![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
An improved ensembling techniques for prediction of breast cancer tissues
Breast cancer is one of the most frequent malignancies in women and accounts for a disproportionate number of new cancer cases and deaths worldwide. Doctors explored many options to predict and diagnose breast...
-
Article
Modified Deep-Convolution Neural Network Model for Flower Images Segmentation and Predictions
Nowadays, recognition of plant, leaf, and flower images is one of the most challenging issues due to the wide variety of classes on earth, which are based on amount of texture, color distinctiveness, shape dis...
-
Article
Performances of Machine Learning Models for Diagnosis of Alzheimer’s Disease
In recent times, various machine learning approaches have been widely employed for effective diagnosis and prediction of diseases like cancer, thyroid, Covid-19, etc. Likewise, Alzheimer’s (AD) is also one pro...
-
Article
Customer purchasing behavior prediction using machine learning classification techniques
Many sales and service-providing companies need to talk up related customers while launching the new products, services, and updated versions of existing products. While doing so, they need to target their exi...
-
Article
Responsive human-computer interaction model based on recognition of facial landmarks using machine learning algorithms
This paper is addressed on the idea of building up a model to control computer systems by utilizing facial landmarks like eyes, nose and head gestures. The face recognition systems mainly detect and recognize ...
-
Article
Thyroid Disease Prediction Using Machine Learning Approaches
This paper is being written to provide a source of reference for the research scholars who want to work in the area of prediction of thyroid disease. From the different machine learning techniques, compared wi...
-
Article
Deep convolutional neural network based plant species recognition through features of leaf
In present scenario, the research under image processing has been rapidly transformed from machine learning to deep learning. The deep learning algorithms are usually applied in the various areas like images t...
-
Chapter and Conference Paper
Enhanced Homomorphic Encryption Scheme with Particle Swarm Optimization for Encryption of Cloud Data
Cloud Computing is the decentralized type of architecture which is vulnerable to various type of security attacks. Homomorphic encryption is the encryption scheme to encrypt objects which are used to access da...
-
Chapter and Conference Paper
Detection and Prevention of Black Hole Attack Using Trusted and Secure Routing in Wireless Sensor Network
A wireless sensor network (WSN) is a network of devices that can communicate after gathering information by monitoring any region through wireless links. Due to this delicate arrangement several numbers of att...
-
Article
EE-SRA: An Approach for MANET with Unique Feature of Agent Estimation
Mobile ad-hoc network is collection of self-organizing nodes where they can communicate with each other using fundamental mutual entrustment and without any fixed infra structure. This paper proposes an energy...
-
Article
An Energy-Efficient Routing Approach for Performance Enhancement of MANET Through Adaptive Neuro-Fuzzy Inference System
Mobile ad hoc network comprises of wireless nodes which are mobile in nature and have short lifespan. They join together to create a self-configured infrastructure-less network where routing is an important ch...
-
Article
Fuzzy Based Hybrid Energy Control Technique to Optimize Hello Interval of Reactive Routing in MANET
Mobile adhoc network is a compilation of self-organizing wireless hosts which can dynamically create a multi-hop network to exchange data packets at any place and time. It is spontaneously deployed over a geog...
-
Article
Fuzzy Based Detection of Malicious Activity for Security Assessment of MANET
Wireless MANET is particularly vulnerable due to its fundamental characteristics such as open medium, dynamic topology, distributed cooperation, congestion, energy constrained, variable capacity links and secu...