Search alternatives:
networks » network (Expand Search)
Showing 241 - 260 results of 836 for search 'Computer networks Security features.', query time: 0.10s Refine Results
  1. 241
  2. 242

    A Hybrid Deep Learning Approach for Secure Biometric Authentication Using Fingerprint Data by Abdulrahman Hussian, Foud Murshed, Mohammed Nasser Alandoli, Ghalib Aljafari

    Published 2025-05-01
    “…Addressing these limitations is crucial for ensuring reliable biometric security in real-world applications, including law enforcement, financial transactions, and border security. …”
    Get full text
    Article
  3. 243
  4. 244
  5. 245
  6. 246
  7. 247
  8. 248
  9. 249

    A Novel Framework for Quantum-Enhanced Federated Learning with Edge Computing for Advanced Pain Assessment Using ECG Signals via Continuous Wavelet Transform Images by Madankumar Balasubramani, Monisha Srinivasan, Wei-Horng Jean, Shou-Zen Fan, Jiann-Shing Shieh

    Published 2025-02-01
    “…The cornerstone of our system is a Quantum Convolutional Hybrid Neural Network (QCHNN) that harnesses quantum entanglement properties to enhance feature detection and classification robustness. …”
    Get full text
    Article
  10. 250
  11. 251
  12. 252
  13. 253
  14. 254
  15. 255

    A survey on secure communication technologies for smart grid cyber physical system by Giriraj Sharma

    Published 2024-12-01
    “…A CPS combines physical components, computational elements, and communication networks. The smart grid CPS (SG-CPS) is an example of such a system, featuring physical devices with diverse communication needs and intermediary networks. …”
    Get full text
    Article
  16. 256

    A lightweight framework to secure IoT devices with limited resources in cloud environments by Vivek Kumar Pandey, Dinesh Sahu, Shiv Prakash, Rajkumar Singh Rathore, Pratibha Dixit, Iryna Hunko

    Published 2025-07-01
    “…Finally, the model also makes use of a novel leaf-cut feature optimization strategy and tight adaptive cloud edge intelligence to achieve high accuracy while minimizing memory and computation demand. …”
    Get full text
    Article
  17. 257
  18. 258

    Regional Short‐Term Wind Power Prediction Based on CEEMDAN‐FTC Feature Mapping and EC‐TCN‐BiLSTM Deep Learning by Guoyuan Qin, Xiaosheng Peng, Zimin Yang

    Published 2025-06-01
    “…Third, by combining the strengths of TCN and BiLSTM neural networks, the temporal and spatial correlations of input features can be captured effectively. …”
    Get full text
    Article
  19. 259

    Machine learning based intrusion detection framework for detecting security attacks in internet of things by V. Kantharaju, H. Suresh, M. Niranjanamurthy, Syed Immamul Ansarullah, Farhan Amin, Amerah Alabrah

    Published 2024-12-01
    “…Thus, to solve this issue, herein, we propose an advance Intrusion detection framework using Self-Attention Progressive Generative Adversarial Network (SAPGAN) framework for detecting security threats in IoT networks. …”
    Get full text
    Article
  20. 260

    Ultra Wideband radar-based gait analysis for gender classification using artificial intelligence by Adil Ali Saleem, Hafeez Ur Rehman Siddiqui, Muhammad Amjad Raza, Sandra Dudley, Julio César Martínez Espinosa, Luis Alonso Dzul López, Isabel de la Torre Díez

    Published 2025-09-01
    “…Gender classification plays a vital role in various applications, particularly in security and healthcare. While several biometric methods such as facial recognition, voice analysis, activity monitoring, and gait recognition are commonly used, their accuracy and reliability often suffer due to challenges like body part occlusion, high computational costs, and recognition errors. …”
    Get full text
    Article