In this article, we will learn the pros and cons of using Face Recognition as an authentication method. We will also see how it can be spoofed and the methods that can be used to detect the spoofing ...
Latest From the Blog
May 24, 2022
14 Comments
DepthAI Pipeline Overview: Creating a Complex Pipeline
May 17, 2022
2 Comments
By 2 Comments
TensorFlow Lite Model Maker: Create Models for On-Device Machine Learning
May 10, 2022
4 Comments
CNN Deep Learning Edge Devices Image Classification Model Optimization OpenCV Tutorials Post Training Quantization Raspberry Pi
By 4 Comments
TensorFlow Lite: TFLite Model Optimization for On-Device Machine Learning
May 3, 2022
4 Comments
CNN Deep Learning Edge Devices Image Classification Model Optimization OpenCV Tutorials Post Training Quantization Raspberry Pi
By 4 Comments
Object Detection With Depth Measurement Using Pre-trained Models With OAK-D
April 26, 2022
5 Comments
By 5 Comments
YOLOv5: Expert Guide to Custom Object Detection Training
April 19, 2022
2 Comments
By 2 Comments
- « Go to Previous Page
- Page 1
- Interim pages omitted …
- Page 36
- Page 37
- Page 38
- Page 39
- Page 40
- Interim pages omitted …
- Page 82
- Go to Next Page »