Designing a Smart and Intelligent Ecosystem for Autistic Children
In this paper, we discuss the usage of smart and machine learning based model to aid
children with autism. Children with autism require constant care because you never know …
children with autism. Children with autism require constant care because you never know …
Medi-Assist: A Decision Tree based Chronic Diseases Detection Model
A Srivastava, S Samanta, S Mishra… - 2023 4th …, 2023 - ieeexplore.ieee.org
Rise of predictive techniques have changed the manner we deal with disease diagnosis in
healthcare domain. Earlier detail analysis of patient data records was done for disease …
healthcare domain. Earlier detail analysis of patient data records was done for disease …
[HTML][HTML] Decentralized content sharing in mobile ad-hoc networks: A survey
The evolution of smart mobile devices has significantly impacted the way we generate and
share contents and introduced a huge volume of Internet traffic. To address this issue and …
share contents and introduced a huge volume of Internet traffic. To address this issue and …
Resumate: A prototype to enhance recruitment process with NLP based resume parsing
S Mohanty, A Behera, S Mishra… - 2023 4th …, 2023 - ieeexplore.ieee.org
The process of reviewing resumes takes time. The unstructured written language can be
understood and parsed by natural language processing and machine learning, which can …
understood and parsed by natural language processing and machine learning, which can …
Climatic Temperature Forecasting with Regression Approach
The research study centers on the use of regression technique to predict climate change
variation. Living beings on the planet are on a high risk due to the abnormal changes in the …
variation. Living beings on the planet are on a high risk due to the abnormal changes in the …
A trusted distributed routing scheme for wireless sensor networks using blockchain and meta‐heuristics‐based deep learning technique
The wireless sensor network (WSN) with fluctuating environs might be susceptible to diverse
types of malicious cyber‐attacks, and they are mostly dependent on the authentication and …
types of malicious cyber‐attacks, and they are mostly dependent on the authentication and …
Simulative survey of flooding attacks in intermittently connected vehicular delay tolerant networks
Vehicular Adhoc Networks (VANETs) are an emerging and promising technology that
enables vehicles to communicate with roadside units (RSUs) and other vehicles. VANETs …
enables vehicles to communicate with roadside units (RSUs) and other vehicles. VANETs …
A comparative study of resnet50, efficientnetb7, inceptionv3, vgg16 models in crop and weed classification
With the growing technology and the use of the same in the field of farming, it is becoming
imperative that technology be used in the classification of crops and weeds as it is a growing …
imperative that technology be used in the classification of crops and weeds as it is a growing …
Application of fountain code to high-rate delay tolerant networks
NP Douglass, J Langel, WJ Moore, L Ng… - IEEE …, 2023 - ieeexplore.ieee.org
Space communication poses several unique challenges that are not always present in
typical terrestrial communications. Currently, communication with satellites is based on point …
typical terrestrial communications. Currently, communication with satellites is based on point …
Effects of Quantum computing on Businesses
S Gupta, V Sharma - 2023 4th International Conference on …, 2023 - ieeexplore.ieee.org
This study examines the effect of quantum computing on businesses. The study begins by
providing an overview of quantum computing and its main features. Also discusses the …
providing an overview of quantum computing and its main features. Also discusses the …