


default search action
5th MIND 2023: Hamirpur, India
- Naveen Chauhan, Divakar Yadav, Gyanendra K. Verma, Badal Soni

, Jorge Luis Morato Lara:
Machine Learning, Image Processing, Network Security and Data Sciences - 5th International Conference, MIND 2023, Hamirpur, India, December 21-22, 2023, Revised Selected Papers. Communications in Computer and Information Science 2128, Springer 2024, ISBN 978-3-031-62216-8
Machine Learning
- Sahil Chawla, Deepanshu Yadav, Santosh, Ashish Kumar, Divya Gupta, Shampa Chakraverty:

SynText - Data Augmentation Algorithm in NLP to Improve Performance of Emotion Classifiers. 3-14 - Tushar Bhatia, Madhulika Bhaduria, Subash Chand Gupta:

Internet of Medical Things: Empowering Mobility and Health Monitoring with a Smart Walking Stick. 15-27 - S. Harshanandhini, J. Aravinth:

MRI Based Spatio-Temporal Model for Alzheimer's Disease Prediction. 28-44 - Babita Pathik, Rajeev Kumar Gupta, Nikhlesh Pathik:

Comparative Analysis of Economy-Based Multivariate Oil Price Prediction Using LSTM. 45-54 - Ishaan Mehta, Santosh Kumar Bharti, Rajeev Kumar Gupta:

Deep Learning Based EV's Charging Network Management. 55-62 - Dhvanil Bhagat, Shrey Shah, Rajeev Kumar Gupta:

Crop Yield Prediction Using Machine Learning Approaches. 63-74 - Abisek Dahal, Oyshi Pronomy Sarker, Jahnavi Kashyap, Rakesh Kumar Gupta, Sheli Sinha Chaudhuri, Soumen Moulik:

Detection and Classification of Waste Materials Using Deep Learning Techniques. 75-85 - Nairita Sarkar, Pankaj Kumar Keserwani, Mahesh Chandra Govil:

A Comparative Analysis of ML Based Approaches for Identifying AQI Level. 86-97 - Sudesh Rani, Saptarshi Mazumdar, Mayank Gupta:

Marker-Based Augmented Reality Application in Education Domain. 98-109 - Divya Singh, Sonam Gupta, Rekha Baghel:

Hate Speech Detection Using Machine Learning and Deep Learning Techniques. 110-124 - Chandra Kumar Mete, C. D. Jaidhar:

Phishing Detection Using 1D-CNN and FF-CNN Models Based on URL of the Website. 125-139 - Dharna Choudhary, Pradeep Gupta, Sonam Gupta:

Diabetes Prediction Using Machine Learning Classifiers. 140-148 - Nitin Benjamin Dasiah, Ritu Gain, V. Sabarisrinivas, K. Sitara:

A Deep Learning Method for Obfuscated Android Malware Detection. 149-164 - Mayur Wankhade, Nehal Jain, Annavarapu Chandra Sekhara Rao:

Code-Mixed Language Understanding Using BiLSTM-BERT Multi-attention Fusion Mechanism. 165-172 - NandaKiran Velaga, Deepak Singh:

The Potential of 1D-CNN for EEG Mental Attention State Detection. 173-185 - Raj Kumar, Tushar Agrawal, Vinayak Dhar Dwivedi, Harsh Khatter:

Potato Leaf Disease Classification Using Deep Learning Model. 186-200 - Deepak Rai, Tripti Mishra:

Breast Cancer Detection: An Evaluation of Machine Learning, Ensemble Learning, and Deep Learning Algorithms. 201-210 - Sidharth Sharma, Prabhat Verma, Raghuraj Singh, Khushboo Tripathi:

Advancements in Facial Expression Recognition: A Comprehensive Analysis of Techniques. 211-223
Image Processing
- Amit Soni Arya, Susanta Mukhopadhyay:

Sparse Representation with Residual Learning Model for Medical Image Classification. 227-238 - Abisek Dahal, Abu Motaleb Rony, Soumen Moulik:

COVID-19 Detection from Chest X-Ray Images Using GBM with Comparative Analysis. 239-247 - R. Aravinth, T. Shashwat, V. Yeshwanth, K. Sitara:

Violence Detection in Indoor Domestic Environment Using Multimodal Information. 248-259 - Vikas Bhatt, Ratnakar Dash:

Real-Time Hand Gesture Recognition for American Sign Language Using CNN, Mediapipe and Convexity Approach. 260-271 - K. Harikrishna, S. K. Tripathy:

Compressors Using Modified Sorting and Parallel Counting. 272-280 - R. Anusha, C. D. Jaidhar:

Speed-Invariant Gait Recognition Using Correlation Factor Lists for Classroom Attendance Systems. 281-290
Network Security
- Aschalew Tirulo, Siddhartha Chauhan, Mathewos Lolamo, Tamirat Tagesse:

A Novel Unsupervised Learning Approach for False Data Injection Attack Detection in Smart Grid. 293-308 - Upendra Verma:

A Review of Authentication Schemes in Internet of Things. 309-322 - Habibur Rahman, Kazi Md. Rokibul Alam, Yasuhiko Morimoto:

A Multi-stage Encryption Technique Using Asymmetric and Various Symmetric Ciphers. 323-335
Data Sciences
- Vibhavari Kamble, Yashodhara Haribhakta:

Bridging the Gap: Condensing Knowledge Graphs for Metaphor Processing by Visualizing Relationships in Figurative and Literal Expressions. 339-351 - Paras Jeena, Santoshi Sengupta, Mohit Joshi:

Effectiveness of Influencer Marketing on Gen Z Consumers. 352-361

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














