Impact of distance measures on partition-based clustering method—an empirical investigation

RK Prasad, S Chakraborty, R Sarmah - International Journal of Information …, 2023 - Springer
Distance-based clustering methods usually employ Euclidean distance as the proximity
measure. This paper first identifies the best among some partition-based clustering methods …

Optimization of Historic Buildings Recognition: CNN Model and Supported by Pre-processing Methods

AH Rangkuti, VH Athala, FH Indallah, E Tanuar… - … : International Journal on …, 2023 - joiv.org
Several cities in Indonesia, such as Cirebon, Bandung, and Bogor, have several historical
buildings that date back to the Dutch colonial period. Several Dutch colonial heritage …

Development and use of Artificial Intelligence in the Defense Sector

A Ali, Z Farid, AH Al-kassem, ZA Khan… - … for Technology and …, 2023 - ieeexplore.ieee.org
The revolutionary possibilities made possible by artificial intelligence (AI) extend to every
aspect of human life. However, if it is a multiplier of progress, it is also a force. It has made it …

Fused Data-Driven Approach for Early Warning Method of Abnormal Conditions in Chemical Process

X Song, F Yin, D Zhao - Processes, 2023 - mdpi.com
The utilization of data-driven methods in chemical process modeling has been extensively
acknowledged due to their effectiveness. However, with the increasing complexity and …

Detection of Facial Forgery in Digital Images

HA Khan, S Tehsin, M Humayun… - … on Business Analytics …, 2023 - ieeexplore.ieee.org
Detection of facial forgery in images and videos is a complex and challenging task. For the
last years, different methods have been employed to detect facial forgeries. However, facial …

User Feedback based Trust Analysis in Cloud Computing using Machine Learning Approach

SA Raza, A Kanwal, HKG Nair, AI Khan… - … for Technology and …, 2023 - ieeexplore.ieee.org
Trust on cloud services is a serious concern regardless of the increasing deployment and
utilization of mission critical applications, which continues to obstruct users from complete …

An Improved Convolutional Neural Network for the Image Enhancement

M Fiaz, MA Al-Khasawneh… - … Conference on Business …, 2023 - ieeexplore.ieee.org
Four-dimensional cone-beam computed tomography, or 4D CBCT, is a technique used in
image-guided radiation treatment to generate a series of phase-resolved reconstructions of …

Post-Covid-19 Pandemic IT Project Management Skills and Challenges

L Ali, N Taleb, A Ali, IA Abu-AlSondos… - … for Technology and …, 2023 - ieeexplore.ieee.org
Since December 2019, the COVID-19 pandemic has harmed social, financial, and work life.
The novel coronavirus has caused problems in all business sectors, including Information …

Resource Provisioning in Cloud Computing using Fuzzy Logic Control System: An adaptive approach

SEA Alnawayseh, MHG Muhammad… - … for Technology and …, 2023 - ieeexplore.ieee.org
The need for cloud computing has been increasing widely in this era since last two decades
due to its continual benefits include security, disaster recovery, increased collaboration, cost …

Data-Driven Design for Anomaly Detection in Network Access Control Systems

MA Muhammad, F Caraffini… - … for Technology and …, 2023 - ieeexplore.ieee.org
Current network access control systems can contain unpredictable interactions between
multiple device models, multiple network protocol layers (eg TCP, UDP and ICMP) …