共 48 条
[1]
Ogbuke N. J., Yusuf Y Y, Dharma K., Mercangoz B., Big data supply chain analytics: ethical, privacy and security challenges posed to business, industries and society, Production Planning Control, 33, 2-3, pp. 123-137, (2022)
[2]
Abadal S., Jain A., Guirado R., Lopez-Alonso J., Alarcon E., Computing graph neural networks: a survey from algorithms to accelerators, ACM Computing Surveys, 54, 9, pp. 1-38, (2021)
[3]
Salim H., Enhanced data security of communication system using combined encryption and steganography, International Journal of Interactive Mobile Technologies, 15, 16, pp. 144-157, (2021)
[4]
Kaur P, Krishan K., Sharma S. K., Kanchan T., Facial-recognition algorithms: a literature review, Medicine, Science the Law, 60, 2, pp. 131-139, (2020)
[5]
Khan S., Javed M. H., Ahmed E., Shah S. A., Ali S. U., Facial recognition using convolutional neural networks and implementation on smart glasses, 2019 International Conference on Information Science and Communication Technology (ICISCT), pp. 1-6, (2019)
[6]
Basu K., Tzannatos Z., The global child labor problem: what do we know and what can we do?, The world bank economic review, 17, 2, pp. 147-173, (2003)
[7]
Alaidi A. H., Der C. S., Leong Y W. J. i., Systematic review of enhancement of artificial bee colony algorithm using ant colony pheromone, International Journal of Interactive Mobile Technologies (iJIM), 15, 16, (2021)
[8]
Ming Z., Visani M., Luqman M. M., Burie J.-C., A survey on anti-spoofing methods for facial recognition with rgb cameras of generic consumer devices, Journal of Imaging, 6, 12, (2020)
[9]
Aljazaery I. A., ALRikabi H., Encryption of color image based on DNA strand and exponential factor, International journal of online and biomedical engineering (iJOE), 18, 3, (2022)
[10]
Roa'a M., Aljazaery I. A., Al_Dulaimi S. K., Salim H. T., Generation of high dynamic range for enhancing the panorama environment, Bulletin of Electrical Engineering, 10, 1