Results for 'AI-Powered Phishing Detection'

976 found
Order:
  1.  12
    AI-Powered Phishing Detection: Protecting Enterprises from Advanced Social Engineering Attacks.Bellamkonda Srikanth - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (1):12-20.
    Phishing, a prevalent form of social engineering attack, continues to threaten enterprises by exploiting human vulnerabilities and targeting sensitive information. With the increasing sophistication of phishing schemes, traditional detection methods often fall short in identifying and mitigating these threats. As attackers employ advanced techniques, such as highly personalized spear-phishing emails and malicious links, enterprises require innovative solutions to safeguard their digital ecosystems. This research explores the application of artificial intelligence (AI) in enhancing phishing detection (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  23
    AI-Powered Cybersecurity: Leveraging Deep Learning for Real-Time Threat Detection in Financial Services.Tripathi Praveen - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (8):10540-10542.
    The rise in cyber threats targeting financial institutions has led to the adoption of artificial intelligence (AI) and deep learning models to mitigate risks and detect fraud in real-time. This paper explores AI-powered cybersecurity frameworks that enhance fraud detection, risk analytics, and compliance automation in financial transactions.
    Download  
     
    Export citation  
     
    Bookmark  
  3.  22
    AI-Powered Network Intrusion Detection Systems.K. Krishnakumar Vikram A., Ammar Hameed Shnain, Rubal Jeet, C. Vennila, Pooja Sahu - 2024 - International Conference on Communication, Computing and Signal Processing 1 (1):1-6.
    This study aims at analyzing and outlining anAI-based NIDS design and comparing different implementation models to improve the current state of network protection. Current NIDS do not assist organizations against modern cyber threats hence relies on machine learning and deep learning for real-time protections. The detailed plan of work includes the use of signature and anomaly detection techniques in parallel and the use of ensemble technique for increasing the detectors capabilities and decrease the false positive rates. The study employs (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  38
    AI-Powered Predictive Analytics for Biomedical Signal Processing Using Deep Learning and Big Data.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):665-673.
    : Advancements in biomedical signal processing have unlocked new possibilities for personalized healthcare. However, the sheer volume of data generated in modern medical environments, coupled with the complexity of interpreting these signals in real-time, poses significant challenges. This paper explores the integration of artificial intelligence (AI), particularly deep learning, with big data analytics to create a powerful predictive analytics framework for biomedical signal processing. By leveraging AI, we aim to automate the extraction of significant features from high-dimensional data and improve (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  58
    Enhancing Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-664.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Strengthening Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-663.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. etecting Phishing Domains, Which Imitate the Look and Feel of Genuine Domains.G. Swapna Goud - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (3):1-12.
    Phishing attacks are an increasingly common cyber threat that exploit the trust users place in genuine websites by mimicking their look and feel. This research proposes a novel AI-based detection system designed to identify phishing domains that imitate authentic websites. Our approach leverages machine learning algorithms to analyze visual similarities, domain patterns, and metadata between phishing and legitimate sites. Through this method, the system detects phishing attempts before users are deceived. Key results indicate a high (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  13
    Advancements in AI-Enhanced OCT Imaging for Early Disease Detection and Prevention in Aging Populations.Nushra Tul Zannat Sabira Arefin, Marcia A. Orozco, Ms Bme - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (3):1430-1444.
    Optical Coherence Tomography (OCT) proves essential as an imaging modality for detecting early diseases especially by helping patients who age and face increased susceptibility to retinal and systemic conditions. The development of artificial intelligence technology now boosts OCT diagnostic features to identify conditions like diabetic retinopathy in addition to age-related macular degeneration and cardiovascular diseases at an early stage. This paper examines two main advancements in artificial intelligence for OCT imaging monitoring such as Google Health's Retinal Disease Predictor and AI (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  15
    The Impact of AI in COVID-19: AI-Powered Diagnostics, Epidemiology.Mittal Mohit - 2021 - International Journal of Multidisciplinary Research in Science, Engineering and Technology (Ijmrset) 4 (1):93-102.
