Vai al contenuto principale della pagina

ICT Analysis and Applications : Proceedings of ICT4SD 2022



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Fong Simon Visualizza persona
Titolo: ICT Analysis and Applications : Proceedings of ICT4SD 2022 Visualizza cluster
Pubblicazione: Singapore : , : Springer, , 2022
©2023
Descrizione fisica: 1 online resource (763 pages)
Disciplina: 004
Soggetto non controllato: Technology
Technology & Engineering
Altri autori: DeyNilanjan  
JoshiAmit  
Nota di contenuto: Intro -- Preface -- Contents -- Editors and Contributors -- Survey of Data Processing Software Tools for Global Navigation Satellite System -- 1 Introduction -- 2 Desktop-Based Software -- 2.1 Bernese -- 2.2 RTKLIB -- 2.3 GLAB -- 2.4 Teqc -- 3 Comparison -- 4 Conclusion -- References -- POS Tagging for the Primitive Languages of the World and Introducing a New Set of Universal POS Tagging for Sanskrit -- 1 Introduction -- 1.1 New Set of POS in Sanskrit -- 1.2 Analysis of UPOS in Sanskrit -- 2 Comparative Study of the Previous Work -- 3 Analysis of Primitive Languages -- 3.1 Word Order -- 3.2 The Compound -- 3.3 The Basis of Grammar in Primitive Languages -- 3.4 The Main and Sub-Tag Classification -- 3.5 The Main Tags with Their Common and Uncommon Sub-Tags Classification -- 4 UPOS Interface Designed for Creating the Database for Sanskrit Language -- 5 Observations and Findings -- 6 Future Work -- 7 Conclusion -- References -- A Study on Medical Image Data Augmentation Using Learning Techniques -- 1 Introduction -- 2 Literature Survey -- 2.1 Geometric Transformations -- 2.2 Color Space Transformations -- 2.3 Kernel Filters -- 2.4 Mixing Images -- 2.5 Random Erasing -- 2.6 Feature Space Augmentation -- 2.7 Adversarial Training -- 2.8 GAN-Based Data Augmentation -- 2.9 Neural Style Transfer -- 3 Conclusion -- References -- Data Classification Using Mesh Generation and Hough Transform -- 1 Introduction -- 2 Preliminaries -- 2.1 Linear Regression -- 2.2 Analytical Straight Line -- 2.3 Standard Hough Transform -- 3 Method Description -- 4 Simulation and Discussions -- 4.1 Computing Average of StartAbsoluteValue a Subscript j comma 1 Baseline minus a Subscript i comma 1 Baseline EndAbsoluteValue |aj, 1-ai, 1| and StartAbsoluteValue a Subscript j comma 2 Baseline minus a Subscript i comma 2 Baseline EndAbsoluteValue |aj, 2-ai, 2| with i not equals= j.
4.2 Using Arbitrary Pairs (l comma upper Kl, K) -- 5 Conclusion and Perspectives -- 6 Appendix -- References -- Data Acquisition Techniques from IOT Devices for Smart Transportation: A Brief Overview -- 1 Introduction -- 2 Modern Techniques -- 2.1 UAV-Aided Data Acquisition Using Swarm Intelligence -- 2.2 Data Acquisition Using Deep Reinforcement Learning in UAVs -- 2.3 Data Acquisition Using Deep Reinforcement Learning for Multi-UAVs -- 2.4 Data Acquisition Using Blockchain in UAV -- 3 Conclusion -- References -- Analysis of Student Behavioural Patterns by Machine Learning -- 1 Introduction -- 2 Framework of Study -- 2.1 Data Set Collection -- 2.2 Feature Extraction -- 2.3 Clustering Analysis -- 2.4 Prediction -- 2.5 Visualization -- 3 Algorithms -- 3.1 Initial Clustering Using Density-Based Spatial Clustering of Application with Noise(DBSCAN) -- 3.2 Subdivision Clustering Using K-Means -- 3.3 Random Forest Algorithm -- 4 Experimental Results -- 5 Conclusions -- References -- Similar Incident Detection for IT Service Management (ITSM) in Multilingual Records Using Information Retrieval Model -- 1 Introduction -- 2 Background-ITIL Service Operations Framework -- 3 Problem Statement -- 4 Objectives -- 5 Current Scope -- 6 Solution Architecture -- 7 Obtained Results -- 8 Limitations of the Work -- 9 Conclusion and Future Scope -- References -- Design of Efficient Energy Management Solution for the Internet of Things-Based Smart Microgrid -- 1 Introduction -- 2 System Description -- 3 Energy Management Domain Structure -- 4 Proposed IoT-Based Smart Wearable Tags -- 5 Results and Discussion -- 6 Conclusion -- References -- Building Secured Software Defined Networks by Analyzing Anomaly Detection Algorithms on Various Attacks -- 1 Introduction -- 2 Experimental Setup -- 3 Experiments and Analysis -- 4 Efficiency of the Proposed Model.
