Next-Gen Technologies in Computational Intelligence
Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)
Herausgeber: Anandan, R.; Kumar, M. Senthil; C. L., Biji
Next-Gen Technologies in Computational Intelligence
Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)
Herausgeber: Anandan, R.; Kumar, M. Senthil; C. L., Biji
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The Proceeding includes the research contribution from the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023) held on March 24th 2023 at Vels Institute of Science, Technology and Advanced Studies.
Andere Kunden interessierten sich auch für
- Handbook of Research on Machine Learning109,99 €
- S. SumathiComputational Intelligence Paradigms87,99 €
- Innovative Smart Healthcare and Bio-Medical Systems63,99 €
- AI and Deep Learning in Biometric Security76,99 €
- Data Science and Big Data Analytics in Smart Environments78,99 €
- Computer Science Engineering and Emerging Technologies66,99 €
- Chandrasekar VuppalapatiDemocratization of Artificial Intelligence for the Future of Humanity106,99 €
-
-
-
The Proceeding includes the research contribution from the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023) held on March 24th 2023 at Vels Institute of Science, Technology and Advanced Studies.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 566
- Erscheinungstermin: 7. Juni 2024
- Englisch
- Abmessung: 297mm x 210mm x 30mm
- Gewicht: 1449g
- ISBN-13: 9781032553900
- ISBN-10: 1032553901
- Artikelnr.: 70373879
- Verlag: CRC Press
- Seitenzahl: 566
- Erscheinungstermin: 7. Juni 2024
- Englisch
- Abmessung: 297mm x 210mm x 30mm
- Gewicht: 1449g
- ISBN-13: 9781032553900
- ISBN-10: 1032553901
- Artikelnr.: 70373879
Dr R. Anandan completed his post-doctoral degree in CSE from North America and currently working as Professor and Head, Department of Computer Science and Engineering, School of Engineering, VELS Institute of Science, Technology & Advanced Studies (VISTAS), Chennai, Tamilnadu, India. He has vast experience in corporate and all levels of academic in Computer Science and Engineering his knowledge of interests not limited to Artificial Intelligence, Soft Computing, Machine Learning, High Performance Computing, Big Data Analytics, Image Processing, 3d Printing and Knowledge Engineering. He has published more than 140 Research Papers in various international journals such in SCOPUS, SCI and referred journals. He has presented 92 papers at various International Conferences. He received many national and international awards he authored and edited 27 books and published 30 chapters in leading publications. He filed 18 patents of his research work and four patent and three copyrights is granted. He is also an associated as Editor in Wiley, World Scientific Press, Springer and Nova publishers. Dr Senthil Kumar Murugesan, Associate Professor in SRM Valliammai Engineering College, completed his PhD from anna university. Currently, he is working as an Associate Professor in Department of Cyber Security & CSE, SRM Valliammai Engineering College, Kattankulathur. He is having over 16 years of experience in Academia teaching Computer Science & IT related subjects in various colleges in Bangalore, Madurai and Chennai. He had published 54 papers in International Journals. He has presented 19 papers at various national and international conferences. He is also an awardee of two patents. He had published 15 articles in CSI Communications journal. He is a reviewer in many International Journals including Global Research and Development Journal, International Journal of Computer Science Engineering and Information Technology Research and International Journal of Applied Engineering and Technology. He delivered technical talks as a resource person in many colleges. He has received many awards from CSI India. Dr Biji C.L., Associate Professor in Vellore Institute of Technology, a creative and motivating teacher over a decade of experience in teaching and research. She completed her PhD in the area of Computational Biology from University of Kerala.Her Areas of research involves Data Analytics, Machine