2 research outputs found

    Movement´s detection of the view to generate orders [Deteccion de movimientos de la vista para generar ordenes]

    Get PDF
     This research article is based on the use of computational vision as a tool to detect orders generated from movements of sight, for this we must also discriminate when an order is made and when not, where processing is also used Digital images In a regular feature computer, the scheme created to generate visual orders in the Python 3.8.1 language will be implemented in software, taking as a test object the 100 orders generated with the view and taking this data for the respective tests. The generation of visual orders has been successfully achieved. The test carried out resulted in the sensitivity of 0.96, specificity of 0.98, positive likelihood of 48 and negative likelihood of 0.04. Take into account that the test of 100 attempts divided into 10 attempts by each person (5 left and 5 right) was performed

    Enhancing Security Authentication of Information System using Morse code and Facial Recognition

    Get PDF
    Information Technology Management is combination of Data Exchange, Algorithm Development, and implementation of various technologies in order to solve the problems related to Information System security. The applications of data science are used by almost all Information Systems in various domains like educational institutions, finance, healthcare, business to handle large volumes of data. The practical applications range from predicting stock movement to predicting cancer. It is used in image processing to identity recognition, audio processing for speech to text prediction. Since authentication and security of the Information System are still not completely secure and is a matter of concern, we are able to implement a real time eye-tracing along with the facial feature recognition using Morse Code based secured authentication system to enhance the Security aspects of the Information Systems. Most of the traditional Information Systems have a single layer of security authentication and cannot be relied upon. In our findings, we do not find the existing systems to be completely secure and hence we focus on implementing multiple layers of unique security authentications using eyeball movements to form a distinct Morse Code and the facial feature recognitio
    corecore