keyboard_arrow_up
Accepted Papers
The Needed Bridge Connecting Symbolic and Sub-symbolic AI

Maikel Leon, Department of Business Technology, Miami Herbert Business School, University of Miami, Florida, USA

ABSTRACT

Innovations that combine the interpretability of symbolic AI with the learning capabilities of sub-symbolic AI can flourish in the nexus of symbolic and sub-symbolic AI. This research presents Fuzzy Cognitive Maps (FCMs). This hybrid model combines the best features of both paradigms as a workable answer to the problems of interpretability and explainability in artificial intelligence (AI) systems. FCMs have become a robust framework for logically and intuitively supporting decision-making processes and expressing causal information. A more organic and adaptable problem-solving approach is made possible by FCMs’ ability to manage the inherent ambiguity and uncertainty present in real-world situations. Because of their innate flexibility and ability to learn and adapt from sub-symbolic AI, FCMs are an excellent fit for applications requiring high interpretability and explainability.

KEYWORDS

Fuzzy Cognitive Maps, Symbolic AI, and Sub-symbolic AI.


Big Data, Big Tech and Personal Information.how Secure Are We?

KLODIAN LIPA

ABSTRACT

Protecting personal information privacy has become a controversial issue among online social network providers and users. Most social network providers have developed several techniques to decrease threats and risks to the users’ privacy. These risks include the misuse of personal information which may lead to illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their personal information privacy, as well as the suitability of the privacy systems which they use to modify privacy settings. Survey results show high percentage of the use of smart phones for web services but the current privacy settings for online social networks need to be improved to support different type of mobile phones screens. Because most users use their mobile phones for Internet services, privacy settings that are compatible with mobile phones need to be developed. The method of selecting privacy settings should also be simplified to provide users with a clear picture of the data that will be shared with others.

KEYWORDS

Smart Mobile Phone, Social Networks, Mobile Network, Privacy, Personal Information.


Enhanced Detection Techniques for Cybersecurity Threats

Naga Satya Praveen Kumar Yadati

ABSTRACT

The dynamic field of cybersecurity has seen a surge in sophisticated cyber threats, necessitating advanced detection and mitigation strategies. This paper explores various advanced threat detection methodologies, including machine learning algorithms, behavioral analytics, threat intelligence feeds, and deception technologies. By adopting these cutting-edge techniques, organizations can significantly enhance their ability to detect and respond to complex cyber threats, thereby securing their digital assets more effectively.

KEYWORDS

cybersecurity, threat detection, machine learning, artificial intelligence, behavioral analytics, threat intelligence, deception technologies, endpoint detection, network traffic analysis, continuous monitoring..


Improving Efficiency Over Cost and Performance Gains in Small and Medium-sized Enterprises (Smes) Using Message-digest 5 Algorithm in Comparison With El Gamal Algorithm

Hemnath shreeharan D, Shri Vindhya A, Department of Computer Science Engineering, Saveetha School of Engineering, Chennai, Tamil Nadu, India

ABSTRACT

In a now more mature market for Small and Medium-sized Enterprises (SMEs), The objective of this study is to use cryptographic algorithms, namely (Message-Digest 5 (MD5) and El Gamal), for improving the operating performance in SMEs. In this research, the performance improvement and security robustness of ten heterogeneous systems over two cryptographic schemes are evaluated in respect to cost savings by comparing them with that of a recently published hashing technique. Compared with the simple and fast md5 elaboration, we find for example that of El Gamal whose construction involves a higher degree of security but which has greater computational / financial costs. This research highlighted that with MD5, SMEs could obtain certain immediate benefits in terms of improvements apart from lowering costs but as an entire data integrity and security is a must for long term; hence adopting El Gamal would serve them best dealing especially the places where devising useful information matters crucial. For SMEs it provides an informed choice on which crypto scheme to choose depending upon their requirements, efficiency and cost against security.

KEYWORDS

Small and Medium-sized Enterprises (SMEs), Cryptographic algorithms, Efficiency, Financial inclusion, Security, Computational cost, Performance gains, Operational agility.





menu
Reach Us

emailcseitt@cseitt2024.org


emailcseittconf@yahoo.com

close