International Journal of Computing and Artificial Intelligence最新文献

筛选
英文 中文
Facial expression recognition based scoring system for restaurants by using deep learning concepts 使用深度学习概念的基于面部表情识别的餐厅评分系统
International Journal of Computing and Artificial Intelligence Pub Date : 2020-07-01 DOI: 10.33545/27076571.2020.v1.i2a.10
B. Leelavathi
{"title":"Facial expression recognition based scoring system for restaurants by using deep learning concepts","authors":"B. Leelavathi","doi":"10.33545/27076571.2020.v1.i2a.10","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.10","url":null,"abstract":"Now-a-days in advance countries automated unmanned restaurants are more popular as this restaurants will not have any human power to take customer feedbacks about food quality and service and to automate this process author has introduce concept called ‘Deep Learning Facial Expression Recognition Based Scoring System For Restaurants’ where customers will be asked to give rating to food and upload his photo and based on user facial expression application will inform whether customer was satisfied or not. To extract facial expressions from photo we are using CNN (Convolution Neural Networks) machine learning algorithm. This algorithm can predict 3 different expression from photo such as satisfied, neutral or disappointed.","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133030237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handwritten character recognition using tensor flow 使用张量流的手写字符识别
International Journal of Computing and Artificial Intelligence Pub Date : 2020-07-01 DOI: 10.33545/27076571.2020.v1.i2a.16
Satheesh Parathooru
{"title":"Handwritten character recognition using tensor flow","authors":"Satheesh Parathooru","doi":"10.33545/27076571.2020.v1.i2a.16","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.16","url":null,"abstract":"","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115374353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security women through analysis of twitter messages 安全女性通过分析推特信息
International Journal of Computing and Artificial Intelligence Pub Date : 2020-07-01 DOI: 10.33545/27076571.2020.v1.i2a.17
Vanitha G
{"title":"Security women through analysis of twitter messages","authors":"Vanitha G","doi":"10.33545/27076571.2020.v1.i2a.17","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.17","url":null,"abstract":"","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131042667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of gender and age using supervised ML technique 使用监督机器学习技术对性别和年龄进行分类
International Journal of Computing and Artificial Intelligence Pub Date : 2020-07-01 DOI: 10.33545/27076571.2020.v1.i2a.14
Pavan Kumar Vakati
{"title":"Classification of gender and age using supervised ML technique","authors":"Pavan Kumar Vakati","doi":"10.33545/27076571.2020.v1.i2a.14","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.14","url":null,"abstract":"","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114866782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust malware detection using deep eigenspace learning 基于深度特征空间学习的鲁棒恶意软件检测
International Journal of Computing and Artificial Intelligence Pub Date : 2020-07-01 DOI: 10.33545/27076571.2020.v1.i2a.11
Erraguntla Purushotham
{"title":"Robust malware detection using deep eigenspace learning","authors":"Erraguntla Purushotham","doi":"10.33545/27076571.2020.v1.i2a.11","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.11","url":null,"abstract":"","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131338392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing and detecting of phishing attacks in online social networks 在线社交网络网络钓鱼攻击分析与检测
International Journal of Computing and Artificial Intelligence Pub Date : 2020-07-01 DOI: 10.33545/27076571.2020.v1.i2a.13
Manasa Sl
{"title":"Analyzing and detecting of phishing attacks in online social networks","authors":"Manasa Sl","doi":"10.33545/27076571.2020.v1.i2a.13","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.13","url":null,"abstract":"","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121471415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fraud identification of credit card using ML techniques 利用机器学习技术识别信用卡欺诈
International Journal of Computing and Artificial Intelligence Pub Date : 2020-07-01 DOI: 10.33545/27076571.2020.v1.i2a.15
Roopesh Akula
{"title":"Fraud identification of credit card using ML techniques","authors":"Roopesh Akula","doi":"10.33545/27076571.2020.v1.i2a.15","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.15","url":null,"abstract":"","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identify cancer details using SVM algorithm 使用SVM算法识别癌症细节
International Journal of Computing and Artificial Intelligence Pub Date : 2020-01-01 DOI: 10.33545/27076571.2020.v1.i1a.8
Sadiya Firdouse
