Default Cover Image

2022 International Conference on Advancements in Smart, Secure and Intelligent Computing (ASSIC)

Nov. 19 2022 to Nov. 20 2022

Bhubaneswar, India

ISBN: 978-1-6654-6109-2

Table of Contents

CommitteesFreely available from IEEE.pp. 1-3
Copyright PageFreely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. 1-8
Authors IndexFreely available from IEEE.pp. 1-5
Multimodal Machine Learning approaches for Career PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Survey On Using Audio Video for True Random Number GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
An Enhanced Voice Assistance using Recurrent Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Mango Leaf Disease Detection Based on Deep Learning ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Fish Recognition Using Deep Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Challenges In Applying Artificial Intelligence In Banking Sector: A Scientometric ReviewFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
A Comprehensive Review: Sugarcane Disease Detection Using Intelligent ApproachesFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Prediction of Corn and Tomato Plant Diseases Using Deep Learning AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Interaction through Computer Vision Air CanvasFull-text access may be available. Sign in or learn about subscription options.pp. 1-3
Novel Trio-Neural Network towards Detecting Fake News on Social MediaFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Multi-level feature learning approaches for video recommendationFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Adaptable model based on ensemble learning for different telecommunication dataFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Machine Learning Based Crop Classification with Sentinel-1 DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Hibiscus Flower Health Detection to Produce Oil Using Convolution Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Technological Empowerment: Applications of Machine Learning in Oral HealthcareFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Modified Convolutional Neural Network for Fashion ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
A Reliable Protection Scheme for Smartgrid Based On Wavelet Transform and Ensemble ClassifierFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Machine Intelligence Enabled Parametric Speaker: An Invention Towards Experience SoundFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Real-time Pothole Detection using YOLOv5Full-text access may be available. Sign in or learn about subscription options.pp. 1-5
Moving Object Detection using Background SubtractionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Missing Children Identification using Face RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Computer Vision Lip Reading(CV)Full-text access may be available. Sign in or learn about subscription options.pp. 1-6
Pothole Detection Using YOLO (You Only Look Once) AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Employing Machine Learning Techniques to Categorize users in a Fitness ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Fundus Image Classification: A Wavelet Feature Descriptor ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Image Caption Generator using Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A Revolutionary Machine-Learning based approach for identifying Ayurvedic Medicinal PlantsFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
A hybrid deep transformer model for epileptic seizure predictionFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Drowsiness Detection Using OpencvFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Human Pose Estimation Using GNNFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Leaf Disease Identification and Remedy Recommendation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Evolution Of Machine Learning Algorithms For Enhancement Of Self-Driving Vehicles SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
ARIMA Model based Time Series Modelling and Prediction of Foreign Exchange Rate against US DollarFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Disaster Analysis Using Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Fake News Detection Using Machine Learning AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Gender and Age Prediction Using Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Crop disease recognition and diagnosis using Residual Neural NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Credit Card Holders Segmentation Using K-mean Clustering with AutoencoderFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
An Ensemble Learning Approach and Analysis for Stroke Prediction DatasetFull-text access may be available. Sign in or learn about subscription options.pp. 1-8
Intelligent Virtual Ambulance Model using Predictive LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Healthcare Industry: Embracing Potential of Big Data across Value ChainFull-text access may be available. Sign in or learn about subscription options.pp. 1-9
Emotion Recognition From Online Classroom Videos Using Meta LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
(NMRNN-LSTM) - Novel Modified RNN with Long and Short-Term Memory Unit in Healthcare and Big Data ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
A Comparative Analysis of PGGAN with Other Data Augmentation Technique for Brain Tumor ClassificationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Novel depression detection technique using Bert on social mediaFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Blood Cell Detection and Counting via Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Cancer Detection using Boosting AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Diabetic Retinopathy Detection Using Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Breast Cancer Detection by Using Radient Based Algorithm on Mammogram ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Challenges of Medical Text and Image ProcessingFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Comparative Study on Mental Stress Detection Using Various Stressors and Classification TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Decoding of Imagined Speech Neural EEG Signals Using Deep Reinforcement Learning TechniqueFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Medical Image Segmentation Using Deep LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Online Automobile Rental and E-Marketplace with Augmented Reality (AR)Full-text access may be available. Sign in or learn about subscription options.pp. 1-5
Fraud Account Detection on Social Network using Machine Learning TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
An Efficient Phishing Attack Detection using Machine Learning AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
An Adaptive Approach for Fault Localization using R-CNNFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Rectification of Electrical Energy Using Band Pass FilterFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Security and Privacy Preserving in Big DataFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Image Encryption Using RSA and Advanced Caesar Cipher MethodFull-text access may be available. Sign in or learn about subscription options.pp. 1-5
Detection of Cyberattack in Network Using Machine LearningFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Secure Server Storage Based IPFS through Multi-AuthenticationFull-text access may be available. Sign in or learn about subscription options.pp. 1-7
Lightweight Intrusion Detection System(L-IDS) for the Internet of ThingsFull-text access may be available. Sign in or learn about subscription options.pp. 1-4
Showing 100 out of 133