Monitoring large virtualized datacenter is a daunting task. Around 3 to 3.5 million of events/alerts are received annually from 90+ customers, managed by our organization. Global command centers process these events i...
详细信息
data cleaning is an important process in the history of data acquisition, data storage, data management and data analytics, and is still go through rapid development. In fact, cleaning of data is considered as a very ...
详细信息
The popularity and large-scale adoption of cloud computing have accelerated the development of e-healthcare systems. Outsourcing electronic health records (EHRs) demands the assurance of search privacy, given that dat...
详细信息
As everyone uses internet today, modern technology generates huge amount of data every fraction of second. data gets generated from social sites, private and government organization, hospitals and educational institut...
详细信息
The current investigation involves the study and analysis of position error of IRNSS (Indian Regional Navigation Satellite System) receiver system data with respect to a fixed position using big data analytics tool na...
详细信息
Till date, the research work in Wireless Sensor Network is mainly inclined towards rectifying the problem associated with the nodes and protocol associated with it, e.g., energy problems, clustering issue, security lo...
详细信息
The efficient parallel mapping of numerical problems (over different parallel architectures) is necessary for fast execution of massive data. In fact, it is a challenging task and significant ongoing subject of resear...
详细信息
The proceedings contain 34 papers. The special focus in this conference is on Intelligent Systems Technologies and Applications. The topics include: Markov Chain monte carlo methods and evolutionary algorithms for aut...
ISBN:
(纸本)9783319683843
The proceedings contain 34 papers. The special focus in this conference is on Intelligent Systems Technologies and Applications. The topics include: Markov Chain monte carlo methods and evolutionary algorithms for automatic feature selection from legal documents;an adaptive soft set based diagnostic risk prediction system;weighted bipartite graph model for recommender system using entropy based similarity measure;automated quiz generator;temporal modelling of bug numbers of open source software applications using LSTM;direct demodulator for amplitude modulated signals using artificial neural network;real-time detection of atrial fibrillation from short time single lead ECG traces using recurrent neural networks;styloLIT: Stylometry and location indicative terms based geographic location estimation using convolutional neural networks;an energy-efficient fuzzy based data fusion and tree based clustering algorithm for wireless sensor networks;eMG pattern classification using neural networks;crime against women: A state level analysis using a hierarchical and k-means clustering techniques;zero pronouns and their resolution in Sanskrit texts;semantic analysis using pairwise sentence comparison with word embeddings;illuminant color inconsistency as a powerful clue for detecting digital image forgery: A survey;a fast, block based, copy-move forgery detection approach using image gradient and modified K-means;oR operation based deterministic extended visual cryptography using complementary cover images;empirical comparison of different key frame extraction approaches with differential evolution based algorithms;breast cancer diagnosis and prognosis using machine learning techniques;performance assessment framework for computational models of visual attention;biologically-inspired foraging decision making in distributed cognitive radio networks;pAM4-based RADAR counter-measures in hostile environments.
The exponential growth and development of IoT has created several issues which will have to be tackled to ensure network security. Currently available intrusion detection systems not fully capable of protecting system...
详细信息
Vehicular ad hoc networks (VANETs) realize remote data transmission via multi-hop communications. However, high relative vehicle mobility and frequent changes of the network topology inflict new problems on forwarding...
详细信息
暂无评论