A Comparative Analysis Of Cryptocurrency Exchange Rate Prediction Using Deep Learning Techniques,
2023
Siksha 'O' Anusandhan
A Comparative Analysis Of Cryptocurrency Exchange Rate Prediction Using Deep Learning Techniques, Nrusingha Tripathy, Sidhanta Kumar Balabantaray, Surabi Parida, Subrat Kumar Nayak
International Journal of Smart Sensor and Adhoc Network
In our country, among the largest financial markets is the Foreign Exchange (FOREX) market. Banks, retail traders, businesses, and people transact over 5.1 trillion dollars or more in FOREX per day. It is very challenging to predict the price in advance due to the varied, volatile, and high fluctuation. Investors and traders are constantly searching for innovative ways to surpass the market and increase their profits. In trading industry, the capacity to anticipate the exchange rate is an important talent. As a result, forecasting models are continually being developed by researchers around the globe to accurately predict the exchange rate. …
Enhancing Accident Investigation Using Traffic Cctv Footage,
2023
California State University, San Bernardino
Enhancing Accident Investigation Using Traffic Cctv Footage, Aksharapriya Peddi
Electronic Theses, Projects, and Dissertations
This Culminating Experience Project investigated how the densenet-161 model will perform on accident severity prediction compared to proposed methods. The research questions are: (Q1) What is the impact of usage of augmentation techniques on imbalanced datasets? (Q2) How will the hyper parameter tuning affect the model performance? (Q3) How effective is the proposed model compared to existing work? The findings are: Q1. The effectiveness of our model depends on the implementation of augmentation techniques that pay attention to handling imbalanced datasets. Our dataset poses a challenge due to distribution of classes in terms of accident severity. To address this challenge …
Remote Side-Channel Disassembly On Field-Programmable Gate Arrays,
2023
University of South Alabama
Remote Side-Channel Disassembly On Field-Programmable Gate Arrays, Brandon R. Baggett
Theses and Dissertations
Over the last two decades, side-channel vulnerabilities have shown to be a major threat to embedded devices. Most side-channel research has developed our understanding of the vulnerabilities to cryptographic devices due to their implementation and how we can protect them. However, side-channel leakage can yield useful information about many other processes that run on the device. One promising area that has received little attention is the side-channel leakage due to the execution of assembly instructions. There has been some work in this area that has demonstrated the idea’s potential, but so far, this research has assumed the adversary has physical …
Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques,
2023
California State University - San Bernardino
Improving Credit Card Fraud Detection Using Transfer Learning And Data Resampling Techniques, Charmaine Eunice Mena Vinarta
Electronic Theses, Projects, and Dissertations
This Culminating Experience Project explores the use of machine learning algorithms to detect credit card fraud. The research questions are: Q1. What cross-domain techniques developed in other domains can be effectively adapted and applied to mitigate or eliminate credit card fraud, and how do these techniques compare in terms of fraud detection accuracy and efficiency? Q2. To what extent do synthetic data generation methods effectively mitigate the challenges posed by imbalanced datasets in credit card fraud detection, and how do these methods impact classification performance? Q3. To what extent can the combination of transfer learning and innovative data resampling techniques …
Melanoma Detection Based On Deep Learning Networks,
2023
California State University, San Bernardino
Melanoma Detection Based On Deep Learning Networks, Sanjay Devaraneni
Electronic Theses, Projects, and Dissertations
Our main objective is to develop a method for identifying melanoma enabling accurate assessments of patient’s health. Skin cancer, such as melanoma can be extremely dangerous if not detected and treated early. Detecting skin cancer accurately and promptly can greatly increase the chances of survival. To achieve this, it is important to develop a computer-aided diagnostic support system. In this study a research team introduces a sophisticated transfer learning model that utilizes Resnet50 to classify melanoma. Transfer learning is a machine learning technique that takes advantage of trained models, for similar tasks resulting in time saving and enhanced accuracy by …
Machine Learning For Kalman Filter Tuning Prediction In Gps/Ins Trajectory Estimation,
2023
California State University, San Bernardino
Machine Learning For Kalman Filter Tuning Prediction In Gps/Ins Trajectory Estimation, Peter Wright
Electronic Theses, Projects, and Dissertations
This project is an exploration and implementation of an application using Machine Learning (ML) and Artificial Intelligence (AI) techniques which would be capable of automatically tuning Kalman-Filter parameters used in post-flight trajectory estimation software at Edwards Air Force Base (EAFB), CA. The scope of the work in this paper is to design and develop a skeleton application with modular design, where various AI/ML modules could be developed to plug-in to the application for tuning-switch prediction.
