![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Five-Layered Neural Fuzzy Closed-Loop Hybrid Control System with Compound Bayesian Decision-Making Process for Classification Cum Identification of Mixed Connective Conjunct Consonants and Numerals
The OCR generation systems are most sophisticated active field and interesting conversional discovery for digitalization of handwritten and typed imprecise data into machine detectable characters. The fuzzy lo...
-
Chapter and Conference Paper
OCR-Assessment of Proposed Methodology Implications and Invention Outcomes with Graphical Representation Algorithmic Flow
The OCR innovative techniques are used to create digital formed text from the basic handwritten and printed text papers. Once it is converted then it can be reused for data processing and reprocessing purpose....
-
Chapter and Conference Paper
Neural Fuzzy Inference Hybrid System with Support Vector Machine for Identification of False Singling in Stock Market Prediction for Profit Estimation
The Stock market prediction is one of the biggest challenges in the global market. The volatility in the movement of stock prices deteriorates the interest of the investor and trader. The main reason of weakne...
-
Chapter and Conference Paper
Blended Environment of Naive Bayes and Support Vector Machine (SVM) for Designing Simulation Based E-Learning Respiratory System
Learning process has become smart with use of technology termed as E-Learning. Simulation based E-Learning revolutionized the education world where the learners enjoy learning process as a playful-act because...
-
Chapter and Conference Paper
Prediction of Stock Price Movements Using Statistical and Hybrid Regression Techniques to Reduce Diversify Risk
The situation of Over-Fitting occurs when model tries to study the features of data in details and found some noise in data to some extent in training phase that hamper the performance of the model in new upco...
-
Chapter and Conference Paper
Analysis of Blockchain Secure Models and Approaches Based on Various Services in Multi-tenant Environment
This research paper is focused on analyzing past proposed papers on using blockchain with cloud computing to enhance the present security system of the cloud. Homomorphic encryption technique is the latest and...
-
Chapter and Conference Paper
Evaluation of Neural Fuzzy Inference System and ML Algorithms for Prediction of Nifty Large Cap Companies Based Stock Values
In this paper, we will evaluate the performance of five machine learning algorithms on large cap ten NIFTY50 companies. Author has implied a 10 year historical dataset that is utilized from yahoo finance and i...
-
Chapter and Conference Paper
The Computation Trend of Fuzzy Rules for Effective Decision Support Mechanism on Basis of Supervised Learning for Multiple Periods
This paper elaborates the attempt to measure the performance of neural fuzzy inference systems along with five different machine-learning algorithms for a 10-year dataset. Several models developed with machine...
-
Chapter and Conference Paper
Heart Disease Prediction and Hybrid GANN
Cardiac arrest is an incurable heart incongruity and requires special treatment and cure. It has been a keen research area for many years and number of researchers across the globe are devoted toward finding t...
-
Chapter and Conference Paper
A Hybrid Model on Deep Learning for the Diagnosis of Diabetic Retinopathy Using Image Crop**
Diabetic Retinopathy is one of the eye condition that may cause vision loss, blindness to the eyes quickly if not treated at the earliest in the patients having Diabetes Milletus type-1 and Type-2. This can...
-
Chapter and Conference Paper
An Intensive Literature Review on Machine Translation Using Neural Approach
Researchers since the twentieth century have shown their keen interest in the domain of machine translation. This interest has resulted in tremendous evolutions starting from earlier rule-based (dictionary mat...
-
Chapter and Conference Paper
Protection of Digital Image and Text Information Security Using LSB and Crossover Techniques
In today’s scenario, Internet is mostly used for communicating or transferring the digital data. With the progression in innovation of data and utilization of Internet, advanced media has become perhaps the mo...
-
Article
Open AccessIntrusion detection systems for wireless sensor networks using computational intelligence techniques
Network Intrusion Detection Systems (NIDS) are utilized to find hostile network connections. This can be accomplished by looking at traffic network activity, but it takes a lot of work. The NIDS heavily utiliz...
-
Article
Multi-layered access control based auto tuning relational key implications in enterprise-level multi-tenancy
This article discusses the importance of cloud-based multi-tenancy in private–public-private secure cloud environments, which is achieved through the isolation of end-user data and resources into tenants to en...