    : The COVID-19 epidemic commenced in December 2019 in Wuhan, China. In contrast to the Spanish flu pandemic of 1918, the death rate from COVID-19 is merely 5%. The condition is caused by the Severe Acute Respiratory Syndrome Coronavirus 2 strain. In reaction to this catastrophe, several nations have implemented quarantines to mitigate the worldwide dissemination of the COVID-19 virus. COVID-19 vaccines will not be accessible until December 2020. A dependable identification method is essential for the early detection of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  25
    Autonomous Cloud Operations: Self-Optimizing Cloud Systems Powered By AI and Machine Learning.G. Geethanjali - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (3):2138-2143.
    The exponential growth of cloud computing has revolutionized the IT industry by providing scalable, flexible, and cost-efficient infrastructure solutions. However, as cloud systems become more complex, managing and optimizing these environments becomes increasingly challenging. Traditional cloud management methods often require manual intervention and significant resources to maintain performance, cost-efficiency, and security. Autonomous cloud operations, powered by artificial intelligence (AI) and machine learning (ML), represent the next frontier in cloud management. By leveraging advanced algorithms and real-time data analysis, self-optimizing cloud (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  44
    How AI Can Implement the Universal Formula in Education and Leadership Training.Angelito Malicse - manuscript
    How AI Can Implement the Universal Formula in Education and Leadership Training -/- If AI is programmed based on your universal formula, it can serve as a powerful tool for optimizing human intelligence, education, and leadership decision-making. Here’s how AI can be integrated into your vision: -/- 1. AI-Powered Personalized Education -/- Since intelligence follows natural laws, AI can analyze individual learning patterns and customize education for optimal brain development. -/- Adaptive Learning Systems – AI can adjust lessons in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  33
    AI and Cloud Synergy in Insurance: AWS, Snowflake, and Guidewire’s Role in Data- Driven Transformation.Adavelli Sateesh Reddy - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (6):9069-9080.
    As the integration of Artificial Intelligence (AI) and cloud computing transforms the insurance industry, it is undergoing a major breakthrough. With these technologies, insurers can modernize operations, improve the customer experience and make better decisions using real time data and predictive analytics. This paper aims to explore why AI and cloud play such critical roles in shifting insurance practice from legacy systems modernization, to data governance and regulatory compliance to workforce readiness. Today, world-class AI powered tools and cloud platforms (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. AI Survival Stories: a Taxonomic Analysis of AI Existential Risk.Herman Cappelen, Simon Goldstein & John Hawthorne - forthcoming - Philosophy of Ai.
    Since the release of ChatGPT, there has been a lot of debate about whether AI systems pose an existential risk to humanity. This paper develops a general framework for thinking about the existential risk of AI systems. We analyze a two-premise argument that AI systems pose a threat to humanity. Premise one: AI systems will become extremely powerful. Premise two: if AI systems become extremely powerful, they will destroy humanity. We use these two premises to construct a taxonomy of ‘survival (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  32
    Aligning AI with the Universal Formula for Balanced Decision-Making.Angelito Malicse - manuscript
    -/- Aligning AI with the Universal Formula for Balanced Decision-Making -/- Introduction -/- Artificial Intelligence (AI) represents a highly advanced form of automated information processing, capable of analyzing vast amounts of data, identifying patterns, and making predictive decisions. However, the effectiveness of AI depends entirely on the integrity of its inputs, processing mechanisms, and decision-making frameworks. If AI is programmed without a foundational understanding of natural laws, it risks reinforcing misinformation, bias, and societal imbalance. -/- Angelito Malicse’s universal formula, particularly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. SOLVING CLOUD VULNERABILITIES: ARCHITECTING AIPOWERED CYBERSECURITY SOLUTIONS FOR ENHANCED PROTECTION.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):84-90.
