


default search action
21st HIS 2021: Virtual Event, India
- Ajith Abraham, Patrick Siarry, Vincenzo Piuri, Niketa Gandhi, Gabriella Casalino, Oscar Castillo, Patrick Hung:
Hybrid Intelligent Systems - 21st International Conference on Hybrid Intelligent Systems (HIS 2021), December 14-16, 2021. Lecture Notes in Networks and Systems 420, Springer 2022, ISBN 978-3-030-96304-0
Hybrid Intelligent Systems
- Hoang Thi Huong Tra, Ha Duyen Trung
, Nguyen Huu Trung:
YOLOv5 Based Deep Convolutional Neural Networks for Vehicle Recognition in Smart University Campus. 3-12 - Yohanes Alvinika, Wahyu Prasetyo, Paulus Mudjihartono
:
Analysis of Twitter User's Sentiment Against COVID-19 Vaccination Using the Lexicon Based Method. 13-19 - S. Reddy Vamshidhar Reddy, Sanjay Dhar Roy
:
Dual Connectivity Handoff Analysis for ENDC C/U-Plane Split NSA NR5G Networks. 20-26 - Dhruv Agrawal, Rohit Bansal
, Terrance Frederick Fernandez
, Amit Kumar Tyagi
:
Blockchain Integrated Machine Learning for Training Autonomous Cars. 27-37 - Nidhi M. Chourey, Rashmi Soni:
Privacy Preservation Technique Based on Sensitivity Levels for Multiple Numerical Sensitive Overlapped Attributes. 38-55 - Al Amin Biswas
, Md. Sabab Zulfiker
, Aditya Rajbongshi
, Md. Jueal Mia
, Anup Majumder:
Feature Ranking Based Carrot Disease Recognition Using MIFS Method. 56-68 - Rana Fawzi, Mahmoud Ghazy, Lydia Wahid Rizkallah
:
Designing Knowledge-Based Systems for COVID-19 Diagnosis. 69-75 - N. Saranya
, K. Geetha
, C. Rajan:
An Optimized Data Replication Algorithm in Mobile Edge Computing Systems to Reduce Latency in Internet of Things. 76-87 - N. Anitha, R. Devi Priya, R. Rajadevi, C. Baskar, G. Madhumitha, A. Arunkumar, M. A. Nadha:
Prediction of Malnutrition Among Pregnant Women and Infants in Tribal Areas of Tamil Nadu Using Classification Algorithms. 88-105 - Syed Mohammad Minhaz Hossain
, Jayed Akbar Sumon, Anik Sen
, Md. Iftaker Alam, Khaleque Md. Aashiq Kamal
, Hamed AlQahtani, Iqbal H. Sarker:
Spam Filtering of Mobile SMS Using CNN-LSTM Based Deep Learning Model. 106-116 - Md. Sayeduzzaman
, Md. Samiul Islam Borno
, Khadija Yeasmin Fariya
, Md. Tamim Ahmed Khan
:
A Convenient Method and Design for Constructing an IoT-Based Smart Automated Sanitization System. 117-127 - Siddharth Srivatsa, Aditya Singh, Pramod Kumar Singh:
Combating Depression Through the Neural Analysis of Web Behavior. 128-139 - R. Devi Priya, V. Devisurya, N. Anitha, Dharani, B. Geetha, R. V. Kirithika:
Faster R-CNN with Augmentation for Efficient Cotton Leaf Disease Detection. 140-148 - R. G. Sangeetha, Hemanth C., Naman Arora, Karan Singh, Vithika Mulye:
Bitcoin Value Prediction. 149-159 - Weerapan Sae-Dan, Marie-Eléonore Kessaci
, Nadarajen Veerapen
, Laetitia Jourdan
:
Automatic Algorithm Multi-Configuration Applied to an Optimization Algorithm. 160-170 - Atharv Sontakke, Mrunali Yewale, Sejal Zambare, Sakshi Tendulkar, Anagha Chaudhari:
Credit Card Fraud Detection Using Machine Learning and Predictive Models: A Comparative Study. 171-180 - Islam Elleuch, Achraf Makni
, Rafik Bouaziz:
An Intelligent and Efficient Safe Driving System. 181-193 - Rodrigo Cordero-Martínez
, Daniela Sánchez
, Patricia Melin
:
Comparison of Image Pre-processing for Classifying Diabetic Retinopathy Using Convolutional Neural Networks. 194-204 - Telmo Matos
:
RAMP for the Capacitated Single Allocation p-Hub Location Problem. 205-214 - Anjali Verma, Rashmi Soni:
