In this article, we will explore an exciting project in the field of machine learning. We delve into the fascinating world of IEEE Machine Learning and discuss its implications for various industries. Stay tuned as we uncover the latest advancements and applications in this rapidly evolving field. Get ready to embark on a journey of discovery as we unravel the mysteries of machine learning through the lens of this groundbreaking project.
Ready Made Projects Available Here Projects On ML, DL, AI, Java, Cloud Computing , Python ,Image Processing , Distributed Systems & Parallel Processing Further details Can Call me 9581211810
Stock Inventory Management System Project Report Contents ...
https://www.coursehero.com › file › Project-Report
View Lab Report - Project Report from SWE 102 at Mehran University of Engineering and Technology. Stock Inventory Management System Project Report Contents ...
Image processing titles list dream web techno solutionsElakkiya Triplen
This document contains contact information for Triple N Infotech in Chennai and Trichy, India and lists 35 image processing and computer vision project titles. Some of the project titles include "Spatiotemporal Saliency Detection for Video Sequences Based on Random Walk With Restart", "Recognizing Common CT Imaging Signs of Lung Diseases through a New Feature Selection Method Based", and "Automatic Change Analysis in Satellite Images Using Binary Descriptors and Lloyd–Max Quantization". The document provides email and website contact information for Triple N Infotech and lists projects related to topics like image segmentation, retrieval, enhancement, and analysis.
Ready Made Projects Available Here Projects On ML, DL, AI, Java, Cloud Computing , Python ,Image Processing , Distributed Systems & Parallel Processing Further details Can Call me 9581211810
Stock Inventory Management System Project Report Contents ...
https://www.coursehero.com › file › Project-Report
View Lab Report - Project Report from SWE 102 at Mehran University of Engineering and Technology. Stock Inventory Management System Project Report Contents ...
Image processing titles list dream web techno solutionsElakkiya Triplen
This document contains contact information for Triple N Infotech in Chennai and Trichy, India and lists 35 image processing and computer vision project titles. Some of the project titles include "Spatiotemporal Saliency Detection for Video Sequences Based on Random Walk With Restart", "Recognizing Common CT Imaging Signs of Lung Diseases through a New Feature Selection Method Based", and "Automatic Change Analysis in Satellite Images Using Binary Descriptors and Lloyd–Max Quantization". The document provides email and website contact information for Triple N Infotech and lists projects related to topics like image segmentation, retrieval, enhancement, and analysis.
This document summarizes the state of the art and future potential of artificial intelligence in digital forensic investigation. It discusses applications of AI in areas such as data discovery, device triage, network traffic analysis, handling encrypted data, timeline reconstruction, multimedia forensics, and fingerprinting. For each application area, it outlines the current capabilities of AI, challenges, and potential future directions for research.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
Techniques for predicting dark web events focused on the delivery of illicit ...IJECEIAES
Malicious actors, specially trained professionals operating anonymously on the dark web (DW) platform to conduct cyber fraud, illegal drug supply, online kidnapping orders, CryptoLocker induction, contract hacking, terrorist recruitment portals on the online social network (OSN) platform, and financing are always a possibility in the hyperspace. The amount and variety of unlawful actions are increasing, which has prompted law enforcement (LE) agencies to develop efficient prevention tactics. In the current atmosphere of rapidly expanding cybercrime, conventional crime-solving methods are unable to produce results due to their slowness and inefficiency. The methods for accurately predicting crime before it happens "automated machine" to help police officers ease the burden on personnel while also assisting in preventing offense. To achieve and explain the results of a few cases in which such approaches were applied, we advise combining machine learning (ML) with computer vision (CV) strategies. This study's objective is to present dark web crime statistics and a forecasting model for generating alerts of illegal operations like drug supply, people smuggling, terrorist staffing and radicalization, and deceitful activities that are connected to gangs or organizations showing online presence using ML and CV to help law enforcement organizations identify, and accumulate proactive tactics for solving crimes.
