default search action
19th HIS 2019: Bhopal, Indial
- Ajith Abraham, Shishir K. Shandilya, Laura García-Hernández, Maria Leonilde Varela:
Hybrid Intelligent Systems - 19th International Conference on Hybrid Intelligent Systems (HIS 2019) held in Bhopal, India, December 10-12, 2019. Advances in Intelligent Systems and Computing 1179, Springer 2021, ISBN 978-3-030-49335-6 - Muhammad Ihsan Jambak, Ahmad Ikrom Izzuddin Jambak, Rahmad Tirta Febrianto, Danny Matthew Saputra, Muhammad Irfan Jambak:
Dimension Reduction with Extraction Methods (Principal Component Analysis - Self Organizing Map - Isometric Mapping) in Indonesian Language Text Documents Clustering. 1-9 - Maria do Carmo Nicoletti, Luis Andre Claudiano:
Reducing Data Volume in Instance Based Learning. 10-20 - Ankur Jain, Binoy Krishna Roy:
State Estimation of Moving Vehicle Using Extended Kalman Filter: A Cyber Physical Aspect. 21-30 - Trigui Sana, Ines Boujelben, Salma Jamoussi, Yassine Ben Ayed:
ADAL System: Aspect Detection for Arabic Language. 31-40 - Veera Babu Ramakurthi, Vijaya Kumar Manupati, Suraj Panigrahi, Maria Leonilde R. Varela, Goran D. Putnik, P. S. C. Bose:
Modelling, Analysis and Simulation of a Patient Admission Problem: A Social Network Approach. 41-51 - Atul Patel, Monidipa Das, Soumya K. Ghosh:
Short-Term Load Forecasting: An Intelligent Approach Based on Recurrent Neural Network. 52-62 - Prangshu Saikia, Ankur Jain:
Design and Analysis of Anti-windup Techniques for Anti-lock Braking System. 63-71 - Ladislav Zjavka, Václav Snásel, Ajith Abraham:
Wind-Power Intra-day Statistical Predictions Using Sum PDE Models of Polynomial Networks Combining the PDE Decomposition with Operational Calculus Transforms. 72-82 - Yury Iskanderov, Mikhail Pautov:
Heterogeneous Engineering in Intelligent Logistics. 83-91 - Prasanga Neupane, Archana Tuladhar, Shreeniwas Sharma, Ravi Tamang:
Extracting Unknown Repeated Pattern in Tiled Images. 92-102 - Mohamed Elleuch, Monji Kherallah:
Convolutional Deep Learning Network for Handwritten Arabic Script Recognition. 103-112 - Naina Yadav, Rajesh Kumar Mundotiya, Anil Kumar Singh, Sukomal Pal:
Diversity in Recommendation System: A Cluster Based Approach. 113-122 - Zouhaira Noubigh, Anis Mezghani, Monji Kherallah:
Contribution on Arabic Handwriting Recognition Using Deep Neural Network. 123-133 - Ayshwarya Jaiswal, Vijay Kumar Dwivedi, Om Prakash Yadav:
Analyzing and Enhancing Processing Speed of K-Medoid Algorithm Using Efficient Large Scale Processing Frameworks. 134-144 - Malika Ben Khalifa, Zied Elouedi, Eric Lefèvre:
Multiple Criteria Fake Reviews Detection Based on Spammers' Indicators Within the Belief Function Theory. 145-155 - Tribhuvan Singh, Krishn Kumar Mishra, Ranvijay:
Data Clustering Using Environmental Adaptation Method. 156-164 - Keshav Srivastava, Dilip Kumar Choubey:
Soft Computing, Data Mining, and Machine Learning Approaches in Detection of Heart Disease: A Review. 165-175 - Raouia Mokni, Norhene Gargouri, Alima Damak Masmoudi, Dorra Sellami, Wiem Feki, Zaineb Mnif:
A Novel CAD System for Breast DCE-MRI Based on Textural Analysis Using Several Machine Learning Methods. 176-187 - Shounak Chakraborty, Indrajit Kalita, Moumita Roy:
An Adversarial Learning Mechanism for Dealing with the Class-Imbalance Problem in Land-Cover Classification. 188-196 - Rim Rekik:
