Research Guide for ML based Smart Tourist System
暂无分享,去创建一个
[1] S. Kanagaraj,et al. Detecting Parkinson's Disease with Image Classification , 2022, 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT).
[2] Swati Swayamsiddha,et al. A Review of ONDC's Digital Warfare in India Taking on the e-Commerce Giants , 2022, SSRN Electronic Journal.
[3] Md Meraj Ansari,et al. Threats and Opportunities with AI-based Cyber Security Intrusion Detection: A Review , 2022, International Journal of Software Engineering & Applications.
[4] Md Meraj Ansari,et al. The Impact and Limitations of Artificial Intelligence in Cybersecurity: A Literature Review , 2022, IJARCCE.
[5] C. Pradhan,et al. Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach , 2022, Sensors.
[6] Md Meraj Ansari,et al. Anti-Phishing Techniques – A Review of Cyber Defense Mechanisms , 2022, IJARCCE.
[7] N. Vatin,et al. Artificial Neural Network with a Cross-Validation Technique to Predict the Material Design of Eco-Friendly Engineered Geopolymer Composites , 2022, Materials.
[8] Sultan S. Alshamrani,et al. An Optimization-Based Diabetes Prediction Model Using CNN and Bi-Directional LSTM in Real-Time Environment , 2022, Applied Sciences.
[9] S. Rafatirad,et al. Accelerated Machine Learning for On-Device Hardware-Assisted Cybersecurity in Edge Platforms , 2022, 2022 23rd International Symposium on Quality Electronic Design (ISQED).
[10] Rupesh Kumar,et al. Hotel building design, occupants’ health and performance in response to COVID 19 , 2022, International Journal of Hospitality Management.
[11] K. Prakash,et al. Particle swarm optimization performance improvement using deep learning techniques , 2022, Multimedia Tools and Applications.
[12] D. Koundal,et al. A fuzzy convolutional neural network for enhancing multi-focus image fusion , 2022, J. Vis. Commun. Image Represent..
[13] Pawan Kumar Sharma,et al. Prevention of Phishing Attacks Using AI-Based Cybersecurity Awareness Training , 2022, International Journal of Smart Sensor and Adhoc Network..
[14] H. Garg,et al. Spoofing detection system for e-health digital twin using EfficientNet Convolution Neural Network , 2022, Multimedia Tools and Applications.
[15] M. Hema,et al. Sentimental Analysis of Twitter Data using Machine Learning Algorithms , 2021, 2021 International Conference on Forensics, Analytics, Big Data, Security (FABS).
[16] D. P. Yadav,et al. Bone Cancer Detection Using Feature Extraction Based Machine Learning Model , 2021, Computational and mathematical methods in medicine.
[17] Ashulekha Gupta,et al. Determining Accuracy Rate of Artificial Intelligence Models using Python and R-Studio , 2021, 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N).
[18] Karan Bajaj,et al. A Comparative Performance Assessment of Optimized Multilevel Ensemble Learning Model with Existing Classifier Models , 2021, Big Data.
[19] M. Diwakar,et al. Emotion Analysis for predicting the emotion labels using Machine Learning approaches , 2021, 2021 IEEE 8th Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON).
[20] Shivendra Shivani,et al. Hatred and trolling detection transliteration framework using hierarchical LSTM in code-mixed social media text , 2021, Complex & Intelligent Systems.
[21] Bhisham Sharma,et al. Implementation analysis of IoT-based offloading frameworks on cloud/edge computing for sensor generated big data , 2021, Complex & Intelligent Systems.
[22] Dohyeun Kim,et al. A Review on Various Applications of Reputation Based Trust Management , 2021, Int. J. Interact. Mob. Technol..
[23] Bhisham Sharma,et al. A novel dynamic clustering approach for energy hole mitigation in Internet of Things‐based wireless sensor network , 2021, Int. J. Commun. Syst..
[24] Mohammad S. Obaidat,et al. Routing and collision avoidance techniques for unmanned aerial vehicles: Analysis, optimal solutions, and future directions , 2020, Int. J. Commun. Syst..
[25] Gautam Srivastava,et al. Real-time cheating immune secret sharing for remote sensing images , 2020, Journal of Real-Time Image Processing.
[26] D Babitha,et al. Automated Road Safety Surveillance System using Hybrid CNN-LSTM Approach , 2020 .
[27] Mohammad S. Obaidat,et al. Comparative analysis of IoT based products, technology and integration of IoT with cloud computing , 2020, IET Networks.
[28] Ramya Govindaraj,et al. Optimal feature extraction and classification-oriented medical insurance prediction model: machine learning integrated with the internet of things , 2020, International Journal of Computers and Applications.
[29] Mohammad S. Obaidat,et al. Statistical vertical reduction‐based data abridging technique for big network traffic dataset , 2019, Int. J. Commun. Syst..
[30] S Santosh Kumar,et al. Automated Package Delivery Accepting System - Smart Freight Box , 2019, 2019 4th International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT).
[31] S Santosh Kumar,et al. Sound Activated Wildlife Capturing , 2018, 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[32] Gowranga Krishnamurthy,et al. Automatic and Manual Switch Mode Targeting Weapon System for Border Security , 2018, 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[33] Neha,et al. Smart IoT based Solar Panel Cleaning System , 2018, 2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[34] S H Bharathi,et al. Non-negative matrix factorization algorithms for blind source sepertion in speech recognition , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[35] R Suganya,et al. Sector based electronic polling of wetting pattern data for on-farm water management , 2017, 2017 2nd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[36] S. S. Kumar,et al. Non-negative matrix based optimization scheme for blind source separation in automatic speech recognition system , 2016, 2016 International Conference on Communication and Electronics Systems (ICCES).
[37] Ke Wang,et al. Trip Recommendation Meets Real-World Constraints , 2016, ACM Trans. Inf. Syst..
[38] M. S. Hema,et al. Data fusion in data federation using modified discriminative Markov logic networks , 2016 .
[39] S. Santhosh Kumar,et al. Breath to speech communication with fall detection for elder/patient with take care analytics , 2016, 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT).
[40] M. S. Hema,et al. Federated Query Processing Service in Service Oriented Business Intelligence , 2011 .
[41] Pieter Vansteenwegen,et al. Tourist Trip Planning Functionalities: State-of-the-Art and Future , 2010, ICWE Workshops.
[42] Joseph M. Sussman,et al. Routing and scheduling temporal and heterogeneous freight car traffic on rail networks , 1998 .
[43] S. Weiss,et al. Wideband Beamforming www.modernh.com for to for , 2022 .
[44] Bhisham Sharma,et al. A Review to Forest Fires and Its Detection Techniques Using Wireless Sensor Network , 2020 .
[45] Mohammad S. Obaidat,et al. Optimized Time Synchronized Multilayer MAC Protocol for WSN Using Relay Nodes , 2020, Ad Hoc Sens. Wirel. Networks.
[46] Mohammad S. Obaidat,et al. A Comparative Study on Frameworks, MAC Layer Protocols and Open Research Issues in Internet of Things , 2019, Ad Hoc Sens. Wirel. Networks.
[47] S Chandramathi,et al. Quality Aware Service Oriented Ontology Based Data Integration , 2013 .
[48] Gaurav,et al. Anti-Phishing Techniques : A Review , 2022 .