Skip to main content

previous disabled Page of 5
and
  1. No Access

    Chapter and Conference Paper

    Lightweight Malicious Packet Classifier for IoT Networks

    Although the Internet of Things (IoT) devices simplify and automate everyday tasks, they also introduce a tremendous amount of security flaws. The current insufficient security measures for smart device protec...

    Seyedsina Nabavirazavi, S. S. Iyengar in Information Security, Privacy and Digital … (2024)

  2. No Access

    Chapter

    Low-Code and Deep Learning Applications

    Artificial Intelligence engineering aims to provide a framework of tools to proactively design AI systems to function in environments characterized by computational complexity and ambiguity and uses restricted...

    Jayakumar Singaram, S. S. Iyengar, Azad M. Madni in Deep Learning Networks (2024)

  3. No Access

    Chapter

    Hardware for DL Networks

    This chapter proceeds to engage the previous section learning to empower the advanced hardware system knowledge that powers a sturdy performance to train the deep learning networks. A detailed hardware environ...

    Jayakumar Singaram, S. S. Iyengar, Azad M. Madni in Deep Learning Networks (2024)

  4. No Access

    Chapter

    Introduction

    The field of machine learning is witnessing an important era as deep learning slowly becomes an important discipline. This book in general presents facets of deep learning networks, design, development, and de...

    Jayakumar Singaram, S. S. Iyengar, Azad M. Madni in Deep Learning Networks (2024)

  5. No Access

    Chapter

    Introduction to Software Tool Set

    This chapter presents tool sets for deep learning applications and primarily focuses to illustrate the instructions to configure the environment step by step with data, operating system, application, hardware,...

    Jayakumar Singaram, S. S. Iyengar, Azad M. Madni in Deep Learning Networks (2024)

  6. No Access

    Chapter

    Data Set Design and Data Labeling

    In this section, the book reveals the most tricky and advanced data processing techniques in the easiest way for the readers. More importantly, the book chapter reveals how to read data from audio, speech, ima...

    Jayakumar Singaram, S. S. Iyengar, Azad M. Madni in Deep Learning Networks (2024)

  7. No Access

    Chapter

    Training of Deep Learning Networks

    This section of the book details on training Deep Learning Networks. PyTorch is one of the popular AI framework to model Deep Learning Networks and also train, test and deploy Deep Learning Networks. TensorFlo...

    Jayakumar Singaram, S. S. Iyengar, Azad M. Madni in Deep Learning Networks (2024)

  8. No Access

    Chapter

    Tutorial: Deploying Deep Learning Networks

    The interesting aspect of this chapter of the book is in deploying deep learning networks. This section provides hands-on experience for designing and deploying deep learning networks.

    Jayakumar Singaram, S. S. Iyengar, Azad M. Madni in Deep Learning Networks (2024)

  9. No Access

    Chapter

    Model of Deep Learning Networks

    This section of the book primarily addresses the deep learning model designing and development. Deep learning network is emerging as an another tool set to model given physical process (16,17,18). Observed dat...

    Jayakumar Singaram, S. S. Iyengar, Azad M. Madni in Deep Learning Networks (2024)

  10. No Access

    Chapter

    Deployment of Deep Learning Networks

    The surge on the Internet and data has led to advanced deep learning systems and hence the book also presents techniques for Internet of Things (IoT) in association with deep learning networks. This section di...

    Jayakumar Singaram, S. S. Iyengar, Azad M. Madni in Deep Learning Networks (2024)

  11. No Access

    Book and Conference Proceedings

    Information Security, Privacy and Digital Forensics

    Select Proceedings of the International Conference, ICISPD 2022

    Sankita J. Patel in Lecture Notes in Electrical Engineering (2024)

  12. No Access

    Chapter and Conference Paper

    Sensor Fusion and Pontryagin Duality

    Boltzmann Machine (BM) and Brooks–Iyengar (BI) algorithm are solving similar problems in sensor fusion. Relationships between these two are established in detail. During 1984, BM was used as a toolset to solve...

    S. Jayakumar, S. S. Iyengar in Information Security, Privacy and Digital … (2024)

  13. No Access

    Book

    Deep Learning Networks

    Design, Development and Deployment

    Jayakumar Singaram, S. S. Iyengar, Azad M. Madni (2024)

  14. Article

    Open Access

    A probabilistic public key encryption switching scheme for secure cloud storage

    The high demand for user-centric applications such as secure cloud storage laid the foundation for the development of user-centric security schemes with multiple security features in recent years. But, the cur...

    Radhakrishna Bhat, N. R. Sunitha in International Journal of Information Techn… (2023)

  15. No Access

    Chapter and Conference Paper

    Boundary-Based Fake Face Anomaly Detection in Videos Using Recurrent Neural Networks

    With the surge in the videos over the internet and the spread of digital communications, the attackers are greatly benefited by creating and publishing the fake distorted videos and images known as Deepfakes. ...

    Yashas Hariprasad, K. J. Latesh Kumar, L. Suraj in Intelligent Systems and Applications (2023)

  16. No Access

    Book

  17. No Access

    Article

    An investigation of Heat Transfer and Magnetohydrodynamics Flow of Fractional Oldroyd-B Nanofluid Suspended with Carbon Nanotubes

    This study aims to investigate the heat transfer and magnetohydrodynamics flow of fractional Oldroyd-B nanofluid in a porous medium with radiation effect. The Caputo time-fractional derivative model is introdu...

    Babitha, K. R. Madhura, S. S. Iyengar in International Journal of Applied and Compu… (2022)

  18. No Access

    Chapter

    Newer Angiotensin Receptor Blockers

    Angiotensin receptor blockers (ARBs) are among the most widely used classes of antihypertensive drugs. In addition to their established efficacy and safety, ARBs are well tolerated and have a lower discontinua...

    S. S. Iyengar, N. Saleha in Hypertension and Cardiovascular Disease in Asia (2022)

  19. No Access

    Chapter

    Introduction

    The greatest requirement in the modern age is the need for empowering security that will provide tamper evident information exchange. This brings up a prominent need for techniques that integrate modern crypto...

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

  20. No Access

    Chapter

    Popular Homomorphic Encryption Schemes

    There are many applications that can benefit from the adoption of homomorphic encryption schemes. However, one of the front runners in terms of consideration for adoption is cloud computing systems.

    Pawel Sniatala, S.S. Iyengar in Evolution of Smart Sensing Ecosystems with… (2021)

previous disabled Page of 5