All Stories

  1. Teaching self-driving cars to understand roads better using AI and learning from experience
  2. How safe is monocular depth estimation for self-driving cars at intersections?
  3. A better way to evaluate how similar summaries are to the original text
  4. A new way to evaluate question-answering systems for better reliability
  5. Making self-driving cars safer by testing their vision against road hacks
  6. How Computers Learn to Write Human-Like Text Summaries: A Global Research Overview
  7. An Efficient System for Finding Relevant Information from Internal Company Documents and Websites
  8. Improving Lane Detection in Self-Driving Cars with a Layered Network Approach
  9. Smart Network Switching: Improving Mobile Data Transfer Between LTE and WiFi
  10. Detecting and classifying threats in tweets
  11. Improving AdaGrad Algorithms via Cosine Annealing: Data Distribution Analysis
  12. Explaining how easily deep learning models misjudge images
  13. Efficacy of Combining Neural Networks and Symbolic Reasoning for Common Sense Reasoning
  14. Selection of Key Sentences to Enhance the Effectiveness of Text Summarization
  15. Recognizing and Extracting Tabular Data from Scanned Documents
  16. Omniscient: An Automatic Question Answering System
  17. User Application Based Network Service
  18. Evaluating Gender Bias in Hindi-English Machine Translation
  19. Recognition of institute names and degrees in a CV with minimum tagging using AI
  20. Multiclass Queueing Network Modeling and Traffic Flow Analysis for SDN-Enabled Mobile Core Networks With Network Slicing
  21. Out of the Closet
  22. Automated Stock Price Forecasting for The Near Future
  23. Improving learning in hearing-impaired children through artificial intelligence
  24. Symmetric key-based authenticated encryption protocol
  25. Meta-Learner with Sparsified Backpropagation
  26. IoT Based Driving Risk Assessment and Warning System
  27. Performance Analysis of Out-Band OpenFlow Switch Architecture: The Single Node Case
  28. A meta data mining framework for botnet analysis
  29. Face Detection and Tagging Using Deep Learning
  30. Chroot Hardening Through System Calls Modification
  31. Chatbot for university related FAQs
  32. Extracting quality relations from categorical data using modified qube algorithm
  33. Fitness function to find game equilibria using genetic algorithms
  34. Multi-modality face recognition: An information theoretic approach
  35. Neural network approach for vision-based track navigation using low-powered computers on mavs
  36. Word based thematic game on Indian mythology
  37. Safe buzz: adaptive security for multi-agents through situational awareness
  38. Safe buzz: adaptive security for multi-agents through situational awareness
  39. Context based interesting tweet recommendation framework
  40. Intelligence analysis of Tay Twitter bot
  41. Path independent real time points of interest detection in road networks
  42. Detection of fake Twitter followers using graph centrality measures
  43. Identification of causal relationships among clinical variables for cancer diagnosis using multi-tenancy
  44. Identification of gene network motifs for cancer disease diagnosis
  45. Mutual fund performance prediction
  46. Unemployment rates forecasting using supervised neural networks
  47. Image sentiment analysis using deep convolutional neural networks with domain specific fine tuning
  48. Natural language image descriptor
  49. Anti-scraping application development
  50. Is That Twitter Hashtag Worth Reading
  51. Is Stack Overflow Overflowing With Questions and Tags
  52. Smart card based password authentication and user anonymity scheme using ECC and steganography
  53. Differential private random forest
  54. Towards a generic framework for short term firm-specific stock forecasting
  55. Threat Analysis and malicious user detection in reputation systems using Mean Bisector Analysis and Cosine Similarity (MBACS)
  56. Detection of User Cluster with Suspicious Activity in Online Social Networking Sites
  57. Contextual information based recommender system using Singular Value Decomposition
  58. Detection and filtering of collaborative malicious users in reputation system using quality repository approach
  59. Alert-BDI: BDI model with adaptive alertness through situational awareness
  60. Optimal Neural Network Architecture for Stock Market Forecasting
  61. Stock Market Prediction Accuracy Analysis Using Kappa Measure
  62. Aware-BDI: An Extension of the BDI Model Incorporating Situational Awareness
  63. Ownership authentication transfer protocol for ubiquitous computing devices
  64. Model Checking Zero Knowledge System
  65. Enhanced mining association rule algorithm with reduced time & space complexity
  66. Modelling and Verification of Extensible Authentication Protocol Using Spin Model Checker
  67. Web opinion mining for social networking sites
  68. Decoding robustness performance comparison for QR and data matrix code
  69. Modeling & verification of Sliding Window Protocol with data loss and intruder detection using NuSMV
  70. Formal verification of the Extensible Authentication Protocol using SPIN
  71. Design and development of a desktop monitoring system
  72. Modeling two way concurrent buffer system using timed automata in UPPAAL
  73. Erroneous state detection in piecewise FIFO system
  74. Differentiated QoS with Modified C/I based scheduling algorithm
  75. Modeling and Verification of Agent based Adaptive Traffic Signal using Symbolic Model Verifier
  76. Privacy preserving and ownership authentication in ubiquitous computing devices using secure three way authentication
  77. Symbolic verification of web crawler functionality and its properties
  78. Modeling and Verification of Fiat-Shamir Zero Knowledge Authentication Protocol
  79. Cloud Based Application Development for Accessing Restaurant Information on Mobile Device using LBS
  80. Is OAuth flawless?
  81. Modeling and Verification of Kerberos Protocol Using Symbolic Model Verifier
  82. Symbolic Verification of a Strength Based Multi-Agent Argumentation Scheme
  83. Modeling and Verification of Inter Realm Authentication in Kerberos Using Symbolic Model Verifier
  84. Logical Modeling and Verification of a Strength Based Multi-agent Argumentation Scheme Using NuSMV
  85. Modeling and Verification of Server Aided Verification Protocol Using NuSMV
  86. Modeling and Verification of Chess Game Using NuSMV
  87. Cloud Based Application Development for Mobile Devices for Accessing LBS
  88. Physical Layer Authentication in Wired and Wireless Communication Systems
  89. Modeling freshness concept to overcome Replay attack in Kerberos protocol using NuSMV
  90. Protecting location privacy in Augmented Reality using k-anonymization and pseudo-id
  91. Model checking message exchange in Location Based Services
  92. Securing location privacy in Augmented Reality
  93. Exact schedulability analysis of global multi-processor IUF scheduling using symbolic model checking
  94. A generalized closed form relation for BER of QPSK/M-QAM over fading channel