International Journal of Innovative Technology and Research (IJITR)
Not a member yet
    2569 research outputs found

    Improving Picture Captioning Using A Multi-Task Learning Method

    Get PDF
    We present MLAIC, a multi-task learning approach to image captioning, motivated by the idea that individuals are naturally gifted in more than one area. The three main parts of MLAIC are as follows: (1) an image classification model that learns to use a convolutional neural network (CNN) to encode images with a lot of category awareness; (2) an image syntax generation model that learns to use a long short-term memory (LSTM) decoder to encode images with better syntax awareness; and (3) an image captioning model that uses its CNN encoder for object classification and its LSTM decoder for syntax generation. The extra information on syntax and object classification is very useful for the picture captioning model. Our model outperforms other formidable rivals, according to experimental findings on the MS-COCO dataset

    Verification via Shared Negative Password Encryption

    Get PDF
    As the Internet has grown, it has led to the creation of a huge number of online services. Most people use password authentication because it is cheap and easy to set up. As a result, academics and businesses are constantly showing a great deal of interest in password security. Cracking a password is one of the most common types of cyber attacks used in today's world. Passwords are becoming more complex. For instance, many users choose passwords based on the language they use most often and then repeat those passwords across many sites. The attacker uses a number of techniques to get the credentials needed to steal sensitive data. These techniques include guessing the password, shoulder surfing, and other tools that are designed to break passwords. It is recommended that we use passwords that are highly encrypted and hashed to get around this problem. Since the hash function is combined with the encryption process, it is very difficult to distinguish passwords from ENPs. The investigation and comparison of algorithms show that the ENP cloud is resistant to attacks using lookup tables and provides a higher level of protection for a password when it is subjected to dictionary attacks. In this case, the process of developing a secure password involves two steps: first, the password is hashed, and then it is encrypted

    A Review Study On Sustainable Solutions In Special Domains Using AI And ML

    Get PDF
    "Sustainability means meeting our own needs without compromising the ability of future generations to meet their own needs. In addition to natural resources, we also need social and economic resources. Sustainability is not just environmentalism. Embedded in most definitions of sustainability we also find concerns for social equity and economic development." In this paper we will see as applications of AI and ML , sustainable solutions in some special domain areas

    Reference Based Study On Sustainable Solutions In Some Sectors Using AI And ML

    Get PDF
    To demonstrate some specifics for disease diagnosis/classification there are two different techniques used in the classification of these diseases including using "Artificial Neural Networks (ANN) and Bayesian Networks (BN)". It was found that ANN was better and could more accurately classify diabetes and CVD. Through the use of Medical Learning Classifiers (MLC's), Artificial Intelligence has been able to substantially aid doctors in patient diagnosis through the manipulation of mass Electronic Health Records (EHR's). Medical conditions have grown more complex, and with a vast history of electronic medical records building, the likelihood of case duplication is high. Although someone today with a rare illness is less likely to be the only person to have had any given disease, the inability to access cases from similarly symptomatic origins is a major roadblock for physicians. The implementation of AI to not only help find similar cases and treatments, such as through early predictors of Alzheimer’s disease and dementias, but also factor in chief symptoms and help the physicians ask the most appropriate questions helps the patient receive the most accurate diagnosis and treatment possible. This paper presents a literature based study on sustainabile solutions in Healthcare using AI and ML

    Developing A Machine Learning Methodology That Is Both Reliable And Secure

    Get PDF
    To swiftly and effectively obtain robust features from a representation in the bag of words, we propose a semantically improved Marginalized Stacked Denoising autoencoder. There is a critical need for robust and selective statistical representations of text learning in this vast area of research. A unique representational learning technique for addressing this issue is proposed in this research. In order to develop our own method, Semantically-Enhanced Marginalized Denoising Auto-encoder (smSDA), we take the popular deep learning model stacked Denoising auto-encoder and apply a semantic modification to it. Several academic disciplines, including topic recognition and emotional analysis, are intertwined with the research on cyberbullying detection. They paved the way for the automated detection of cyberbullying. By mining the bullying dataset's inherent feature structure, our suggested method may locate a reliable and discriminative textual representation. Our proposed methodology is extensively tested using two publicly accessible cyberbullying corpora, with findings that demonstrate its superiority over existing basic text representation learning methods. The semantic extension also includes sparsity limitations and semantic dropout noise, both of which were produced with the use of domain knowledge and the word embedding technique. Extensive testing using real-world data sets has validated the efficacy of our suggested methodology

    Hybrid Cryptography For Data Safety In The Cloud

    Get PDF
    Users have access to high-speed networks and constant Internet connectivity, regardless of their physical location. Computing in the cloud is an approach that views the many resources available online as a single, cohesive whole. The term "cloud storage" refers to a certain kind of networked, online data storage paradigm in which information is kept in shared, remote pools of storage that are implemented using virtualization technology. Businesses and individuals that need their data hosted pay for or lease storage space from organizations that run massive data centers. Data centre operators virtualized resources per customer need and make them available to end users in the form of storage pools for archival or long-term data storage. It's possible that the resource is physically spread among many servers. The durability of data is a must for every storage medium. There have been numerous suggestions for data storage servers. Replicating a message so that each storage server has a copy of the message is one technique to make data more reliable. A distributed storage system is an ideal environment for a decentralized erasure code. Using AES and proxy re-encryption, we build a cloud storage system that can transmit data securely. At the first stage of this concept, the data will be encrypted using AES by the owner. The next step involves applying a dividing key inside the cloud, where the data has been broken down into smaller bits. Several data storage formats will be used. Data monitoring will be handled by a specialized data distributor. Whether the authorized user may recover the data in a reverse fashion from the cloud storage system

