The identity of a person in social networking becomes very important especially when we want to identify a person. Search for detailed-identity can easily be conducted through a search engines or existing social networking website using computer or laptop. This method is not effective and practical when we consider the development of the mobile device technology in the community such as smartphone and tablet. Therefore, we have designed a face recognition system on mobile devices based on cloud computing services. The system is designed in the form of an application developed on Android mobile devices. The use of Android Face Detector API will act as libraries in the process of face detection before performing the offloading stage. This pap...
Abstract: Modern mobile devices have become very powerful. All kinds of sensitive data are stored an...
Face recognition is one among the foremost wide used technologies, from a phone's lock screen to the...
Face recognition on mobile devices can be utilized for security applications (e.g., user authenticat...
Face recognition is the biometric application to recognise the identity. Face recognition applicatio...
Cloud computing is transforming the business of information technology by deploying, managing and ru...
AbstractSocial networks have become quite popular these days and the creation of social groups of pe...
Abstract- Video-based object or face recognition services on mobile devices have recently gained sig...
This master’s Thesis focuses on image processing on Android platform and development of an applicati...
This work describes ways to use a person identification based on faces on mobile devices with Androi...
Human key point tracking such as face detection and recognition has become an increasingly popular r...
Smart phones have exploded in popularity in recent years, becoming ever more sophisticated and capab...
In this paper, we describe an Android based application for mobile devices that allows users to quic...
With the rapid use of Android OS in mobile devices and related products, face recognition technology...
The quality of the smartphone’s camera enables us to capture high quality pictures at a high resolut...
Recent technological advancements have made face recognition a very viable identification and verif...
Abstract: Modern mobile devices have become very powerful. All kinds of sensitive data are stored an...
Face recognition is one among the foremost wide used technologies, from a phone's lock screen to the...
Face recognition on mobile devices can be utilized for security applications (e.g., user authenticat...
Face recognition is the biometric application to recognise the identity. Face recognition applicatio...
Cloud computing is transforming the business of information technology by deploying, managing and ru...
AbstractSocial networks have become quite popular these days and the creation of social groups of pe...
Abstract- Video-based object or face recognition services on mobile devices have recently gained sig...
This master’s Thesis focuses on image processing on Android platform and development of an applicati...
This work describes ways to use a person identification based on faces on mobile devices with Androi...
Human key point tracking such as face detection and recognition has become an increasingly popular r...
Smart phones have exploded in popularity in recent years, becoming ever more sophisticated and capab...
In this paper, we describe an Android based application for mobile devices that allows users to quic...
With the rapid use of Android OS in mobile devices and related products, face recognition technology...
The quality of the smartphone’s camera enables us to capture high quality pictures at a high resolut...
Recent technological advancements have made face recognition a very viable identification and verif...
Abstract: Modern mobile devices have become very powerful. All kinds of sensitive data are stored an...
Face recognition is one among the foremost wide used technologies, from a phone's lock screen to the...
Face recognition on mobile devices can be utilized for security applications (e.g., user authenticat...