Showing 581 - 600 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.27s Refine Results
  1. 581
  2. 582
  3. 583

    A Fast Power Market Clearing Method Based on Active Constraints Identification by Deep Learning by Yunliang WU, Jianxin ZHANG, Bao LI, Peng LI, Zhiyong LI, Xin ZHOU, Yan YANG, Xiaowen LAI

    Published 2020-09-01
    “…Secondly, a deep learning strategy is proposed for identification of active constraint sets, which can provide technical support for deep neural networks to effectively identify the active constraints of SCED from two aspects: feature vector design and efficient processing of the results of deep neural network. …”
    Get full text
    Article
  4. 584
  5. 585
  6. 586
  7. 587

    Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication by U. Sumalatha, K. Krishna Prakasha, Srikanth Prabhu, Vinod C. Nayak

    Published 2025-01-01
    “…One real fingerprint per user is encrypted and stored for authentication, reducing computational complexity. The CNN classifies encrypted features without decryption, ensuring secure authentication. …”
    Get full text
    Article
  8. 588
  9. 589
  10. 590

    PENGENALAN SUARA MANUSIA MENGGUNAKAN JARINGAN SYARAF TIRUAN DENGAN METODE LINEAR PREDICTIVE CODING DAN FAST FOURIR TRANSFORM by Nirwan Sinuhaji, Benar, Romulo P. Aritonang

    Published 2023-08-01
    “…The voice signal obtained from the recording results is processed by a computer with the FFT algorithm so that a digital signal is obtained, then parsed, the results of the feature extraction with the FFT method then become the input of the LPC method and then implemented into the Artificial Neural Network. …”
    Get full text
    Article
  11. 591
  12. 592
  13. 593
  14. 594
  15. 595

    The Evolution of Biometric Authentication: A Deep Dive Into Multi-Modal Facial Recognition: A Review Case Study by Mohamed Abdul-Al, George Kumi Kyeremeh, Rami Qahwaji, Nazar T. Ali, Raed A. Abd-Alhameed

    Published 2024-01-01
    “…The survey highlights novel contributions such as using Generative Adversarial Networks (GANs) to generate synthetic disguised faces, Convolutional Neural Networks (CNNs) for feature extractions, and Fuzzy Extractors to integrate biometric verification with cryptographic security. …”
    Get full text
    Article
  16. 596
  17. 597

    A New Efficient Hybrid Technique for Human Action Recognition Using 2D Conv-RBM and LSTM with Optimized Frame Selection by Majid Joudaki, Mehdi Imani, Hamid R. Arabnia

    Published 2025-02-01
    “…Recognizing human actions through video analysis has gained significant attention in applications like surveillance, sports analytics, and human–computer interaction. While deep learning models such as 3D convolutional neural networks (CNNs) and recurrent neural networks (RNNs) deliver promising results, they often struggle with computational inefficiencies and inadequate spatial–temporal feature extraction, hindering scalability to larger datasets or high-resolution videos. …”
    Get full text
    Article
  18. 598
  19. 599
  20. 600