The proceedings contain 223 papers. The topics discussed include: automatic identification of Arunachal language using K-nearest neighbor algorithm;a survey on black hole attack in MANET using AODV;Nepali SMS filterin...
ISBN:
(纸本)9781538641194
The proceedings contain 223 papers. The topics discussed include: automatic identification of Arunachal language using K-nearest neighbor algorithm;a survey on black hole attack in MANET using AODV;Nepali SMS filtering using decision trees, neural network and support vector machine;automatic number plate recognition;network traffic classification analysis using machine learning algorithms;insecurity of a certificateless signature scheme;identification of non collaborative nodes in ad-hoc network using credit based methods;hybrid cryptosystem based security in cloud computing;and new improved design for low leakage and high performance SRAM cell in ULP applications.
The proceedings contain 200 papers. The topics discussed include: autonomous disinfection robot;automatic waste segregating and self-sanitizing dustbin;efficient viewshed analysis as QGIS plugin;comparison of pretrain...
ISBN:
(纸本)9781728183374
The proceedings contain 200 papers. The topics discussed include: autonomous disinfection robot;automatic waste segregating and self-sanitizing dustbin;efficient viewshed analysis as QGIS plugin;comparison of pretrained embeddings to identify hate speech in Indian code-mixed text;a hybrid approach for image denoising using explicit guided filter and collaborative wiener filter;bitcoin price prediction using deep learning and real time deployment;CNN based automated vehicle registration number plate recognition system;predicting depression from routine survey data using machine learning;sensor based crop protection system with IOT monitored automatic irrigation;and mortality prediction of covid-19 pandemic using artificial intelligence.
The proceedings contain 305 papers. The topics discussed include: Bugzilla bug tracking system;android malware detection based on feature-pair bonding: a hybrid detection model;advancements in fake news detection: a c...
ISBN:
(纸本)9798350330861
The proceedings contain 305 papers. The topics discussed include: Bugzilla bug tracking system;android malware detection based on feature-pair bonding: a hybrid detection model;advancements in fake news detection: a comprehensive review and analysis;stock price prediction using LSTM and sentiment analysis on tweets;ensemble based techniques: a review on sentiment analysis in social network with boosting techniques;image classification using CNN;smart watering system for terrace garden using LabVIEW;a novel knowledge semantic video game prototype to treat patients with absence epilepsy;a review on automatic protection system and risk mitigation in railways;automobile service and management system for vehicles network;and hands sign language and gesture recognition using CNN.
The proceedings contain 403 papers. The topics discussed include: a modified data clustering algorithm for uncertain data in peer to peer networks;concept drift detection for social media: a survey;voice feature analy...
ISBN:
(纸本)9781665438117
The proceedings contain 403 papers. The topics discussed include: a modified data clustering algorithm for uncertain data in peer to peer networks;concept drift detection for social media: a survey;voice feature analysis for speaker recognition to improve content management;analysis and prediction of drugs using machine learning techniques;text summarization using extractive techniques;an analysis and research on sentiments of twitter data;advancements of lab on chip in reducing human intervention: a study;an open air outdoor environment for children in urban residential precinct;analysis of online media content using data science techniques;a machine learning approach for predicting dengue outbreak;analysis of student performance and requirement using data science;analytical study of stochastic trends of non-performing assets of public and private commercial banks in india;a critical analysis of diabetes detection using machine learning algorithms;and recommendation system with exploratory data analytics using machine learning.
The proceedings contain 441 papers. The topics discussed include: optical character recognition system with projection profile based segmentation and deep learning techniques;design and implementation: a review of pay...
ISBN:
(纸本)9781665474368
The proceedings contain 441 papers. The topics discussed include: optical character recognition system with projection profile based segmentation and deep learning techniques;design and implementation: a review of payroll management system;a novel approach for brain tumor segmentation using convolutional neural network;semantic knowledge base ontology framework for discovery stage of the design thinking using web ontology language;a bagging algorithmic approach for prediction of school student performance;analyzing the behavioral artifacts for malicious software detection using machine learning algorithms;hybrid model for detection of frauds in credit cards;semantic-web approach for building classification of nature’s knowledge-based using web-ontology language;bug recognition using hybrid fuzzy logic algorithm and support vector machine classification;a study of autoregressive model using time series analysis through Python;and semantic approach for the classification of knowledge representation and reasoning analysis.
The demand for decentralized control techniques in DC microgrids has increased due to their ability to enhance scalability, reduce communication requirements, and improve overall system efficiency. This paper presents...
详细信息
With the advancement of technologies like Industry 4.0, communication networks must meet stringent requirements of applications demanding deterministic and bounded latencies. The problem is further compounded by the n...
详细信息
This paper provides a future looking perspective on the evolution of cloud-native technologies in the design, operation, and maintenance of industrial control systems with aging device communication protocols. First a...
详细信息
Cloud computing has completely evolved the way health care data is managed, but it also introduces critical security vulnerabilities that can compromise the privacy of patient information and threaten regulatory compl...
详细信息
The increasing adoption of Software-Defined networking (SDN) has introduced a more flexible and programmable network architecture. However, this shift has also exposed SDN controllers to Distributed Denial of Service ...
详细信息
暂无评论