Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] A systematic review of trustworthy artificial intelligence applications in natural disasters
Artificial intelligence (AI) holds significant promise for advancing natural disaster
management through the use of predictive models that analyze extensive datasets, identify …
management through the use of predictive models that analyze extensive datasets, identify …
Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods
This study aims to perform a thorough systematic review investigating and synthesizing
existing research on defense strategies and methodologies in adversarial attacks using …
existing research on defense strategies and methodologies in adversarial attacks using …
Adversarial Attacks in Machine Learning: Key Insights and Defense Approaches
YL Khaleel, MA Habeeb… - Applied Data Science and …, 2024 - mesopotamian.press
There is a considerable threat present in genres such as machine learning due to
adversarial attacks which include purposely feeding the system with data that will alter the …
adversarial attacks which include purposely feeding the system with data that will alter the …
Artificial Intelligence and Cybersecurity in Face Sale Contracts: Legal Issues and Frameworks
The sale of facial features is a new modern contractual development that resulted from the
fast transformations in technology, leading to legal, and ethical obligations. As the need …
fast transformations in technology, leading to legal, and ethical obligations. As the need …
Fuzzy evaluation and benchmarking framework for robust machine learning model in real-time autism triage applications
In the context of autism spectrum disorder (ASD) triage, the robustness of machine learning
(ML) models is a paramount concern. Ensuring the robustness of ML models faces issues …
(ML) models is a paramount concern. Ensuring the robustness of ML models faces issues …
Enhancing Security and Performance in Vehicular Adhoc Networks: A Machine Learning Approach to Combat Adversarial Attacks
MA Habeeb, YL Khaleel… - Mesopotamian …, 2024 - journals.mesopotamian.press
Integrating Machine Learning (ML) techniques into Vehicular Adhoc Networks (VANETs)
provides promising features in autonomous driving and ITS applications. In this paper …
provides promising features in autonomous driving and ITS applications. In this paper …
Emerging Trends in Applying Artificial Intelligence to Monkeypox Disease: A Bibliometric Analysis
YL Khaleel, MA Habeeb… - … Data Science and …, 2024 - journals.mesopotamian.press
Monkeypox is a rather rare viral infectious disease that initially did not receive much
attention but has recently become a subject of concern from the point of view of public …
attention but has recently become a subject of concern from the point of view of public …
Deep Learning Model for Hand Movement Rehabilitation
Electroencephalography (EEG) can control machines for human purposes, especially for
disabled people doing rehabilitation exercises or regular tasks. Brain-computer interface …
disabled people doing rehabilitation exercises or regular tasks. Brain-computer interface …
Deep Learning Approaches for Gender Classification from Facial Images
Gender recognition on the facial level is considered one of the most important technologies
that finds use in such fields as a personalized marketing plan, safe systems of …
that finds use in such fields as a personalized marketing plan, safe systems of …
LipPrint: Using Lip Movements as a Silent Password
A Ketab, NK El Abbadi - Mesopotamian Journal of …, 2024 - mesopotamian.press
Authentication and confidentiality are critical elements in many systems, and passwords are
used to protect these systems. One way to enter the password into the system is via voice …
used to protect these systems. One way to enter the password into the system is via voice …