IMPLEMENTATION OF FACE SIMILARITY USING TINY FACE DETECTOR
(1) Department of Informatics, Faculty of Computer Science, Universitas Mercu Buana, Jakarta
(2) Department of Informatics, Faculty of Computer Science, Universitas Mercu Buana, Jakarta
Corresponding Author
Abstract
The development of cloud technology and Software As A Services (SaaS) applications is happening very expeditiously. Many applications are currently used by users using cloud technology, including the Human Resources (HR) application. The problem arising from cloud-based HR applications is regarding the issue of validity, especially when doing attendance so that it cannot be entrusted or represented by others. In this paper, it is explained how to maintain the validity of attendance in cloud-based HR applications by looking at the level of face similarity using tiny face detector.
Keywords
References
N. X. Phi, C. T. Tin, L. N. Ky Thu, and T. C. Hung, “Proposed load balancing algorithm to reduce response time and processing time on cloud computing,” Int. J. Comput. Networks Commun., vol. 10, no. 3, pp. 87–98, 2018.
J. Ju, W. Ya, J. Fu, J. Wu, and Z. Lin, “Research on key technology in SaaS,” Proc. - 2010 Int. Conf. Intell. Comput. Cogn. Informatics, ICICCI 2010, pp. 384–387, 2010.
P. Hu and D. Ramanan, “Finding tiny faces,” Proc. - 30th IEEE Conf. Comput. Vis. Pattern Recognition, CVPR 2017, vol. 2017–January, pp. 1522–1530, 2017.
K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” Proc. IEEE Comput. Soc. Conf. Comput. Vis. Pattern Recognit., vol. 2016–December, pp. 770–778, 2016.
M. Fachrurrozi, Saparudin, Erwin, Mardiana, C. F. Badillah, J. Erlina, and A. Lazuardi, “Real-time multi-object face recognition using content based image retrieval (CBIR),” Int. J. Electr. Comput. Eng., vol. 8, no. 5, pp. 2812–2817, 2018.
I. C. Resceanu, C. F. Resceanu, and S. M. Simionescu, “SaaS solutions for small-medium businesses: Developer’s perspective on creating new SaaS products,” 2014 18th Int. Conf. Syst. Theory, Control Comput. ICSTCC 2014, pp. 140–144, 2014.
S. Liu, K. Yue, H. Yang, L. Liu, X. Duan, and T. Guo, “The Research on SaaS Model Based on Cloud Computing,” Proc. 2018 2nd IEEE Adv. Inf. Manag. Commun. Electron. Autom. Control Conf. IMCEC 2018, no. Imcec, pp. 1959–1962, 2018.
R. Anand, R. Regan, and V. Mohanraj, “Cloud based shopping guide system using qrcode,” 2012 3rd Int. Conf. Comput. Commun. Netw. Technol. ICCCNT 2012, no. July, 2012.
P. Mersini, E. Sakkopoulos, and A. Tsakalidis, “APPification of hospital healthcare and data management using QRcodes,” IISA 2013 - 4th Int. Conf. Information, Intell. Syst. Appl., pp. 216–218, 2013.
R. Lionnie and M. Alaydrus, “Survei Penelitian Pengenalan Pola dalam Identifikasi Biometrik,” J. Telekomun. dan Komput., vol. 7, no. 1, p. 19, 2017.
A. Y. Basuki and M. Fauzi, “Perancangan Door Lock Face Recognition Dengan Metoda Eigenfaces Menggunakan Opencv2.4.9 Dan Telegram Messenger Berbasis Raspberry Pi,” J. Teknol. Elektro, vol. 10, no. 1, pp. 1–8, 2019.
Y. Jumaryadi and B. Priambodo, “Deteksi Wajah Terkejut Menggunakan Eigenfaces,” J. Ilm. Fasilkom, vol. 6, no. 2, pp. 83–90, 2017.
P. F. Felzenszwalb, I. C. Society, R. B. Girshick, S. Member, D. Mcallester, and D. Ramanan, “Object Detection With Discriminatively Trained Part-Based Models,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 32, no. 9, pp. 1627–1645, 2010.
A. Sasongko, H. Hidayat, Y. Kurniawan, and S. Sutikno, “Architecture for the secret-key BC3 cryptography algorithm,” ITB J. Inf. Commun. Technol., vol. 5, no. 2, pp. 125–140, 2011.
X. Zheng and J. Jin, “Research for the application and safety of MD5 algorithm in password authentication,” Proc. - 2012 9th Int. Conf. Fuzzy Syst. Knowl. Discov. FSKD 2012, no. Fskd, pp. 2216–2219, 2012.
H. Swathi, S. Joshi, and M. K. Kiran Kumar, “A Novel ATM Security System using a User Defined Personal Identification Number with the Aid of GSM Technology,” Proc. 2018 2nd Int. Conf. Adv. Electron. Comput. Commun. ICAECC 2018, pp. 1–5, 2018.
J. Raigoza, “Browser Performance of JavaScript Framework ,” 2016 Int. Conf. Comput. Sci. Comput. Intell., pp. 4–5, 2016.
Article Metrics
Abstract View : 343 timesPDF Download : 76 times
DOI: 10.56327/ijiscs.v4i1.856
Refbacks
- There are currently no refbacks.