Wednesday, April 12, 2023

PAPER : Trace mortal pursuit framework using AI

 

Trace mortal pursuit framework using AI


ABSTRACT - Computer interfaces novelties are noticeable to expand AI based technology. Human actions and movements are recorded, tracked, and noticed with the help of AI based expert systems. NLP, ML, and its techniques are owned for tracking of human behaviours, according to the cautions that are generated in crucial time of situations will assist the mortals. To restrain emergency situations, AI based set-up and its mode are popular in human way of life. Surveillances gadgets are required around-the-clock to track record in the form of facts that are analysed using computer visionary techniques, NLP is utilized to recognize the human behaviour speech to diagnosis the circumstances and act according to posies. RNN with LSTM techniques are exercised and examine to execute the framework.

 Keywords: NLP, facts, RNN, LSTM, examine, framework.

"TRACE MORTAL PURSUIT FRAMEWORK USING AI", Dr.V.Shanmukha Rao,Md.Imran,D.S. Srinivas,D. Varun Prasad, Juni Khyat ISSN: 2278-4632 (UGC Care Group I Listed Journal) Vol-13, Issue-04, No.06, April : 2023 Page | 17 DOI: 10.36893.JK.2023.V13I04N16.0017-0022 

http://junikhyatjournal.in/no_1_Online_23/3s_apr.pdf

http://junikhyatjournal.in/no_1_Online_23.html

PAPERS: Analyzing of human facial bearings from facial emotion detection framework using Deep Learning

 

Analyzing of human facial bearings from facial emotion detection framework using Deep Learning


ABSTRACT- Aspirations are increased perilously with the contemporary technology in these days; Deep learning techniques are driven to develop various types of applications in and around computer vision. HCI systems are designed to analyze various human emotions that will help to study and analyze human behaviors. In Artificial intelligence, CNN and DNN models are pinpoint and trained to test to detect the emotions of human face and extracting their facial features. Mankind emotions such as annoyance, aversion, panic, satisfaction, unhappiness, revelation and so forth. Features are classified and analyzed using emotion recognition methodologies. The frameworks will be recognized and evaluated to generate the various results of samples that will help in investigating the human facial bearings and its instances that are used in a wide variety of HCI applications.

Keywords: HCI, CNN, DNN, Framework, bearings, instances

"ANALYZING OF HUMAN FACIAL BEARINGS FROM FACIAL EMOTION DETECTION FRAMEWORK USING DEEP LEARNING", Dr.V.Shanmukha Rao,Md.Imran,D.S. Srinivas,D. Varun Prasad, Dogo Rangsang Research Journal UGC Care Group I Journal, ISSN : 2347-7180 Vol-13, Issue-4, No. 20, April 2023 Page | 244 DOI: 10.36893.DRSR.2023.V13I0.0244-0249 

https://www.journal-dogorangsang.in/no_1_Online_23/37s.pdf

https://www.journal-dogorangsang.in/no_1_Online_23.html


Bootcamp on CYBER SECURITY

 

SUPRAJA TECHNOLOGIES IN ASSOCIATION WITH ALIET


3 Days Practical Hands-on Bootcamp on CYBER SECURITY & next followed by a 8 Hrs OR 12 Hrs OR 16 Hrs OR 24 Hrs HACKATHON 
11-04-2023 TO 13-04-2023

Monday, March 13, 2023

DETECTION OF RANSOMWARE ATTACKS IN NETWORK USING MACHINE LEARNING


DETECTION OF RANSOMWARE ATTACKS IN NETWORK USING MACHINE LEARNING

1.ABSTRACT

The development of computer and communication technology has resulted in considerable changes from the past. Despite the fact that utilising new inventions benefits people, organisations, and governments greatly, some people are prejudiced against them. For instance, information security in file systems, information accessibility, and so on.Due to several groups, including the criminal underworld, professionals, and digital activists, including dread of the digital world, which has caused many issues for individuals and organisations, has reached the point where it may jeopardise national and open security. Intrusion Detection Systems (IDS) were created as a result to maintain a safe distance from internet threats. The new CICIDS2017 dataset was utilised to train the Support vector machine (SVM) computations, which are currently being used to identify port sweep efforts. Instead of SVM, we might use other algorithms like CNN, ANN, and random forest. Keywords: data security, information accessibility, digital fear, intrusion detection systems. 

1 B Ramakrishna 2 A Ajith Reddy 3 B Srinivas 4 Dr V Shanmukha Rao

Download Link https://ijsrem.com/download/detection-of-ransomware-attacks-in-network-using-machine-learning/           

Please find your published Research Paper here 

https://ijsrem.com/currentissues/

https://ijsrem.com/volume07issue03march2023/

PAPER : Trace mortal pursuit framework using AI

  Trace mortal pursuit framework using AI ABSTRACT - Computer interfaces novelties are noticeable to expand AI based technology. Human actio...