Искусственный интеллект - 004.8

Научные статьи

В разделе "Искусственный интеллект"
A New Vulnerability Reporting Framework for Software Vulnerability Databases
Hakan Kekül, Burhan Ergen, Halil Arslan
Distributed Intelligence Model for IoT Applications Based on Neural Networks
Baha Rababah, Rasit Eskicioglu
Multicriteria Decision Making using Analytic Hierarchy Process for Child Protection from Malicious Content on the Internet
Fargana J. Abdullayeva, Sabira S. Ojagverdiyeva
Intrusion Detection System Using Ensemble of Rule Learners and First Search Algorithm as Feature Selectors
D. P. Gaikwad
Bangla News Headline Categorization
Amran Hossain, Niraj Chaudhary, Zahid Hasan Rifad, B. M. Mainul Hossain
An Automatic Recognition, Identification and Classification of Mitotic Cells for the Diagnosis of Breast Cancer Stages
Shwetha S.V., Dharmanna L.
A Comparative Study of Soft Biometric Traits and Fusion Systems for Face-based Person Recognition
Samuel Ezichi, Ijeoma J.F. Ezika, Ogechukwu N. Iloanusi
CIPP-SAW Application as an Evaluation Tool of E-Learning Effectiveness
Dewa Gede Hendra Divayana, I Putu Wisna Ariawan, Made Kurnia Widiastuti Giri
Robust 4-D Hyperchaotic DNA Framework for Medical Image Encryption
Shaymaa Fahmee Alqazzaz, Gaber A. Elsharawy, Heba F. Eid
Achieving Performability and Reliability of Data Storage in the Internet of Things
Negar Taheri, Shahram Jamali, Mohammad Esmaeili
Towards Ambient Assisted Living (AAL): Design of an IoT-based Elderly Activity Monitoring System
I.D.M.S. Rupasinghe, M.W.P. Maduranga
Indian Sign Language Recognition Using 2-D Convolution Neural Network and Graphical User Interface
Shashidhar R., Arunakumari B. N., A. S. Manjunath, Roopa M.
Development of Secure Electronic Cybercrime Cases Database System for the Judiciary
Olawale Surajudeen Adebayo, Joshua Bulus Micah, Ganiyu Shefiu Olusegun, Ishaq O. Alabi, Lateefah Abdulazeez
Scientific and Methodological bases of Complex Assessment of Threats and Damage to Information Systems of the Digital Economy
Alovsat Garaja Aliyev, Roza Ordukhan Shahverdiyeva
EUR/USD Exchange Rate Prediction Using Machine Learning
Md. Soumon Aziz Sarkar, U.A. Md. Ehsan Ali
Adversarial Machine Learning Attacks and Defenses in Network Intrusion Detection Systems
Amir F. Mukeri, Dwarkoba P. Gaikwad
Clustering Method of Mobile Cloud Computing According to Technical Characteristics of Cloudlets
Rashid G. Alakberov
Estimating Missing Security Vectors in NVD Database Security Reports
Hakan Kekül, Burhan Ergen, Halil Arslan
A Novel Hierarchical Document Clustering Framework on Large TREC Biomedical Documents
Pilli. Lalitha Kumari, M. Jeeva, Ch. Satyanarayana
Development of a Mobile-Based Hostel Location and Recommendation Chatbot System
Folasade Olubusola Isinkaye, Imran Gbolahan AbiodunBabs, Michael Tobi Paul
A Fuzzy Approach to Fault Tolerant in Cloud using the Checkpoint Migration Technique
Noshin Hagshenas, Musa Mojarad, Hassan Arfaeinia
Secured Wireless Sensor Network Protocol using Rabin-assisted Multifactor Authentication
Javeria Ambareen, Prabhakar M.
An Improved Popular Items Extraction for Covering Reduction Collaborative Filtering
Abubakar Roko, Umar Muhammad Bello, Abba Almu
Eigen and HOG Features based Algorithm for Human Face Tracking in Different Background Challenging Video Sequences
Ranganatha S., Y. P. Gowramma
Sentiment Analysis CSAM Model to Discover Pertinent Conversations in Twitter Microblogs
Imen Fadhli, Lobna Hlaoua, Mohamed Nazih Omri
Evaluation of GAN-based Models for Phishing URL Classifiers
Thi Thanh Thuy Pham, Tuan Dung Pham, Viet Cuong Ta
Ensemble Learning Approach for Classification of Network Intrusion Detection in IoT Environment
Priya R. Maidamwar, Prasad P. Lokulwar, Kailash Kumar
Deep Learning-based Resource Prediction and Mutated Leader Algorithm Enabled Load Balancing in Fog Computing
Shruthi G., Monica R. Mundada, S. Supreeth, Bryan Gardiner
Medicine Management System: Its Design and Development
Ruth G. Luciano, Rhoel Anthony G. Torres, Edward B. Gomez, Hardly Joy D. Nacino, Rodmark D. Ramirez
Deep Learning Based Autonomous Real-Time Traffic Sign Recognition System for Advanced Driver Assistance
Sithmini Gunasekara, Dilshan Gunarathna, Maheshi B. Dissanayake, Supavadee Aramith, Wazir Muhammad
COVID-19 and Malaria Parasite Detection and Classification by Bins Approach with Statistical Moments Using Machine Learning
Hrishikesh Telang, Kavita Sonawane
An Efficient CNN Model for Automatic Diagnosis of Cardiomegaly from Chest Radiographic Images
Akanksha Soni, Avinash Rai
Variable Synergic Squeeze Convoluted Equilibrium Network Enabled Crowd Management in IoT
Jyoti A. Kendule, Kailash J. Karande
Denoising Self-Distillation Masked Autoencoder for Self-Supervised Learning
Jiashu Xu, Sergii Stirenko
Blockchain and IFPS based Secure System for Managing e-FIR
Khandaker Mohammad Mohi Uddin, Sadia Mahamuda, Sikder Sajib Al Shahriar, Md Ashraf Uddin
A Cryptographic based I2ADO-DNN Security Framework for Intrusion Detection in Cloud Systems
M. Nafees Muneera, G. Anbu Selvi, V. Vaissnave, Gopal Lal Rajora
Secure Access of Folders and Files after Removal of Duplicacy over the Cloud
A. Archana, N. Kumar, Mohammad Zubair Khan
Method of Performing Operations on the Elements of GF(2m) Using a Sparse Table
Ivan Dychka, Mykola Onai, Andrii Severin, Cennuo Hu
Container-to-fog Service Integration using the DIS-LC Algorithm
Aruna K., Pradeep G.
An Enhancement of Identity Based Conditional Privacy-preserving Authentication Process in Vehicular Ad Hoc Networks
K. Lakshmi Narayanan, R. Naresh