Research Reports on Computer Science, Special Issue "Selected Papers from MIND-2022"



Open Access Article

Investigation of Multilayer Perceptron Regression-based Models to Forecast Reference Evapotranspiration (ETo)

by Satendra Kumar Jain, Anil Kumar Gupta

ABSTRACT: Reference evapotranspiration (ETo) is a valuable factor in the hydrological process and its estimation is a sophisticated and nonlinear problem. In this study, the utility of multilayer perceptron...

Open Access Article

Enhancing Performance of Wide Area CIoT SDN by US-ML Based Optimum Controller Placement

by Amrita Khera, Uma Shankar Kurmi

ABSTRACT: It is a critical area of study for enhancing the effectiveness of wide-area Cellular Internet of Things (CIoT) networks. One solution is to merge Software Defined Networking (SDN) with Internet of...

Open Access Article

IoT Based System for Accident Detection, Monitoring and Landslide Detection Using GSM in Hilly Areas

by Amit Bhandari, Mukesh Kumar Ojha, Dilip Kumar Choubey, Vaibhav Soni

ABSTRACT: This paper described the detailed study for the detection and monitoring of accidents in hilly areas. In the past few decades, road accidents are a major cause of death in suburban hilly areas....

Open Access Article

MLOps for Enhancing the Accuracy of Machine Learning Models using DevOps, Continuous Integration, and Continuous Deployment

by Medisetti Yashwanth Sai Krishna, Suresh Kumar Gawre

ABSTRACT: Machine learning (ML) integrated with development and operations (DevOps) is the key to solving the problem of deploying the latest machine learning models. This paper proposes one of the ways of...

Open Access Article

An Analysis of House Price Prediction Using Ensemble Learning Algorithms

by Sai Venkat Boyapati, Maddirala Sai Karthik, Konakanchi Subrahmanyam, B Ramachandra Reddy

ABSTRACT: It is very important to understand the market drifts in the wake of booming civilization and ever-changing market requirements. The principal purpose of the study is the prediction of house prices...

Open Access Article

TOPSIS-based Optimal Cluster Head Selection for Wireless Sensor Network

by Shivendra Kumar Pandey, Buddha Singh

ABSTRACT: Due to the advancement of electronics engineering technology, many types of sensors have been developed. But sensors are still battery-powered devices. Once the battery is dead, the sensors are of...

Open Access Article

A Review of Problem Variants and Approaches for Electric Vehicle Charging and Location Identification

by D Prakash, G Jeyakumar

ABSTRACT: The optimization of electric vehicles (EVs) utilizing meta-heuristics has arisen as the way to propel state-of-the-art advancements, making ready for boundless reception, and reforming the flow...

Open Access Article

Cloud-based Cost Effective IIoT Model Towards Industry 5.0

by Satyajeet Rajaram Shinge, Urmila N. Shrawankar

ABSTRACT: Companies across industries increasingly depend upon cloud computing to manage their Industrial Internet of Things (IIoT) technology. Machines are connected over a network in the IIoT. Cloud...

Open Access Article

Machine Learning and Deep Learning for Phishing Page Detection

by Swatej Patil, Mayur Patil, Kotadi Chinnaiah

ABSTRACT: The term "phishing" is often used to describe an attempt to obtain confidential data such as passwords or credit card details by impersonating a trustworthy source. In most cases, the term refers...

Open Access Article

An Efficient Approach for Secured Data Transmission Between IoT and Cloud

by Shatakshi Kokate, Urmila Shrawankar

ABSTRACT: The Internet of Things (IoT) network generates a lot of data and cloud servers collect that data. The server then analyzes the collected data and based on the findings, provides appropriate...

Open Access Article

Determining Homogenous Transformation Matrix from DH Parameter Table using Deep Learning Techniques

by Vijay Bhaskar Semwal , Yash Gupta

ABSTRACT: One of the most popular ways of representing any robotic model mathematically is through Denavit-Hartenberg (DH) parameter table. And the most common way of finding a forward kinematics solution...

Open Access Article

Securing Digital Information Using Cryptography Techniques to Enhance IT Security

by Swati Chaudhari, Archana Thakur, Alpana Rajan

ABSTRACT: In information technology (IT) security, defence in depth is considered the best practice. Protecting data at rest or in transit is a part of the defence in depth approach. Confidentiality, data...

Open Access Article

A Comparative Study on Genetic algorithm and Reinforcement Learning to Solve the Traveling Salesman Problem

by Agash Uthayasuriyan, Hema Chandran G, Kavvin UV, Sabbineni Hema Mahitha , Jeyakumar G

ABSTRACT: Machine Learning (ML) and Evolutionary Computing (EC) are the two most popular computational methodologies in computer science to solve learning and optimization problems around us, respectively....