OE Putra, R Devita, N Wahyudi - Sinkron: jurnal dan penelitian …, 2023 - jurnal.polgan.ac.id
Face recognition is widely used in various applications, especially in the field of surveillance and security systems. This study aims to design and build a safe security system using face …
Due to its own limitations, the traditional teaching quality evaluation method has been unable to adapt to the development of information‐based curriculum teaching. Therefore …
L Wang, L Zhang, zhiqiu Huang - … Communications and Mobile …, 2022 - Wiley Online Library
Because a large number of labeled face data samples in special scenes need a large number of training samples with identity markers, and it is impossible to accurately extract …
K Sivanantham… - … and Unsupervised Data …, 2024 - Wiley Online Library
This study delves into the security concerns surrounding data generated by connected cars, encompassing information such as position, engine status, speed, and more. The term …
B Fu - Journal of Intelligent Systems, 2023 - degruyter.com
With the advent of the Internet of Things (IoT) era, the application of intelligent devices in the network is becoming more and more extensive, and the monitoring technology is gradually …
BM Balaban, IŞ Sacală… - … Conference on Control …, 2021 - ieeexplore.ieee.org
Nowadays, intelligent vehicles are becoming more and more important in the transportation field. What makes such a vehicle vulnerable is the number of interconnected components …
A Bosire, D Maingi - Int. Arab J. Inf. Technol., 2022 - iajit.org
Autotheft is a crime that can be mitigated using artificial intelligence as a scientific approach. In this case, we assess the drivers driving pattern using both deep neural network and …
In this modern world, vehicle security remains as a major challenge as the conventional physical vehicle locks are insufficient. This research work aims to explore the potential of …
KK Singh, B Balamurugan, NC Smieee… - Open Computer …, 2020 - degruyter.com
Blockchain plays a significant role in providing security during data handling operations and defines how trusted transactions can be carried out addressing the solution for internet …