Enhancing Efficiency and Productivity: IoT in Industrial Manufacturing

SM Babu, PP Kumar, BS Devi… - 2023 IEEE 5th …, 2023 - ieeexplore.ieee.org
This in-depth investigation digs at the introduction of Internet of Things (IoT) technology into
industrial production processes, with the goal of increasing operational efficiency and …

Binary Classification of Fundus Images Using G-EYE for Disease Detection

M Seetha, D Pravalika, E Deepika, JS Priya… - … on Communications and …, 2024 - Springer
Cataract, age-related macular degeneration, glaucoma, diabetic retinopathy, corneal
opacity, and trachoma are the most common conditions that impair vision. Regarding the …

The Interview Master to Predict Personality Traits

G Malini Devi, C Rishitha, D Harshitha… - … on Communications and …, 2024 - Springer
The prognosis of unique communal abilities and disposition attributes is crucial problem.
The Interview Master is an asynchronous video interview (AVI) platform with a TensorFlow …

Understanding Adversary Behavior via XAI: Leveraging Sequence Clustering To Extract Threat Intelligence

A Nadeem - 2024 - research.tudelft.nl
Understanding the behavior of cyber adversaries provides threat intelligence to security
practitioners, and improves the cyber readiness of an organization. With the rapidly evolving …

Efficient Online Circulation of Blood in Geo-Blood Management: BEST Using Support Vector Machine

S Karimisetty, KUV Padma, A Arjuna Rao - International Conference on …, 2022 - Springer
In emergency, human blood plays vital role in saving life. At present, blood needs to be
transferred from one person to another based on matching groups, and it is impossible to …

[PDF][PDF] ChainReactor: Automated Privilege Escalation Chain Discovery via AI Planning

G De Pasquale, I Grishchenko, R Iesari, G Pizarro… - s2lab.cs.ucl.ac.uk
Current academic vulnerability research predominantly focuses on identifying individual
bugs and exploits in programs and systems. However, this goes against the growing trend of …