Emphasis on Comprehensive ICSE students - KarthiVidhyalaya ICSE SchoolArudhra Innovations
Welcome to the world of KarthiVidhyalaya ICSE School, where education meets excellence! In this blog post, we will delve into the incredible methods employed by the ICSE Academic Education system to empower students and foster holistic development. At KarthiVidhyalaya, we believe in nurturing young minds and preparing them for a successful future. So, let's explore the unique approaches that make the ICSE system stand out!
Interactive Teaching Techniques to ICSE students - KarthiVidhyalaya ICSE SchoolArudhra Innovations
Welcome to the world of KarthiVidhyalaya ICSE School, where we believe in the transformative power of education. In this blog, we will explore the methods used in the ICSE academic education system, specifically at our esteemed institution. By understanding these methods, you will gain insights into the unique learning experience we offer to our students.
More Related Content
Similar to MachineLearningprojectlist-NexgenTechnology
This document summarizes the state of the art and future potential of artificial intelligence in digital forensic investigation. It discusses applications of AI in areas such as data discovery, device triage, network traffic analysis, handling encrypted data, timeline reconstruction, multimedia forensics, and fingerprinting. For each application area, it outlines the current capabilities of AI, challenges, and potential future directions for research.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
Techniques for predicting dark web events focused on the delivery of illicit ...IJECEIAES
Malicious actors, specially trained professionals operating anonymously on the dark web (DW) platform to conduct cyber fraud, illegal drug supply, online kidnapping orders, CryptoLocker induction, contract hacking, terrorist recruitment portals on the online social network (OSN) platform, and financing are always a possibility in the hyperspace. The amount and variety of unlawful actions are increasing, which has prompted law enforcement (LE) agencies to develop efficient prevention tactics. In the current atmosphere of rapidly expanding cybercrime, conventional crime-solving methods are unable to produce results due to their slowness and inefficiency. The methods for accurately predicting crime before it happens "automated machine" to help police officers ease the burden on personnel while also assisting in preventing offense. To achieve and explain the results of a few cases in which such approaches were applied, we advise combining machine learning (ML) with computer vision (CV) strategies. This study's objective is to present dark web crime statistics and a forecasting model for generating alerts of illegal operations like drug supply, people smuggling, terrorist staffing and radicalization, and deceitful activities that are connected to gangs or organizations showing online presence using ML and CV to help law enforcement organizations identify, and accumulate proactive tactics for solving crimes.
Similar to MachineLearningprojectlist-NexgenTechnology (20)
Emphasis on Comprehensive ICSE students - KarthiVidhyalaya ICSE SchoolArudhra Innovations
Welcome to the world of KarthiVidhyalaya ICSE School, where education meets excellence! In this blog post, we will delve into the incredible methods employed by the ICSE Academic Education system to empower students and foster holistic development. At KarthiVidhyalaya, we believe in nurturing young minds and preparing them for a successful future. So, let's explore the unique approaches that make the ICSE system stand out!
Interactive Teaching Techniques to ICSE students - KarthiVidhyalaya ICSE SchoolArudhra Innovations
Welcome to the world of KarthiVidhyalaya ICSE School, where we believe in the transformative power of education. In this blog, we will explore the methods used in the ICSE academic education system, specifically at our esteemed institution. By understanding these methods, you will gain insights into the unique learning experience we offer to our students.
Introducing a compilation of captivating IEEE Python projects titles. Explore an array of stimulating ideas that will ignite your passion for coding and innovation. Whether you are a seasoned developer or a beginner eager to dive into the world of Python, this collection will surely inspire you to embark on your next project. So, brace yourself for a thrilling journey through the realm of Python programming as we present a curated list of remarkable project titles that will challenge and expand your coding skills. Let's begin!
In this article, we will be exploring a fascinating topic that has captured the attention of many Java enthusiasts: IEEE Java Projectlist. Whether you are a seasoned developer or just starting out, you're in for a treat. So, without further ado, let's dive into the world of IEEE Java Projectlist and discover the amazing possibilities it offers. Stay tuned for insightful information and helpful tips that will take your Java projects to the next level.