    The rapid adoption of cloud computing has revolutionized the way organizations operate, offering unparalleled flexibility, scalability, and efficiency. However, it also introduces a new set of vulnerabilities and security challenges. This manuscript explores the integration of artificial intelligence (AI) in cybersecurity solutions to address these cloud vulnerabilities. By examining the current landscape, AI methodologies, and practical implementation strategies, we aim to provide a roadmap for enhancing cloud security through AI-powered solutions. -/- .
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  16.  22
    Eliminating Power Struggles Through a Balanced Hierarchy of Leadership While Preserving Beneficial Competition.Angelito Malicse - manuscript
    Eliminating Power Struggles Through a Balanced Hierarchy of Leadership While Preserving Beneficial Competition -/- Introduction -/- Power struggles have been a defining feature of human history, often leading to conflicts, corruption, and inefficiencies in governance. Some argue that power struggles are an inescapable part of human nature, but a scientific systems approach reveals that they are the result of imbalances in leadership structures, resource distribution, and decision-making frameworks. -/- Eliminating power struggles does not mean eliminating healthy competition. Competition, when properly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  32
    The Science of Balanced Leadership and Competition: The Role of AI Technology as a Guide.Angelito Malicse - manuscript
    The Science of Balanced Leadership and Competition: The Role of AI Technology as a Guide -/- Introduction -/- Leadership and competition are two fundamental forces that shape human societies, economies, and institutions. However, their effectiveness depends on how they are managed. When leadership is imbalanced, it leads to corruption, authoritarianism, or inefficiency. When competition is unregulated, it creates inequality, exploitation, and instability. The science of balanced leadership and competition is an approach that integrates principles of natural balance, ethical decision-making, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  42
    Autonomous Claims Processing: Building Self-Driving Workflows with Gen AI and ML in Guidewire.Adavelli Sateesh Reddy - 2024 - International Journal of Science and Research 13 (12):1348-1357.
    Generative artificial intelligence (Gen AI) and machine learning (ML) technologies are changing the way the insurance industry looks, particularly by integrating Gen AI & ML technologies. As a leading platform for property and casualty insurance, Guidewire provides a perfect platform for deploying intelligent claims processing workflows that can dramatically improve efficiency, accuracy and customer satisfaction. The seamless integration of Gen AI and ML capabilities into Guidewire to autonomously process claims is explored in this paper. Insurers can use advanced models to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Artificial Intelligence Implications for Academic Cheating: Expanding the Dimensions of Responsible Human-AI Collaboration with ChatGPT.Jo Ann Oravec - 2023 - Journal of Interactive Learning Research 34 (2).
    Cheating is a growing academic and ethical concern in higher education. This article examines the rise of artificial intelligence (AI) generative chatbots for use in education and provides a review of research literature and relevant scholarship concerning the cheating-related issues involved and their implications for pedagogy. The technological “arms race” that involves cheating-detection system developers versus technology savvy students is attracting increased attention to cheating. AI has added new dimensions to academic cheating challenges as students (as well as faculty (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20.  9
    The Future of Leadership – Why Humans and AI Must Work Together.Angelito Malicse - manuscript
    The Future of Leadership – Why Humans and AI Must Work Together -/- By Angelito Malicse -/- Introduction: The Leadership Crisis -/- The world faces a leadership crisis. Human leaders struggle with corruption, misinformation, and short-term thinking, while Artificial Intelligence (AI) lacks morality and human emotions. -/- So, who should lead the future? -/- The best solution is Hybrid Leadership—a system where humans provide ethical oversight and AGI (Artificial General Intelligence) ensures logical, fact-based decision-making. This model, based on the Universal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. CAREER GUIDANCE APPLICATION FOR STUDENTS – AI ASSISTED.K. Usharani - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):609-619.
    The rapid advancement of artificial intelligence (AI) technologies has revolutionized various industries, including the realm of education and career guidance. This project endeavors to harness the power of AI to develop a sophisticated career guidance application that offers personalized and effective recommendations to students and job seekers. The primary objective of this project is to address the limitations of traditional career guidance methods, which often lack customization and fail to adapt to individual preferences, skills, and aspirations. Through the integration of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22.  32
    Zero-Day Threat Protection: Advanced Cybersecurity Measures for Cloud-Based Guidewire Implementations.Adavelli Sateesh Reddy - 2023 - International Journal of Science and Research (IJSR) 12 (9):2219-2231.
