Search
Search Results
-
Precision Tuning of PID Controller Parameters for Dynamic Stability Enhancement in GPSS-SMIB Systems: The HB-PSO Optimization Approach
This research work proposes to boost the transient stability of general purpose simulation system (GPSS) connected one machine unlimited bus system... -
Multiplatform Mobile App for Multilingual OCR Based Translator for Tamil (MMOT)
In an increasingly interconnected world, language barriers can pose significant challenges for communication and cultural understanding. This is... -
Sculpting the Perfect Workforce: A Study of Cognitive AI and Machine Learning Algorithms in Resha** the Future of Talent Acquisition and Fostering Synergistic HR-Technology Ecosystems
This study explores integrating Cognitive AI and ML algorithms into talent acquisition and assessing their impact on HR practices. The paper reviews... -
IoT Based ECG to Grayscale Representation for the Prediction of Artery Deposition
The study and design entitled “IoT based ECG Grayscale representation for the prediction of Artery Deposition” was designed in response to the recent... -
Efficient Segmentation of Cervical Cancer Using Deep Learning Techniques
Cervical cancer is a major health concern, and healthcare images play a major role in the analysis and handling of this disease. Three popular deep... -
Classification of Heart Diseases Using Logistic Regression with Various Preprocessing Techniques
Machine learning (ML) based heart disease prediction has emerged as a crucial and fruitful field of study and application. They are used to analyze... -
A Survey on SCADA’s Security, Concerns and Attacks
The SCADA (Supervisory Control and Data Acquisition) system is an essential component for maintaining the smooth operation of critical infrastructure... -
A Comprehensive Study on VANET Security
This study encompasses the following areas: vulnerability analysis, proposition of cryptographic solutions, design of intrusion detection systems,... -
Enhancing Security Through QR Code and Enriched Blowfish Cryptography for Sensitive Data
In today’s digital age, data security is of utmost importance as sensitive information is being stored, processed, and transmitted online. Recent... -
Exploring the Effectiveness of On-Page SEO for Webpage Ranking: A Critical Study
A research paper titled “Exploring the Effectiveness of On-Page SEO for Webpage Ranking” investigates the importance of on-page SEO strategies on the... -
Mitigation and Prevention Methods for Cross-Layer Attacks in IoT (Internet of Things) Devices
Innumerable advantages as well as severe security challenges have been brought about by the fast spread of Internet of Things (IoT) devices across... -
Towards an Affordance-Based Typology of Personal Data Stores
Personal Data Stores are often presented as a tool for data subjects to take back control over the processing of their personal data. Backed by data... -
Optimizing Aortic Segmentation with an Innovative Quality Assessment: The Role of Global Sensitivity Analysis
Precise aortic vessel tree segmentation is critical in the continuously evolving medical imaging domain. This study highlights the role of global... -
A Data-Centric Approach for Segmenting the Aortic Vessel Tree: A Solution to SEG.A. Challenge 2023 Segmentation Task
Data-centric AI is a discipline that focuses on improving the quality and relevance of data used to train AI models. It is a shift from the... -
Misclassification Loss for Segmentation of the Aortic Vessel Tree
Common pixel-based loss functions for image segmentation struggle with the fine-scale structures often found in the aortic vessel tree. In this... -
Impacts on Specific Industries
In this section, I analyze some of the industries potentially impacted by AI/ML. -
-
The Horizon for AI in Our Society
In this section, I will check some of the current trends in technology and estimate how they can possibly impact society. -
The Impact on People
Like most high-impact technologies, AI has the potential to create new jobs. They can fall into two categories. One directly related to the... -
Evaluation of an OPC UA-Based Access Control Enforcement Architecture
Dynamic access control in industrial systems is becoming a concern of greater importance as a consequence of the increasingly flexible manufacturing...