IEEE Projects: We specialize in IEEE projects, covering a broad spectrum of domains such as computer science, electronics, and electrical engineering. Our team of experts is well-versed in the latest IEEE standards, ensuring that our solutions are both reliable and future-proof.
Power Integrated is a leading technology company that is dedicated to pushing the boundaries of what is possible. With a team of highly skilled engineers and professionals, we have established ourselves as a trusted name in the industry. We pride ourselves on our expertise in IEEE, wireless, sensor, and embedded projects, and our commitment to delivering exceptional results
As we continue to forge ahead in the realm of wireless sensor and embedded projects, Power Integrated remains dedicated to driving technological advancements that shape the future. We invite you to join us on this exciting journey as we explore uncharted territories, break barriers, and build a better tomorrow.
The Kumbakonam Friends Track Call Taxi tour starts at the entrance of the temple. From there, the taxi takes you through the narrow lanes of Kumbakonam, where you can see the traditional houses, narrow alleys and the quaint shops selling traditional items. The tour also takes you to a few of the nearby temples, like the Meenakshi Temple, Nageshwara Temple, and the Pillaiyar Temple.
Welcome to Kumbakonam Friends Track Call Taxi! We are pleased to offer you a one day tour of the Vainava Navagraham temple. This temple is one of the most important Vaishnavite temples in Kumbakonam and is dedicated to the nine planets or Navagrahams
The world of sewing machines has seen several innovations and technological advancements in recent years. These innovations aim to improve sewing efficiency, precision, and ease of use
Our Aluminites’ , students are placed well in prominent institutions like IIT Pune, Indira Gandhi university, Delhi VIT,SRM, Government medical colleges and other prestigious institutions in Chennai, other states and Aboard countries.
Some of them have finished their degree and are pursuing their higher PG courses, abroad whereas some are working in top IT companies. Our Aim was to produce a holistic growth in students, where they not only excel in studies but also have value and ethics, with good physique in word and soul.
Address
No.3 Melaiyur, Poompuhar Main Rd, Karuvazhakarai, Tamil Nadu 609304 Mayiladuthurai
+91 9786108080
+91 9786208080
info@alagujothiacademy.in
Alagujothi Aacdemy Gurukulam & Vidhyalaya CBSE School
https://alagujothiacademy.in/
Get Location
https://g.page/alagu-jothi-academy?share
Our AJA building stands tall with a state of the art which is in the shape of a lamp. Signifying “ALAGUJOTHI”, enlightening the students from darkness. We are overwhelmed with our students performances, who never disappoints us to score a cent percent results in X th and XII th CBSE board exams since 2014 have been topping the District level consistently
As of now, our students have been the best performers in co-curricular and extra-curricular activities such as Indoor or outdoor games, in this district. We have produced State level and National champions in Archery ,Yoga and Athletics. Science Olympiad and Maths Olympiad are conducted to bring out the best talent in students.
Address
No.3 Melaiyur, Poompuhar Main Rd, Karuvazhakarai, Tamil Nadu 609304 Mayiladuthurai
+91 9786108080
+91 9786208080
info@alagujothiacademy.in
Alagujothi Aacdemy Gurukulam & Vidhyalaya CBSE School
Get Location
https://alagujothiacademy.in/
https://g.page/alagu-jothi-academy?share
Alagu Jothi Academy strives to provide a wholesome growth to its student’s right from the formative years. The curriculum has been designed in a well structured manner to satisfy the insatiable hunger of the young minds. The pedagogy is supported by research and modern techniques, so that the learning is in depth.