    Cloud Storage System Towards Dynamic Encrypted Cloud Data With Symmetric-Key Based Verification

    Get PDF
    Verifiable Searchable Symmetric Encryption, as an important cloud security technique, allows users to retrieve the encrypted data from the cloud through keywords and verify the validity of the returned results. Dynamic update for cloud data is one of the most common and fundamental requirements for data owners in such schemes. Attracted by these appealing features, both individuals and enterprises are motivated to contract out their data to the cloud, instead of purchasing software and hardware to manage the data themselves. So far, most of the works have been proposed under different threat models to achieve various search functions, such as single keyword search, similarity search, multi- keyword Boolean search, ranked search, multi-keyword ranked search, etc. Among them, multikeyword ranked search achieves more attention for its practical applicability. propose a secure and ranked multikeyword search protocol in a multi-owner cloud model over encrypted cloud data

    Reference Based Study On Soundtrack (Music) Sustainable Solutions Using AI Techniques

    Get PDF
    Artificial intelligence (AI) has been used in applications to alleviate certain problems throughout industry and academia. AI, like electricity or computers, is a general-purpose technology that has a multitude of applications. It has been used in fields of language translation, image recognition, credit scoring, e-commerce and other domains. Computer music is the application of computing technology in music composition, to help human composers create new music or to have computers independently create music, such as with algorithmic composition programs. It includes the theory and application of new and existing computer software technologies and basic aspects of music, such as sound synthesis, digital signal processing, sound design, sonic diffusion, acoustics, electrical engineering, and psychoacoustics. The field of computer music can trace its roots back to the origins of electronic music, and the first experiments and innovations with electronic instruments at the turn of the 20th century.  In this paper we will study how AI is applied for sustainable music solutions

    Filter-Based Product Search Engines With Dynamic Component Ranking

    Get PDF
    The use of faceted browsing is common on shopping and comparison websites. When dealing with problems of this kind, it is usual practise to apply a specified set of features in a certain order. This tactic suffers from two major flaws that undermine its effectiveness. First things first: before you do anything else, you need to make sure that you set aside a significant amount of time to compile an effective list. Second, if you have a certain number of aspects and all of the products that are relevant to your search are tagged with the same aspect, then that particular aspect is basically worthless. This article presents a method for doing online business that makes use of a dynamic facet ordering system. On the basis of measurements for specificity and dispersion of aspect value dispersion, the entirely automated system assigns ratings to the characteristics and facets that lead to a speedy drill-down for each and every prospective target product. In contrast to the methodologies that are currently in use, the framework takes into consideration the subtleties that are specific to e-commerce. These nuances include the need for several clicks, the grouping of facets according to the traits that they share, and the predominance of numerical facets. In a large-scale simulation and user survey, our approach performed much better than the baseline greedy strategy, the facet list prepared by domain experts, and the state-of-the-art entropy-based solution. These comparisons were made using the same data

    A Novel VLSI Design On CSKA Of Binary Tree Adder With Compaq Area And High Throughput

    Get PDF
    Addition is one of the most basic operations performed in all computing units, including microprocessors and digital signal processors. It is also a basic unit utilized in various complicated algorithms of multiplication and division. Efficient implementation of an adder circuit usually revolves around reducing the cost to propagate the carry between successive bit positions. Multi-operand adders are important arithmetic design blocks especially in the addition of partial products of hardware multipliers. The multi-operand adders (MOAs) are widely used in the modern low-power and high-speed portable very-large-scale integration systems for image and signal processing applications such as digital filters, transforms, convolution neural network architecture. Hence, a new high-speed and area efficient adder architecture is proposed using pre-compute bitwise addition followed by carry prefix computation logic to perform the three-operand binary addition that consumes substantially less area, low power and drastically reduces the adder delay. Further, this project is enhanced by using Modified carry bypass adder to further reduce more density and latency constraints. Modified carry skip adder introduces simple and low complex carry skip logic to reduce parameters constraints. In this proposal work, designed binary tree adder (BTA) is analyzed to find the possibilities for area minimization. Based on the analysis, critical path of carry is taken into the new logic implementation and the corresponding design of CSKP are proposed for the BTA with AOI, OAI

    2,341

    full texts

    2,569

    metadata records
    Updated in last 30 days.
    International Journal of Innovative Technology and Research (IJITR) is based in India
    Access Repository Dashboard
    Do you manage Open Research Online? Become a CORE Member to access insider analytics, issue reports and manage access to outputs from your repository in the CORE Repository Dashboard! 👇