Learning, deep learning, and bioinformatics. She has published several papers which includes IEEE Transactions, Nature Scientific Reports and BMC Bioinformatics. She has served as the Editor for the proceedings of International symposium on Bio-informaticaindica 2022, Corona>A Compilation of Covid-19 Articles, Published by the Department of Computational Biology and Bioinformatics, ISBN: 978-93-5493-685-2, November 2021. She also served as editor and associate editor for INSIDE/symphony newsletter released by University of Kerala and CSI Trivandrum Chapter. Vicente García-Díaz received the Ph.D. degree in computer science. He is currently an Associate Professor with the Department of Computer Science, University of Oviedo, Spain. He is also a Software Engineer. He has a Master in occupational risk prevention and the qualification of University Expert in blockchain application development. He has supervised more than 100 academic projects. He has published more than 100 research papers in journals, conferences, and books. His teaching interests are primarily in the design and analysis of algorithms and the design of domain-specific languages. His current research interests include decision support systems, health informatics, and e-learning. He ispart of the editorial and advisory board of several indexed journals and conferences. He has been an editor of several special issues in books and indexed journals. Dr Souvik Pal is an Associate Professor in the Department of Computer Science and Engineering at Sister Nivedita University (Techno India Group), Kolkata, India. Prior to that, he was associated with Global Institute of Management and Technology; Brainware University, Kolkata; JIS College of Engineering, Nadia; Elitte College of Engineering, Kolkata; and Nalanda Institute of Technology, Bhubaneswar, India. Dr. Pal received his MTech, and PhD degrees in the field of Computer Science and Engineering from KIIT University, Bhubaneswar, India. He has more than a decade of academic experience. He is author or co-editor of more than 15 books from reputed publishers, including Elsevier, Springer, CRC Press, and Wiley, and he holds three patents. He is serving as a Series Editor for "Advances in Learning Analytics for Intelligent Cloud-IoT Systems", published by Scrivener-Wiley Publishing (Scopus-indexed); "Internet of Things: Data-Centric Intelligent Computing, Informatics, and Communication", published CRC Press, Taylor & Francis Group, USA; "Conference Proceedings Series on Intelligent Systems, Data Engineering, and Optimization", published CRC Press, Taylor & Francis Group, USA; Dr. Pal has published a number of research papers in Scopus / SCI/SCIE Journals and conferences. He is the organizing chair of RICE 2019, Vietnam; RICE 2020 Vietnam; ICICIT 2019, Tunisia. He has been invited as a keynote speaker at ICICCT 2019, Turkey, and ICTIDS 2019, 2021 Malaysia. He has also served as Proceedings Editor of ICICCT 2019, 2020; ICMMCS 2020, 2021; ICWSNUCA 2021, India. His professional activities include roles as Associate Editor, Guest Editor, and Editorial Board member for more than 100+ international journals and conferences of high repute and impact. His research area includes cloud computing, big data, internet of things, wireless sensor network, and data analytics. He is a member of many professional organizations, including MIEEE; MCSI; MCSTA/ACM, USA; MIAENG, Hong Kong; MIRED, USA; MACEEE, New Delhi; MIACSIT, Singapore; and MAASCIT, USA.
1. Blockchain-Based Identity Management System in the Digital Industry
2. An Improved Neural Network Classifier for Melanoma Skin Lesion Detection
3. Trust Aware Energy Efficient Model Using Evolutionary Computing in WSN
4. Introspection of CNN Primitive Features for Indian Sign Language Based
Hand Gesture
Recognition of Daily Used Words Using Machine Learning
5. Implementation of Quantum Image Processing Techniques Using the
Chan-Vese
Segmentation Algorithm to Convert Bits to Qubits to Enhance The Storage
Capacity
of the Pixels to Achieve Optimal Output to Identify the Paddy Leaf Diseases
6. Prediction of Bitcoin-Heist Ransomware Attack Using Machine Learning