Address
No.3 Melaiyur, Poompuhar Main Rd, Karuvazhakarai, Tamil Nadu 609304 Mayiladuthurai
+91 9786108080
+91 9786208080
info@alagujothiacademy.in
Alagujothi Aacdemy Gurukulam & Vidhyalaya CBSE School
https://alagujothiacademy.in/
Get Location
https://g.page/alagu-jothi-academy?share
The alumni manager based application that can be accessed throughout world. Anyone can access the search Engine to know about any alumni of that college but can’t able to add. Alumni can only update the database when they are in the college. The application for the storage of the data has been planned. The database connectivity is planned using the “SQL Connection” methodology. The standards of security and data protective mechanism have been given a big choice for proper usage. Alumni Management System The application takes care of different modules and their associated reports, which are produced as per the applicable strategies and standards that are put forwarded by the administrative staff.
This document provides a list of 60 Android and PHP project titles for developing mobile applications. The projects are categorized into different domains such as Cryptography (encryption, security), Real Time (location-based, on-demand), Business (e-commerce, management), Education, Social, and Shopping. Each project listing includes a brief title and domain category. The document also describes the support that will be provided for the projects, including documents, installation/configuration videos, software packages, delivery of source code and documents, and future enhancements.
Resent IEEE projects in VLSI for final year engineering students, we done projects on all Categories like Cryptography, VLSI Testing, Core VLSI, DSP, Communication. Cryptography is about constructing and analyzing protocols that block adversaries, various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation are central to modern cryptography. VLSI testing is a design technique in which parts of a circuit are used to test the circuit itself. Parts of a circuit that must be operational to execute a self test.
Baseband and DSP engines are at the heart of any modern communication system. Translating complicated descriptions of a describing protocol into efficient and optimized computational engines with optimized power-delay-area-yield-test features is a valuable expertise that we have built in this lab. As the following list prescribes, in most of the major communication paradigms, including LAN, WAN, PAN, wired and wireless varieties, we have developed system level simulators, prepared optimized bit-true modeling means, and based upon which have prepared ASIC and FPGA implementations. Alternative design tradeoffs at system, bit-width and algorithm determination, and implementation levels are explored and investigated. The following list shows a sample of the performed research
HOW TO START UP A COMPANY A STEP-BY-STEP GUIDE.pdf46adnanshahzad
How to Start Up a Company: A Step-by-Step Guide Starting a company is an exciting adventure that combines creativity, strategy, and hard work. It can seem overwhelming at first, but with the right guidance, anyone can transform a great idea into a successful business. Let's dive into how to start up a company, from the initial spark of an idea to securing funding and launching your startup.
Introduction
Have you ever dreamed of turning your innovative idea into a thriving business? Starting a company involves numerous steps and decisions, but don't worry—we're here to help. Whether you're exploring how to start a startup company or wondering how to start up a small business, this guide will walk you through the process, step by step.
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...my Pandit
Dive into the steadfast world of the Taurus Zodiac Sign. Discover the grounded, stable, and logical nature of Taurus individuals, and explore their key personality traits, important dates, and horoscope insights. Learn how the determination and patience of the Taurus sign make them the rock-steady achievers and anchors of the zodiac.
The Most Inspiring Entrepreneurs to Follow in 2024.pdfthesiliconleaders
In a world where the potential of youth innovation remains vastly untouched, there emerges a guiding light in the form of Norm Goldstein, the Founder and CEO of EduNetwork Partners. His dedication to this cause has earned him recognition as a Congressional Leadership Award recipient.
Discover timeless style with the 2022 Vintage Roman Numerals Men's Ring. Crafted from premium stainless steel, this 6mm wide ring embodies elegance and durability. Perfect as a gift, it seamlessly blends classic Roman numeral detailing with modern sophistication, making it an ideal accessory for any occasion.
https://rb.gy/usj1a2
[To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
This presentation is a curated compilation of PowerPoint diagrams and templates designed to illustrate 20 different digital transformation frameworks and models. These frameworks are based on recent industry trends and best practices, ensuring that the content remains relevant and up-to-date.
Key highlights include Microsoft's Digital Transformation Framework, which focuses on driving innovation and efficiency, and McKinsey's Ten Guiding Principles, which provide strategic insights for successful digital transformation. Additionally, Forrester's framework emphasizes enhancing customer experiences and modernizing IT infrastructure, while IDC's MaturityScape helps assess and develop organizational digital maturity. MIT's framework explores cutting-edge strategies for achieving digital success.
