default search action
11th IBICA 2020: Online Event
- Ajith Abraham, Hideyasu Sasaki, Ricardo Rios, Niketa Gandhi, Umang Singh, Kun Ma:
Innovations in Bio-Inspired Computing and Applications - Proceedings of the 11th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2020) held during December 16-18, 2020. Advances in Intelligent Systems and Computing 1372, Springer 2021, ISBN 978-3-030-73602-6 - Samaher Al-Janabi
, Ayad F. Alkaim
:
A Comparative Analysis of DNA Protein Synthesis for Solving Optimization Problems: A Novel Nature-Inspired Algorithm. 1-22 - Rewayda Abo-Alsabeh
, Hajem Ati Daham, Abdellah Salhi:
An Evolutionary Approach for Solving the Minimum Volume Ellipsoid Estimator Problem. 23-31 - O. A. Ajilisa
, V. P. Jagathyraj, M. K. Sabu:
A Novel Clustering Based Undersampling Algorithm for Imbalanced Data Sets Using Artificial Bee Colony Algorithm. 32-42 - Uduak Umoh
, Abdultaofeek Abayomi
, Samuel S. Udoh
, Alimot Abdulazeez:
Flower Pollination Algorithm in Optimization of Interval Type-2 Fuzzy for Telemedical Problem. 43-54 - Divya Lanka
, Selvaradjou Kandasamy:
A Hybrid Trust Probability Based C-ACO Model for Large Software Defined Networks. 55-65 - Alireza Ferdowsi, Roghaye Bahrami Taghanaki, Ajith Abraham:
Novel Routing-Scheduling Problem for Home Health Care Network. 66-75 - Felipe Cisternas-Caneo
, Broderick Crawford
, Ricardo Soto
, Hanns de la Fuente Mella
, Diego Tapia
, José Lemus-Romani
, Mauricio Castillo
, Marcelo Becerra-Rozas
, Fernando Paredes
, Sanjay Misra
:
A Data-Driven Dynamic Discretization Framework to Solve Combinatorial Problems Using Continuous Metaheuristics. 76-85 - Mahsa Nekouei-Shahraki, Ajith Abraham, Mohammd Mehdi Lotfi:
Minimizing Tardiness in Stochastic Flexible Job Shop Problem. 86-96 - Jyotshna Dongardive
, Suruchi Jamkhedkar:
Classification of Metabolic Pathways Using Machine Learning Techniques. 97-110 - Ahmed Boujnoui
, Abdellah Zaaloul
, Abdelkrim Haqiq
:
Cooperative Slotted ALOHA with ZigZag Decoding and a Pricing Mechanism. 111-119 - Dalia Kriksciuniene, Virgilijus Sakalauskas, Audrius Imbrazas:
Grey Wolf Optimization Model for the Best Mean-Variance Based Stock Portfolio Selection. 120-130 - Abdessamad Bellouch
, Ahmed Boujnoui
, Abdellah Zaaloul
, Abdelkrim Haqiq
:
Modelling and Performance Evaluation of IoT Network During the COVID-19 Pandemic. 131-140 - Omid Abdolazimi
, Ajith Abraham:
Meta-heuristic Based Multi Objective Supply Chain Model for the Oil Industry in Conditions of Uncertainty. 141-153 - Md. Noor Alam, Prajoy Podder
, Subrato Bharati
, M. Rubaiyat Hossain Mondal
:
Effective Machine Learning Approaches for Credit Card Fraud Detection. 154-163 - Ali Hamza Salman, Samaher Al-Janabi
:
Scheduling Activities of Smart Phone and Smart Watch Based on Optimal Pattern Model (SA-OPM). 164-178 - Yael Robert, Yashshree Nigudkar, Anagha Kulkarni, Namita Mutha, Pranjali Barve:
Literature Survey: Application of Machine Learning Techniques on Static Sign Language Recognition. 179-186 - Virendra Dani
, Nisha Bhati, Deepesh Bhati:
EECT: Energy Efficient Clustering Technique Using Node Probability in Ad-Hoc Network. 187-195 - D. N. Bhavya, H. K. Chethan:
A System to Detect the Faces in Unconstrained Environment. 196-205 - Younes Wadiai, Yousef El Mourabit
, Mohamed Baslam:
Machine Learning for Intrusion Detection: Design and Implementation of an IDS Based on Artificial Neural Network. 206-216 - Hicham Zougagh, Noureddine Idboufker, Yousef El Mourabit
, Youssef Saadi, Samir Elouaham:
Avoiding Wormhole Attack in MANET Using an Extending Network Knowledge. 217-230 - Natarajan Anitha, Rangasamy Devi Priya
, Chelladurai Baskar, V. Devi Surya:
Analysis of Socio-cognitive Skills Among 90's and 2k's Generations Using Machine Learning Techniques. 231-240 - Shambhavi Trivedi, Maninder Kaur, Tarushi Singh:
Particulate Matter Forecasting Using Neural Networks: A Case Study of Delhi. 241-247 - Yousuf Khan, S. B. Goyal, Pradeep Bedi
:
Security Challenges of Blockchain. 248-257 - Anthony Ugochukwu Nwosu
, S. B. Goyal, Pradeep Bedi
:
Blockchain Transforming Cyber-Attacks: Healthcare Industry. 258-266 - Atik Mahabub
