All Stories

  1. Single-Document Abstractive Text Summarization: A Systematic Literature Review
  2. An Efficient System for Finding Relevant Information from Internal Company Documents and Websites
  3. Improving Lane Detection in Self-Driving Cars with a Layered Network Approach
  4. Detecting and classifying threats in tweets
  5. Improving AdaGrad Algorithms via Cosine Annealing: Data Distribution Analysis
  6. Explaining how easily deep learning models misjudge images
  7. Efficacy of Combining Neural Networks and Symbolic Reasoning for Common Sense Reasoning
  8. Selection of Key Sentences to Enhance the Effectiveness of Text Summarization
  9. Recognizing and Extracting Tabular Data from Scanned Documents
  10. Omniscient: An Automatic Question Answering System
  11. User Application Based Network Service
  12. Evaluating Gender Bias in Hindi-English Machine Translation
  13. Recognition of institute names and degrees in a CV with minimum tagging using AI
  14. Multiclass Queueing Network Modeling and Traffic Flow Analysis for SDN-Enabled Mobile Core Networks With Network Slicing
  15. Out of the Closet
  16. Automated Stock Price Forecasting for The Near Future
  17. Improving learning in hearing-impaired children through artificial intelligence
  18. Symmetric key-based authenticated encryption protocol
  19. Meta-Learner with Sparsified Backpropagation
  20. IoT Based Driving Risk Assessment and Warning System
  21. Performance Analysis of Out-Band OpenFlow Switch Architecture: The Single Node Case
  22. A meta data mining framework for botnet analysis
  23. Face Detection and Tagging Using Deep Learning
  24. Chroot Hardening Through System Calls Modification
  25. Chatbot for university related FAQs
  26. Extracting quality relations from categorical data using modified qube algorithm
  27. Fitness function to find game equilibria using genetic algorithms
  28. Multi-modality face recognition: An information theoretic approach
  29. Neural network approach for vision-based track navigation using low-powered computers on mavs
  30. Word based thematic game on Indian mythology
  31. Safe buzz: adaptive security for multi-agents through situational awareness
  32. Safe buzz: adaptive security for multi-agents through situational awareness
  33. Context based interesting tweet recommendation framework
  34. Intelligence analysis of Tay Twitter bot
  35. Path independent real time points of interest detection in road networks
  36. Detection of fake Twitter followers using graph centrality measures
  37. Identification of causal relationships among clinical variables for cancer diagnosis using multi-tenancy
  38. Identification of gene network motifs for cancer disease diagnosis
  39. Mutual fund performance prediction
  40. Unemployment rates forecasting using supervised neural networks
  41. Image sentiment analysis using deep convolutional neural networks with domain specific fine tuning
  42. Natural language image descriptor
  43. Anti-scraping application development
  44. Is That Twitter Hashtag Worth Reading
  45. Is Stack Overflow Overflowing With Questions and Tags
  46. Smart card based password authentication and user anonymity scheme using ECC and steganography
  47. Differential private random forest
  48. Towards a generic framework for short term firm-specific stock forecasting
  49. Threat Analysis and malicious user detection in reputation systems using Mean Bisector Analysis and Cosine Similarity (MBACS)
  50. Detection of User Cluster with Suspicious Activity in Online Social Networking Sites
  51. Contextual information based recommender system using Singular Value Decomposition
  52. Detection and filtering of collaborative malicious users in reputation system using quality repository approach
  53. Alert-BDI: BDI model with adaptive alertness through situational awareness
  54. Optimal Neural Network Architecture for Stock Market Forecasting
  55. Stock Market Prediction Accuracy Analysis Using Kappa Measure
  56. Aware-BDI: An Extension of the BDI Model Incorporating Situational Awareness
  57. Ownership authentication transfer protocol for ubiquitous computing devices
  58. Model Checking Zero Knowledge System
  59. Enhanced mining association rule algorithm with reduced time & space complexity
  60. Modelling and Verification of Extensible Authentication Protocol Using Spin Model Checker
  61. Web opinion mining for social networking sites
  62. Decoding robustness performance comparison for QR and data matrix code
  63. Modeling & verification of Sliding Window Protocol with data loss and intruder detection using NuSMV
  64. Formal verification of the Extensible Authentication Protocol using SPIN
  65. Design and development of a desktop monitoring system
  66. Modeling two way concurrent buffer system using timed automata in UPPAAL
  67. Erroneous state detection in piecewise FIFO system
  68. Differentiated QoS with Modified C/I based scheduling algorithm
  69. Modeling and Verification of Agent based Adaptive Traffic Signal using Symbolic Model Verifier
  70. Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication
  71. Symbolic verification of web crawler functionality and its properties
  72. Modeling and Verification of Fiat-Shamir Zero Knowledge Authentication Protocol
  73. Cloud Based Application Development for Accessing Restaurant Information on Mobile Device using LBS
  74. Is OAuth flawless?
  75. Modeling and Verification of Kerberos Protocol Using Symbolic Model Verifier
  76. Symbolic Verification of a Strength Based Multi-Agent Argumentation Scheme
  77. Modeling and Verification of Inter Realm Authentication in Kerberos Using Symbolic Model Verifier
  78. Logical Modeling and Verification of a Strength Based Multi-agent Argumentation Scheme Using NuSMV
  79. Modeling and Verification of Server Aided Verification Protocol Using NuSMV
  80. Modeling and Verification of Chess Game Using NuSMV
  81. Cloud Based Application Development for Mobile Devices for Accessing LBS
  82. Physical Layer Authentication in Wired and Wireless Communication Systems
  83. Modeling freshness concept to overcome Replay attack in Kerberos protocol using NuSMV
  84. Protecting location privacy in Augmented Reality using k-anonymization and pseudo-id
  85. Model checking message exchange in Location Based Services
  86. Securing location privacy in Augmented Reality
  87. Exact schedulability analysis of global multi-processor IUF scheduling using symbolic model checking
  88. A generalized closed form relation for BER of QPSK/M-QAM over fading channel