These materials are perfect for enhancing your business or classroom presentations, offering visual aids to supplement your insights. Please note that while comprehensive, these slides are intended as supplementary resources and may not be complete for standalone instructional purposes.
Frameworks/Models included:
Microsoft’s Digital Transformation Framework
McKinsey’s Ten Guiding Principles of Digital Transformation
Forrester’s Digital Transformation Framework
IDC’s Digital Transformation MaturityScape
MIT’s Digital Transformation Framework
Gartner’s Digital Transformation Framework
Accenture’s Digital Strategy & Enterprise Frameworks
Deloitte’s Digital Industrial Transformation Framework
Capgemini’s Digital Transformation Framework
PwC’s Digital Transformation Framework
Cisco’s Digital Transformation Framework
Cognizant’s Digital Transformation Framework
DXC Technology’s Digital Transformation Framework
The BCG Strategy Palette
McKinsey’s Digital Transformation Framework
Digital Transformation Compass
Four Levels of Digital Maturity
Design Thinking Framework
Business Model Canvas
Customer Journey Map
Zodiac Signs and Food Preferences_ What Your Sign Says About Your Tastemy Pandit
Know what your zodiac sign says about your taste in food! Explore how the 12 zodiac signs influence your culinary preferences with insights from MyPandit. Dive into astrology and flavors!
IMPACT Silver is a pure silver zinc producer with over $260 million in revenue since 2008 and a large 100% owned 210km Mexico land package - 2024 catalysts includes new 14% grade zinc Plomosas mine and 20,000m of fully funded exploration drilling.
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...BBPMedia1
Nathalie zal delen hoe DEI en ESG een fundamentele rol kunnen spelen in je merkstrategie en je de juiste aansluiting kan creëren met je doelgroep. Door middel van voorbeelden en simpele handvatten toont ze hoe dit in jouw organisatie toegepast kan worden.
NIMA2024 | De toegevoegde waarde van DEI en ESG in campagnes | Nathalie Lam |...
MachineLearningprojectlist-NexgenTechnology
1. Machine Learning Project List -2023 -2024
TTSML1 Machine Learning Techniques for Sentiment Analysis of COVID-19
Related Twitter Data
TTSML2 Cyberbullying Detection in Social Networks: A Comparison Between
Machine Learning and Transfer Learning Approaches
TTSML3 Phishing Detection System Through Hybrid Machine Learning Based on URL
TTSML4 Classification and Prediction of Significant Cyber Incidents (SCI) using
Data Mining andMachine Learning (DM-ML)
TTSML5 Crime Prediction Using Machine Learning and Deep Learning: A
Systematic Review andFuture Directions
TTSML6 Credit Card Fraud Detection Using State-of-the-Art Machine Learning
and Deep LearningAlgorithms
TTSML7 Alzheimer’s Disease Detection Using Comprehensive Analysis of Timed
Up and Go Testvia Kinect V.2 Camera and Machine Learning
TTSML8 A Systematic Method of Stroke Prediction Model based on Big
Data and MachineLearning
TTSML9 Hyper spectral Anomaly Detection Based on Machine Learning: An Overview
TTSML10 Detecting Malicious URLs Using Machine Learning Techniques:
Review and ResearchDirections
TTSML11 Malware Detection: A Framework for Reverse Engineered Android
Applications ThroughMachine Learning Algorithms
TTSML12 Fraud Detection in Banking Data by Machine Learning Techniques
TTSML13 A Two-Stage Feature Selection Approach for Fruit Recognition Using
Camera ImagesWith Various Machine Learning Classifiers
TTSML14 A Machine Learning-Based Classification and Prediction Technique for DDoS
2. Attacks
TTSML15 Empirical Analysis for Crime Prediction and Forecasting Using
