Integration of machine learning and IoT in healthcare domain

A Chattopadhyay, S Mishra… - … artificial intelligence and …, 2021 - Springer
Recent advancement in technology has been fruitful in the unification of Internet of things
and machine learning in numerous domains. While IoT is involved in aggregation of data …

Enhanced algorithmic job matching based on a comprehensive candidate profile using nlp and machine learning

VS Pendyala, N Atrey, T Aggarwal… - 2022 IEEE Eighth …, 2022 - ieeexplore.ieee.org
We propose to aid the hiring process by automatic profiling of a candidate's social media
presence and using it in conjunction with their resume and other information to suggest an …

COVID-19 outbreak estimation approach using hybrid time series modelling

S Chakraborty, S Mishra, HK Tripathy - International Conference on …, 2022 - Springer
In the beginning of March 2020, coronavirus was claimed to be a worldwide pandemic by
the World Health Organization (WHO). In Wuhan, a region in China, around December …

Design of an IoT-enabled smart safety device

P Yakaiah, P Bhavani, B Kumar… - … on Advancements in …, 2022 - ieeexplore.ieee.org
The objective of this paper is to implement a system which is to provide security to desired
person. It is also useful to the people when they need medical emergency and also to …

Portfolio Optimization for US-Based Equity Instruments Using Monte-Carlo Simulation

A Mukherjee, AK Singh, PK Mallick… - Cognitive Informatics and …, 2022 - Springer
MPT or the modern portfolio theory, also known as mean–variance analysis, is a
mathematical modeling technique that is deployed in constructing portfolios that can …

Real-time sign language translator

K Sinha, AO Miranda, S Mishra - … and Soft Computing: Proceeding of CISC …, 2022 - Springer
The main objective of this work is to build a real-time sign language translator to translate
sign language to text using TensorFlow object detection and Python. It would provide an …

An efficient phishing attack detection using machine learning algorithms

P Chinnasamy, N Kumaresan… - … on Advancements in …, 2022 - ieeexplore.ieee.org
Phishing is an illegal method which involves user's personal information at high risk.
Phishing websites prey individuals, the cloud storage hosting companies and government …

Robust sentiment classification of metaverse services using a pre-trained Language Model with soft voting

H Lee, HS Jung, SH Lee, JH Kim - KSII Transactions on Internet …, 2023 - koreascience.kr
Metaverse services generate text data, data of ubiquitous computing, in real-time to analyze
user emotions. Analysis of user emotions is an important task in metaverse services. This …

Detection and mitigation of DDoS attacks in internet of things using a fog computing hybrid approach

KF Hassan, ME Manaa - Bulletin of Electrical Engineering and Informatics, 2022 - beei.org
The introduction of a new technology has aided the exponential growth of the internet of
things (IoT), allowing for the connecting of more devices in the IoT network to be made …

Prominent cancer risk detection using ensemble learning

S Raghuwanshi, M Singh, S Rath, S Mishra - Cognitive Informatics and …, 2022 - Springer
The technique of detection of abnormalities and anomalies in the human body is a difficulty
faced by field experts around the globe. One of those many challenges is to detect various …