Exploratory review of applications of machine learning in finance sector

S Rakshit, N Clement, NR Vajjhala - Advances in Data Science and …, 2022 - Springer
The finance sector is one of the key pillars of any nation's economy. However, with the
emergence of big data and rapid advancements in technology, the finance sector is …

A Novel Automatic Audiometric System Design Based on Machine Learning Methods Using the Brain's Electrical Activity Signals

M Küçükakarsu, AR Kavsaoğlu, F Alenezi, A Alhudhaif… - Diagnostics, 2023 - mdpi.com
This study uses machine learning to perform the hearing test (audiometry) processes
autonomously with EEG signals. Sounds with different amplitudes and wavelengths given to …

Efficient Ensemble-based Phishing Website Classification Models using Feature Importance Attribute Selection and Hyper parameter Tuning Approaches

RG Jimoh, AM OYELAKIN, OC Abikoye… - Journal of Information …, 2023 - sabapub.com
The internet is now a common place for different business, scientific and educational
activities. However, there are bad elements in the internet space that keep using different …

Exploratory study of machine learning algorithms in recommender systems

FO Momoh, S Rakshit, NR Vajjhala - Proceedings of International …, 2021 - Springer
Recommender systems are widely used by various companies today to help create
personalized experiences for users or consumers. These systems incorporate a lot of …

Review on the AI technologies used in the manufacturing of electric cars

NB Chimeudeonwo - 2023 - opus4.kobv.de
Artificial Intelligence, or AI, is one of the key technologies behind the evolution of modern
automotive industry, providing benefits on a much greater scale. AI technologies in Electric …

[PDF][PDF] A REVIEW OF DEEP LEARNING TECHNIQUES FOR DETECTING BOTNET ATTACKS IN IOT ENVIRONMENTS

BL AREMU - 2023 - researchgate.net
With the exponential growth of the Internet of Things (IoT) and its increasing integration into
various domains, security threats have become a significant concern. One of the most …

Multi-level security–base intrusion detection scheme for mitigating phishing attack in cloud computing environment

EA Haruna, AO Maruf, D Gabi - Equity Journal of Science and Technology, 2022 - ajol.info
The majority of computing devices in the 21st century is deployed in the cloud, providing
access to information and online services. However, phishing attacks continue to pose a risk …

[引用][C] ODYOMETRİ SİSTEM TASARIMI VE EEG SİNYALLERİ KULLANILARAK MAKİNE ÖĞRENMESİ YÖNTEMLERİ İLE İŞİTME TESTİ