Indian Journal of Artificial Intelligence and Neural Networking
Latest Publications


TOTAL DOCUMENTS

27
(FIVE YEARS 27)

H-INDEX

0
(FIVE YEARS 0)

Published By Blue Eyes Intelligence Engineering And Sciences Engineering And Sciences Publication - BEIESP

2582-7626

Author(s):  
Aakriti Shukla ◽  
◽  
Dr Damodar Prasad Tiwari ◽  

Dimension reduction or feature selection is thought to be the backbone of big data applications in order to improve performance. Many scholars have shifted their attention in recent years to data science and analysis for real-time applications using big data integration. It takes a long time for humans to interact with big data. As a result, while handling high workload in a distributed system, it is necessary to make feature selection elastic and scalable. In this study, a survey of alternative optimizing techniques for feature selection are presented, as well as an analytical result analysis of their limits. This study contributes to the development of a method for improving the efficiency of feature selection in big complicated data sets.


Author(s):  
Aakriti Shukla ◽  
◽  
Dr Damodar Prasad Tiwari ◽  

Dimension reduction or feature selection is thought to be the backbone of big data applications in order to improve performance. Many scholars have shifted their attention in recent years to data science and analysis for real-time applications using big data integration. It takes a long time for humans to interact with big data. As a result, while handling high workload in a distributed system, it is necessary to make feature selection elastic and scalable. In this study, a survey of alternative optimizing techniques for feature selection are presented, as well as an analytical result analysis of their limits. This study contributes to the development of a method for improving the efficiency of feature selection in big complicated data sets.


Author(s):  
Banya Arabi Sahoo ◽  

AI is the incredibly exciting technique to the world. According to John McCarthy it is “The science and engineering of making intelligent machine, especially intelligent computers”. AI is the way of creating extraordinary powerful machine which is similar as human being. The AI is being accomplished by studying how human brain think, how they learn, decide, work, solving the real world problem and after that verify the outcomes and studying it. Primarily you can learn here what AI is and how it works, its types, its history, its agents, its applications, its advantages and disadvantages.


Author(s):  
Banya Arabi Sahoo ◽  

AI is the incredibly exciting technique to the world. According to John McCarthy it is “The science and engineering of making intelligent machine, especially intelligent computers”. AI is the way of creating extraordinary powerful machine which is similar as human being. The AI is being accomplished by studying how human brain think, how they learn, decide, work, solving the real world problem and after that verify the outcomes and studying it. Primarily you can learn here what AI is and how it works, its types, its history, its agents, its applications, its advantages and disadvantages.


Author(s):  
Dinesh Kumar ◽  
Kailash Patidar ◽  
Gourav Saxena ◽  
Rishi Kushwaha

Visual encryption technology becomes the latest research area in which a lot of scopes persist. Presently such a particular cryptosystem procedure is now used by numerous other countries around the world for the private transmission of formal records, financial documents, content visuals, digital voting, and so on. Visualization Cryptographic algorithms one of the protected methods of transferring pictures online. The main benefit of image encryption has been that it disguises peripheral vision with encrypt data secret data with no computation usually needed. In this work a hybrid visual cryptography method using a sigmoid function (HVMSF) for enhancing the security in gray images. HVMSF strategy utilizes a chaos framework to scramble pixel values as well as blocks while using the Modified Arnold Cat Map method (MACM) as well as the Henon Map method (HMM). The methodology includes a confusion procedure wherein the location of each image pixel is shuffled by utilizing MACM. The shuffling of image pixel leads to the creation of a subset pixel which will be protected for transmitting. This proposed HVMSF mainly tries to overcome the limitation of the previous approaches by applying sigmoid function in image feature space for contrast enhancement throughout the consequent source images. The experimental outcomes precisely show that the suggested strategy can further give additional effectiveness to ensure the protection of transmitting information out over previous techniques.


Author(s):  
Judy Flavia ◽  
Aviraj Patel ◽  
Diwakar Kumar Jha ◽  
Navnit Kumar Jha

In the project we are demonstrating the combined usage Augmented Reality(AR) and brain faced com- puter interface(BI) which can be used to control the robotic acurator by.This method is more simple and more user friendly. Here brainwave senor will work in its normal setting detecting alpha, beta, and gam- ma signals. These signals are decoded to detect eye movements. These are very limited on its own since the number of combinations possible to make higher and more complex task possible. As a solution to this AR is integrated with the BCI application to make control interface more user friendly. This application can be used in many cases including many robotic and device controlling cases. Here we use BCI-AR to detect eye paralysis that can be archive by detecting eye lid movement of person by wearing headbend.