7. A Review of Classification, Detection, and Prognosis of Coronary Artery
Disease
8. Optimization of Packet Length using Exclusive SCCO Algorithm In WSN And
IoT Based
Networks
9. Novel Triphasic Architecture to Ascertain Malicious Exam-Takers
10. SDKL Hybrid ML Model to Predict Heart Disease Detection
11. Optimization of Energy Aware Clustering For Wireless Sensor Network
12. Next-Gen Technologies in Computational Intelligence [NGTC-2023] PID 62
13. Efficient PHOA Based Routing Network Protocol
for IoT-Sem System
14. Enhancement of Security and Performance
of Multimedia Data Transmission Over Fog
15. Improving the Energy Efficiency Based on Cooperative Routing Using
Genetic
Algorithm (GA) for Dynamic Clusters in Underwater Wireless Sensor Networks
16. Chest X-Ray Based Classification of Lungs Pathology Using VGG-16
Features
and Double Ensemble Classifier
17. Machine Learning Algorithms To Predict The Brain Stroke
18. An Efficient Student Relationship Automation Using Multimodal Temporal
Convolution Networks and Ranked Resolving Computations
19. Data Privacy Preservation with Optimization Technique for Effective
Multi-Cloud
Storage and Security
20. A Framework for Real-Time Prediction of Inappropriate Content
21. Statistical and Algorithmic Color Normalization and Stain Separation
Methods:
A Brief Study
22. Classification of Malware Infected API Call Sequences With Ensemble
Learning
23. DDoS Identification and Defense Procedure Using Deep Learning
Approaches For SDN
24. Comprehensive Autonomous Vehicle Optimal Routing With Dynamic
Heuristics
25. Fake Review Detection in Movie Recommendation System Using Hybrid
Method
26. Leprosy Screening Through Image Processing Methods
27. Real-Time V2V Communication for Collision Detection in VANETs Using
ESP Mesh Protocol: An IoT-Based Implementation for the Internet of Vehicles
28. Cyber Security Holes of JSON Web Token
29. Blockchain for Philanthropy
30. Predictive Analysis Using Big Data in the Treatment of Pulmonary
Diseases
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
32.Real-Time Over-The-Air-Programming (OTAP) for Wireless Sensor Network:
Implementation and Analysis Using SENSEnuts IoT Platform
33.Mobile-Based Cloud Detection Model for Skin Cancer Using Machine
Learning
34.Using the Greedy Algorithm to Minimize Bandwidth in P2P Networks Over
Video
Live Streaming
35.Human Brain Tumors and the Role of the Neural Network
36.Best Fit Topic Model Coherence Improvement for Subectivity Analysis of
Gestational
Diabetes Mellitus
37. A Decentralized Application-DAPP for Remote Voting System Based on
Blockchain
Technology
38.Diagnosis of Mild Cognitive Impairment Using Multimodal Imaging With
Machine
Learning Techniques
39.Surface Defect Detection for Wet Blue Leather Using Deep Learning
Approach
40.Attack Detection for Stock Trading Application Using Unsupervised
Machine Learning
41.Manipulation of 3D Objects in Handheld Augmented Reality for Campus
Virtual Visit
42.Locality Recommendation System Using Exploratory Data Analysis and
Affinity
Propagation
43.Real-Time Pothole Detection Using Deep Learning
44. Contact Less Virtually Controlling System Using Computer Vision
Techniques
45.Underwater Benthos Detection in Marine Benthic Zone Using Single Shot
MultiBox
Detector
46.Digital Human Creator Using Facial Expression and Voice
47.Enhancing the Security of Electronic Health Records Using Consortium
Blockchai
48. Deep Learning Model for Segmentation of Brain Tumor in MRI Images
49. Embedding Intelligence on Edge Computing for the Classification of IoT
Data
Using Machine Learning with Deep Autoencoder
50. Teens, Screens, and Mental Health- A Study on Digital Wellbeing
51. AI-Enabled Human and Machine Activity Monitoring in IIOT Systems
52. Application Development for Solving the Farmer Yield Problem Using
Cloud
Computing
53. AI Enabled E-Commerce Studio Website
54. Correlational and Sentimental Analysis Using LSTM to Forecast Stock
Price
55. A Novel Authentication System Based on CNN and IoT
56. Cryptocurrency Price Prediction Using LSTM and RNN Techniques
57. A Study on Cybernated Watermarking Approach on Image With Cryptographic
