Buch, Englisch, Band 403, 524 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 969 g
ICDSAI 2022, IIT Patna, India, April 23 - 24
Buch, Englisch, Band 403, 524 Seiten, Format (B × H): 160 mm x 241 mm, Gewicht: 969 g
Reihe: Springer Proceedings in Mathematics & Statistics
ISBN: 978-3-031-16177-3
Verlag: Springer International Publishing
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz
- Technische Wissenschaften Elektronik | Nachrichtentechnik Nachrichten- und Kommunikationstechnik Signalverarbeitung
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken
- Mathematik | Informatik Mathematik Numerik und Wissenschaftliches Rechnen
Weitere Infos & Material
Sky Detection in Outdoor Spaces (S. Rajguru).- Defining, Measuring and Utilizing Student’s Learning in a course (T. Garg).- Holistic Features and Deep Guided Depth Induced Mutual Attention based Complex Salient Object Detection (R. Singh).- Machine Learning based Decision Support System for Resilient Supplier Selection (A. Dixit).- An Adaptive Task Offloading Framework for Mobile Edge Computing Environment: Towards Achieving Seamless Energy-Efficient Processing (M. Rasool).- Road Surface Classification and Obstacle Detection for Visually Impaired People (S. Shilaskar).- A Survey on Semantic Segmentation Models for Underwater Images (S. K. Anand).- An Interactive dashboard for Intrusion Detection in Internet of Things (M. Vishwakarma).- An Analous Review of the Challenges and Endeavor in Suspense Story Generation Technique (V. Kowsalya).- Friend recommendation using transfer learning in the autoencoder (A. Karande).- Analysis on the Efficacy of ANN on Small Imbalanced Datasets(B. Shah).- Lightweight and Homomorphic Security Protocols for IoT (I. Singh).- Tool based approach on Digital Vulnerability Management Hub using The-Hive Platform (S. R. Babu).- Performance Analyzer for Blue Chip Companies (I. Badole).- Strengthening Deep Learning Based Malware Detection Models Against Adversarial Attacks (R. Pai).- Video-based Micro Expressions Recognition using Deep Learning and Transfer Learning (S. Kapadia).- Trustworthiness of COVID-19 News and Guidelines (S. Singh).- Detection of moving object using modified fuzzy C- means clustering from the complex and Non-Stationary background scenes (R. Sangle).- Deterrence Pointer for Distributed Denial of Service (DDoS) attacks by utilizing Watchdog Timer and Hybrid Routing Protocol (S. J. Kumar).- Modelling Logistic Regression and Neural Network for Stock Selection With BSE 500 - A Comparative Study (S. Simon).- Landslide Detection with Ensemble-of-Deep Learning-Classifiers trained with Optimal Features(A. Kumar).- A Survey Paper on Text Analytics Methods for Classifying Tweets (C. Agrawal).- A Survey on Threat Intelligence Techniques for Constructing, Detecting, and Reacting to Advanced Intrusion Campaigns (A. Anand).- Generalizing a secure framework for Domain Transfer Network for Face antispoofing (A. Rana).- Survey on Game Theory Based Security Framework for IoT (P. Joshi).- Intrusion Detection for IoT (S. L. Poojitha).- Human-in-the-loop control and security for intelligent Cyber-Physical Systems (CPS) and IoT (S. Sundarrajan).- Survey: Neural Network authentication and tampering detection (P. Ashwin).- Misinformation Detection through Authentication of Content Creators (K. K. Sudhama).- End-to-end network slicing for 5G and beyond communications (R. K. Gupta).- Transparency in Content and Source Moderation (A. R. Chandrassery).- A New Chaotic-Based Analysis of Data Encryption and Decryption (Md M. Rahman).- Trust and Identity Management in IOT (A. Tony).- Plant Pests Detection a Deep Learning Approach (N. More).- S.A.R.A (Smart AI Refrigerator Assistant) (S. Kirkire).- A Location Based Cryptographic Suite For Underwater Acoustic Networks (V. S. Katasani).