- Metaheuristic Optimization Algorithms Research
- Generative Adversarial Networks and Image Synthesis
- Network Security and Intrusion Detection
- Imbalanced Data Classification Techniques
- Artificial Intelligence in Games
- IoT and Edge/Fog Computing
- Data Visualization and Analytics
- Face recognition and analysis
- Advanced Clustering Algorithms Research
- Wireless Body Area Networks
- Cloud Computing and Resource Management
- Scientific Computing and Data Management
- Non-Invasive Vital Sign Monitoring
- Authorship Attribution and Profiling
- Context-Aware Activity Recognition Systems
- Hate Speech and Cyberbullying Detection
- Machine Learning and Data Classification
- ECG Monitoring and Analysis
- Evolutionary Algorithms and Applications
M S Ramaiah University of Applied Sciences
2023-2024
Robert Bosch (India)
2023
The rise in technology has had a tremendous impact the field of healthcare. Moreover, Internet Things and ubiquitous computing when applied to healthcare can ease process by helping doctors better monitor their patients thereby enabling speedy recovery. This paper proposes three systems demonstrate wide array fields everyday life where be applied. first is system infants while they sleep detect crying. Once detected swings cradle also alerts parents. second aims help rehabilitation...
<p><span>Face synthesis and editing has increased cumulative consideration by the improvement of generative adversarial networks (GANs). The proposed attentional GAN-deep multimodal similarity modal (AttnGAN-DAMSM) model focus on generating high-resolution images removing discriminator components realistic from textual description. attention creates map image automatically retrieves features to produce various sub-areas image. DAMSM delivers fine-grained image-text identical loss...
Feature selection plays a crucial role in classification by identifying relevant features. Bio-inspired algorithms, such as genetic particle swarm optimization, and ant colony have gained popularity due to their ability mimic natural processes explore high-dimensional feature spaces efficiently. The analysis includes evaluating accuracy, computational efficiency performance metrics. experimental setup involves dataset selection, choosing algorithm, implementing bio-inspired evaluation,...
One of the most effective swarm intelligence-based algorithms for many global optimization issues is Artificial Bee Colony (ABC) strategy. Despite fact that there are variants, algorithm normally has a low convergence rate. Therefore, it still essential to moderate an algorithm's intensity and diversity. In this instance, standard been combined with Whale Optimization Algorithm (WOA) Differential Evolution (DE) generate novel Hybrid (ABC), Colony-Differential Evolution-Whale (ABC-DE-WOA)....
Intrusion detection is a familiar phrase in the information and network security domain. An Detection System (IDS) device or software that will keep track of networks, for unlawful movements, policy breaches arise within network. There are different forms IDS, Host (HIDS) helps identifying unauthorized activities on host, Network (NIDS) attacks network, whereas Distributed (DIDS) consists multiple IDS over large area where individual communicates with each other central authorized server....