Encryption
58. A Survey on Implementation and Development of AES Cryptography
Algorithm
In Various Fields
59. A Survey on Alerting Using Honeyword System
60. A Study on IoT Based Road Safety and Traffic Management
61. Image-Based Steganography for Android: Concealing Secrets in Pixels
62. Various Methods of Injection Attacks
63. Password Protection and Recovery
64. Securing Wireless Communication in Cyber-Physical Systems and IoT
65. Prevention and Detection of Arp Spoofing - A Survey
66. A Survey on Enhancing Password Guessing and Dictionary List Creation
Techniques Using OSINT
67.Survey on Multi-Factor Authentication in Cloud Computing
68.Survey on Improvement in Efficiency of Steganography
69.A Hybrid Model for Guided Filtering-Based Edge Preservation of Fused
Multi-modal Medical Images
70.State of Art Survey on Memory Forensic Acquisition & Techniques
71.Product Review System using CNN & MERN Stack
72.Invading Into Android Using Metasploit
73.A Review of Privacy Protection Data Utility Mining Using Perturbation
74.Plant Disease Detection Using Stochastic Gradient Classifier With RBNN
75.Autonomous Assistance for Alzheimer's Patients
76.Developing an Internet of Things based soil moisture prediction
77.Mitigation of Threats in Cloud Using Ensemble Hybrid Machine Learning
78.Detection of Insects, Birds, and Wild Animals in Farming Land Using
Regional
Convolutional Neural Network
79.A Trifold Authentication Using Elliptical Cryptography in Cloud
Computing
K. Komathi and D. Kavitha
80.Binary Classification of Medical Chest X-Ray Using Gaussian Naive Bayes
in Machine Learning
2. An Improved Neural Network Classifier for Melanoma Skin Lesion Detection
3. Trust Aware Energy Efficient Model Using Evolutionary Computing in WSN
4. Introspection of CNN Primitive Features for Indian Sign Language Based
Hand Gesture
Recognition of Daily Used Words Using Machine Learning
5. Implementation of Quantum Image Processing Techniques Using the
Chan-Vese
Segmentation Algorithm to Convert Bits to Qubits to Enhance The Storage
Capacity
of the Pixels to Achieve Optimal Output to Identify the Paddy Leaf Diseases
6. Prediction of Bitcoin-Heist Ransomware Attack Using Machine Learning
7. A Review of Classification, Detection, and Prognosis of Coronary Artery
Disease
8. Optimization of Packet Length using Exclusive SCCO Algorithm In WSN And
IoT Based
Networks
9. Novel Triphasic Architecture to Ascertain Malicious Exam-Takers
10. SDKL Hybrid ML Model to Predict Heart Disease Detection
11. Optimization of Energy Aware Clustering For Wireless Sensor Network
12. Next-Gen Technologies in Computational Intelligence [NGTC-2023] PID 62
13. Efficient PHOA Based Routing Network Protocol
for IoT-Sem System
14. Enhancement of Security and Performance
of Multimedia Data Transmission Over Fog
15. Improving the Energy Efficiency Based on Cooperative Routing Using
Genetic
Algorithm (GA) for Dynamic Clusters in Underwater Wireless Sensor Networks
16. Chest X-Ray Based Classification of Lungs Pathology Using VGG-16
Features
and Double Ensemble Classifier
17. Machine Learning Algorithms To Predict The Brain Stroke
18. An Efficient Student Relationship Automation Using Multimodal Temporal
Convolution Networks and Ranked Resolving Computations
19. Data Privacy Preservation with Optimization Technique for Effective
Multi-Cloud
Storage and Security
20. A Framework for Real-Time Prediction of Inappropriate Content
21. Statistical and Algorithmic Color Normalization and Stain Separation
Methods:
A Brief Study
22. Classification of Malware Infected API Call Sequences With Ensemble
Learning
23. DDoS Identification and Defense Procedure Using Deep Learning
Approaches For SDN
24. Comprehensive Autonomous Vehicle Optimal Routing With Dynamic
Heuristics
25. Fake Review Detection in Movie Recommendation System Using Hybrid
Method
26. Leprosy Screening Through Image Processing Methods
27. Real-Time V2V Communication for Collision Detection in VANETs Using
ESP Mesh Protocol: An IoT-Based Implementation for the Internet of Vehicles
28. Cyber Security Holes of JSON Web Token
29. Blockchain for Philanthropy