Predicting Stock Market Movement Employing Data Filtration and Gradient Boost Algorithm. 215-224 - Cherrat Khaoula, Bouzidi Morad, Riffi Mohammed Essaid
:
SailFish Optimizer Algorithm to Solve the Traveling Salesman Problem. 225-232 - Patricia Melin
, Daniela Sánchez
, Martha Pulido
, Oscar Castillo
:
Convolutional Neural Network Design Using a Particle Swarm Optimization for Face Recognition. 233-242 - Abdulaziz Tunde Yakubu
, Abdultaofeek Abayomi
, Naven Chetty
:
Machine Learning-Based Precipitation Prediction Using Cloud Properties. 243-252 - Lucas Susanto, Tohari Ahmad
:
Performance Analysis of the New Filtering Algorithm with Kalman on Indoor Positioning System. 253-261 - Shreyans Jain, Nishant Verma, Rashid Ahmed, Aman Tayal, Hemant Rathore:
Credit Card Fraud Detection Using K-Means Combined with Supervised Learning. 262-272 - Mahmudul Huq, Rytis Maskeliunas:
Speech Enhancement Using Generative Adversarial Network (GAN). 273-282 - Gahina Karak, Shubham Mishra, Arkadyuti Bandyopadhyay, Pavirala Ranga Sai Rohith, Hemant Rathore:
Sentiment Analysis of IMDb Movie Reviews: A Comparative Analysis of Feature Selection and Feature Extraction Techniques. 283-294 - Wided Bakari, Mabrouka Ben-Sghaier, Mahmoud Neji:
Implementing an Arabic Question Answering System Using Conceptual Graphs. 295-304 - Rupesh Kumar Dewang, Arpit Gupta, Anisha Kumari, Ritik Raj, Akanksha Gupta, Raj Nath Shah, Tanmay Jaiswal, Arvind Mewada
:
AutIS: Artificial Intelligent Based Automated Interviewing System. 305-320 - Monsef Boughrous, Hanan El Bakkali, Asmaa El Kandoussi:
The Pandemic Impact on Organizations Security and Resiliency: The Workflow Satisfiability Problem. 321-329 - E. M. Roopa Devi, R. Rajadevi, Priyadharsini, Praveen, Sethuraj:
An Ensemble Approach for Predicting Intraocular Diseases Using Immune Mediator Levels. 330-343 - Tanjim Taharat Aurpa, Md. Shoaib Ahmed, Rifat Sadik
, Sabbir Anwar, Md Abdul Mazid Adnan, Md Musfique Anwar
:
Progressive Guidance Categorization Using Transformer-Based Deep Neural Network Architecture. 344-353 - Sarita Jibhau Wagh, Pradip M. Paithane
, S. N. Patil:
Applications of Fuzzy Logic in Assessment of Groundwater Quality Index from Jafrabad Taluka of Marathawada Region of Maharashtra State: A GIS Based Approach. 354-364 - Raihan Jamil, Mohammad Abdullah Al Nayeem Khan, Md Musfique Anwar
:
Topic Oriented Hate Speech Detection. 365-375 - Rahma Kadri, Mohamed Tmar, Bassem Bouaziz
, Faïez Gargouri
:
Alzheimer's Disease Detection Using Deep ECA-ResNet101 Network with DCGAN. 376-385 - Malak Saidi, Anis Tissaoui
, Djamal Benslimane, Sami Faïz:
Automatic Microservices Identification Across Structural Dependency. 386-395 - Luciano Azevedo de Souza
, Helder Gomes Costa
:
Managing the Conditions for Project Success: An Approach Using k-means Clustering. 396-406 - Hemlatha Pandey, Tejal Lalitkumar Karnavat, Mandadapu Naga Sai Sandilya, Shashwat Katiyar, Hemant Rathore:
Intrusion Detection System Based on Machine and Deep Learning Models: A Comparative and Exhaustive Study. 407-418 - Nishi Gandhi, Virendra Dani
, Mridula Geed, Prakrati Dashore, Naina Pandey:
FaMaDAS: Face Mask Detection and Alert System for COVID 19 Outbreaks. 419-428 - Barani Shaju, N. Valliammal:
An Advanced Deep Learning Approach for Nickel Price Prediction Model Evading Outliers Using Enhanced Multikernel LSTM. 429-441 - Ines Lahmar
