Due to the enormous usage of the internet for transmission of data over a network,security and authenticity become major *** challenges encountered in biometric system are the misuse of enrolled biometric templates st...
详细信息
Due to the enormous usage of the internet for transmission of data over a network,security and authenticity become major *** challenges encountered in biometric system are the misuse of enrolled biometric templates stored in database *** describe these issues various algorithms are implemented to deliver better protection to biometric traits such as physical(Face,fingerprint,Ear etc.)and behavioural(Gesture,Voice,tying etc.)by means of matching and verification *** this work,biometric security system with fuzzy extractor and convolutional neural networks using face attribute is proposed which provides different choices for supporting cryptographic processes to the confidential *** proposed system not only offers security but also enhances the system execution by discrepancy conservation of binary *** Face Attribute Convolutional Neural Network(FACNN)is used to generate binary codes from nodal points which act as a key to encrypt and decrypt the entire data for further *** Artificial Intelligence(AI)into the proposed system,automatically upgrades and replaces the previously stored biometric template after certain time period to reduce the risk of ageing difference while *** codes generated from face templates are used not only for cryptographic approach is also used for biometric process of enrolment and *** main face data sets are taken into the evaluation to attain system performance by improving the efficiency of matching performance to verify *** system enhances the system performance by 8%matching and verification and minimizes the False Acceptance Rate(FAR),False Rejection Rate(FRR)and Equal Error Rate(EER)by 6 times and increases the data privacy through the biometric cryptosystem by 98.2%while compared to other work.
The increasing use of renewable energy systems has led to a rise in the number of grid-connected inverters, which can have a detrimental effect on the superiority and constancy of grid electricity due to the injected ...
详细信息
The increasing use of renewable energy systems has led to a rise in the number of grid-connected inverters, which can have a detrimental effect on the superiority and constancy of grid electricity due to the injected current harmonics. In this study, the proportional integral (PI) and proportional resonant (PR) controllers have been investigated for their effectiveness inreducing harmonics in grid-connected inverters. The study also investigates the impact of harmonics compensators (HC) on the control strategies. The results of the study suggest that the implementation of PI and PR controllers in the synchronous frame can effectively reduce the injected current harmonics in grid-connected inverters. The use of harmonics compensators can further enhance the performance of the controllers by reducing the distortion and improving the stability of the grid. The efficiency of the regulator strategies be contingent on the type and level of harmonics in the grid, as well as the design and tuning of the controllers and compensators. The statement that the "PR+HC controller has a superior quality output current" is more specific and suggests that this control method may be more effective than the others in reducing harmonics and enlightening the value of the productivity current. The comparison of the IEEE 1547 standard by three viable inverters from diverse constructors is also noteworthy, as it can provide insights into the compatibility and performance of different types of inverters with the standard. The use of deep learning with the RCNN network for analyzing harmonics and providing information about power is an interesting application of machine learning in power systems research. This approach may have the probable to development the accuracy and competence of harmonics analysis as well as power monitoring in grid-connected inverters. Overall, the study highlights the importance of effective control strategies for managing harmonics in grid-connected inverters, parti
Many real-world networks such as social networks, traffic networks vary over time, which can be modeled as dynamic graphs. Despite the significant number of systems that can facilitate from the algorithmic tools over ...
详细信息
In ultrasound shear wave elastography (USWE), the elasticity of a small lesion is underestimated due to the wave reflection inside the lesion. This paper proposes using a deep neural network to compensate for the size...
详细信息
Fish diseases are among the major limiting factors to increase global aquaculture production. They lead to increased fish mortality, low breeding and growth rates, and low meat quality. The success of aquaculture is h...
详细信息
Avoiding obstacles is challenging for autonomous robotic systems. In this work, we examine obstacle avoidance for legged hexapods, as it relates to climbing over randomly placed wooden joists. Our main motivation is t...
详细信息
The quality of service in modern power grids depends on various factors, including outage duration, number of affected consumers, supply adequacy, resolving customer grievances, and network availability. Typically, re...
详细信息
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize ***-rently,the Inte...
详细信息
Software-Defined Networking(SDN)represents a significant paradigm shift in network architecture,separating network logic from the underlying forwarding devices to enhance flexibility and centralize ***-rently,the Internet of Things(IoT)connects numerous devices to the Internet,enabling autonomous interactions with minimal human ***,implementing and managing an SDN-IoT system is inherently complex,particularly for those with limited resources,as the dynamic and distributed nature of IoT infrastructures creates security and privacy challenges during SDN *** findings of this study underscore the primary security and privacy challenges across application,control,and data planes.A comprehensive review evaluates the root causes of these challenges and the defense techniques employed in prior works to establish sufficient secrecy and privacy *** investigations have explored cutting-edge methods,such as leveraging blockchain for transaction recording to enhance security and privacy,along with applying machine learning and deep learning approaches to identify and mitigate the impacts of Denial of Service(DoS)and Distributed DoS(DDoS)***,the analysis indicates that encryption and hashing techniques are prevalent in the data plane,whereas access control and certificate authorization are prominently considered in the control plane,and authentication is commonly employed within the application ***,this paper outlines future directions,offering insights into potential strategies and technological advancements aimed at fostering a more secure and privacy-conscious SDN-based IoT ecosystem.
Electric aircraft are gaining popularity due to their zero-carbon emission, low noise level and low operational cost. Current study regarding electric aircraft centers on safety as well as battery durability and littl...
详细信息
Pareto set learning (PSL) is an emerging approach for acquiring the complete Pareto set of a multi-objective optimization problem. Existing methods primarily rely on the mapping of preference vectors in the objective ...
详细信息
暂无评论