Buscar
Mostrando ítems 91-100 de 212
Editor’s Note. Towards Blockchain Intelligence
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2020-09)
In this special issue, we want to gather some innovative applications that are currently pushing forward the research on Blockchain technologies. In particular, we are interested also in those applications that put the ...
Alzheimer Disease Detection Techniques and Methods: A Review
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2021-09)
Brain pathological changes linked with Alzheimer's disease (AD) can be measured with Neuroimaging. In the past few years, these measures are rapidly integrated into the signatures of Alzheimer disease (AD) with the help ...
Modified YOLOv4-DenseNet Algorithm for Detection of Ventricular Septal Defects in Ultrasound Images
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2021-09)
Doctors conventionally analyzed echocardiographic images for diagnosing congenital heart diseases (CHDs). However, this process is laborious and depends on the experience of the doctors. This study investigated the use of ...
An Effective Tool for the Experts' Recommendation Based on PROMETHEE II and Negotiation: Application to the Industrial Maintenance
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2021-06)
In this article, we propose an expert recommendation tool that relies on the skills of experts and their interventions in collaboration. This tool provides us with a list of the most appropriate (effective) experts to solve ...
Dynamic Generation of Investment Recommendations Using Grammatical Evolution
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2021-06)
The attainment of trading rules using Grammatical Evolution traditionally follows a static approach. A single rule is obtained and then used to generate investment recommendations over time. The main disadvantage of this ...
A Comparative Analysis of Machine Learning Models for Banking News Extraction by Multiclass Classification With Imbalanced Datasets of Financial News: Challenges and Solutions
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2022-03)
Online portals provide an enormous amount of news articles every day. Over the years, numerous studies have concluded that news events have a significant impact on forecasting and interpreting the movement of stock prices. ...
An Extreme Learning Machine-Relevance Feedback Framework for Enhancing the Accuracy of a Hybrid Image Retrieval System
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2020-06)
The process of searching, indexing and retrieving images from a massive database is a challenging task and the solution to these problems is an efficient image retrieval system. In this paper, a unique hybrid Content-based ...
Comparative Study on Ant Colony Optimization (ACO) and K-Means Clustering Approaches for Jobs Scheduling and Energy Optimization Model in Internet of Things (IoT)
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2020-03)
The concept of Internet of Things (IoT) was proposed by Professor Kevin Ashton of the Massachusetts Institute of Technology (MIT) in 1999. IoT is an environment that people understand in many different ways depending on ...
NFC and VLC based Mobile Business Information System for Registering Class Attendance
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2020-06)
This work proposes a Mobile Information System for class attendance control using Visible Light Communications (VLC), and the students’ own mobile devices for automatic clocking in and clocking out. The proposed information ...
Deep Learning-based Side Channel Attack on HMAC SM3
(International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 2020-12)
SM3 is a Chinese hash standard. HMAC SM3 uses a secret key to encrypt the input text and gives an output as the HMAC of the input text. If the key is recovered, adversaries can easily forge a valid HMAC. We can choose ...