Classification of dataset that have an imbalance in there classes still a challenge to the real world problem and a lot of research has been done and continuously being done to get a resolution to this problem, SMOTE ...
详细信息
Secure hash functions are widely used in cryptographic algorithms to secure against diverse attacks. A one-way secure hash function is used in the various research fields to secure, for instance, blockchain. Notably, ...
详细信息
This paper aims to the design and development of a miniaturized model of a baggage carrying robot that can autonomously navigate from its parking place to the passenger at the airport and follow the passenger by avoid...
详细信息
With recent fast development of artificial intelligence and related techniques, computer-aided diagnosis is increasingly emerging. During the process of automated diagnosis, the importance of explainable decision maki...
详细信息
Distributed denial-of-service attacks represent a significant threat to the delivery and integrity of network services. The attacks inundate a specific community or tool with excessive internet traffic, making it impo...
详细信息
India is among the biggest tea exporter in the world. However, tea leaf diseases caused by persistent pathogen exposure result in considerable crop yield losses around the world. Detection of the disease of tea leaves...
详细信息
For the goal of video retrieval, this research proposes wavelet transformations on deep spatiotemporal characteristics. The component-wise similarities between the query video feature and prototype video feature are c...
详细信息
The rapid advance in the number of vehicles on the road led to a corresponding growth in demand for parking spaces. However, conventional car parking systems are inefficient and time-consuming. Smart Parking systems a...
详细信息
Short message spam poses a significant threat for all mobile phone users, as it can act as an efficient tool for cyberattacks including spreading malware and phishing. Traditional anti-spam measures are only minimally...
Short message spam poses a significant threat for all mobile phone users, as it can act as an efficient tool for cyberattacks including spreading malware and phishing. Traditional anti-spam measures are only minimally effective against modern spammers. Intelligent analysis of the content to categorise the messages as Spam (unwanted and unsolicited) or Ham (useful messages) is therefore essential to safeguard the user from such attacks. Various artificial intelligence (AI) techniques are proving to be useful in the analysis of the content of such short messages to classify and filter spam. We have trained, validated and tested seven such AI techniques on the SMS spam collection dataset to identify the best model for designing and developing a content based classification system. Recurrent Neural Networks (RNN) have shown the highest performance metrics (Test Accuracy: 99.28%) and hence our proposed system includes a RNN model for classification. A web app of this system has also been deployed where a single SMS can be input and the designed system can classify it as Spam or Ham. The designed system is compared against existing systems and is found to be significantly better.
A still in-progress technology of the Industrial Internet of things (IIoT) involves the use of machine-to-machine (M2M) for communication. It can serve the whole purpose of automation in industries by integrating it w...
详细信息
暂无评论