Latest Developments in Artificial Intelligence: Enhancing Creativity and Productivity
Keywords:
Artificial intelligence, Natural language processing, GAN, AIAbstract
Artificial Intelligence (AI) has grown to be a disrupting pressure. This is reshaping exclusive sectors thereby enhancing the way people do business and stay. The innovative AI breakthroughs have paved the manner for next-generation technologies that can boost both creativity and productivity. Generative Adversarial Networks (GANs) and Natural Language Processing (NLP) are the 2 AI sections which have the most capability in this regard. The research paper examines the recent strides made inside the GAN and NLP regions, specifying their use in enhancing creativity and productiveness. The article additionally addressed the capacity blessings and disadvantages of using such technologies in diverse sectors, speak to me the place of AI in the system of revolutionizing the creative sector.
References
[1] Vaswani, A., Shazeer, N., Parmar,N., Uszkoreit, J., Jones, L., Gomez, A.N., ... & Polosukhin, I. (2017). Attention is all you need. Advances in neural information processing systems, 30.
[2] Clark, J., Luong, M. T., Le, Q. V., & Manning, C. D. (2020). ELECTRA: Pre-training text encoders as discriminators rather than generators. arXiv preprint arXiv:2003.10555.
[3] Liu, Y., Ott, M., Goyal, N., Du, J., Joshi, M., Chen, D., ... & Stoyanov, V. (2019). RoBERTa: A robustly optimized BERT pretraining approach. arXiv preprint arXiv:1907.11692.
[4] Raffel, C., Shazeer, N., Roberts, A., Lee, K., Narang, S., Matena, M., ... & Liu, P. J. (2019). Exploring the limits of transfer learning with a unified text-to-text transformer. arXiv preprint arXiv:1910.10683.
[5] Vaswani, A., Shazeer, N., Parmar, N., Uszkoreit, J., Jones, L., Gomez, A. N., ... & Polosukhin, I. (2017). Attention is all you need. In Advances in neural information processing systems (pp.5998-6008).
[6] Banerjee, B., & Patel, J. T. (2016). A symmetric key block cipher to provide confidentiality in wireless sensor networks. Infocomp journal of computer science, 15(1), 12-18.
[7] Banerjee, B. (2019). Avalanche effect: A judgement parameter of strength in symmetric key block ciphers. International journal of engineering development and research, 7(2), 116-121.
[8] Banerjee, B., Jani, A., Shah, N., & Patel, A. (2020). Post Quantum Security Enhancement Scheme in IoT Blockchain Framework. GIS Science Journal, 7(6), 664-672.
[9] Patel, M. K., Uchhula, V. V., & Banerjee, B. (2013). Comparative Analysis of Routing Protocols in MANET Based on Packet Delivery Ratio using NS2. Int. J. Adv. Res. Comput. Sci. Softw. Eng, 3(11), 172-177.
[10] Banerjee, B., Jani, A., & Shah, N. (2021). Asymmetric confidentiality in blockchain embedded smart grids in galois field. Frontiers in Blockchain, 4, 770074.
[11] Banerjee, B., Jani, A., & Shah, N. (2021). Traditional and quantum approaches against shor’s algorithm: A review. International journal of research publication and reviews, 2(2), 6.
[12] Mehta, J., Panwar, D. S., Ghardesia, S., Chauhan, A., Atodariya, V. V., Banerjee, B., ... & Bhakhar, M. S. (2020). Drying of banana-stepwise effect in drying air temperature on drying kinetics. The Open Chemical Engineering Journal, 14(1).
[13] Biswas, N., Santra, D., Banerjee, B., & Biswas, S. (2024). Harnessing the Power of Machine Learning for Parkinson's Disease Detection. In AIoT and Smart Sensing Technologies for Smart Devices (pp. 140-155). IGI Global.
[14] Saha, G., Banerjee, B., & Joshi, F. M. (2022). Predictive Edge Computing of SST Time-Series-Based Marine Warning System using Cloud Computing Infrastructure. In Cloud IoT (pp. 59-74). Chapman and Hall/CRC.
[15] Banerjee, B., & Saha, G. (2022). Emotion Independent Face Recognition- Based Security Protocol in IoT-Enabled Devices. In Cloud IoT (pp. 199-218). Chapman and Hall/CRC. International Research Journal of Scientific Studies ISSN: 3048-8451 (Online) August 2024, Volume 1, Issue 1 Paper ID: AUG240804 www.irjss.com 23
[16] Banerjee, B., Jani, A., & Shah, N. (2021). A genetic blockchain approach for securing smart vehicles in quantum era. In Vehicular Communications for Smart Cars (pp. 85-108). CRC Press.
[17] Banerjee, B., Jani, A., & Shah, N. (2021). Digital Image Encryption Using Double Crossover Approach for SARS- CoV-2 Infected Lungs in a Blockchain Framework. Frontiers in Blockchain, 4, 771241.
[18] Banerjee, B., Hazra, D., & Sarkar, D. (2024). IoT-Enabled Water Quality Management System for Rural Areas of Bharuch District. In Water Informatics: Challenges and Solutions Using State of Art Technologies (pp. 33-47). Singapore: Springer Nature Singapore.
[19] Patel, M. K., Uchhula, V., & Banerjee, B. Comparative Evaluation of AODV, DSDV and AOMDV based on end-to-end delay and routing overhead using Network Simulator.
[20] R. Mukhopadhyay and I. Mukhopadhyay, "Home automation and grid mapping technology using IoT," 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 2016, pp. 1-5, doi: 10.1109/IEMCON.2016.7746255.
[21] N. Sheikh, K. Mustafi and I. Mukhopadhyay, "A unique approach to design an intrusion detection system using an innovative string searching algorithm and DNA sequence," 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2016, pp. 1-9, doi: 10.1109/UEMCON.2016.7777803.
[22] Mukhopadhayay, Indraneel et al. “Simulation of Denial of Service (DoS) Attack using Matlab and Xilinx.” IOSR Journal of Computer Engineering 16 (2014): 119-125.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution 4.0 International License.
Research Articles in 'International Research Journal of Scientific Studies' are Open Access articles published under the Creative Commons CC BY License Creative Commons Attribution 4.0 International License http://creativecommons.org/licenses/by/4.0/. This license allows you to share – copy and redistribute the material in any medium or format. Adapt – remix, transform, and build upon the material for any purpose, even commercially.