


default search action
21st HIS 2021: Virtual Event, India
- Ajith Abraham, Patrick Siarry, Vincenzo Piuri, Niketa Gandhi, Gabriella Casalino, Oscar Castillo, Patrick Hung:

Hybrid Intelligent Systems - 21st International Conference on Hybrid Intelligent Systems (HIS 2021), December 14-16, 2021. Lecture Notes in Networks and Systems 420, Springer 2022, ISBN 978-3-030-96304-0
Hybrid Intelligent Systems
- Hoang Thi Huong Tra, Ha Duyen Trung

, Nguyen Huu Trung:
YOLOv5 Based Deep Convolutional Neural Networks for Vehicle Recognition in Smart University Campus. 3-12 - Yohanes Alvinika, Wahyu Prasetyo, Paulus Mudjihartono

:
Analysis of Twitter User's Sentiment Against COVID-19 Vaccination Using the Lexicon Based Method. 13-19 - S. Reddy Vamshidhar Reddy, Sanjay Dhar Roy

:
Dual Connectivity Handoff Analysis for ENDC C/U-Plane Split NSA NR5G Networks. 20-26 - Dhruv Agrawal, Rohit Bansal

, Terrance Frederick Fernandez
, Amit Kumar Tyagi
:
Blockchain Integrated Machine Learning for Training Autonomous Cars. 27-37 - Nidhi M. Chourey, Rashmi Soni:

Privacy Preservation Technique Based on Sensitivity Levels for Multiple Numerical Sensitive Overlapped Attributes. 38-55 - Al Amin Biswas

, Md. Sabab Zulfiker
, Aditya Rajbongshi
, Md. Jueal Mia
, Anup Majumder:
Feature Ranking Based Carrot Disease Recognition Using MIFS Method. 56-68 - Rana Fawzi, Mahmoud Ghazy, Lydia Wahid Rizkallah

:
Designing Knowledge-Based Systems for COVID-19 Diagnosis. 69-75 - N. Saranya

, K. Geetha
, C. Rajan:
An Optimized Data Replication Algorithm in Mobile Edge Computing Systems to Reduce Latency in Internet of Things. 76-87 - N. Anitha, R. Devi Priya, R. Rajadevi, C. Baskar, G. Madhumitha, A. Arunkumar, M. A. Nadha:

Prediction of Malnutrition Among Pregnant Women and Infants in Tribal Areas of Tamil Nadu Using Classification Algorithms. 88-105 - Syed Mohammad Minhaz Hossain

, Jayed Akbar Sumon, Anik Sen
, Md. Iftaker Alam, Khaleque Md. Aashiq Kamal
, Hamed AlQahtani, Iqbal H. Sarker:
Spam Filtering of Mobile SMS Using CNN-LSTM Based Deep Learning Model. 106-116 - Md. Sayeduzzaman

, Md. Samiul Islam Borno
, Khadija Yeasmin Fariya
, Md. Tamim Ahmed Khan
:
A Convenient Method and Design for Constructing an IoT-Based Smart Automated Sanitization System. 117-127 - Siddharth Srivatsa, Aditya Singh, Pramod Kumar Singh:

Combating Depression Through the Neural Analysis of Web Behavior. 128-139 - R. Devi Priya, V. Devisurya, N. Anitha, Dharani, B. Geetha, R. V. Kirithika:

Faster R-CNN with Augmentation for Efficient Cotton Leaf Disease Detection. 140-148 - R. G. Sangeetha, Hemanth C., Naman Arora, Karan Singh, Vithika Mulye:

Bitcoin Value Prediction. 149-159 - Weerapan Sae-Dan, Marie-Eléonore Kessaci

, Nadarajen Veerapen
, Laetitia Jourdan
:
Automatic Algorithm Multi-Configuration Applied to an Optimization Algorithm. 160-170 - Atharv Sontakke, Mrunali Yewale, Sejal Zambare, Sakshi Tendulkar, Anagha Chaudhari:

Credit Card Fraud Detection Using Machine Learning and Predictive Models: A Comparative Study. 171-180 - Islam Elleuch, Achraf Makni

, Rafik Bouaziz:
An Intelligent and Efficient Safe Driving System. 181-193 - Rodrigo Cordero-Martínez

, Daniela Sánchez
, Patricia Melin
:
Comparison of Image Pre-processing for Classifying Diabetic Retinopathy Using Convolutional Neural Networks. 194-204 - Telmo Matos