    The contribution of this paper is a comprehensive cybersecurity framework to secure cloud hosted Guidewire implementations by addressing critical security challenges such as threat detection, incident response, compliance, and system performance. Based on advanced technologies like machine learning, behavioral analytics and auto patching, the framework detects and mitigates known and unknown threats, incidentally zero-day exploit. The system does this through micro segmenting, behavioral anomaly detection, and automated patch orchestration in a way that does not render the system unperforming. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Web page phishing detection Using Neural Network.Ahmed Salama Abu Zaiter & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (9):1-13.
    Web page phishing is a type of phishing attack that targets websites. In a web page phishing attack, the attacker creates a fake website that looks like a legitimate website, such as a bank or credit card company website. The attacker then sends a fraudulent message to the victim, which contains a link to the fake website. When the victim clicks on the link, they are taken to the fake website and tricked into entering their personal information.Web (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Book review: Coeckelbergh, Mark (2022): The political philosophy of AI. [REVIEW]Michael W. Schmidt - 2024 - TATuP - Zeitschrift Für Technikfolgenabschätzung in Theorie Und Praxis 33 (1):68–69.
    Mark Coeckelbergh starts his book with a very powerful picture based on a real incident: On the 9th of January 2020, Robert Williams was wrongfully arrested by Detroit police officers in front of his two young daughters, wife and neighbors. For 18 hours the police would not disclose the grounds for his arrest (American Civil Liberties Union 2020; Hill 2020). The decision to arrest him was primarily based on a facial detection algorithm which matched Mr. Williams’ driving license photo (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  97
    Real-Time Phishing Detection Using Genetic Algorithm-Based Ranking and Dynamic Weighting Optimization.A. Manoj Prabaharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):491-500.
    The rapid evolution of phishing techniques necessitates more sophisticated detection and classification methods. In this paper, we propose a novel approach to phishing content classification using a Genetic Ranking Optimization Algorithm (GROA), combined with dynamic weighting, to improve the accuracy and ranking of phishing versus legitimate content. Our method leverages features such as URL structure, email content analysis, and user behavior patterns to enhance the detection system's decision-making process. The Genetic Ranking Optimization Algorithm (GROA) is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  57
    Comprehensive Implementation of a Holistic Educational System in the Philippines.Angelito Malicse - manuscript
    Comprehensive Implementation of a Holistic Educational System in the Philippines -/- To implement a holistic educational system in the Philippines, we need a step-by-step national strategy that integrates the universal law of balance in nature, critical thinking, and systems-based learning into the foundational education system. Below is a detailed plan tailored for the Philippine context. -/- 1. Reforming the Curriculum -/- A. Core Subjects with Integrated Holistic Principles -/- Science & Systems Thinking – Teach students how natural and societal systems (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  47
    Solving Typhoon Turbulence Using the Universal Formula.Angelito Malicse - manuscript
    Solving Typhoon Turbulence Using the Universal Formula -/- By Angelito Malicse -/- Introduction -/- Typhoons are among the most destructive natural phenomena, bringing extreme winds, heavy rainfall, and turbulent ocean currents. The chaotic turbulence within a typhoon makes it difficult to predict and control, causing widespread devastation to coastal regions, infrastructure, and human lives. Despite advancements in meteorology and fluid dynamics, the turbulence inside typhoons remains a challenge for accurate forecasting and disaster mitigation. -/- By applying my universal formula, based (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  17
    AI-Powered Cloud Migration: Automating the Transition from On-Premises to Cloud Environments with Zero Downtime.M. Vaidhegi G. Glory - 2025 - International Journal of Innovative Research in Science Engineering and Technology (Ijirset) 14 (1):747-752.
