the proceedings contain 100 papers. the topics discussed include: security and privacy preservation for data communication network;insights into NoSQL databases using financial data: a comparative analysis;a dynamic f...
the proceedings contain 100 papers. the topics discussed include: security and privacy preservation for data communication network;insights into NoSQL databases using financial data: a comparative analysis;a dynamic fuzzy engine for adaptive control towards improvement of network performance in big data environment;a resource-optimized and accelerated sentiment analysis method using serverless computing;tuning multi-layer perceptron by hybridized arithmetic optimization algorithm for healthcare 4.0;digital evidence management system for cybercrime investigation using proxy re-encryption and blockchain;hybrid neural network architecture for multi-label object recognition using feature fusion;a review on vulnerabilities to modern processors and its mitigation for various variants;metaheuristics approach to improve data analysis process for the healthcare sector;swarm intelligence in datascience: challenges, opportunities and applications;and analysis of in-place matrix rotation of square matrix for information security applications.
One of the most effective swarm intelligence-based algorithms for many global optimization issues is the Artificial Bee Colony (ABC) strategy. Despite the fact that there are many Artificial Bee Colony (ABC) variants,...
详细信息
the evolution of Blockchain has given way to a Smart World where there is improved security and integration of devices, systems, and processes with humans through all-pervasive connectivity. there are numerous secure ...
详细信息
the evolution of fog computing plays a vital role in the field of computing paradigms. the fog computing alone cannot do all the processes so that to be interlinked with cloud computing. One of the significant drawbac...
详细信息
Reversible data hiding (RDH) is one of the most crucial issues in the field of information security in the modern world, as it enables us for securing communication by hiding secret data in a cover media. Withthe hel...
详细信息
the Internet of things (IoT) has a great role to provide the recent technology including the applications in the area of Health care, Engineering, smart societies and many different human activities. It needs the comp...
详细信息
Alzheimer’s disease is a neurological condition that gradually reduces brain size and destroys brain neurons. the most common varieties of dementia, Alzheimer’s disease limits a person’s ability to operate independ...
详细信息
Tiny Machine Learning (TinyML), a rapidly evolving edge computing concept that links embedded systems (hardware and software) and machine learning, withthe purpose of realizing ultra-low-power and low-cost and effici...
详细信息
It has become a common goal that the tourist volume control at a tourist attraction can promote the healthy development of tourism. the number of on-site visitors is intelligently controlled by the application of the ...
详细信息
Withthe increase of network security incidents, network security analysts need to analyze massive log information. the introduction of knowledge graph into the field of network security can facilitate analysis by sec...
详细信息
暂无评论