David Mercer
The future of AI in our hands?
The main purpose of this investigation was to throw some philosophical light on the question “how should the responsibility for guiding the development of AI in a desirable direction be distributed among individuals and between individuals and other actors?”.
Sensitivity of CT-based Thermometry for Clinical Applications
The aim of this study was to evaluate the sensitivity of CT-based thermometry for clinical applications regarding a three-component tissue phantom of fat, muscle and bone.
The social turn of artificial intelligence
Social machines are systems formed by material and human elements interacting in a structured way. This article identifies a subclass of SMs that can be regarded as autonomous and goal-driven, and therefore considered as intelligent agents.
Role of Imaging in Early Diagnosis of Acute Ischemic Stroke
This literature review aims to provide a clinical review of the advantages and disadvantages of different available neuroimaging methods in approaching acute stroke to help clinicians choose the best method according to the settings.
Automatic Video-based Sign Language Recognition
Automatic Sign Language recognition system could benefit millions of hearing-impaired people to communicate with the world more efficiently. This project aims to review past research in the field and apply a new technique for solving this problem.
Hate Speech Detection in Social Media
The objective of this research is to detect hate speech on social media. For this research we created a data set collecting data from twitter.
Learning Transaction Embedding via Items and Frequent Itemsets
In this paper, we propose an unsupervised method which learns low-dimensional continuous vectors for transactions based on information of both singleton items and FIs.
Data Mining Algorithm Techniques
Introduction to a study which aims to compare and contrast various classification data mining algorithm techniques, as well as different feature selection scenarios.
Solving Sudoku Puzzle by Machine Learning
In my task I proposed a machine learning technique for providing the solution to a Sudoku puzzle. The solver is equipped for solving the puzzle from a picture caught from any advanced camera.
Malware Detection Using Machine Learning
The aim is to utilize the concept of machine learning and to build a model using ensemble algorithm which can be trained efficiently to detect malwares in a system.
Detection of Online Opinion Spam
Online opinion spamming has become a potential threat widespread. In this research project we focus on detecting the businesses that are affected by opinion spamming over time.
Colour vs Greyscale in Machine Vision
Colour vs. Greyscale
Although colour can offer huge potential in machine vision, especially in applications such as navigation, autonomous intelligent vehicles (AIV`s), food inspection a
SDN Segment Routing Implementation
A UKdiss.com sample dissertation essay covering SDN Segment Routing Implementation – turn to UKdiss.com for SME-led dissertation writing and reviewing services and much more.
Online Cuckoo Search Algorithm Parameter Control: Review, Taxonomy and Future Research Direction
Online Cuckoo Search Algorithm Parameter Control: Review, Taxonomy and future research direction
Previous survey on cuckoo search algorithm
The cuckoo search alg
Social Media User Experience Design
This dissertation aims to engage with designers, social scientists, and companies involved with defining user experience of information on social platforms.
Detecting the Primary User Emulation Attack Using the Logistic Regression and MLE
Detecting the Primary User Emulation Attack Using the Logistic Regression and MLE
Abstract— Cognitive radio technology aims at solving the problem of the spectrum scarcity by enabling secondary use
A Quantum Computers the next Computing Revolution?
Quantum Computers – The next computing revolution?
Introduction
Computers are an integral and indispensable part of everyday life. Millennials and subsequent generations will know no other way o
Role of Cloud Computing in Cyber Resilience
Table of Contents
Introduction
Review of literature
Research Problem and Discussion
Introduction
Cloud computing is being acclaimed as the penultimate answer for the issues of indeterminate traffic
