Next-Gen Technologies in Computational Intelligence : Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023) (Conference Proceedings Series on Intelligent Systems, Data Engineering, and Optimiza

個数:

Next-Gen Technologies in Computational Intelligence : Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023) (Conference Proceedings Series on Intelligent Systems, Data Engineering, and Optimiza

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 564 p.
  • 言語 ENG
  • 商品コード 9781032553900
  • DDC分類 006.3

Full Description

The Proceeding includes the research contribution from the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023) held on March 24th 2023 at Vels Institute of Science, Technology and Advanced Studies. NGCTA 2023 is the flagship conference of the Computer Society of India (Region 7). Computer Society of India (CSI) is the largest association of IT professionals in India. CSI is a non-profit organization established in 1965 and its members are committed to the advancement of theory and practice of Computer Engineering and Technology Systems. The Mission of CSI is to facilitate research, knowledge sharing, learning, and career enhancement for all categories of IT professionals, while simultaneously inspiring and nurturing new entrants into the industry and helping them to integrate into the IT community. At present, CSI has 76chapters across India, over 550 student branches with 1,00,000 plus members. It serves its members through technical events, seminars, workshops, conferences, publications & journals, research projects, competitions, special interest groups, awards & recognitions, etc. Various CSI chapters conduct Research Convention every year.

Contents

1. Blockchain-Based Identity Management System in the Digital Industry

2. An Improved Neural Network Classifier for Melanoma Skin Lesion Detection

3. Trust Aware Energy Efficient Model Using Evolutionary Computing in WSN

4. Introspection of CNN Primitive Features for Indian Sign Language Based Hand Gesture
Recognition of Daily Used Words Using Machine Learning

5. Implementation of Quantum Image Processing Techniques Using the Chan-Vese
Segmentation Algorithm to Convert Bits to Qubits to Enhance The Storage Capacity
of the Pixels to Achieve Optimal Output to Identify the Paddy Leaf Diseases

6. Prediction of Bitcoin-Heist Ransomware Attack Using Machine Learning

7. A Review of Classification, Detection, and Prognosis of Coronary Artery Disease

8. Optimization of Packet Length using Exclusive SCCO Algorithm In WSN And IoT Based
Networks

9. Novel Triphasic Architecture to Ascertain Malicious Exam-Takers

10. SDKL Hybrid ML Model to Predict Heart Disease Detection

11. Optimization of Energy Aware Clustering For Wireless Sensor Network

12. Next-Gen Technologies in Computational Intelligence [NGTC-2023] PID 62

13. Efficient PHOA Based Routing Network Protocol
for IoT-Sem System

14. Enhancement of Security and Performance
of Multimedia Data Transmission Over Fog

15. Improving the Energy Efficiency Based on Cooperative Routing Using Genetic
Algorithm (GA) for Dynamic Clusters in Underwater Wireless Sensor Networks

16. Chest X-Ray Based Classification of Lungs Pathology Using VGG-16 Features
and Double Ensemble Classifier

17. Machine Learning Algorithms To Predict The Brain Stroke

18. An Efficient Student Relationship Automation Using Multimodal Temporal
Convolution Networks and Ranked Resolving Computations

19. Data Privacy Preservation with Optimization Technique for Effective Multi-Cloud
Storage and Security

20. A Framework for Real-Time Prediction of Inappropriate Content

21. Statistical and Algorithmic Color Normalization and Stain Separation Methods:
A Brief Study

22. Classification of Malware Infected API Call Sequences With Ensemble Learning

23. DDoS Identification and Defense Procedure Using Deep Learning Approaches For SDN

24. Comprehensive Autonomous Vehicle Optimal Routing With Dynamic Heuristics

25. Fake Review Detection in Movie Recommendation System Using Hybrid Method

26. Leprosy Screening Through Image Processing Methods

27. Real-Time V2V Communication for Collision Detection in VANETs Using
ESP Mesh Protocol: An IoT-Based Implementation for the Internet of Vehicles

