![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
A Systematic Literature Review on Multimodal Medical Image Fusion
Medical image fusion is a relevant area with widespread application in disease diagnosis and prediction with easily available image scans of Computed Tomography, Positron Emission Tomography, Magnetic Resonanc...
-
Article
Identification of Best Image Scrambling and Descrambling Method for Image Steganography
Steganography has a great role in secrete sharing. The secret image is embedded inside the cover image, and it is called stego image. The stego image looks like a cover image with naked eyes. Still, there is a...
-
Chapter and Conference Paper
Performance Assessment of Routing Protocols in Cognitive Radio Vehicular Ad Hoc Networks
Cognitive radio technology is an inventive method to solve spectrum scarcity problems in wireless networks. Growing interest of cognitive radio (CR) technology in vehicular communication systems has led CR-ena...
-
Chapter and Conference Paper
Nature-Inspired Hybrid Virtual Machine Placement Approach in Cloud
Many nature-inspired, swarm intelligent, and hybrid algorithms have been designed to figure out an optimal virtual machine (VM) placement solution. In this paper, a hybridized intelligent water drop cycle algo...
-
Chapter and Conference Paper
Comparative Analysis of NLP Text Embedding Techniques with Neural Network Layered Architecture on Online Movie Reviews
In NLP world, there is a need to convert the text data into numerical form in a smart way of text embedding with the machine learning architecture. In this research, the comparative text embedding methods of B...
-
Chapter and Conference Paper
Identification of Disease Resistant Plant Genes Using Artificial Neural Network
Much like animals have their defenses against disease-causing pathogens, plants have their own mechanisms to identify and defend against pathogenic microorganisms. Much of this mechanism depends upon disease-r...
-
Chapter and Conference Paper
Anatomy of Virtual Machine Placement Techniques in Cloud
With consistent advancement in virtualization techniques, organizations are building up enhanced datacenters that are capable of maintaining impactful resource management, high-performance benchmarks, and cont...
-
Chapter and Conference Paper
Analysis of Various Supervised Machine Learning Algorithms for Intrusion Detection
Computer network intrusion detection systems help recognize unauthorized access and abnormal attacks over secured networks. It is an important research domain with the advent of internet technologies and cyber...
-
Chapter and Conference Paper
An Empirical Analysis of Spatial Regression for Vegetation Monitoring
With advancement of spatial and machine learning techniques, remote sensing dataset is rapidly being used in agriculture domain. In this paper, districtwise time-series precipitation data and multi-date normal...
-
Chapter and Conference Paper
Hybrid Genetic Algorithm: Traveling Salesman Problem
A genetic algorithm has three main operators namely selection, crossover and mutation. Each operator has various sub operators. Selection of sub operator that can be applied on particular problem is difficult...
-
Chapter
GA with Repeated Crossover for Rectifying Optimization Problems
There have been various genetic algorithms (GAs) that have been initiated for the purpose of solving optimization issues in the course of research purposes in optimization. Because of the variability in the fe...
-
Chapter and Conference Paper
Real-Time VANET Applications Using Fog Computing
The main objective of vehicular ad hoc networks (VANETs) is to improve driver safety and traffic efficiency. Most of VANET applications are based on periodic exchange of safety messages between nearby vehicles...
-
Article
Giant condyloma acuminatum of vulva treated by surgical excision and reconstruction of defect