{"title":"Identify cancer details using SVM algorithm","authors":"Sadiya Firdouse","doi":"10.33545/27076571.2020.v1.i1a.8","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i1a.8","url":null,"abstract":"Among different illnesses, malignant growth has become a major danger to people internationally. According to Indian populace evaluation information, the pace of mortality because of malignant growth in India was high and disturbing with around 806000 existing cases before the finish of the only remaining century. Malignant growth is the second most regular illness in India liable for greatest mortality with about 0.3 million passing for every year. This is attributable to the poor accessibility of counteraction, conclusion and treatment of the infection. A wide range of tumors have been accounted for in Indian populace including the malignant growths of skin, lungs, bosom, rectum, stomach, prostate, liver, cervix, throat, bladder, blood, mouth and so forth. The reasons for such high frequency paces of these diseases might be both interior (hereditary, changes, hormonal, poor safe conditions) and outer or natural elements (nourishment propensities, industrialization, over development of populace, social and so on.). In perspective on these realities, the present article depicts the status of different sorts of malignancies in India and its examination at worldwide level. Furthermore, endeavors have been made to depict the primary driver of disease alongside their preventive measures. What's more, endeavors have additionally been made to foresee the impact of expanding number of malignancy patients on the Indian economy.","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124426646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Medical image analysis using random forest 基于随机森林的医学图像分析
International Journal of Computing and Artificial Intelligence Pub Date : 2020-01-01 DOI: 10.33545/27076571.2020.v1.i1a.6
Shaik Nasarchand
{"title":"Medical image analysis using random forest","authors":"Shaik Nasarchand","doi":"10.33545/27076571.2020.v1.i1a.6","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i1a.6","url":null,"abstract":"The huge achievement of AI calculations at picture acknowledgment assignments lately meets with a period of drastically expanded utilization of electronic therapeutic records and analytic imaging. This audit presents the AI calculations as applied to restorative picture examination, concentrating on convolutional neural systems, and stressing clinical parts of the field. The upside of AI in a time of therapeutic enormous information is that significant hierarchal connections inside the information can be found algorithmically without difficult hand-making of highlights. We spread key research regions and utilizations of therapeutic picture classification, restriction, location, division, and enlistment. We finish up by examining research deterrents, developing patterns, and conceivable future bearings.","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115435815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Suicidal behavior among Iranian psychiatric patients 伊朗精神病患者的自杀行为
International Journal of Computing and Artificial Intelligence Pub Date : 2020-01-01 DOI: 10.33545/27076571.2020.v1.i1a.7
Sundupalli Rajesh
{"title":"Suicidal behavior among Iranian psychiatric patients","authors":"Sundupalli Rajesh","doi":"10.33545/27076571.2020.v1.i1a.7","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i1a.7","url":null,"abstract":"Recent advances in Internet of Things (IoT) technologies require a new type of IoT security environment. Various heterogeneous smart devices have easy access to IoT environment, and as the number of users increases, they are exposed to various threats such as malicious attacks on IoT devices and IoT infrastructure, and data tampering by malicious code. Malware detection in IoT requires data and models for continuous and changing learning of smart devices. Methods/Statistical analysis: To minimize these security threats, various malware detection techniques in the field of IoT security have been studied. Malware detection in IoT environment is important for data derivation and learning model required for continuous and changing learning of smart devices. The metadata of malware detection can be normalized by the value of device id, time, behavior, location and state. This paper proposes behavior-based malware detection using deep learning (BMD-DL). Findings: BMD-DL was able to collect metadata about behavior-based malicious behavior and learn and detect malicious codes through deep learning. In addition, through the learned model, IoT Security is provided by disconnecting malicious devices that cause malicious behavior in the IoT environment. Improvements/Applications: BMD-DL collects behavioral data generated from multiple devices in the IoT and applies the results learned through deep learning to detect persistent malware.","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132306942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信