Proceedings of Third International Conference on Computing, Communications, and Cybes-Security 1st edition by Pradeep Kumar Singh, Sławomir T. Wierzchoń, Sudeep Tanwar, Joel J. P. C. Rodrigues, Maria Ganzha – Ebook PDF Instant Download/DeliveryISBN: 9819747996, 9789819747993
Full download Proceedings of Third International Conference on Computing, Communications, and Cybes-Security 1st edition after payment.
Product details:
ISBN-10 : 9819747996
ISBN-13 : 9789819747993
Author : Pradeep Kumar Singh, Sławomir T. Wierzchoń, Sudeep Tanwar, Joel J. P. C. Rodrigues, Maria Ganzha
This book gathers selected high-quality research papers presented at the 3rd International Conference on Advanced Computing and Applications (ICACA 2024), held virtually during 23–24 February 2024. The topics covered are advanced communication technologies, IoT-based systems and applications, network security and reliability, virtualization technologies, compressed sensors and multimedia applications, signal image and video processing, machine learning, pattern recognitions, intelligent computing, big data analytics, analytics in bio-computing, AI-driven 6G mobile wireless networks, and autonomous driving.
Proceedings of Third International Conference on Computing, Communications, and Cybes-Security 1st Table of contents:
QoS Performance Analysis of VANET Routing Protocols
IoT for Smart Monitoring and Automated Irrigation in Agriculture
Optimizing Task Offloading in Internet of Medical Things Systems: A Hybrid Fog-Cloud Approach with Actor-Critic Decision Making
Solving Delivery Allocation for Logistic Network Using Quantum Annealing
The Combined ECC Scheme with Outer 3-Bit BEC and Inner SEC-DAEC Codes for FSO Communication System
Analyzing Multisignature Scheme of Bitcoin Based on Threshold Cryptography Guidelines
Security and Digital Forensic
A Public Key Exchange Protocol Using Tropical Determinant for IoT Environment
Certificateless Verifiable Data Integrity Checking Scheme in Fog-CPSs Architecture
NoPass—A Novel Passwordless Multi-authentication-Based Approach for Secure Login
An Overview of the Discrete Logarithm Problem in Cryptography
QoS-Aware Decentralized Trustworthy Forensic Evidence Management Framework Using the Internet of Vehicle Things (IoVT)
Implementation of Ethical Hacking—The Importance of Protecting User and System Data
Cryptanalysis of Two Correlation-Based Digital Watermarking Schemes in DCT Domain
Cryptanalysis of a Histogram-Based Watermarking Framework
Signal Processing and Multimedia
A Hybrid Deep Learning Framework for Text-Independent Automatic Speaker Recognition System
AMBTC-Based High Capacity Data Hiding Scheme Exploiting PVD and BRP
The Impact of UX/UI Usability Constructs on Purchase Decisions for Mobile Food Ordering Applications in India
Breast Cancer Detection and Classification Using MF-FRFCM Segmentation and IGOA-ELM Model
Audio Encryption Scheme Applying a 2D Cosine Sine Logistic Map
Noisy Electronic Tongue Signal Prediction for Tea Quality Estimation Using Autoencoder
A Chain Code-Based Methodology for Loop Closure Detection in Digital Images
A Hybrid Watermarking Scheme Using DWT and Haar Transform for Image Authentication
Computational Intelligence
Leveraging Transfer Learning for Screening of Geriatric Depression
Emotion-Based Song Categorization with Support Vector Machines
Harmonizing Generations: Evolutionary Rhythms for Offspring Music Creation
Exploring Selection Strategies: A Comparative Study of Rank and Tournament Selection Methods in Offspring Music Rhythm Generation
Filtering-Based Movie Recommendation System: A Comparative Study
Classification of Bloom’s Taxonomy Based University Examination Questions: A Recurrent Neural Network and Natural Language Processing Approach
Fed-ReST: Federated Learning-Based Recurrent Long Short-Term Memory Model for Smart Cities Air Quality Prediction
A Machine Learning Paradigms for Smart Health Monitoring System
Analysing Feature Extraction Methods for Enhanced Accuracy in Lung Cancer Detection
Comparative Analysis for Conversion of Double Base Number System (DBNS) from Conventional Number System Using Binary Search Algorithm by Changing Base Patterns for ANN-Based Applications
Towards Automated Screening via Two-Stage Deep Learning: A Pipeline for Classification and Localization of Bleeding from Wireless Capsule Endoscopy Visuals
Predictive Modeling of Maternal Child Health Challenges Through Machine Learning Analysis
EcoBrownfieldNet: Brownfield Identification from Satellite Remote Sensing Imagery Towards Sustainable Development—An Artificial Intelligence-Based Framework
A Robust Deep Feature Fusion Model for Skin Cancer Classification
Leveraging Weights of Base Clusters and Clusterings in Ensemble to Consensus Clustering
Recognition of Historical Gurmukhi Numerals Using Fine-Tuned Convolution Neural Network
Wheat Leaf Disease Detection Using Shallow ResNet50V2
Exploring the Efficacy of Supervised Learning in Indian Stock Market Prediction: A Comprehensive Analysis
Hardware System Design of Generic RCA
A Recent Review on Diabetic Retinopathy Detection (DRD) Approaches
ETL-LWNet: An Ensemble of Transfer Learning Based Light Weight Deep Learning Models for Identification of Lung Cancer Type in CT-Scan Images
Design and Implementation of Weather Monitoring and Prediction System
AI Based Workflow Scheduling and Automatic Migration Planning Model for Cloud Computing
Could We Generate Cytology Images from Histopathology Images? An Empirical Study
People also search for Proceedings of Third International Conference on Computing, Communications, and Cybes-Security 1st:
third party proceedings
third international congress
what is conference proceedings
proceedings of the 30th international conference on machine learning
third-party proceedings