

Survey on Applications of Machine Learning
Abstract
References
Y. LeCun, Y. Bengio, and G. Hinton, "Deep learning," Nature, vol. 521, no. 7553, pp. 436-444, 2015.
T. Hastie, R. Tibshirani, and J. Friedman, The Elements of Statistical Learning: Data Mining, Inference, and Prediction. Springer, 2009.
I. Goodfellow, Y. Bengio, and A. Courville, Deep Learning. MIT Press, 2016.
Deepak, N.R., Balaji, S. (2016). Uplink Channel Performance and Implementation of Software for Image Communication in 4G Network. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Silhavy, P., Prokopova, Z. (eds) Software Engineering Perspectives and Application in Intelligent Systems. CSOC 2016. Advances in Intelligent Systems and Computing, vol 465. Springer, Cham. https://doi.org/10.1007/978-3-319-33622-0_10
Simran Pal R and Deepak N R, “Evaluation on Mitigating Cyber Attacks and Securing Sensitive Information with the Adaptive Secure Metaverse Guard (ASMG) Algorithm Using Decentralized
Security”, Journal of Computational Analysis and Applications (JoCAAA), vol. 33, no. 2, pp. 656–667, Sep.
B, Omprakash & Metan, Jyoti & Konar, Anisha & Patil, Kavitha & KK, Chiranthan. (2024). Unravelling Malware Using Co-Existence Of Features. 1-6. 10.1109/ICAIT61638.2024.10690795.
Rezni S and Deepak N R, “Challenges and Innovations in Routing for Flying Ad Hoc Networks: A Survey of Current Protocols”, Journal of Computational Analysis and Applications (JoCAAA), vol. 33, no. 2, pp. 64–74, Sep. 2024.
N. R. Deepak and S. Balaji, "Performance analysis of MIMO-based transmission techniques for image quality in 4G wireless network," 2015 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), 2015, pp. 1-5, doi: 10.1109/ICCIC.2015.7435774.
N R, Deepak & Sriramulu, Balaji. (2015). A Review of Techniques used in EPS and 4G-LTE in Mobility Schemes. International Journal of Computer Applications. 109. 30-38. 10.5120/19219-1018.
Patil, Kavitha S et al. “Hybrid and Adaptive Cryptographic-based secure authentication approach in Io T based applications using hybrid encryption.” Pervasive Mob. Comput. 82 (2022): 101552.
Refbacks
- There are currently no refbacks.