This edited volume on machine learning and big data analytics (Proceedings of ICDSAI 2023), that was held on April 24-25, 2023 by CSUSB USA, International Association of Academicians (IAASSE), and Lendi Institute of Engineering and Technology, Vizianagaram, India is intended to be used as a reference book for researchers and practitioners in the disciplines of AI and Data Science. With the fascinating development of technologies in several industries, there are numerous opportunities to develop innovative intelligence technologies to solve a wide range of uncertainties in various real-life…mehr
This edited volume on machine learning and big data analytics (Proceedings of ICDSAI 2023), that was held on April 24-25, 2023 by CSUSB USA, International Association of Academicians (IAASSE), and Lendi Institute of Engineering and Technology, Vizianagaram, India is intended to be used as a reference book for researchers and practitioners in the disciplines of AI and Data Science. With the fascinating development of technologies in several industries, there are numerous opportunities to develop innovative intelligence technologies to solve a wide range of uncertainties in various real-life problems. Researchers and academics have been drawn to building creative AI strategies by combining data science with classic mathematical methodologies. The book brings together leading researchers who wish to continue to advance the field and create a broad knowledge about the most recent research.
Produktdetails
Produktdetails
Springer Proceedings in Mathematics & Statistics 438
Mood-Based Music Recommendation System (Sravanthi).- Internet Employment Detection Scam Via Fake Jobs With Random Forest Classifier (Madhavi).- Sentiment Analysis and Age Factor Influences on Brand usage of Personal Care Products: A Study with Reference to Visakhapatnam City, in India (Tuduku).- Construction of Pythagorean and Reciprocal Pythagorean n-tuples (Srinivas).- Statistical Approaches for Forecasting Air pollution: A review (Rao).- Computer-Assisted Statistical Analysis of L-Methionine Protonation Equilibria in The Anionic, Cationic, and Neutral Micellar Systems (R Neeraja).- A Study on Benefits of Continuous Integration and Continuous Delivery in Software Engineering (Reddy).- A Review on Mango Fruit Disease Detection and pesticide Suggestion (Reddy).- Multikeyword Ranked Search With Privacy Protection Over Encrypted Cloud Data (Saranya).- BERT based Similarity Measures Oriented Approach for Style Change Detection (Mohan).- Computer Vision Based Malpractice Detection System (AnnanNaidu).- The evolution of Influence maximization studies: A scientometric analysis (M Venunath).- A Survey on Evolving Optimal Cryptographic Techniques in Cloud Computing Data Forensics (Pinnamaraju).- DR-HIPI: Performance evaluation of retinal images for DR lesion segmentation using the HIPI architecture(Devi).- Adaptability of Robotic Process Automation and Capabilities of Human Automation (Midde).- A brief Review on Impact of Digital Trading on Conventional marketing Strategies after covid-19 effect on E-Commerce (Tuduku).- Fall Support Assistant Application (Sivaramakrishnan).- A Systematic VANET traffic congestion by eliminating recursion using Intervention Linear Minimum Spanning Tree (ILMST) for Traffic Management System (Sahu).- Realtime Object Cloning in Augmented Reality using BASnet and Screenpoint Algorithms (Adimalla).- Maximization Of Energy-Efficiency For Optimal Spectral Efficiency In Massive Mimo System (Borugadda).- OptimizationOf Spectral Efficiency Using Precoding Techniques In Multi Cell Massive Mimo (Borugadda).- The effect of prerequisite engineering processes on the production of risk factors in software development (Akula).- Comparison of Channel Equalization Schemes for MIMO-OFDM (Sujatha).- QoS Enhancement through Link-Quality Prediction using Signal-To-Noise Ratio in MANET (Viswanath).- Credential Manager using Cloud Computing (Shaik).- Accident Detection, Alert and Tracking System Based on IoT (Sivaramakrishnan).- Real time storage in cloud and access control policies using blockchain (Pranitha).- Artificial Intelligence and Internet of Things Applications in Smart Grid Security: A survey (Inala).- An Optimized Mechanism to Improve the Performance of Proxy Mobile Ipv6 Using Augmented Open-Flow Technique (Indumathi).- A Secure way to Message based on Internet Protocol on RSA algorithm using DNA encoding with Laplace Transform Computing (Nagalakshmi).- An Integrated Information Security Risk Assessment (IISRA) Approach (Dixit).- Congestion Control and Avoidance Scheme using Mobile Nodes in Wireless Sensor Network (Suma).-. ATOMATIC IOT AND MACHINE LEARNING BASED TOLL COLLECTION SYSTEM FOR MOVING VEHICLES (Sridhar).- Hack Investigation and Probing using BEOS (Sridevi).