28. Cyber Security Holes of JSON Web Token

29. Blockchain for Philanthropy

30. Predictive Analysis Using Big Data in the Treatment of Pulmonary Diseases

31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud

31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise
Complement for Data Security in Cloud

32.Real-Time Over-The-Air-Programming (OTAP) for Wireless Sensor Network:
Implementation and Analysis Using SENSEnuts IoT Platform

33.Mobile-Based Cloud Detection Model for Skin Cancer Using Machine Learning

34.Using the Greedy Algorithm to Minimize Bandwidth in P2P Networks Over Video
Live Streaming

35.Human Brain Tumors and the Role of the Neural Network

36.Best Fit Topic Model Coherence Improvement for Subectivity Analysis of Gestational
Diabetes Mellitus

37. A Decentralized Application-DAPP for Remote Voting System Based on Blockchain
Technology

38.Diagnosis of Mild Cognitive Impairment Using Multimodal Imaging With Machine
Learning Techniques

39.Surface Defect Detection for Wet Blue Leather Using Deep Learning Approach

40.Attack Detection for Stock Trading Application Using Unsupervised Machine Learning

41.Manipulation of 3D Objects in Handheld Augmented Reality for Campus Virtual Visit

42.Locality Recommendation System Using Exploratory Data Analysis and Affinity
Propagation

43.Real-Time Pothole Detection Using Deep Learning

44. Contact Less Virtually Controlling System Using Computer Vision Techniques

45.Underwater Benthos Detection in Marine Benthic Zone Using Single Shot MultiBox
Detector

46.Digital Human Creator Using Facial Expression and Voice

47.Enhancing the Security of Electronic Health Records Using Consortium Blockchai

48. Deep Learning Model for Segmentation of Brain Tumor in MRI Images

49. Embedding Intelligence on Edge Computing for the Classification of IoT Data
Using Machine Learning with Deep Autoencoder

50. Teens, Screens, and Mental Health- A Study on Digital Wellbeing

51. AI-Enabled Human and Machine Activity Monitoring in IIOT Systems

52. Application Development for Solving the Farmer Yield Problem Using Cloud
Computing

53. AI Enabled E-Commerce Studio Website

54. Correlational and Sentimental Analysis Using LSTM to Forecast Stock Price

55. A Novel Authentication System Based on CNN and IoT

56. Cryptocurrency Price Prediction Using LSTM and RNN Techniques

57. A Study on Cybernated Watermarking Approach on Image With Cryptographic Encryption

58. A Survey on Implementation and Development of AES Cryptography Algorithm
In Various Fields

59. A Survey on Alerting Using Honeyword System

60. A Study on IoT Based Road Safety and Traffic Management

61. Image-Based Steganography for Android: Concealing Secrets in Pixels

62. Various Methods of Injection Attacks

63. Password Protection and Recovery

64. Securing Wireless Communication in Cyber-Physical Systems and IoT

65. Prevention and Detection of Arp Spoofing - A Survey

66. A Survey on Enhancing Password Guessing and Dictionary List Creation
Techniques Using OSINT

67.Survey on Multi-Factor Authentication in Cloud Computing

68.Survey on Improvement in Efficiency of Steganography

69.A Hybrid Model for Guided Filtering-Based Edge Preservation of Fused
Multi-modal Medical Images

70.State of Art Survey on Memory Forensic Acquisition & Techniques

71.Product Review System using CNN & MERN Stack

72.Invading Into Android Using Metasploit

73.A Review of Privacy Protection Data Utility Mining Using Perturbation

74.Plant Disease Detection Using Stochastic Gradient Classifier With RBNN

75.Autonomous Assistance for Alzheimer's Patients

76.Developing an Internet of Things based soil moisture prediction

77.Mitigation of Threats in Cloud Using Ensemble Hybrid Machine Learning

78.Detection of Insects, Birds, and Wild Animals in Farming Land Using Regional
Convolutional Neural Network

79.A Trifold Authentication Using Elliptical Cryptography in Cloud Computing
K. Komathi and D. Kavitha

80.Binary Classification of Medical Chest X-Ray Using Gaussian Naive Bayes
in Machine Learning

最近チェックした商品