IoT Assistive Technology for People with Disabilities
Soulease: A Mind-Refreshing Application for Mental Well-Being
AI-Powered Weather System with Disaster Prediction
AI Driven Animal Farming and Livestock Management System
Advances in AI for Automatic Sign Language Recognition: A Comparative Study of Machine Learning Approaches
Design and Evaluation of Parallel Processing Techniques for 3D Liver Segmentation and Volume Rendering
Ensuring Software Quality in Engineering Environments
New 3D Face Matching Technique for an Automatic 3D Model Based Face Recognition System
Algorithmic Cost Modeling: Statistical Software Engineering Approach
Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking
Due to the importance of active learning, it is used in a lot of sensitive applications. But, these applications found in the environments where there are adversaries act to limit or prevent an accurate performance and destroy the normal activity of the application system. The active learning is vulnerable in the sampling stage in an adversarial environment such as the application of intrusion detection system, and attempt to sabotage the model at this stage is the guarantee for the failure or sabotage the work of the model and inaccuracy. The aim of the attacker is to maximally increase the learned model risk. In the sampling stage, the representative or most informative instances will be selected from unlabeled data to label based on the sampling strategy, but these unlabeled data not checked before being offered to the selecting process. So, the attacker will impact this stage to misguide the active learner through polluted the unlabeled instances. The contribution to this paper is studying the effect of the attacker on the strategies that used in the selection of most informative instances in active learning for network intrusion detection and whether the effect varies depending on the strategy that used. The experimental results showed that the expected model change strategy not significantly affected by the attack compared with other strategies.
Time estimation is always considered as one of the success factor for any software project. The study is related to software projects failure and the role of time estimation in the success of any software project. The objective of this research is to find all those factors that can effect timely delivery of software and increase the actual time estimation. Findings these factors are necessary so that actions can be taken in the beginning of the project. Systematic Literature Review (SLR) will be conducted to achieve the aforementioned goals. SLR being more formally planned is different from ordinary literature review. SLR protocol is developed and executed in different digital libraries and as a result of inclusion and exclusion criteria applied, we have finalized more than 20 papers. The final output will be the extraction of all those factors from different research studies that can influence the estimated time of projects. The results will help us to identify any research gap where more work is possible for successful and timely delivery of software projects.
3D scenes and graphics are widely used in the creative industry. However, the entire task of imagination and then depicting the same as 3D graphics is done manually today, which consumes a lot of time, not to mention the inability to depict the scene precisely as imagined. We aim to reduce human efforts for the same by generating 3D scenes described by the user with precision.
On the other hand, some industries currently lack the use of appropriate technology to make their tasks easier and more captivating, such as the education industry. We intend to replace the existing methods of teaching and learning by using speech to 3D scene generation to depict exactly what the professor is trying to explain.
With the advent of Information Technology in today’s time, there is no dearth of increasing requirements for storing and retrieving data. As the data produced per year increases at an explosive rate, storing this data and representing it in a well-structured format and in a timely manner is one of the biggest issues today for the organizations and institutions. This paper proposes an approach to manage and access large amounts of distributed unstructured data of an organization in an efficient manner. Hence, a web-application has been designed to efficiently access and manage the data and to save precious time spent in accessing the distributed data. This system also makes an attempt to solve the problem of data availability and data accessibility, both of which are very important from an organization’s point of view that works with data on a day-to-day basis. Data security for organizations is very important and hence the system also incorporates a security feature with the help of the SSL technology which will ensure that data transfer remains private and integral over the internet during the client and server communication. Also the paper proposes the methodology which describes the basic features provided by the web-application along with a set of special features that can help reduce effort and provide useful analysis and data visualization based on the data of the organization.
In this paper, the use and importance of multithreading is discussed using the example of a basic game development in the java environment. This paper talks about how the concept of multithreading allows programmers to write simpler, more easily understandable code when it comes to making games or any other application that can be viewed as, being broken down into several independent tasks. In this paper, the difference in approaching a problem say game development in two ways - a single threaded model and a multithreaded model has been elucidated. With the experimentation, it has been concluded that in terms of performance and ease of development, multithreaded programming is better in all means.