:
RAMP for the Capacitated Single Allocation p-Hub Location Problem. 205-214 - Anjali Verma, Rashmi Soni:

Predicting Stock Market Movement Employing Data Filtration and Gradient Boost Algorithm. 215-224 - Cherrat Khaoula, Bouzidi Morad, Riffi Mohammed Essaid

:
SailFish Optimizer Algorithm to Solve the Traveling Salesman Problem. 225-232 - Patricia Melin

, Daniela Sánchez
, Martha Pulido
, Oscar Castillo
:
Convolutional Neural Network Design Using a Particle Swarm Optimization for Face Recognition. 233-242 - Abdulaziz Tunde Yakubu

, Abdultaofeek Abayomi
, Naven Chetty
:
Machine Learning-Based Precipitation Prediction Using Cloud Properties. 243-252 - Lucas Susanto, Tohari Ahmad

:
Performance Analysis of the New Filtering Algorithm with Kalman on Indoor Positioning System. 253-261 - Shreyans Jain, Nishant Verma, Rashid Ahmed, Aman Tayal, Hemant Rathore:

Credit Card Fraud Detection Using K-Means Combined with Supervised Learning. 262-272 - Mahmudul Huq, Rytis Maskeliunas:

Speech Enhancement Using Generative Adversarial Network (GAN). 273-282 - Gahina Karak, Shubham Mishra, Arkadyuti Bandyopadhyay, Pavirala Ranga Sai Rohith, Hemant Rathore:

Sentiment Analysis of IMDb Movie Reviews: A Comparative Analysis of Feature Selection and Feature Extraction Techniques. 283-294 - Wided Bakari, Mabrouka Ben-Sghaier, Mahmoud Neji:

Implementing an Arabic Question Answering System Using Conceptual Graphs. 295-304 - Rupesh Kumar Dewang

, Arpit Gupta, Anisha Kumari, Ritik Raj, Akanksha Gupta, Raj Nath Shah, Tanmay Jaiswal, Arvind Mewada
:
AutIS: Artificial Intelligent Based Automated Interviewing System. 305-320 - Monsef Boughrous, Hanan El Bakkali, Asmaa El Kandoussi:

The Pandemic Impact on Organizations Security and Resiliency: The Workflow Satisfiability Problem. 321-329 - E. M. Roopa Devi, R. Rajadevi, Priyadharsini, Praveen, Sethuraj:

An Ensemble Approach for Predicting Intraocular Diseases Using Immune Mediator Levels. 330-343 - Tanjim Taharat Aurpa, Md. Shoaib Ahmed, Rifat Sadik

, Sabbir Anwar, Md Abdul Mazid Adnan, Md Musfique Anwar
:
Progressive Guidance Categorization Using Transformer-Based Deep Neural Network Architecture. 344-353 - Sarita Jibhau Wagh, Pradip M. Paithane

, S. N. Patil:
Applications of Fuzzy Logic in Assessment of Groundwater Quality Index from Jafrabad Taluka of Marathawada Region of Maharashtra State: A GIS Based Approach. 354-364 - Raihan Jamil, Mohammad Abdullah Al Nayeem Khan, Md Musfique Anwar

:
Topic Oriented Hate Speech Detection. 365-375 - Rahma Kadri, Mohamed Tmar, Bassem Bouaziz

, Faïez Gargouri
:
Alzheimer's Disease Detection Using Deep ECA-ResNet101 Network with DCGAN. 376-385 - Malak Saidi, Anis Tissaoui

, Djamal Benslimane, Sami Faïz:
Automatic Microservices Identification Across Structural Dependency. 386-395 - Luciano Azevedo de Souza

, Helder Gomes Costa
:
Managing the Conditions for Project Success: An Approach Using k-means Clustering. 396-406 - Hemlatha Pandey, Tejal Lalitkumar Karnavat, Mandadapu Naga Sai Sandilya, Shashwat Katiyar, Hemant Rathore:

Intrusion Detection System Based on Machine and Deep Learning Models: A Comparative and Exhaustive Study. 407-418 - Nishi Gandhi, Virendra Dani

, Mridula Geed, Prakrati Dashore, Naina Pandey:
FaMaDAS: Face Mask Detection and Alert System for COVID 19 Outbreaks. 419-428 - Barani Shaju, N. Valliammal:

