About
15
Publications
29,868
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,058
Citations
Introduction
Current institution
Publications
Publications (15)
Diabetes presents a major global health challenge, with an increasing prevalence worldwide. Early detection and continuous glucose monitoring are pivotal to effective diabetes management. Optical glucose sensing is a promising noninvasive alternative to traditional methods, such as finger‐prick blood glucose tests. This study explores the cutting‐e...
This chapter elucidates what the major effects of generative artificial intelligence are: It changes things a lot. It first discusses the overall of what generative AI can do using one kind of generative AI, then it considers what generative AI does to make our defences against new things that can go wrong much more effective, and then it reflects...
The chapter presents a comprehensive exploration of the changing dynamics at the intersection between the rapidly growing landscape of the interconnectivity of various devices—the internet of things—and the innovations piloted by advancements in generative artificial intelligence. In the following background-focused analysis, the significance of th...
Background
Deep Learning is an AI technology that trains computers to analyze data in an approach similar to the human brain. Deep learning algorithms can find complex patterns in images, text, audio, and other data types to provide accurate predictions and conclusions. Neuronal networks are another name for Deep Learning. These layers are the inpu...
In developing technology, hackers are actively collecting personal information. To achieve their goals and acquire simple access to information about any individual, they use a range of methods and techniques. A privacy breach occurs when hackers gain access to complete information without the user's permission. Threats and dangers to security can...
Climate change brings many changes in a physical environment like plants and leaves. The flowers and plants get affected by natural climate and local weather extremes. However, the projected increase in the frost event causes sensitivity in plant reproduction and plant structure vegetation. The timing of growing and reproduction might be an essenti...
Online banking is an ideal method for conducting financial transactions such as e-commerce, e-banking, and e-payments. The growing popularity of online payment services and payroll systems, however, has opened new pathways for hackers to steal consumers' information and money, a risk which poses significant danger to the users of e-commerce and e-b...
People in today’s world are getting used to buying the products they need to shop online. They don’t need to go much more than beyond to shop online. They can easily access online stores or put mobile devices in place and arrange what you want. Our research is about online vs offline purchasing preference. What customers prefer to buy online or off...
Artificial intelligence brings large markets, including advertising, tourism, finance, policy, workplace education. We probably associated with Chabot's job (defined as an automated, but personalized, a conversation between software and human users). We plan to use Chatbots in the workplace to assist us in pursuing a new career, addressing human re...
This research paper would discuss the use of artificial intelligence (AI) in stock market modelling, sales forecasting, and market segmentation problems, with a focus on convolutional neural networks (CNN) and fuzzy logic. Backpropagation algorithms were used to solve the first two problems, while self-organizing maps were used to solve the third (...
Online stores like Amazon provide a website for consumers to express their opinions about different items. Since then, it has been established that buying online, 90% of consumers are testing different websites channels to determine the quality of their purchase. To evaluate the text data and then extract the sentiment element from that the field o...
Unfortunately, both researchers and malware authors have demonstrated that malware scanners are limited and can be easily evaded by simple obfuscation techniques. This paper proposes a novel ensemble convolutional neural networks (CNNs) based architecture for effective detection of both packed and unpacked malware. We have named this method image-b...
The volume, type, and sophistication of malware is increasing. Deep convolutional neural networks (CNNs) have lately proven their effectiveness in malware binary detection through image classification. In this paper, we propose a novel classifier to detect variants of malware families and improve malware detection using CNN-based deep learning arch...