, Al-Zadid Sultan Bin Habib, M. Rubaiyat Hossain Mondal
, Subrato Bharati
, Prajoy Podder
:
Effectiveness of Ensemble Machine Learning Algorithms in Weather Forecasting of Bangladesh. 267-277 - Maria Rosario T. Garcia
, Alvin B. Culaba
:
Significance of the Internet of Things to the Covid-19 Pandemic in the Philippines. 278-288 - Nazanin Fozooni, Hamed Daneshvari, Sohaib Dastgoshade, Ajith Abraham:
Relationship Between the Monopoly of Tobacco Law and Lung Cancer Using the Theory of Dynamic Systems. 289-300 - Ayan Banerjee, Anirban Kundu:
Comparative Analysis of Cellular Automata Based Multilingual Encryption Using Syndicate Rules for Data Security. 301-310 - Durgesh M. Sharma
, Shishir Kumar Shandilya
, Ashish K. Sharma:
A Comprehensive Review on Cyber Physical System and Its Applications in Robotic Process Automation. 311-322 - Beena Kapadia, Amita Jain
:
Analysis of Papers Based on Sentiment Analysis Applications on E-Commerce Data. 323-340 - Omar Bin Samin, Maryam Omar, Musadaq Mansoor, Noman Naseeb, Samad Ali Shah, Aqil Amjad Khan:
IoT Based Time Triggered SPE Smart Switch for AC Appliances Control. 341-351 - Saswati Sarkar, Anirban Kundu:
An Approach to Store Data in Cloud Based Storage Using Mapping Technique. 352-361 - Mariana Assis, Maria Teresa Andrade
, Paula Viana
:
Context-Based Cultural Visits. 362-371 - Somasree Bhadra, Anirban Kundu, Sunirmal Khatua:
Optimization of Road Traffic Congestion in Urban Traffic Network Using Dinic's Algorithm. 372-379 - Marta Avalos
, Hélène Touchais, Marcela Henríquez-Henríquez:
Optimising Criteria for Manual Smear Review Following Automated Blood Count Analysis: A Machine Learning Approach. 380-391 - Jyotshna Dongardive
, Mousmi Pawar, Pooja Manghirmalani Mishra:
Online Courses Performance Prediction Using Machine Learning Techniques. 392-401 - Geeta Desai
, Abhay N. Gaikwad
:
The Ground Based Scatterometer for Agriculture Applications. 402-410 - Yusuke Kimura
, Kazuma Kusu
, Kenji Hatano
, Tokiya Baba:
Automatic Terminology Extraction Using a Dependency-Graph in NLP. 411-421 - Prashant Kokil, Niketa Gandhi, Sanjay Deshmukh:
Assessment of Plant Health in the Green Belt Around Coal Handling Area for Sustained and Effective Control of Fugitive Emissions. 422-428 - Nikhil Kumar Rajput, Niketa Gandhi, Bhavya Ahuja Grover:
ICT in Indian Agriculture: An Overview of the Major Services, Their Penetration and Infrastructural Development. 429-440 - Tanaya Das
, Subhasish Mohapatra, Abhishek Roy:
Insurance Policy Claim Verification Model of Unnatural Death Cases - An Artificial Intelligence Based Approach. 441-448 - Riya Sil
, Dipanjan Saha
, Abhishek Roy:
A Study on Argument-Based Analysis of Legal Model. 449-457 - Modupe Odusami, Olusola Abayomi-Alli, Sanjay Misra, Adebayo Abayomi-Alli
, Mayank Mohan Sharma:
A Hybrid Machine Learning Model for Predicting Customer Churn in the Telecommunication Industry. 458-468 - Sanjay Misra, F. Martha Omorodion, Robertas Damasevicius:
Metrics for Measuring Progress and Productivity in Agile Software Development. 469-478 - Abubakar John
, Sanjay Misra:
Renewable Energy in Rural Economy: Nigeria. 479-491 - Okpe Jonah Bameyi, Sanjay Misra, Francis E. Idachaba
, Jonathan Oluranti:
End-To-End Security in Communication Networks: A Review. 492-505 - Reem Alshammari, Rwan Alrashed, Atheer Almutiri, Mathail Alwalah, Wadha Almarrai, Dana Alqahtani, Amani Alzahrani:
Data Extraction Based on Web Scrapy. 506-514 - Phelipe Medeiros da Rocha
, Helder Gomes Costa
:
Multicriteria Model for Sorting the Quality of Services Provided by Airports. 515-524 - Pradeep Bedi
, S. B. Goyal, Jugnesh Kumar, Ritika:
Cyber Security Management Model for Critical Infrastructure and Improving the Security Level on Transferring Digital Data. 525-534 - Fatimah H. Almuhsin, Naba Almadan, Atheer Almarhoon, Hawra A. Al Mohssin, Thowiba Hagali Ahmed, Dabiah Ahmed Alboaneen
, Enas E. El-Sharawy:
Smart Appointments Booking Systems for Social Distancing: Technologies and Solutions. 535-545 - Shaun De Silva, S. B. Goyal, Pradeep Bedi
:
Security Challenges of Digital Currency System. 546-555
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.