Results 31 to 40 of about 151,861 (137)
The level of criminality in Nigeria is at alarming rate which leads to daily development of various security skills used in identification and verification of offenders. Face Recognition (FR) which is one of the security skills is a biometric system used
Tajudeen N., K. A., Yusuf-Asaju Ayisat
semanticscholar +1 more source
The conditions for potential production of deposit reserves are studied at the initial stage of its development as every deposit is a unique one. Mining conditions can change during production, therefore, it is necessary to adapt the mining technology to
Belogorodtsev O. V., Khomkin E. E.
doaj +1 more source
Real Time Facial Recognition Using Principal Component Analysis (PCA) And EmguCV
Facial recognition is a challenging research in the field of image processing and computer vision, especially for security systems, weight determiner, and emotional determination based on the face image recognition.
S. Sultoni, A G Abdullah
semanticscholar +1 more source
Clinical software development for the Web: lessons learned from the BOADICEA project
Background In the past 20 years, society has witnessed the following landmark scientific advances: (i) the sequencing of the human genome, (ii) the distribution of software by the open source movement, and (iii) the invention of the World Wide Web ...
Cunningham Alex P +2 more
doaj +1 more source
A review of automated image understanding within 3D baggage computed tomography security screening
Baggage inspection is the principal safeguard against the transportation of prohibited and potentially dangerous materials at airport security checkpoints.
A. Mouton, T. Breckon
semanticscholar +1 more source
Using PCA to Evaluate Computer Network Security
The principal components analysis (PCA) is a multivariate statistical tool which brings the multi-dimensional factor into the identical system to carry on the qualitative and quantitative research. The theory is relatively complete.
Yunlong Zhang, Yong Hua
semanticscholar +1 more source
An Efficient Support Vector Machine Algorithm Based Network Outlier Detection System
With the increase of cyber-attacks and security threats in the recent decade, it is necessary to safeguard sensitive data and provide robust protection to information systems and computer networks.
Omar Alghushairy +6 more
doaj +1 more source
SVMFN-FSAR: Semantic-Guided Video Multimodal Fusion Network for Few-Shot Action Recognition
Few-Shot Action Recognition (FSAR) has been a heat topic in various areas, such as computer vision and forest ecosystem security. FSAR aims to recognize previously unseen classes using limited labeled video examples.
Ran Wei +5 more
doaj +1 more source
IntroductionDiseases of plants remain one of the greatest threats to sustainable agriculture, with a direct adverse effect on crop productivity and threatening food security worldwide.
Shtwai Alsubai +5 more
doaj +1 more source
The paper deals with methodological approaches and practical venues of international cooperation in the areas of information security and cybersecurity on railway transport. The approaches were adopted by the workshop “Cybersecurity on Railway Transport”
S. E. Adadurov +3 more
doaj

