Computational Intelligence
ChatGPT for healthcare sector: SWOT analysis

Mobasshira Zaman

Volume 12, Issue 3 , September 2023, , Pages 221-233

https://doi.org/10.22105/riej.2023.391536.1373

Abstract
  This research paper presents a comprehensive SWOT analysis of ChatGPT in healthcare, examining its strengths, weaknesses, opportunities, and threats. The paper highlights the potential benefits of ChatGPT, such as improved patient engagement and support for medical education, as well as its limitations, ...  Read More

Computational Intelligence
Hybrid metaheuristic artificial neural networks for stock price prediction considering efficient market hypothesis

Milad Shahvaroughi Farahani; Hamed Farrokhi-Asl; Saeed Rahimian

Volume 12, Issue 3 , September 2023, , Pages 234-272

https://doi.org/10.22105/riej.2023.361216.1336

Abstract
  Investigating stock price trends and determining future stock prices have become focal points for researchers within the finance sector. However, predicting stock price trends is a complex task due to the multitude of influencing factors. Consequently, there has been a growing interest in developing ...  Read More

Computational Intelligence
Prediction of Stress Concentration Factor in Butt Welding Joints using Artificial Neural Networks

Alper Kiraz; Enes Furkan Erkan; Onur Canpolat; Onur Kökümer

Volume 12, Issue 1 , March 2023, , Pages 43-52

https://doi.org/10.22105/riej.2023.349647.1322

Abstract
  In welded constructions, there should be no defects in the welding seams, or defects should have in an acceptable range for obtaining more reliable welding operations. An undercut is one of the most important welding defects occurring on the workpieces produced by butt welding. Determining the correct ...  Read More

Computational Intelligence
Frontal and non-frontal face detection using deep neural networks (DNN)

N. Prasad; B. Rajpal; K. K. R. Mangalore; R. Shastri; N. Pradeep

Volume 10, Issue 1 , March 2021, , Pages 9-21

https://doi.org/10.22105/riej.2021.264744.1177

Abstract
  Face recognition has always been one of the most searched and popular applications of object detection, starting from the early seventies. Facial recognition is used for access control, authentication, fraud detection, surveillance, and by individuals to unlock their devices. The less intrusive and robustness ...  Read More

Computational Intelligence
A short communication article on contactless menu

K Shweta Ranjan; B. Singh; D. Aggarwal

Volume 9, Issue 4 , December 2020, , Pages 313-317

https://doi.org/10.22105/riej.2020.260957.1162

Abstract
  In this Pandemic situation after dealing with contactless delivery, we introduce a "contactless menu", this feature help restaurants to gain the trust and confidence of customers in their safety and hygiene measures post-lockdown. The contactless menu will have two main components and, in the future, ...  Read More

Computational Intelligence
Content based movie recommendation system

N. Pradeep; K. K. Rao Mangalore; B. Rajpal; N. Prasad; R. Shastri

Volume 9, Issue 4 , December 2020, , Pages 337-348

https://doi.org/10.22105/riej.2020.259302.1156

Abstract
  Recommendation based systems can be used for recommending different web page, books, restaurants, tv shows, movies etc. The aim of movie recommendation system is to recommend movies to different users based on their interests. This helps the user to save time browsing the internet looking for movies ...  Read More

Computational Intelligence
Real power loss reduction by Acridoidea stirred artificial bee colony algorithm

L. Kanagasabai

Volume 9, Issue 3 , September 2020, , Pages 209-215

https://doi.org/10.22105/riej.2020.229820.1133

Abstract
  Acridoidea Stirred Artificial Bee Colony (ASA) Algorithm is applied to solve the power loss reduction problem. In the projected algorithm natural Acridoidea jumping phenomenon has been imitated and the modeled design has been intermingled with artificial bee colony algorithm. In the proposed algorithm, ...  Read More

Computational Intelligence
Breast cancer detection using machine learning algorithms

R. Shastri; N. Pradeep; K. K. Rao Mangalore; B. Rajpal; N. Prasad

Volume 9, Issue 3 , September 2020, , Pages 235-246

https://doi.org/10.22105/riej.2020.259298.1155

Abstract
  Breast cancer has been the riskiest malignancy among ladies around the world. Nearly 2 million new cases were diagnosed in 2018. The main problem in the detection of breast cancer is to find how tumors turn into malignant or benign and we can do this with the help of machine learning techniques as they ...  Read More

Computational Intelligence
Smart voting web based application using face recognition, Aadhar and OTP verification

B. Singh; K Sh. Ranjan; D. Aggarwal

Volume 9, Issue 3 , September 2020, , Pages 260-270

https://doi.org/10.22105/riej.2020.259841.1157

Abstract
  There are currently two ways to vote in India. They are secret ballots and electronic vote machines, but these two processes have some limitations or disadvantages. The current system is also insecure. Many people miss the opportunity to vote simply because they need to go to the polling station and ...  Read More

Computational Intelligence
Factual power loss reduction by augmented monkey optimization algorithm

L. Kanagasabai

Volume 9, Issue 1 , March 2020, , Pages 1-12

https://doi.org/10.22105/riej.2020.214459.1112

Abstract
  This paper presents Augmented Monkey Optimization Algorithm (AMOA) applied to solve optimal reactive power problem. Communal behaviour of monkeys has been utilized to model the algorithm. Normally, group monkeys assess the distance from the source to food for foraging behaviour. Local leader renews its ...  Read More

Computational Intelligence
Restricting shoulder surfing: a modified graphical password Technique

P. Pandey

Volume 8, Issue 4 , December 2019, , Pages 394-405

https://doi.org/10.22105/riej.2020.219732.1122

Abstract
  Graphical passwords are the ways in which user click on the image or user can select the image to authenticate themselves instead of giving passwords. This technique is more secure that textual password techniques. In this article, the shoulder surfing preventive mechanism of graphical password authentication ...  Read More