درحال بارگذاري...
جستجو
ایمیل دوست | |
نام شما | |
ایمیل شما | |
کد مقابل را وارد نمایید | |
این صفحه برای دوست شما با موفقیت ارسال شد.
4 مرتبه مشاهده شده
Inventive Communication and Computational Technologies: Proceedings of ICICCT 2020
Ranganathan, G.
- ISBN:9789811573446
- Main Entry: Ranganathan, G.
- Title:Inventive Communication and Computational Technologies: Proceedings of ICICCT 2020/ G. Ranganathan • Joy Chen • Álvaro Rocha.-
- Publisher:Gateway East, Singapore: Springer Nature Singapore Pte Ltd. 2021.
- Series:Lecture Notes in Networks and Systems/ Volume 145.
- Added Entry:Chen, Joy
- Added Entry:Rocha, Álvaro
-
محتواي کتاب
- مشاهده
- Preface
- About the Conference
- Contents
- Editors and Contributors
- Mathematical Modeling of the Data Processing Problems of Heat Experiments Based on Multiprocessor Computing Complexes
- 1 Introduction
- 2 Research Topic Relevance and Research Purpose
- 3 Mathematical Modeling Features of Thermal Problems
- 4 Mathematical Formulation of Research Problem
- 5 Construction Features of the Controlled MM for the Coefficient IHCP Problem
- 6 Brief Illustration of the Application Package
- 7 The Solution of the Test Coefficient IHCP Using Mathematical Modeling
- 8 Conclusion
- References
- Analysis of Image Processing Techniques to Segment the Target Animal in Non-uniformly Illuminated and Occluded Images
- 1 Introduction
- 2 Related Work
- 3 Proposed Work
- 3.1 Feature Detection Using Value Thresholding of Image
- 3.2 Orientation of the Subject Concerning the Camera
- 3.3 Extracting the ROI (Region of Interest)
- 3.4 Segmentation Using Region Adjacency Graphs
- 3.5 Interactive Foreground Extraction Using GrabCut Algorithm and DeepLab Model for Semantic Image Segmentation
- 4 Result Analysis
- 4.1 Dataset
- 4.2 Feature Detection Using Value Thresholding of Image
- 4.3 Orientation of the Subject Concerning the Camera
- 4.4 Extracting the ROI (Region of Interest)
- 4.5 Segmentation Using Region Adjacency Graphs
- 4.6 Interactive Foreground Extraction Using GrabCut Algorithm and DeepLab Model for Semantic Image Segmentation
- 5 Conclusion
- References
- Enhanced Speeded Up Robust Feature with Bag of Grapheme (ESURF-BoG) for Tamil Palm Leaf Character Recognition
- PlagoBot: A Confluence of Plagiarism and RPA
- MAGE: An Efficient Deployment of Python Flask Web Application to App Engine Flexible Using Google Cloud Platform
- Traffic Sign Recognition System (TSRS): SVM and Convolutional Neural Network
- A Comparative Study of Machine Learning Algorithms for Gas Leak Detection
- Agro Advisory System Using Big Data Analytics
- Big Data Technologies: A Comprehensive Survey
- Automatic Face Recognition and Finding Occurrence of Actors in Movies
- Signature Forgery Recognition Using CNN
- Image Sentiment Analysis Using Deep Learning
- Fake News Detection Using Passive-Aggressive Classifier
- Recurrent Neural Network-Based Character Recognition System for Tamil Palm Leaf Manuscript Using Stroke Zoning
- Microcontroller Based Smart Grinder for Automatic Batter Collection and Grinder Cleaning
- Cardiovascular Disease Classification Using Different Algorithms
- Empirical Test Design Strategies Using Natural Language Processing
- Sign Language to Text Conversion Using Deep Learning
- Classification of Banana Leaf Diseases Using Enhanced Gabor Feature Descriptor
- A Tool to Detect Plagiarism in Java Source Code
- Improved Skip Algorithm for Single Pattern Searching
- Classification of Plant Leaf Using Shape and Texture Features
- Value-Based Behavioral Analysis of Users Using Twitter
- Patient Health Monitoring and Diagnosis Using IoT and Machine Learning
- Handwritten Devanagari Character Classification Using CNN
- Performance Analysis of Machine Learning Algorithms in Credit Card Fraud Detection
- An Empirical Evaluation of Bitcoin Price Prediction Using Time Series Analysis and Roll Over
- 1 Introduction
- 2 Literature Survey
- 3 DataSet
- 4 Architecture and Roll Over Mechanism
- 5 Prediction of Error Rate by Rollover
- 6 Prediction Using Classical Regression Algorithms
- 7 Prediction Using Time Series Models
- 8 Performance Metrics for Prediction
- 9 Methodology and Execution
- 10 Results and Discussions
- 11 Conclusion
- References
- Ensure the Validity of Forensic Evidence by Using a Hash Function
- Enhanced Opinion Classification Using Nature-Inspired Meta-Heuristics for Policy Evaluation
- Automatic Distributed Gardening System Using Object Recognition and Visual Servoing
- Time and Energy-Efficient Load Balancing Algorithm Toward Green Cloud Computing
- Machine Learning Techniques and Cloud Computing to Estimate River Water Quality—Survey
- Low Transition Dual LFSR for Low Power Testing
- High Speed and Low Power Buffer Based Parallel Multiplier for Computer Arithmetic
- Classification of Power Transmission Line Faults Using an Ensemble Feature Extraction and Classifier Method