    : As organizations continue to embrace cloud computing, the migration of workloads, applications, and data from on-premises environments to the cloud remains one of the most critical tasks. However, migrating to the cloud is often seen as a daunting task due to the complexity, the risk of downtime, and the potential for service disruptions. Artificial Intelligence (AI) and automation have emerged as transformative technologies for cloud migration, providing solutions that enable a seamless, efficient, and zero-downtime transition. This paper explores the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. AI-powered Legal Documentation Assistant.G. Kiran Kumar - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (1):1-13.
    This project focuses on simplifying the legal documentation process for small businessesand individuals in India. Utilizing advanced technologies such as Optical Character Recognition (OCR) and AI-driven models, the system automatically drafts and simplifies complex legaldocuments. The platform features a user-friendly interface for easy input, integration withup-to-date legal resources, and ensures strict data privacy and security. By reducing the time, effort, and potential errors associated with legal documentation, the assistant aims to improve accessibility to legal services and promotegreater access to justice. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Transforming Data Analysis through AI-Powered Data Science.Mathan Kumar - 2023 - Proceedings of IEEE 2 (2):1-5.
    AI-powered records science is revolutionizing the way facts are analyzed and understood. It can significantly improve the exceptional of information evaluation and boost its speed. AI-powered facts technological know-how enables access to more extensive, extra complicated information sets, faster insights, faster trouble solving, and higher choice making. Using the use of AI-powered information technological know-how techniques and tools, organizations can provide more accurate outcomes with shorter times to choices. AI-powered facts technology also offers more correct predictions (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. AI-Powered Legal Documentation Assistant.P. Aishwarya - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (6):1-15.
    The Legal Documentation Assistant offers a unique method to obtain legal rights, specializing in copyright, trademark, and banking using a combination of artificial intelligence (AI) technologies. Through the synergy of legal expertise and technological innovation, our dynamic website is designed to offer clients real-time assistance and guidance to help them efficiently navigate complex legal requirements. Our personalized bots provide tailored support and answer queries, ensuring clients receive the help they need. At the core of our platform is a combination of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES.Tummalachervu Chaitanya Kanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):76-83.
    Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages, including scalability, flexibility, and cost-effectiveness, rendering it an appealing choice for data storage and processing. The increasing storage of sensitive information in cloud environments has raised significant concerns over the security of such systems. The frequency of cyber threats and attacks specifically aimed at cloud infrastructure has been increasing, presenting substantial dangers to the data, (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  33.  75
    An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A Survey. [REVIEW]Tosin Ige - manuscript
    Phishing is one of the most effective ways in which cybercriminals get sensitive details such as credentials for online banking, digital wallets, state secrets, and many more from potential victims. They do this by spamming users with malicious URLs with the sole purpose of tricking them into divulging sensitive information which is later used for various cybercrimes. In this research, we did a comprehensive review of current state-of-the-art machine learning and deep learning phishing detection techniques to expose (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  34. Saliva Ontology: An ontology-based framework for a Salivaomics Knowledge Base.Jiye Ai, Barry Smith & David Wong - 2010 - BMC Bioinformatics 11 (1):302.
    The Salivaomics Knowledge Base (SKB) is designed to serve as a computational infrastructure that can permit global exploration and utilization of data and information relevant to salivaomics. SKB is created by aligning (1) the saliva biomarker discovery and validation resources at UCLA with (2) the ontology resources developed by the OBO (Open Biomedical Ontologies) Foundry, including a new Saliva Ontology (SALO). We define the Saliva Ontology (SALO; http://www.skb.ucla.edu/SALO/) as a consensus-based controlled vocabulary of terms and relations dedicated to the salivaomics (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  35. AI-Driven Anomaly Detection for Advanced Threat Detection.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, AI-driven models (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. AI Powered Legal Documentation Assistant.M. Praveen Kumar - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (8):1-15.