30. Predictive Analysis Using Big Data in the Treatment of Pulmonary
Diseases
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
32.Real-Time Over-The-Air-Programming (OTAP) for Wireless Sensor Network:
Implementation and Analysis Using SENSEnuts IoT Platform
33.Mobile-Based Cloud Detection Model for Skin Cancer Using Machine
Learning
34.Using the Greedy Algorithm to Minimize Bandwidth in P2P Networks Over
Video
Live Streaming
35.Human Brain Tumors and the Role of the Neural Network
36.Best Fit Topic Model Coherence Improvement for Subectivity Analysis of
Gestational
Diabetes Mellitus
37. A Decentralized Application-DAPP for Remote Voting System Based on
Blockchain
Technology
38.Diagnosis of Mild Cognitive Impairment Using Multimodal Imaging With
Machine
Learning Techniques
39.Surface Defect Detection for Wet Blue Leather Using Deep Learning
Approach
40.Attack Detection for Stock Trading Application Using Unsupervised
Machine Learning
41.Manipulation of 3D Objects in Handheld Augmented Reality for Campus
Virtual Visit
42.Locality Recommendation System Using Exploratory Data Analysis and
Affinity
Propagation
43.Real-Time Pothole Detection Using Deep Learning
44. Contact Less Virtually Controlling System Using Computer Vision
Techniques
45.Underwater Benthos Detection in Marine Benthic Zone Using Single Shot
MultiBox
Detector
46.Digital Human Creator Using Facial Expression and Voice
47.Enhancing the Security of Electronic Health Records Using Consortium
Blockchai
48. Deep Learning Model for Segmentation of Brain Tumor in MRI Images
49. Embedding Intelligence on Edge Computing for the Classification of IoT
Data
Using Machine Learning with Deep Autoencoder
50. Teens, Screens, and Mental Health- A Study on Digital Wellbeing
51. AI-Enabled Human and Machine Activity Monitoring in IIOT Systems
52. Application Development for Solving the Farmer Yield Problem Using
Cloud
Computing
53. AI Enabled E-Commerce Studio Website
54. Correlational and Sentimental Analysis Using LSTM to Forecast Stock
Price
55. A Novel Authentication System Based on CNN and IoT
56. Cryptocurrency Price Prediction Using LSTM and RNN Techniques
57. A Study on Cybernated Watermarking Approach on Image With Cryptographic
Encryption
58. A Survey on Implementation and Development of AES Cryptography
Algorithm
In Various Fields
59. A Survey on Alerting Using Honeyword System
60. A Study on IoT Based Road Safety and Traffic Management
61. Image-Based Steganography for Android: Concealing Secrets in Pixels
62. Various Methods of Injection Attacks
63. Password Protection and Recovery
64. Securing Wireless Communication in Cyber-Physical Systems and IoT
65. Prevention and Detection of Arp Spoofing - A Survey
66. A Survey on Enhancing Password Guessing and Dictionary List Creation
Techniques Using OSINT
67.Survey on Multi-Factor Authentication in Cloud Computing
68.Survey on Improvement in Efficiency of Steganography
69.A Hybrid Model for Guided Filtering-Based Edge Preservation of Fused
Multi-modal Medical Images
70.State of Art Survey on Memory Forensic Acquisition & Techniques
71.Product Review System using CNN & MERN Stack
72.Invading Into Android Using Metasploit
73.A Review of Privacy Protection Data Utility Mining Using Perturbation
74.Plant Disease Detection Using Stochastic Gradient Classifier With RBNN
75.Autonomous Assistance for Alzheimer's Patients
76.Developing an Internet of Things based soil moisture prediction
77.Mitigation of Threats in Cloud Using Ensemble Hybrid Machine Learning
78.Detection of Insects, Birds, and Wild Animals in Farming Land Using
Regional
Convolutional Neural Network
79.A Trifold Authentication Using Elliptical Cryptography in Cloud
Computing
K. Komathi and D. Kavitha
80.Binary Classification of Medical Chest X-Ray Using Gaussian Naive Bayes
in Machine Learning
1. Blockchain-Based Identity Management System in the Digital Industry
2. An Improved Neural Network Classifier for Melanoma Skin Lesion Detection
3. Trust Aware Energy Efficient Model Using Evolutionary Computing in WSN
4. Introspection of CNN Primitive Features for Indian Sign Language Based
Hand Gesture
