Skip to main content

previous disabled Page of 6
and
  1. No Access

    Chapter and Conference Paper

    Cluster-Based Data Aggregation in Wireless Sensor Networks: A Bayesian Classifier Approach

    The network is composed of wireless distributed sensor nodes with data computational capabilities. In each cluster, the cluster member nodes are used to send the sensed data to their respective cluster head to...

    Lokesh B. Bhajantri, Basavaraj G. Kumbar in Evolutionary Computing and Mobile Sustaina… (2021)

  2. No Access

    Chapter and Conference Paper

    High-Performance Digital Logic Circuit Realization Using Differential Cascode Voltage Switch Logic (DCVSL)

    Most of dual-rail CMOS circuits are loosely based around differential cascade voltage logic switch. DCVSL provides dual-rail logic gates that have latching characteristics built into circuits itself. In CVSL l...

    S. S. Kavitha, Narasimha Kaulgud in Evolutionary Computing and Mobile Sustainable Networks (2021)

  3. No Access

    Chapter and Conference Paper

    Generating Automobile Images Dynamically from Text Description

    Synthesis of a realistic image from matching visual descriptions provided in the textual format is a challenge that has attracted attention in the recent research community in the field of artificial intellige...

    N. Sindhu, H. R. Mamatha in Evolutionary Computing and Mobile Sustainable Networks (2021)

  4. No Access

    Chapter

    Parameter Tuning onto Recurrent Neural Network and Long Short-Term Memory (RNN-LSTM) Network for Feature Selection in Classification of High-Dimensional Bioinformatics Datasets

    Feature selection helps with the selection of relevant features that are present in large number of features and ignores the remaining features that have little value on output feature set. Deep learning metho...

    Richard Millham, Israel Edem Agbehadji in Bio-inspired Algorithms for Data Streaming… (2021)

  5. No Access

    Chapter and Conference Paper

    Retrieval of Videos of Flowers Using Deep Features

    This paper presents an algorithmic model for the retrieval of natural flower videos using query by frame mechanism. To overcome the drawback of traditional algorithms, we propose an automated system using a de...

    V. K. Jyothi, D. S. Guru, N. Vinay Kumar in Evolutionary Computing and Mobile Sustaina… (2021)

  6. No Access

    Chapter and Conference Paper

    A Study on Discernment of Fake News Using Machine Learning Algorithms

    Due to recent events in world politics, fake news, or malevolently established media has taken a major role in world politics discouraging the opinion of the people. There is a great impact of fake news on our...

    Utkarsh, Sujit, Syed Nabeel Azeez in Evolutionary Computing and Mobile Sustaina… (2021)

  7. No Access

    Chapter and Conference Paper

    Biogeography-Based Optimization Technique for Optimal Design of IIR Low-Pass Filter and Its FPGA Implementation

    A bio-inspired meta-heuristic biogeography-based optimization (BBO) algorithm, which imitates the migration and mutation processes of different species according to the habitat features, is used in this paper ...

    K. Susmitha, V. Karthik, S. K. Saha, R. Kar in Evolutionary Computing and Mobile Sustaina… (2021)

  8. No Access

    Chapter

    Pattern Mining Algorithms

    In this chapter, we first look at patterns with their relevance of discovery to business. We then do a survey and evaluation, in terms of advantages and disadvantages, of different mining algorithms that are s...

    Richard Millham, Israel Edem Agbehadji in Bio-inspired Algorithms for Data Streaming… (2021)

  9. No Access

    Chapter and Conference Paper

    A Case Study on Distributed Consensus Problem on Cloud-Based Systems

    Fault tolerance is a vital element in cloud computing to achieve high performance. In cloud computing fault tolerance particularly cluster management, network discovery and consistent system master node replic...

    Ganeshayya Shidaganti, Ritu Pravakar in Evolutionary Computing and Mobile Sustaina… (2021)

  10. No Access

    Chapter and Conference Paper

    Emoticon: Toward the Simulation of Emotion Using Android Music Application

    Music unquestionably affects our emotions. We tend to listen to music that reflects our mood. Music can affect our current emotional state drastically. Earlier, the user used to manually browse songs through t...

