Search alternatives:
networks » network (Expand Search)
Showing 581 - 600 results of 836 for search 'Computer networks Security features.', query time: 0.11s Refine Results
  1. 581
  2. 582
  3. 583

    HoRNS-CNN model: an energy-efficient fully homomorphic residue number system convolutional neural network model for privacy-preserving classification of dyslexia neural-biomarkers by Opeyemi Lateef Usman, Ravie Chandren Muniyandi, Khairuddin Omar, Mazlyfarina Mohamad, Ayoade Akeem Owoade, Morufat Adebola Kareem

    Published 2025-04-01
    “…The findings show that the HoRNS-CNN model effectively manages cipher-image expansion with an asymptotic complexity of $$O\left({n}^{3}\right)$$ O n 3 , offering better performance and faster feature extraction compared to its peers. The model can predict 400,000 neural-biomarker features in one hour, providing an effective tool for analyzing neuroimages while ensuring privacy and security.…”
    Get full text
    Article
  4. 584

    Optimizing Group Activity Recognition With Actor Relation Graphs and GCN-LSTM Architectures by M. R. Tejonidhi, C. V. Aravinda, S. V. Aruna Kumar, C. K. Madhu, A. M. Vinod

    Published 2025-01-01
    “…The challenge of understanding and recognizing group activities through human behavior and interactions is a prominent issue in the realm of computer vision research. This area boasts a wide range of applications, including security surveillance, healthcare monitoring, and human-computer interaction systems. …”
    Get full text
    Article
  5. 585
  6. 586

    Efficient productivity prediction model based on edge data compression in smart farms by Peng Jin, Wenshuang Du, Wenquan Jin

    Published 2025-12-01
    “…This strategy integrates lightweight edge models and region-aware clippings and compression techniques to reduce data transmission while retaining key agronomic features. Furthermore, the strategy's multi-dimensional resource-aware scheduling and optimized network multiplexing significantly enhance the efficiency of data acquisition and transmission. …”
    Get full text
    Article
  7. 587
  8. 588
  9. 589
  10. 590
  11. 591

    A Fast Power Market Clearing Method Based on Active Constraints Identification by Deep Learning by Yunliang WU, Jianxin ZHANG, Bao LI, Peng LI, Zhiyong LI, Xin ZHOU, Yan YANG, Xiaowen LAI

    Published 2020-09-01
    “…Secondly, a deep learning strategy is proposed for identification of active constraint sets, which can provide technical support for deep neural networks to effectively identify the active constraints of SCED from two aspects: feature vector design and efficient processing of the results of deep neural network. …”
    Get full text
    Article
  12. 592
  13. 593
  14. 594
  15. 595

    Touch of Privacy: A Homomorphic Encryption-Powered Deep Learning Framework for Fingerprint Authentication by U. Sumalatha, K. Krishna Prakasha, Srikanth Prabhu, Vinod C. Nayak

    Published 2025-01-01
    “…One real fingerprint per user is encrypted and stored for authentication, reducing computational complexity. The CNN classifies encrypted features without decryption, ensuring secure authentication. …”
    Get full text
    Article
  16. 596
  17. 597
  18. 598
  19. 599
  20. 600

    The Evolution of Biometric Authentication: A Deep Dive Into Multi-Modal Facial Recognition: A Review Case Study by Mohamed Abdul-Al, George Kumi Kyeremeh, Rami Qahwaji, Nazar T. Ali, Raed A. Abd-Alhameed

    Published 2024-01-01
    “…The survey highlights novel contributions such as using Generative Adversarial Networks (GANs) to generate synthetic disguised faces, Convolutional Neural Networks (CNNs) for feature extractions, and Fuzzy Extractors to integrate biometric verification with cryptographic security. …”
    Get full text
    Article