Machine Learning andDeep Learning Techniques
TTSML16 Learning Speech Emotion Representations in the Quaternion
TTSML17 Machine Learning Techniques for Sentiment Analysis of COVID-19-
Related Twitter DataTTSML18 Robust IoT Malware Detection and Classification
Using Opcode Category Features on
Machine Learning
TTSML19 Impact of Nutritional Factors in Blood Glucose Prediction in Type 1
Diabetes ThroughMachine Learning
TTSML20 Fraud Detection in Banking Data by Machine Learning Techniques
TTSML21 Active Learning Based on Transfer Learning Techniques for Text
Classification TTSML22 A Holistic Approach on Airfare Price Prediction Using
Machine Learning Techniques TTSML23 A Machine Learning Framework for Early-
Stage Detection of Autism Spectrum Disorders
TTSML24 Diagnosis of Malaria Using Double Hidden Layer Extreme Learning
Machine AlgorithmWith CNN Feature Extraction and Parasite Inflator
TTSML25 Predicting Coronary Heart Disease Using an Improved LightGBM
Model: PerformanceAnalysis and Comparison
TTSML26 FMDADM: A Multi-Layer DDoS Attack Detection and Mitigation
Framework UsingMachine Learning for Stateful SDN-Based IoT
Networks
TTSML27 Multiscale Adaptive Fusion Network for Hyperspectral Image Denoising
TTSML28 Emotion Recognition of Subjects With Hearing Impairment Based on
Fusion of FacialExpression and EEG Topographic Map
TTSML29 Smart Edge-Based Driver Drowsiness Detection in Mobile Crowdsourcing
3. TTSML30 The Age of Ransomware: A Survey on the Evolution, Taxonomy, and
Research Directions
TTSML31 Object-Centric Masked Image Modeling-Based Self-Supervised
Pretraining for RemoteSensing Object Detection
TTSML32 Risk Prediction of Alzheimer’s Disease Conversion in Mild
Cognitive ImpairedPopulation Based on Brain Age Estimation
TTSML33 Network Intrusion Detection with Two-Phased Hybrid Ensemble
Learning and AutomaticFeature Selection
TTSML34 Brain Tumor Detection and Classification Using Intelligence Techniques: An
Overview
TTSML35 Forecasting Tourism Demand by a Novel Multi-Factors Fusion Approach
TTSML36 Crop Prediction Based on Characteristics of the Agricultural
Environment Using VariousFeature Selection Techniques and
Classifiers
TTSML37 Development of a Customer Churn Model for Banking Industry Based
on Hard and SoftData Fusion
TTSML38 Student Performance Patterns in Engineering at the University of
Johannesburg: AnExploratory Data Analysis
TTSML39 Classification and Prediction of Significant Cyber Incidents (SCI) using
Data Mining andMachine Learning (DM-ML)
TTSML40 Remote Sensing Scene Classification Via Multigranularity Alternating Feature
Mining
TTSML41 Impact of Mobile Technology and Use of Big Data in Physics
Education DuringCoronavirus Lockdown
TTSML42 An overview of data integration in neuroscience with focus on Alzheimer’s
Disease
4. TTSML43 Human Activity Recognition Based on Deep-Temporal Learning Using
Convolution Neural Networks Features and Bidirectional Gated Recurrent
Unit With Features Selection
TTSML44 Characterization of Synthetic Health Data Using Rule-Based Artificial
Intelligence Models
TTSML45 A Hierarchical Intrusion Detection Model Combining Multiple Deep
Learning ModelsWith Attention Mechanism
TTSML46 Gene Expression Data Analysis Using Feature Weighted
Robust Fuzzy c-MeansClustering
TTSML47 Fraud Detection in Banking Data by Machine Learning Techniques
TTSML48 Community Detection Algorithms in Healthcare Applications: A
Systematic Review
TTSML49 Satellite Image Classification Using a Hybrid Manta Ray Foraging
Optimization NeuralNetwork
TTSML50 Reversible data hiding in encrypted images with secret sharing
and hybrid coding
TTSML51 Cloud-Based Intrusion Detection Approach Using Machine
