author: jyotsna kumar mandal

Proceedings of the First International Conference on Intelligent Computing and Communication

... Bangla characters recognition. Authors in [19] have discussed about a simple but effective feature extraction ... alphabet set contains 39 consonants and 11 vowels. The concept of upper and lower case is absent in this script. 3. Database.

Emerging Technology in Modelling and Graphics: Proceedings of IEM Graph 2018

... wikipedia.org/wiki/Bitcoin 6. “Ethereum Whitepaper” [Online]. Available: https://github.com/ethereum/wiki/wiki/WhitePaper 7. “JP Morgan ... jp/english/press/2017/pdf/0329_004a.pdf 11. “NXT” Whitepaper [Online]. Available: https://nxtplatform ...

Computational Intelligence in Data Mining - Volume 2: Proceedings of the International Conference on CIDM, 20-21 December 2014

... (DMDW '99), pp. 1–10, Heidelberg (Germany) (1999) Sapia, C., Blaschka, M., Holfing, G., Dinter, B.: Extending use the E/R model for multidimensional paradigm. In: 1st International Workshop on Data Warehouse and Data mining (DWDM '98) ...

Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 2

... Sharma, Vikrant Bhateja and Abhishek Tripathi GSM Based Automated Detection Model for Improvised Explosive Devices ... Suma and Jawahar Rao Big Data Management System for Personal Privacy Using SW and SDF. . . . . . . . . . . . . . . . . . .

Advanced Computing and Communication Technologies: Proceedings of the 9th ICACCT, 2015

... Pro requires slightly more execution and communication time compared to Mica2 which is negligible. Therefore, it will be cost-effective to use Arduino Pro for common WSN applications such as environmental monitoring instead of time ...

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 3

... dark webs. In-degree represents total number of direct links coming from other dark web, and out-degree represents total number of direct link going out from this website to other website. There exist many other algorithms which can ...

Microelectronics, Communication Systems, Machine Learning and Internet of Things: Select Proceedings of MCMI 2020

... ARDUINO FIRE SENSOR UNO METAL DETECTOR. 4. Receiver. and. Transmitter. GSM MODULE TTGO ESP 32 CELL PHONE/ COMPUTER CAMERA The transmitter consists of a microcontroller, nrf24l01, joysticks, and a potentiometer as shown in Fig. 3. The inputs ...

Advanced Techniques for IoT Applications: Proceedings of EAIT 2020

... Baskar, M., Arthi, K., Ramkumar, J.: Optimised with secure approach in detecting and isolation of malicious nodes in ... Bharathi, C.R., Neheru, K.: Infra-red sensor and voice recognition sensors based vehicle speed control using embedded ...

Machine Learning Techniques and Analytics for Cloud Security

... Nutanix. The chapter introduces Nutanix Hybrid Cloud and key terms and services related to it before assessing its security offerings and disaster management and recovery services. It closely follows the renowned Nutanix Bible and ...

Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1

... script from script market and install it into the Grease Monkey browser extension if the browser is Mozilla Firefox or install it into the Tamper Monkey in case of Google Chrome. Users can install any suitable scripts according to their ...

Machine Learning Techniques and Analytics for Cloud Security

Rajdeep Chakraborty, Anupam Ghosh, Jyotsna Kumar Mandal. Figure 11.3 Honeypot system ... service repeatedly for three times. As observed after 12 hours, this system ... advanced method at interpreting data acquired by their honeypot framework ...

Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 1

... round key. Note that both the right segment and the key are 48-bits long. Likewise take note of that the round key is ... unscramble ciphertext message C, raise it to another force d modulo n 4. The encryption key (e,n) is made open. The ...

Proceeding of the Second International Conference on Microelectronics, Computing & Communication Systems (MCCS 2017)

... Solutions and Issues: A Survey,” International Journal of Computer Network ... Circuits, Power and Computing Technologies [ICCPCT-2015], Mar. 2015. 18 ... 7th International Conference on Advances in Mobile Computing and Multimedia, pp ...

Smart Trends in Computing and Communications: Proceedings of SmartCom 2019

... prediction system based on hidden Naïve Bayes classifier. In: 2016 International Conference on Circuits, Controls, Communications and Computing, pp. 1–5 (2016) Orphanou, K., Dagliati, A., Sacchi, L., Stassopoulou, A., Keravnou, E ...

Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015

... password recover facility to the registered user. Fig. 2 Forgot password recovery process Fig. 3 Smart card revocation process 2.5 Smart Card Revocation. Secure Remote Login Scheme ... 499 2.4 Forgot Password Recover Process.

Proceedings of International Conference on Network Security and Blockchain Technology: ICNSBT 2023

... rules Rule R1 : If R2 : R3 : If Antecedent Consequent με is VL then Mpi is ... pixel values and nine linguistic terms , including VVL - very very low , VL ... strategy rule has been built using the nine output param- eters VVL , VL , L ...

Algorithms in Machine Learning Paradigms

... Roy and Arindam Biswas Abstract The patients with diabetes for many years ... nilanjanaduttaroy@gmail.com A. Biswas Department of Information Technology, Indian Institute of Engineering ... Saranya KB, Mohideen SK (2012) A novel approach for.

Frontiers of ICT in Healthcare: Proceedings of EAIT 2022

... Fig . 6 Total network usage References 1. Ray PP ( 2018 ) A survey on Internet of Things architectures . J King Saud Univ - Comput Inf Sci 30 ( 3 ) : 291–319 2. Mukherjee M , Shu L , Wang D ( 2018 ) ... ( 2018 ) A ... Vegas,. 520 D. Bentabet ...

Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS 2018, Volume 1

... Bangla. ·. handwritten Deep learning recognition· Computer. ·. Convolutional vision. ·. Machine neural learning network. 1 ... alphabet incorporates the writing system for the Bangla language together with the Assamese alphabets. Bangla is ...

AI to Improve e-Governance and Eminence of Life: Kalyanathon 2020

... datasheet version 3.6 ( 2021 ) 12. Datasheet - Aosong Electronics Co. , Ltd .: Digital - output relative humidity & temperature sensor / module DHT22 . 13. Hirsch , C. , Bartocci , E. , Grosu , R .: Capacitive soil moisture sensor node ...

Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems: MCCS 2018

... active inductor based tunable band pass filter for multiband RF front end. Int J Eng Technol (IJET) 5(3):2930–2938 7. Stornelli V, Ferri G, Leuzzi G, De Marcellis A (2006) A tunable 0.5–1.3 GHz CMOS 2nd order bandpass filter with 50 ...

Information Systems Design and Intelligent Applications: Proceedings of Third International Conference INDIA 2016, Volume 3

... candy wrappers and chips wrappers, print lamination films, Label Films and Industrial Films e.g. Tape Films • Biaxially-oriented polyethylene tetra phthalate (BOPET) film which is a polyester film made from polyethylene tetra phthalate ...

Topical Drifts in Intelligent Computing: Proceedings of International Conference on Computational Techniques and Applications (ICCTA 2021)

... Adjective Adjective is the class of words which occupy a position immediately before the head in a noun phrase. There are two types of adjectives in Kangra, base adjective and derived adjective. The base adjective contains no ...

Computational Intelligence in Data Mining - Volume 1: Proceedings of the International Conference on CIDM, 20-21 December 2014

... vector's// Step 3: For each SWi, Calculate Probability (Pi) = SWi / SWj , // Where SWi defines the occurrence of distinct words in a TDi & SWj defines the total number of distinct words in all Vi. // Step 4: Clusters_Form (c), // Based ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.