Vai al contenuto principale della pagina

Advanced Computing and Intelligent Technologies : Proceedings of ICACIT 2023 / / edited by Rabindra Nath Shaw, Sanjoy Das, Marcin Paprzycki, Ankush Ghosh, Monica Bianchini



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Advanced Computing and Intelligent Technologies : Proceedings of ICACIT 2023 / / edited by Rabindra Nath Shaw, Sanjoy Das, Marcin Paprzycki, Ankush Ghosh, Monica Bianchini Visualizza cluster
Pubblicazione: Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Edizione: 1st ed. 2024.
Descrizione fisica: 1 online resource (649 pages)
Disciplina: 006.3
Soggetto topico: Computational intelligence
Artificial intelligence
Telecommunication
Quantitative research
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Data Analysis and Big Data
Persona (resp. second.): ShawRabindra Nath
Nota di bibliografia: Includes bibliographical references.
Nota di contenuto: Intro -- Preface -- Contents -- Editors and Contributors -- Development of CNN-Based Feature Extraction and Multi-layer Perceptron for Eye Disease Detection -- 1 Introduction -- 2 Existing Works -- 2.1 Related Works -- 2.2 Research Gaps and Challenges -- 3 Methodology of Multiple Eye Disease Detection Technique -- 3.1 Proposed Detection System for Multiple Eye Disorder -- 3.2 Details of Eye Image Collection -- 4 Feature Extraction and Multi-layer Perceptron Model for Multiple Eye Disease Detection -- 4.1 CNN-Based Feature Extraction -- 4.2 Multi-layer Perceptron for Classification -- 5 Result and Discussions -- 6 Conclusion -- References -- Optimal Relay Node Selection Using Machine Learning to Extend Coverage in Disaster Area Network -- 1 Introduction -- 2 Related Work -- 3 System Model -- 3.1 Network Architecture -- 3.2 Optimal Relay Node Selection Using Machine Learning Algorithm -- 3.3 Network Performance of the Proposed Model -- 3.4 Outage Probability Analysis -- 4 Result -- 5 Conclusion -- References -- A Structured Literature Review and Meta-analysis of Forecasting Methods for Energy Consumption in Smart Buildings -- 1 Introduction -- 2 Methodology -- 3 Energy Consumption in Smart Buildings -- 3.1 Need of Energy Consumption Forecasting in Smart Buildings -- 3.2 Energy Forecasting Methods -- 4 Black-Box Methods -- 5 White-Box Methods -- 6 Grey-Box Methods -- 7 Input Parameters -- 8 Prediction Intervals -- 9 Measures of Performance Analysis -- 10 Results and Discussion -- 11 Future Challenges -- 12 Conclusion -- References -- Document Summarization Leveraging Modified LexRank Algorithm -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 Methodology -- 3 Case Studies and Results -- 4 Conclusion -- References -- A Blockchain-Based Approach to Improve Data Integrity in Federated Cloud Environment -- 1 Introduction.
1.1 Federated Cloud Environments -- 1.2 Benefits of Cloud Federations -- 1.3 Data Integrity Challenges -- 1.4 Blockchain Overview -- 1.5 Blockchain Architecture -- 2 Literature Survey -- 2.1 Related Work -- 2.2 Comparative Study -- 3 Proposed Framework -- 3.1 Layer 1: Utilizing Permissioned Blockchain for Operation Tracking -- 3.2 Layer 2: Ensuring Integrity of Individual Data Items: -- 3.3 Elasticsearch -- 4 Strengths of the Proposed Framework -- 4.1 Enhanced Data Integrity -- 4.2 Efficient Consensus Mechanism -- 4.3 Mitigation of Side-Channel Attacks -- 4.4 Improved Leadership Selection -- 4.5 Robust Log Storage -- 4.6 Enhanced Security -- 4.7 Greater Transparency -- 4.8 Instant Traceability -- 5 Conclusion -- References -- Performance Analysis of Hybrid Cryptographic Algorithms in Serverless Platforms -- 1 Introduction -- 2 Background -- 2.1 Fernet Algorithm -- 2.2 RSA Algorithm -- 2.3 Triple DES Algorithm -- 3 Related Work -- 4 Proposed Hybrid Approach -- 4.1 Two-Tier Model -- 4.2 Three-Tier Model -- 5 Performance Analysis -- 5.1 Comparison with 3DES + RSA Model -- 6 Conclusion -- References -- Intensifying Cross Architecture Cyber-Resilience System with Descriptive Malware Analysis -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset -- 3.2 Concept Used -- 3.3 Proposed Method -- 4 Result -- 5 Conclusion -- 6 Future Scope -- References -- Challenges and Solutions in Integrating Narrowband IoT with Edge Computing: Resource Constraints, Security, Latency, and IDS Deployment -- 1 Introduction -- 1.1 Background -- 1.2 Objectives of the Study -- 1.3 Scope and Limitations -- 2 Literature Review -- 2.1 Previous Work on IoT and Edge Computing -- 2.2 Identified Areas Requiring Improvement -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Analysis Resource Constraints -- 4 Steps Used to Study the Dataset -- 5 Data Analysis.