Learning Techniques
TTSML52 Consumer Behavior Analysis on Sales Process Model Using Process
Discovery Algorithmfor the Omnichannel Distribution System
TTSML53 Entropy-Aware Similarity for Balanced Clustering: A Case Study
With MelanomaDetection
TTSML54 SDOT: Secure Hash, Semantic Keyword Extraction, and Dynamic
Operator Pattern-BasedThree-Tier Forensic Classification Framework
5. TTSML55 Human Pose Estimation Using Thermal Images
TTSML56 DeepRetention: A Deep Learning Approach for Intron Retention Detection
TTSML57 RF-PSSM: A Combination of Rotation Forest Algorithm and Position-
Specific Scoring Matrix for Improved Prediction of Protein-Protein
Interactions Between Hepatitis C Virusand Human
TTSML58 An Improved Lightweight Yolo-Fastest V2 for Engineering Vehicle
Recognition FusingLocation Enhancement and Adaptive Label
Assignment
TTSML59 RadioPathomics: Multimodal Learning in Non-Small Cell Lung
Cancer for AdaptiveRadiotherapy
TTSML60 An Ensemble Learning Based Intrusion Detection Model for Industrial IoT
Security
TTSML61 Using Machine Learning to Establish the Concerns of Persons With
HIV/AIDS During theCOVID-19 Pandemic From Their Tweets
TTSML62 A Novel Machine Learning Approach for Android Malware Detection
Based on the Co-Existence of Features
TTSML63 Static-Dynamic Temporal Networks for Parkinson’s Disease
Detection and SeverityPrediction
TTSML64 A High-Quality Rice Leaf Disease Image Data Augmentation Method
Based on a DualGAN
TTSML65 Big Data ML-Based Fake News Detection Using
Distributed Learning TTSML66 Real-Time Analytics: Concepts,
Architectures, and ML/AI Considerations
TTSML67 Deep Convolutional Network Based Machine Intelligence Model
for Satellite CloudImage Classification
TTSML68 Energy-Efficient Object Tracking Using Adaptive ROI
Subsampling and DeepReinforcement Learning
6. TTSML69 Malaria Disease Cell Classification With Highlighting Small
Infected RegionsTTSML70Enhanced Text-to-Image Synthesis With Self-
Supervision
TTSML71 Secure Medical Image Communication Using Fragile Data Hiding
Based on DiscreteWavelet Transform and A5 Lattice Vector
Quantization
TTSML72 Deep Learning in Cervical Cancer Diagnosis: Architecture,
Opportunities, and OpenResearch Challenges
TTSML73 Deep Learning-Based Multiscale Pyramid Sieve and Analysis
Module in ImageSegmentation
TTSML74 A Novel Image Cryptosystem Inspired by the Generation of Biological Protein
Sequences
TTSML75 A Deep Learning-Based Experiment on Forest Wildfire Detection in
Machine VisionCourse
TTSML76 Deep Cleaner—A Few Shot Image Dataset Cleaner Using
Supervised ContrastiveLearning
TTSML77 A High-Quality Rice Leaf Disease Image Data Augmentation Method
Based on a DualGAN
TTSML78 Hyperspectral Image Classification: An Analysis Employing CNN,
LSTM, Transformer,and Attention Mechanism
TTSML79 Assessing the Ability of Generative Adversarial Networks to Learn
Canonical MedicalImage Statistics
TTSML80 FieldPlant: A Dataset of Field Plant Images for Plant Disease Detection
and ClassificationWith Deep Learning
7. TTSML81 Classification of Liver Fibrosis From Heterogeneous
Ultrasound Image TTSML82 Multiscale Adaptive Fusion
Network for Hyperspectral Image Denoising
TTSML83 Modified Salp Swarm Algorithm With Deep Learning Based
Gastrointestinal TractDisease Classification on Endoscopic
Images
TTSML84 Improving Image Compression With Adjacent Attention and Refinement
Block
TTSML85 Building Detection From Panchromatic and Multispectral Images
With Dual-StreamAsymmetric Fusion Networks
TTSML86 Noise-Against Skeleton Extraction Framework and Application
on Hand GestureRecognition
