


default search action
FICTA 2021: Aizawl, India
- Vikrant Bhateja, Jinshan Tang, Suresh Chandra Satapathy, Peter Peer, Ranjita Das:

Evolution in Computational Intelligence - Proceedings of the 9th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA 2021), Aizawl, India, June 25-26, 2021. Smart Innovation, Systems and Technologies 267, Springer 2022, ISBN 978-981-16-6615-5 - Surabhi Solanki

, Seema Verma, Kishore Chahar:
A Comprehensive Study of Page-Rank Algorithm. 1-10 - NirmalKumar Patel, Falguni Patel, Santosh Kumar Bharti

:
Live Emotion Verifier for Chat Applications Using Emotional Intelligence. 11-19 - Chandravva Hebbi, J. S. Sooraj, H. R. Mamatha:

Text to Speech Conversion of Handwritten Kannada Words Using Various Machine Learning Models. 21-33 - Dadi Ramesh

, Suresh Kumar Sanampudi:
An Improved Approach for Automated Essay Scoring with LSTM and Word Embedding. 35-41 - Jatinderkumar R. Saini

, Prafulla Bharat Bafna:
RoMaPla: Using t-Test for Evaluating Robustness of Marathi Plagiarism. 43-51 - Kiran S. Raj

, Priyanka Kumar:
To Analyse the Impact of Water Scarcity in Developing Countries Using Machine Learning. 53-63 - Kumari Rinki, Pushpneel Verma, Ranjeet Kumar Singh:

A Novel Multiblock Region-Based Arnold Transformation for Image Watermarking Combined with DWT-PSO Technique. 77-87 - Bhumika Shah, Jyoti Pareek:

Automated Evaluation of SQL Queries: Eval_SQL. 89-104 - G. Jothi, J. Akilandeswari, S. David Samuel Azariya

, A. Naveenkumar
:
Unsupervised Feature Selection Approaches for Medical Dataset Using Soft Computing Techniques. 105-114 - Mohd. Nazim

, Chaudhary Wali Mohammad, Mohd. Sadiq
:
Fuzzy-Based Methods for the Selection and Prioritization of Software Requirements: A Systematic Literature Review. 115-129 - Soumen Maji

, Apurbalal Senapati
, Arunendu Mondal
:
Investigation and Validation of Flow Characteristics Through Emergent Vegetation Patch Using Machine Learning Technique. 131-139 - Sneha Kamble

, B. R. Chandavarkar
:
Analysis of the Standard Objective Functions of RPL. 141-149 - Debojyoti Sarkar, Anupam Biswas:

Comparative Performance Analysis of Recent Evolutionary Algorithms. 151-159 - Punam Prabha, Yash Janoria, Harsh Raj, Uday Patidar, Kakali Chatterjee:

Medical Image Protection Using Blockchain for E-healthcare System. 161-170 - Yamini Madan, Iswarya Kannoth Veetil

, Sowmya Vishvanathan
, Gopalakrishnan E. A, Soman K. P:
Synthetic Data Augmentation of MRI using Generative Variational Autoencoder for Parkinson's Disease Detection. 171-178 - T. E. Jisha

, Thomas Monoth:
Recursive Visual Cryptography Scheme with PRWP and Additional Basis Matrix. 179-190 - D. Malarvizhi, S. Padmavathi:

Mobility-Aware Application Placement for Obstacle Detection in UAM Using Fog Computing. 191-202 - R. Sangeethapriya, J. Akilandeswari:

Identify Twitter Data from Humans or Bots Using Machine Learning Algorithms with Kendalls Correlation. 203-212 - Apurbalal Senapati, Amitava Nag:

Neologism Related to COVID-19 Pandemic: A Corpus-Based Study for the Bengali Language. 213-222 - Rayachoti Eswaraiah, Tirumalasetty Sudhir:

Recovering ROI of Medical Image Through Curvelet Transform-Based Watermarking Method. 223-232 - Niharika Patel

, Arun Kumar Bhoi, Dilip Kumar Paika, Abinash Sahoo
, Nihar Ranjan Mohanta
, Sandeep Samantaray
:
Water Table Depth Forecasting Based on Hybrid Wavelet Neural Network Model. 233-242 - Abinash Sahoo

, Mrutyunjay Nayak, Rayudu Samuel Raju, Sandeep Samantaray
, Nihar Ranjan Mohanta
:
Application of RBFN and FFA for Flood Prediction: A Case Study. 243-253 - Aritra Bhuiya, Suresh Chandra Satapathy:

Improvements to Vanilla Implementation of Q-Learning Used in Path Planning of an Agent. 255-263 - A. Revathi, Bagathi Neharika, Gayathri G:

Emotion Recognition from Speech Using Multiple Features and Clusters. 265-277 - Shivansh Kumar, Aman Kumar, Bharti Ruhul Amin:

Healing Blocks: Blockchain Enabled Decentralized Web Application for Securing Medical Records. 279-290 - Anu Thomas, S. Sangeetha:

