Search Results - heart attack
Suggested Topics within your search.
Suggested Topics within your search.
- Computational Intelligence 9
- Computational intelligence 9
- Communications Engineering, Networks 5
- Telecommunication 5
- Artificial Intelligence 4
- Artificial intelligence 4
- Data Mining and Knowledge Discovery 4
- Data mining 4
- Applied Dynamical Systems 1
- Big Data 1
- Big data 1
- Bioinformatics 1
- Computational and Systems Biology 1
- Computer Communication Networks 1
- Computer networks 1
- Computer-Aided Engineering (CAD, CAE) and Design 1
- Computer-aided engineering 1
- Data and Information Security 1
- Data protection 1
- Dynamics 1
- Innovation and Technology Management 1
- Nonlinear theories 1
- Signal processing 1
- Signal, Speech and Image Processing 1
- Technological innovations 1
-
1
Advanced Computing and Systems for Security Volume 1 /
Published Springer India : Imprint: Springer, 2016.Table of Contents: “…Computer User Profiling Based on Keystroke Analysis -- Chapter 2. Heart Based Biometrics and Possible Use of Heart Rate Variability in Biometric Recognition Systems -- Chapter 3. …”
Full-text access
e-Book -
2
Information and Communication Technology for Competitive Strategies Proceedings of Third International Conference on ICTCS 2017 /
Published Springer Nature Singapore : Imprint: Springer, 2019.Table of Contents: “…Multi-Layer Visual Cryptography with Soft Computing Approach for Authentication -- Knowledge Management Systems leveraging the competitive advantage of top IT organizations: A Multi-case study of Benchmarking Practices -- Performance Analysis of Parallel Implementation of Morphological Operations -- US Dollar's Influence on Indian Gold price Assessment using Artificial Neural Network -- Attribute based storage mechanism with de-duplication filter: A Review Paper -- Review and Analysis of Simulation Results for Consumer Attack Model and Grid Sensor Placement Algorithm -- An Approach to Analyze Behaviour of Network Events in NS2 & NS3 using AWK & Xgraph -- Hybrid Latent Semantic Analysis and Random Indexing Model for Text Summarization -- Digitization of Disaster Management: A Multimedia Ontological Approach -- Prevalent Study of Cooperative Biometric Identification System Using Multimodal Biometrics -- Most Persistent Feature Selection method for Opinion mining of social media reviews -- PhysicalLayer Security with Energy Harvesting Techniques: A Study -- One-tip Secure: Nex-Gen of Text Based Password -- New Text Based User Authentication Scheme Using CAPTCHA -- FPGA Implementation of Parallel Transformative Approach in AES Algorithm -- An Approach to Wireless Sensor Networks for Healthcare Scrutiny in Hospitals -- Foetal Heart Beat and Volume Detection using Spherical Harmonics Shape Model for Level Set Segmentation -- An Efficient approach for Clustering US census data based on Cluster similarity using Rough Entropy on Categorical Data -- Age classification with LPCC features using SVM and ANN -- Existing and Relevant Methodologies for Energy Efficient Cloud Data centers -- An Enhanced Scheme for PHR on Cloud Servers Using CP-ABE -- Decision Tree Algorithms for prediction of Heart Diseases -- Green communication for wireless cooperative networks: A survey -- Instance Selection using Multi-objective CHC Evolutionary Algorithm -- Inclusive device to connect people with the surrounding World -- Profiling based Effective Resource Utilization in Cloud Environment using Divide and Conquer Method -- Algorithmic approach for error-correcting capability and decoding of linear codes arising from Algebraic Geometry -- Periocular Region Based Biometric Identification Using Local Binary Pattern and Its Variants -- Hand Geometry and Palmprint Based Biometric System with Image Deblurring -- A Low Power, High Swing and Robust Folded Cascode Amplifier at Deep Submicron Technology -- Syllable Based Concatenative Speech Synthesis for Marathi Language -- Inverted U-Shape Monopole Antenna with Notch Band Characteristics for UWB Communication Applications -- A Distance-Based Outlier Detection using Particle Swarm Optimization Technique -- Fast and Memory Leak Free Verication for Bridge Transitions in VLSI designs -- Privacy Preserving K-NN Classification Using Vector Operations -- A Comparative Study on Segmentation Techniques for Brain Tumor MRI -- Integrating Concentrating Solar Plant based System in Multi Area AGC using LabVIEW -- Maximal Stable Extremal Region Extraction of MRI Tumor Images using Successive Otsu Algorithm -- Synthesis of Reversible Array Divider Circuit -- Finding Right Doctors and Hospitals: A Personalized Health Recommender -- An Improved Hybrid Offset Based Min-Sum Decoding Algorithm -- Simulation of Phasor Measurement Unit for Research and Teaching Applications -- Maximum Network Flow Aware Multi-Lightpath Survivable Routing in WDM Networks -- Various Machine Learning Algorithms for Twitter Sentiment Analysis.…”
