{"title":"Hierarchical Language Modeling for Dense Video Captioning","authors":"Jaivik Dave, S. Padmavathi","doi":"10.1007/978-981-16-6723-7_32","DOIUrl":"https://doi.org/10.1007/978-981-16-6723-7_32","url":null,"abstract":"","PeriodicalId":183104,"journal":{"name":"Inventive Computation and Information Technologies","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114853059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Development of Smart Charger for Automotive Application","authors":"K. Vinutha, A. Usha, P. Jayaraman","doi":"10.1007/978-981-16-6723-7_43","DOIUrl":"https://doi.org/10.1007/978-981-16-6723-7_43","url":null,"abstract":"","PeriodicalId":183104,"journal":{"name":"Inventive Computation and Information Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132821419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection Using Deep Learning","authors":"Sanjay Patidar, Inderpreet Singh Bains","doi":"10.1007/978-981-33-4305-4_10","DOIUrl":"https://doi.org/10.1007/978-981-33-4305-4_10","url":null,"abstract":"","PeriodicalId":183104,"journal":{"name":"Inventive Computation and Information Technologies","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133500764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Approach Toward Security of Web Application Using SQL Attack Detection and Prevention Technique","authors":"Vishal Bharati, Arun Kumar","doi":"10.1007/978-981-16-6723-7_58","DOIUrl":"https://doi.org/10.1007/978-981-16-6723-7_58","url":null,"abstract":"","PeriodicalId":183104,"journal":{"name":"Inventive Computation and Information Technologies","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129862031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Shreyashree, Pramod Sunagar, S. Rajarajeswari, A. Kanavalli
{"title":"A Literature Review on Bidirectional Encoder Representations from Transformers","authors":"S. Shreyashree, Pramod Sunagar, S. Rajarajeswari, A. Kanavalli","doi":"10.1007/978-981-16-6723-7_23","DOIUrl":"https://doi.org/10.1007/978-981-16-6723-7_23","url":null,"abstract":"","PeriodicalId":183104,"journal":{"name":"Inventive Computation and Information Technologies","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128475633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Real-Time Approach of Fall Detection and Rehabilitation in Elders Using Kinect Xbox 360 and Supervised Machine Learning Algorithm","authors":"V. Muralidharan, V. Vijayalakshmi","doi":"10.1007/978-981-16-6723-7_10","DOIUrl":"https://doi.org/10.1007/978-981-16-6723-7_10","url":null,"abstract":"","PeriodicalId":183104,"journal":{"name":"Inventive Computation and Information Technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130457521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prevention of Phishing Attacks Using QR Code Safe Authentication","authors":"M. Taraka Rama Mokshagna Teja, K. Praveen","doi":"10.1007/978-981-16-6723-7_27","DOIUrl":"https://doi.org/10.1007/978-981-16-6723-7_27","url":null,"abstract":"","PeriodicalId":183104,"journal":{"name":"Inventive Computation and Information Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133508424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Trojan Detection at Behavioral Level Using Inline Assertions and Verification Using UVM","authors":"A. V. Krishna, E. Prabhu","doi":"10.1007/978-981-16-6723-7_2","DOIUrl":"https://doi.org/10.1007/978-981-16-6723-7_2","url":null,"abstract":"","PeriodicalId":183104,"journal":{"name":"Inventive Computation and Information Technologies","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123530654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalability Challenges and Solutions in Blockchain Technology","authors":"K. Harshini Poojaa, S. Ganesh Kumar","doi":"10.1007/978-981-16-6723-7_44","DOIUrl":"https://doi.org/10.1007/978-981-16-6723-7_44","url":null,"abstract":"","PeriodicalId":183104,"journal":{"name":"Inventive Computation and Information Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Siddiqui, Sudhanshu Chavan, Sana Fatima Ansari, P. Bhavathankar
{"title":"Localization and Multi-label Classification of Thoracic Diseases Using Deep Learning","authors":"A. Siddiqui, Sudhanshu Chavan, Sana Fatima Ansari, P. Bhavathankar","doi":"10.1007/978-981-16-6723-7_24","DOIUrl":"https://doi.org/10.1007/978-981-16-6723-7_24","url":null,"abstract":"","PeriodicalId":183104,"journal":{"name":"Inventive Computation and Information Technologies","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114534493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}