Vai al contenuto principale della pagina

Proceedings of the 6th International Conference on Communications and Cyber Physical Engineering [[electronic resource] ] : ICCCE 2023; 28–29 April, Hyderabad, India / / edited by Amit Kumar, Stefan Mozar



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Kumar Amit Visualizza persona
Titolo: Proceedings of the 6th International Conference on Communications and Cyber Physical Engineering [[electronic resource] ] : ICCCE 2023; 28–29 April, Hyderabad, India / / edited by Amit Kumar, Stefan Mozar
Pubblicazione: Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Edizione: 1st ed. 2024.
Descrizione fisica: 1 online resource (910 pages)
Disciplina: 621.384
Soggetto topico: Wireless communication systems
Mobile communication systems
Artificial intelligence
Cooperating objects (Computer systems)
Internet of things
Telecommunication
Wireless and Mobile Communication
Artificial Intelligence
Cyber-Physical Systems
Internet of Things
Communications Engineering, Networks
Altri autori: MozarStefan  
Nota di contenuto: Intro -- Contents -- Alzheimer's Disease Classification Using Brain MRI Based on 2D CNN and Transfer Learning -- 1 Introduction -- 2 Related Work -- 3 Material Methods -- 3.1 Cnn -- 3.2 Resnet50 -- 3.3 InceptionV3 -- 3.4 Vgg16 -- 3.5 Vgg19 -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 Analysis of the Output -- 4.3 Output of Our Model -- 5 Conclusion -- References -- Arabica Coffee Bean Grading into Specialty and Commodity Type Based on Quality Using Visual Inspection -- 1 Introduction -- 2 Background -- 3 Methodology -- 3.1 Data Collection and Preprocessing -- 3.2 Model Flow -- 4 Experiment -- 5 Conclusion -- References -- Innovative Method for Assessing Optimal Power Flow and SVC Performance Using the ABC Algorithm -- 1 Introduction -- 2 The Formulation of the OPF's Problems -- 2.1 SVC Model -- 2.2 Optimal Power Flow -- 2.3 Sensitivity Analysis -- 3 The Artificial Bee Colony Algorithm Description -- 4 Test Results and Discussion -- 4.1 Case.1 IEEE 11-Bus Test Systems -- 4.2 Case.2 IEEE 30-Bus Test Systems -- 5 Conclusions -- References -- Design and Development of Leaf Disease Detection Using the ML and Open CV for Tomato Plants -- 1 Introduction -- 2 Literature -- 3 Proposed System System Architecture -- 4 Implementation of the Proposed System -- 5 Results -- 6 Conclusion and Future Scope -- References -- Employee Productivity Monitoring Tool-Analytics in Teleworking -- 1 Introduction -- 2 Planning -- 3 Requirements -- 4 Modules -- 4.1 Leave Management Module -- 5 Working -- 6 Code -- 7 Diagrams and Figures -- 8 Conclusion -- References -- Design and Implementation of Adders and Multipliers for DSP Applications -- 1 Introduction -- 2 Related Works -- 3 Adders Utilized for Design of Filters -- 3.1 Ripple Carry Adder (RCA) -- 3.2 Carry Look Ahead Adder (CLAA) -- 3.3 Carry Save Adder (CSA) -- 3.4 Kogge-Stone Adder (KGA).
3.5 Brent Kung Adder (BKA) -- 4 Multipliers for Design of FIR Filters -- 4.1 Booth Multiplier -- 4.2 Vedic Multiplier -- 4.3 Wallace Multiplier -- 4.4 Dadda Multiplier -- 4.5 Array Multiplier -- 5 Results and Discussion -- 6 Conclusion -- References -- Early Detection of Alzheimer's Disease Using Medical Imaging: A Review of Intelligent Approaches -- 1 Introduction -- 2 Methods -- 3 Results -- 4 Discussions -- 5 Conclusions -- References -- A Deep Learning Framework for Kidney Stone Prediction -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Vgg16 -- 3.2 ResNet-50 -- 3.3 Convolutional Neural Networks -- 4 Results and Discussions -- 5 Conclusion -- References -- Review of VLSI Architecture of Cryptography Algorithm for IOT Security -- 1 Introduction -- 2 Literature Review -- 3 Conclusions -- References -- Heart Disease Prediction Using ML and DL Approaches -- 1 Introduction -- 2 Literature Survey -- 3 Results -- 4 Conclusion -- References -- A Cross Design for Breast Cancer Prediction -- 1 Introduction -- 2 Background -- 3 Additional Information Required from Authors -- 4 Results and Discussion -- 5 Conclusion -- References -- Detection and Recognition of License Plates Using Color Image Processing -- 1 Introduction -- 2 Detection and Recognition of License Plates Using Color Image Processing -- 2.1 Detection of License Plates -- 2.2 Recognition of License Plates -- 2.3 Localization of License Plates -- 3 Discussion -- 4 Conclusion -- References -- An Experimental Study on Denoising the Images with Autoencoders -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 CDAE by Using Pooling Operations -- 4 Results -- 5 Conclusion -- References -- Cotton Plant Disease Detection: A Review -- 1 Introduction -- 2 Related Work -- 3 Applications of Cotton Plant Disease Detection -- 4 Conclusion -- References.
An Efficient Methodology for Identifying the Similarity Between Languages with Levenshtein Distance -- 1 Introduction -- 1.1 WordNet -- 1.2 NLTK -- 2 Related Work -- 3 Proposed Technique -- 3.1 String Similarity -- 3.2 Sequence Matcher -- 3.3 Levenshtein Distance -- 3.4 Fuzzy-Wuzzy -- 3.5 Spacy -- 4 Results -- 5 Conclusion -- References -- A Traffic Prediction Model Based on Multi Stream Feature Fusion -- 1 Introduction -- 2 Literature Survey -- 3 Architecture and Dataflow -- 4 Process with Flow Charts -- 5 Conclusion -- References -- Detection and Classification of Brain Tumor Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Survey -- 2.1 Overview of the Proposed System -- 3 Methodology -- 4 Experiments and Results -- 5 Conclusion -- References -- Design of Wireless Sensor-Based Automation System for Laboratory Using Internet of Things -- 1 Introduction -- 2 Literature Survey -- 3 Methodology of Proposed Model -- 3.1 Hardware Requirements -- 4 Experimental Results -- 5 Conclusion -- References -- Design and Implementation of Booth Multiplier with Sklansky and Ling Adders -- 1 Introduction -- 2 Literature Survey -- 3 Existing System -- 4 Kogge Stone Adder -- 5 Proposed Method -- 5.1 Sklansky Adder -- 5.2 Implementing Booth Multiplier with Sklansky Adder -- 6 Ling Adder -- 7 Results -- 8 Performance Comparison -- 9 Conclusion -- References -- Siddu: Decentralized Authorization with Zero Trust -- 1 Introduction -- 2 Background -- 2.1 Identity-Based Encryption -- 2.2 Distributed Hash Table -- 2.3 Macaroons -- 2.4 Zero Trust -- 3 Threat Model -- 4 Related Work -- 5 System Model -- 5.1 Users -- 5.2 Invitations and Attestations -- 5.3 Revocations -- 5.4 Proof Objects -- 5.5 Election -- 5.6 Scenario: User Creation -- 5.7 Scenario: Resource Assignment -- 5.8 Scenario: Assignment Revocation -- 5.9 Scenario: Joining the Network.
6 Result, Performance and Security Assessment -- 7 Conclusion -- References -- Smart Contract-Based Blockchain Technique for Logistic Shipping Management System -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Results -- 5 Conclusion -- References -- Design of an Interline Power Flow Controller Using Advanced Simulation Tools -- 1 Introduction -- 2 Basic Types of Facts Controllers -- 2.1 Basic Principles of Interline Power Flow Controller -- 3 Modelling of IPFC Controllers -- 4 Results of Simulation -- 5 Model of Closed Loop IPFC -- 6 Conclusion -- References -- An Efficient Approach for Smart Cold Storage Management System Using IoT -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Implementation -- 5 Conclusion and Future Scope -- References -- Detection and Monitoring of Hazards in Mining Using IoT Based Intelligent Helmet -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Implementation -- 5 Conclusion and Future Scope -- References -- Crop Prediction Using Machine Learning Approaches -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Data Collection -- 4 Crop Recommendations -- 5 Conclusion -- 6 Future Scope -- References -- Smart Campus System -- 1 Introduction -- 2 Related Work -- 3 Block Diagram -- 4 Working -- 5 Results -- 6 Conclusion -- 7 Future Scope -- References -- NNDcn-Neural Network Based Deep Crowd Network for Crowd Count -- 1 Introduction -- 2 Related Work -- 3 Proposed Solution -- 3.1 Model Architecture -- 3.2 Model Training -- 4 Experiment -- 4.1 Evaluation Metrics -- 4.2 Dataset -- 4.3 Results -- 5 Conclusion and Future Scope -- References -- A Voice-Assisted Walking Support for Visually Impaired People Utilizing an Wearable Sensor Network -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Existing System -- 3.2 Proposed Methods -- 4 Results and Discussion.
4.1 GPS Functionality -- 5 Conclusion and Future Scope -- References -- License Plate Recognition Using Artificial Neural Network Techniques -- 1 Introduction -- 2 License Plate Recognition Using Artificial Neural Network Techniques -- 2.1 Artificial Neural Networks -- 2.2 Back Propagation (BP) Neural Network -- 2.3 Convolutional Neural Network -- 2.4 Deep Convolutional Neural Network (DCNN) -- 3 Discussion -- 4 Conclusion -- References -- Lung Nodule Classification and Detection Using SVM-CAD -- 1 Introduction -- 2 Related Works and Existing Methods -- 2.1 Image Enhancement and Nodule Localization -- 2.2 Image Partitioning -- 3 Proposed System -- 3.1 Pre-processing -- 3.2 Segmentation -- 3.3 Feature Extraction -- 3.4 Classification -- 3.5 Testing Phase -- 4 Results on LIDC Dataset -- 5 Conclusion -- References -- A Sparse Code Multiple Access for 5G Radiotransmission -- 1 Introduction -- 2 Related Works -- 3 Proposed System -- 3.1 Codebook Mapping -- 3.2 Multiple Access Technique -- 4 Implementation of Algorithms -- 4.1 MPA Algorithm -- 4.2 Max-Log-MPA Algorithm -- 4.3 Log-MPA Algorithm -- 5 Advanced Receivers -- 6 Results -- 6.1 Simulation Parameters -- 6.2 Input Data -- 6.3 Output Data -- 7 Conclusion -- References -- The Rise of AI and ML in Financial Technology: An In-depth Study of Trends and Challenges -- 1 Introduction -- 2 Literature Review -- 3 Results -- 4 Discussion -- 5 Conclusion and Future Work -- 5.1 Future Work -- Appendix 1: Glossary of Key Terms -- Appendix 2: List of Key Fintech Companies Using AI and ML -- Appendix 3: List of Challenges and Opportunities in Integrating AI and ML in Fintech -- References -- Wireless TCP Congestion Control Based on Loss Discrimination Approach Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Working Flow -- 5 Proposed Methodology.
6 Sample Snapshot of Work with Testbed.
Sommario/riassunto: This book includes peer-reviewed high-quality articles presented at the 6th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2023), held on April 28 and 29, 2023, at CMR Engineering College, Hyderabad, India. ICCCE is one of the most prestigious conferences conceptualized in the field of networking and communication technology offering in-depth information on the latest developments in voice, data, image, and multimedia. Discussing the latest developments in voice and data communication engineering, cyber-physical systems, network science, communication software, image, and multimedia processing research and applications, as well as communication technologies and other related technologies, it includes contributions from both academia and industry. This book is a valuable resource for scientists, research scholars, and PG students working to formulate their research ideas and find the future directions in these areas. Further, it serves as a reference work to understand the latest engineering and technologies used by practicing engineers in the field of communication engineering.
ISBN: 981-9971-37-3
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910831014103321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Electrical Engineering, . 1876-1119 ; ; 1096