Full-text access
e-Book -
3
Advanced Computing and Communication Technologies Proceedings of the 11th ICACCT 2018 /
Published Springer Nature Singapore : Imprint: Springer, 2019.Table of Contents: “…Part I: Advanced Computing -- Chapter 1: Authentication based on Nonlinear Dynamics -- Chapter 2: Gathering in the Discrete Domain : State-of-the-Art -- Chapter 3: Modified SA Algorithm for Bi-objective Robust Stochastic Cellular Facility Layout in Cellular Manufacturing Systems -- Chapter 4: Fuzzy time series forecasting method using probabilistic fuzzy sets -- Chapter 5: Ohmic-viscous dissipation and heat generation/absorption effects on MHD nanofluid flow over a stretching cylinder with suction/injection -- Chapter 6: Interlocking nodes for structural analysis in social networking -- Chapter 7: A novel construction method of intuitionistic fuzzy set from fuzzy set and its application in multi-criteria decision making problem -- Chapter 8: Design of an Audio Repository for Blind and Visually Impaired : A Case Study -- Chapter 9: A Futuristic Deep Learning Framework approach for Land Use Land Cover Classification using Remote Sensing Imagery -- Chapter 10: Prediction Model for Crowdfunding Projects -- Chapter 11: An Enhanced Approach for Detecting Helmet on Motorcyclists using Image Processing and Machine Learning Techniques -- Chapter 12: Affinity Aware Synchronization in Work Stealing Run-Times for NUMA Multi-Core Processors -- Chapter 13: Backpropagation Neural Network vs Logistic Regression in Heart Disease Classification -- Part II: Communication Technologies -- Chapter 14: Wormhole Attack in Wireless Sensor Networks: A Critical Review -- Chapter 15: A General Framework for Spectrum Assignment in Cognitive Radio Networks -- Chapter 16: Novel Schemes for Energy Efficient IoT -- Chapter 17: Minimizing the total range with two power levels in Wireless Sensor Networks -- Part III: Electronics, Antenna Design -- Chapter 18: Comparative Study of Rectangular and E-Shaped Microstrip Patch Antenna Array for X- Band Applications -- Chapter 19: An Archimedean Spiral Shaped Frequency Selective De-fected Structure for Narrow band High Q Applications -- Chapter 20: Challenge Response Pair (CRP) Generator using Schmitt Trigger Physical Unclonable Function. .…”
Full-text access
e-Book -
4
Proceedings of the First International Conference on Computational Intelligence and Informatics ICCII 2016 /
Published Springer Nature Singapore : Imprint: Springer, 2017.Table of Contents: “…An Innovative method to Mitigate DDoS Attacks for Cloud Environment using Bagging and Stacking -- Chapter 29. …”
Full-text access
e-Book -
5
Proceedings of International Conference on ICT for Sustainable Development ICT4SD 2015 Volume 2 /
Published Springer Nature Singapore : Imprint: Springer, 2016.Table of Contents: “…A Multi-Classifiers Based Novel DoS/DDoS Attack Detection Using Fuzzy Logic. .…”
Full-text access
e-Book -
6
Computational Intelligence in Data Mining-Volume 2 Proceedings of the International Conference on CIDM, 5-6 December 2015 /
Published Springer India : Imprint: Springer, 2016.Table of Contents: “…Prevention of Wormhole Attack Using Identity Based Signature Scheme in MANET -- Chapter 46. …”
Full-text access
e-Book -
7
Computational Intelligence in Data Mining-Volume 1 Proceedings of the International Conference on CIDM, 5-6 December 2015 /
Published Springer India : Imprint: Springer, 2016.Table of Contents: “…Implementation of Data Analytics for MongoDB Using Trigger Utility -- Chapter 6. Heart Disease Prediction Using k-Nearest Neighbour Classifier Based on Handwritten Text -- Chapter 7. …”
Full-text access
e-Book -
8
Proceedings of the Sixth International Conference on Green and Human Information Technology ICGHIT 2018 /
Published Springer Nature Singapore : Imprint: Springer, 2019.Table of Contents: “…AMQP-Based Subscription Group Message Delivery System Design for Laboratory Safety System (by Hyun-seong Lee, Jae-gwang Lee, Jae-pil Lee, Ki-su Yoon, Woo-chang Kwon and Jae-kwang Lee) -- 2. Attack Probability Analysis on the MTD System (by Jang-Geun Ki and Kee-Young Kwon) -- 3. …”
Full-text access
e-Book -
9
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications FICTA 2016, Volume 2 /
Published Springer Nature Singapore : Imprint: Springer, 2017.Table of Contents: “…An Efficient Detection and Mitigation of Selfish and Black Hole Attack in Cognitive Mobile Ad-hoc Network -- Chapter 69. …”
Full-text access
e-Book