5.1 Phase 1: Data Acquisition -- 5.2 Phase 2: Data Preprocessing -- 5.3 Phase 3: Exploratory Data Analysis (EDA) -- 5.4 Phase 4: Data Analysis -- 6 Conclusion -- 7 Areas for Further Research -- References -- An Automatic Brick Grading System Using Convolutional Neural Network: Bangladesh Perspective -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Splitting Data -- 3.4 Training -- 3.5 Evaluate Model -- 4 Experiment -- 4.1 Data Collection -- 4.2 Data Prepossessing -- 4.3 Libraries -- 4.4 Early Stopping -- 4.5 Convolutional Neural Network -- 4.6 Adam Optimizer -- 4.7 Hyperparameters -- 4.8 Training -- 4.9 Testing -- 5 Result and Discussion -- 5.1 Experimental Result -- 5.2 Evaluation Matrix -- 5.3 Training and Validation Loss -- 5.4 Training and Validation Accuracy -- 5.5 Confusion Matrix -- 5.6 Comparison -- 6 Conclusion -- 6.1 Limitations and Future Work -- References -- Optimization, Modelling and Evaluation of Marshall Stability of Asphaltic Concrete with Agricultural and Industrial Wastes Through Response Surface Method -- 1 Introduction -- 2 Materials and Methods -- 3 Results and Discussion -- 3.1 Evaluation of the Fitted Model Parameters -- 3.2 Interactive Effect of Significant Factors on Marshall Stability -- 4 Conclusion -- References -- A Query-Based Approach to Mitigate the Shortcomings of Widely Used Learning Methods Through E-Learning -- 1 Introduction -- 2 Literature Review -- 2.1 Shortcomings of Existing Methods -- 2.2 E-Learning and the Evolution of Technology -- 2.3 The Art of Questioning in Learning -- 2.4 Questions as a Learning Tool -- 2.5 Query-Based Access to Neurons -- 3 Methodology -- 3.1 E-Learning Using QuBAN Method -- 4 Result and Discussion -- 4.1 Effectiveness Across Courses -- 4.2 Effect on Confidence and Motivation -- 4.3 Impact on Questioning Habits.