An Integrated Fuzzy ANP-TOPSIS Approach to Rank and Assess E-Commerce Web Sites. 197-209 - Pratik Thakare, Nitin Dighore, Ankit Chopkar, Aakash Chauhan, Diksha Bhagat, Milind Tote:
Implementation of Block Chain Technology in Public Distribution System. 210-219 - Gillala Rekha, Vuyyuru Krishna Reddy, Amit Kumar Tyagi:
Chaotic Salp Swarm Optimization Using SVM for Class Imbalance Problems. 220-229 - Nishant Kumar, Suyash Ghuge, C. D. Jaidhar:
Three-Layer Security for Password Protection Using RDH, AES and ECC. 230-239 - Mohamed Elleuch, Anis Mezghani, Mariem Khemakhem, Monji Kherallah:
Clothing Classification Using Deep CNN Architecture Based on Transfer Learning. 240-248 - Amritanshu Pandey, I. Sumaiya Thaseen, Ch. Aswani Kumar, Gang Li:
Identification of Botnet Attacks Using Hybrid Machine Learning Models. 249-257 - Lokesh M. Giripunje, Deepika Masand, Shishir Kumar Shandilya:
Congestion Control in Vehicular Ad-Hoc Networks (VANET's): A Review. 258-267 - Shahana Gajala Qureshi, Shishir Kumar Shandilya:
Advances in Cyber Security Paradigm: A Review. 268-276 - Alok Kumar, Avjeet Singh, Lekhraj, Anoj Kumar:
Weighted Mean Variant with Exponential Decay Function of Grey Wolf Optimizer on Applications of Classification and Function Approximation Dataset. 277-290 - Abhishek Mukherjee, Dhananjay Bisen, Praneet Saurabh, Lalit Kane:
Enhanced Homomorphic Encryption Scheme with Particle Swarm Optimization for Encryption of Cloud Data. 291-298 - Dhananjay Bisen, Bhavana Barmaiya, Ritu Prasad, Praneet Saurabh:
Detection and Prevention of Black Hole Attack Using Trusted and Secure Routing in Wireless Sensor Network. 299-308 - Adhiraj Shetty, Annapurna Jonnalagadda, Aswani Kumar Cherukuri:
Recursive Tangent Algorithm for Path Planning in Autonomous Systems. 309-318 - Diptee Chikmurge, Raghunathan Shriram:
Marathi Handwritten Character Recognition Using SVM and KNN Classifier. 319-327 - Nebojsa Bacanin, Eva Tuba, Miodrag Zivkovic, Ivana Strumberger, Milan Tuba:
Whale Optimization Algorithm with Exploratory Move for Wireless Sensor Networks Localization. 328-338 - Sumeet Saurav, Sanjay Singh, Ravi Saini:
Facial Expression Recognition Using Histogram of Oriented Gradients with SVM-RFE Selected Features. 339-349 - Asmaa El Kandoussi, Hanan El Bakkali:
Automated Security Driven Solution for Inter-Organizational Workflows. 350-361 - Nilesh Kunhare, Ritu Tiwari, Joydip Dhar:
Network Packet Analysis in Real Time Traffic and Study of Snort IDS During the Variants of DoS Attacks. 362-375 - Sagar Rane, Sanjeev Wagh, Arati M. Dixit:
Securing Trustworthy Evidences for Robust Forensic Cloud in Spite of Multi-stakeholder Collusion Problem. 376-386 - Raj Kamal Kaur, Lalit Kumar Singh, Babita Pandey, Aditya Khamparia:
Threat-Driven Approach for Security Analysis: A Case Study with a Telemedicine System. 387-397 - Surbhi Chhabra, Kusum Lata:
Key-Based Obfuscation Using Strong Physical Unclonable Function: A Secure Implementation. 398-408 - Sampsa Rauti:
A Survey on Countermeasures Against Man-in-the-Browser Attacks. 409-418 - Sampsa Rauti:
Towards Cyber Attribution by Deception. 419-428 - Hussein Hellani, Layth Sliman, Motaz Ben Hassine, Abed Ellatif Samhat, Ernesto Exposito, Mourad Kmimech:
Tangle the Blockchain: Toward IOTA and Blockchain Integration for IoT Environment. 429-440 - Sonia Amamou, Zied Trifa, Maher Khemakhem:
Towards a Better Security in Public Cloud Computing. 441-453
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.