Showing 581 - 600 results of 836 for search 'Computer network Security features.', query time: 0.10s Refine Results
  1. 581

    A Fast Power Market Clearing Method Based on Active Constraints Identification by Deep Learning by Yunliang WU, Jianxin ZHANG, Bao LI, Peng LI, Zhiyong LI, Xin ZHOU, Yan YANG, Xiaowen LAI

    Published 2020-09-01
    “…Secondly, a deep learning strategy is proposed for identification of active constraint sets, which can provide technical support for deep neural networks to effectively identify the active constraints of SCED from two aspects: feature vector design and efficient processing of the results of deep neural network. …”
    Get full text
    Article
  2. 582
  3. 583
  4. 584

    Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication by U. Sumalatha, K. Krishna Prakasha, Srikanth Prabhu, Vinod C. Nayak

    Published 2025-01-01
    “…One real fingerprint per user is encrypted and stored for authentication, reducing computational complexity. The CNN classifies encrypted features without decryption, ensuring secure authentication. …”
    Get full text
    Article
  5. 585
  6. 586
  7. 587
  8. 588
  9. 589
  10. 590
  11. 591

    U-Net-based VGG19 model for improved facial expression recognition by Xiaohu ZHAO, Jingyi ZHANG, Mingzhi JIAO, Lixun XIE, Lanfei WANG, Weiqing SUN, Di ZHANG

    Published 2025-06-01
    “…The improved model not only boosts performance in terms of feature extraction and fusion but is also adept in solving the pressing problems of parameter size and computational efficiency. …”
    Get full text
    Article
  12. 592
  13. 593
  14. 594

    A New Efficient Hybrid Technique for Human Action Recognition Using 2D Conv-RBM and LSTM with Optimized Frame Selection by Majid Joudaki, Mehdi Imani, Hamid R. Arabnia

    Published 2025-02-01
    “…Recognizing human actions through video analysis has gained significant attention in applications like surveillance, sports analytics, and human–computer interaction. While deep learning models such as 3D convolutional neural networks (CNNs) and recurrent neural networks (RNNs) deliver promising results, they often struggle with computational inefficiencies and inadequate spatial–temporal feature extraction, hindering scalability to larger datasets or high-resolution videos. …”
    Get full text
    Article
  15. 595
  16. 596

    The Evolution of Biometric Authentication: A Deep Dive Into Multi-Modal Facial Recognition: A Review Case Study by Mohamed Abdul-Al, George Kumi Kyeremeh, Rami Qahwaji, Nazar T. Ali, Raed A. Abd-Alhameed

    Published 2024-01-01
    “…The survey highlights novel contributions such as using Generative Adversarial Networks (GANs) to generate synthetic disguised faces, Convolutional Neural Networks (CNNs) for feature extractions, and Fuzzy Extractors to integrate biometric verification with cryptographic security. …”
    Get full text
    Article
  17. 597
  18. 598
  19. 599
  20. 600

    Smart intrusion detection model to identify unknown attacks for improved road safety and management by Faisal Alshammari, Abdullah Alsaleh

    Published 2025-05-01
    “…ACIDS integrates convolutional neural networks (CNN) for hierarchical feature extraction, the synthetic minority over-sampling technique (SMOTE) to address class imbalance and an open-set classification framework to detect novel attack patterns. …”
    Get full text
    Article