Recognition of Daily Used Words Using Machine Learning
5. Implementation of Quantum Image Processing Techniques Using the
Chan-Vese
Segmentation Algorithm to Convert Bits to Qubits to Enhance The Storage
Capacity
of the Pixels to Achieve Optimal Output to Identify the Paddy Leaf Diseases
6. Prediction of Bitcoin-Heist Ransomware Attack Using Machine Learning
7. A Review of Classification, Detection, and Prognosis of Coronary Artery
Disease
8. Optimization of Packet Length using Exclusive SCCO Algorithm In WSN And
IoT Based
Networks
9. Novel Triphasic Architecture to Ascertain Malicious Exam-Takers
10. SDKL Hybrid ML Model to Predict Heart Disease Detection
11. Optimization of Energy Aware Clustering For Wireless Sensor Network
12. Next-Gen Technologies in Computational Intelligence [NGTC-2023] PID 62
13. Efficient PHOA Based Routing Network Protocol
for IoT-Sem System
14. Enhancement of Security and Performance
of Multimedia Data Transmission Over Fog
15. Improving the Energy Efficiency Based on Cooperative Routing Using
Genetic
Algorithm (GA) for Dynamic Clusters in Underwater Wireless Sensor Networks
16. Chest X-Ray Based Classification of Lungs Pathology Using VGG-16
Features
and Double Ensemble Classifier
17. Machine Learning Algorithms To Predict The Brain Stroke
18. An Efficient Student Relationship Automation Using Multimodal Temporal
Convolution Networks and Ranked Resolving Computations
19. Data Privacy Preservation with Optimization Technique for Effective
Multi-Cloud
Storage and Security
20. A Framework for Real-Time Prediction of Inappropriate Content
21. Statistical and Algorithmic Color Normalization and Stain Separation
Methods:
A Brief Study
22. Classification of Malware Infected API Call Sequences With Ensemble
Learning
23. DDoS Identification and Defense Procedure Using Deep Learning
Approaches For SDN
24. Comprehensive Autonomous Vehicle Optimal Routing With Dynamic
Heuristics
25. Fake Review Detection in Movie Recommendation System Using Hybrid
Method
26. Leprosy Screening Through Image Processing Methods
27. Real-Time V2V Communication for Collision Detection in VANETs Using
ESP Mesh Protocol: An IoT-Based Implementation for the Internet of Vehicles
28. Cyber Security Holes of JSON Web Token
29. Blockchain for Philanthropy
30. Predictive Analysis Using Big Data in the Treatment of Pulmonary
Diseases
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
32.Real-Time Over-The-Air-Programming (OTAP) for Wireless Sensor Network:
Implementation and Analysis Using SENSEnuts IoT Platform
33.Mobile-Based Cloud Detection Model for Skin Cancer Using Machine
Learning
34.Using the Greedy Algorithm to Minimize Bandwidth in P2P Networks Over
Video
Live Streaming
35.Human Brain Tumors and the Role of the Neural Network
36.Best Fit Topic Model Coherence Improvement for Subectivity Analysis of
Gestational
Diabetes Mellitus
37. A Decentralized Application-DAPP for Remote Voting System Based on
Blockchain
Technology
38.Diagnosis of Mild Cognitive Impairment Using Multimodal Imaging With
Machine
Learning Techniques
39.Surface Defect Detection for Wet Blue Leather Using Deep Learning
Approach
40.Attack Detection for Stock Trading Application Using Unsupervised
Machine Learning
41.Manipulation of 3D Objects in Handheld Augmented Reality for Campus
Virtual Visit
42.Locality Recommendation System Using Exploratory Data Analysis and
Affinity
Propagation
43.Real-Time Pothole Detection Using Deep Learning
44. Contact Less Virtually Controlling System Using Computer Vision
Techniques
45.Underwater Benthos Detection in Marine Benthic Zone Using Single Shot
MultiBox
Detector
46.Digital Human Creator Using Facial Expression and Voice
47.Enhancing the Security of Electronic Health Records Using Consortium
Blockchai
48. Deep Learning Model for Segmentation of Brain Tumor in MRI Images
49. Embedding Intelligence on Edge Computing for the Classification of IoT
Data
Using Machine Learning with Deep Autoencoder
50. Teens, Screens, and Mental Health- A Study on Digital Wellbeing
51. AI-Enabled Human and Machine Activity Monitoring in IIOT Systems
52. Application Development for Solving the Farmer Yield Problem Using