Classification Of Large Scale Fish Dataset By Deep Neural Networks,
2023
California State University, San Bernardino
Classification Of Large Scale Fish Dataset By Deep Neural Networks, Priyanka Adapa
Electronic Theses, Projects, and Dissertations
The development of robust and efficient fish classification systems has become essential to preventing the rapid depletion of aquatic resources and building conservation strategies. A deep learning approach is proposed here for the automated classification of fish species from underwater images. The proposed methodology leverages state-of-the-art deep neural networks by applying the compact convolutional transformer (CCT) architecture, which is famous for faster training and lower computational cost. In CCT, data augmentation techniques are employed to enhance the variability of the training data, reducing overfitting and improving generalization. The preliminary outcomes of our proposed method demonstrate a promising accuracy level of …
Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai,
2023
Old Dominion University
Knowing Just Enough To Be Dangerous: The Sociological Effects Of Censoring Public Ai, David Hopkins
Cybersecurity Undergraduate Research Showcase
This paper will present the capabilities and security concerns of public AI, also called generative AI, and look at the societal and sociological effects of implementing regulations of this technology.
Screensafefuture: A Parent-Empathetic And Practical Mhealth Application For Toddlers' Brain Development Addressing Screen-Addiction Challenges,
2023
Kennesaw State University
Screensafefuture: A Parent-Empathetic And Practical Mhealth Application For Toddlers' Brain Development Addressing Screen-Addiction Challenges, Nafisa Anjum
Master of Science in Information Technology Theses
The surging incidents of infants and toddlers screen addiction in the United States are becoming a pressing concern due to its detrimental and compound impact on cognitive development, mental health, and physical growth. To address this era's critical child health and human development problem, we propose an innovative mHealth application-- ScreenSafeFuture-- in this paper. ScreenSafeFuture provides practical and parent-friendly solutions that seamlessly fit into parents' busy lifestyles, also acknowledging the effectiveness and convenience of smartphones as a healthcare tool. Our offering includes essential features designed to enhance the experience between parents and their children under 3 years old. With an …
Studazon,
2023
Harrisburg University of Science and Technology
Studazon, Gage Stevens, Michelle Thoi, Umangkumar Patel, Gavin Minney
Harrisburg University Research Symposium: Highlighting Research, Innovation, & Creativity
Studazon is a book listing for students to list textbooks they no longer need. Studazon acts as an advertising site to help connect students who have textbooks with students who need those textbooks.
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law,
2023
University of the Free State
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Smart Service Function Chain System For Dynamic Traffic Steering Using Reinforcement Learning (Chrl),
2023
Department of Computer Engineering, University of Technology- Iraq
Smart Service Function Chain System For Dynamic Traffic Steering Using Reinforcement Learning (Chrl), Ahmed Nadhum, Ahmed Al-Saadi
Karbala International Journal of Modern Science
The rapid development of the Internet and network services coupled with the growth of communication infrastructure necessitates the employment of intelligent systems. The complexity of the network is heightened by these systems, as they offer diverse services contingent on traffic type, user needs, and security considerations. In this context, a service function chain offers a toolkit to facilitate the management of intricate network systems. However, various traffic types require dynamic adaptation in the sets of function chains. The problem of optimizing the order of service functions in the chain must be solved using the proposed approach, along with balancing the …
Streamlined Hpc Environments With Cvmfs And Cybergis-Compute,
2023
University of Illinois at Urbana-Champaign
Streamlined Hpc Environments With Cvmfs And Cybergis-Compute, Alexander C. Michels, Mit Kotak, Anand Padmanabhan, Shaowen Wang
I-GUIDE Forum
High-Performance Computing (HPC) resources provide the potential for complex, large-scale modeling and analysis, fueling scientific progress over the last few decades, but these advances are not equally distributed across disciplines. Those in computational disciplines are often trained to have the necessary technical skills to utilize HPC (e.g. familiarity with the terminal), but many disciplines face technical hurdles when trying to apply HPC resources to their work. This unequal familiarity with HPC is increasingly a problem as cross-discipline teams work to tackle critical interdisciplinary issues like climate change and sustainability. CyberGIS-Compute is middle-ware designed to democratize to HPC services with the …
Prirpt: Practical Blockchain-Based Privacy-Preserving Reporting System With Rewards,
2023
Singapore Management University
Prirpt: Practical Blockchain-Based Privacy-Preserving Reporting System With Rewards, Rui. Shi, Yang Yang, Huamin. Feng, Feng. Yuan, Huiqin. Xie, Jianyi. Zhang
Research Collection School Of Computing and Information Systems
In order to obtain evidence of a crime timely, most authorities encourage whistleblowers to provide valuable reports by rewarding them with prizes. However, criminals will try their best to delete or tamper with the reports and even threaten and revenge the whistleblowers to escape punishment. Hence, to make the reporting system work, it is essential to ensure the integrity of reported messages and the anonymity of the reporting and rewarding procedures in the reporting system. Most existing schemes for this problem are generally based on ring signatures, which incur high computational overhead and imperfect anonymity. In this paper, we introduce …
National Conference On Computing 4.0 Empowering The Next Generation Of Technology (Era Of Computing 4.0 And Its Impact On Technology And Intelligent Systems),
2023
Principal, GANDHI INSTITUTE OF EXCELLENT TECHNOCRATS (GIET) Ghangapatana, Bhubaneswar
National Conference On Computing 4.0 Empowering The Next Generation Of Technology (Era Of Computing 4.0 And Its Impact On Technology And Intelligent Systems), Subhrajit Pradhan Prof (Dr), Chandan Kumar Sahoo Dr., Tarini Prasad Pattnaik Prof., Tamasha Priyadarshini Prof
Conference Proceedings - Full Volumes
As we enter the era of Computing 4.0, the landscape of technology and intelligent systems is rapidly evolving, with groundbreaking advancements in artificial intelligence, machine learning, data science, and beyond. The theme of this conference revolves around exploring and shaping the future of these intelligent systems that will revolutionize industries and transform the way we live, work, and interact with technology.