    Aditya Sahu, Anuj Kumar, Akash Parekh in Evolutionary Computing and Mobile Sustaina… (2021)

  11. No Access

    Chapter and Conference Paper

    Identification of Online Auction Bidding Robots Using Machine Learning

    aim of this project is to identify the bidding robots using machine learning, which bids in an online auction. Bidding robot is basically an application which helps to place a bid or click automatically on ...

    Pooja Maan, R. Eswari in Evolutionary Computing and Mobile Sustainable Networks (2021)

  12. No Access

    Chapter

    Lightweight Classifier-Based Outlier Detection Algorithms from Multivariate Data Stream

    Outlier detection is a preprocessing method that is useful in detecting unusual data if they are of interest to the users, or reducing irrelevant instances in machine learning if outliers are interpreted as no...

    Simon Fong, Tengyue Li, Dong Han in Bio-inspired Algorithms for Data Streaming… (2021)

  13. No Access

    Chapter and Conference Paper

    Cognitive Computing Technologies, Products, and Applications

    Cognitive computing has made industries and business organizations to operate in a different paradigm with respect to the use of technology right from carrying business operations to high-level decision-making...

    N. Divyashree, Prasad K. S. Nandini in Evolutionary Computing and Mobile Sustaina… (2021)

  14. No Access

    Chapter and Conference Paper

    Robust Image Encryption in Transform Domain Using Duo Chaotic Maps—A Secure Communication

    The increase of cyberattacks in the field of information security leads to high attention in the digitalized environment. There is a demand for well-organised methods to transmit data securely over the Interne...

    S. Aashiq Banu, M. S. Sucharita in Evolutionary Computing and Mobile Sustaina… (2021)

  15. No Access

    Chapter and Conference Paper

    Emotion Scanning of the World’s Best Colleges Using Real-Time Tweets

    With the advent of technology and the popularity of social media, people have started sharing their points of view with the masses. Views of the people matter a lot to analyze the effect of dissemination of in...

    Sanjay Kumar, Yash Saini, Vishal Bachchas in Evolutionary Computing and Mobile Sustaina… (2021)

  16. No Access

    Chapter

    The Paradigm of Fog Computing with Bio-inspired Search Methods and the “5Vs” of Big Data

    The purpose of this chapter is to examine the role of various fog computing models, particularly in managing the three main characteristics of big data (volume, velocity, and variety) produced within the Inter...

    Richard Millham, Israel Edem Agbehadji in Bio-inspired Algorithms for Data Streaming… (2021)

  17. No Access

    Chapter and Conference Paper

    Detection Classification and Cutting of Fruits and Vegetables Using Tensorflow Algorithm

    This paper presents automatic fruit and vegetable recognition and chop** mechanism. This work aims to reduce the time taken for cutting fruits and vegetables in a large kitchen. This mechanism has two parts....

    Rupal Mayo Diline D’Souza, S. R. Deepthi in Evolutionary Computing and Mobile Sustaina… (2021)

  18. No Access

    Chapter and Conference Paper

    A Comprehensive Survey on Content Analysis and Its Challenges

    In recent years the explosive development and growth of video technology and multimedia have created a new challenge in the field of computer vision. The tremendous increase in multimedia exchange like video, ...

    Ankitha A. Nayak, L. Dharmanna in Evolutionary Computing and Mobile Sustainable Networks (2021)

  19. No Access

    Chapter and Conference Paper

    A Technique to Detect Wormhole Attack in Wireless Sensor Network Using Artificial Neural Network

    Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipulating routing protocols and exhausting network resources. The paper presents a technique that detects the prese...

    Moirangthem Marjit Singh, Nishigandha Dutta in Evolutionary Computing and Mobile Sustaina… (2021)

  20. No Access

    Chapter and Conference Paper

    Soft Constraints Handling for Multi-objective Optimization

    real-world search and optimization problems naturally involve multiple objectives and several constraints. In this work, an idea for a generalized new approach for handling both hard and soft constraints ...

    Md. Shahriar Mahbub, Fariha Tahsin Chowdhury in Evolutionary Computing and Mobile Sustaina… (2021)

previous disabled Page of 6