Cloud
Computing
53. AI Enabled E-Commerce Studio Website
54. Correlational and Sentimental Analysis Using LSTM to Forecast Stock
Price
55. A Novel Authentication System Based on CNN and IoT
56. Cryptocurrency Price Prediction Using LSTM and RNN Techniques
57. A Study on Cybernated Watermarking Approach on Image With Cryptographic
Encryption
58. A Survey on Implementation and Development of AES Cryptography
Algorithm
In Various Fields
59. A Survey on Alerting Using Honeyword System
60. A Study on IoT Based Road Safety and Traffic Management
61. Image-Based Steganography for Android: Concealing Secrets in Pixels
62. Various Methods of Injection Attacks
63. Password Protection and Recovery
64. Securing Wireless Communication in Cyber-Physical Systems and IoT
65. Prevention and Detection of Arp Spoofing - A Survey
66. A Survey on Enhancing Password Guessing and Dictionary List Creation
Techniques Using OSINT
67.Survey on Multi-Factor Authentication in Cloud Computing
68.Survey on Improvement in Efficiency of Steganography
69.A Hybrid Model for Guided Filtering-Based Edge Preservation of Fused
Multi-modal Medical Images
70.State of Art Survey on Memory Forensic Acquisition & Techniques
71.Product Review System using CNN & MERN Stack
72.Invading Into Android Using Metasploit
73.A Review of Privacy Protection Data Utility Mining Using Perturbation
74.Plant Disease Detection Using Stochastic Gradient Classifier With RBNN
75.Autonomous Assistance for Alzheimer's Patients
76.Developing an Internet of Things based soil moisture prediction
77.Mitigation of Threats in Cloud Using Ensemble Hybrid Machine Learning
78.Detection of Insects, Birds, and Wild Animals in Farming Land Using
Regional
Convolutional Neural Network
79.A Trifold Authentication Using Elliptical Cryptography in Cloud
Computing
K. Komathi and D. Kavitha
80.Binary Classification of Medical Chest X-Ray Using Gaussian Naive Bayes
in Machine Learning
2. An Improved Neural Network Classifier for Melanoma Skin Lesion Detection
3. Trust Aware Energy Efficient Model Using Evolutionary Computing in WSN
4. Introspection of CNN Primitive Features for Indian Sign Language Based
Hand Gesture
Recognition of Daily Used Words Using Machine Learning
5. Implementation of Quantum Image Processing Techniques Using the
Chan-Vese
Segmentation Algorithm to Convert Bits to Qubits to Enhance The Storage
Capacity
of the Pixels to Achieve Optimal Output to Identify the Paddy Leaf Diseases
6. Prediction of Bitcoin-Heist Ransomware Attack Using Machine Learning
7. A Review of Classification, Detection, and Prognosis of Coronary Artery
Disease
8. Optimization of Packet Length using Exclusive SCCO Algorithm In WSN And
IoT Based
Networks
9. Novel Triphasic Architecture to Ascertain Malicious Exam-Takers
10. SDKL Hybrid ML Model to Predict Heart Disease Detection
11. Optimization of Energy Aware Clustering For Wireless Sensor Network
12. Next-Gen Technologies in Computational Intelligence [NGTC-2023] PID 62
13. Efficient PHOA Based Routing Network Protocol
for IoT-Sem System
14. Enhancement of Security and Performance
of Multimedia Data Transmission Over Fog
15. Improving the Energy Efficiency Based on Cooperative Routing Using
Genetic
Algorithm (GA) for Dynamic Clusters in Underwater Wireless Sensor Networks
16. Chest X-Ray Based Classification of Lungs Pathology Using VGG-16
Features
and Double Ensemble Classifier
17. Machine Learning Algorithms To Predict The Brain Stroke
18. An Efficient Student Relationship Automation Using Multimodal Temporal
Convolution Networks and Ranked Resolving Computations
19. Data Privacy Preservation with Optimization Technique for Effective
Multi-Cloud
Storage and Security
20. A Framework for Real-Time Prediction of Inappropriate Content
21. Statistical and Algorithmic Color Normalization and Stain Separation
Methods:
A Brief Study
22. Classification of Malware Infected API Call Sequences With Ensemble
Learning
23. DDoS Identification and Defense Procedure Using Deep Learning
Approaches For SDN
24. Comprehensive Autonomous Vehicle Optimal Routing With Dynamic
Heuristics
