0% found this document useful (0 votes)
19 views2 pages

Assignment

The document outlines a series of assignments focused on developing AI systems for anomaly detection, resource allocation, and user personalization, as well as investigating the implications of emerging HCI technologies. It includes tasks such as training models for DDoS attack detection, analyzing user interactions, and enhancing accessibility for users with disabilities. Additionally, it emphasizes the importance of reliability testing for applications, especially those utilizing AI/ML models.

Uploaded by

bahubalia329
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views2 pages

Assignment

The document outlines a series of assignments focused on developing AI systems for anomaly detection, resource allocation, and user personalization, as well as investigating the implications of emerging HCI technologies. It includes tasks such as training models for DDoS attack detection, analyzing user interactions, and enhancing accessibility for users with disabilities. Additionally, it emphasizes the importance of reliability testing for applications, especially those utilizing AI/ML models.

Uploaded by

bahubalia329
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

ASSIGNMENT

1. Develop a system to detect anomalies (e.g., unauthorized access, data


corruption) using AI models trained on database logs.
2. Investigate the ethical, social, and cultural implications of emerging HCI
technologies.
3. Use AI to predict future database workloads and dynamically allocate
resources for better performance.
4. Train a DeepSeek model to detect DDoS attacks by analyzing network
traffic patterns and identifying anomalies.
5. Create an AI-driven system that personalizes user interfaces based on
individual preferences, behavior, or context.
6. Use eye-tracking technology to study how users interact with websites,
apps, or software interfaces.
7. Use DeepSeek to analyze the behavior of attackers and predict future
attack vectors.
8. Develop a system that combines multiple interaction modalities (e.g.,
touch, voice, and gestures) for a seamless user experience.
9. Use DeepSeek to generate test cases automatically by analyzing code and
predicting edge cases.
10.Develop a system that uses AI to prioritize test cases for regression
testing based on code changes.
11.Build a system to detect fraudulent transactions by analyzing financial
data using DeepSeek.
12.Use DeepSeek to analyze social media data and predict trends or public
sentiment.
13.Create an interface or tool that enhances accessibility for users with
disabilities (e.g., voice-controlled systems for visually impaired users or
sign language recognition for the hearing impaired).
14.Conduct stress testing to determine the application’s breaking point and
measure its reliability under extreme conditions.
15.Assess the reliability of mobile applications under different conditions
(e.g., low battery, poor network connectivity, varying device
configurations).
16.Evaluate the reliability of applications that rely on AI/ML models by
testing their performance under diverse datasets and edge cases.
17.Analyze the reliability of popular open-source applications by studying
their bug reports, patch frequency, and community support.
18.Design a project (interface design)considering SDLC.

You might also like