Trashbusters: Deep Learning Approach for Litter Detection and Tracking.
CoRR, 2024
Relevant Feature Extraction to Enhance Aspect-Based Sentiment Classification Using Dependency and Bi-Tagged Features.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023
Sign Language to Text Conversion in Real Time using Transfer Learning.
CoRR, 2022
Deep Reinforcement Learning for Automated Stock Trading: Inclusion of Short Selling.
Proceedings of the Foundations of Intelligent Systems - 26th International Symposium, 2022
Categorical Crime Rate Analysis and Prediction.
Proceedings of the 13th International Conference on Computing Communication and Networking Technologies, 2022
Computer Vision Based Mechanism for Detecting Fire and Its Classes.
Proceedings of the Computer Vision and Image Processing - 7th International Conference, 2022
QORAl: Q Learning based Delivery Optimization for Pharmacies.
Proceedings of the 11th International Conference on Computing, 2020
Alert Generation on Detection of Suspicious Activity Using Transfer Learning.
Proceedings of the 11th International Conference on Computing, 2020
Similarity Analysis of Legal Documents using Content and Network Based Approach.
Proceedings of the 11th International Conference on Computing, 2020
Diet and Health Advisory Mechanism from Facial Features Using Machine Learning.
Proceedings of the 2019 International Conference on Information Technology (ICIT), 2019
Caucus: an authentication protocol for cloud federation.
Int. J. Trust. Manag. Comput. Commun., 2018
Fire contour approximation algorithm for bord-and-pillar coal mine: Revisited.
Proceedings of the 2018 IEEE Sensors Applications Symposium, 2018
TweetNews: Location and Time-Based News.
Proceedings of the 9th International Conference on Computing, 2018
A Hybrid Deep Learning Architecture for Paraphrase Identification.
Proceedings of the 9th International Conference on Computing, 2018
News Popularity Prediction with Ensemble Methods of Classification.
Proceedings of the 9th International Conference on Computing, 2018
Security Schemes for Constrained Application Protocol in IoT: A Precise Survey.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017
Smart-Lock Security Re-engineered Using Cryptography and Steganography.
Proceedings of the Security in Computing and Communications - 5th International Symposium, 2017
An access control model for cloud-based EMR federation.
Int. J. Trust. Manag. Comput. Commun., 2014
A Theoretical Study on Access Control Model in Federated Systems.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
Towards full network virtualization in horizontal IaaS federation: security issues.
J. Cloud Comput., 2013
First-in not referenced first-out page replacement algorithm.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011