AIMC Topic: Security Measures

Clear Filters Showing 1 to 10 of 20 articles

DeepGuard: real-time threat recognition using Golden Jackal optimization with deep learning model.

Scientific reports
Violence recognition in surveillance videos is a vital feature of current security systems. It can improve complete security measures, making it essential in generating safe public places and defending against unforeseen security tasks. Real risk and...

Computationally intelligent real-time security surveillance system in the education sector using deep learning.

PloS one
Real-time security surveillance and identity matching using face detection and recognition are central research areas within computer vision. The classical facial detection techniques include Haar-like, MTCNN, AdaBoost, and others. These techniques e...

Security challenges by AI-assisted protein design : The ability to design proteins in silico could pose a new threat for biosecurity and biosafety.

EMBO reports
Scientists and security experts are concerned that the increasing power of AI-assisted protein design and synthesis could be abused by various actors for terrorist or criminal purposes. [Image: see text]

Detection of safety helmet and mask wearing using improved YOLOv5s.

Scientific reports
With the advancement of society, ensuring the safety of personnel involved in municipal construction projects, particularly in the context of pandemic control measures, has become a matter of utmost importance. This paper introduces a security measur...

A multi-attack intrusion detection model based on Mosaic coded convolutional neural network and centralized encoding.

PloS one
With the development of the Internet of Vehicles (IoV), attacks to the vehicle-mounted control area network (CAN) have seriously jeopardized the security of automobiles. As an important security measure, intrusion detection technologies have aroused ...

Effective Face Detector Based on YOLOv5 and Superresolution Reconstruction.

Computational and mathematical methods in medicine
The application of face detection and recognition technology in security monitoring systems has made a huge contribution to public security. Face detection is an essential first step in many face analysis systems. In complex scenes, the accuracy of f...

A machine learning toolkit for genetic engineering attribution to facilitate biosecurity.

Nature communications
The promise of biotechnology is tempered by its potential for accidental or deliberate misuse. Reliably identifying telltale signatures characteristic to different genetic designers, termed 'genetic engineering attribution', would deter misuse, yet i...

Regional Water Resources Security Evaluation Based on a Hybrid Fuzzy BWM-TOPSIS Method.

International journal of environmental research and public health
Nowadays, water resource security is becoming increasingly prominent, and this problem is a primary bottleneck restricting China's future sustainable development. It is difficult to come to a unified conclusion on water resources security, and applic...

Real-time Concealed Object Detection from Passive Millimeter Wave Images Based on the YOLOv3 Algorithm.

Sensors (Basel, Switzerland)
The detection of objects concealed under people's clothing is a very challenging task, which has crucial applications for security. When testing the human body for metal contraband, the concealed targets are usually small in size and are required to ...

Development of Invisible Sensors and a Machine-Learning-Based Recognition System Used for Early Prediction of Discontinuous Bed-Leaving Behavior Patterns.

Sensors (Basel, Switzerland)
This paper presents a novel bed-leaving sensor system for real-time recognition of bed-leaving behavior patterns. The proposed system comprises five pad sensors installed on a bed, a rail sensor inserted in a safety rail, and a behavior pattern recog...