Mood-Based Music Recommendation System (Sravanthi).- Internet Employment Detection Scam Via Fake Jobs With Random Forest Classifier (Madhavi).- Sentiment Analysis and Age Factor Influences on Brand usage of Personal Care Products: A Study with Reference to Visakhapatnam City, in India (Tuduku).- Construction of Pythagorean and Reciprocal Pythagorean n-tuples (Srinivas).- Statistical Approaches for Forecasting Air pollution: A review (Rao).- Computer-Assisted Statistical Analysis of L-Methionine Protonation Equilibria in The Anionic, Cationic, and Neutral Micellar Systems (R Neeraja).- A Study on Benefits of Continuous Integration and Continuous Delivery in Software Engineering (Reddy).- A Review on Mango Fruit Disease Detection and pesticide Suggestion (Reddy).- Multikeyword Ranked Search With Privacy Protection Over Encrypted Cloud Data (Saranya).- BERT based Similarity Measures Oriented Approach for Style Change Detection (Mohan).- Computer Vision Based Malpractice Detection System (AnnanNaidu).- The evolution of Influence maximization studies: A scientometric analysis (M Venunath).- A Survey on Evolving Optimal Cryptographic Techniques in Cloud Computing Data Forensics (Pinnamaraju).- DR-HIPI: Performance evaluation of retinal images for DR lesion segmentation using the HIPI architecture (Devi).- Adaptability of Robotic Process Automation and Capabilities of Human Automation (Midde).- A brief Review on Impact of Digital Trading on Conventional marketing Strategies after covid-19 effect on E-Commerce (Tuduku).- Fall Support Assistant Application (Sivaramakrishnan).- A Systematic VANET traffic congestion by eliminating recursion using Intervention Linear Minimum Spanning Tree (ILMST) for Traffic Management System (Sahu).- Realtime Object Cloning in Augmented Reality using BASnet and Screenpoint Algorithms (Adimalla).- Maximization Of Energy-Efficiency For Optimal Spectral Efficiency In Massive Mimo System (Borugadda).- OptimizationOf Spectral Efficiency Using Precoding Techniques In Multi Cell Massive Mimo (Borugadda).- The effect of prerequisite engineering processes on the production of risk factors in software development (Akula).- Comparison of Channel Equalization Schemes for MIMO-OFDM (Sujatha).- QoS Enhancement through Link-Quality Prediction using Signal-To-Noise Ratio in MANET (Viswanath).- Credential Manager using Cloud Computing (Shaik).- Accident Detection, Alert and Tracking System Based on IoT (Sivaramakrishnan).- Real time storage in cloud and access control policies using blockchain (Pranitha).- Artificial Intelligence and Internet of Things Applications in Smart Grid Security: A survey (Inala).- An Optimized Mechanism to Improve the Performance of Proxy Mobile Ipv6 Using Augmented Open-Flow Technique (Indumathi).- A Secure way to Message based on Internet Protocol on RSA algorithm using DNA encoding with Laplace Transform Computing (Nagalakshmi).- An Integrated Information Security Risk Assessment (IISRA) Approach (Dixit).- Congestion Control and Avoidance Scheme using Mobile Nodes in Wireless Sensor Network (Suma).-. ATOMATIC IOT AND MACHINE LEARNING BASED TOLL COLLECTION SYSTEM FOR MOVING VEHICLES (Sridhar).- Hack Investigation and Probing using BEOS (Sridevi).
Mood-Based Music Recommendation System (Sravanthi).- Internet Employment Detection Scam Via Fake Jobs With Random Forest Classifier (Madhavi).- Sentiment Analysis and Age Factor Influences on Brand usage of Personal Care Products: A Study with Reference to Visakhapatnam City, in India (Tuduku).- Construction of Pythagorean and Reciprocal Pythagorean n-tuples (Srinivas).- Statistical Approaches for Forecasting Air pollution: A review (Rao).- Computer-Assisted Statistical Analysis of L-Methionine Protonation Equilibria in The Anionic, Cationic, and Neutral Micellar Systems (R Neeraja).- A Study on Benefits of Continuous Integration and Continuous Delivery in Software Engineering (Reddy).- A Review on Mango Fruit Disease Detection and pesticide Suggestion (Reddy).- Multikeyword Ranked Search With Privacy Protection Over Encrypted Cloud Data (Saranya).- BERT based Similarity Measures Oriented Approach for Style Change Detection (Mohan).- Computer Vision Based Malpractice Detection System (AnnanNaidu).- The evolution of Influence maximization studies: A scientometric analysis (M Venunath).- A Survey on Evolving Optimal Cryptographic Techniques in Cloud Computing Data Forensics (Pinnamaraju).- DR-HIPI: Performance evaluation of retinal images for DR lesion segmentation using the HIPI architecture(Devi).- Adaptability of Robotic Process Automation and Capabilities of Human Automation (Midde).- A brief Review on Impact of Digital Trading on Conventional marketing Strategies after covid-19 effect on E-Commerce (Tuduku).- Fall Support Assistant Application (Sivaramakrishnan).