Next-Gen Technologies in Computational Intelligence (eBook, ePUB)
Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)
Redaktion: Anandan, R.; Pal, Souvik; Díaz, Vicente García; C. L., Biji; Kumar, M. Senthil
Alle Infos zum eBook verschenken
Next-Gen Technologies in Computational Intelligence (eBook, ePUB)
Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)
Redaktion: Anandan, R.; Pal, Souvik; Díaz, Vicente García; C. L., Biji; Kumar, M. Senthil
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Hier können Sie sich einloggen
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The Proceeding includes the research contribution from the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023) held on March 24th 2023 at Vels Institute of Science, Technology and Advanced Studies.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 50.6MB
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Produktdetails
- Verlag: Taylor & Francis
- Erscheinungstermin: 7. Juni 2024
- Englisch
- ISBN-13: 9781040046036
- Artikelnr.: 70776045
- Verlag: Taylor & Francis
- Erscheinungstermin: 7. Juni 2024
- Englisch
- ISBN-13: 9781040046036
- Artikelnr.: 70776045
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
2. An Improved Neural Network Classifier for Melanoma Skin Lesion Detection
3. Trust Aware Energy Efficient Model Using Evolutionary Computing in WSN
4. Introspection of CNN Primitive Features for Indian Sign Language Based
Hand Gesture
Recognition of Daily Used Words Using Machine Learning
5. Implementation of Quantum Image Processing Techniques Using the
Chan-Vese
Segmentation Algorithm to Convert Bits to Qubits to Enhance The Storage
Capacity
of the Pixels to Achieve Optimal Output to Identify the Paddy Leaf Diseases
6. Prediction of Bitcoin-Heist Ransomware Attack Using Machine Learning
7. A Review of Classification, Detection, and Prognosis of Coronary Artery
Disease
8. Optimization of Packet Length using Exclusive SCCO Algorithm In WSN And
IoT Based
Networks
9. Novel Triphasic Architecture to Ascertain Malicious Exam-Takers
10. SDKL Hybrid ML Model to Predict Heart Disease Detection
11. Optimization of Energy Aware Clustering For Wireless Sensor Network
12. Next-Gen Technologies in Computational Intelligence [NGTC-2023] PID 62
13. Efficient PHOA Based Routing Network Protocol
for IoT-Sem System
14. Enhancement of Security and Performance
of Multimedia Data Transmission Over Fog
15. Improving the Energy Efficiency Based on Cooperative Routing Using
Genetic
Algorithm (GA) for Dynamic Clusters in Underwater Wireless Sensor Networks
16. Chest X-Ray Based Classification of Lungs Pathology Using VGG-16
Features
and Double Ensemble Classifier
17. Machine Learning Algorithms To Predict The Brain Stroke
18. An Efficient Student Relationship Automation Using Multimodal Temporal
Convolution Networks and Ranked Resolving Computations
19. Data Privacy Preservation with Optimization Technique for Effective
Multi-Cloud
Storage and Security
20. A Framework for Real-Time Prediction of Inappropriate Content
21. Statistical and Algorithmic Color Normalization and Stain Separation
Methods:
A Brief Study
22. Classification of Malware Infected API Call Sequences With Ensemble
Learning
23. DDoS Identification and Defense Procedure Using Deep Learning
Approaches For SDN
24. Comprehensive Autonomous Vehicle Optimal Routing With Dynamic
Heuristics
25. Fake Review Detection in Movie Recommendation System Using Hybrid
Method
26. Leprosy Screening Through Image Processing Methods
27. Real-Time V2V Communication for Collision Detection in VANETs Using
ESP Mesh Protocol: An IoT-Based Implementation for the Internet of Vehicles
28. Cyber Security Holes of JSON Web Token
29. Blockchain for Philanthropy
30. Predictive Analysis Using Big Data in the Treatment of Pulmonary
Diseases
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
32.Real-Time Over-The-Air-Programming (OTAP) for Wireless Sensor Network:
Implementation and Analysis Using SENSEnuts IoT Platform
33.Mobile-Based Cloud Detection Model for Skin Cancer Using Machine
Learning
34.Using the Greedy Algorithm to Minimize Bandwidth in P2P Networks Over
Video
Live Streaming
35.Human Brain Tumors and the Role of the Neural Network
36.Best Fit Topic Model Coherence Improvement for Subectivity Analysis of
Gestational
Diabetes Mellitus
37. A Decentralized Application-DAPP for Remote Voting System Based on
Blockchain
Technology
38.Diagnosis of Mild Cognitive Impairment Using Multimodal Imaging With
Machine
Learning Techniques
39.Surface Defect Detection for Wet Blue Leather Using Deep Learning
Approach
40.Attack Detection for Stock Trading Application Using Unsupervised
Machine Learning
41.Manipulation of 3D Objects in Handheld Augmented Reality for Campus
Virtual Visit
42.Locality Recommendation System Using Exploratory Data Analysis and
Affinity
Propagation
43.Real-Time Pothole Detection Using Deep Learning
44. Contact Less Virtually Controlling System Using Computer Vision
Techniques
45.Underwater Benthos Detection in Marine Benthic Zone Using Single Shot
MultiBox
Detector
46.Digital Human Creator Using Facial Expression and Voice
47.Enhancing the Security of Electronic Health Records Using Consortium
Blockchai
48. Deep Learning Model for Segmentation of Brain Tumor in MRI Images
49. Embedding Intelligence on Edge Computing for the Classification of IoT
Data
Using Machine Learning with Deep Autoencoder
50. Teens, Screens, and Mental Health- A Study on Digital Wellbeing
51. AI-Enabled Human and Machine Activity Monitoring in IIOT Systems
52. Application Development for Solving the Farmer Yield Problem Using
Cloud
Computing
53. AI Enabled E-Commerce Studio Website
54. Correlational and Sentimental Analysis Using LSTM to Forecast Stock
Price
55. A Novel Authentication System Based on CNN and IoT
56. Cryptocurrency Price Prediction Using LSTM and RNN Techniques
57. A Study on Cybernated Watermarking Approach on Image With Cryptographic
Encryption
58. A Survey on Implementation and Development of AES Cryptography
Algorithm
In Various Fields
59. A Survey on Alerting Using Honeyword System
60. A Study on IoT Based Road Safety and Traffic Management
61. Image-Based Steganography for Android: Concealing Secrets in Pixels
62. Various Methods of Injection Attacks
63. Password Protection and Recovery
64. Securing Wireless Communication in Cyber-Physical Systems and IoT
65. Prevention and Detection of Arp Spoofing - A Survey
66. A Survey on Enhancing Password Guessing and Dictionary List Creation
Techniques Using OSINT
67.Survey on Multi-Factor Authentication in Cloud Computing
68.Survey on Improvement in Efficiency of Steganography
69.A Hybrid Model for Guided Filtering-Based Edge Preservation of Fused
Multi-modal Medical Images
70.State of Art Survey on Memory Forensic Acquisition & Techniques
71.Product Review System using CNN & MERN Stack
72.Invading Into Android Using Metasploit
73.A Review of Privacy Protection Data Utility Mining Using Perturbation
74.Plant Disease Detection Using Stochastic Gradient Classifier With RBNN
75.Autonomous Assistance for Alzheimer's Patients
76.Developing an Internet of Things based soil moisture prediction
77.Mitigation of Threats in Cloud Using Ensemble Hybrid Machine Learning
78.Detection of Insects, Birds, and Wild Animals in Farming Land Using
Regional
Convolutional Neural Network
79.A Trifold Authentication Using Elliptical Cryptography in Cloud
Computing
K. Komathi and D. Kavitha
80.Binary Classification of Medical Chest X-Ray Using Gaussian Naive Bayes
in Machine Learning
2. An Improved Neural Network Classifier for Melanoma Skin Lesion Detection
3. Trust Aware Energy Efficient Model Using Evolutionary Computing in WSN
4. Introspection of CNN Primitive Features for Indian Sign Language Based
Hand Gesture
Recognition of Daily Used Words Using Machine Learning
5. Implementation of Quantum Image Processing Techniques Using the
Chan-Vese
Segmentation Algorithm to Convert Bits to Qubits to Enhance The Storage
Capacity
of the Pixels to Achieve Optimal Output to Identify the Paddy Leaf Diseases
6. Prediction of Bitcoin-Heist Ransomware Attack Using Machine Learning
7. A Review of Classification, Detection, and Prognosis of Coronary Artery
Disease
8. Optimization of Packet Length using Exclusive SCCO Algorithm In WSN And
IoT Based
Networks
9. Novel Triphasic Architecture to Ascertain Malicious Exam-Takers
10. SDKL Hybrid ML Model to Predict Heart Disease Detection
11. Optimization of Energy Aware Clustering For Wireless Sensor Network
12. Next-Gen Technologies in Computational Intelligence [NGTC-2023] PID 62
13. Efficient PHOA Based Routing Network Protocol
for IoT-Sem System
14. Enhancement of Security and Performance
of Multimedia Data Transmission Over Fog
15. Improving the Energy Efficiency Based on Cooperative Routing Using
Genetic
Algorithm (GA) for Dynamic Clusters in Underwater Wireless Sensor Networks
16. Chest X-Ray Based Classification of Lungs Pathology Using VGG-16
Features
and Double Ensemble Classifier
17. Machine Learning Algorithms To Predict The Brain Stroke
18. An Efficient Student Relationship Automation Using Multimodal Temporal
Convolution Networks and Ranked Resolving Computations
19. Data Privacy Preservation with Optimization Technique for Effective
