author: d jude hemanth

Artificial Intelligence: Second International Conference, SLAAI-ICAI 2018, Moratuwa, Sri Lanka, December 20, 2018, Revised Selected Papers

... Analytics Vidhya : Understanding Support Vector Machine algorithm from examples (along with code) (2017). https ... random forest ensemble algorithms for machine learning. machine learning mastery. https://machinelearningmastery.com/bagging- ...

4th International Conference on Artificial Intelligence and Applied Mathematics in Engineering: ICAIAME 2022

... SDN technology . T - Comm 12 ( 12 ) , 84–88 ( 2018 ) 5. Efimushkin , V.A. ... 120. ITMO University , St. Petersburg ( 2015 ) 8. Bankov Dmitry , Khorov ... packet jitter for correlated traffic . In : Interna- tional Conference on Internet ...

Machine Learning Techniques for Smart City Applications: Trends and Solutions

... sleep problems were prevalent among the disabled persons that also lead to ... solutions used to address the issues of sleep disorders. 2 Etiology of Sleep ... 90 min roughly and nearly five times during an entire night time. As NREM ...

Smart Applications with Advanced Machine Learning and Human-Centred Problem Design

... Binance Coin (BNB) 650.99 99986.49 Dogecoin (DOGE) 0.66 85147.17 Ripple (XRP) 1.61 73305.33 Tether US (USDT) 1.00 ... Python software language, machine learning algorithms were used thro ugh the Anaconda Navigator—Jupyter Notebook ...

Artificial Intelligence and Applied Mathematics in Engineering Problems: Proceedings of the International Conference on Artificial Intelligence and Applied Mathematics in Engineering (ICAIAME 2019)

Proceedings of the International Conference on Artificial Intelligence and Applied Mathematics ... Expert Syst. Appl. 38(6), 6839–6847 (2011) Li, H., Sun, J.: Case-based ... Safety and Reliability; Proceedings of ESREL, vol. 98, pp. 16–19 (1998) ...

International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018

... manner of the defrauder is unfamiliar and the fraud and risk analysts has to frame fresh models to identify fraud [6]. Model 3 R Programming in Anomaly Discovery Frauds in online Usage of R Programming in Data Analytics 417.

Intelligent Data Communication Technologies and Internet of Things: Proceedings of ICICI 2021

... fractal shapes to design new antennas with improved features. Two of the most important properties of fractal ... polarized patch antenna, which resulted in considerable improvement in terms of better radiation efficiency, optimal return loss ...

Artificial Intelligence Techniques for Advanced Computing Applications: Proceedings of ICACT 2020

... hc-sr04-ultrasonic-sensor-noncontact-range-detection- datasheet-and-pinout/ 16. http://electrobist.com/product/hc-sr04-hc-sr04-ultrasonic-sensor/ 1. Elhourani T, Gopalan A, Ramasubramanian S (2014) IP fast Advanced Accident Avoiding ...

Trends in Data Engineering Methods for Intelligent Systems: Proceedings of the International Conference on Artificial Intelligence and Applied Mathematics in Engineering (ICAIAME 2020)

... Oozie. Through the proposed real time big data architecture, people can be safe in closed areas. Keywords: Computer vision · Image processing · Big data · Stream · Detection 1 Introduction Video surveillance is a research topic in ...

Innovative Methods in Computer Science and Computational Applications in the Era of Industry 5.0: Proceedings of the 5th International Conference on Artificial Intelligence and Applied Mathematics in Engineering ICAIAME 2023, Volume 1

... 4041 8. Ottoni , A.L.C. , Amorim , R.M.d. , Novo , M. , Costa , D.B .: Tuning of data augmentation hyper- parameters in deep learning to building construction image classification with small datasets . Int . J. Mach . Learn . Cybern . 1 ...

Intelligent Data Communication Technologies and Internet of Things: Proceedings of ICICI 2020

... traffic signs available and will be trying to classify the similar type of dataset which is available on the Kaggle group site. The dataset GERMAN TRAFFIC SIGN RECOGNITION BENCHMARK contains German traffic signals, having nearly forty ...

Emerging Trends in Computing and Expert Technology

... blowfish algorithm , LSB algorithm Steps Blowfish LSB algorithm ( % ) algorithm ( % ) Encryption 76 86 cycle Decryption 82 888 cycle Memory 95 utilization 95 References 1. Sinha, A., Singh, K.: A technique for image. 4 Conclusion A ...

Intelligent Data Communication Technologies and Internet of Things: ICICI 2019

... CNV, cs mode is selected, and SDO is forced to high impedance, with SDI connected to VIO. After a conversion is initiated, it continues until completion irrespective of the state of CNV. However, before the minimum conversion time ...

Human Behaviour Analysis Using Intelligent Systems

... Wikipedia visits and edits, and PubMed articles to yield a structural equation model. The relationships between ... Malaria Control Strategy Using Expert Systems. Malaria constitutes a “red-alert” health threat to the African communities ...

Computational Intelligence and Deep Learning Methods for Neuro-rehabilitation Applications

... [Asdsd]. [5] Ke F, Moon J, Sokolikj Z. Virtual realityebased social skills training for children with autism spectrum disorder. Journal of Special Education Technology 2022;37(1):49e62 [Asdsad]. [6] Lee JH, Lee TS, Lee SW, Jang JH, Yoo ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.