Artificial Intelligence Techniques for Advanced Computing Applications
Proceedings of ICACT 2020
Herausgegeben:Hemanth, D. Jude; Vadivu, G.; Sangeetha, M.; Balas, Valentina Emilia
Artificial Intelligence Techniques for Advanced Computing Applications
Proceedings of ICACT 2020
Herausgegeben:Hemanth, D. Jude; Vadivu, G.; Sangeetha, M.; Balas, Valentina Emilia
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book features a collection of high-quality research papers presented at the International Conference on Advanced Computing Technology (ICACT 2020), held at the SRM Institute of Science and Technology, Chennai, India, on 23-24 January 2020. It covers the areas of computational intelligence, artificial intelligence, machine learning, deep learning, big data, and applications of artificial intelligence in networking, IoT and bioinformatics
Andere Kunden interessierten sich auch für
- Artificial Intelligence Techniques for Advanced Computing Applications110,99 €
- Intelligence in Big Data Technologies¿Beyond the Hype148,99 €
- Computational Methods and Data Engineering147,99 €
- Recent Trends and Advances in Artificial Intelligence and Internet of Things119,99 €
- Soft Computing in Interdisciplinary Sciences125,99 €
- Data Management, Analytics and Innovation110,99 €
- Proceedings of the International Conference on Computational Intelligence and Sustainable Technologies183,99 €
-
-
-
This book features a collection of high-quality research papers presented at the International Conference on Advanced Computing Technology (ICACT 2020), held at the SRM Institute of Science and Technology, Chennai, India, on 23-24 January 2020. It covers the areas of computational intelligence, artificial intelligence, machine learning, deep learning, big data, and applications of artificial intelligence in networking, IoT and bioinformatics
Produktdetails
- Produktdetails
- Lecture Notes in Networks and Systems 130
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-15-5328-8
- 1st ed. 2021
- Seitenzahl: 552
- Erscheinungstermin: 24. Juli 2020
- Englisch
- Abmessung: 241mm x 160mm x 35mm
- Gewicht: 928g
- ISBN-13: 9789811553288
- ISBN-10: 9811553289
- Artikelnr.: 59217066
- Lecture Notes in Networks and Systems 130
- Verlag: Springer / Springer Nature Singapore / Springer, Berlin
- Artikelnr. des Verlages: 978-981-15-5328-8
- 1st ed. 2021
- Seitenzahl: 552
- Erscheinungstermin: 24. Juli 2020
- Englisch
- Abmessung: 241mm x 160mm x 35mm
- Gewicht: 928g
- ISBN-13: 9789811553288
- ISBN-10: 9811553289
- Artikelnr.: 59217066
Dr. D. Jude Hemanth received his B.E. degree in ECE from Bharathiar University in 2002, M.E. degree in Communication Systems from Anna University in 2006 and Ph.D. from Karunya University in 2013. His research areas include computational intelligence and image processing. He has published more than 100 research papers in respected SCIE-indexed international journals and Scopus-indexed international conferences, as well as 27 edited books with leading publishers such as Elsevier, Springer and IET. He is currently an Associate Professor at the Department of ECE, Karunya University, India. Dr. G. Vadivu received her B.E. degree in CSE from IRTT, affiliated to Bharathiar University, in 1993; M.E. degree in CSE from SRM Institute of Science and Technology (formerly known as SRM University) in 2007; and her Ph.D. from SRM Institute of Science and Technology in 2013. Her research areas include big data analytics, machine learning, streaming analytics and SemanticWeb. She has also been a member of the organizing committees of several international conferences. She is a member the IET, ISC, ACM-W, CSI and IEEE. She has also received funding from the Scheme for Promotion of Academic and Research Collaboration (SPARC), MHRD, to investigate the use of deep learning to identify diabetic from retina images. M. Sangeetha received her B.E. degree in CSE from Sakthi Mariamman Engineering College, affiliated to Anna University, in 2006 and her M.E. degree from Anna University, Coimbatore, in 2010. Her research areas include machine learning, big data analytics and deep learning. She holds professionally qualifications in Big Data Visualization Tool (TABLEAU), machine learning and Python language. She has also been a member of the organizing committees of several national and international conferences. She is a member of IAENG, CSI, IEEE, ISTE, the Indian Science Congress Association and ISTE. Valentina E. Balas is currently a Full Professor at the Department of Automatics and Applied Software at the Faculty of Engineering, "Aurel Vlaicu" University of Arad, Romania. She holds a Ph.D. in Applied Electronics and Telecommunications from the Polytechnic University of Timisoara. Her research interests include intelligent systems, fuzzy control, soft computing, smart sensors, information fusion, modeling and simulation, and she has published over 300 research papers in refereed journals and international conferences. She is a member of EUSFLAT, ACM, a senior member of IEEE, and a member of TC-Fuzzy Systems (IEEE CIS), TC-Emergent Technologies (IEEE CIS), and TC-Soft Computing (IEEE SMCS).