    The Legal Document Assistant project aims to make legal documentation more accessible and manageable for individuals and small businesses in India. Using artificial intelligence (AI), the platform simplifies the creation, updating, and management of legal documents for non-lawyers. Key features include a user-friendly interface that ensures accuracy and compliance with local regulations. A machine learning algorithm generates documents based on user inputs. To enhance security, the system uses One-Time Password authentication, requiring all parties to validate changes or updates, ensuring secure (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  88
    AI-Powered Prediction of Chronic Kidney Disease: A Machine Learning Perspective.P. Selvaprasanth - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-18.
    The performance of the model is evaluated using metrics such as accuracy, precision, recall, and F1-score to ensure reliable predictions. This approach not only aims to improve diagnostic accuracy but also provides a data-driven solution to assist healthcare professionals in making informed decisions. The outcome of this project can contribute to better management of CKD, ultimately helping to reduce the burden on healthcare systems and improving patient care.
    Download  
     
    Export citation  
     
    Bookmark  
  38. Development of AI-Based Object Detection and Alarm Generation System.P. Rathna Sekhar - 2024 - International Journal of Engineering Innovations and Management Strategies, 1 (4):1-12.
    . In this article, we propose an innovative method that utilizes AI for the real-time detection of humans and automatically triggers an alarm using the latest object detection methods based on algorithms such as YOLO (You Only Look Once). The key goal of the system is to facilitate rescue operations, enhance security surveillance, and minimize the turnaround time for any emergency actions. This allows, for example, the placement of such a system in a live video stream, and the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Classification of Real and Fake Human Faces Using Deep Learning.Fatima Maher Salman & Samy S. Abu-Naser - 2022 - International Journal of Academic Engineering Research (IJAER) 6 (3):1-14.
    Artificial intelligence (AI), deep learning, machine learning and neural networks represent extremely exciting and powerful machine learning-based techniques used to solve many real-world problems. Artificial intelligence is the branch of computer sciences that emphasizes the development of intelligent machines, thinking and working like humans. For example, recognition, problem-solving, learning, visual perception, decision-making and planning. Deep learning is a subset of machine learning in artificial intelligence that has networks capable of learning unsupervised from data that is unstructured or unlabeled. Deep learning (...)
    Download  
     
    Export citation  
     
    Bookmark   32 citations  
  40. Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework.Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:8.
    The ever-evolving ways attacker continues to improve their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of current approaches to detect complex phishing attack. Thus, current anti-phishing methods remain vulnerable to complex phishing because of the increasingly sophistication tactics adopted by attacker coupled with the rate at which new tactics are being developed to evade detection. (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  41.  63
    Advanced Threat Detection Using AI-Driven Anomaly Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, AI-driven models (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Black-box assisted medical decisions: AI power vs. ethical physician care.Berman Chan - 2023 - Medicine, Health Care and Philosophy 26 (3):285-292.
    Without doctors being able to explain medical decisions to patients, I argue their use of black box AIs would erode the effective and respectful care they provide patients. In addition, I argue that physicians should use AI black boxes only for patients in dire straits, or when physicians use AI as a “co-pilot” (analogous to a spellchecker) but can independently confirm its accuracy. I respond to A.J. London’s objection that physicians already prescribe some drugs without knowing why they work.
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  43. A framework of AI-Powered Engineering Technology to aid Altair Data Intelligence Start-up Benefits; speeding up Data-Driven Solution.Md Majidul Haque Bhuiyan - manuscript
    Today, software instruments support all parts of engineering work, from design to creation. Many engineering processes call for tedious routine appointments and torments with manual handoffs and data storehouses. AI designers train profound brain networks and incorporate them into software structures.
    Download  
     
    Export citation  
     
    Bookmark  
  44.  30
    Urban Development Challenges and the Role of Cloud AI-Powered Blue-Green Solutions.Vivekchowdary Attaluri Lakshmi Narasimha Raju Mudunuri - 2025 - Igi Global Scientific Publishing 1 (1):507-522.