25. Fake Review Detection in Movie Recommendation System Using Hybrid
Method
26. Leprosy Screening Through Image Processing Methods
27. Real-Time V2V Communication for Collision Detection in VANETs Using
ESP Mesh Protocol: An IoT-Based Implementation for the Internet of Vehicles
28. Cyber Security Holes of JSON Web Token
29. Blockchain for Philanthropy
30. Predictive Analysis Using Big Data in the Treatment of Pulmonary
Diseases
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
32.Real-Time Over-The-Air-Programming (OTAP) for Wireless Sensor Network:
Implementation and Analysis Using SENSEnuts IoT Platform
33.Mobile-Based Cloud Detection Model for Skin Cancer Using Machine
Learning
34.Using the Greedy Algorithm to Minimize Bandwidth in P2P Networks Over
Video
Live Streaming
35.Human Brain Tumors and the Role of the Neural Network
36.Best Fit Topic Model Coherence Improvement for Subectivity Analysis of
Gestational
Diabetes Mellitus
37. A Decentralized Application-DAPP for Remote Voting System Based on
Blockchain
Technology
38.Diagnosis of Mild Cognitive Impairment Using Multimodal Imaging With
Machine
Learning Techniques
39.Surface Defect Detection for Wet Blue Leather Using Deep Learning
Approach
40.Attack Detection for Stock Trading Application Using Unsupervised
Machine Learning
41.Manipulation of 3D Objects in Handheld Augmented Reality for Campus
Virtual Visit
42.Locality Recommendation System Using Exploratory Data Analysis and
Affinity
Propagation
43.Real-Time Pothole Detection Using Deep Learning
44. Contact Less Virtually Controlling System Using Computer Vision
Techniques
45.Underwater Benthos Detection in Marine Benthic Zone Using Single Shot
MultiBox
Detector
46.Digital Human Creator Using Facial Expression and Voice
47.Enhancing the Security of Electronic Health Records Using Consortium
Blockchai
48. Deep Learning Model for Segmentation of Brain Tumor in MRI Images
49. Embedding Intelligence on Edge Computing for the Classification of IoT
Data
Using Machine Learning with Deep Autoencoder
50. Teens, Screens, and Mental Health- A Study on Digital Wellbeing
51. AI-Enabled Human and Machine Activity Monitoring in IIOT Systems
52. Application Development for Solving the Farmer Yield Problem Using
Cloud
Computing
53. AI Enabled E-Commerce Studio Website
54. Correlational and Sentimental Analysis Using LSTM to Forecast Stock
Price
55. A Novel Authentication System Based on CNN and IoT
56. Cryptocurrency Price Prediction Using LSTM and RNN Techniques
57. A Study on Cybernated Watermarking Approach on Image With Cryptographic
Encryption
58. A Survey on Implementation and Development of AES Cryptography
Algorithm
In Various Fields
59. A Survey on Alerting Using Honeyword System
60. A Study on IoT Based Road Safety and Traffic Management
61. Image-Based Steganography for Android: Concealing Secrets in Pixels
62. Various Methods of Injection Attacks
63. Password Protection and Recovery
64. Securing Wireless Communication in Cyber-Physical Systems and IoT
65. Prevention and Detection of Arp Spoofing - A Survey
66. A Survey on Enhancing Password Guessing and Dictionary List Creation
Techniques Using OSINT
67.Survey on Multi-Factor Authentication in Cloud Computing
68.Survey on Improvement in Efficiency of Steganography
69.A Hybrid Model for Guided Filtering-Based Edge Preservation of Fused
Multi-modal Medical Images
70.State of Art Survey on Memory Forensic Acquisition & Techniques
71.Product Review System using CNN & MERN Stack
72.Invading Into Android Using Metasploit
73.A Review of Privacy Protection Data Utility Mining Using Perturbation
74.Plant Disease Detection Using Stochastic Gradient Classifier With RBNN
75.Autonomous Assistance for Alzheimer's Patients
76.Developing an Internet of Things based soil moisture prediction
77.Mitigation of Threats in Cloud Using Ensemble Hybrid Machine Learning
78.Detection of Insects, Birds, and Wild Animals in Farming Land Using
Regional
Convolutional Neural Network
79.A Trifold Authentication Using Elliptical Cryptography in Cloud
Computing
K. Komathi and D. Kavitha
80.Binary Classification of Medical Chest X-Ray Using Gaussian Naive Bayes
in Machine Learning