![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter
Depressive Disorder Prediction Using Machine Learning-Based Electroencephalographic Signal
Machine learning is an effective method to analyze enormous information sets precisely, particularly those with recognized designs, which have also proven to be extremely important for the determination of EEG...
-
Chapter
Quality of Smart Health Service for Enhancing the Performance of Machine Learning-Based Secured Routing on MANET
The goal is to enhance the routing standards’ performance by employing a multipath scheme and the hop count-based routing parameter for the ad hoc networks for fulfilling the QoS prerequisites for various appl...
-
Chapter
ConvNet-Based Deep Brain Stimulation for Attack Patterns
Symptoms of Parkinson’s disease usually start slowly and steadily decline with age. People with Parkinson’s disease may have problems walking and talking as the disease progresses. Additionally, they may disco...
-
Chapter
Implementation of a ‘Useful’ Information Measure for Healthcare Decision Making
Cryptography, molecular biology, natural language processing, and statistical inference are a few fields where information theory is used. It’s also utilized in medical science. In this article, we show how pr...
-
Chapter
Web-Based Augmented Reality of Smart Healthcare Education for Machine Learning-Based Object Detection in the Night Sky
Visit Astrophile to a science centre to understand the night sky and astronomical philosophies. The learning environment is limited to virtually observing the constellations, and a significant difference can b...
-
Article
RETRACTED ARTICLE: Analysing the User Actions and Location for Identifying Online Scam in Internet Banking on Cloud
-
Article
Encrypted Network Traffic Classification and Resource Allocation with Deep Learning in Software Defined Network
The climate has changed absolutely in every area in just a few years as digitized, making high-speed internet service a significant need in the future. Future Internet is supposed to face exponential growth in...
-
Article
Biological Feature Selection and Classification Techniques for Intrusion Detection on BAT
Privacy is a significant problem in communications networks. As a factor, trustworthy knowledge sharing in computer networks is essential. Intrusion Detection Systems consist of security tools frequently used ...
-
Article
An Enhanced Trust-Based Kalman Filter Route Optimization Technique for Wireless Sensor Networks
Wireless Sensor Networks are generally employed for observing and monitoring specific environments. WSNs are made from a huge amount of low-cost sensor nodes separated and distributed in different environments...
-
Chapter and Conference Paper
Advanced Smart Gloves for Physically Disabled Persons Using LABVIEW
People with disabilities like deaf and dumb will find it challenging to communicate with ordinary people; there are various causes for these disabilities, we aim to overcome this issue. The proposed system con...
-
Chapter and Conference Paper
The Role of Artificial Intelligence and Data Science Against COVID-19
Today, a massive outbreak of a deadly virus has challenged humanity in each aspect; we deemed ourselves powerful. Millions of people are at risk, and in some cases, even if the person has reported negative, it...
-
Chapter and Conference Paper
Design of Automotive Accident-Avoidance System at Speed Limit Zone Using GPS
The majority of accidents are happening due to a lack of prior information about the driver. Sometimes, drivers are distracted inherently, which causes significant road accidents on the highway speed limit zon...
-
Chapter and Conference Paper
Comparative Analysis of Term Extraction and Selection Techniques for Query Reformulation Using PRF
Query reformulation (QR) is the process to make initial query exact by generating more significant terms. Term extraction and selection are one of the techniques of it. QR eliminates irrelevant and repetitive ...
-
Chapter and Conference Paper
A Framework for Detection and Validation of Fake News via Authorize Source Matching
In the present era, peoples are sharing views, information, and knowledge on social media across the world without validating the contents. This increases the probability that deceptive news reaches the group ...
-
Chapter and Conference Paper
Comment Filtering Based Explainable Fake News Detection
Fake News Detection is one of the most currently researched areas over the globe; many methods have come to light using different features as their sources. Hence, there are also methods using existing comment...
-
Chapter and Conference Paper
IPL: From Lens of Data Science
Cricket is most lovable game in the world. It is played in many formats. One of the most popular format is IPL (Indian Premier League) which is hosted by BCCI (Board of Control for Cricket in India) every year...
-
Chapter and Conference Paper
A Frequency-Based Approach to Extract Aspect for Aspect-Based Sentiment Analysis
Data is king nowadays, and users worldwide express their views on different platforms to aggregate this data and analyze it. Sentiment analysis becomes a major tool for analysts. Sentiment analysis can be done...
-
Chapter and Conference Paper
A Review on Offensive Language Detection
Offensive language, hate speech, and bullying behavior is prevalent during textual communication happening online. Users usually misuse the anonymity available online social media, use this as an advantage, an...
-
Chapter and Conference Paper
Hindi Word Sense Disambiguation Using Cosine Similarity
Hindi is the regional language of India. Most of the people access, retrieve, and share documents in Hindi language. As all the natural languages possess property of being ambiguous, so does Hindi language, wh...
-
Chapter and Conference Paper
Opinion Mining Classification Based on Extension of Opinion Mining Phrases
Opinion mining is the field of study that analyses people’s thoughts, sentiments, emotions and attitude towards entities, product, services, issues, topics, events and their attributes. There are many differen...