5 Conclusions and Future Works -- References -- Ultra-Sensitive Optical Sensor to Detect Single Waterborne Bacterium -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Structure for Waterborne Bacteria Analysis -- 4 Simulation Results -- 4.1 Results for Detection of Vibrio cholera (Refractive Index: 1.365) -- 4.2 Results for Detection of E. coli (Refractive Index: 1.388) -- 4.3 Results for Detection of Shigella flexneri (Refractive Index: 1.388) -- 4.4 Calculation of Performance Parameter -- 4.5 Result Observation -- 5 Conclusion -- References -- Analysis of Energy Efficient Routing Protocol for Wireless Sensor Network in Environmental Monitoring -- 1 Introduction -- 2 Background -- 3 Previous Work Done -- 4 Existing Methodologies -- 5 Analysis and Discussion -- 6 Proposed Methodology -- 7 Outcome and Results -- 8 Conclusion -- 9 Future Scope -- References -- A Virtual Tutor to Enhance the Solving Skills of School Children Using Performance Evaluation and Navigation System -- 1 Introduction -- 2 Objectives -- 3 Literature Survey -- 3.1 Existing Applications -- 3.2 Research Papers -- 4 Proposed Methodology -- 4.1 Database Generation -- 4.2 Question Recommender -- 4.3 Performance Analyzer -- 4.4 Navigation -- 4.5 DOD Clustering Module -- 5 Implementation -- 5.1 CSV Generation -- 5.2 Navigation -- 5.3 DOD Clustering -- 6 Results -- 7 Conclusion -- References -- A Survey of Learning Techniques for Detecting DDOS Assaults -- 1 Introduction -- 1.1 Signature-Based Detection -- 1.2 Anomaly-Based Detection -- 2 Literature Survey -- 2.1 Decision Tree -- 2.2 Support Vector Machines (SVM) -- 2.3 Naive Bayes -- 2.4 Neural Networks -- 3 Comparison of Machine Learning Techniques -- 3.1 Fuzzy Logic -- 3.2 Neural Networks -- 3.3 Support Vector Machine (SVM) -- 3.4 Naïve Bayes -- 3.5 Decision Tree -- 4 Conclusion -- References.
