Image-based security techniques for water critical infrastructure surveillance
Security-related image analysis of critical infrastructures involves using advanced
technologies to analyze visual data to identify potential threats, vulnerabilities, or abnormal …
technologies to analyze visual data to identify potential threats, vulnerabilities, or abnormal …
Tire Condition Classification Based on Tread Depth using Machine Learning
As a crucial component for vehicle performance and stability, automotive manufacturers
adopt specific tire inspection procedures to verify its quality and integrity. Tires stay in good …
adopt specific tire inspection procedures to verify its quality and integrity. Tires stay in good …
A model for fingerprint liveness detection enabled by M-SSO heuristic algorithm using deep learning strategies
This paper plans to implement the benefit of deep hybrid learning for fingerprint liveness
detection. The fingerprint image is subjected to background removal using Active contour …
detection. The fingerprint image is subjected to background removal using Active contour …
RECOGNITION OF AERIAL PHOTOGRAPHY OBJECTS BASED ON DATA SETS WITH DIFFERENT AGGREGATION OF CLASSES.
P Prystavka, K Dukhnovska, O Kovtun… - Eastern-European …, 2023 - search.ebscohost.com
The object of this work is the recognition algorithms of aerial photography objects, namely,
the analysis of recognition accuracy based on data sets with different aggregation classes …
the analysis of recognition accuracy based on data sets with different aggregation classes …
[PDF][PDF] Enhancing Face Spoofing Attack Detection: Performance Evaluation of a VGG-19 CNN Model''
T Ayanwola, A Oludele… - Acadlore Transactions on …, 2023 - library.acadlore.com
With the wide use of facial verification and authentication systems, the performance
evaluation of Spoofing Attack Detection (SAD) module in the systems is important, because …
evaluation of Spoofing Attack Detection (SAD) module in the systems is important, because …