, Aida Boussaada Zaier, Mohamed Yahia, Ridha Boaullègue:
A Multiple Fuzzy C-Means Ensemble Cluster Forest for Big Data. 442-451 - Miriam Shaba, Andeboutom Roland, John Simon, Sanjay Misra
, Foluso Ayeni
:
A Real-Time Sentimental Analysis on E-Commerce Sites in Nigeria Using Machine Learning. 452-462 - Joseph Bamidele Awotunde
, Sanjay Misra
, Foluso Ayeni
, Rytis Maskeliunas, Robertas Damasevicius:
Artificial Intelligence Based System for Bank Loan Fraud Prediction. 463-472 - Abiodun Kazeem Moses, Sanjay Misra
, Joseph Bamidele Awotunde
, Samson Adewole, Akor Joshua, Jonathan Oluranti:
Comparing the Performance of Various Supervised Machine Learning Techniques for Early Detection of Breast Cancer. 473-482 - Oluwasefunmi 'Tale Arogundade, Adeniyi Akanni, Sanjay Misra
, Abiodun Muyideen Mustapha, Kayode Ogunremi, Timothy Ayo, Jonathan Oluranti:
Psychotherapeutic Tool for Addressing Depression in Teenagers Through Video Games. 483-492
Information Assurance and Security
- Milena Boss, Lukas Kunz, Jasmin Wüthrich, Thomas Hanne
:
Teaching Encryption Algorithms with Serious Games. 495-507 - Nguyen Thi Ngan
, Bui Huy Khoi
:
Partial Least Squares Algorithm for Deciding on Buying Innisfree Cosmetics: Evidence from Vietnam. 508-516 - Leda Kamal
, R. Jeberson Retna Raj
:
Blockchain: A Compendium on Contemporary Privacy Preservation Approaches and Its Manifestation in Varied Realms. 517-529 - S. Jai Balaji, A. Karmel:
Detecting Vulnerabilities Using Open-Source Intelligence. 530-540 - Yamin Li, Wanming Chu:
Shift-Sub Modular Multiplication Algorithm and Hardware Implementation for RSA Cryptography. 541-552 - B. H. Shraddha, Bhagyashree Kinnal, Heera Wali
, Nalini C. Iyer, P. Vishal:
Lightweight Cryptography for Resource Constrained Devices. 553-564 - Virendra Dani
, Priyanka Kokate, Surbhi Kushwah, Swapnil Waghela:
Privacy Preserving Data Mining Technique to Secure Distributed Client Data. 565-574 - Archana V. Mire
, Shaveta Malik
, Srushti Jichkar
:
Tampering Localization Using Divergence in First Digit Probability Distribution. 575-584 - Dassine Djebara, Abdelmalek Mallek, Wahida Handouzi
:
Impact of Optimizers on a CNN Architecture for Anti-spoofing Goal. 585-594 - Mohamed Talha, Anas Abou El Kalam
:
Big Data: Towards a Collaborative Security System at the Service of Data Quality. 595-606 - Disha Sushant Wankhede, Shashwat Pandit, Nitin Metangale, Rutik Patre, Soham Kulkarni, Khan Arif Minaj:
Survey on Analyzing Tongue Images to Predict the Organ Affected. 607-614 - Ilaiah Kavati, G. Kiran Kumar, Mukkamula Venu Gopalachari
, Erukala Suresh Babu
, Ramalingaswamy Cheruku
, V. Dinesh Reddy
:
Non-invertible Cancellable Template for Fingerprint Biometric. 615-624 - Aswani Devi Aguru
, Erukala Suresh Babu
, Ilaiah Kavati:
Smart Contract Based Next-Generation Public Key Infrastructure (PKI) Using Permissionless Blockchain. 625-635 - Akshay Pillai
, Vishal Saraswat
, Arunkumar Vasanthakumary Ramachandran:
Protection Guidelines for Blockchain Based Digital Identity. 636-646 - Yoga Samudra, Tohari Ahmad
:
Improved Interpolation-Based Reversible Audio Data Hiding Using Sample Dispersion and Value Shifting. 647-656 - Senthil Kumar Arumugam
, Aarti Mehta Sharma
:
Role of Blockchain in the Healthcare Sector: Challenges, Opportunities and Its Uses in Covid-19 Pandemic. 657-666

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.