


default search action
19th HIS 2019: Bhopal, Indial
- Ajith Abraham, Shishir K. Shandilya, Laura García-Hernández, Maria Leonilde Varela

:
Hybrid Intelligent Systems - 19th International Conference on Hybrid Intelligent Systems (HIS 2019) held in Bhopal, India, December 10-12, 2019. Advances in Intelligent Systems and Computing 1179, Springer 2021, ISBN 978-3-030-49335-6 - Muhammad Ihsan Jambak, Ahmad Ikrom Izzuddin Jambak, Rahmad Tirta Febrianto, Danny Matthew Saputra, Muhammad Irfan Jambak:

Dimension Reduction with Extraction Methods (Principal Component Analysis - Self Organizing Map - Isometric Mapping) in Indonesian Language Text Documents Clustering. 1-9 - Maria do Carmo Nicoletti, Luis Andre Claudiano:

Reducing Data Volume in Instance Based Learning. 10-20 - Ankur Jain

, Binoy Krishna Roy:
State Estimation of Moving Vehicle Using Extended Kalman Filter: A Cyber Physical Aspect. 21-30 - Sana Trigui, Ines Boujelben, Salma Jamoussi

, Yassine Ben Ayed:
ADAL System: Aspect Detection for Arabic Language. 31-40 - Veera Babu Ramakurthi, Vijaya Kumar Manupati

, Suraj Panigrahi
, Maria Leonilde R. Varela
, Goran D. Putnik, P. S. C. Bose:
Modelling, Analysis and Simulation of a Patient Admission Problem: A Social Network Approach. 41-51 - Atul Patel, Monidipa Das

, Soumya K. Ghosh:
Short-Term Load Forecasting: An Intelligent Approach Based on Recurrent Neural Network. 52-62 - Prangshu Saikia, Ankur Jain

:
Design and Analysis of Anti-windup Techniques for Anti-lock Braking System. 63-71 - Ladislav Zjavka, Václav Snásel, Ajith Abraham:

Wind-Power Intra-day Statistical Predictions Using Sum PDE Models of Polynomial Networks Combining the PDE Decomposition with Operational Calculus Transforms. 72-82 - Yury Iskanderov

, Mikhail Pautov:
Heterogeneous Engineering in Intelligent Logistics. 83-91 - Prasanga Neupane, Archana Tuladhar, Shreeniwas Sharma, Ravi Tamang:

Extracting Unknown Repeated Pattern in Tiled Images. 92-102 - Mohamed Elleuch

, Monji Kherallah
:
Convolutional Deep Learning Network for Handwritten Arabic Script Recognition. 103-112 - Naina Yadav, Rajesh Kumar Mundotiya

, Anil Kumar Singh, Sukomal Pal:
Diversity in Recommendation System: A Cluster Based Approach. 113-122 - Zouhaira Noubigh, Anis Mezghani

, Monji Kherallah
:
Contribution on Arabic Handwriting Recognition Using Deep Neural Network. 123-133 - Ayshwarya Jaiswal, Vijay Kumar Dwivedi

, Om Prakash Yadav:
Analyzing and Enhancing Processing Speed of K-Medoid Algorithm Using Efficient Large Scale Processing Frameworks. 134-144 - Malika Ben Khalifa

, Zied Elouedi
, Eric Lefèvre
:
Multiple Criteria Fake Reviews Detection Based on Spammers' Indicators Within the Belief Function Theory. 145-155 - Tribhuvan Singh, Krishn Kumar Mishra

, Ranvijay
:
Data Clustering Using Environmental Adaptation Method. 156-164 - Keshav Srivastava, Dilip Kumar Choubey

:
Soft Computing, Data Mining, and Machine Learning Approaches in Detection of Heart Disease: A Review. 165-175 - Raouia Mokni

, Norhene Gargouri, Alima Damak Masmoudi, Dorra Sellami, Wiem Feki, Zaineb Mnif:
A Novel CAD System for Breast DCE-MRI Based on Textural Analysis Using Several Machine Learning Methods. 176-187 - Shounak Chakraborty, Indrajit Kalita

, Moumita Roy
:
An Adversarial Learning Mechanism for Dealing with the Class-Imbalance Problem in Land-Cover Classification. 188-196 - Rim Rekik

:
An Integrated Fuzzy ANP-TOPSIS Approach to Rank and Assess E-Commerce Web Sites. 197-209 - Pratik Thakare, Nitin Dighore, Ankit Chopkar, Aakash Chauhan, Diksha Bhagat, Milind Tote

:
Implementation of Block Chain Technology in Public Distribution System. 210-219 - Gillala Rekha, Vuyyuru Krishna Reddy

, Amit Kumar Tyagi:
Chaotic Salp Swarm Optimization Using SVM for Class Imbalance Problems. 220-229 - Nishant Kumar, Suyash Ghuge, C. D. Jaidhar:

Three-Layer Security for Password Protection Using RDH, AES and ECC. 230-239 - Mohamed Elleuch

, Anis Mezghani
, Mariem Khemakhem, Monji Kherallah
:
Clothing Classification Using Deep CNN Architecture Based on Transfer Learning. 240-248 - Amritanshu Pandey, I. Sumaiya Thaseen, Ch. Aswani Kumar

, Gang Li
:
Identification of Botnet Attacks Using Hybrid Machine Learning Models. 249-257 - Lokesh M. Giripunje

, Deepika Masand, Shishir Kumar Shandilya
:
Congestion Control in Vehicular Ad-Hoc Networks (VANET's): A Review. 258-267 - Shahana Gajala Qureshi

, Shishir Kumar Shandilya
:
Advances in Cyber Security Paradigm: A Review. 268-276 - Alok Kumar, Avjeet Singh

, Lekhraj, Anoj Kumar:
Weighted Mean Variant with Exponential Decay Function of Grey Wolf Optimizer on Applications of Classification and Function Approximation Dataset. 277-290 - Abhishek Mukherjee, Dhananjay Bisen

, Praneet Saurabh
, Lalit Kane
:
Enhanced Homomorphic Encryption Scheme with Particle Swarm Optimization for Encryption of Cloud Data. 291-298 - Dhananjay Bisen

, Bhavana Barmaiya, Ritu Prasad, Praneet Saurabh
:
Detection and Prevention of Black Hole Attack Using Trusted and Secure Routing in Wireless Sensor Network. 299-308 - Adhiraj Shetty, Annapurna Jonnalagadda, Aswani Kumar Cherukuri

:
Recursive Tangent Algorithm for Path Planning in Autonomous Systems. 309-318 - Diptee Chikmurge

, Raghunathan Shriram
:
Marathi Handwritten Character Recognition Using SVM and KNN Classifier. 319-327 - Nebojsa Bacanin

, Eva Tuba
, Miodrag Zivkovic
, Ivana Strumberger
, Milan Tuba
:
Whale Optimization Algorithm with Exploratory Move for Wireless Sensor Networks Localization. 328-338 - Sumeet Saurav

, Sanjay Singh, Ravi Saini:
Facial Expression Recognition Using Histogram of Oriented Gradients with SVM-RFE Selected Features. 339-349 - Asmaa El Kandoussi

, Hanan El Bakkali:
Automated Security Driven Solution for Inter-Organizational Workflows. 350-361 - Nilesh Kunhare, Ritu Tiwari, Joydip Dhar:

Network Packet Analysis in Real Time Traffic and Study of Snort IDS During the Variants of DoS Attacks. 362-375 - Sagar Rane, Sanjeev Wagh, Arati M. Dixit:

Securing Trustworthy Evidences for Robust Forensic Cloud in Spite of Multi-stakeholder Collusion Problem. 376-386 - Raj Kamal Kaur, Lalit Kumar Singh, Babita Pandey, Aditya Khamparia:

Threat-Driven Approach for Security Analysis: A Case Study with a Telemedicine System. 387-397 - Surbhi Chhabra

, Kusum Lata:
Key-Based Obfuscation Using Strong Physical Unclonable Function: A Secure Implementation. 398-408 - Sampsa Rauti:

A Survey on Countermeasures Against Man-in-the-Browser Attacks. 409-418 - Sampsa Rauti:

Towards Cyber Attribution by Deception. 419-428 - Hussein Hellani, Layth Sliman

, Motaz Ben Hassine
, Abed Ellatif Samhat
, Ernesto Exposito
, Mourad Kmimech:
Tangle the Blockchain: Toward IOTA and Blockchain Integration for IoT Environment. 429-440 - Sonia Amamou, Zied Trifa, Maher Khemakhem

:
Towards a Better Security in Public Cloud Computing. 441-453

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














