Next-Gen Technologies in Computational Intelligence
Home > Computing and Information Technology > Computer science > Artificial intelligence > Next-Gen Technologies in Computational Intelligence: Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)
Next-Gen Technologies in Computational Intelligence: Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)

Next-Gen Technologies in Computational Intelligence: Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)

|
     0     
5
4
3
2
1




International Edition


About the Book

The Proceeding includes the research contribution from the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023) held on March 24th 2023 at Vels Institute of Science, Technology and Advanced Studies. NGCTA 2023 is the flagship conference of the Computer Society of India (Region 7). Computer Society of India (CSI) is the largest association of IT professionals in India. CSI is a non-profit organization established in 1965 and its members are committed to the advancement of theory and practice of Computer Engineering and Technology Systems. The Mission of CSI is to facilitate research, knowledge sharing, learning, and career enhancement for all categories of IT professionals, while simultaneously inspiring and nurturing new entrants into the industry and helping them to integrate into the IT community. At present, CSI has 76chapters across India, over 550 student branches with 1,00,000 plus members. It serves its members through technical events, seminars, workshops, conferences, publications & journals, research projects, competitions, special interest groups, awards & recognitions, etc. Various CSI chapters conduct Research Convention every year.

Table of Contents:
1. Blockchain-Based Identity Management System in the Digital Industry 2. An Improved Neural Network Classifier for Melanoma Skin Lesion Detection 3. Trust Aware Energy Efficient Model Using Evolutionary Computing in WSN 4. Introspection of CNN Primitive Features for Indian Sign Language Based Hand Gesture Recognition of Daily Used Words Using Machine Learning 5. Implementation of Quantum Image Processing Techniques Using the Chan-Vese Segmentation Algorithm to Convert Bits to Qubits to Enhance The Storage Capacity of the Pixels to Achieve Optimal Output to Identify the Paddy Leaf Diseases 6. Prediction of Bitcoin-Heist Ransomware Attack Using Machine Learning 7. A Review of Classification, Detection, and Prognosis of Coronary Artery Disease 8. Optimization of Packet Length using Exclusive SCCO Algorithm In WSN And IoT Based Networks 9. Novel Triphasic Architecture to Ascertain Malicious Exam-Takers 10. SDKL Hybrid ML Model to Predict Heart Disease Detection 11. Optimization of Energy Aware Clustering For Wireless Sensor Network 12. Next-Gen Technologies in Computational Intelligence [NGTC-2023] PID 62 13. Efficient PHOA Based Routing Network Protocol for IoT-Sem System 14. Enhancement of Security and Performance of Multimedia Data Transmission Over Fog 15. Improving the Energy Efficiency Based on Cooperative Routing Using Genetic Algorithm (GA) for Dynamic Clusters in Underwater Wireless Sensor Networks 16. Chest X–Ray Based Classification of Lungs Pathology Using VGG-16 Features and Double Ensemble Classifier 17. Machine Learning Algorithms To Predict The Brain Stroke 18. An Efficient Student Relationship Automation Using Multimodal Temporal Convolution Networks and Ranked Resolving Computations 19. Data Privacy Preservation with Optimization Technique for Effective Multi-Cloud Storage and Security 20. A Framework for Real-Time Prediction of Inappropriate Content 21. Statistical and Algorithmic Color Normalization and Stain Separation Methods: A Brief Study 22. Classification of Malware Infected API Call Sequences With Ensemble Learning 23. DDoS Identification and Defense Procedure Using Deep Learning Approaches For SDN 24. Comprehensive Autonomous Vehicle Optimal Routing With Dynamic Heuristics 25. Fake Review Detection in Movie Recommendation System Using Hybrid Method 26. Leprosy Screening Through Image Processing Methods 27. Real-Time V2V Communication for Collision Detection in VANETs Using ESP Mesh Protocol: An IoT-Based Implementation for the Internet of Vehicles 28. Cyber Security Holes of JSON Web Token 29. Blockchain for Philanthropy 30. Predictive Analysis Using Big Data in the Treatment of Pulmonary Diseases 31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise Complement for Data Security in Cloud 31.An Improved and Secured Elliptic Curve Cryptography