Linked e-resources

Details

Intro
Contents
The Sentiment Analysis for Hindi Language Using Convolution Neural Network and Deep Belief Network
1 Introduction
2 Related Work
3 Concept Behind Neural Networking
3.1 Convolutions Neural Network
4 Implementation
4.1 Tool Used
4.2 Working of the System
5 Experimental Setup
6 Result and Discussion
6.1 Comparison
7 Conclusion and Future Work
References
An Empirical Review on Brain Tumor Classification Approaches
1 Introduction
2 Review of Some Existing Methods
2.1 Brain tumor detection based on Machine-learning techniques

2.2 Brain Tumor Detection based on Fuzzy Approach
2.3 Brain Tumor Detection based on Ensemble-Learning Techniques
2.4 Brain Tumor Detection based on Hybrid Approach
2.5 Brain Tumor Detection based on Deep-Learning Techniques
3 Analysis and Discussion
3.1 Analysis Based on Dataset
3.2 Analysis based on Performance Metrics
4 Existing Gap and Challenges
4.1 Challenges Experienced in Deep Learning Techniques
4.2 Challenges Experienced in Machine Learning techniques
5 Conclusion
References
Obstacle Finding and Path Planning of Unmanned Vehicle by Hybrid Techniques

1 Introduction
2 A* Methodology
2.1 Parameters of A* Algorithm
3 Fuzzy-Logic Algorithm
4 Fuzzy Inference Parameter
4.1 Concept of Defuzzification
5 Concept of Hybrid A*-Fuzzy Controller
6 Analysis and Result of A*-Fuzzy Hybrid Controller
7 Conclusion and Future Work
References
Simulation of Internet of Things Network for Big Data Analytics
1 Introduction
2 Importance of Bigdata
3 Characteristics of Bigdata
3.1 Volume
3.2 Velocity
3.3 Variety
4 Data Analytics and its Types
4.1 Descriptive Analytics
4.2 Diagnostic Analysis

4.3 Predictive Analysis
4.4 Prescriptive Analysis
5 Data Analytics in IoT: Simulation using Contiki OS and Cooja Emulator
5.1 Data Analytics using Hadoop MapReduce
5.2 Data Collection
5.3 Data Loading
5.4 Data analysis
5.5 Knowledge Extraction
5.6 Input data
5.7 Mapreduce Implementation
6 Conclusion
References
Mirai Botnet Attacks on IoT Applications: Challenges and Controls
1 Introduction
2 Literature Survey
3 Internet of Things Layer Architecture
3.1 Application Layer
3.2 Middleware Layer
3.3 Network Layer
3.4 Perception Layer

4 IoT Applications
4.1 Smart Home
4.2 Smart City
4.3 Smart Agriculture
4.4 Smart Industry
4.5 Smart Transport
4.6 Smart Healthcare
5 Attacks on IoT Applications
5.1 Mirai Botnet
5.2 DDoS
5.3 Malicious Code Injection
5.4 Ransomware
6 Mirai Botnet Attacks on IoT
7 Detection Methods
7.1 Machine Learning
7.2 Cryptography
7.3 Bio-Inspired Computing Techniques
8 Bio-Inspired Computing Framework for IoT Botnet Attacks
9 Performance Evolution
10 Conclusion
References

Browse Subjects

Show more subjects...

Statistics

from
to
Export