Results 31 to 40 of about 145,910 (140)

Predicting anomalies in computer networks using autoencoder-based representation learning

open access: yesInternational Journal of Informatics and Communication Technology (IJ-ICT)
Recent improvements in the internet of things (IoT), cloud services, and network data variety have increased the demand for complex anomaly detection algorithms in network intrusion detection systems (IDSs) capable of dealing with sophisticated network ...
Shehram Sikander Khan, A. Mailewa
semanticscholar   +1 more source

Ensuring network security with a robust intrusion detection system using ensemble-based machine learning

open access: yesArray, 2023
Intrusion detection is a critical aspect of network security to protect computer systems from unauthorized access and attacks. The capacity of traditional intrusion detection systems (IDS) to identify unknown sophisticated threats is constrained by their
Md. Alamgir Hossain, Md. Saiful Islam
doaj  

A review of automated image understanding within 3D baggage computed tomography security screening

open access: yesJournal of X-Ray Science and Technology, 2015
Baggage inspection is the principal safeguard against the transportation of prohibited and potentially dangerous materials at airport security checkpoints.
A. Mouton, T. Breckon
semanticscholar   +1 more source

Industrial development of near-open pit reserves based on multivariate analysis and computer modelling of geotechnology objects

open access: yesVestnik MGTU, 2019
The conditions for potential production of deposit reserves are studied at the initial stage of its development as every deposit is a unique one. Mining conditions can change during production, therefore, it is necessary to adapt the mining technology to
Belogorodtsev O. V., Khomkin E. E.
doaj   +1 more source

Clinical software development for the Web: lessons learned from the BOADICEA project

open access: yesBMC Medical Informatics and Decision Making, 2012
Background In the past 20 years, society has witnessed the following landmark scientific advances: (i) the sequencing of the human genome, (ii) the distribution of software by the open source movement, and (iii) the invention of the World Wide Web ...
Cunningham Alex P   +2 more
doaj   +1 more source

Real Time Facial Recognition Using Principal Component Analysis (PCA) And EmguCV

open access: yesIOP Conference Series: Materials Science and Engineering, 2018
Facial recognition is a challenging research in the field of image processing and computer vision, especially for security systems, weight determiner, and emotional determination based on the face image recognition.
S. Sultoni, A G Abdullah
semanticscholar   +1 more source

Chiller faults detection and diagnosis with sensor network and adaptive 1D CNN

open access: yesDigital Communications and Networks, 2022
Computer-empowered detection of possible faults for Heating, Ventilation and Air-Conditioning (HVAC) subsystems, e.g., chillers, is one of the most important applications in Artificial Intelligence (AI) integrated Internet of Things (IoT).
Ke Yan, Xiaokang Zhou
doaj  

A Framework for Reduction of Principal Component Analysis based Algorithms using Residue Number System

open access: yesInternational Journal of Computer Applications, 2019
The level of criminality in Nigeria is at alarming rate which leads to daily development of various security skills used in identification and verification of offenders. Face Recognition (FR) which is one of the security skills is a biometric system used
Tajudeen N.   +2 more
semanticscholar   +1 more source

Using PCA to Evaluate Computer Network Security

open access: yesInformation Technology Convergence and Services, 2012
The principal components analysis (PCA) is a multivariate statistical tool which brings the multi-dimensional factor into the identical system to carry on the qualitative and quantitative research. The theory is relatively complete.
Yunlong Zhang, Yong Hua
semanticscholar   +1 more source

SVMFN-FSAR: Semantic-Guided Video Multimodal Fusion Network for Few-Shot Action Recognition

open access: yesBig Data Mining and Analytics
Few-Shot Action Recognition (FSAR) has been a heat topic in various areas, such as computer vision and forest ecosystem security. FSAR aims to recognize previously unseen classes using limited labeled video examples.
Ran Wei   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy