Proceedings of the Tenth International Conference on Mathematics and Computing

Proceedings of the Tenth International Conference on Mathematics and Computing

ICMC 2024, Volume 2

Lin, Zhiqiang; Yegnanarayanan, V.; Giri, Debasis; Ponnusamy, S.; Joshi, Karuna Pande; Vaidya, Jaideep

Springer Verlag, Singapore

07/2024

246

Mole

9789819720682

15 a 20 dias

Descrição não disponível.
Leveraging Meta-Learning for Dynamic Anomaly Detection in Zero Trust Clouds.- Prediction of Mental Health Issues and Challenges Using Hybrid Machine and Deep Learning Techniques.- Deep Learning Based Differential Distinguishers for NIST Standard Authenticated Encryption and Permutations.- ChiBa - A Chirrup and Bark detection Solving of Assignment Problem by Pythagorean Octagonal Neutrosophic Fuzzy Number system for Urban Environment.- FFT based image registration using Stationary Wavelet Transform and edge features.- Analysis of Blood Transfusion Dataset using Data Mining Techniques.- ResNet-CPDS: Colonoscopy Polyp Detection and Segmentation Using Modi?ed ResNet101V2.- Properties of m-bonacci words.- Robust Numerical technique for a class of singularly perturbed nonlinear system of n-dierential equations with Robin boundary conditions.- Key Dependent Dynamic Sbox for KASUMI Block Cipher.- Fuzzy MCDM techniques for analysing the risk factors of COVID-19 and FLU.- Concentric Ellipse Fitting Problem: Theory and Numerical Implementations.- Elective Data Transmission in NDN-Assisted Edge-Cloud Computing Model.- Pricing and retailer service strategy in a closed-loop supply chain as a response to showrooming effect.- Water Body Segmentation for Satellite Images Using U-Net++.- A computational study of time dependent nonlinear Schroedinger equation with cubic nonlinearity.- Modeling Vegetation Dynamics: Insights from Distributed Lag Model and Spatial Interpolation of Satellite Derived Environmental Data.- Supporting Smart Meter Context Management using OWL Ontology and Hyperledger Fabric Blockchain.- Guarding the Beats by Defending Resource Depletion Attacks on Implantable Cardioverter Defibrillators.
Wireless Networks;Network Security;Digital Image Processing;Digital Watermarking;Blockchain;Big Data;Bioinformatics;Cloud, Fog, and Edge Computing;Internet Of Things;Computational Number Theory;ICMC 2024 Proceedings