Chapter 1. A Novel Approach for Analysing and Detection of Obfuscated Malware Payloads in Android Platform Using Dexmonitor.- Chapter 2. A Study on the Prevention Mechanisms for Kernel Attacks.- Chapter 3. Enhancing Data Security Using DNA Algorithm in Cloud Storage.- Chapter 4. Stable Multi-Agent Clustering Method to Improve the Security in VANET.- Chapter 5. Anonymous Block Chain, Electronic Voting Using Linkable Ring Signatures.- Chapter 6. A Comprehensive Study on Ransomware Attacks in Online Pharmacy Community.- Chapter 7. A Comprehensive Survey on RF Module at 433 Mhzfor Different Applications.- Chapter 8. A Memory Efficient Tool for Bengali Parts Of Speech Tagging.- Chapter 9. Long-Term Wind Speed Forecasting - A Review.- Chapter 10. Methods for Epileptic Seizure Prediction Using EEG Signals: A Survey.- Chapter 11. Railway Wagon Health Monitoring System Using E-BMA Protocol in Wireless Sensor Networks.- Chapter 12. An Interactive Virtual E-Learning Framework Using Crowdsourced Analytics.- Chapter 13. Security for Data in IOT Using A Newaps Elliptic Curve Light Weight Cryptography Algorithm.- Chapter 14. Feature Selection Strategy for Academic Datasets Using Correlation Analysis.- Chapter 15. Exploration of Magnetic Resonance Imaging for Prognosis of Alzheimer Disease Using Convolutional Neural Network.
Chapter 1. A Novel Approach for Analysing and Detection of Obfuscated Malware Payloads in Android Platform Using Dexmonitor.- Chapter 2. A Study on the Prevention Mechanisms for Kernel Attacks.- Chapter 3. Enhancing Data Security Using DNA Algorithm in Cloud Storage.- Chapter 4. Stable Multi-Agent Clustering Method to Improve the Security in VANET.- Chapter 5. Anonymous Block Chain, Electronic Voting Using Linkable Ring Signatures.- Chapter 6. A Comprehensive Study on Ransomware Attacks in Online Pharmacy Community.- Chapter 7. A Comprehensive Survey on RF Module at 433 Mhzfor Different Applications.- Chapter 8. A Memory Efficient Tool for Bengali Parts Of Speech Tagging.- Chapter 9. Long-Term Wind Speed Forecasting – A Review.- Chapter 10. Methods for Epileptic Seizure Prediction Using EEG Signals: A Survey.- Chapter 11. Railway Wagon Health Monitoring System Using E-BMA Protocol in Wireless Sensor Networks.- Chapter 12. An Interactive Virtual E-Learning Framework Using Crowdsourced Analytics.- Chapter 13. Security for Data in IOT Using A Newaps Elliptic Curve Light Weight Cryptography Algorithm.- Chapter 14. Feature Selection Strategy for Academic Datasets Using Correlation Analysis.- Chapter 15. Exploration of Magnetic Resonance Imaging for Prognosis of Alzheimer Disease Using Convolutional Neural Network.
Chapter 1. A Novel Approach for Analysing and Detection of Obfuscated Malware Payloads in Android Platform Using Dexmonitor.- Chapter 2. A Study on the Prevention Mechanisms for Kernel Attacks.- Chapter 3. Enhancing Data Security Using DNA Algorithm in Cloud Storage.- Chapter 4. Stable Multi-Agent Clustering Method to Improve the Security in VANET.- Chapter 5. Anonymous Block Chain, Electronic Voting Using Linkable Ring Signatures.- Chapter 6. A Comprehensive Study on Ransomware Attacks in Online Pharmacy Community.- Chapter 7. A Comprehensive Survey on RF Module at 433 Mhzfor Different Applications.- Chapter 8. A Memory Efficient Tool for Bengali Parts Of Speech Tagging.- Chapter 9. Long-Term Wind Speed Forecasting - A Review.- Chapter 10. Methods for Epileptic Seizure Prediction Using EEG Signals: A Survey.- Chapter 11. Railway Wagon Health Monitoring System Using E-BMA Protocol in Wireless Sensor Networks.- Chapter 12. An Interactive Virtual E-Learning Framework Using Crowdsourced Analytics.- Chapter 13. Security for Data in IOT Using A Newaps Elliptic Curve Light Weight Cryptography Algorithm.- Chapter 14. Feature Selection Strategy for Academic Datasets Using Correlation Analysis.- Chapter 15. Exploration of Magnetic Resonance Imaging for Prognosis of Alzheimer Disease Using Convolutional Neural Network.
Chapter 1. A Novel Approach for Analysing and Detection of Obfuscated Malware Payloads in Android Platform Using Dexmonitor.- Chapter 2. A Study on the Prevention Mechanisms for Kernel Attacks.- Chapter 3. Enhancing Data Security Using DNA Algorithm in Cloud Storage.- Chapter 4. Stable Multi-Agent Clustering Method to Improve the Security in VANET.- Chapter 5. Anonymous Block Chain, Electronic Voting Using Linkable Ring Signatures.- Chapter 6. A Comprehensive Study on Ransomware Attacks in Online Pharmacy Community.- Chapter 7. A Comprehensive Survey on RF Module at 433 Mhzfor Different Applications.- Chapter 8. A Memory Efficient Tool for Bengali Parts Of Speech Tagging.- Chapter 9. Long-Term Wind Speed Forecasting – A Review.- Chapter 10. Methods for Epileptic Seizure Prediction Using EEG Signals: A Survey.- Chapter 11. Railway Wagon Health Monitoring System Using E-BMA Protocol in Wireless Sensor Networks.- Chapter 12. An Interactive Virtual E-Learning Framework Using Crowdsourced Analytics.- Chapter 13. Security for Data in IOT Using A Newaps Elliptic Curve Light Weight Cryptography Algorithm.- Chapter 14. Feature Selection Strategy for Academic Datasets Using Correlation Analysis.- Chapter 15. Exploration of Magnetic Resonance Imaging for Prognosis of Alzheimer Disease Using Convolutional Neural Network.