Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Table 1.

Classification of drones [2].

More »

Table 1 Expand

Fig 1.

Block diagram of the proposed consumer authentication (Consumer-Auth) framework.

More »

Fig 1 Expand

Fig 2.

Haar algorithm features with kernel window representation.

More »

Fig 2 Expand

Fig 3.

Work flow of the proposed Consumer-Auth framework.

More »

Fig 3 Expand

Table 2.

Drone specifications.

More »

Table 2 Expand

Fig 4.

Experimental setup of the proposed Consumer-Auth framework.

More »

Fig 4 Expand

Fig 5.

Time and distance relationship between the theoretical and experimental curves of the proposed Consumer-Auth framework.

More »

Fig 5 Expand

Fig 6.

Energy utilization comparison among cloud computing, edge computing and the proposed hybrid computing based Consumer-Auth framework.

More »

Fig 6 Expand

Fig 7.

Face recognition accuracy with respect to different face angles (FA1—FA10) during the drone flight.

More »

Fig 7 Expand

Fig 8.

Latency overhead comparison among cloud computing, edge computing and the proposed hybrid computing based Consumer-Auth framework in terms of face recognition attempts.

More »

Fig 8 Expand