- A Systematic VANET traffic congestion by eliminating recursion using Intervention Linear Minimum Spanning Tree (ILMST) for Traffic Management System (Sahu).- Realtime Object Cloning in Augmented Reality using BASnet and Screenpoint Algorithms (Adimalla).- Maximization Of Energy-Efficiency For Optimal Spectral Efficiency In Massive Mimo System (Borugadda).- OptimizationOf Spectral Efficiency Using Precoding Techniques In Multi Cell Massive Mimo (Borugadda).- The effect of prerequisite engineering processes on the production of risk factors in software development (Akula).- Comparison of Channel Equalization Schemes for MIMO-OFDM (Sujatha).- QoS Enhancement through Link-Quality Prediction using Signal-To-Noise Ratio in MANET (Viswanath).- Credential Manager using Cloud Computing (Shaik).- Accident Detection, Alert and Tracking System Based on IoT (Sivaramakrishnan).- Real time storage in cloud and access control policies using blockchain (Pranitha).- Artificial Intelligence and Internet of Things Applications in Smart Grid Security: A survey (Inala).- An Optimized Mechanism to Improve the Performance of Proxy Mobile Ipv6 Using Augmented Open-Flow Technique (Indumathi).- A Secure way to Message based on Internet Protocol on RSA algorithm using DNA encoding with Laplace Transform Computing (Nagalakshmi).- An Integrated Information Security Risk Assessment (IISRA) Approach (Dixit).- Congestion Control and Avoidance Scheme using Mobile Nodes in Wireless Sensor Network (Suma).-. ATOMATIC IOT AND MACHINE LEARNING BASED TOLL COLLECTION SYSTEM FOR MOVING VEHICLES (Sridhar).- Hack Investigation and Probing using BEOS (Sridevi).
Mood-Based Music Recommendation System (Sravanthi).- Internet Employment Detection Scam Via Fake Jobs With Random Forest Classifier (Madhavi).- Sentiment Analysis and Age Factor Influences on Brand usage of Personal Care Products: A Study with Reference to Visakhapatnam City, in India (Tuduku).- Construction of Pythagorean and Reciprocal Pythagorean n-tuples (Srinivas).- Statistical Approaches for Forecasting Air pollution: A review (Rao).- Computer-Assisted Statistical Analysis of L-Methionine Protonation Equilibria in The Anionic, Cationic, and Neutral Micellar Systems (R Neeraja).- A Study on Benefits of Continuous Integration and Continuous Delivery in Software Engineering (Reddy).- A Review on Mango Fruit Disease Detection and pesticide Suggestion (Reddy).- Multikeyword Ranked Search With Privacy Protection Over Encrypted Cloud Data (Saranya).- BERT based Similarity Measures Oriented Approach for Style Change Detection (Mohan).- Computer Vision Based Malpractice Detection System (AnnanNaidu).- The evolution of Influence maximization studies: A scientometric analysis (M Venunath).- A Survey on Evolving Optimal Cryptographic Techniques in Cloud Computing Data Forensics (Pinnamaraju).- DR-HIPI: Performance evaluation of retinal images for DR lesion segmentation using the HIPI architecture (Devi).- Adaptability of Robotic Process Automation and Capabilities of Human Automation (Midde).- A brief Review on Impact of Digital Trading on Conventional marketing Strategies after covid-19 effect on E-Commerce (Tuduku).- Fall Support Assistant Application (Sivaramakrishnan).- A Systematic VANET traffic congestion by eliminating recursion using Intervention Linear Minimum Spanning Tree (ILMST) for Traffic Management System (Sahu).- Realtime Object Cloning in Augmented Reality using BASnet and Screenpoint Algorithms (Adimalla).- Maximization Of Energy-Efficiency For Optimal Spectral Efficiency In Massive Mimo System (Borugadda).- OptimizationOf Spectral Efficiency Using Precoding Techniques In Multi Cell Massive Mimo (Borugadda).- The effect of prerequisite engineering processes on the production of risk factors in software development (Akula).- Comparison of Channel Equalization Schemes for MIMO-OFDM (Sujatha).- QoS Enhancement through Link-Quality Prediction using Signal-To-Noise Ratio in MANET (Viswanath).- Credential Manager using Cloud Computing (Shaik).- Accident Detection, Alert and Tracking System Based on IoT (Sivaramakrishnan).- Real time storage in cloud and access control policies using blockchain (Pranitha).- Artificial Intelligence and Internet of Things Applications in Smart Grid Security: A survey (Inala).- An Optimized Mechanism to Improve the Performance of Proxy Mobile Ipv6 Using Augmented Open-Flow Technique (Indumathi).- A Secure way to Message based on Internet Protocol on RSA algorithm using DNA encoding with Laplace Transform Computing (Nagalakshmi).- An Integrated Information Security Risk Assessment (IISRA) Approach (Dixit).- Congestion Control and Avoidance Scheme using Mobile Nodes in Wireless Sensor Network (Suma).-. ATOMATIC IOT AND MACHINE LEARNING BASED TOLL COLLECTION SYSTEM FOR MOVING VEHICLES (Sridhar).- Hack Investigation and Probing using BEOS (Sridevi).
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497