TTSML87 An Underwater Target Wake Detection in Multi-Source Images
Based on ImprovedYOLOv5
TTSML88 Spatial Context-Aware Object-Attentional Network for Multi-Label Image
Classification
TTSML89 An Integrated Image Encryption Scheme Based on Elliptic Curve
Class-Adaptive DataAugmentation for Image Classification
TTSML90 Low-Light Image Enhancement Using a Simple Network Structure
TTSML91 Multi-Level Residual Feature Fusion Network for Thoracic Disease
Classification in ChestX-Ray Images
TTSML92 Image Generation and Recognition Technology Based on Attention Residual
GAN
TTSML93 Detecting COVID-19 From Lung Computed Tomography Images: A
Swarm OptimizedArtificial Neural Network Approach
TTSML94 A Deep Ensemble Learning-Based CNN Architecture for
Multiclass Retinal FluidSegmentation in OCT Images
8. TTSML95 AlzheimerNet: An Effective Deep Learning Based Proposition for
Alzheimer’s DiseaseStages Classification From Functional Brain
Changes in Magnetic Resonance Images
TTSML96 Application of X-Ray Imaging and Convolutional Neural Networks in
the Prediction ofTomato Seed Viability
1. A Deep Learning Approach for Semantic Analysis of COVID-19-Related Stigma on
Social Media
2. A Deep Learning Ensemble with Data Resampling for Credit Card Fraud
Detection
3. Accelerating Crop Yield: Multisensor Data Fusion and Machine Learning for
Agriculture Text Classification
4. A Transfer Learning Approach to Breast Cancer Classification in a Federated Learning
Framework
5. Big Data ML-Based Fake News Detection Using Distributed Learning
6. Brain Tumor Detection and Classification Using Intelligence Techniques: An
Overview
7. Comparative Analysis of Intrusion Detection Systems and Machine Learning-Based
Model Analysis Through Decision Tree
8. Crime Prediction Using Machine Learning and Deep Learning: A Systematic Review
and Future Directions
9. Deep Learning in Cervical Cancer Diagnosis:Architecture, Opportunities, and Open
Research Challenges
10. Depression detection from social network data using machine learning techniques
11. DrOGA: An Artificial Intelligence Solution for Driver-Status Prediction of Genomics
Mutations in Precision Cancer Medicine
12. Real-Time Water and Electricity Consumption Monitoring Using Machine Learning
Techniques
13. MedAi: A Smartwatch-Based Application Framework for the Prediction of Common
Diseases Using Machine Learning
14. Fraud Detection in Banking Data by Machine Learning Techniques
9. 15. ECG Measurement System for Vehicle Implementation and Heart Disease
Classification Using Machine Learning
16. Modified Earthworm Optimization With Deep Learning Assisted Emotion Recognition
for Human Computer Interface
17. Explainable Artificial Intelligence (EXAI) Models for Early Prediction of Parkinson’s
Disease Based on Spiral and Wave Drawings
18. Impact of Nutritional Factors in Blood Glucose Prediction in Type 1 Diabetes Through
Machine Learning
19. Multi-Label Multimodal Emotion Recognition With Transformer-Based Fusion and
Emotion-Level Representation Learning
20. Multiple Types of Cancer Classification Using CT/MRI Images Based on Learning
Without Forgetting Powered Deep Learning Models
21. Pathogen-Based Classification of Plant Diseases: A Deep Transfer Learning Approach
for Intelligent Support Systems
22. Phishing Detection System Through Hybrid Machine Learning Based on URL
23. Political Security Threat Prediction Framework Using Hybrid Lexicon-Based
Approach and Machine Learning Technique
24. Remote Sensing Based Crop Type Classification Via Deep Transfer Learning
25. Using Features Extracted From Upper Limb Reaching Tasks to Detect Parkinson’s
Disease by Means of Machine Learning Models