{"title":"Facial expression recognition based scoring system for restaurants by using deep learning concepts","authors":"B. Leelavathi","doi":"10.33545/27076571.2020.v1.i2a.10","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.10","url":null,"abstract":"Now-a-days in advance countries automated unmanned restaurants are more popular as this restaurants will not have any human power to take customer feedbacks about food quality and service and to automate this process author has introduce concept called ‘Deep Learning Facial Expression Recognition Based Scoring System For Restaurants’ where customers will be asked to give rating to food and upload his photo and based on user facial expression application will inform whether customer was satisfied or not. To extract facial expressions from photo we are using CNN (Convolution Neural Networks) machine learning algorithm. This algorithm can predict 3 different expression from photo such as satisfied, neutral or disappointed.","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133030237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handwritten character recognition using tensor flow","authors":"Satheesh Parathooru","doi":"10.33545/27076571.2020.v1.i2a.16","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.16","url":null,"abstract":"","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115374353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security women through analysis of twitter messages","authors":"Vanitha G","doi":"10.33545/27076571.2020.v1.i2a.17","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.17","url":null,"abstract":"","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131042667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of gender and age using supervised ML technique","authors":"Pavan Kumar Vakati","doi":"10.33545/27076571.2020.v1.i2a.14","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.14","url":null,"abstract":"","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114866782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust malware detection using deep eigenspace learning","authors":"Erraguntla Purushotham","doi":"10.33545/27076571.2020.v1.i2a.11","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.11","url":null,"abstract":"","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131338392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing and detecting of phishing attacks in online social networks","authors":"Manasa Sl","doi":"10.33545/27076571.2020.v1.i2a.13","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.13","url":null,"abstract":"","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121471415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fraud identification of credit card using ML techniques","authors":"Roopesh Akula","doi":"10.33545/27076571.2020.v1.i2a.15","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i2a.15","url":null,"abstract":"","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126817850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identify cancer details using SVM algorithm","authors":"Sadiya Firdouse","doi":"10.33545/27076571.2020.v1.i1a.8","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i1a.8","url":null,"abstract":"Among different illnesses, malignant growth has become a major danger to people internationally. According to Indian populace evaluation information, the pace of mortality because of malignant growth in India was high and disturbing with around 806000 existing cases before the finish of the only remaining century. Malignant growth is the second most regular illness in India liable for greatest mortality with about 0.3 million passing for every year. This is attributable to the poor accessibility of counteraction, conclusion and treatment of the infection. A wide range of tumors have been accounted for in Indian populace including the malignant growths of skin, lungs, bosom, rectum, stomach, prostate, liver, cervix, throat, bladder, blood, mouth and so forth. The reasons for such high frequency paces of these diseases might be both interior (hereditary, changes, hormonal, poor safe conditions) and outer or natural elements (nourishment propensities, industrialization, over development of populace, social and so on.). In perspective on these realities, the present article depicts the status of different sorts of malignancies in India and its examination at worldwide level. Furthermore, endeavors have been made to depict the primary driver of disease alongside their preventive measures. What's more, endeavors have additionally been made to foresee the impact of expanding number of malignancy patients on the Indian economy.","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124426646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medical image analysis using random forest","authors":"Shaik Nasarchand","doi":"10.33545/27076571.2020.v1.i1a.6","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i1a.6","url":null,"abstract":"The huge achievement of AI calculations at picture acknowledgment assignments lately meets with a period of drastically expanded utilization of electronic therapeutic records and analytic imaging. This audit presents the AI calculations as applied to restorative picture examination, concentrating on convolutional neural systems, and stressing clinical parts of the field. The upside of AI in a time of therapeutic enormous information is that significant hierarchal connections inside the information can be found algorithmically without difficult hand-making of highlights. We spread key research regions and utilizations of therapeutic picture classification, restriction, location, division, and enlistment. We finish up by examining research deterrents, developing patterns, and conceivable future bearings.","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115435815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Suicidal behavior among Iranian psychiatric patients","authors":"Sundupalli Rajesh","doi":"10.33545/27076571.2020.v1.i1a.7","DOIUrl":"https://doi.org/10.33545/27076571.2020.v1.i1a.7","url":null,"abstract":"Recent advances in Internet of Things (IoT) technologies require a new type of IoT security environment. Various heterogeneous smart devices have easy access to IoT environment, and as the number of users increases, they are exposed to various threats such as malicious attacks on IoT devices and IoT infrastructure, and data tampering by malicious code. Malware detection in IoT requires data and models for continuous and changing learning of smart devices. Methods/Statistical analysis: To minimize these security threats, various malware detection techniques in the field of IoT security have been studied. Malware detection in IoT environment is important for data derivation and learning model required for continuous and changing learning of smart devices. The metadata of malware detection can be normalized by the value of device id, time, behavior, location and state. This paper proposes behavior-based malware detection using deep learning (BMD-DL). Findings: BMD-DL was able to collect metadata about behavior-based malicious behavior and learn and detect malicious codes through deep learning. In addition, through the learned model, IoT Security is provided by disconnecting malicious devices that cause malicious behavior in the IoT environment. Improvements/Applications: BMD-DL collects behavioral data generated from multiple devices in the IoT and applies the results learned through deep learning to detect persistent malware.","PeriodicalId":175533,"journal":{"name":"International Journal of Computing and Artificial Intelligence","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132306942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}