Skip to main content

and
  1. Article

    Open Access

    A probabilistic public key encryption switching scheme for secure cloud storage

    The high demand for user-centric applications such as secure cloud storage laid the foundation for the development of user-centric security schemes with multiple security features in recent years. But, the cur...

    Radhakrishna Bhat, N. R. Sunitha in International Journal of Information Techn… (2023)

  2. No Access

    Chapter and Conference Paper

    Boundary-Based Fake Face Anomaly Detection in Videos Using Recurrent Neural Networks

    With the surge in the videos over the internet and the spread of digital communications, the attackers are greatly benefited by creating and publishing the fake distorted videos and images known as Deepfakes. ...

    Yashas Hariprasad, K. J. Latesh Kumar, L. Suraj in Intelligent Systems and Applications (2023)

  3. No Access

    Book

  4. No Access

    Chapter and Conference Paper

    Context-Oriented User-Centric Search System for the IoT Based on Fuzzy Clustering

    The Internet of Things (IoT) paradigm envisions to support the creation of several applications that aids in the betterment of the society from various sectors such as environment, finance, industry etc. These ap...

    Santosh Pattar, Sandhya CR, Darshil Vala in Advances in Computational Intelligence, Se… (2020)

  5. No Access

    Article

    Location identification for real estate investment using data analytics

    The modeling and control of complex systems, such as transportation, communication, power grids or real estate, require vast amounts of data to be analyzed. The number of variables in the models of such system...

    E. Sandeep Kumar, Viswanath Talasila in International Journal of Data Science and … (2019)

  6. No Access

    Chapter and Conference Paper

    The Next Generation of Artificial Intelligence: Synthesizable AI

    While AI is expanding to many systems and services from search engines to online retail, a revolution is needed, to produce rapid, reliable “AI everywhere” applications by “continuous, cross-domain learning”. ...

    Supratik Mukhopadhyay, S. S. Iyengar in Proceedings of the Future Technologies Con… (2019)

  7. No Access

    Chapter and Conference Paper

    Query Click and Text Similarity Graph for Query Suggestions

    Query suggestion is an important feature of the search engine with the explosive and diverse growth of web contents. Different kind of suggestions like query, image, movies, music and book etc. are used every ...

    D. Sejal, K. G. Shailesh, V. Tejaswi in Machine Learning and Data Mining in Patter… (2015)

  8. No Access

    Chapter and Conference Paper

    RCH-MAC Protocol for Multihop QoS in Wireless Sensor Networks

    The design of hybrid MAC protocol in Wireless Sensor Networks for delay sensitive data traffic QoS is a challenging work. We present Reservation Control Hybrid MAC (RCH-MAC) protocol, which reduces end-to-end ...

    Kumaraswamy M., Shaila K., Sivasankari H. in Wireless Networks and Computational Intell… (2012)

  9. No Access

    Chapter

    Integration of Fuzzy ERD Modeling to the Management of Global Contextual Data

    This chapter introduces the idiosyncrasies of managing the new paradigm of global contextual data, sets of context data and super sets of context data. It introduces some of the basic idea’s behind contexts an...

    Gregory Vert, S. S. Iyengar in Uncertainty Approaches for Spatial Data Mo… (2010)

  10. No Access

    Chapter

    Critical Feature Detection in Cockpits – Application of AI in Sensor Networks

    We highlight some safety issues in commercial planes particulary focussing on hazards in the cockpit area. This chapter discusses a few methodologies to detect critical features and provide unambiguous informa...

    S. Srivathsan, N. Balakrishnan in Computational Intelligence in Multimedia P… (2008)

  11. No Access

    Article

    Relative positioning for team robot navigation

    The research presented in this paper approaches the issue of robot team navigation using relative positioning. With this approach each robot is equipped with sensors that allow it to independently estimate the...

    Patrick McDowell, Brian Bourgeois, Pamela J. McDowell, S. S. Iyengar in Autonomous Robots (2007)