Next-Gen Technologies in Computational Intelligence
eBook - ePub

Next-Gen Technologies in Computational Intelligence

Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)

  1. 564 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Next-Gen Technologies in Computational Intelligence

Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)

About this book

The Proceeding includes the research contribution from the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023) held on March 24th 2023 at Vels Institute of Science, Technology and Advanced Studies. NGCTA 2023 is the flagship conference of the Computer Society of India (Region 7). Computer Society of India (CSI) is the largest association of IT professionals in India. CSI is a non-profit organization established in 1965 and its members are committed to the advancement of theory and practice of Computer Engineering and Technology Systems. The Mission of CSI is to facilitate research, knowledge sharing, learning, and career enhancement for all categories of IT professionals, while simultaneously inspiring and nurturing new entrants into the industry and helping them to integrate into the IT community. At present, CSI has 76chapters across India, over 550 student branches with 1,00,000 plus members. It serves its members through technical events, seminars, workshops, conferences, publications & journals, research projects, competitions, special interest groups, awards & recognitions, etc. Various CSI chapters conduct Research Convention every year.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Next-Gen Technologies in Computational Intelligence by R. Anandan,M. Senthil Kumar,Biji C. L.,Vicente García Díaz,Souvik Pal in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Science General. We have over one million books available in our catalogue for you to explore.

