Искусственный интеллект - 004.8

Научные статьи

В разделе "Искусственный интеллект"
Enhancement of Mammographic Images Based on Wavelet Denoise and Morphological Contrast Enhancement
Toan Le Van, Liet Van Dang
Developing Smart Conversation Agent ECOM-BOT for Ecommerce Applications using Deep Learning and Pattern Matching
Maria Zafar
Assessing Similarity between Software Requirements: A Semantic Approach
Farooq Ahmad, Mohammad Faisal
PARADAJuan: A Web-Based Parking Lot Management System Designed and Developed Using Multi-Paradigm Programming Languages
Ruth G. Luciano, Angelito I. Cunanan, Romualdo P. Mariano, Edrain Nico A. Tavares, Mark Reniel L. Jacinto
Towards a Novel Identity Check Using Latest W3C standards & Hybrid Blockchain for Paperless Verification
Samiur Rahman Khan, Md. Al-Amin
A Systematic Literature Review of Studies Comparing Process Mining Tools
Cuma Ali Kesici, Necmettin Ozkan, Sedat Taskesenlioglu, Tugba Gurgen Erdogan
Intelligent Management of a Network of Smart Billboards on the IoT Platform in Industry 4.0
Hashimova Kamala
A Fast Topological Parallel Algorithm for Traversing Large Datasets
Thiago Nascimento Rodrigues
An Efficient IoT-based Ubiquitous Networking Service for Smart Cities Using Machine Learning Based Regression Algorithm
Prasanna Kumar G., Shankaraiah N.
Beyond the Hype: A Proposed Model Based on Critical Analysis of Blockchain Technology’s Potential to Address Supply Chain Issues
A.S.M. Fazle Rabbi, T.M. Ragib Shahrier, Md. Mushfiqur Rahman Miraz, Sazia Rahman, Dip Nandi
SSKHOA: Hybrid Metaheuristic Algorithm for Resource Aware Task Scheduling in Cloud-fog Computing
M. Santhosh Kumar, K. Ganesh Reddy, Rakesh Kumar Donthi
Machine Learning in Cyberbullying Detection from Social-Media Image or Screenshot with Optical Character Recognition
Tofayet Sultan, Nusrat Jahan, Ritu Basak, Mohammed Shaheen Alam Jony, Rashidul Hasan Nabil
MediBERT: A Medical Chatbot Built Using KeyBERT, BioBERT and GPT-2
Sabbir Hossain, Rahman Sharar, Md. Ibrahim Bahadur, Abu Sufian, Rashidul Hasan Nabil
Design and Implementation of Multi Player Pong Game using Altera DE2 Board
Tonmoy Saha, A. K. Tasfique Ahmed, S. M. Shamsul Alam
Smart Contract Obfuscation Technique to Enhance Code Security and Prevent Code Reusability
Kakelli Anil Kumar, Aena Verma, Hritish Kumar
A Review of Quantum Computing
Arebu Dejen, Murad Ridwan
A Bibliometric Analysis of Embodied Cognition Based on CNKI from 2005 to 2021
Mei Liao, Jia-Fen Wu
Automatic Cyberstalking Detection on Twitter in Real-Time using Hybrid Approach
Arvind Kumar Gautam, Abhishek Bansal
An Intelligent System for Detecting Fake Materials on the Internet
Aya S. Noah, Naglaa E. Ghannam, Gaber A. Elsharawy, Abeer S. Desuky
A Novel Algorithm for Stacked Generalization Approach to Predict Neurological Disorder over Digital Footprints
Tejaswita Garg, Sanjay K. Gupta
Tangent Search Long Short Term Memory with Aadaptive Reinforcement Transient Learning based Extractive and Abstractive Document Summarization
Reshmi P. Rajan, Deepa V. Jose, Roopashree Gurumoorthy
Explainable Fake News Detection Based on BERT and SHAP Applied to COVID-19
Xiuping Men, Vladimir Y. Mariano
Quantum Computers’ threat on Current Cryptographic Measures and Possible Solutions
Tohfa Niraula, Aditi Pokharel, Ashmita Phuyal, Pratistha Palikhel, Manish Pokharel
Implementing Video OCR along with SWT Technique for Video indexing and Analysis
Paruchuru Grishman, Akula Rajitha, Mohammed Khaja Moinuddin, Mannava Subhramanaya Sreekar, Siddam Jayanth
A Technique for PUE Detection and Isolation in Cognitive Radio Network
Samuel A. Adebo, Elizabeth N. Onwuka, Abraham U. Usman, Supreme Ayewoh Okoh, Okwudili Onyishi
A Secure Network for Streamlined and High-Performance Consensus Algorithm based on Blockchain Technology
Deven A. Gol, Nikhil Gondaliya
An Enhanced Method Utilizing Hopfield Neural Model for Mobile Agent Protection
Pradeep Kumar, Niraj Singhal, Ajay Kumar, Kakoli Banerjee
An Analytical Study of Cloud Security Enhancements
Imran Khan, Tanya Garg
Cryptographic Resilience and Efficiency: A Comparative Study of NTRU and ECC Cryptographic Mechanisms for Internet of Medical Things
Alina Pervaiz, Adil Bashir, Maheen Fayaz, Numrena Farooq, Ajaz Hussain Mir
Detection of Threats in Wireless Sensor Network Based on Optics Clustering With DE-BiLSTM Classifier
R. Preethi
Integrated Spatial and Temporal Features Based Network Intrusion Detection System Using SMOTE Sampling
Shrinivas A. Khedkar, Madhav Chandane, Rasika Gawande
Detecting Android Malware by Mining Enhanced System Call Graphs
Rajif Agung Yunmar, Sri Suning Kusumawardani, Widyawan Widyawan, Fadi Mohsen
An Efficient and Secure Blockchain Consensus Algorithm Using Game Theory
Naveen Arali, Narayan D.G., Altaf Husain M., P.S. Hiremath
Auto-metric Graph Neural Network for Attack Detection on IoT-based Smart Environment and Secure Data Transmission using Advanced Wild Horse Standard Encryption Method
Ranganath Yadawad, Umakant P. Kulkarni, Jafar A. Alzubi
A Novel Privacy Preservation Scheme by Matrix Factorized Deep Autoencoder
Pooja Choudhary, Kanwal Garg
Attack Modeling and Security Analysis Using Machine Learning Algorithms Enabled with Augmented Reality and Virtual Reality
Momina Mushtaq, Rakesh Kumar Jha, Manish C. Sabraj, Shubha Jain
Speaker Diarization Using Bi-LSTM and Spectral Clustering
Trisiladevi C. Nagavi, Samanvitha Sateesha, Shreya Sudhanva, Sukirth Shivakumar, Vibha Hullur
Optimized Image Captioning: Hybrid Transformers Vision Transformers and Convolutional Neural Networks: Enhanced with Beam Search
Sushma Jaiswal, Harikumar Pallthadka, Rajesh P. Chinchewadi, Tarun Jaiswal
A Proposed Stacked Machine Learning Model to Predict the Survival of a Patient with Heart Failure
Md. Raihan Mahmud, Dip Nandi, Md. Shamsur Rahim, Christe Antora Chowdhury
A Self-driving Car Controller Module Based on Rule Base Reasoner
Anik Kumar Saha, Md. Abdur Razzaque