Multi-Cloud
Storage and Security
20. A Framework for Real-Time Prediction of Inappropriate Content
21. Statistical and Algorithmic Color Normalization and Stain Separation
Methods:
A Brief Study
22. Classification of Malware Infected API Call Sequences With Ensemble
Learning
23. DDoS Identification and Defense Procedure Using Deep Learning
Approaches For SDN
24. Comprehensive Autonomous Vehicle Optimal Routing With Dynamic
Heuristics
25. Fake Review Detection in Movie Recommendation System Using Hybrid
Method
26. Leprosy Screening Through Image Processing Methods
27. Real-Time V2V Communication for Collision Detection in VANETs Using
ESP Mesh Protocol: An IoT-Based Implementation for the Internet of Vehicles
28. Cyber Security Holes of JSON Web Token
29. Blockchain for Philanthropy
30. Predictive Analysis Using Big Data in the Treatment of Pulmonary
Diseases
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
32.Real-Time Over-The-Air-Programming (OTAP) for Wireless Sensor Network:
Implementation and Analysis Using SENSEnuts IoT Platform
33.Mobile-Based Cloud Detection Model for Skin Cancer Using Machine
Learning
34.Using the Greedy Algorithm to Minimize Bandwidth in P2P Networks Over
Video
Live Streaming
35.Human Brain Tumors and the Role of the Neural Network
36.Best Fit Topic Model Coherence Improvement for Subectivity Analysis of
Gestational
Diabetes Mellitus
37. A Decentralized Application-DAPP for Remote Voting System Based on
Blockchain
Technology
38.Diagnosis of Mild Cognitive Impairment Using Multimodal Imaging With
Machine
Learning Techniques
39.Surface Defect Detection for Wet Blue Leather Using Deep Learning
Approach
40.Attack Detection for Stock Trading Application Using Unsupervised
Machine Learning
41.Manipulation of 3D Objects in Handheld Augmented Reality for Campus
Virtual Visit
42.Locality Recommendation System Using Exploratory Data Analysis and
Affinity
Propagation
43.Real-Time Pothole Detection Using Deep Learning
44. Contact Less Virtually Controlling System Using Computer Vision
Techniques
45.Underwater Benthos Detection in Marine Benthic Zone Using Single Shot
MultiBox
Detector
46.Digital Human Creator Using Facial Expression and Voice
47.Enhancing the Security of Electronic Health Records Using Consortium
Blockchai
48. Deep Learning Model for Segmentation of Brain Tumor in MRI Images
49. Embedding Intelligence on Edge Computing for the Classification of IoT
Data
Using Machine Learning with Deep Autoencoder
50. Teens, Screens, and Mental Health- A Study on Digital Wellbeing
51. AI-Enabled Human and Machine Activity Monitoring in IIOT Systems
52. Application Development for Solving the Farmer Yield Problem Using
Cloud
Computing
53. AI Enabled E-Commerce Studio Website
54. Correlational and Sentimental Analysis Using LSTM to Forecast Stock
Price
55. A Novel Authentication System Based on CNN and IoT
56. Cryptocurrency Price Prediction Using LSTM and RNN Techniques
57. A Study on Cybernated Watermarking Approach on Image With Cryptographic
Encryption
58. A Survey on Implementation and Development of AES Cryptography
Algorithm
In Various Fields
59. A Survey on Alerting Using Honeyword System
60. A Study on IoT Based Road Safety and Traffic Management
61. Image-Based Steganography for Android: Concealing Secrets in Pixels
62. Various Methods of Injection Attacks
63. Password Protection and Recovery
64. Securing Wireless Communication in Cyber-Physical Systems and IoT
65. Prevention and Detection of Arp Spoofing - A Survey
66. A Survey on Enhancing Password Guessing and Dictionary List Creation
Techniques Using OSINT
67.Survey on Multi-Factor Authentication in Cloud Computing
68.Survey on Improvement in Efficiency of Steganography
69.A Hybrid Model for Guided Filtering-Based Edge Preservation of Fused
Multi-modal Medical Images
70.State of Art Survey on Memory Forensic Acquisition & Techniques
71.Product Review System using CNN & MERN Stack
72.Invading Into Android Using Metasploit
73.A Review of Privacy Protection Data Utility Mining Using Perturbation
74.Plant Disease Detection Using Stochastic Gradient Classifier With RBNN
75.Autonomous Assistance for Alzheimer's Patients
76.Developing an Internet of Things based soil moisture prediction
77.Mitigation of Threats in Cloud Using Ensemble Hybrid Machine Learning
78.Detection of Insects, Birds, and Wild Animals in Farming Land Using
Regional
Convolutional Neural Network
79.A Trifold Authentication Using Elliptical Cryptography in Cloud
Computing
K. Komathi and D. Kavitha
80.Binary Classification of Medical Chest X-Ray Using Gaussian Naive Bayes
in Machine Learning