Results 31 to 40 of about 151,861 (137)

A Framework for Reduction of Principal Component Analysis based Algorithms using Residue Number System

open access: yesInternational Journal of Computer Applications, 2019
The level of criminality in Nigeria is at alarming rate which leads to daily development of various security skills used in identification and verification of offenders. Face Recognition (FR) which is one of the security skills is a biometric system used
Tajudeen N., K. A., Yusuf-Asaju Ayisat
semanticscholar   +1 more source

Industrial development of near-open pit reserves based on multivariate analysis and computer modelling of geotechnology objects

open access: yesVestnik MGTU, 2019
The conditions for potential production of deposit reserves are studied at the initial stage of its development as every deposit is a unique one. Mining conditions can change during production, therefore, it is necessary to adapt the mining technology to
Belogorodtsev O. V., Khomkin E. E.
doaj   +1 more source

Real Time Facial Recognition Using Principal Component Analysis (PCA) And EmguCV

open access: yesIOP Conference Series: Materials Science and Engineering, 2018
Facial recognition is a challenging research in the field of image processing and computer vision, especially for security systems, weight determiner, and emotional determination based on the face image recognition.
S. Sultoni, A G Abdullah
semanticscholar   +1 more source

Clinical software development for the Web: lessons learned from the BOADICEA project

open access: yesBMC Medical Informatics and Decision Making, 2012
Background In the past 20 years, society has witnessed the following landmark scientific advances: (i) the sequencing of the human genome, (ii) the distribution of software by the open source movement, and (iii) the invention of the World Wide Web ...
Cunningham Alex P   +2 more
doaj   +1 more source

A review of automated image understanding within 3D baggage computed tomography security screening

open access: yesJournal of X-Ray Science and Technology, 2015
Baggage inspection is the principal safeguard against the transportation of prohibited and potentially dangerous materials at airport security checkpoints.
A. Mouton, T. Breckon
semanticscholar   +1 more source

Using PCA to Evaluate Computer Network Security

open access: yesInformation Technology Convergence and Services, 2012
The principal components analysis (PCA) is a multivariate statistical tool which brings the multi-dimensional factor into the identical system to carry on the qualitative and quantitative research. The theory is relatively complete.
Yunlong Zhang, Yong Hua
semanticscholar   +1 more source

An Efficient Support Vector Machine Algorithm Based Network Outlier Detection System

open access: yesIEEE Access
With the increase of cyber-attacks and security threats in the recent decade, it is necessary to safeguard sensitive data and provide robust protection to information systems and computer networks.
Omar Alghushairy   +6 more
doaj   +1 more source

SVMFN-FSAR: Semantic-Guided Video Multimodal Fusion Network for Few-Shot Action Recognition

open access: yesBig Data Mining and Analytics
Few-Shot Action Recognition (FSAR) has been a heat topic in various areas, such as computer vision and forest ecosystem security. FSAR aims to recognize previously unseen classes using limited labeled video examples.
Ran Wei   +5 more
doaj   +1 more source

Intelligent smart sensing with ResNet-PCA and hybrid ML–DNN for sustainable and accurate plant disease detection

open access: yesFrontiers in Plant Science
IntroductionDiseases of plants remain one of the greatest threats to sustainable agriculture, with a direct adverse effect on crop productivity and threatening food security worldwide.
Shtwai Alsubai   +5 more
doaj   +1 more source

International Cybersecurity on Railway Transport: Methodological Approaches and Normal Procedural Framework

open access: yesВестник Научно-исследовательского института железнодорожного транспорта, 2015
The paper deals with methodological approaches and practical venues of international cooperation in the areas of information security and cybersecurity on railway transport. The approaches were adopted by the workshop “Cybersecurity on Railway Transport”
S. E. Adadurov   +3 more
doaj  

Home - About - Disclaimer - Privacy