4.4 Student's Attitude Towards QuBAN -- 5 Conclusion -- References -- Navigating the Waters of Image Watermarking: A Neural Network-Centric Review -- 1 Introduction -- 1.1 Image Watermarking Using Neural Networks -- 1.2 Types of Neural Networks Used in State-of-the-Art Image Watermarking Techniques -- 1.3 Performance Metrics for Different Watermarking Techniques -- 2 Literature Review -- 3 Future Scope -- 4 Conclusion -- References -- Evaluation of Group Chats Using Exploratory Data Analysis -- 1 Introduction -- 2 Literature Work -- 3 Working Methodology -- 3.1 Data Collection -- 3.2 Data Pre-processing -- 3.3 Data Preparation and Cleaning -- 3.4 Analysis and Interpretation of Results -- 3.5 Data Visualization -- 4 Result and Discussion -- 5 Conclusion -- References -- FinTech Revolution in Bharat -- 1 Introduction -- 2 Evolution of FinTech -- 2.1 Pre-digitization Period -- 2.2 Digitization Period -- 2.3 Post-digitization Period -- 3 The India Stack -- 3.1 Identity Layer -- 3.2 Payments Layer -- 3.3 Data Layer -- 4 Financial Inclusion and Solutions -- 4.1 Development and Financial Inclusion -- 4.2 FinTech Solutions -- 5 FinTech Adoption and Investments -- 5.1 Trends Driving FinTech Adoption -- 5.2 FinTech Investments -- 6 Challenges in FinTech -- 6.1 Lack of Trust and Awareness -- 6.2 Formal Credit -- 6.3 Rigorous Regulatory System -- 6.4 Skill-Based Talent Acquisition -- 6.5 Cybersecurity -- 6.6 Global Economics and Recession -- 7 Conclusion -- References -- A Review of 3D Avatar Reconstruction for Virtual Conferencing -- 1 Introduction -- 2 Problem Background -- 3 3D Reconstruction -- 4 3D Avatar -- 4.1 Classification of 3D Avatars -- 4.2 Application of 3D Avatar in Virtual Conference -- 5 3D Avatar Reconstruction -- 5.1 Traditional Reconstruction Pipeline -- 5.2 Reconstruction Based on Deep Learning -- 6 Conclusion -- References.
Real-Time Food Simulation Using Real Hand Gesture for Malaysia Cultural Heritage -- 1 Introduction -- 2 Designing Hand Gestures -- 3 Proposed VR Pulut Panggang -- 3.1 Test Application -- 4 Conclusion -- References -- Feature Selection Using Chi-Squared Feature-Class Association Model for Fake Profile Detection in Online Social Networks -- 1 Introduction -- 2 Related Works -- 3 Feature Extraction -- 4 Proposed Chi-Squared Feature-Class Association Model -- 5 Result and Analysis -- 5.1 Dataset and Description -- 5.2 Evaluation Metrics -- 6 Results -- 7 Conclusion -- References -- Classification and Identification of Weeds Using Gradient Boosting Classifiers -- 1 Introduction -- 2 Related Work -- 3 Convolutional Neural Network -- 3.1 Convolutional Layers -- 3.2 Pooling Layers -- 3.3 Global Average Pooling Layer -- 3.4 Fully Connected Layers -- 4 Boosting Algorithms -- 4.1 Gbm -- 4.2 Lgbm -- 4.3 CatBoost -- 4.4 AdaBoost -- 4.5 XGBoost -- 5 Dataset -- 6 Methodology -- 7 Experimental Results -- 7.1 Assessment Metrics -- 8 Results and Discussion -- 8.1 Comparison with Other Studies -- 8.2 Limitations and Complexity of Proposed Model -- 9 Conclusion -- References -- Enhancing Accuracy and Efficiency in Diabetic Retinopathy Detection: A Deep Learning Framework for Fundus Image Analysis -- 1 Introduction -- 2 Methodology of the Proposed System -- 3 Various Machine Learning Algorithm -- 4 Result and Discussion -- 5 Conclusion -- References -- Enhancing Brain MRI Tumor Detection: Exploring Vision Transformers and Fine-Tuned Convolutional Neural Network Architecture for Improved Performance -- 1 Introduction -- 1.1 Convolution Neural Networks -- 1.2 Vision Transformers -- 2 Dataset Analysis -- 3 Methodology -- 3.1 Convolution Neural Networks -- 3.2 Proposed Model (Vision Transformers) -- 4 Experimental Results -- 5 Conclusion -- References.
Bitcoin Price Prediction Using Sentiment Analysis.
Sommario/riassunto: This book gathers selected high-quality research papers presented at International Conference on Advanced Computing and Intelligent Technologies (ICACIT 2023), which is organized by Indira Gandhi National Tribal University, Regional Campus Manipur (IGNTU-RCM), during December 8–9, 2023. It discusses emerging topics pertaining to advanced computing, intelligent technologies and networks including AI and machine learning, data mining, big data analytics, high-performance computing network performance analysis, Internet of things networks, wireless sensor networks, and others. The book offers an asset for researchers from both academia and industries involved in advanced studies.
Titolo autorizzato: Advanced computing and intelligent technologies  Visualizza cluster
ISBN: 981-9719-61-5
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910865284603321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems, . 2367-3389 ; ; 958