


default search action
CCCE 2023: Stockholm, Sweden
- Filippo Neri
, Ke-Lin Du
, Vijayakumar Varadarajan
, Ángel Antonio San-Blas
, Zhiyu Jiang
:
Computer and Communication Engineering - Third International Conference, CCCE 2023, Stockholm, Sweden, March 10-12, 2023, Revised Selected Papers. Communications in Computer and Information Science 1823, Springer 2023, ISBN 978-3-031-35298-0
Image Analysis and Method
- I. Juvanna, Uppu Ramachandraiah, G. Muthukumaran:
Enhanced Acoustic Noise Reduction Techniques for Magnetic Resonance Imaging System. 3-15 - Orfel L. Bejarin, Arnel C. Fajardo:
Rough Rice Grading in the Philippines Using Infrared Thermography. 16-26 - Ananya Uppal, P. Maitreyi, P. Shreya, Trisha Jain, Bhaskaryoti Das:
An Interpretable Hybrid Recommender Based on Graph Convolution to Address Serendipity. 27-38
Network Model and Function Analysis of Mobile Network
- Lakshmikanta Sau, Sasthi C. Ghosh:
A Geometry-Based Strategic Placement of RISs in Millimeter Wave Device to Device Communication. 41-53 - Rathindra Nath Dutta
, Sasthi C. Ghosh
:
Obstacle Aware Link Selection for Stable Multicast D2D Communications. 54-66 - Subhojit Sarkar, Sasthi C. Ghosh:
Mobility Aware Path Selection for Millimeterwave 5G Networks in the Presence of Obstacles. 67-80 - Durgesh Singh, Sasthi C. Ghosh:
A Probabilistic Analysis of the Delay in RIS Assisted SISO D2D Communication Using Chernoff's Bounds. 81-92
System Security Estimation and Analysis of Data Network
- A. Jyotsna, E. A. Mary Anita:
Enhancing IoT Security Through Deep Learning-Based Intrusion Detection. 95-105 - Eric Blancaflor, Robert Leyton-Pete J. Pastrana, Mark Joseph C. Sheng, John Ray D. Tamayo, Jairo Antonio M. Umali:
A Security and Vulnerability Assessment on Android Gambling Applications. 106-115 - Eric Blancaflor, Joel R. Hernandez:
A Compliance Based and Security Assessment of Bring Your Own Device (BYOD) in Organizations. 116-127 - Patricia Louraine R. Caalim, Rexan Myrrh Calanao, Earl John Masaga, Stephen Paul L. Alagao:
Development of Home-Bot with Accident-Sensory System Using IOT and Android Application for Control. 128-140
AI-Based System Model and Algorithm
- Omobayo A. Esan, Isaac Olusegun Osunmakinde:
Application of Machine Learning in Predicting Crime Links on Specialized Features. 143-157 - Mohammad Badrul Hossain, Md. Nowroz Junaed Rahman:
An Empirical Analysis on Lossless Compression Techniques. 158-170 - Yoojeong Song
, Woo Jin Cho
, Juhan Yoo
:
An Analysis of the Performance Changes of the Model by Reducing the Input Feature Dimension in Stock Price Forecasting. 171-178 - Zhen-Yao Chen:
A Hybrid Algorithm by Incorporating Neural Network and Metaheuristic Algorithms for Function Approximation and Demand Prediction Estimation. 179-188 - Hariharasudan Savithri Anbarasu, Harshavardhan Veeranna Navalli, Harshita Vidapanakal, K. Manish Gowd, Bhaskarjyoti Das:
Deep QA: An Open-Domain Dataset of Deep Questions and Comprehensive Answers. 189-202 - Maribel S. Abalos, Arnel C. Fajardo:
Tropical Cyclone Analysis and Accumulated Precipitation Predictive Model Using Regression Machine Learning Algorithm. 203-219 - Filippo Neri
:
Mapping Learning Algorithms on Data, a Promising Novel Methodology to Compare Learning Algorithms. 220-231

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.