An Advanced Deep Learning Approach for Nickel Price Prediction Model Evading Outliers Using Enhanced Multikernel LSTM. 429-441 - Ines Lahmar

, Aida Boussaada Zaier, Mohamed Yahia, Ridha Boaullègue:
A Multiple Fuzzy C-Means Ensemble Cluster Forest for Big Data. 442-451 - Miriam Shaba, Andeboutom Roland, John Simon, Sanjay Misra

, Foluso Ayeni
:
A Real-Time Sentimental Analysis on E-Commerce Sites in Nigeria Using Machine Learning. 452-462 - Joseph Bamidele Awotunde

, Sanjay Misra
, Foluso Ayeni
, Rytis Maskeliunas, Robertas Damasevicius:
Artificial Intelligence Based System for Bank Loan Fraud Prediction. 463-472 - Abiodun Kazeem Moses, Sanjay Misra

, Joseph Bamidele Awotunde
, Samson Adewole, Akor Joshua, Jonathan Oluranti:
Comparing the Performance of Various Supervised Machine Learning Techniques for Early Detection of Breast Cancer. 473-482 - Oluwasefunmi 'Tale Arogundade, Adeniyi Akanni, Sanjay Misra

, Abiodun Muyideen Mustapha, Kayode Ogunremi, Timothy Ayo, Jonathan Oluranti:
Psychotherapeutic Tool for Addressing Depression in Teenagers Through Video Games. 483-492
Information Assurance and Security
- Milena Boss, Lukas Kunz, Jasmin Wüthrich, Thomas Hanne

:
Teaching Encryption Algorithms with Serious Games. 495-507 - Nguyen Thi Ngan

, Bui Huy Khoi
:
Partial Least Squares Algorithm for Deciding on Buying Innisfree Cosmetics: Evidence from Vietnam. 508-516 - Leda Kamal

, R. Jeberson Retna Raj
:
Blockchain: A Compendium on Contemporary Privacy Preservation Approaches and Its Manifestation in Varied Realms. 517-529 - S. Jai Balaji, A. Karmel:

Detecting Vulnerabilities Using Open-Source Intelligence. 530-540 - Yamin Li, Wanming Chu:

Shift-Sub Modular Multiplication Algorithm and Hardware Implementation for RSA Cryptography. 541-552 - B. H. Shraddha, Bhagyashree Kinnal, Heera Wali

, Nalini C. Iyer, P. Vishal:
Lightweight Cryptography for Resource Constrained Devices. 553-564 - Virendra Dani

, Priyanka Kokate, Surbhi Kushwah, Swapnil Waghela:
Privacy Preserving Data Mining Technique to Secure Distributed Client Data. 565-574 - Archana V. Mire

, Shaveta Malik
, Srushti Jichkar
:
Tampering Localization Using Divergence in First Digit Probability Distribution. 575-584 - Dassine Djebara, Abdelmalek Mallek, Wahida Handouzi

:
Impact of Optimizers on a CNN Architecture for Anti-spoofing Goal. 585-594 - Mohamed Talha, Anas Abou El Kalam

:
Big Data: Towards a Collaborative Security System at the Service of Data Quality. 595-606 - Disha Sushant Wankhede, Shashwat Pandit, Nitin Metangale, Rutik Patre, Soham Kulkarni, Khan Arif Minaj:

Survey on Analyzing Tongue Images to Predict the Organ Affected. 607-614 - Ilaiah Kavati, G. Kiran Kumar, Mukkamula Venu Gopalachari

, Erukala Suresh Babu
, Ramalingaswamy Cheruku
, V. Dinesh Reddy
:
Non-invertible Cancellable Template for Fingerprint Biometric. 615-624 - Aswani Devi Aguru

, Erukala Suresh Babu
, Ilaiah Kavati:
Smart Contract Based Next-Generation Public Key Infrastructure (PKI) Using Permissionless Blockchain. 625-635 - Akshay Pillai

, Vishal Saraswat
, Arunkumar Vasanthakumary Ramachandran:
Protection Guidelines for Blockchain Based Digital Identity. 636-646 - Yoga Samudra, Tohari Ahmad

:
Improved Interpolation-Based Reversible Audio Data Hiding Using Sample Dispersion and Value Shifting. 647-656 - Senthil Kumar Arumugam

, Aarti Mehta Sharma
:
Role of Blockchain in the Healthcare Sector: Challenges, Opportunities and Its Uses in Covid-19 Pandemic. 657-666

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














