Suggested Topics within your search.
Suggested Topics within your search.
- Machine learning
- Artificial intelligence 93
- Computational intelligence 63
- Internet of things 43
- Data processing 24
- Application software 21
- Big data 17
- Computer networks 17
- Computer vision 16
- Data mining 16
- Image processing 13
- Digital techniques 12
- Machine Learning 11
- Computer engineering 10
- Industrial applications 10
- Medical applications 10
- Embedded computer systems 9
- Telecommunication 9
- Blockchains (Databases) 8
- Database management 8
- Optical data processing 8
- Artificial Intelligence 7
- Computers 7
- Engineering—Data processing 7
- Security measures 7
- Artificial intelligence—Data processing 6
- Computer organization 6
- Computer security 6
- Deep learning (Machine learning) 6
- Education—Data processing 6
-
1
-
2
-
3
-
4
-
5
-
6
Intelligent System Design Proceedings of Intelligent System Design: INDIA 2019 /...
Published 2021Full text (Wentworth users only)
Electronic eBook -
7
-
8
-
9
-
10
-
11
-
12
-
13
Accelerating Discoveries in Data Science and Artificial Intelligence II ICDSAI 2023, LIET Vizianagaram, India, April 24–25 /...
Published 2024Table of Contents: “…Mood-Based Music Recommendation System (Sravanthi) -- Internet Employment Detection Scam Via Fake Jobs With Random Forest Classifier (Madhavi) -- Sentiment Analysis and Age Factor Influences on Brand usage of Personal Care Products: A Study with Reference to Visakhapatnam City, in India (Tuduku) -- Construction of Pythagorean and Reciprocal Pythagorean n-tuples (Srinivas) -- Statistical Approaches for Forecasting Air pollution: A review (Rao) -- Computer-Assisted Statistical Analysis of L-Methionine Protonation Equilibria in The Anionic, Cationic, and Neutral Micellar Systems (R Neeraja) -- A Study on Benefits of Continuous Integration and Continuous Delivery in Software Engineering (Reddy) -- A Review on Mango Fruit Disease Detection and pesticide Suggestion (Reddy) -- Multikeyword Ranked Search With Privacy Protection Over Encrypted Cloud Data (Saranya) -- BERT based Similarity Measures Oriented Approach for Style Change Detection (Mohan) -- Computer Vision Based Malpractice Detection System (AnnanNaidu) -- The evolution of Influence maximization studies: A scientometric analysis (M Venunath) -- A Survey on Evolving Optimal Cryptographic Techniques in Cloud Computing Data Forensics (Pinnamaraju) -- DR-HIPI: Performance evaluation of retinal images for DR lesion segmentation using the HIPI architecture (Devi) -- Adaptability of Robotic Process Automation and Capabilities of Human Automation (Midde) -- A brief Review on Impact of Digital Trading on Conventional marketing Strategies after covid-19 effect on E-Commerce (Tuduku) -- Fall Support Assistant Application (Sivaramakrishnan) -- A Systematic VANET traffic congestion by eliminating recursion using Intervention Linear Minimum Spanning Tree (ILMST) for Traffic Management System (Sahu) -- Realtime Object Cloning in Augmented Reality using BASnet and Screenpoint Algorithms (Adimalla) -- Maximization Of Energy-Efficiency For Optimal Spectral Efficiency In Massive Mimo System (Borugadda) -- OptimizationOf Spectral Efficiency Using Precoding Techniques In Multi Cell Massive Mimo (Borugadda) -- The effect of prerequisite engineering processes on the production of risk factors in software development (Akula) -- Comparison of Channel Equalization Schemes for MIMO-OFDM (Sujatha) -- QoS Enhancement through Link-Quality Prediction using Signal-To-Noise Ratio in MANET (Viswanath) -- Credential Manager using Cloud Computing (Shaik) -- Accident Detection, Alert and Tracking System Based on IoT (Sivaramakrishnan) -- Real time storage in cloud and access control policies using blockchain (Pranitha) -- Artificial Intelligence and Internet of Things Applications in Smart Grid Security: A survey (Inala) -- An Optimized Mechanism to Improve the Performance of Proxy Mobile Ipv6 Using Augmented Open-Flow Technique (Indumathi) -- A Secure way to Message based on Internet Protocol on RSA algorithm using DNA encoding with Laplace Transform Computing (Nagalakshmi) -- An Integrated Information Security Risk Assessment (IISRA) Approach (Dixit) -- Congestion Control and Avoidance Scheme using Mobile Nodes in Wireless Sensor Network (Suma).-. …”
Full text (Wentworth users only)
Electronic eBook -
14
-
15
-
16
-
17
-
18
-
19
-
20