default search action
MIND 2020: Silchar, India
- Arup Bhattacharjee, Samir Kumar Borgohain, Badal Soni, Gyanendra K. Verma, Xiao-Zhi Gao:
Machine Learning, Image Processing, Network Security and Data Sciences - Second International Conference, MIND 2020, Silchar, India, July 30-31, 2020, Proceedings, Part II. Communications in Computer and Information Science 1241, Springer 2020, ISBN 978-981-15-6317-1 - Rajkamal Sarma, Pankaj Kumar Deva Sarma:
Mining Composite Fuzzy Association Rules Among Nutrients in Food Recipe. 1-10 - Uppugunduru Anil Kumar, Nishant Jain, Sumit K. Chatterjee, Syed Ershad Ahmed:
Evaluation of Multiplier-Less DCT Transform Using In-Exact Computing. 11-23 - Nisarg Mistry, Maneesh Darisi, Rahul Singh, Meet Shah, Aditya Malshikhare:
Legal Amount Recognition in Bank Cheques Using Capsule Networks. 24-37 - Nagaraj Naik, Biju R. Mohan:
Log Periodic Power Law Fitting on Indian Stock Market. 38-43 - Kinjarapu Manojkumar, Srinivas Boppu, M. Sabarimalai Manikandan:
An Automated Algorithm for Estimating Respiration Rate from PPG Signals. 44-57 - Saritha Kinkiri, Basel Barakat, Simeon Keates:
Phonemes: An Explanatory Study Applied to Identify a Speaker. 58-68 - Zakir Hussain, Malaya Dutta Borah:
Nutritional Status Prediction in Neonate Using Machine Learning Techniques: A Comparative Study. 69-83 - Suprabhat Maity, Anirban Dey, Ankan Chowdhury, Abhijit Banerjee:
Handwritten Bengali Character Recognition Using Deep Convolution Neural Network. 84-92 - Bireswar Banik, Abhijit Sarma:
Lexical Feature Based Feature Selection and Phishing URL Classification Using Machine Learning Techniques. 93-105 - Jyoti Vashishtha, Vijay Hasan Puri, Mukesh:
Feature Selection Using PSO: A Multi Objective Approach. 106-119 - Md. Minhazul Islam, Shah Ashisul Abed Nipun, Majharul Islam, Md. Abdur Rakib Rahat, Jonayet Miah, Salsavil Kayyum, Anwar Shadaab, Faiz Al Faisal:
An Empirical Study to Predict Myocardial Infarction Using K-Means and Hierarchical Clustering. 120-130 - Nirupam Shome, Rabul Hussain Laskar, Richik Kashyap, Sivaji Bandyopadhyay:
A Robust Technique for End Point Detection Under Practical Environment. 131-144 - Priyanshu Kumar, Aadarsh Singh, Pramod Kumar, Chiranjeev Kumar:
An Explainable Machine Learning Approach for Definition Extraction. 145-155 - Chanambam Sveta Devi, Bipul Syam Purkayastha:
Steps of Pre-processing for English to Mizo SMT System. 156-167 - Raghav Kachhawaha, Pragya Gupta, Tushar Kansal, Amitava Chaudhary, Tanmay Bhowmik:
Efficient Human Feature Recognition Process Using Sclera. 168-181 - Lalengmawia Chhangte, Alok Chakrabarty:
Optimization of Local Ordering Technique for Nearest Neighbour Circuits. 182-192 - Candy Lalrempuii, Badal Soni:
Attention-Based English to Mizo Neural Machine Translation. 193-203 - Ishan Sen, Md. Ikbal Hossain, Md. Faisal Hossan Shakib, Md. Asaduzzaman Imran, Faiz Al Faisal:
In Depth Analysis of Lung Disease Prediction Using Machine Learning Algorithms. 204-213 - Abdelmegeid Amin Ali, Hassan Shaban Hassan, Eman M. Anwar:
Improve the Accuracy of Heart Disease Predictions Using Machine Learning and Feature Selection Techniques. 214-228 - Ungati Ganapathi, M. Sabarimalai Manikandan:
Convolutional Neural Network Based Sound Recognition Methods for Detecting Presence of Amateur Drones in Unauthorized Zones. 229-244 - Deepak Saraswat, Preetvanti Singh:
Comparison of Different Decision Tree Algorithms for Predicting the Heart Disease. 245-255 - Parabattina Bhagath, Megha Jain, Pradip K. Das:
Dynamic Speech Trajectory Based Parameters for Low Resource Languages. 256-270 - Manash Sarma, Subarna Chatterjee:
Identification and Prediction of Alzheimer Based on Biomarkers Using 'Machine Learning'. 271-284 - Manoj Kumar, Pinaki Mitra:
Solving Quadratic Assignment Problem Using Crow Search Algorithm in Accelerated Systems. 285-295 - Shubham Jain, Bhagath Parabattina, Pradip Kumar Das:
Speech Signal Analysis for Language Identification Using Tensors. 296-309 - Deepankar Nankani, Rashmi Dutta Baruah:
Effective Removal of Baseline Wander from ECG Signals: A Comparative Study. 310-324 - Bibek Majumder, Sharmistha Bhattacharya Halder:
Face Recognition Based on Human Sketches Using Fuzzy Minimal Structure Oscillation in the SIFT Domain. 325-335 - Santosh Rajak, Ujwala Baruah:
An Ensemble Model for Predicting Passenger Demand Using Taxi Data Set. 336-346 - Ujwala Baruah, N. Harini, Supraja Venkatesh, Khushbu Maloo, Rahul Debnath:
A Novel Approach to Synthesize Hinglish Text to English Text. 347-356 - Heena Kumari, Sunita Sarkar, Vikrant Rajput, Arindam Roy:
Comparative Analysis of Neural Models for Abstractive Text Summarization. 357-368 - Arun Kumar Rai, Rajendra Kumar Dwivedi:
Fraud Detection in Credit Card Data Using Machine Learning Techniques. 369-382 - Ashish Kumar, Raied Razi, Anshul Singh, Himansu Das:
Res-VGG: A Novel Model for Plant Disease Detection by Fusing VGG16 and ResNet Models. 383-400 - Rajesh Kumar Tripathi:
A Novel Algorithm for Salient Region Detection. 401-410 - Maibam Debina Devi, Navanath Saharia:
Exploiting Topic Modelling to Classify Sentiment from Lyrics. 411-423 - Pallabi Patowary, Dhruba K. Bhattacharyya:
Crucial Gene Identification for Esophageal Squamous Cell Carcinoma Using Differential Expression Analysis. 424-436 - Ranjeet Kumar, Agya Ram Verma, Manoj Kumar Panda, Papendra Kumar:
HRV Signal Feature Estimation and Classification for Healthcare System Based on Machine Learning. 437-448 - Saumya Shankar, Jitendra Madarkar, Poonam Sharma:
Securing Face Recognition System Using Blockchain Technology. 449-460 - Pankaj Kumar Keserwani, Mahesh Chandra Govil:
A Hybrid Symmetric Key Cryptography Method to Provide Secure Data Transmission. 461-474 - Amit Kumar Roy, Ajoy Kumar Khan, Hridoy Jyoti Mahanta:
Trust-Based Detection of Malicious Nodes for Wireless Mesh Networks. 475-485 - Pankaj Kumar Keserwani, Mahesh Chandra Govil, Emmanuel Shubhakar Pilli:
Evidence Building for Ad Click or Web Access on Cloud. 486-500 - Debasish Deb, Sagorika Raj Chakraborty, Lagineni Mahendra, Kirani Singh:
Security Analysis of MITM Attack on SCADA Network. 501-512 - Md. Omar Faruque Khan Russel, Sheikh Shah Mohammad Motiur Rahman, Takia Islam:
A Large-Scale Investigation to Identify the Pattern of App Component in Obfuscated Android Malwares. 513-526 - Kushal Kanwar, Sakshi Kaushal, Harish Kumar:
An AHP-TOPSIS Based Framework for the Selection of Node Ranking Techniques in Complex Networks. 527-542 - Saijshree Srivastava, Shiva Prakash:
Security Enhancement of IoT Based Smart Home Using Hybrid Technique. 543-558 - Malvika Singh, B. M. Mehtre, S. Sangeetha:
Insider Threat Detection Based on User Behaviour Analysis. 559-574 - Krishna Reddy, Irani Acharjamayum, Arup Bhattacharjee:
Layer-2 Performance Analysis of LTE-A and HetNets for 5G Networks. 575-587 - Khem Prosad Sharma, Arup Bhattacharjee:
Placement Issues in Network Function Virtualization. 588-599 - Kaushik Ravichandran, Lalit Gattani, Advithi Nair, Bhaskarjyoti Das:
A Novel Graph Based Approach to Predict Man of the Match for Cricket. 600-611 - Dharminder Dharminder, Dheerendra Mishra:
Construction of Identity Based Signcryption Using Learning with Rounding. 612-626 - Prakhyat G. Kulkarni, S. Y. Praneet, R. B. Raghav, Bhaskarjyoti Das:
Deep Detection of Anomalies in Static Attributed Graph. 627-640
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.