Search Results - "Ayoub, Shahnawaz"
-
1
Generating Image Captions Using Bahdanau Attention Mechanism and Transfer Learning
Published in Symmetry (Basel) (01-12-2022)“…Automatic image caption prediction is a challenging task in natural language processing. Most of the researchers have used the convolutional neural network as…”
Get full text
Journal Article -
2
MRI-Based Effective Ensemble Frameworks for Predicting Human Brain Tumor
Published in Journal of imaging (01-08-2023)“…The diagnosis of brain tumors at an early stage is an exigent task for radiologists. Untreated patients rarely survive more than six months. It is a potential…”
Get full text
Journal Article -
3
Least square-support vector machine based brain tumor classification system with multi model texture features
Published in Frontiers in applied mathematics and statistics (06-12-2023)“…Radiologists confront formidable challenges when confronted with the intricate task of classifying brain tumors through the analysis of MRI images. Our…”
Get full text
Journal Article -
4
Adaptability of deep learning: datasets and strategies in fruit classification
Published in BIO web of conferences (01-01-2024)“…This review aims to uncover the multifaceted landscape of methodologies employed by researchers for accurate fruit classification. The exploration encompasses…”
Get full text
Journal Article -
5
Minimized Computations of Deep Learning Technique for Early Diagnosis of Diabetic Retinopathy Using IoT-Based Medical Devices
Published in Computational intelligence and neuroscience (14-09-2022)“…Diabetes mellitus is the main cause of diabetic retinopathy, the most common cause of blindness worldwide. In order to slow down or prevent vision loss and…”
Get full text
Journal Article -
6
Building Trust: IoT Security and Blockchain Integration
Published in 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom) (28-02-2024)“…Blockchain technology has captured considerable attention in recent years due to its unique potential to reshape the financial industry. This innovative…”
Get full text
Conference Proceeding -
7
Privacy Preserving Encryption with Optimal Key Generation Technique on Deduplication for Cloud Computing Environment
Published in 2022 International Conference on Automation, Computing and Renewable Systems (ICACRS) (13-12-2022)“…Cloud computing performs a significant part in sharing resources and data with other devices via data outsourcing. The data collaboration services, as a…”
Get full text
Conference Proceeding -
8
Modified Aquila Optimization based Route Planning Model for Unmanned Aerial Vehicles Networks
Published in 2022 International Conference on Automation, Computing and Renewable Systems (ICACRS) (13-12-2022)“…Unmanned aerial vehicles (UAVs) are deliberated as a potential example of automated emergency tasks in dynamic marine environments. But the maritime…”
Get full text
Conference Proceeding -
9
Hyperparameter Tuned Deep Learning Model for Healthcare Monitoring System in Big Data
Published in 2023 International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) (05-01-2023)“…Medical image classifiers roles a crucial play in medical service and teaching tasks. But the classical approach obtained its ceiling on performance. Besides,…”
Get full text
Conference Proceeding -
10
Intelligent Optimization Algorithm based Data Storage and Management: An Empirical Study
Published in 2023 Second International Conference on Electronics and Renewable Systems (ICEARS) (02-03-2023)“…Due to developments in digital world, security is developed into an inseparable problem but transferring images. Visual Cryptography (VC) is a present…”
Get full text
Conference Proceeding -
11
Hybrid Deep Learning based Attack Detection and Classification Model on IoT Environment
Published in 2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT) (22-02-2023)“…The Internet of Things (IoT) is becoming an active research area because of its largescale challenges and implementation. But security is the major concern…”
Get full text
Conference Proceeding