|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910835059003321 |
|
|
Autore |
Devi B. Rama |
|
|
Titolo |
Proceedings of Fifth International Conference on Computer and Communication Technologies : IC3T 2023, Volume 1 |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer, , 2024 |
|
©2024 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (438 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Networks and Systems Series ; ; v.897 |
|
|
|
|
|
|
Altri autori (Persone) |
|
KumarKishore |
RajuM |
RajuK. Srujan |
SellathuraiMathini |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Intro -- Committees -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- Square Shaped SIW Based Slotted MIMO Antenna -- 1 Introduction -- 2 Antenna Design -- 3 S-parameter and Gain Characteristics of the Antenna -- 4 Multi-beam and Polarisation Characteristics of the Antenna -- 4.1 Individual Excitation of the Ports with Zero Phase -- 4.2 Excitation of Two Ports with a Phase Difference of 90° -- 5 Conclusion -- References -- Food Recognition and Calorie Measurement Using Machine Learning -- 1 Introduction -- 2 Problem Statement -- 3 Existing Work -- 4 Study and Assessment of the Indian Food Recipe Images Dataset -- 5 Methodology -- 5.1 Implementation of CNN -- 5.2 Plan of Implementation -- 6 Working of the Proposed System -- 6.1 System Architecture -- 7 Results and Discussion -- 8 Future Enhancements -- 9 Conclusion -- References -- Breast Cancer Prediction with Gradient Boost and XGBoost -- 1 Introduction -- 1.1 Breast Cancer -- 2 Related Work -- 3 Proposed System -- 3.1 Breast Cancer Dataset -- 3.2 Data Preprocessing -- 3.3 Architecture of Proposed Model -- 3.4 Selection of Features -- 3.5 Classification of Models -- 3.6 Model Training -- 4 Result Analysis -- 5 Conclusion -- References -- Data Cube |
|
|
|
|
|
|
|
|
|
Technology for Accessing of Large Database -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusions -- References -- Handwritten Character Recognition for South Indian Languages Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dataset Description -- 3.2 Pre-processing -- 3.3 Bounding Box -- 3.4 Feature Extraction -- 3.5 Model Comparison -- 3.6 Perform Evaluation -- 4 Results and Discussions -- 5 Conclusion -- 6 Future Work -- References -- CavFind: A Novel Algorithm to Detect Cavities on Protein Structure -- 1 Introduction -- 2 Materials and Methods. |
3 Results and Discussion -- 4 Conclusion -- References -- Tire Imprint Identification and Classification using VGG19 -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Training and Testing Process -- 3.2 Dataset Description -- 3.3 Pre-processing -- 3.4 Segmentation -- 3.5 Feature Extraction -- 3.6 Model Comparison -- 4 Experimental Setup -- 4.1 Dataset -- 4.2 Pre-processing -- 4.3 Segmentation -- 4.4 Feature Extraction -- 4.5 Template Matching -- 4.6 VGG19 -- 5 Results and Discussion -- 5.1 Performance Evaluation Graph -- 6 Conclusion -- 7 Future Work -- References -- Uncovering Insights in Agroforestry: A Text Mining Analysis Using Web Scraping and Topic Modeling -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Design Strategy -- 3.2 System Architecture Diagram -- 3.3 Methods Used -- 4 Observations and Results -- 4.1 Metadata from Google Scholar -- 4.2 Observations -- 5 Conclusion and Future Study -- References -- Generative Adversarial Networks: A Comprehensive Review -- 1 Introduction -- 1.1 Motivation Behind GAN -- 1.2 Structure of GAN -- 1.3 Loss Functions and Training Challenges -- 2 Variants of GAN -- 2.1 Vanilla GAN -- 2.2 DCGAN -- 2.3 BiGAN -- 3 Evaluation Metrics -- 3.1 Quantitative Metrics -- 4 Conclusion and Future Directions -- References -- System Modification Process to Reduce Calculation Complexity in Backward Forward Sweep Algorithm -- 1 Introduction -- 2 Backward Forward Sweep Algorithm -- 2.1 Backward Forward Sweep Algorithm for 3 Bus Lateral System -- 3 Decoupled Backward Forward Sweep (DBFS) Method -- 3.1 DBFS Method for a 3 Bus Lateral System -- 4 DBFS Method-Case Study-55 Bus Unbalanced Radial Distribution System (URDS) -- 5 Conclusion -- References -- Exploit Reversible Gates to Implement Fast Quantum Sorting Algorithm -- 1 Introduction -- 2 Background -- 3 Proposed Methodology -- 4 Complexity Analysis. |
5 Qiskit Simulation -- 6 Conclusion -- References -- Analyzing the Performance Variations of Naive Bayes, Linear SVM, and Random Forest for Spam Detection: A Comprehensive Study on the & -- Quot -- Spam or Ham& -- quot -- Dataset -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Result -- 5 Conclusion -- References -- A Novel Encryption Framework to Improve the Security of Medical Images -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Cuttlefish Algorithm -- 3.2 Particle Swarm Algorithm -- 3.3 Cuttlefish Particle Swarm Optimization -- 3.4 Ciphertext-Policy Weighted Attribute Encryption (CPWAE) -- 4 Result -- 5 Conclusion -- References -- Enhancing DDoS Attack Detection in SDN: A Novel Approach with IG-RFFI Feature Selection -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Dataset Description -- 3.2 Feature Selection -- 3.3 Information Gain (or) Mutual Information (IG) -- 3.4 Random Forest Feature Importance (RFFI) -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- A Novel Fusion Study on Disease Detection in Cotton Plants Using Embedded Approaches of Neural Networks -- 1 Introduction -- 1.1 Leaf Disease Detection Using Different Techniques |
|
|
|
|
|
|
|
-- 2 Literature Review -- 3 Materials Available -- 4 Discussions -- 5 Conclusion -- References -- A Security Framework for the Detection of Targeted Attacks Using Honeypot -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 4 Results -- 5 Conclusions -- References -- SNMP Watcher: A Model to Detect DoS and DDoS Attacks Using SNMP Management Information Base Analysis -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Classifiers -- 3.3 Metrics for Assessing Performance -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References. |
Comparative Analysis for Loan Approval Prediction System Using Machine Learning Algorithms -- 1 Introduction -- 2 Literature Review -- 3 Data Presentation -- 4 Methodology -- 4.1 Exploratory Data Analysis -- 4.2 Data Modeling -- 4.3 Splitting the Data -- 4.4 Selecting the Algorithm -- 4.5 Training or Validating Model -- 5 Results and Discussion -- 6 Conclusion -- References -- Classification of Credit Card Delinquent Customers Using Random Forest Algorithm -- 1 Introduction -- 1.1 Contributions -- 2 Literature Review -- 3 Experimental Setup -- 3.1 The Sample Pseudocode of the Proposed Algorithm is Given Below -- 4 Results and Discussion -- 5 Conclusion and Future Direction -- References -- Evaluating E-learning Engagement Through EEG Signal Analysis with Convolutional Neural Networks -- 1 Introduction -- 2 Challenges Facing in E-Learning Approaches -- 3 Methodology -- 3.1 EEG Signal Classification in Real-Time -- 3.2 Summary of Real-Time E-Learning EEG Data Collection -- 3.3 EEG Data Discretization -- 3.4 EEG Signal Preprocessing Methods -- 4 Implementation Approach -- 4.1 Label Encoding -- 4.2 Representation Learning -- 5 Results -- 6 Discussion -- 7 Conclusion -- References -- Food Item Recognition and Calories Estimation Using YOLOv5 -- 1 Introduction -- 2 Related Works -- 3 Research Methodology -- 3.1 Data Collection -- 3.2 Data Annotation and Preprocessing -- 3.3 YOLOv5 Architecture and Training -- 4 Evaluation and Performance Analysis -- 4.1 Loss Function -- 4.2 Precision -- 4.3 Recall -- 4.4 F1 Score -- 5 Conclusion and Future Improvements: -- References -- Fuzzy Cognitive Security Techniques for Data Aggregation in Capillary Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results -- 5 Conclusions -- References. |
Performance Analysis on Optimal Data Integrity and Security-Constrained Cloud Storage Framework with Meta-heuristic-Based Mechanism -- 1 Introduction -- 2 Literature Survey -- 3 Dual Attribute Merging Scheme for Privacy Protection in Cloud Storage Framework -- 3.1 OM-SRC-Based Optimal Sensitive Attribute Protection -- 3.2 Non-sensitive Attribute Protection Based on Shuffling Algorithm -- 4 Focusing on Data Integrity and Security Using Privacy Preservation Technique -- 4.1 Proposed Cloud Storage Model -- 4.2 Data Collection -- 4.3 Optimal Selection of Sensitive Attribute with PFA -- 5 Experimentation of Result Analysis -- 5.1 Validation Set-Up -- 5.2 State-of-the-Art Observation of the Designed Technique Over Data Sets -- 5.3 Key Sensitive Analysis on the Implemented Framework -- 5.4 Analysis of Convergence in the Suggested Model -- 5.5 Statistical Validation of the Implemented Method -- 6 Conclusion -- References -- Computer Vision-Based Model for Classification of Citrus Fruits Diseases with Pertinent Image Preprocessing Method -- 1 Introduction -- 2 Related Work -- 2.1 Identified Research Gap -- 2.2 Our Contribution -- 3 Proposed Work -- 3.1 Materials and Methods -- 3.2 Preprocessing of Images -- 3.3 Deep Convolutional Neural Network -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- FLAML-HDPS Model: An Efficient and Intelligent AutoML |
|
|
|
|
|
|
|
|
Approach for Heart Disease Prediction -- 1 Introduction -- 2 Literature Works -- 3 Proposed Methodologies -- 3.1 Dataset Description -- 3.2 Workflow of Fast and Lightweight AutoML -- 4 Experimental Results and Analysis -- 5 Conclusions -- References -- An Efficient Selective Features Approach to Detect Hypothyroid Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Principal Component Analysis -- 3.2 Extra Trees Classifier -- 3.3 Borderline SMOTE. |
3.4 Decision Trees. |
|
|
|
|
|
| |