Information

Table of contents

  1. Cover Page
  2. Half Title page
  3. Copyright Page
  4. Title Page
  5. Contents
  6. List of Figures
  7. List of Tables
  8. Preface
  9. Foreword
  10. Foreword
  11. Acknowledgments
  12. Short Bio of Editors
  13. 1. Blockchain-Based Identity Management System in the Digital Industry
  14. 2. An Improved Neural Network Classifier for Melanoma Skin Lesion Detection
  15. 3. Trust Aware Energy Efficient Model Using Evolutionary Computing in WSN
  16. 4. Introspection of CNN Primitive Features for Indian Sign Language Based Hand Gesture Recognition of Daily Used Words Using Machine Learning
  17. 5. Implementation of Quantum Image Processing Techniques Using the Chan-Vese Segmentation Algorithm to Convert Bits to Qubits to Enhance The Storage Capacity of the Pixels to Achieve Optimal Output to Identify the Paddy Leaf Diseases
  18. 6. Prediction of Bitcoin-Heist Ransomware Attack Using Machine Learning
  19. 7. A Review of Classification, Detection, and Prognosis of Coronary Artery Disease
  20. 8. Optimization of Packet Length using Exclusive SCCO Algorithm In WSN And IoT Based Networks
  21. 9. Novel Triphasic Architecture to Ascertain Malicious Exam-Takers
  22. 10. SDKL Hybrid ML Model to Predict Heart Disease Detection
  23. 11. Optimization of Energy Aware Clustering For Wireless Sensor Network
  24. 12. Next-Gen Technologies in Computational Intelligence [NGTC-2023] PID 62: Prediction of Corneal Ulcer Using Deep Convolutional Neural Network and Support Vector Machine Classification Model
  25. 13. Efficient PHOA Based Routing Network Protocol for IoT-Sem System
  26. 14. Enhancement of Security and Performance of Multimedia Data Transmission Over Fog
  27. 15. Improving the Energy Efficiency Based on Cooperative Routing Using Genetic Algorithm (GA) for Dynamic Clusters in Underwater Wireless Sensor Networks
  28. 16. Chest X—Ray Based Classification of Lungs Pathology Using VGG-16 Features and Double Ensemble Classifier
  29. 17. Machine Learning Algorithms To Predict The Brain Stroke
  30. 18. An Efficient Student Relationship Automation Using Multimodal Temporal Convolution Networks and Ranked Resolving Computations
  31. 19. Data Privacy Preservation with Optimization Technique for Effective Multi-Cloud Storage and Security
  32. 20. A Framework for Real-Time Prediction of Inappropriate Content
  33. 21. Statistical and Algorithmic Color Normalization and Stain Separation Methods: A Brief Study
  34. 22. Classification of Malware Infected API Call Sequences With Ensemble Learning
  35. 23. DDoS Identification and Defense Procedure Using Deep Learning Approaches For SDN
  36. 24. Comprehensive Autonomous Vehicle Optimal Routing With Dynamic Heuristics
  37. 25. Fake Review Detection in Movie Recommendation System Using Hybrid Method
  38. 26. Leprosy Screening Through Image Processing Methods
  39. 27. Real-Time V2V Communication for Collision Detection in VANETs Using ESP Mesh Protocol: An IoT-Based Implementation for the Internet of Vehicles
  40. 28. Cyber Security Holes of JSON Web Token
  41. 29. Blockchain for Philanthropy
  42. 30. Predictive Analysis Using Big Data in the Treatment of Pulmonary Diseases
  43. 31. An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise Complement for Data Security in Cloud
  44. 32. Real-Time Over-The-Air-Programming (OTAP) for Wireless Sensor Network: Implementation and Analysis Using SENSEnuts IoT Platform
  45. 33. Mobile-Based Cloud Detection Model for Skin Cancer Using Machine Learning
  46. 34. Using the Greedy Algorithm to Minimize Bandwidth in P2P Networks Over Video Live Streaming
  47. 35. Human Brain Tumors and the Role of the Neural Network
  48. 36. Best Fit Topic Model Coherence Improvement for Subectivity Analysis of Gestational Diabetes Mellitus
  49. 37. A Decentralized Application-DAPP for Remote Voting System Based on Blockchain Technology
  50. 38. Diagnosis of Mild Cognitive Impairment Using Multimodal Imaging With Machine Learning Techniques
  51. 39. Surface Defect Detection for Wet Blue Leather Using Deep Learning Approach
  52. 40. Attack Detection for Stock Trading Application Using Unsupervised Machine Learning
  53. 41. Manipulation of 3D Objects in Handheld Augmented Reality for Campus Virtual Visit
  54. 42. Locality Recommendation System Using Exploratory Data Analysis and Affinity Propagation
  55. 43. Real-Time Pothole Detection Using Deep Learning
  56. 44. Contact Less Virtually Controlling System Using Computer Vision Techniques
  57. 45. Underwater Benthos Detection in Marine Benthic Zone Using Single Shot MultiBox Detector
  58. 46. Digital Human Creator Using Facial Expression and Voice
  59. 47. Enhancing the Security of Electronic Health Records Using Consortium Blockchain
  60. 48. Deep Learning Model for Segmentation of Brain Tumor in MRI Images
  61. 49. Embedding Intelligence on Edge Computing for the Classification of IoT Data Using Machine Learning with Deep Autoencoder
  62. 50. Teens, Screens, and Mental Health- A Study on Digital Wellbeing
  63. 51. AI-Enabled Human and Machine Activity Monitoring in IIOT Systems
  64. 52. Application Development for Solving the Farmer Yield Problem Using Cloud Computing
  65. 53. AI Enabled E-Commerce Studio Website
  66. 54. Correlational and Sentimental Analysis Using LSTM to Forecast Stock Price
  67. 55. A Novel Authentication System Based on CNN and IoT
  68. 56. Cryptocurrency Price Prediction Using LSTM and RNN Techniques
  69. 57. A Study on Cybernated Watermarking Approach on Image With Cryptographic Encryption
  70. 58. A Survey on Implementation and Development of AES Cryptography Algorithm In Various Fields
  71. 59. A Survey on Alerting Using Honeyword System
  72. 60. A Study on IoT Based Road Safety and Traffic Management
  73. 61. Image-Based Steganography for Android: Concealing Secrets in Pixels
  74. 62. Various Methods of Injection Attacks
  75. 63. Password Protection and
  76. 64. Securing Wireless Communication in Cyber-Physical and IoT
  77. 65. Prevention and Detection of Arp Spoofing - A Survey
  78. 66. A Survey on Enhancing Password Guessing and Dictionary List Creation Techniques Using OSINT
  79. 67. Survey on Multi-Factor Authentication in Cloud Computing
  80. 68. Survey on Improvement in Efficiency of Steganography
  81. 69. A Hybrid Model for Guided Filtering-Based Edge Preservation of Fused Multi-modal Medical Images
  82. 70. State of Art Survey on Memory Forensic Acquisition & Techniques
  83. 71. Product Review System using CNN & MERN Stack
  84. 72. Invading Into Android Using Metasploit
  85. 73. A Review of Privacy Protection Data Utility Mining Using Perturbation
  86. 74. Plant Disease Detection Using Stochastic Gradient Classifier With RBNN
  87. 75. Autonomous Assistance for Alzheimer's Patients
  88. 76. Developing an Internet of Things based soil moisture prediction
  89. 77. Mitigation of Threats in Cloud Using Ensemble Hybrid Machine Learning
  90. 78. Detection of Insects, Birds, and Wild Animals in Farming Land Using Regional Convolutional Neural Network
  91. 79. A Trifold Authentication Using Elliptical Cryptography in Cloud Computing
  92. 80. Binary Classification of Medical Chest X-Ray Using Gaussian Naive Bayes in Machine Learning