Using Matrix Bitwise Complement for Data Security in Cloud 32.Real-Time Over-The-Air-Programming (OTAP) for Wireless Sensor Network: Implementation and Analysis Using SENSEnuts IoT Platform 33.Mobile-Based Cloud Detection Model for Skin Cancer Using Machine Learning 34.Using the Greedy Algorithm to Minimize Bandwidth in P2P Networks Over Video Live Streaming 35.Human Brain Tumors and the Role of the Neural Network 36.Best Fit Topic Model Coherence Improvement for Subectivity Analysis of Gestational Diabetes Mellitus 37. A Decentralized Application-DAPP for Remote Voting System Based on Blockchain Technology 38.Diagnosis of Mild Cognitive Impairment Using Multimodal Imaging With Machine Learning Techniques 39.Surface Defect Detection for Wet Blue Leather Using Deep Learning Approach 40.Attack Detection for Stock Trading Application Using Unsupervised Machine Learning 41.Manipulation of 3D Objects in Handheld Augmented Reality for Campus Virtual Visit 42.Locality Recommendation System Using Exploratory Data Analysis and Affinity Propagation 43.Real-Time Pothole Detection Using Deep Learning 44. Contact Less Virtually Controlling System Using Computer Vision Techniques 45.Underwater Benthos Detection in Marine Benthic Zone Using Single Shot MultiBox Detector 46.Digital Human Creator Using Facial Expression and Voice 47.Enhancing the Security of Electronic Health Records Using Consortium Blockchai 48. Deep Learning Model for Segmentation of Brain Tumor in MRI Images 49. Embedding Intelligence on Edge Computing for the Classification of IoT Data Using Machine Learning with Deep Autoencoder 50. Teens, Screens, and Mental Health- A Study on Digital Wellbeing 51. AI-Enabled Human and Machine Activity Monitoring in IIOT Systems 52. Application Development for Solving the Farmer Yield Problem Using Cloud Computing 53. AI Enabled E-Commerce Studio Website 54. Correlational and Sentimental Analysis Using LSTM to Forecast Stock Price 55. A Novel Authentication System Based on CNN and IoT 56. Cryptocurrency Price Prediction Using LSTM and RNN Techniques 57. A Study on Cybernated Watermarking Approach on Image With Cryptographic Encryption 58. A Survey on Implementation and Development of AES Cryptography Algorithm In Various Fields 59. A Survey on Alerting Using Honeyword System 60. A Study on IoT Based Road Safety and Traffic Management 61. Image-Based Steganography for Android: Concealing Secrets in Pixels 62. Various Methods of Injection Attacks 63. Password Protection and Recovery 64. Securing Wireless Communication in Cyber-Physical Systems and IoT 65. Prevention and Detection of Arp Spoofing – A Survey 66. A Survey on Enhancing Password Guessing and Dictionary List Creation Techniques Using OSINT 67.Survey on Multi-Factor Authentication in Cloud Computing 68.Survey on Improvement in Efficiency of Steganography 69.A Hybrid Model for Guided Filtering-Based Edge Preservation of Fused Multi-modal Medical Images 70.State of Art Survey on Memory Forensic Acquisition & Techniques 71.Product Review System using CNN & MERN Stack 72.Invading Into Android Using Metasploit 73.A Review of Privacy Protection Data Utility Mining Using Perturbation 74.Plant Disease Detection Using Stochastic Gradient Classifier With RBNN 75.Autonomous Assistance for Alzheimer’s Patients 76.Developing an Internet of Things based soil moisture prediction 77.Mitigation of Threats in Cloud Using Ensemble Hybrid Machine Learning 78.Detection of Insects, Birds, and Wild Animals in Farming Land Using Regional Convolutional Neural Network 79.A Trifold Authentication Using Elliptical Cryptography in Cloud Computing K. Komathi and D. Kavitha 80.Binary Classification of Medical Chest X-Ray Using Gaussian Naive Bayes in Machine Learning


Best Sellers


Product Details
  • ISBN-13: 9781032553900
  • Publisher: Taylor & Francis Ltd
  • Publisher Imprint: CRC Press
  • Height: 297 mm
  • No of Pages: 564
  • Weight: 1391 gr
  • ISBN-10: 1032553901
  • Publisher Date: 07 Jun 2024
  • Binding: Paperback
  • Language: English
  • Sub Title: Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)
  • Width: 210 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Next-Gen Technologies in Computational Intelligence: Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)
Taylor & Francis Ltd -
Next-Gen Technologies in Computational Intelligence: Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Next-Gen Technologies in Computational Intelligence: Proceeding of the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!