{"title":"Prediction of the Water Cut with the Hybrid Optimized SVR","authors":"Shaowei Pan, Yuhui Mou, Zechen Zheng","doi":"10.1007/978-981-19-1166-8_1","DOIUrl":"https://doi.org/10.1007/978-981-19-1166-8_1","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121797251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Pal, Upasana Mandal, Abhijit Das, D. R. Chowdhury
{"title":"Deep Learning Based Differential Classifier of PRIDE and RC5","authors":"D. Pal, Upasana Mandal, Abhijit Das, D. R. Chowdhury","doi":"10.1007/978-981-99-2264-2_4","DOIUrl":"https://doi.org/10.1007/978-981-99-2264-2_4","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123975672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Tripti, R. Manoj, P. B. Rinsha, Megha Suresh, Niya Jain, Tanya Sunish
{"title":"Cosine Similarity Based Group Movie Recommendation Scheme Considering Privacy of Users","authors":"C. Tripti, R. Manoj, P. B. Rinsha, Megha Suresh, Niya Jain, Tanya Sunish","doi":"10.1007/978-981-99-2264-2_10","DOIUrl":"https://doi.org/10.1007/978-981-99-2264-2_10","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124017938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RTOS Based Embedded Solution for Multi-purpose Radio Frequency Communication","authors":"Meghang Nagavekar, Arthur Gomes, Srikanth Prabhu","doi":"10.1007/978-981-19-1166-8_13","DOIUrl":"https://doi.org/10.1007/978-981-19-1166-8_13","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129972218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shujuan Chen, Zhenjia Wang, Liping Liu, Yang Liu, Hu Chen, X. Tang
{"title":"A Framework Based Isolation Forest for Detecting Anomalies in Natural Gas Production","authors":"Shujuan Chen, Zhenjia Wang, Liping Liu, Yang Liu, Hu Chen, X. Tang","doi":"10.1007/978-981-19-1166-8_8","DOIUrl":"https://doi.org/10.1007/978-981-19-1166-8_8","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126362937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cognitive Artificial Intelligence Computing Modeling Process in Meta Cognitive Architecture Carina","authors":"Ojaswi Bhimineni, G. Abhijith, Srikanth Prabhu","doi":"10.1007/978-981-19-1166-8_5","DOIUrl":"https://doi.org/10.1007/978-981-19-1166-8_5","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133552570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Sumalatha, K. Prakasha, Srikanth Prabhu, Vinod C. Nayak
{"title":"Analysis of Classification Algorithms for Predicting Parkinson's Disease and Applications in the Field of Cybersecurity","authors":"U. Sumalatha, K. Prakasha, Srikanth Prabhu, Vinod C. Nayak","doi":"10.1007/978-981-99-2264-2_13","DOIUrl":"https://doi.org/10.1007/978-981-99-2264-2_13","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127990244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices","authors":"Anjali J. Suresh, S. Sankaran","doi":"10.1007/978-981-33-4706-9_1","DOIUrl":"https://doi.org/10.1007/978-981-33-4706-9_1","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121059791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Balachandra, N. Sumith, Sriraksha Nayak, Namratha Prabhu
{"title":"Risk Prediction in Real Estate Investment to Protect Against Asset Bubbles","authors":"Balachandra, N. Sumith, Sriraksha Nayak, Namratha Prabhu","doi":"10.1007/978-981-19-1166-8_4","DOIUrl":"https://doi.org/10.1007/978-981-19-1166-8_4","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115877866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis on Classification of Handwritten Devanagari Characters Using Deep Learning Models","authors":"Sai Prashanth Duddela, Senthil Kumaran, P. Kamath","doi":"10.1007/978-981-99-2264-2_18","DOIUrl":"https://doi.org/10.1007/978-981-99-2264-2_18","url":null,"abstract":"","PeriodicalId":127302,"journal":{"name":"International Conference on Applications and Techniques in Information Security","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127242554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}