Искусственный интеллект - 004.8

Научные статьи

В разделе "Искусственный интеллект"
Comparing the Performance of Naive Bayes And Decision Tree Classification Using R
An Approach of Securing Data using Combined Cryptography and Steganography
An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
Cost Optimization based Resource Allocation Scheme for Vehicular Cloud Networks
Implementation of the Naive Bayes Classifier Method for Potential Network Port Selection
Empowering Information Retrieval in Semantic Web
Robust and Accurate Trust Establishment Scheme for Wireless Sensor Network
A Comparative Study between Cloud Energy Consumption Measuring Simulators
Blockchain Based Secure Traffic Police Assistant System
The Cell Cycle Model: A Comprehensive Review and Extension Based on Machine Learning
Implementation of Edge Detection at Multiple Scales
A Comparative Evaluation of Feature Extraction and Similarity Measurement Methods for Content-based Image Retrieval
Analog Document Search Using CRNN and Keyphrase Extraction
Development Mobile Application of Bandung Tempo Doeloe based on Augmented Reality Using GPS Tracking Method
Multi-agent System for Management of Data from Electrical Smart Meters
A Survey Based Study on Fog Computing Awareness
Arabic Opinion Mining Using Combined CNN - LSTM Models
A Multi-Objective Optimization Approach for Solving AUST Classtimetable Problem Considering Hard and Soft Constraints
Action Recognition Based on the Modified Twostream CNN
Inter-Process Communication (IPC) in Distributed Environments: An Investigation and Performance Analysis of Some Middleware Technologies
Proposal of a Digital Ecosystem Based on Big Data and Artificial Intelligence to Support Educational and Vocational Guidance
Rural Empowerment through Education: Case Study of a Learning Community Telecentre in Indonesia
A Lightweight Face Recognition Model Using Convolutional Neural Network for Monitoring Students in E-Learning
Two-Layer Encryption based on Paillier and ElGamal Cryptosystem for Privacy Violation
Supporting Audio Privacy-aware Services in Emerging IoT Environment
Exploring Deep Learning Techniques in Cloud Computing to Detect Malicious Network Traffic: A Sustainable Computing Approach
An Optimized Machine Learning Approach for Predicting Parkinson's Disease
Log-File Analysis to Identify Internet-addiction in Children
A Verifiable Ring Signature Scheme of Anonymous Signcryption Using ECC
Detection and Classification of Cross-language Code Clone Types by Filtering the Nodes of ANTLR-generated Parse Tree
IoT Bus Navigation System with Optimized Routing using Machine Learning
Bug Severity Prediction using Keywords in Imbalanced Learning Environment
Combining Fuzzy Logic and k-Nearest Neighbor Algorithm for Recommendation Systems
A Survey on Hybrid Recommendation Engine for Businesses and Users
A Review of Data Security Challenges and their Solutions in Cloud Computing
Extended Proxy Mobile IPv6 Scheme Using Global Local Mobility Anchor
Boosting Afaan Oromo Named Entity Recognition with Multiple Methods
A Performance of Combined Methods of VCG and 16BCD for Feature Extraction on HSV
A New Vulnerability Reporting Framework for Software Vulnerability Databases
Distributed Intelligence Model for IoT Applications Based on Neural Networks