Author(s):  
Dr. Kamlesh Sharma ◽  
◽  
Nidhi Garg ◽  
Arun Pandey ◽  
Daksh Yadav ◽  
...  

Plagiarism is an act of using another person’s words, idea or information without giving credit to that person and presenting them as your own. With the development of the technologies in recent years, the act of Plagiarism increases significantly. But luckily the plagiarism detection techniques are available and they are improving day by day to detect the attempts of plagiarizing the content in education. The software like Turnitin, iThenticate or Safe Assign is available in the markets that are doing a great job in this context. But the problem is not fully solved yet. These software(s) still doesn’t detect the rephrasing of statements of another writer in other words. This paper primarily focuses to detect the plagiarism in the suspicious document based on the meaning and linguistic variation of the content. The techniques used for this context is based on Natural language processing. In this Paper, we present how the semantic analysis and syntactic driven Parsing can be used to detect the plagiarism.


Author(s):  
Jaya Kumari ◽  
◽  
Kailash Patidar ◽  
Mr. Gourav Saxena ◽  
Mr. Rishi Kushwaha ◽  
...  

Face recognition techniques play a crucial role in numerous disciplines of data security, verification, and authentication. The face recognition algorithm selects a face attribute from an image datasets. Recognize identification is an authentication device for verification as well as validation having both data analysis and feasible significance. The facerecognizing centered authentication framework can further be considered an AI technology implementation for instantly identifying a particular image. In this research, we are presenting a hybrid face recognition model (HFRM) using machine learning methods with “Speed Up Robust Features” (SURF), “scale-invariant feature transform” (SIFT), Locality Preserving Projections (LPP) &Principal component analysis (PCA) method. In the proposed HFRM model SURF method mainly detects the local feature efficiently. SIFT method mainly utilizes to detect the local features and recognize them. LPP retains the local framework of facial feature area which is generally quite meaningful than on the sequence kept by a 'principal component analysis (PCA) as well as “linear discriminate analysis” (LDA). The proposed HFRM method is compared with the existing (H. Zaaraoui et al., 2020) method and the experimental result clearly shows the outstanding performance in terms of detection rate and accuracy % over existing methods.


Author(s):  
M.S.Antony Vigil ◽  
Rishabh Jain ◽  
Tanmay Agarwal ◽  
Abhinav Chandra

There are a variety of deep learning algorithms available in the supervision of ships, but they are dealing with multiple issues of inaccurate identification rate and inadequate target detection speed. At this stage, an algorithm is given оn Соnvоlutiоnаl Neural Network for target identification and detection using the ship image. The study involves the investigation of the reactions of hyper spectral atmospheric rectification on the accurate and precise results of ship detection. The ship features which were detected from two atmospheric rectified algorithms on airborne hyper spectral data were corrected by the application of these algorithms with the help of an unsupervised target detection procedure. High accuracy and fast ship identification was a result of this algorithm and using unique modules, improving the loss function and enlargement of data for the smaller targets. The results of the experiments show that our algorithm has given much better detection rate as compared to target detection algorithm using traditional machine learning.


Author(s):  
Dinesh Kumar ◽  
◽  
Kailash Patidar ◽  
Mr. Gourav Saxena ◽  
Mr. Rishi Kushwaha ◽  
...  

Visual encryption technology becomes the latest research area in which a lot of scopes persist. Presently such a particular cryptosystem procedure is now used by numerous other countries around the world for the private transmission of formal records, financial documents, content visuals, digital voting, and so on. Visualization Cryptographic algorithms one of the protected methods of transferring pictures online. The main benefit of image encryption has been that it disguises peripheral vision with encrypt data secret data with no computation usually needed. In this work a hybrid visual cryptography method using a sigmoid function (HVMSF) for enhancing the security in gray images. HVMSF strategy utilizes a chaos framework to scramble pixel values as well as blocks while using the Modified Arnold Cat Map method (MACM) as well as the Henon Map method (HMM). The methodology includes a confusion procedure wherein the location of each image pixel is shuffled by utilizing MACM. The shuffling of image pixel leads to the creation of a subset pixel which will be protected for transmitting. This proposed HVMSF mainly tries to overcome the limitation of the previous approaches by applying sigmoid function in image feature space for contrast enhancement throughout the consequent source images. The experimental outcomes precisely show that the suggested strategy can further give additional effectiveness to ensure the protection of transmitting information out over previous techniques.


Sign in / Sign up

Export Citation Format

Share Document