SECURE YOUR ENTRY WAYS: USING CLOUD BASED DOOR ACCESS SYSTEM
Salve, J. R. S. A. S. S. ,. O. D. D. N. K. (2026). Secure Your Entry Ways: using Cloud Based Door Access System. International Journal of Science, Strategic Management and Technology, Volume 10(01). https://doi.org/10.55041/ijsmt.v2i2.054
Salve, Jayshree. "Secure Your Entry Ways: using Cloud Based Door Access System." International Journal of Science, Strategic Management and Technology, vol. Volume 10, no. 01, 2026, pp. . doi:https://doi.org/10.55041/ijsmt.v2i2.054.
Salve, Jayshree. "Secure Your Entry Ways: using Cloud Based Door Access System." International Journal of Science, Strategic Management and Technology Volume 10, no. 01 (2026). https://doi.org/https://doi.org/10.55041/ijsmt.v2i2.054.
- [1].Arka A, Saroj H, Rayith B, Shuvadeep P, Sourav H, Jayanta P, Arindam D, "Design and Implementation of an IoT-ased Smart Home Automation System in Real-World Scenario"In EAI Endorsed Transactions on Internet of Things, Volume 10, pages 1-8, 2024, doi:10.4108/etiot.6201.
- [2]. Amin S. Ibrahim, Waelm. F, Abdel-Rehim ,Ahmedm.Abbas ,Ashraf Mohamedali Hassan, Ahmed Emam and Saeed Mohsen, "Design and Implementation of a Pilot Model for IoT Smart Home Networks," IEEE Access, vol. 11, pp. 59701–59718, June 2023, doi:10.1109/ACCESS.2023.3282095.
- [3]. Muhammad Imran Zulfiqar , Ijaz Younis," Enhanced security paradigms: Converging IoT and
- biometrics for advanced locker protection," in IEEE Internet of Things Journal, IEEE, 2024, pp. 1–10, doi :10.1109/JIOT.2024.3432282.
- [4]. H. -B. Kim, N. Choi, H. -J. Kwon and H. Kim, "Surveillance System for Real-Time HighPrecision Recognition of Criminal Faces From Wild Videos," in IEEE Access, vol. 11, pp. 56066-56082, 2023, doi:10.1109/ACCESS.2023.3282451.
- [5]. L. P. O. Paula, N. Faruqui, I. Mahmud, M. Whaiduzzaman, E. C. Hawkinson and S. Trivedi, "
- A Novel Front Door Security (FDS) Algorithm Using GoogleNet-BiLSTM Hybridization," in IEEE Access, vol. 11, pp. 19122-19134, 2023, doi:10.1109/ACCESS.2023.3248509.
- [6]. Z. Huang, J. Zhang and H. Shan, "When Age-Invariant Face Recognition Meets Face Age Synthesis:
- A Multi-Task Learning Framework and a New Benchmark," in IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 45, no. 6, pp. 7917-7932, 1 June 2023, doi: 10.1109/TPAMI.2022.3217882.
- [7]. A. Krishnan and T. Thomas, "Finger Vein Recognition Based on Anatomical Features of Vein Patterns,
- " in IEEE Access, vol. 11, pp. 39373-39384,23, doi:10.1109/ACCESS.2023.3253203.
- [8]. Y. Huang, H. Ma and M. Wang, "Multimodal Finger Recognition Based on Asymmetric Networks With Fused Similarity," in IEEE Access, vol. 11, pp. 17497-17509, 2023, doi: 10.1109/ACCESS.2023.3242984. International Journal of Research Publication and Reviews, Vol 5, no 3, pp 2033-2038 March 2024 2038.
- [9]. C. -Y. Lin, F. -J. Chen, H. -F. Ng and W. -Y. Lin, "Invisible Adversarial Attacks on Deep Learning- Based Face Recognition Models," in IEEE Access, vol. 11, pp. 51567-51577, 2023, doi:10.1109/ACCESS.2023.3279488
- [10]. D. C. Nguyen, M. Ding, P. N. Pathirana, A. Seneviratne, J. Li, D. Niyato, O. Dobre, and H. V. Poor, "6G Internet of Things: A comprehensive survey," IEEE Internet Things J., vol. 9, no. 1, pp. 359–383, Jan. 2022.