All Stories

  1. How Computers Learn to Write Human-Like Text Summaries: A Global Research Overview
  2. An Efficient System for Finding Relevant Information from Internal Company Documents and Websites
  3. Improving Lane Detection in Self-Driving Cars with a Layered Network Approach
  4. Smart Network Switching: Improving Mobile Data Transfer Between LTE and WiFi
  5. Detecting and classifying threats in tweets
  6. Improving AdaGrad Algorithms via Cosine Annealing: Data Distribution Analysis
  7. Explaining how easily deep learning models misjudge images
  8. Efficacy of Combining Neural Networks and Symbolic Reasoning for Common Sense Reasoning
  9. Selection of Key Sentences to Enhance the Effectiveness of Text Summarization
  10. Recognizing and Extracting Tabular Data from Scanned Documents
  11. Omniscient: An Automatic Question Answering System
  12. User Application Based Network Service
  13. Evaluating Gender Bias in Hindi-English Machine Translation
  14. Recognition of institute names and degrees in a CV with minimum tagging using AI
  15. Multiclass Queueing Network Modeling and Traffic Flow Analysis for SDN-Enabled Mobile Core Networks With Network Slicing
  16. Out of the Closet
  17. Automated Stock Price Forecasting for The Near Future
  18. Improving learning in hearing-impaired children through artificial intelligence
  19. Symmetric key-based authenticated encryption protocol
  20. Meta-Learner with Sparsified Backpropagation
  21. IoT Based Driving Risk Assessment and Warning System
  22. Performance Analysis of Out-Band OpenFlow Switch Architecture: The Single Node Case
  23. A meta data mining framework for botnet analysis
  24. Face Detection and Tagging Using Deep Learning
  25. Chroot Hardening Through System Calls Modification
  26. Chatbot for university related FAQs
  27. Extracting quality relations from categorical data using modified qube algorithm
  28. Fitness function to find game equilibria using genetic algorithms
  29. Multi-modality face recognition: An information theoretic approach
  30. Neural network approach for vision-based track navigation using low-powered computers on mavs
  31. Word based thematic game on Indian mythology
  32. Safe buzz: adaptive security for multi-agents through situational awareness
  33. Safe buzz: adaptive security for multi-agents through situational awareness
  34. Context based interesting tweet recommendation framework
  35. Intelligence analysis of Tay Twitter bot
  36. Path independent real time points of interest detection in road networks
  37. Detection of fake Twitter followers using graph centrality measures
  38. Identification of causal relationships among clinical variables for cancer diagnosis using multi-tenancy
  39. Identification of gene network motifs for cancer disease diagnosis
  40. Mutual fund performance prediction
  41. Unemployment rates forecasting using supervised neural networks
  42. Image sentiment analysis using deep convolutional neural networks with domain specific fine tuning
  43. Natural language image descriptor
  44. Anti-scraping application development
  45. Is That Twitter Hashtag Worth Reading
  46. Is Stack Overflow Overflowing With Questions and Tags
  47. Smart card based password authentication and user anonymity scheme using ECC and steganography
  48. Differential private random forest
  49. Towards a generic framework for short term firm-specific stock forecasting
  50. Threat Analysis and malicious user detection in reputation systems using Mean Bisector Analysis and Cosine Similarity (MBACS)
  51. Detection of User Cluster with Suspicious Activity in Online Social Networking Sites
  52. Contextual information based recommender system using Singular Value Decomposition
  53. Detection and filtering of collaborative malicious users in reputation system using quality repository approach
  54. Alert-BDI: BDI model with adaptive alertness through situational awareness
  55. Optimal Neural Network Architecture for Stock Market Forecasting
  56. Stock Market Prediction Accuracy Analysis Using Kappa Measure
  57. Aware-BDI: An Extension of the BDI Model Incorporating Situational Awareness
  58. Ownership authentication transfer protocol for ubiquitous computing devices
  59. Model Checking Zero Knowledge System
  60. Enhanced mining association rule algorithm with reduced time & space complexity
  61. Modelling and Verification of Extensible Authentication Protocol Using Spin Model Checker
  62. Web opinion mining for social networking sites
  63. Decoding robustness performance comparison for QR and data matrix code
  64. Modeling & verification of Sliding Window Protocol with data loss and intruder detection using NuSMV
  65. Formal verification of the Extensible Authentication Protocol using SPIN
  66. Design and development of a desktop monitoring system
  67. Modeling two way concurrent buffer system using timed automata in UPPAAL
  68. Erroneous state detection in piecewise FIFO system
  69. Differentiated QoS with Modified C/I based scheduling algorithm
  70. Modeling and Verification of Agent based Adaptive Traffic Signal using Symbolic Model Verifier
  71. Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication
  72. Symbolic verification of web crawler functionality and its properties
  73. Modeling and Verification of Fiat-Shamir Zero Knowledge Authentication Protocol
  74. Cloud Based Application Development for Accessing Restaurant Information on Mobile Device using LBS
  75. Is OAuth flawless?
  76. Modeling and Verification of Kerberos Protocol Using Symbolic Model Verifier
  77. Symbolic Verification of a Strength Based Multi-Agent Argumentation Scheme
  78. Modeling and Verification of Inter Realm Authentication in Kerberos Using Symbolic Model Verifier
  79. Logical Modeling and Verification of a Strength Based Multi-agent Argumentation Scheme Using NuSMV
  80. Modeling and Verification of Server Aided Verification Protocol Using NuSMV
  81. Modeling and Verification of Chess Game Using NuSMV
  82. Cloud Based Application Development for Mobile Devices for Accessing LBS
  83. Physical Layer Authentication in Wired and Wireless Communication Systems
  84. Modeling freshness concept to overcome Replay attack in Kerberos protocol using NuSMV
  85. Protecting location privacy in Augmented Reality using k-anonymization and pseudo-id
  86. Model checking message exchange in Location Based Services
  87. Securing location privacy in Augmented Reality
  88. Exact schedulability analysis of global multi-processor IUF scheduling using symbolic model checking
  89. A generalized closed form relation for BER of QPSK/M-QAM over fading channel