The academic success of students largely depends on the correct selection and evaluation of learning outcomes. The most effective tool for measuring student knowledge is exams. In this context, the scores of the stude...
详细信息
Person re-identification is a technology that uses computer vision to match and retrieve the same target person across cameras, which has a wide range of applications in the fields of intelligent video surveillance, i...
详细信息
This paper describes the development of intelligent fault diagnosis for electromechanical systems (EMS) and examines various combinations of mechanical and electrical faults in such systems. Specifically, the study fo...
详细信息
The proceedings contain 62 papers. The special focus in this conference is on Big-Data and Cloud Computing. The topics include: Classification of gender from face images and voice;an outlier detection approach on cred...
ISBN:
(纸本)9789811552847
The proceedings contain 62 papers. The special focus in this conference is on Big-Data and Cloud Computing. The topics include: Classification of gender from face images and voice;an outlier detection approach on credit card fraud detection using machinelearning: A comparative analysis on supervised and unsupervised learning;unmasking file-based cryptojacking;selection of a virtual machine within a scheduler (dispatcher) using enhanced join idle queue (ejiq) in cloud data center;an analysis of remotely triggered malware exploits in content management system-based web applications;gsm-based design and implementation of women safety device using internet of things;a novel approach on various routing protocols for wsn;fraud detection for credit card transactions using random forest algorithm;deep learning application in iot health care: A survey;L1 norm SVD-based ranking scheme: A novel method in big data mining;context aware text classification and recommendation model for toxic comments using logistic regression;self-supervised representation learning framework for remote crop monitoring using sparse autoencoder;determination of elements in human urine for transient biometrics;optimal placement of green power generation in the radial distribution system using harmony search algorithm;data security and privacy protection in cloud computing: A review;Re-ranking ODI batsman using JJ metric;intelligent cloud load balancing using elephant herd optimization;a quest for best: A detailed comparison between drakvuf-vmi-based and cuckoo sandbox-based technique for dynamic malware analysis;cloudstore: A framework for developing progressive streaming games;classification of dga botnet detection techniques based on dns traffic and parallel detection technique for dga botnet.
This paper analyses patch antennas operating at 16 GHz on flexible Kapton polyimide substrate in various shapes, namely rectangular, circular, pentagon, hexagon, heptagon, and octagon. Their applications in medical ar...
详细信息
Federated learning (FL) is a promising paradigm that leverages distributed data sources to train machinelearning models, thereby offering significant privacy advantages. However, the inherent statistical heterogeneit...
详细信息
In this research, we use unsupervised machinelearning clustering techniques, notably K-means (Jain in Pattern Recogn Lett 31:651–666, 2010 [1]), to explore human navigation using the VR Magic Carpet (Berthoz and Zao...
详细信息
The heat pipe is widely used for electronic cooling. ln the simplest configuration of heat pipe, it consists of a cylindrical vessel having three sections (Evaporator, Adiabatic, Condenser). It has a wide range of app...
详细信息
Modern-day electric vehicle technology is based on batteries and semiconductor devices;these systems have complementary features which can be successfully used in an electrical energy storage system for intelligent mo...
详细信息
6G networks are expected to have a breakthrough by enabling the emergence of collaborative cognitive communication services over heterogeneous environments for industry 5.0 applications. These applications are require...
详细信息
暂无评论