Computational Intelligence
1. FRONTAL AND NON-FRONTAL FACE DETECTION USING DEEP NEURAL NETWORKS

Nitin Prasad; Bhawesh Rajpal; Kaushal Kishore Rao Mangalore; Ravi Shastri; Nikhitha Pradeep

Articles in Press, Accepted Manuscript, Available Online from 09 January 2021

http://dx.doi.org/10.22105/riej.2021.264744.1177

Abstract
  Face recognition has always been one of the most searched and popular applications of object detection, starting from the early seventies. Facial recognition is used for access control, authentication, fraud detection, surveillance, and by individuals to unlock their devices. The less intrusive and robustness ...  Read More

Computational Intelligence
2. A short communication article on contactless menu

K Shweta Ranjan; B. Singh; D. Aggarwal

Volume 9, Issue 4 , Autumn 2020, , Pages 313-317

http://dx.doi.org/10.22105/riej.2020.260957.1162

Abstract
  In this Pandemic situation after dealing with contactless delivery, we introduce a "contactless menu", this feature help restaurants to gain the trust and confidence of customers in their safety and hygiene measures post-lockdown. The contactless menu will have two main components and, in the future, ...  Read More

Computational Intelligence
3. Content based movie recommendation system

N. Pradeep; K. K. Rao Mangalore; B. Rajpal; N. Prasad; R. Shastri

Volume 9, Issue 4 , Autumn 2020, , Pages 337-348

http://dx.doi.org/10.22105/riej.2020.259302.1156

Abstract
  Recommendation based systems can be used for recommending different web page, books, restaurants, tv shows, movies etc. The aim of movie recommendation system is to recommend movies to different users based on their interests. This helps the user to save time browsing the internet looking for movies ...  Read More

Computational Intelligence
4. Real power loss reduction by Acridoidea stirred artificial bee colony algorithm

L. Kanagasabai

Volume 9, Issue 3 , Summer 2020, , Pages 209-215

http://dx.doi.org/10.22105/riej.2020.229820.1133

Abstract
  Acridoidea Stirred Artificial Bee Colony (ASA) Algorithm is applied to solve the power loss reduction problem. In the projected algorithm natural Acridoidea jumping phenomenon has been imitated and the modeled design has been intermingled with artificial bee colony algorithm. In the proposed algorithm, ...  Read More

Computational Intelligence
5. Breast cancer detection using machine learning algorithms

R. Shastri; N. Pradeep; K. K. Rao Mangalore; B. Rajpal; N. Prasad

Volume 9, Issue 3 , Summer 2020, , Pages 235-246

http://dx.doi.org/10.22105/riej.2020.259298.1155

Abstract
  Breast cancer has been the riskiest malignancy among ladies around the world. Nearly 2 million new cases were diagnosed in 2018. The main problem in the detection of breast cancer is to find how tumors turn into malignant or benign and we can do this with the help of machine learning techniques as they ...  Read More

Computational Intelligence
6. Smart voting web based application using face recognition, Aadhar and OTP verification

B. Singh; K Sh. Ranjan; D. Aggarwal

Volume 9, Issue 3 , Summer 2020, , Pages 260-270

http://dx.doi.org/10.22105/riej.2020.259841.1157

Abstract
  There are currently two ways to vote in India. They are secret ballots and electronic vote machines, but these two processes have some limitations or disadvantages. The current system is also insecure. Many people miss the opportunity to vote simply because they need to go to the polling station and ...  Read More

Computational Intelligence
7. Factual power loss reduction by augmented monkey optimization algorithm

L. Kanagasabai

Volume 9, Issue 1 , Winter 2020, , Pages 1-12

http://dx.doi.org/10.22105/riej.2020.214459.1112

Abstract
  This paper presents Augmented Monkey Optimization Algorithm (AMOA) applied to solve optimal reactive power problem. Communal behaviour of monkeys has been utilized to model the algorithm. Normally, group monkeys assess the distance from the source to food for foraging behaviour. Local leader renews its ...  Read More

Computational Intelligence
8. Restricting shoulder surfing: a modified graphical password Technique

P. Pandey

Volume 8, Issue 4 , Autumn 2019, , Pages 394-405

http://dx.doi.org/10.22105/riej.2020.219732.1122

Abstract
  Graphical passwords are the ways in which user click on the image or user can select the image to authenticate themselves instead of giving passwords. This technique is more secure that textual password techniques. In this article, the shoulder surfing preventive mechanism of graphical password authentication ...  Read More