Conference Topics
- Quantum Computing and Quantum Information
- Edge Computing and Fog Computing
- Artificial Intelligence and Machine Learning in Computing 4.0
- Internet of Things (IOT) and Smart Cities
- Block chain and Distributed Ledger Technologies
- Cybersecurity and Privacy in the Computing …
A Social Profile-Based E-Learning Model,
2023
Kennesaw State University
A Social Profile-Based E-Learning Model, Xola Ntlangula
African Conference on Information Systems and Technology
Many High Education Institutions (HEIs) have migrated to blended or complete online learning to cater for less interruption with learning. As such, there is a growing demand for personalized e-learning to accommodate the diversity of students' needs. Personalization can be achieved using recommendation systems powered by artificial intelligence. Although using student data to personalize learning is not a new concept, collecting and identifying appropriate data is necessary to determine the best recommendations for students. By reviewing the existing data collection capabilities of the e-learning platforms deployed by public universities in South Africa, we were able to establish the readiness of …
E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem,
2023
Kennesaw State University
E-Wild Life Alert: Tackling The Human-Wildlife Conflict Problem, Eliel Kundai Zhuwankinyu, Sibonile Moyo, Catherine Chivasa, Smart Ncube
African Conference on Information Systems and Technology
Depletion of resources meant for both human and animal survival leads to competition for these. Human-wildlife conflict (HWC) occurs when these two parties compete for resources such as space, water, and food. If not properly managed, HWC can lead to loss of livelihoods and even loss of life. This paper discusses the design and development of an E-Wildlife Alert application that uses machine learning to detect dangerous animals. Using the Design Science Research method, a convolutional neural network is trained to build an artifact that detects five dangerous animals from an African context. The artifact is mounted on a robot …
A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University,
2023
Nelson Mandela University
A Customized Artificial Intelligence Based Career Choice Recommender System For A Rural University, Nosipho Carol Mavuso, Nobert Jere, Darelle Vangreunen
African Conference on Information Systems and Technology
Rapid technological developments have enabled users to be supported and guided in decision-making. An example of this is the ability of tertiary students to use technology to explore different career options and make informed decisions about their future. Notwithstanding the increasing use of technology in general, the technology for career guidance and personalized career recommendations in South Africa is still limited. There are some limiting factors such as the ever-looming challenge of limited access to technology, language barriers and cultural differences that are prevalent in rural areas. With this premise, this study collected quantitative data from students at an Eastern …
Deep Learning Techniques For Efficient Evaluation Of Asphalt Pavement Condition,
2023
Public Works Department, Faculty of Engineering; Ain Shams University; Cairo; Egypt
Deep Learning Techniques For Efficient Evaluation Of Asphalt Pavement Condition, Kamel Mahdy, Ahmed Zekry, Mohamed Moussa, Ahmed Mohamed, Hassan Mahdy, Mohamed Elhabiby
Mansoura Engineering Journal
For the last few decades, researchers have been devising a simple and cost-effective method to evaluate pavement distresses to give decision-makers adequate feedbacks about the pavement condition of a certain road. Fortunately, with the evolution and progression of computer vision tools and techniques, good results had been achieved regarding the detection, classification, and quantification of road distress. In this paper, a new efficient process of road distress analysis using deep learning models is introduced. This new process was tested on a collected road dataset to evaluate the efficiency and speed of this low-cost road maintenance system. Promising results were obtained …
Graphical Image Rendering: Modeling, Animation Of Facial Or Wild Images,
2023
University of illinois, Springfield
Graphical Image Rendering: Modeling, Animation Of Facial Or Wild Images, Rohit Kaushik, Chirag Vashisht, Eva Kaushik
International Journal of Computer and Communication Technology
In this comparative study, we intend to analyse different methodologies to perform 3-Dimensional modeling and printing, by using raw images as input without any supervision by a human. Since the input consists of only raw images, the foundation of the methods is finding symmetry in images. But the images that seem symmetric are not symmetric due to the perspective effect and utterance of other factors. The method uses factors like depth, albedo, point of view, and lighting from the input image to formulate 3D shapes. A 3D template model with feature points is created, and by deforming the 3D template …