[HTML][HTML] Semantic analysis of blockchain intelligence with proposed agenda for future issues

R Saxena, E Gayathri, L Surya Kumari - International Journal of System …, 2023 - Springer
Integrating blockchain technology with artificial intelligence (AI) ie, blockchain Intelligence
makes an extremely powerful tool that solves many multidimensional problems in several …

A novel optimized recurrent network-based automatic system for speech emotion identification

N Koppula, KS Rao, SA Nabi, A Balaram - Wireless Personal …, 2023 - Springer
Speech is a unique characteristic of humans that expresses one's emotional viewpoint to
others. Speech emotion recognition (SER) identifies the speaker's emotion from the speech …

[HTML][HTML] APF-DPPO: an automatic driving policy learning method based on the artificial potential field method to optimize the reward function

J Lin, P Zhang, C Li, Y Zhou, H Wang, X Zou - Machines, 2022 - mdpi.com
To address the difficulty of obtaining the optimal driving strategy under the condition of a
complex environment and changeable tasks of vehicle autonomous driving, this paper …

Iris feature extraction using three-level Haar wavelet transform and modified local binary pattern

P Podder, MRH Mondal, J Kamruzzaman - Applications of Computational …, 2022 - Elsevier
In this chapter, a novel feature extraction method is proposed for faster iris recognition. This
new method is a hybrid process combining three-level Haar wavelet transform (HWT) and …

A novel method to enhance color spatial feature extraction using evolutionary time-frequency decomposition for presentation-attack detection

Q Majeed, A Fathi - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
Vulnerability to presentation attacks is the most valid issue of face-based authentication
systems. Therefore, automatic detection of face spoofing plays a vital role in the safe use of …

A multi objective optimization modeling in WSN for enhancing the attacking efficiency of node capture attack

P Ahlawat, R Bathla - … Journal of System Assurance Engineering and …, 2023 - Springer
Node capture attacks compromise the integrity and confidentiality of networks by capturing
nodes within them and obtaining cryptographic keys through wireless sensor network links …

Community detection in network using chronological gorilla troops optimization algorithm with deep learning based weighted convexity

P Tiwari, S Raj, N Chhimwal - Wireless Networks, 2023 - Springer
Community is expressed as the subset of nodes in the graph and the interrelation amongst
the nodes within the network is deeper than the remaining of the network. Thus, the …

Improvement and reduce risk of failure part-casting by multi-domain matrix-process failure modes and effects analysis based verband der automobilindustrie and …

S Ali, C Jaqin - International Journal of System Assurance Engineering …, 2024 - Springer
Nowadays, each industrial process like installation, manufacturing and service industries
process possesses the risk of process failure. The risk of process failure is collected from …

[HTML][HTML] Fingerprint image enhancement using multiple filters

H Shams, T Jan, AA Khalil, N Ahmad, A Munir… - PeerJ Computer …, 2023 - peerj.com
Biometrics is the measurement of an individual's distinctive physical and behavioral
characteristics. In comparison to traditional token-based or knowledge-based forms of …

[HTML][HTML] Prediction of all-cause mortality following percutaneous coronary intervention in bifurcation lesions using machine learning algorithms

J Burrello, G Gallone, A Burrello… - Journal of Personalized …, 2022 - mdpi.com
Stratifying prognosis following coronary bifurcation percutaneous coronary intervention
(PCI) is an unmet clinical need that may be fulfilled through the adoption of machine …