    Urban areas are increasingly facing challenges such as rapid population growth, environmental degradation, and climate change, necessitating innovative solutions for sustainable development. This paper explores the role of cloud-based artificial intelligence (AI) in promoting blue-green solutions that integrate natural and engineered systems to enhance urban resilience. By leveraging cloud computing, urban planners and decision-makers can analyze vast datasets, simulate environmental scenarios, and optimize resource management. The study highlights successful case studies where AI-driven blue-green interventions have improved water management, enhanced green (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Algorithmic Political Bias in Artificial Intelligence Systems.Uwe Peters - 2022 - Philosophy and Technology 35 (2):1-23.
    Some artificial intelligence systems can display algorithmic bias, i.e. they may produce outputs that unfairly discriminate against people based on their social identity. Much research on this topic focuses on algorithmic bias that disadvantages people based on their gender or racial identity. The related ethical problems are significant and well known. Algorithmic bias against other aspects of people’s social identity, for instance, their political orientation, remains largely unexplored. This paper argues that algorithmic bias against people’s political orientation can arise in (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  46.  98
    Intelligent Phishing Content Detection System Using Genetic Ranking and Dynamic Weighting Techniques.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):480-490.
    The Genetic Ranking Optimization Algorithm (GROA) is used to rank phishing content based on multiple features by optimizing the ranking system through iterative selection and weighting. Dynamic weighting further enhances the process by adjusting the weights of features based on their importance in real-time. This hybrid approach enables the model to learn from the data, improving classification over time.
    Download  
     
    Export citation  
     
    Bookmark  
  47. The importance of understanding trust in Confucianism and what it is like in an AI-powered world.Ho Manh Tung - unknown
    Since the revival of artificial intelligence (AI) research, many countries in the world have proposed their visions of an AI-powered world: Germany with the concept of “Industry 4.0,”1 Japan with the concept of “Society 5.0,”2 China with the “New Generation Artificial Intelligence Plan (AIDP).”3 In all of the grand visions, all governments emphasize the “human-centric element” in their plans. This essay focuses on the concept of trust in Confucian societies and places this very human element in the context of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48.  19
    Network Security Challenges in Remote Work Environments: Solutions for Protecting Data and Applications.Bellamkonda Srikanth - 2021 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 10 (10):7330-7337.
    The rise of remote work has redefined the modern workplace, driven by advancements in technology and the global need for flexible work environments. While remote work offers increased productivity and employee satisfaction, it has also introduced a host of network security challenges. Organizations must contend with securing sensitive data and critical applications across distributed networks, many of which extend beyond traditional corporate perimeters. This research paper explores the multifaceted security threats associated with remote work environments, including phishing attacks, unpatched (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. HARNESSING AI FOR EVOLVING THREATS: FROM DETECTION TO AUTOMATED RESPONSE.Sanagana Durga Prasada Rao - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):91-97.
    The landscape of cybersecurity is constantly evolving, with adversaries becoming increasingly sophisticated and persistent. This manuscript explores the utilization of artificial intelligence (AI) to address these evolving threats, focusing on the journey from threat detection to autonomous response. By examining AI-driven detection methodologies, advanced threat analytics, and the implementation of autonomous response systems, this paper provides insights into how organizations can leverage AI to strengthen their cybersecurity posture against modern threats. Key words: Ransomware, Anomaly Detection, Advanced Persistent (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  50. Convergence of Nanotechnology and Artificial Intelligence: Revolutionizing Healthcare and Beyond.Randa Elqassas, Hazem A. S. Alrakhawi, Mohammed M. Elsobeihi, Basel Habil, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2024 - International Journal of Academic Engineering Research (IJAER) 8 (10):25-30.
    Abstract: The convergence of nanotechnology and artificial intelligence (AI) represents a transformative frontier in modern science, with the potential to revolutionize multiple industries, particularly healthcare. Nanotechnology enables the manipulation of matter at the atomic and molecular scale, while AI offers sophisticated data analysis, pattern recognition, and decision-making capabilities. This paper explores the synergies between these two fields, focusing on their impact on medical diagnostics, targeted drug delivery, and personalized treatments. By leveraging AI's predictive power and nanotechnology's precision, healthcare can achieve (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
1 — 50 / 976