Show simple item record

dc.contributor.authorVega-Huerta, Hugo
dc.contributor.authorMarlon Pillaca, Pullo
dc.contributor.authorRodrigo Velásquez, Quiroz
dc.contributor.authorMaquen-Niño, Gisella Luisa Elena
dc.contributor.authorCamara-Figueroa, Adegundo
dc.contributor.authorPantoja-Collantes, Jorge
dc.contributor.authorGil-Calvo, Rubén
dc.date.accessioned2024-06-06T19:35:51Z
dc.date.available2024-06-06T19:35:51Z
dc.date.issued2023
dc.identifier.urihttps://hdl.handle.net/20.500.13067/3221
dc.description.abstractAccess control to restricted areas is facing issues with its identity verification systems for Chief Executive Officers (CEOs) based on access cards, which are vulnerable to cloning, identity theft, and cyberattacks like Whaling. To address these concerns, a facial recognition system was developed using transfer learning and the face-recognition library. The methodology for implementing the facial recognition system was based on Scrum and Kanban, and Python was used as the programming language. As a result, the system successfully extracts key facial features and compares them with those stored in a database, while also notifying of failed attempts by unauthorized personnel. In conclusion, the implementation of an intelligent facial recognition system has proven to be an effective solution for access control in restricted areas, verifying the identity of CEOs stored in a database. © 2024, Associacao Iberica de Sistemas e Tecnologias de Informacao. All rights reserved.es_PE
dc.formatapplication/pdfes_PE
dc.language.isoenges_PE
dc.publisherRISTI - Revista Iberica de Sistemas e Tecnologias de Informacaoes_PE
dc.rightsinfo:eu-repo/semantics/restrictedAccesses_PE
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/es_PE
dc.subjectFacial mesheses_PE
dc.subjectFacial recognitiones_PE
dc.subjectPythones_PE
dc.subjectSmart systemes_PE
dc.titleFacial Recognition with Neural Networks for Access Control to restricted areases_PE
dc.title.alternativeReconocimiento facial mediante aprendizaje por transferencia para el control de acceso a áreas restringidases_PE
dc.typeinfo:eu-repo/semantics/articlees_PE
dc.identifier.journalRISTI - Revista Iberica de Sistemas e Tecnologias de Informacaoes_PE
dc.subject.ocdehttps://purl.org/pe-repo/ocde/ford#2.02.04es_PE
dc.relation.urlhttps://www.scopus.com/record/display.uri?eid=2-s2.0-85191468383&origin=resultslist&sort=plf-f&src=s&nlo=&nlr=&nls=&sid=61a3484a7f855380e4b2fb3500c306f9&sot=aff&sdt=cl&cluster=scopubyr%2c%222024%22%2ct&sl=47&s=AF-ID%28%22Universidad+Aut%c3%b3noma+del+Per%c3%ba%22+60110858%29&relpos=12&citeCnt=0&searchTerm=es_PE
dc.source.volume2024es_PE
dc.source.issue67es_PE
dc.source.beginpage261es_PE
dc.source.endpage273es_PE


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record

info:eu-repo/semantics/restrictedAccess
Except where otherwise noted, this item's license is described as info:eu-repo/semantics/restrictedAccess