by Satendra Kumar Jain, Anil Kumar Gupta
ABSTRACT: Reference evapotranspiration (ETo) is a valuable factor in the hydrological process and its estimation is a sophisticated and nonlinear problem. In this study, the utility of multilayer perceptron...
by Amrita Khera, Uma Shankar Kurmi
ABSTRACT: It is a critical area of study for enhancing the effectiveness of wide-area Cellular Internet of Things (CIoT) networks. One solution is to merge Software Defined Networking (SDN) with Internet of...
by Amit Bhandari, Mukesh Kumar Ojha, Dilip Kumar Choubey, Vaibhav Soni
ABSTRACT: This paper described the detailed study for the detection and monitoring of accidents in hilly areas. In the past few decades, road accidents are a major cause of death in suburban hilly areas....
by Medisetti Yashwanth Sai Krishna, Suresh Kumar Gawre
ABSTRACT: Machine learning (ML) integrated with development and operations (DevOps) is the key to solving the problem of deploying the latest machine learning models. This paper proposes one of the ways of...
by Sai Venkat Boyapati, Maddirala Sai Karthik, Konakanchi Subrahmanyam, B Ramachandra Reddy
ABSTRACT: It is very important to understand the market drifts in the wake of booming civilization and ever-changing market requirements. The principal purpose of the study is the prediction of house prices...
by Shivendra Kumar Pandey, Buddha Singh
ABSTRACT: Due to the advancement of electronics engineering technology, many types of sensors have been developed. But sensors are still battery-powered devices. Once the battery is dead, the sensors are of...
by D Prakash, G Jeyakumar
ABSTRACT: The optimization of electric vehicles (EVs) utilizing meta-heuristics has arisen as the way to propel state-of-the-art advancements, making ready for boundless reception, and reforming the flow...
by Satyajeet Rajaram Shinge, Urmila N. Shrawankar
ABSTRACT: Companies across industries increasingly depend upon cloud computing to manage their Industrial Internet of Things (IIoT) technology. Machines are connected over a network in the IIoT. Cloud...
by Swatej Patil, Mayur Patil, Kotadi Chinnaiah
ABSTRACT: The term "phishing" is often used to describe an attempt to obtain confidential data such as passwords or credit card details by impersonating a trustworthy source. In most cases, the term refers...
by Shatakshi Kokate, Urmila Shrawankar
ABSTRACT: The Internet of Things (IoT) network generates a lot of data and cloud servers collect that data. The server then analyzes the collected data and based on the findings, provides appropriate...
by Vijay Bhaskar Semwal , Yash Gupta
ABSTRACT: One of the most popular ways of representing any robotic model mathematically is through Denavit-Hartenberg (DH) parameter table. And the most common way of finding a forward kinematics solution...
by Swati Chaudhari, Archana Thakur, Alpana Rajan
ABSTRACT: In information technology (IT) security, defence in depth is considered the best practice. Protecting data at rest or in transit is a part of the defence in depth approach. Confidentiality, data...
by Agash Uthayasuriyan, Hema Chandran G, Kavvin UV, Sabbineni Hema Mahitha , Jeyakumar G
ABSTRACT: Machine Learning (ML) and Evolutionary Computing (EC) are the two most popular computational methodologies in computer science to solve learning and optimization problems around us, respectively....