Search Results - "Harbola, Aditya"
-
1
Misinformation classification using LSTM and BERT model
Published in 2023 International Conference on Innovative Data Communication Technologies and Application (ICIDCA) (14-03-2023)“…In the information age with the reckless growth in the field of artificial intelligence and knowledge discovery a lot of research work is directed to solve…”
Get full text
Conference Proceeding -
2
Exploring Machine Learning Methods for Hate Speech Detection on Social Media
Published in 2024 Second International Conference on Advances in Information Technology (ICAIT) (24-07-2024)“…As social media usage continues to expand daily, so too does the spread of hate speech. To swiftly remove inflammatory content, every social media platform…”
Get full text
Conference Proceeding -
3
Privacy and Security of IoT based Skin Monitoring System using Blockchain Approach
Published in 2020 IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT) (01-07-2020)“…Remote patient monitoring is a system that focuses on patients care and attention with the advent of the Internet of Things (IoT). The technology makes it…”
Get full text
Conference Proceeding -
4
Machine Learning Models for Detecting Anomalies in Online Payment: A Comparative Analysis
Published in 2023 International Conference on Network, Multimedia and Information Technology (NMITCON) (01-09-2023)“…With the growing use of online payment systems, the necessity for strong security measures to defend against fraudulent activity has become critical. Machine…”
Get full text
Conference Proceeding -
5
Using Neural Network Approaches to Classify Breast Cancer
Published in 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0 (05-06-2024)“…Breast cancer, a fatal tumor that affects both women and men, can be detected early and treated effectively to save lives. In this article, we aim to…”
Get full text
Conference Proceeding -
6
Improved Intrusion Detection in DDoS Applying Feature Selection Using Rank & Score of Attributes in KDD-99 Data Set
Published in 2014 International Conference on Computational Intelligence and Communication Networks (01-11-2014)“…In today's networked environment, massive volume of data being generated, gathered and stored in databases across the world. This trend is growing very fast,…”
Get full text
Conference Proceeding -
7
An Analytical Study of Component-Based Life Cycle Models: A Survey
Published in 2015 International Conference on Computational Intelligence and Communication Networks (CICN) (01-12-2015)“…There are various component-based software engineering models used in component-based software development. These models give guidelines for successful…”
Get full text
Conference Proceeding Journal Article