Search Results - "2022 IEEE 7th International conference for Convergence in Technology (I2CT)"

Refine Results
  1. 1

    Convolutional Neural Network Based Partial Face Detection by Islam, Md. Towfiqul, Ahmed, Tanzim, Raihanur Rashid, A. B. M., Islam, Taminul, Rahman, Md. Sadekur, Tarek Habib, Md

    “…Due to the massive explanation of artificial intelligence, machine learning technology is being used in various areas of our day-to-day life. In the world,…”
    Get full text
    Conference Proceeding
  2. 2

    Topic Modelling on Consumer Financial Protection Bureau Data: An Approach Using BERT Based Embeddings by Vasudeva Raju, S., Kumar Bolla, Bharath, Nayak, Deepak Kumar, Kh, Jyothsna

    “…Customers' reviews and comments are important for businesses to understand users' sentiment about the products and services. However, this data needs to be…”
    Get full text
    Conference Proceeding
  3. 3

    MKRF Stacking-Voting: A Data Mining Technique for Predicting Educational Satisfaction Level of Bangladeshis Student During Pandemic by Imam Bijoy, Md. Hasan, Pramanik, Anik, Rahman, Md. Sadekur, Hasan, Mehedi, Akhi, Sumiya Alam, Rahman, Md. Mahbubur

    “…Data mining is most efficient when used deliberately to achieve a corporate goal, answer business or research questions, or contribute to a problem-solving…”
    Get full text
    Conference Proceeding
  4. 4

    Anomaly Based Network Intrusion Detection for IoT Attacks using Convolution Neural Network by Sharma, Bhawana, Sharma, Lokesh, Lal, Chhagan

    “…IoT is widely used in many fields, and with the expansion of the network and increment of devices, there is the dynamic growth of data in IoT systems, making…”
    Get full text
    Conference Proceeding
  5. 5

    Design Study of DC-DC Fractional-Order Boost-Converter using Fractional-Capacitor by Swain, Sumit, Mohapatra, Deepamjyoti, Tripathy, Madhab Chandra, Behera, Sribatsa

    “…In this paper, Fractional-order DC-DC Boost converter is modelled mathematically and designed in MATLAB (Simulink). Here, the duty-cycle of the boost-converter…”
    Get full text
    Conference Proceeding
  6. 6

    Focal-WNet: An Architecture Unifying Convolution and Attention for Depth Estimation by Manimaran, Gouthamaan, Swaminathan, J

    “…Extracting depth information from a single RGB image is a fundamental and challenging task in computer vision with wide-ranging applications. This task cannot…”
    Get full text
    Conference Proceeding
  7. 7

    Prediction of Depression, Anxiety and Stress Levels Using Dass-42 by Srinath, K S, Kiran, K, Pranavi, S, Amrutha, M, Shenoy, P Deepa, Venugopal, K R

    “…Over the past few decades, many people are suffering from psychological health issues such as anxiety, depression, and stress. It is crucial to detect mental…”
    Get full text
    Conference Proceeding
  8. 8

    Designing a Framework of an Integrated Network and Security Operation Center: A Convergence Approach by Shahjee, Deepesh, Ware, Nilesh

    “…Cyber-security incidents have grown significantly in modern networks, far more diverse and highly destructive and disruptive. According to the 2021 Cyber…”
    Get full text
    Conference Proceeding
  9. 9

    Intelligent Dynamic Routing Decisions in Ubiquitous Network by Chavan, Chandrashekhar Pomu

    “…In this article, we designed AODV Route Establishment and Maintenance (AREM) architecture using the Event Condition Action (ECA) scheme to make intelligent…”
    Get full text
    Conference Proceeding
  10. 10

    Efficient Routing in Smart Grid Communication by Secured ABC - ANN Algorithm by Manimegalai, M., Sebasthiarani, K.

    “…Emerging use of Information and Communication technology in traditional grid leads to the introduction to smart grid. In smart grid, two way communications of…”
    Get full text
    Conference Proceeding
  11. 11

    Design of Fog Based Remote Health Monitoring System by A R, Gopinath, Singh, Yash Pal, Narawade, Navanath S

    “…As a result of the Covid-19 outbreak, a trustworthy health care system for remote surveillance was required, particularly in care facilitieas for the elderly…”
    Get full text
    Conference Proceeding
  12. 12

    Understanding the dynamics of Cyberbully content diffusion using Textual Emotion Mining by Chawla, Shivangi, Mehrotra, Monica, Rani, Seema

    “…With the world going digital and people from all walks of life-different race, colors, ethnicity, geography, literacy, and socio-economic status have come…”
    Get full text
    Conference Proceeding
  13. 13

    Day Ahead Demand Response Using Load Shifting Technique in Presence of Increased Renewable Penetration by Arun, C., Aswinraj, R., Bijoy, M. T., Nidheesh, M., Rohikaa Micky, R.

    “…Demand side management strategies help to reduce the peak demand, thereby reducing the need to operate at high cost and with high emission generating units. In…”
    Get full text
    Conference Proceeding
  14. 14

    A Study On Meta Learning Optimization Techniques by Sulibhavi, Prasanna H, Hallyal, Raghavendra A, Katti, Rohini K, Kabade, Amruta E, Thadal, Sujay S, M, Meena S, Kulkarni, Uday, Gurlahosur, Sunil V

    “…In the last decade, the domain of Artificial Intelligence (AI) has undergone rapid advancement and has achieved ability to mimic near-human intelligence in…”
    Get full text
    Conference Proceeding
  15. 15

    Next-Generation Technologies Empowered Future IoV by Rajasekhar, Kodingari, Kumar, Rahul, M, Kiran, G, Rammohana Reddy

    “…The Internet of Vehicles is a network of connected automobiles that can communicate with one another. In the IoV environment, vehicles and sensors,…”
    Get full text
    Conference Proceeding
  16. 16

    Exploring Security Threats on Blockchain Technology along with possible Remedies by Sharma, Sachin, Shah, Kaushal

    “…Being the center of commotion in recent times, Blockchain Technology is on its way to bloom in the technological world. With countless applications, even…”
    Get full text
    Conference Proceeding
  17. 17

    Sentiment Analysis on Comments in Bengali Language Using Text Mining & Machine Learning Approach by Das, Priya, Sultana, Nasrin

    “…In the modern era, people are highly engaged in the virtual world to express their feelings and opinions. Social platforms and news portals are the precious…”
    Get full text
    Conference Proceeding
  18. 18

    Detection and Localisation of Farm Mangoes using YOLOv5 Deep Learning Technique by Ranjan, Abhishek, Machavaram, Rajendra

    “…Fruit detection and localization in its real environment is a very challenging task. There are multiple factors such as occlusion, shadows and varying light…”
    Get full text
    Conference Proceeding
  19. 19

    A configurable and efficient implementation of Number Theoretic Transform (NTT) for lattice based Post-Quantum-Cryptography by Mondal, Somnath, Patkar, Sachin, Pal, T K

    “…Advancement in the quantum computer has imposed huge threat to modern cryptography techniques. Post quantum cryptography (PQC) based on lattice structure…”
    Get full text
    Conference Proceeding
  20. 20

    Transfer Learning: A way for Ear Biometric Recognition by Singh, Swapnil, Suman, Snehil

    “…Biometric recognition is a way of identifying an individual based on their biological and physiological characteristics; ear lobes are one way for doing so…”
    Get full text
    Conference Proceeding