Image-based security techniques for water critical infrastructure surveillance

SB Kaç, S Eken, DD Balta, M Balta, M İskefiyeli… - Applied Soft …, 2024 - Elsevier
Security-related image analysis of critical infrastructures involves using advanced
technologies to analyze visual data to identify potential threats, vulnerabilities, or abnormal …

Tire Condition Classification Based on Tread Depth using Machine Learning

M Rahman, N Kamal, NF Abdullah… - 2022 IEEE 20th …, 2022 - ieeexplore.ieee.org
As a crucial component for vehicle performance and stability, automotive manufacturers
adopt specific tire inspection procedures to verify its quality and integrity. Tires stay in good …

A model for fingerprint liveness detection enabled by M-SSO heuristic algorithm using deep learning strategies

D Songara, A Poonia, G Gupta… - Cybernetics and …, 2022 - Taylor & Francis
This paper plans to implement the benefit of deep hybrid learning for fingerprint liveness
detection. The fingerprint image is subjected to background removal using Active contour …

RECOGNITION OF AERIAL PHOTOGRAPHY OBJECTS BASED ON DATA SETS WITH DIFFERENT AGGREGATION OF CLASSES.

P Prystavka, K Dukhnovska, O Kovtun… - Eastern-European …, 2023 - search.ebscohost.com
The object of this work is the recognition algorithms of aerial photography objects, namely,
the analysis of recognition accuracy based on data sets with different aggregation classes …

[PDF][PDF] Enhancing Face Spoofing Attack Detection: Performance Evaluation of a VGG-19 CNN Model''

T Ayanwola, A Oludele… - Acadlore Transactions on …, 2023 - library.acadlore.com
With the wide use of facial verification and authentication systems, the performance
evaluation of Spoofing Attack Detection (SAD) module in the systems is important, because …