Implementing an Artificial Intelligence based Ideal form of Virtual Personal Assistant Design for Various Communication Medium

D RajkumarPillay, MB Binda… - … on Electronics and …, 2022 - ieeexplore.ieee.org
Currently various sectors are growing due to the continuous rise of technological
development. Thus the use of machinery has increased and the use of humans has …

Lossless Video Compression Using Reinforcement Learning in UAV Applications

AS Kumar, JVML Jeyan, NT Jyothi… - … Conference on Data …, 2023 - ieeexplore.ieee.org
This research examines a technique for lossless pixel-by-pixel image compression that can
be learned by using reinforcement learning based image compression (RLIC). It is shown …

4 AI-driven cybersecurity modeling using quantum computing for mitigation of attacks in IOT-SDN network

MS Kumar, BK Harsha, LT Jule - Quantum-Safe Cryptography …, 2023 - degruyter.com
The implementation of quantum learning strategies is turning out to be increasingly crucial.
When it comes to cybersecurity, one of the key benefits of using machine learning is that it …

An improvised method for anomaly detection in social media using deep learning

C Sivakumar, D Sathyanarayanan… - … on Electronics and …, 2022 - ieeexplore.ieee.org
Recently, social media has arisen not only as a personal communication media, but also, as
a media to communicate opinions about products and services or even political and general …

[PDF][PDF] An improved classification of MR images for cervical cancer using convolutional neural networks

S Gowri, J Justin, R Vanithamani - ICTACT Journal on Image and …, 2021 - ictactjournals.in
Cervical cancer is the biggest cause of death in the field of women gynaecology. Patient
treatment outcomes are influenced by the stage and nodal status of their cancers as well as …

[PDF][PDF] IRIS DETECTION FOR BIOMETRIC PATTERN IDENTIFICATION USING DEEP LEARNING.

M Ramkumar, VA Preeya, R Manikandan… - ICTACT Journal on …, 2021 - ictactjournals.in
In this paper, we develop a liveness detection of iris present in the study to reduce various
spoofing attacks using gray-level co-occurrence matrix (GLCM) and Deep Learning (DL) …

7 Quantum transfer learning to detect passive attacks in SDN-IOT

S Karthik, RM Thenmozhi, T Sumathi - Quantum-Safe Cryptography …, 2023 - degruyter.com
An attack on the network presents a potential risk to the integrity of the network security,
which may or may not occur. As the field of quantum machine learning has made rapid …

Advanced Computer-Aided Design Using Federated Machine Learning for Creative Design Processes

G Thangarasu, KR Alla - Asia Simulation Conference, 2023 - Springer
Abstract The advent of Computer-Aided Design (CAD) has brought about a significant
transformation in the realm of design, facilitating the efficient and accurate development of …

9 Fault-tolerant mechanism using intelligent quantum computing-based error reduction codes

S Tiwari, KK Yadav, D Palanikkumar - Quantum-Safe Cryptography …, 2023 - degruyter.com
The chapter discusses the fault-tolerant mechanism using quantum computing that uses
error reduction codes to reduce the possible faults. Building the circuits that make up a …

AN ENHANCED ENSEMBLE METHOD ON OPTIMIZATION FOR RESOURCE ALLOCATION IN SOFTWARE-DEFINED NETWORKING ENVIRONMENTS.

M Swamidoss - ICTACT Journal on Soft Computing, 2024 - search.ebscohost.com
Abstract Software-Defined Networking (SDN) offers flexibility and programmability in
network management, but efficient resource allocation remains a challenge due to dynamic …