Text categorization performance examination using machine learning algorithms

BP Yadav, S Ghate, A Harshavardhan… - IOP Conference …, 2020 - iopscience.iop.org
Automated text categorization has been measured as a crucial technique for run and
practice a huge quantity of papers in digital appearances that were extensive & constantly …

RETRACTED: RNN based prediction of spatiotemporal data mining

MA Shaik, D Verma, P Praveen… - IOP Conference …, 2020 - iopscience.iop.org
The Spatiotemporal pattern is considered by most of the researchers to be a rehashed
arrangement or relationship of specific occasions or highlights of spatiotemporal and to …

Deep learning time series to forecast COVID-19 active cases in INDIA: a comparative study

MA Shaik, D Verma - IOP Conference Series: Materials Science …, 2020 - iopscience.iop.org
In the present situation of" COVID-19 pandemic" which devastated worldwide
socioeconomic implications that led by Indian government to initiate and to perform intense …

[PDF][PDF] Text classification performance analysis on machine learning

RR Kumar, MB Reddy, P Praveen - International Journal of …, 2019 - researchgate.net
Automated text classification has been considered as a vital method to manage and process
a vast amount of documents in digital forms that are widespread and continuously …

[PDF][PDF] 基于演化博弈的社团网络无人集群协同机制

禹明刚, 陈瑾, 何明, 刘学达, 张东戈 - 中国科学(技术科学), 2023 - researchgate.net
摘要智能化协同的无人集群作战日益成为一种重要的作战方式, 机制设计则是集群自主协同得以
实现的重要途径. 结合无人集群作战的组织规律与业务逻辑, 探索自主协同的特点与规律 …

A game-based approach for designing a collaborative evolution mechanism for unmanned swarms on community networks

Z Wu, L Pan, M Yu, J Liu, D Mei - Scientific Reports, 2022 - nature.com
Intelligent and coordinated unmanned aerial vehicle (UAV) swarm combat will be the main
mode of warfare in the future, and mechanistic design of autonomous cooperation within …

Static hand gesture recognition for asl using matlab platform

R Ravi Kumar, S Mohmmad, Shabana… - … , Networking and IoT …, 2022 - Springer
Generally, communication with people in our daily life is by speaking with voice but some
communications can be possible with body language, facial expressions, and hand signs …

Competent multi-level encryption methods for implementing cloud security

SK Tallapally, B Manjula - IOP Conference Series: Materials …, 2020 - iopscience.iop.org
Cloud space to yourself is a one of the most considerable tentative issue in cloud computing
as some of the clients are satisfied with existing policies or protocols where as rest of them …

[PDF][PDF] A Novel Binary Search Tree Method to Find an Item Using Scaling.

P Pappula - Int. Arab J. Inf. Technol., 2022 - researchgate.net
This Approach comprises of methods to produce novel and efficient methods to implement
search of data objects in various applications. It is based on the best match search to …

[PDF][PDF] Data Exploration As A Process Of Knowledge Finding And The Role Of Mining Data Towards Information Security

B Jamalpur, KS Kumar… - … Of Mechanics Of …, 2020 - pdfs.semanticscholar.org
The interdisciplinary field of Data Mining (DM) develops from the assemblage of statistics as
well as machine learning (artificial intelligence). It provides a technology that helps to assess …