Description |
1 online resource (xxii, 487 pages) : illustrations (chiefly color) |
Series |
Lecture notes in networks and systems ; volume 467 |
|
Lecture notes in networks and systems ; v. 467.
|
Contents |
A Novel Meta-classifier Framework Approach for Land Use Land Cover Classification2 -- Survey of Surveillance of Suspicious Behavior from CCTV Video recording -- Security Attacks, Requirements and Simulative Analysis of QoS in WSN -- Breast Cancer Prediction Using Greedy Optimization and Enlarge C4.5 -- Meta-Analysis of Nature Inspired Hybrid Cuckoo Algorithm -- Investigating factors influencing retention in MOOCs -- Green Energy Powered by Smart Grids: A Business Model for Long Term Sustainability -- Cloud based "Energy Aware" routing protocol for predetection and its prevention of Fault Tolerance -- Unmasking the Malware using Android Debug Bridge -- Blockchain and Competitive Business Performance -- Cloud network communication performance Improvement using a Stochastic Bandwidth Allocation and Swam Optimization algorithm -- Comparison of Read Stability and Write Ability of Low Power Nanometric SRAMs -- Forecasting Mental Disorders through Aspect Identification from Social Media Posts -- Topic Popularity Prediction Using Similarity Graph on Twitter -- Bolster Shark Smell Optimization Routing Protocol (BSSORP) For Routing in Underwater Wireless Sensor Networks -- Intrusion Detection System based on Feature Reduced Back Propagation Neural Network using Ant Colony Optimization -- Machine Learning and Sensor Roles for Improving Livestock Farming using Big Data -- Sentimental Analysis on E-learning Videos for Learners Opinion using Machine Learning Methodology - Support Vector Machine -- TLRNN: Two Level RNN Based Personalized Recommendation in Tourism Domain -- RTHMs Real Time Health Monitoring System -- Deployment of Cellular Application Using Flutter for Covid-19 Visualization -- Enhancing Agricultural System And Agro Food Transportation Management Using IoT -- Dynamic and Unified Approach to Distinguish Malicious URL using LSTM -- Deep Learning for Performance Enhancement Robust Underwater Acoustic Communication Network -- Modeling and Control of FOPDT Modeled Processes A REVIEW -- Early Detection of Autistic children using Wrapper-based Feature Selection Technique -- Medical Insurance Cost Prediction Using Machine Learning Algorithms -- Scope and Challenges of Artificial Intelligence in Health Care of India -- Fs-Set Functions-Images -- Offline Handwritten Signature Verification Using Decision Tree -- Iot In Healthcare In Times Of Pandemic (COVID-19) -- A Novel Approaches for High Security in Finger Vein Based Authentication System in Military Forces -- Bow Type Active Frequency Selective Surface for Satellite Communication -- Productive Study Routine Generator -- Semantic Web Undertaking Effort Estimation Utilizing CoComo II SVM and Neural Network -- Design and Method of 16.24 GHz Microstrip Network Antenna using Underwater Wireless Communication Algorithm -- IoT Security using Machine Learning Techniques -- Performance Analysis of Sign Language Recognition System using Hybrid Feature Descriptor -- Research trends and applications of artificial intelligence in 3D printing-A Scientometric analysis -- Bibliometric Study and Visualisation of Research Trends in Hybrid Blockchain Technology -- Detection of Unauthorized Access Points based on Machine Learning Techniques -- GAIT Recognition Technique using Gait Energy Decomposition method -- Survey of Comparative Analysis of Different Routing Protocols in MANETs: QoS -- Comparative Analysis of Energy Efficiency of Logic Gates on FPGAs -- To combat the menace of Forest Fires at Nainital and Almora District in Uttarakhand using Internet of Things -- Frequency control using captive generation and demand response -- load frequency control in multiarea power system using TID control scheme -- Implementing Internet of Things driven Water Tank Controlling -- Utilizing Technology and Management of Fog Computing |
Summary |
The book is a collection of best selected research papers presented at International Conference on Cyber-Technologies and Emerging Sciences (ICCTES 2021), organized by Graphic Era Hill University, Bhimtal Campus, Uttarakhand, India, during 17 18 December 2021. The book covers state-of-the-art applications, innovative methods, and analyze the unexplored and unsolved challenges to establish the relative solutions to advance the existing applications and theories of Cyber-Technologies and Emerging Sciences |
Notes |
International conference proceedings |
|
Conference held in hybrid format |
|
Includes author index |
|
Online resource; title from PDF title page (SpringerLink, viewed September 12, 2022) |
Subject |
Artificial intelligence -- Congresses
|
|
Computer security -- Congresses
|
|
Artificial intelligence
|
|
Computer security
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Maurya, Sudhanshu, editor
|
|
Peddoju, S. K., 1973- editor.
|
|
Ahmad, Badlishah, editor
|
|
Chihi, Ines, editor
|
ISBN |
9789811925382 |
|
9811925380 |
|