- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
The Proceeding includes the research contribution from the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023) held on March 24th 2023 at Vels Institute of Science, Technology and Advanced Studies. NGCTA 2023 is the flagship conference of the Computer Society of India (Region 7). Computer Society of India (CSI) is the largest association of IT professionals in India. CSI is a non-profit organization established in 1965 and its members are committed to the advancement of theory and practice of Computer Engineering and Technology Systems. The Mission of CSI is to facilitate research, knowledge sharing, learning, and career enhancement for all categories of IT professionals, while simultaneously inspiring and nurturing new entrants into the industry and helping them to integrate into the IT community. At present, CSI has 76chapters across India, over 550 student branches with 1,00,000 plus members. It serves its members through technical events, seminars, workshops, conferences, publications & journals, research projects, competitions, special interest groups, awards & recognitions, etc. Various CSI chapters conduct Research Convention every year.
Contents
1. Blockchain-Based Identity Management System in the Digital Industry
2. An Improved Neural Network Classifier for Melanoma Skin Lesion Detection
3. Trust Aware Energy Efficient Model Using Evolutionary Computing in WSN
4. Introspection of CNN Primitive Features for Indian Sign Language Based Hand Gesture
Recognition of Daily Used Words Using Machine Learning
5. Implementation of Quantum Image Processing Techniques Using the Chan-Vese
Segmentation Algorithm to Convert Bits to Qubits to Enhance The Storage Capacity
of the Pixels to Achieve Optimal Output to Identify the Paddy Leaf Diseases
6. Prediction of Bitcoin-Heist Ransomware Attack Using Machine Learning
7. A Review of Classification, Detection, and Prognosis of Coronary Artery Disease
8. Optimization of Packet Length using Exclusive SCCO Algorithm In WSN And IoT Based
Networks
9. Novel Triphasic Architecture to Ascertain Malicious Exam-Takers
10. SDKL Hybrid ML Model to Predict Heart Disease Detection
11. Optimization of Energy Aware Clustering For Wireless Sensor Network
12. Next-Gen Technologies in Computational Intelligence [NGTC-2023] PID 62
13. Efficient PHOA Based Routing Network Protocol
for IoT-Sem System
14. Enhancement of Security and Performance
of Multimedia Data Transmission Over Fog
15. Improving the Energy Efficiency Based on Cooperative Routing Using Genetic
Algorithm (GA) for Dynamic Clusters in Underwater Wireless Sensor Networks
16. Chest X-Ray Based Classification of Lungs Pathology Using VGG-16 Features
and Double Ensemble Classifier
17. Machine Learning Algorithms To Predict The Brain Stroke
18. An Efficient Student Relationship Automation Using Multimodal Temporal
Convolution Networks and Ranked Resolving Computations
19. Data Privacy Preservation with Optimization Technique for Effective Multi-Cloud
Storage and Security
20. A Framework for Real-Time Prediction of Inappropriate Content
21. Statistical and Algorithmic Color Normalization and Stain Separation Methods:
A Brief Study
22. Classification of Malware Infected API Call Sequences With Ensemble Learning
23. DDoS Identification and Defense Procedure Using Deep Learning Approaches For SDN
24. Comprehensive Autonomous Vehicle Optimal Routing With Dynamic Heuristics
25. Fake Review Detection in Movie Recommendation System Using Hybrid Method
26. Leprosy Screening Through Image Processing Methods
27. Real-Time V2V Communication for Collision Detection in VANETs Using
ESP Mesh Protocol: An IoT-Based Implementation for the Internet of Vehicles
28. Cyber Security Holes of JSON Web Token
29. Blockchain for Philanthropy
30. Predictive Analysis Using Big Data in the Treatment of Pulmonary Diseases
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud
32.Real-Time Over-The-Air-Programming (OTAP) for Wireless Sensor Network:
Implementation and Analysis Using SENSEnuts IoT Platform
33.Mobile-Based Cloud Detection Model for Skin Cancer Using Machine Learning
34.Using the Greedy Algorithm to Minimize Bandwidth in P2P Networks Over Video
Live Streaming
35.Human Brain Tumors and the Role of the Neural Network
36.Best Fit Topic Model Coherence Improvement for Subectivity Analysis of Gestational
Diabetes Mellitus
37. A Decentralized Application-DAPP for Remote Voting System Based on Blockchain
Technology
38.Diagnosis of Mild Cognitive Impairment Using Multimodal Imaging With Machine
Learning Techniques
39.Surface Defect Detection for Wet Blue Leather Using Deep Learning Approach
40.Attack Detection for Stock Trading Application Using Unsupervised Machine Learning
41.Manipulation of 3D Objects in Handheld Augmented Reality for Campus Virtual Visit
42.Locality Recommendation System Using Exploratory Data Analysis and Affinity
Propagation
43.Real-Time Pothole Detection Using Deep Learning
44. Contact Less Virtually Controlling System Using Computer Vision Techniques
45.Underwater Benthos Detection in Marine Benthic Zone Using Single Shot MultiBox
Detector
46.Digital Human Creator Using Facial Expression and Voice
47.Enhancing the Security of Electronic Health Records Using Consortium Blockchai
48. Deep Learning Model for Segmentation of Brain Tumor in MRI Images
49. Embedding Intelligence on Edge Computing for the Classification of IoT Data
Using Machine Learning with Deep Autoencoder
50. Teens, Screens, and Mental Health- A Study on Digital Wellbeing
51. AI-Enabled Human and Machine Activity Monitoring in IIOT Systems
52. Application Development for Solving the Farmer Yield Problem Using Cloud
Computing
53. AI Enabled E-Commerce Studio Website
54. Correlational and Sentimental Analysis Using LSTM to Forecast Stock Price
55. A Novel Authentication System Based on CNN and IoT
56. Cryptocurrency Price Prediction Using LSTM and RNN Techniques
57. A Study on Cybernated Watermarking Approach on Image With Cryptographic Encryption
58. A Survey on Implementation and Development of AES Cryptography Algorithm
In Various Fields
59. A Survey on Alerting Using Honeyword System
60. A Study on IoT Based Road Safety and Traffic Management
61. Image-Based Steganography for Android: Concealing Secrets in Pixels
62. Various Methods of Injection Attacks
63. Password Protection and Recovery
64. Securing Wireless Communication in Cyber-Physical Systems and IoT
65. Prevention and Detection of Arp Spoofing - A Survey
66. A Survey on Enhancing Password Guessing and Dictionary List Creation
Techniques Using OSINT
67.Survey on Multi-Factor Authentication in Cloud Computing
68.Survey on Improvement in Efficiency of Steganography
69.A Hybrid Model for Guided Filtering-Based Edge Preservation of Fused
Multi-modal Medical Images
70.State of Art Survey on Memory Forensic Acquisition & Techniques
71.Product Review System using CNN & MERN Stack
72.Invading Into Android Using Metasploit
73.A Review of Privacy Protection Data Utility Mining Using Perturbation
74.Plant Disease Detection Using Stochastic Gradient Classifier With RBNN
75.Autonomous Assistance for Alzheimer's Patients
76.Developing an Internet of Things based soil moisture prediction
77.Mitigation of Threats in Cloud Using Ensemble Hybrid Machine Learning
78.Detection of Insects, Birds, and Wild Animals in Farming Land Using Regional
Convolutional Neural Network
79.A Trifold Authentication Using Elliptical Cryptography in Cloud Computing
K. Komathi and D. Kavitha
80.Binary Classification of Medical Chest X-Ray Using Gaussian Naive Bayes
in Machine Learning