Tripathi).Pages 367-379ĭesign of a Drag and Touch Multilingual Universal CAPTCHA Challenge (Abdul Rouf Shah, M. Wideband Band-stop Filter for C-Band and S-Band Applications Using Finite Integration in Time-Domain Technique (Ajay Gupta, Anil Rajput, Monika Chauhan, Biswajeet Mukherjee).Pages 359-366Ī Two-Step Technique for Effective Scheduling in Cloud–Fog Computing Paradigm (Ashish Mohan Yadav, S. Smart Environmental Monitoring Based on IoT: Architecture, Issues, and Challenges (Meenakshi Srivastava, Rakesh Kumar).Pages 349-358 Nair, Deepa Gupta, Bhagavatula Indira Devi).Pages 331-348 Rajalakshmi).Pages 293-306Ī Perspective of Missing Value Imputation Approaches (Wajeeha Rashid, Manoj Kumar Gupta).Pages 307-315Īdvanced Deadline-Sensitive Scheduling Approaches in Cloud Computing (Duraksha Ali, Manoj Kumar Gupta).Pages 317-329Ī Survey of Text Mining Approaches, Techniques, and Tools on Discharge Summaries (Priyanka C. Thakare).Pages 251-263Ī Survey on Internet of Things (IoT): Layer-Specific, Domain-Specific and Industry-Defined Architectures (Harmanjot Kaur, Rohit Kumar).Pages 265-275Ī Survey on Social Networking Using Concept of Evolutionary Algorithms and Big Data Analysis (Rutuja Nawghare, Sarsij Tripathi, Manu Vardhan).Pages 277-292Ī Comparative Study of Deployment Tools from IoT Perspective (Raghav Maheshwari, K. Trivedi, Avadhesh Kumar Gupta, Paritosh Tripathi).Pages 237-247Įnhancement in Algorithmic Design for Scalability Measurement of Web Application (Pankaj N. Tariq Banday).Pages 219-235Ĭurrent Trends in Cryptography, Steganography, and Metamorphic Cryptography: A Survey (Ranjana Joshi, Munesh C. ![]() ![]() Secure E-mail Communications Through Cryptographic Techniques-A Study (Shafiya Afzal Sheikh, M. Identification of Windows-Based Malware by Dynamic Analysis Using Machine Learning Algorithm (Areeba Irshad, Malay Kishore Dutta).Pages 207-218 Host-Server-Based Malware Detection System for Android Platforms Using Machine Learning (Anam Fatima, Saurabh Kumar, Malay Kishore Dutta).Pages 195-205 Jaya Krishna).Pages 173-183ĭetection of Advanced Linux Malware Using Machine Learning (Nitesh Kumar, Anand Handa).Pages 185-194 Security Enhancement Using Modified AES and Diffie–Hellman Key Exchange (Y. Gupta).Pages 149-159ĭPLOOP: Detection and Prevention of Loopholes in Web Application Security ( Monika, Vijay Tiwari).Pages 161-172 Real-Time Detection of Fake Account in Twitter Using Machine-Learning Approach (Somya Ranjan Sahoo, B. The Threat Detection Framework for Securing Semantic Web Services Based on XACML (Nagendra Kumar Singh, Sandeep Kumar Nayak).Pages 139-147 Whale Neuro-fuzzy System for Intrusion Detection in Wireless Sensor Network (Rakesh Sharma, Vijay Anant Athavale, Sumit Mittal).Pages 123-135 Mining Public Opinion on Plastic Ban in India (Nandini Tomar, Ritesh Srivastava, Veena Mittal).Pages 109-121 ![]() Darji).Pages 91-100ĮEPMS: Energy Efficient Path Planning for Mobile Sink in Wireless Sensor Networks: A Genetic Algorithm-Based Approach (Akhilesh Kumar Srivastava, Amit Sinha, Rahul Mishra, Suneet Kumar Gupta).Pages 101-108 Performance Analysis of ML Algorithms on Speech Emotion Recognition (Pradeep Tiwari, Anand D. Vamsi Krishna, Tushar Tyagi).Pages 59-71Ī Matrix-Based Approach for Evaluation of Vocal Renditions in Hindustani Classical Music (Kunjal Gajjar, Mukesh Patel).Pages 73-90 Improved Whale Optimization Algorithm for Numerical Optimization (A. Indian Language Identification for Short Text (Sreebha Bhaskaran, Geetika Paul, Deepa Gupta, J. Bedi).Pages 29-37Ĭontroller Optimization for Boiler Turbine Using Simulated Annealing and Genetic Algorithm (Sandeep Kumar Sunori, Pradeep Kumar Juneja, Govind Singh Jethi, Abhijit Bhakuni, Mayank Chaturvedi).Pages 39-45 Prediction of Compressive Strength of Ultra-High-Performance Concrete Using Machine Learning Algorithms-SFS and ANN (Deepak Choudhary, Jaishanker Keshari, Imran Ahmed Khan).Pages 17-27Ĭlassification of Plant Based on Leaf Images (Mayank Arya Chandra, S. Influence of Wind Speed on Solar PV Plant Power Production-Prediction Model Using Decision-Based Artificial Neural Network (Roshan Mohanty, Paresh G.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |