Vai al contenuto principale della pagina

Proceedings of International Conference on Recent Innovations in Computing : ICRIC 2023, Volume 1



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Singh Yashwant Visualizza persona
Titolo: Proceedings of International Conference on Recent Innovations in Computing : ICRIC 2023, Volume 1 Visualizza cluster
Pubblicazione: Singapore : , : Springer, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (0 pages)
Disciplina: 621.38195
Altri autori: SinghPradeep Kumar  
GonçalvesPaulo J. Sequeira  
KarArpan Kumar  
Nota di contenuto: Intro -- Preface -- Contents -- About the Editors -- Artificial Intelligence and Digital India -- Deep Learning-Based Summarized Notes Generation from Document -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experiments and Result -- 5 Conclusion -- References -- AI and Patient Convenience: Usage of AI-Based Medical Chatbots for Medical Diagnosis via Smartphones -- 1 Introduction -- 2 Literature Review -- 2.1 Chatbots -- 2.2 AI and Chatbots -- 2.3 Benefits of AI-Based Smart Medical Chatbots -- 3 Proposed Model -- 4 Why This Idea is Unique -- 5 Conclusion and Scope for Further Research -- References -- Artificial Intelligence (AI)-Powered Intelligent Systems for Disease Prognosis: A Bibliometric Study -- 1 Introduction -- 2 Conceptual Background and Methodology -- 2.1 Bibliometric Protocol -- 3 Findings -- 3.1 Co-occurrence (Authors Based) -- 3.2 Citation Analysis -- 4 Discussion, Contribution, Implications, and Future Research Directions -- 5 Conclusion -- References -- Unleashing the Potential: Study on Artificial Intelligence Effect in Education Sector -- 1 Introduction -- 1.1 Objectives of the Study -- 1.2 Hypothesis -- 2 Literature Review -- 3 Data Analysis -- 4 Result and Discussion -- 4.1 Teacher and Student Perceptions -- 4.2 Next Generation AI-Driven Education -- 4.3 The Belief Among Teachers: Teachers are Being Replaced by Robots -- 5 Conclusion -- References -- AI-Powered Traffic Orchestration: Reinforcement Learning at Traffic Intersections -- 1 Introduction -- 1.1 Present System -- 1.2 Motivation Factor -- 2 Related Work -- 2.1 Model Free RL -- 3 Terminology for Traffic Signal Control -- 4 Problem Statement -- 5 Proposed Methodology -- 5.1 Framework -- 6 Experimental Work and Result -- 6.1 Simulation Environment -- 6.2 Intersection Area -- 6.3 Result -- 7 Conclusion and Future Scope -- References.
A Novel Melanoma Diagnosing System Using Multi-directional Pattern Extraction-Based Distributed Deep Learning Model -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Multi-directional texture Patterns (MDTP) -- 3.2 Distributed Deep Learning (DDL) Algorithm -- 4 Results and Discussion -- 5 Conclusion -- References -- A Review of Artificial Intelligence and Machine Learning for Vaccine Research -- 1 Introduction -- 2 Literature Survey -- 3 Overview of Computational Analysis for Vaccine Development -- 3.1 Steps Involved in Vaccine Development Using AI and ML -- 3.2 Accelerating Vaccine Screening With AI and ML -- 3.3 Optimization of Vaccine Formulations with AI -- 3.4 The Role of AI and ML in Immunoinformatics and Predictive Modeling -- 3.5 Input Sources to Train ML Module for Vaccine Development -- 4 AI-Based Vaccine Safety and Adverse Event Prediction -- 4.1 AI-Based Vaccine Distribution and Supply Optimization -- 5 Conclusion -- 6 Future Scope -- References -- Machine Learning Techniques for Detection and Classification of Crop (Solanum lycopersicum) Plant Diseases Due to Pests: A Review -- 1 Introduction -- 2 Classification of Tomato Diseases -- 3 Tomato Leaf Diseases Detection Using Machine Learning -- 3.1 Tomato Leaf Diseases Detection Using Supervised Learning -- 3.2 Tomato Leaf Diseases Detection Using Other ML Techniques -- 4 Research Gaps -- 5 Methodology -- 6 Conclusion and Future Scope -- References -- Fake News Detection Using Machine Learning Classification Algorithms -- 1 Introduction -- 2 Background -- 3 Literature Review -- 4 Materials and Methods -- 4.1 Proposed Algorithms -- 4.2 Dataset -- 5 Results and Discussion -- 6 Conclusion -- References -- Deep Learning Model-Based Approach for DDoS Detection and Classification -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 LSTM -- 3.2 RNN.
3.3 Autoencoder with LSTM Decoder -- 3.4 GRU -- 4 Comparison Table -- 5 Results -- 5.1 Testing Environment -- 5.2 Dataset -- 5.3 Pre-processing -- 5.4 Experimental Results -- 6 Conclusion -- References -- Data Analysis on Dynamic Flow Characteristics of Variable Delivery Hydraulic Axial Piston Pump -- 1 Introduction -- 1.1 Piston Pumps -- 1.2 Working Principle -- 2 Literature Review -- 2.1 Dynamic Flow Characteristics -- 3 Mathematical Modeling -- 3.1 Modeling of Pumping Dynamics -- 4 Implementation of the Proposed Model -- 4.1 Test Rig Description -- 4.2 Pump Model -- 4.3 Piston Model -- 5 Results and Discussion -- 5.1 Effect of Pump Angular Velocity on Pressure Pulsation and Flow Ripples -- 5.2 Coefficient of Pressure Pulsation and Coefficient of Flow Ripples -- 6 Conclusions -- References -- Exploring Explainable Machine Learning in Healthcare: Closing the Predictive Accuracy and Clinical Interpretability Gap -- 1 Introduction -- 2 Literature Survey -- 2.1 Some of the Most Popular Xml Techniques -- 3 XML in Clinical Practice -- 3.1 Clinical Integration -- 3.2 Ethical Considerations -- 3.3 Challenges and Limitations -- 4 Methodology -- 5 Results and Discussion -- 5.1 Naive Bayes -- 5.2 Logistic Regression -- 6 Future Directions -- 7 Conclusion -- References -- An Enhanced Neural Network Collaborative Filtering (ENNCF) for Personalized Recommender System -- 1 Introduction -- 2 Related Works -- 3 Proposed Enhanced Neural Network Collaborative Filtering (ENNCF) -- 3.1 Learning from Explicit Data -- 3.2 K-Recursive Reliability-Based Imputation Method-Steps -- 3.3 Enhanced Neural Network Collaborative Filtering -- 4 Experimental Analysis -- 4.1 Datasets -- 4.2 Evaluation Protocols -- 4.3 Baselines -- 5 Results and Discussion -- 6 Conclusion -- References -- Diagnosis of Behavioural Disorders Using Swarm Intelligent Metaheuristic Techniques.
1 Introduction -- 1.1 Objectives -- 1.2 Contribution -- 1.3 Methodology -- 2 Materials and Methods -- 2.1 Datasets -- 2.2 Design of Improved Particle Swarm Optimization Using Grey Wolf Optimizer (IPSOGWO) -- 2.3 Strength of Hybrid -- 3 Results and Discussion -- 4 Conclusion and Future Scope -- References -- Cyber Security and Cyber Physical Systems -- Leveraging Data Mining Optimization for Enhancing Safety Management in Public Security Prevention and Control Application -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 The Concept of Controlled AI -- 3.2 The Architecture of Controlled AI -- 4 Results and Discussion -- 4.1 Recovery Test -- 4.2 Response Time and Accuracy Analysis -- 5 Conclusion -- 5.1 Future Research Directions -- References -- Forecasting Criminal Activity: An Empirical Approach for Crime Rate Prediction -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Data Collection and Preprocessing -- 3.2 Exploratory Data Analysis and Visualization -- 3.3 Splitting the Dataset for Training and Testing -- 3.4 Model Selection -- 3.5 Predictive Analysis -- 4 Result -- 5 Discussion/Future Works -- 6 Conclusion -- References -- Early Detection of Crypto-Ransomware Pre-encryption Phases: A Review -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 The Ransomware Phenomenon: A Critical Analysis -- 4.1 Attack Enabling Factors -- 4.2 Ransomware Attack Phases -- 5 Crypto-Ransomware Existing Studies -- 5.1 Ransomware Analysis -- 5.2 Discussion and Research Direction -- 6 Conclusion -- References -- Are We Ready to Investigate Robots? Issues and Challenges Involved in Robotic Forensics -- 1 Introduction -- 2 Related Work -- 3 Issues and Challenges of Robotic Forensics -- 3.1 Acquisition -- 3.2 Analysis -- 3.3 Other Issues and Challenges -- 4 A Case Scenario on Forensic Challenges -- 5 Discussion.
6 Conclusion -- References -- Unmasking the Vulnerabilities: A Deep Dive into the Security Threat Landscape of Humanoid Robots -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 4 Attack Models: Strategies and Techniques -- 4.1 Acquiring Critical Information from Open-Source Intelligence (OSINT) Frameworks -- 4.2 Obtaining of Wireless Fidelity Passphrase via Various Frameworks -- 4.3 Analysis of Wireless Fidelity Network Traffic via Wireshark -- 4.4 Manual Exploitation Techniques of Robotics Environment -- 4.5 Automation Exploitation Techniques of Robotics Environment -- 4.6 Post-exploitation Techniques of Robotics Environment -- 4.7 Anti-forensics Techniques -- 5 Discussion -- 6 Conclusion -- References -- Review of Cyber-Physical System-Based Security Datasets for Learning-Based Intrusion Detection Systems -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Contributions -- 1.3 Paper Outline -- 2 Cybersecurity Datasets -- 3 Learning-Based IDS -- 4 Challenges and Recommendations -- 5 Conclusion -- References -- Survey and Analysis of Intrusion Detection Frameworks for Cyber-Physical Systems: A Comprehensive Study -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Framework for IDS in CPS -- 4 Conclusion -- References -- Enhancing IoT Security Through Deep Learning: A Comprehensive Study -- 1 Introduction -- 2 Related Work -- 3 IoT Security with Deep Learning -- 3.1 Convolutional Neural Networks (CNNs) -- 3.2 Recurrent Neural Networks (RNNs) -- 3.3 Deep Belief Networks (DBNs) -- 3.4 Deep Autoencoders (AEs) -- 3.5 Generative Adversarial Networks (GANs) -- 3.6 Ensemble of DL Networks (EDLNs) -- 3.7 Deep Reinforcement Learning (DRL) -- 3.8 Federated Learning (FL) -- 4 IoT Security Challenges -- 5 Conclusion -- References -- A Detailed Study of Advancements in Digital Forensics -- 1 Introduction -- 1.1 Contribution -- 1.2 Objective.
2 Methodology.
Titolo autorizzato: Proceedings of International Conference on Recent Innovations in Computing  Visualizza cluster
ISBN: 9789819728398
9789819728381
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910874677303321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Electrical Engineering Series