The proceedings contain 50 papers. The topics discussed include: a low complexity face recognition system using discrete wavelet transform and distance metrics;a new convolution neural layer based on weights constrain...
ISBN:
(纸本)9798350334883
The proceedings contain 50 papers. The topics discussed include: a low complexity face recognition system using discrete wavelet transform and distance metrics;a new convolution neural layer based on weights constraints;secure wireless sensor network authentication by utilized modified SHA3 hash algorithm;a survey on detecting vandalism in crowdsourcing models;a survey of SQL injection attacks, their methods, and prevention techniques;congestion control mechanisms and techniques in computer network: a review;a review paper of model based collaborative filtering techniques;a novel chaotic map to improve security image based on Mandelbrot fractals;deepfake video detection based on convolutional neural networks;and exploiting textual reviews for recommendation systems improvement.
The proceedings contain 30 papers. The special focus in this conference is on Mathematics of intelligentcomputing and datascience. The topics include: Mathematical Model for Diabetes Using Fuzzy Parameters;fuzzy Ite...
ISBN:
(纸本)9789819615049
The proceedings contain 30 papers. The special focus in this conference is on Mathematics of intelligentcomputing and datascience. The topics include: Mathematical Model for Diabetes Using Fuzzy Parameters;fuzzy Iterated Function Systems;introduction to Interval-Valued Neutrosophic Hyper-Soft Expert Set;fuzzy Fractal Dimension of Covid-19 Variant Protein;a Study of Intuitionistic Fuzzy Graph Using Morphological Operators and Its Application;edge Weight Based Colouring and Matching in Inhomogenous Random Graphs;super Domination Number of Cycle Based Graphs and Comb Product of Graphs;sum Divisor Cordial Labeling for Middle Graph and Total Graph of Some Graphs;on the Core and Noncore Vertices of Singular Graphs;on C-Perfection of Modular Product of Graphs;a Study on Topological Indices of Bipartite Kneser B Type-1 Graphs;on Jumping Graph Grammars;a Study on Ramanujan Graphs;on the Exponential Diophantine Equation Related to the Powers of Cluster Primes;structure of Different Categories of Diophantine 3-Tuples Appropriate (2j, 3)-Centered Polygonal Number;a Birth-Death Process with Temporary Growth Halts and Population Independent Death Rate;comparison of Vacation and Mt/Mt/1 Queueing Models for Traffic Flow at Signalized Intersections;study of Birth-Death Processes with Growth Interruptions;birth and Death Processes: A Probabilistic Metric Space Approach;on Maps with Dense Periodic Points and Set of Periods +;on the Bitopological Space Associated with a 3-Uniform Semigraph;dynamics of a Family of Maps with Constant Mass Centre;a Survey of Topological data Analysis Based Image Segmentation;applications of Topological data Analysis with Morphology Operators on Hypergraphs.
The proceedings contain 27 papers. The topics discussed include: analysis of cyber threat detection and emulation using MITRE attack framework;on the development of mobile application breathing analyzer to detect brea...
ISBN:
(纸本)9781665499606
The proceedings contain 27 papers. The topics discussed include: analysis of cyber threat detection and emulation using MITRE attack framework;on the development of mobile application breathing analyzer to detect breathing abnormalities;evaluation of tree based regression over multiple linear regression for non-normally distributed data in battery performance;digital health shopping assistant with react native: a simple technological solution to a complex health problem;integrating human-in-the-loop into swarm learning for decentralized fake news detection;a feature selection technique for network intrusion detection based on the chaotic crow search algorithm;discrete sequencing for demand forecasting: a novel data sampling technique for time series forecasting;face anti-spoofing based on convolutional neural networks;detecting hate speech against athletes in social media;and pseudonym tracking certificateless aggregate signature scheme for preventing replay attacks in a platoon of vehicles.
Recommendation System (RS) has played a significant role recently, especially with the growth of information and the development of the Internet worldwide. Due to issues with the recommendation algorithms, new data so...
详细信息
Nowadays, in a wide range of computer technology applications, digital image processing methods are becoming more and more significant. Image segmentation is a critical topic in image processing because it is a requir...
详细信息
Numerous emergencies have happened recently on a worldwide scale, necessitating and occasionally requiring relevant decision-makers to focus excessively on the decision-making process. Due to the fact that decision su...
详细信息
A system that must perform a variety of tasks autonomously across diverse dynamic settings can be labeled as an autonomous robot. Autonomous robots must be able to make explicit decisions in order to properly execute ...
详细信息
One of the most important and most pioneering topics in the field of networks is congestion and how to control it or avoid its occurrence because this topic has a huge impact on the network and the quality of service ...
详细信息
Nowadays, the increased use of Web services has resulted in a rise in the danger of web application attacks. These types of attacks are become more severe by the day. Intrusion detection systems (IDS) are essential in...
详细信息
In this paper, we proposed a spectral conjugate gradient formula based on the Fletcher-Reeves (FR) formula to solve the unconstrained optimization problems, which when some hypotheses are fulfilled, the sufficient des...
详细信息
暂无评论