Review on 5G and Wi-Fi 6 Wireless Internet Connectivity -- 1 Introduction -- 2 Literature Review -- 3 Technical Aspects of 5G -- 4 Technical Aspects of Wi-Fi 6 -- 5 5G versus Wi-Fi 6-A Comparison as Well as Contrast -- 6 Conclusion -- References -- Handwriting Recognition and Conversion Using Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 Limitations -- 4 Previous Work -- 5 Implementation -- 6 Conclusion -- References -- On Cordial Totally Magic Labeling of Flower Graphs -- 1 Introduction -- 1.1 Preliminaries -- 2 Main Results -- 3 Conclusion -- References -- Missing Value Imputation Using Weighted KNN and Genetic Algorithm -- 1 Introduction -- 2 Problem Formulation -- 3 Literature Survey -- 4 Proposed Technique -- 5 Result and Discussion -- 5.1 Dataset Description -- 5.2 Performance and Evaluation -- 5.3 Experimental Design -- 6 Conclusion -- References -- Aqua Pura: An IoT-Based System to Make Rainwater Salvageable and Manageable at a Low Cost -- 1 Introduction -- 2 Related Work -- 3 Applications -- 4 Working Mechanism -- 5 Programming Mechanism -- 6 Circuit Diagram -- 7 Required Hardware Components -- 8 Design and Implementation -- 9 Future Prospects and Conclusion -- References -- FMDCDTL: Design of Fusion-Based Model for Identification of Drowsy Drivers via Cascaded Deep Transfer Learning -- 1 Introduction -- 2 Literature Review -- 3 Design of the Proposed Fusion-Based Model -- 3.1 Design of the VGGNet-19-Based CNN Model for Analysis of Facial Features -- 3.2 Design of Feature Extraction Model for Driving Patterns and EEG Signals -- 3.3 Design of the Ensemble Learning and Statistical Analysis Layer for Drowsiness Classification Decisions -- 4 Result Evaluation and Comparison -- 5 Conclusion and Future Scope -- References -- Predicting the Heart Disease Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Work.
3 Research Methodology -- 4 Results and Discussion -- 4.1 Finding the Best ML-Based HDP Model (R1) -- 4.2 Statistical Justification (R2) -- 5 Conclusion -- References -- Synthetically Generated High-Resolution Reflected Ultra Violet Imaging System (RUVIS) Database Using Generative Adversarial Network -- 1 Introduction -- 2 Related Work -- 3 Synthetic Latent Fingerprint Generation -- 3.1 Adaptive Discriminator Augmentation (StyleGan2-Ada) -- 3.2 StyleGan2-Ada Training Dataset -- 3.3 Adaptive Discriminator Augmentation -- 4 Experimental Results and Discussions -- 4.1 Visual Analysis -- 4.2 Multi-Scale Structural Similarity -- 5 Conclusion -- References -- Understanding and Comparative Analysis of Consensus Algorithms -- 1 Introduction -- 2 Literature Review -- 3 Blockchain Technology -- 3.1 Working of Blockchain -- 3.2 Consensus Algorithms -- 4 Conclusion -- References -- Attack Detection in Internet of Things: A Systematic Literature Review -- 1 Introduction -- 1.1 IOT and Security -- 1.2 Cloud Computing and Fog Computing -- 2 Literature Review -- 2.1 Literature Survey -- 3 Result and Discussion -- 3.1 Dataset Description -- 3.2 Result Analysis -- 3.3 Limitations and Future Scope -- 4 Conclusion -- References -- Effect of COVID-19 on Construction Industry in Mumbai -- 1 Introduction -- 1.1 Infrastructure -- 1.2 Real Estate -- 1.3 Repair Industry -- 2 Literature Review -- 3 Research Methodology and Observations -- 3.1 Effect of Covid-19 on Construction Industry -- 4 Conclusion and Future Scope -- References -- TranslateIT: Android-Based Mobile Application for Multilingual Translation -- 1 Introduction -- 2 Literature Review -- 3 Results -- 3.1 Results of Text to Text -- 3.2 Results of Voice to Text -- 4 Conclusion -- References -- Visualizing Commenters Opinions Through Topic Analysis -- 1 Introduction -- 2 Background.
2.1 Non-Negative Matrix Factorization (NMF).
Sommario/riassunto: This work proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 7th International Conference on ICT for Sustainable Development (ICT4SD 2022), held in Goa, India, on July 29th-30th, 2022. The book covers the topics such as big data and data mining, data fusion, IoT programming toolkits and frameworks, green communication systems and network, use of ICT in smart cities, sensor networks and embedded system, network and information security, wireless and optical networks, security, trust, and privacy, routing and control protocols, cognitive radio and networks, and natural language processing.
Titolo autorizzato: ICT Analysis and Applications  Visualizza cluster
ISBN: 981-19-5224-8
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910624308703321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems