ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
2018 3rd International Conference on Inventive Computation Technologies (ICICT)
Latest Publications
TOTAL DOCUMENTS
100
(FIVE YEARS 0)
H-INDEX
2
(FIVE YEARS 0)
Published By IEEE
9781538649855
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Review on Application of Machine learning Algorithm for Data Science
2018 3rd International Conference on Inventive Computation Technologies (ICICT)
◽
10.1109/icict43934.2018.9034256
◽
2018
◽
Author(s):
Kushal Rashmikant Dalal
Keyword(s):
Machine Learning
◽
Data Science
◽
Learning Algorithm
◽
Machine Learning Algorithm
Download Full-text
Table of Contents
2018 3rd International Conference on Inventive Computation Technologies (ICICT)
◽
10.1109/icict43934.2018.9034417
◽
2018
◽
Download Full-text
Survey on Map Reduce Scheduling Algorithms in Hadoop Heterogeneous Environments
2018 3rd International Conference on Inventive Computation Technologies (ICICT)
◽
10.1109/icict43934.2018.9034405
◽
2018
◽
Author(s):
R. Nirmalan
◽
K. Gokulakrishnan
Keyword(s):
Scheduling Algorithms
◽
Map Reduce
◽
Heterogeneous Environments
Download Full-text
Security Measures in IOT based 5G Networks
2018 3rd International Conference on Inventive Computation Technologies (ICICT)
◽
10.1109/icict43934.2018.9034365
◽
2018
◽
Cited By ~ 2
Author(s):
A Dey
◽
S Nandi
◽
M Sarkar
Keyword(s):
Security Measures
◽
5G Networks
Download Full-text
A Deep Learning Approach To Implement slab based image steganography algorithm of RGB images
2018 3rd International Conference on Inventive Computation Technologies (ICICT)
◽
10.1109/icict43934.2018.9034299
◽
2018
◽
Author(s):
Sitikantha Chattopadhyay
◽
Pinaki Pratim Acharjya
◽
Chandan Koner
Keyword(s):
Deep Learning
◽
Image Steganography
◽
Learning Approach
◽
Rgb Images
Download Full-text
Efficient Approach of Run Length Coding Technique Using Lossless Grayscale Image Compression (E-RLC)
2018 3rd International Conference on Inventive Computation Technologies (ICICT)
◽
10.1109/icict43934.2018.9034377
◽
2018
◽
Author(s):
S. Anantha Babu
◽
Eswaran Perumal
Keyword(s):
Image Compression
◽
Grayscale Image
◽
Run Length
◽
Efficient Approach
◽
Run Length Coding
Download Full-text
A comprehensive discovery for preventing Denial of service intrusions over Hybrid cloud using Emerging techniques(ROTA)
2018 3rd International Conference on Inventive Computation Technologies (ICICT)
◽
10.1109/icict43934.2018.9034406
◽
2018
◽
Author(s):
VHS.P Akhil Sharma
◽
M Saravanan
Keyword(s):
Denial Of Service
◽
Hybrid Cloud
Download Full-text
Railway Ticket Verification and Dynamic seat Allocation using Aadhar Card
2018 3rd International Conference on Inventive Computation Technologies (ICICT)
◽
10.1109/icict43934.2018.9034437
◽
2018
◽
Author(s):
Sunil Mhamane
◽
Pranav Shriram
Keyword(s):
Seat Allocation
Download Full-text
Labview Based Optimum Overcurrent Relay Coordination in Distribution Network
2018 3rd International Conference on Inventive Computation Technologies (ICICT)
◽
10.1109/icict43934.2018.9034435
◽
2018
◽
Author(s):
Swagata Biswas
◽
Jasleen Saluja
◽
Souvik Roy
◽
O.V. Gnana Swathika
Keyword(s):
Distribution Network
◽
Relay Coordination
◽
Overcurrent Relay
Download Full-text
Auxiliary Conditional Generative Adversarial Networks for Image Data Set Augmentation
2018 3rd International Conference on Inventive Computation Technologies (ICICT)
◽
10.1109/icict43934.2018.9034368
◽
2018
◽
Cited By ~ 1
Author(s):
Kalpana Devi Bai. Mudavathu
◽
M. V. P. Chandra Sekhara Rao
◽
K. V. Ramana
Keyword(s):
Image Data
◽
Generative Adversarial Networks
◽
Data Set
◽
Adversarial Networks
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close