- A Retrospection on Selective Forwarding Attacks in WSN
- Automatic Railway Gate Control System Using GPS
- Secure Decentralized Public Key Infrastructure with Multi-signature in Blockchains
- Decentralized Privacy-Preserving Framework for Health Care Record-Keeping Over Hyperledger Fabric
- Decentralized Application for Two-Factor Authentication with Smart Contracts
- A Crypto Model for Confuse-Cum-Diffuse RGB Images: A Near Zero Correlation Approach
- An Efficient DFS Algorithm to Compute Least Longest Schedule Path of Software Projects
- Priority-Centered Virtual Groups and Mobile Sink for Wireless Sensor Networks
- A Novel Mechanism for Fraud Rank Detection in Social Networks
- Trusted Cooperative E-Learning Service Deployment Model in Multi-Cloud Environment
- Efficient Data Security Using Hybrid Cryptography on Cloud Computing
- Performance Comparison of MQTT and CoAP Protocols in Different Simulation Environments
- A Compact Vertex Fed Heptagon Monopole Antenna in a Wide Diamond Slot for UWB Applications
- Performance Investigation of Various SRAM Cells for IoT Based Wearable Biomedical Devices
- Comparative Study of Different Beamforming Techniques for 5G: A Review
- Vulnerability Analysis of FPGA Through Side-Channel Attacks in Cloud
- UBAPS: Inexact Unsigned Binary 5:2 Compressor Towards Power Efficient and High Speed for Three-Stage FIR Filter
- Utilizing a Raspberry Pi for Transmitting Image using Li-Fi Transceiver
- Penalty Based Backend Path Management
- Multi-band Microstrip Antenna for Wireless Local Area Network
- Power Optimization by Detection and Monitoring of Sensor Event in Smart Home
- Multi-keyword Search for Multiple Data Owners Over Encrypted CloudData
- Analytical Modeling of Real-World Social Network Parameters
- Performance Analysis of Speck Cipher Using Different Adder Architectures
- Evaluating Heterogeneous Ensembles with Boosting Meta-Learner
- Radial Basis Function Neural Network Based Speech Enhancement System Using SLANTLET Transform Through Hybrid Vector Wiener Filter
- Detection and Deactivation of Application Layer-Based DDoS Attack from Private Tor Network
- A Critical Survey on Fractal Wearable Antennas with Enhanced Gain and Bandwidth for WBAN
- PERAM: Ultra Power Efficient Array Multiplier Using Reversible Logic for High-Performance MAC
- Development of Social Media User Interface Portal for Maintaining Students Portfolio
- Spectrum Aware Dynamic Slots Computation in Wireless Cognitive Radio Sensor Networks
- High Gain Wideband Antennas for 5G Applications: A Review
- Things-to-Cloud (T2C): A Protocol-Based Nine-Layered Architecture
- Role of Internet of Things (IoT) in Protection of Soil and Plant Life from Acid Rain Disasters
- IoT-Based Wardrobe and Steel Closet Theft Detector
- Intrusion Detection and Prevention Systems: A Review
- 1 Introduction
- 2 Review of Paper ‘Using Machine Learning to Detect DoS Attacks in Wireless Sensor Networks’ [2]
- 3 Review of Paper ‘Detection and Prevention of Routing Attacks in the Internet of Things’ [10]
- 4 Review of Paper ‘a Proposed Wireless Intrusion Detection Prevention and Attack System’ [11]
- 5 Review of Paper ‘a Comprehensive Protection Method for Securing the Organization’s Network Against Cyberattacks’ [12]
- 6 Conclusion
- References
- A Novel Task Scheduling Model for Fog Computing
- A Bidirectional Power Converter with Shunt Active Filter for Electric Vehicle Grid Integration
- Formal Verification of IoT Protocol: In Design-Time and Run-Time Perspective
- Automatic Network Scanning System for Monitoring 4G and 5G Network Elements
- Comparative Study of Introducing Wavelength Converters in Pre-configured (P)-Cycle
- A Novel Approach to Reduce False-Negative Alarm Rate in Network-Based Intrusion Detection System Using Linear Discriminant Analysis
- A Low Cost IoT Enabled Device for Monitoring Agriculture Field and Smart Irrigation System
- Deep Network for Network Intrusion with Concept Drift
- Paillier Homomorphic Encryption with K-Means Clustering Algorithm (PHEKC) for Data Mining Security in Cloud
- PortaX Secure Automation System Using Iot—A Survey
- 1 Introduction
- 2 Methodologies
- 2.1 Global Positioning System for Object Tracking
- 2.2 Obstacle Avoidance Robot
- 2.3 A New Invention of Alarm Reminder Locking (ARL) Security System
- 2.4 Luggage Anti-Lost Wireless Security Card Structure
- 2.5 Wearable–Logo Antenna for GPS-GSM Based Tracking Systems
- 2.6 A Multipurpose Vehicle Tracking Based on ARM CORTEX-M3, STM32, HMC5883L, MPC-6050, GPS and GSM
- 2.7 GPS Based Android Application for Women Security
- 3 Proposed System
- 4 Conclusion
- References
- A Review Paper on the Elimination of Low-Order Harmonics in Multilevel Inverters Using Different Modulation Techniques
- LNA Architectures for ECG Analog Front End in CMOS Technology
- Community Detection Using Graphical Relationships
- Author Index