Inteum Company
Links
Visible Legacy
RSS
News & Resources
Inteum Company News
Inteum Library
Subscribe
Search Results - technology+classifications+%3e+computer+science+%3e+algorithms
25
Results
Sort By:
Published Date
Updated Date
Title
ID
Descending
Ascending
A Method for Modeling Distributions of Responses Using Personality-Based Prompting
Advantages Predict real-world behaviors with calibrated, human-centric AI personas. Improve accuracy and fairness in surveys, assessments, and decision tools. Reduce pilot costs through scalable, distribution-based forecasting. Provide transparent insights companies can audit and trust. Summary Organizations using surveys, cognitive assessments,...
Published: 9/8/2025
|
Inventor(s):
John Licato
,
Animesh Nighojkar
Keywords(s):
Data Mining
,
Image Tracking
,
Machine Learning
Category(s):
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Computer Science > Datasets
,
Technology Classifications > Data/AI > D/AI Imaging
A Divide and Conquer Framework for Breaking Unlearnable Data
Advantages Bypasses unlearnable image data through label modifications Achieves over 85% accuracy on protected datasets Work across multiple types of unlearnable data Use both manual and automated (genetic algorithm) approaches Reveal hidden weaknesses in current image protection methods Help researchers test and improve future unlearnable defenses Summary Unlearnable...
Published: 8/21/2025
|
Inventor(s):
Hapuarachchige Thushari Hapuarachchi
,
Kaiqi Xiong
Keywords(s):
Cybersecurity
,
Data Security
,
Datasets
Category(s):
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Computer Science > Datasets
A Lightweight Multiple-Time Post-quantum Signature for Heterogeneous Internet of Things
Advantages Maximizes key reuse, enabling over one million efficient post-quantum signatures Ultra-fast signing—up to 2463× faster than NIST PQ alternatives on ARM Uses only 1.4KB signer memory, ideal for low-end embedded IoT devices Sub-kilobyte signature size minimizes transmission energy in constrained IoT networks Summary The...
Published: 7/21/2025
|
Inventor(s):
Attila Yavuz
,
Kiarash Sedghighadikolaei
Keywords(s):
Cybersecurity
,
Internet of Things / IoT
Category(s):
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Electronics > Electronics Telecommunications
,
Technology Classifications > Data/AI > Cybersecurity - Data/AI
,
Technology Classifications > Computer Science > C/S Sensors
Advancing Ensemble Learning Against Unlearnable Data
Advantages Integrates seamlessly into enterprise workflows Scales from edge devices to GPU clusters Guarantees compliance with data-protection standards Enhances ensemble learning with data augmentation and model diversity Recovers >89% test accuracy on datasets protected by 12 state-of-the-art unlearnable data methods Summary As AI adoption...
Published: 7/15/2025
|
Inventor(s):
Hapuarachchige Thushari Hapuarachchi
,
Kaiqi Xiong
Keywords(s):
Category(s):
Technology Classifications > Data/AI > Cybersecurity - Data/AI
,
Technology Classifications > Computer Science > Algorithms
Real-Time Program-Specific Log Consolidation for Intrusion Detection
Advantages Reduces logs 219× for efficient data storage Performs real-time analysis with zero offline cost Minimizes memory use through subject activity consolidation Maintains high detection accuracy with low alert fatigue Summary Enterprises today are increasingly targeted by Advanced Persistent Threats (APTs), stealthy, long-term attacks...
Published: 7/18/2025
|
Inventor(s):
Yao Liu
,
Xiao Han
,
Zhuo Lu
Keywords(s):
Computer Science
,
Cybersecurity
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > Computers Software & Information Technology
,
Technology Classifications > Computer Science > Datasets
Layer-Wise Filter Thresholding
Advantages Layer-Specific Dynamic Thresholding High Compression with Accuracy Preservation No Retraining Required Profiling-Driven Pruning Strategy Edge-Device Friendly Architecture Summary Deploying AI on IoT edge devices is limited by the high computational and memory demands of traditional convolutional neural networks (CNNs). These constraints...
Published: 5/30/2025
|
Inventor(s):
Srinivas Katkoori
,
Lakshmi Kavya Kalyanam
Keywords(s):
Artificial Intelligence
,
Internet of Things / IoT
Category(s):
Technology Classifications > Computer Science > Computers Software & Information Technology
,
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > Datasets
Empowering Resource-Constrained IoT Edge Devices: A Hybrid Approach for Edge Data Analysis
Advantages Optimized for low-power, memory-constrained IoT hardware Boosts model accuracy with minimal computational cost Reduces energy usage through efficient inference methods Enables real-time, on-device decision-making Easily scalable for diverse IoT applications Summary As the Internet of Things (IoT) continues to scale across industries—from...
Published: 5/30/2025
|
Inventor(s):
Srinivas Katkoori
Keywords(s):
Datasets
,
Internet of Things / IoT
Category(s):
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > Computers Software & Information Technology
,
Technology Classifications > Data/AI > D/AI Imaging
Automated Hidden Neuron Optimization for MLPs
Advantages: Maximizes accuracy with fewer neurons through automated, adaptive neural network tuning Reduces data size by over 80% using advanced hybrid feature selection Ensures scalable, overfitting-resistant models with cross-validation and early stopping built-in Summary: Determining the optimal number of hidden neurons in Multilayer Perceptrons...
Published: 7/9/2025
|
Inventor(s):
Srinivas Katkoori
,
Susmitha Boyidapu
,
Lakshmi Kavya Kalyanam
Keywords(s):
Artificial Intelligence
,
Datasets
,
Machine Learning
Category(s):
Technology Classifications > Computer Science > Algorithms
,
Technology Classifications > Computer Science > Datasets
Defending Against Wi-Fi Spoofing Attacks Leveraging Physical-Layer Features
Advantages: Identifies Wi-Fi spoofing attacks by leveraging Doppler Effect and Symbol Timing Offset (STO) variations Protects against location manipulation, ensuring accurate navigation even in high-risk environments Improves navigation accuracy by differentiating legitimate and spoofed signals Cost-effective implementation with off-the-shelf...
Published: 1/22/2025
|
Inventor(s):
Xiao Han
,
Yao Liu
,
Zhuo Lu
Keywords(s):
Autonomous Vehicle
,
Cybersecurity
,
Telecommunication / Wireless Communication
,
Transportation
Category(s):
Technology Classifications > Computer Science > C/S Cybersecurity
,
Technology Classifications > Computer Science > Algorithms
Methods and Techniques to Classify Stages in the Gonotrophic Cycle of Mosquitoes from Images using Computer Vision Techniques
Advantages: Enables rapid and accurate identification of mosquito gonotrophic stages, enhancing disease surveillance efforts effectively. Reduces the need for extensive entomological expertise, making mosquito monitoring more accessible and efficient. Facilitates integration with citizen-science platforms, empowering community involvement...
Published: 5/23/2024
|
Inventor(s):
Sriram Chellappan
,
Farhat Azam
,
Ryan Carney
,
Sherzod Kariev
Keywords(s):
Artificial Intelligence
,
Infectious Diseases
,
Predictive Analytics
Category(s):
Technology Classifications > Medical > Infectious Diseases
,
Technology Classifications > Data/AI > D/AI Imaging
,
Technology Classifications > Computer Science > Algorithms
1
2
3