語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
Smart Security System Based on Edge Computing and Face Recognition.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Smart Security System Based on Edge Computing and Face Recognition./
作者:
Han, Heejae.
面頁冊數:
1 online resource (51 pages)
附註:
Source: Masters Abstracts International, Volume: 85-01.
Contained By:
Masters Abstracts International85-01.
標題:
Privacy. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30540067click for full text (PQDT)
ISBN:
9798379881832
Smart Security System Based on Edge Computing and Face Recognition.
Han, Heejae.
Smart Security System Based on Edge Computing and Face Recognition.
- 1 online resource (51 pages)
Source: Masters Abstracts International, Volume: 85-01.
Thesis (M.Sc.)--Purdue University, 2023.
Includes bibliographical references
Physical security is one of the most basic human needs. People care about it for various reasons; for the safety and security of personnel, to protect private assets, to prevent crime, and so forth. With the recent proliferation of AI, various smart physical security systems are getting introduced to the world. Many researchers and engineers are working on developing AI-driven physical security systems that have the capability to identify potential security threats by monitoring and analyzing data collected from various sensors. One of the most popular ways to detect unauthorized entrance to restricted space is using face recognition. With a collected stream of images and a proper algorithm, security systems can recognize faces detected from the image and send an alert when unauthorized faces are recognized. In recent years, there has been active research and development on neural networks for face recognition, e.g. FaceNet is one of the advanced algorithms. However, not much work has been done to showcase what kind of end-to-end system architecture is effective for running heavy-weight computational loads such as neural network inferences. Thus, this study explores different hardware options that can be used in security systems powered by a state-of-the-art face recognition algorithm and proposes that an edge computing based approach can significantly reduce the overall system latency and enhance the system reactiveness. To analyze the pros and cons of the proposed system, this study presents two different end-to-end system architectures. The first system is an edge computing-based system that operates most of the computational tasks at the edge node of the system, and the other is a traditional application server-based system that performs core computational tasks at the application server. Both systems adopt domain-specific hardware, Tensor Processing Units, to accelerate neural network inference. This paper walks through the implementation details of each system and explores its effectiveness. It provides a performance analysis of each system with regard to accuracy and latency and outlines the pros and cons of each system.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2023
Mode of access: World Wide Web
ISBN: 9798379881832Subjects--Topical Terms:
528582
Privacy.
Index Terms--Genre/Form:
542853
Electronic books.
Smart Security System Based on Edge Computing and Face Recognition.
LDR
:03394nmm a2200361K 4500
001
2364479
005
20231130105311.5
006
m o d
007
cr mn ---uuuuu
008
241011s2023 xx obm 000 0 eng d
020
$a
9798379881832
035
$a
(MiAaPQ)AAI30540067
035
$a
(MiAaPQ)Purdue22696288
035
$a
AAI30540067
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Han, Heejae.
$3
3705284
245
1 0
$a
Smart Security System Based on Edge Computing and Face Recognition.
264
0
$c
2023
300
$a
1 online resource (51 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 85-01.
500
$a
Advisor: Matson, Eric T.
502
$a
Thesis (M.Sc.)--Purdue University, 2023.
504
$a
Includes bibliographical references
520
$a
Physical security is one of the most basic human needs. People care about it for various reasons; for the safety and security of personnel, to protect private assets, to prevent crime, and so forth. With the recent proliferation of AI, various smart physical security systems are getting introduced to the world. Many researchers and engineers are working on developing AI-driven physical security systems that have the capability to identify potential security threats by monitoring and analyzing data collected from various sensors. One of the most popular ways to detect unauthorized entrance to restricted space is using face recognition. With a collected stream of images and a proper algorithm, security systems can recognize faces detected from the image and send an alert when unauthorized faces are recognized. In recent years, there has been active research and development on neural networks for face recognition, e.g. FaceNet is one of the advanced algorithms. However, not much work has been done to showcase what kind of end-to-end system architecture is effective for running heavy-weight computational loads such as neural network inferences. Thus, this study explores different hardware options that can be used in security systems powered by a state-of-the-art face recognition algorithm and proposes that an edge computing based approach can significantly reduce the overall system latency and enhance the system reactiveness. To analyze the pros and cons of the proposed system, this study presents two different end-to-end system architectures. The first system is an edge computing-based system that operates most of the computational tasks at the edge node of the system, and the other is a traditional application server-based system that performs core computational tasks at the application server. Both systems adopt domain-specific hardware, Tensor Processing Units, to accelerate neural network inference. This paper walks through the implementation details of each system and explores its effectiveness. It provides a performance analysis of each system with regard to accuracy and latency and outlines the pros and cons of each system.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2023
538
$a
Mode of access: World Wide Web
650
4
$a
Privacy.
$3
528582
650
4
$a
Sensors.
$3
3549539
650
4
$a
Neural networks.
$3
677449
650
4
$a
Computer science.
$3
523869
650
4
$a
Information technology.
$3
532993
650
4
$a
Web studies.
$3
2122754
655
7
$a
Electronic books.
$2
lcsh
$3
542853
690
$a
0984
690
$a
0800
690
$a
0489
690
$a
0646
710
2
$a
ProQuest Information and Learning Co.
$3
783688
710
2
$a
Purdue University.
$3
1017663
773
0
$t
Masters Abstracts International
$g
85-01.
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30540067
$z
click for full text (PQDT)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9486835
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入