Knowledge Graph Based Question-Answering System for Effective Case Law Analysis. 291-300 - Pratyusa Mukherjee, Sudhansu Shekhar Patra, Swati Samantaray, Lalbihari Barik

, Rabindra Kumar Barik:
SCSF: Supply Chain Sustainability Framework by Bayesian Theory and Markov Model for Risk Analysis. 301-308 - Lalbihari Barik

, Sudhansu Shekhar Patra, Pratyusa Mukherjee, Jnyana Ranjan Mohanty, Rabindra Kumar Barik:
QH2O: Energy Efficient Task Scheduling Using Quasi Reflected Harris Hawks Algorithm in Fog Environment. 309-317 - Kuppa Sai Sri Teja, Thummala Vivekananda Reddy, Mourya Sashank, A. Revathi:

3D CNN Based Emotion Recognition Using Facial Gestures. 319-325 - Dipak Kumar Patra, Tapas Si

, Sukumar Mondal, Prakash Mukherjee:
Breast DCE-MRI Segmentation for Lesion Detection by Multilevel Thresholding Using Arithmetic Optimization Algorithm. 327-340 - Rushikesh Bedagkar, Amit D. Joshi, Suraj T. Sawant

:
Multi Classification of Brain Tumor Detection Using MRI Images: Deep Learning Approach. 341-348 - Subhadipta Chaudhury, Sandeep Samantaray

, Abinash Sahoo
, Binayini Bhagat, Chinmayee Biswakalyani, Deba Prakash Satapathy
:
Hybrid ANFIS-PSO Model for Monthly Precipitation Forecasting. 349-359 - Jash Jayesh Kothari, Sai Sandesh Racha, Joydeep Sengupta:

Performance of Deconvolution Network and UNET Network for Image Segmentation. 361-368 - Sylvia Encheva:

On Correlations Between Feedback on Project Proposals for External Financier Support and Final Marking. 369-376 - Sylvia Encheva:

Evaluation of Older Adults Fitness Level and Accomplishments with Fuzzy Similarity Relations and Data Analytics Techniques. 377-384 - U. Ramani, M. Thilagaraj, V. Mueeswaran:

Multimodal Biometrics Recognition Using Soft Computing. 385-393 - Rupali Sandip Kute, Alwin D. Anuse, Pranav Bhat:

Feature Based Transfer Learning for Kinship Verification. 395-400 - K. H. Salman

, Chakravarthy Bhagvati:
Unsupervised Document Binarization Via Disentangled Representation. 401-409 - D. Venkata Swetha Ramana

, T. Hanumantha Reddy
:
Detection of Online Hate in Social Media Platforms for Twitter Data: A Prefatory Step. 411-419 - D. Ajay

, P. Pon Hidaya David:
Exponential Similarity Measure for Spherical Fuzzy Sets and Its Application in Pattern Recognition. 421-428 - Anindita Desarkar, Ajanta Das:

Machine Learning Techniques to Analyze Pandemic-Induced Economic Outliers. 429-439 - J. Aldring

, D. Ajay
:
MABAC Method for Assessment of Cyber Security Technologies Under Fermatean Fuzzy Sets. 441-450 - Mayank Upadhyay, Jyoti Rawat, Srabanti Maji

:
Skin Cancer Image Classification Using Deep Neural Network Models. 451-460 - Anuja Jana Naik

, M. T. Gopalakrishna:
Application of Deep Learning in Detection of Covid-19 Face Mask. 461-472 - Pratima Sarkar, Sandeep Gurung, Sourav De:

Underwater Image Segmentation Using Fuzzy-Based Contrast Improvement and Partition-Based Thresholding Technique. 473-482 - Saurav Suman, Vamsi Deekshit Kanakavety, Ajay Venkatesh kattoju, Pradnya H. Ghare

:
Classification of EEG Signals for Seizure Detection Using Feature Selection and Channel Selection. 483-490 - Pratap Chandra Mandal, Imon Mukherjee

:
Index-Based Improved High Capacity Data Hiding Technique. 491-500 - Hrithik Aditya, Vishal Chawla, Rohit Maheswari, Avinash G. Keskar

:
IRIS Position-Based Wheelchair Maneuver Using Semantic Segmentation. 501-509 - Akarsh Raj, Surbhi Mahajan, Sachi Bundele, Punitkumar Bhavsar:

COVID-19 Social Distancing Surveillance System. 511-520 - Ningthoukhongjam Tutu Raja

, Khumanthem Manglem Singh
:
Secure and Efficient Text Encryption Using Elliptic Curve Cryptography. 521-529 - Sourav Mohanty, M. A. Lakshmi:

Masked Face Detection Using Transfer Learning. 531-539 - A. Ramesh, K. Pradeep Reddy, M. Sreenivas, Para Upendar:

Feature Selection Technique-Based Approach for Suggestion Mining. 541-549 - Balamurugan Gopalakrishnan

, Marcharla Anjaneyulu Bhagyaveni
:
Anti-Jamming Wireless Communication Using Chaos-Based Code Selection Spread Spectrum Technique. 551-559

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














