Data Mining Algorithms-Classification and Clustering: Reviewing data mining algorithms for classification and clustering tasks, including decision trees, k-means, and …

L Guo - Australian Journal of Machine Learning Research & …, 2024 - sydneyacademics.com
Data mining algorithms play a crucial role in extracting valuable insights from large datasets.
Among these algorithms, classification and clustering algorithms are widely used for …

Blockchain-based Authentication Systems for Secure Access Control in Autonomous Vehicles

T Houttuin - African Journal of Artificial Intelligence and …, 2024 - africansciencegroup.com
A blockchain has been designed to manage operations of drones in cooperation, while
blockchain also guarantees stakeholders' involvement in U-Space governance. The …

Collaborative Interfaces-Group Work Support: Analyzing collaborative interface designs for supporting group work and collaboration in distributed or co-located …

S Wagner - Journal of AI-Assisted Scientific Discovery, 2024 - scienceacadpress.com
Collaboration is a cornerstone of productivity and innovation in various domains, ranging
from business to academia. As technology continues to advance, the design of collaborative …

Computational Intelligence for Predictive Maintenance in IoT-enabled Autonomous Vehicles

G Di Guglielmo - Journal of Artificial Intelligence Research and …, 2024 - aimlstudies.co.uk
Efficient Predictive Maintenance (PdM) is critical for reducing maintenance costs, improving
operational safety, minimizing unplanned downtime, and prolonging the life of rotating …

Affective Computing-Emotion-aware Systems: Exploring emotion-aware systems and affective computing techniques for recognizing, interpreting, and responding to …

O Petrova - Journal of AI-Assisted Scientific Discovery, 2024 - scienceacadpress.com
Affective computing, an interdisciplinary field merging psychology, computer science, and
cognitive science, focuses on developing systems capable of recognizing, interpreting, and …

Cognitive Authentication Mechanisms for User Verification in Autonomous Vehicles

M Azzouzi - African Journal of Artificial Intelligence and …, 2024 - africansciencegroup.com
In the case of the smart attack, it is shown that for even highly secure DAF designs, drivers
can be impersonated through emulation and cloning. Another research gap highlighted is …

Deep Learning for Autonomous Vehicle Environment Understanding and Mapping

A Ajayi - Journal of Artificial Intelligence Research and …, 2024 - aimlstudies.co.uk
Over the past several years, many startups and companies have been devoted to self-
driving vehicles, such as Waymo, Zoox, Mobileye, Tesla, Uber, Drive. ai, and Aptivo. Both …

Recommender Systems-Algorithms and Evaluation Metrics: Reviewing recommender system algorithms and evaluation metrics for assessing recommendation quality …

A Pandey - Distributed Learning and Broad Applications in …, 2024 - dlabi.org
Recommender systems play a crucial role in modern information retrieval and e-commerce
platforms by providing personalized recommendations to users. This paper provides a …

Graph Analytics-Network Analysis and Visualization: Studying graph analytics techniques for analyzing network data and visualizing complex relationships between …

E Ferrari - Distributed Learning and Broad Applications in …, 2024 - dlabi.org
Graph analytics is a powerful tool for analyzing network data, offering insights into complex
relationships between entities. This paper explores various techniques in graph analytics for …