computer Vision and Pattern Recognition, 2017, pp. 1145-1153. [51]J. Kietzmann, L. W. Lee, I. P. McCarthy, and T. C. Kietzmann, “Deepfakes: Trick or treat?,” Business Horizons, vol. 63, no. 2, pp. 135-146, 2020.
|