Vai al contenuto principale della pagina

Proceedings of Data Analytics and Management : ICDAM 2023, Volume 2



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Swaroop Abhishek Visualizza persona
Titolo: Proceedings of Data Analytics and Management : ICDAM 2023, Volume 2 Visualizza cluster
Pubblicazione: Singapore : , : Springer Singapore Pte. Limited, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (666 pages)
Disciplina: 005.7565
Altri autori: PolkowskiZdzislaw  
CorreiaSérgio Duarte  
VirdeeBal  
Nota di contenuto: Intro -- ICDAM-2023 Steering Committee Members -- Preface -- Contents -- Editors and Contributors -- Sentiment Classification on Suicide Notes Using Bi-LSTM Model -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection Phase -- 3.2 Data Preprocessing Phase -- 3.3 Bi-LSTM Model -- 4 Results and Analysis -- 4.1 Implementation Details for Preprocessing Phase -- 4.2 Implementation Details and Results for Bi-LSTM Model -- 5 Conclusion -- References -- Machine Learning-Based Blind Image Quality Assessment: A Review -- 1 Introduction -- 2 Literature Survey -- 2.1 CNN/DNN-Based Approaches -- 2.2 Non-CNN/DNN-Based Approaches -- 3 Conclusion -- References -- Analysis of Blockchain Technology IoT and RPA in Supply Chain Management -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Proposed Methodology -- 5 Data Analysis -- 5.1 Internet of Things -- 5.2 Blockchain Technology -- 5.3 RPA Has High Accuracy, Quality, and Consistency of the IT Solutions. -- 5.4 Discussion -- 6 Conclusion -- References -- Sentiment Hotspots' Extraction in Large Text Documents Using Neutrosophic Sets -- 1 Introduction -- 2 Related Work -- 3 Background -- 4 Proposed Methodology -- 4.1 Text Preprocessing -- 4.2 Sentiment Hotspots -- 4.3 Find Document Sentiment Polarity -- 5 Experiments and Results -- 6 Conclusion and Future Scope -- References -- Peak Hour Demand Prediction for Sharing Bikes: A Comparative Analysis of Performances of Machine Learning Models -- 1 Introduction -- 2 Literature Review -- 3 Research Gap -- 4 Objective -- 5 Methodology -- 5.1 Problem Statement -- 6 Theoretical Framework -- 7 Exploratory Data Analysis (EDA) -- 7.1 Dataset Description -- 7.2 Data Cleaning -- 7.3 Observations -- 8 Implementation and Results Discussion -- 9 Conclusion -- 10 Future Scope -- References.
Prediction-Based Analysis of Diesel Prices Using Naïve Bayes Classifier Model -- 1 Introduction -- 1.1 How Machine Learning Works? -- 1.2 Classification of Machine Learning -- 2 Naïve Bayes Classifier Algorithm -- 2.1 Steps to Apply Naïve Bayes Classifier on the Dataset -- 3 Literature Survey -- 4 Result Analysis -- 5 Conclusion -- References -- Abnormality Detection in Smartphone-Captured Chest Radiograph Using Multi-pretrained Models -- 1 Introduction -- 2 Literature Survey -- 3 Problem Statement -- 4 Methodology -- 4.1 Data Gathering and Specification -- 4.2 Data Preprocessing and Augmentation -- 4.3 Model Development -- 5 Result Analysis -- 6 Conclusion -- References -- Offensive Tweets Detection in Hinglish Using HingBERT -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 L3Cube-HingLID Corpus -- 3.2 HingBERT -- 3.3 HingMBERT-Mixed -- 3.4 HingRoBERTa-Mixed -- 3.5 Dataset -- 3.6 Pre-processing -- 4 Results and Discussion -- 4.1 Evaluation Parameters -- 4.2 Experimentation Setup -- 4.3 Results -- 5 Conclusion and Future Scope -- 5.1 Future Scope -- 5.2 Conclusion -- References -- Unlocking the Potential of Mobile Computing for Infusing Computational Thinking Using Social Cognitive Approach in Higher Education Institutes -- 1 Introduction -- 2 Method -- 2.1 Participants -- 2.2 Questionnaire -- 2.3 Data Collection -- 2.4 Data Analysis -- 3 Results and Discussions -- 3.1 Results -- 3.2 Discussion -- 4 Conclusions -- References -- Deep Learning Applications in Thermal IR Image Processing -- 1 Introduction -- 2 Related Study -- 3 Proposed Methodology -- 4 Result and Discussion -- 5 Conclusion -- References -- MRI Image Segmentation: Brain Tumor Detection and Classification Using Machine Learning -- 1 Introduction -- 1.1 AI in Health Care -- 1.2 Tumor Classification -- 1.3 Benefits of Early Detection -- 2 Literature Review -- 3 Objective.
4 Key Contributions -- 5 Dataset Used -- 6 Convolution Neural Network (CNN) -- 7 Experiment -- 7.1 Evaluation of CNN Performance -- 8 Results and Discussion -- 9 Conclusion and Future Scope -- References -- Comparative Study of CNN and LSTM on Short-Term Future Stock Price Prediction -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 5 Results and Discussion -- 6 Conclusion and Future Scope -- References -- Cloud-Based Swarm Robotics for Modern Agriculture -- 1 Introduction -- 2 Literature Survey -- 2.1 Motivation -- 2.2 Features -- 3 Problem Statement -- 3.1 Objectives -- 3.2 Model Implementation -- 3.3 Process of Monitoring Temperature -- 3.4 Monitoring Soil Moisture -- 3.5 Plow -- 3.6 Seeding -- 3.7 Temperature and Soil Moisture Sensing -- 3.8 Water Pumping -- 3.9 Harvesting -- 3.10 Humidity Sensing -- 4 Working of SWARM Agriculture System -- 5 Workflow of the Prototype Model -- 6 Results -- 7 Conclusion and Future Scope -- References -- Application of Species Distribution Modelling in Agriculture: A Review -- 1 Introduction -- 2 Evolution of Species Distribution Models -- 3 Overview of SDM-based Software Packages -- 3.1 BIOCLIM-SDM-based Software Package -- 3.2 CLIMEX-SDM-based Software Package -- 3.3 Maximum Entropy Species Distribution Modelling (MAXENT) -- 4 Applications of Species Distribution Modelling (SDM) -- 4.1 SDM in Natural Ecology: Ecosystem and Biodiversity -- 4.2 SDM in Agriculture -- 5 Analysis and Discussion -- 5.1 Limitations Identified in Literature -- 5.2 Future Trends of SDM -- 6 Conclusion -- References -- Prediction of Particulate Matter (PM2.5) for Industrial Area Based on Naive Bayes Classifier -- 1 Introduction -- 2 Material and Methods -- 2.1 Machine Learning Classifiers -- 2.2 Performance Evaluation of ML Classifiers -- 3 Results and Discussion -- 4 Conclusion -- References.
Hybrid Cyber-Attack Detection Model on Cyber-Physical Systems Using Machine Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Data Preprocessing -- 3.2 Incremental Principal Component Analysis (IPCA) -- 3.3 Logistic Regression -- 4 Results and Discussion -- 4.1 Dataset Description -- 4.2 Evaluation Metrics -- 4.3 Experimental Description -- 5 Conclusion -- References -- Optimizing 3D Assets and Character Modeling of the Mixed Reality Simulator in a Disaster Mitigation Learning Using Vertex Decimation and Depth-of-Field Algorithm -- 1 Introduction -- 2 Theoretical Background -- 2.1 3D Optimization Method Definition -- 2.2 Mixed Reality -- 2.3 Disaster Mitigation -- 2.4 Vertex Decimation -- 2.5 Depth of Field (DoF) -- 3 Related Work -- 4 Proposed Method -- 4.1 3D Asset and Character Optimization -- 5 Results and Discussion -- 6 Conclusion -- References -- Modification of the Haar Wavelet Algorithm for Texture Identification of Types of Meat Using Machine Learning -- 1 Introduction -- 2 Theoretical Background -- 2.1 Haar Wavelet Method -- 2.2 Modification of the Haar Wavelet -- 2.3 Machine Learning -- 3 Methodology -- 3.1 Dataset Collection -- 3.2 Steps Preprocessing -- 3.3 Feature Extraction Techniques -- 3.4 Training Data -- 3.5 Image Processing -- 3.6 Machine Learning Model -- 4 Result and Discussion -- 5 Conclusion -- References -- Ascending Complexity Task GAN and 3D Dense Convolutional Networks for Binary Classification of Alzheimer's Disease -- 1 Introduction -- 2 Materials and Methods -- 3 Proposed Methodology -- 3.1 Overview -- 3.2 Ascending Complexity Task Mechanism-Generative Adversarial Networks (ACT-GAN) for Imputation of Images -- 4 Mathematical Expression for the Proposed Method -- 5 Experimental Results and Discussions -- 6 Conclusion and Future Scope -- References.
Web Security Analysis of Banking Websites -- 1 Introduction -- 2 Problem Statement -- 3 Website Security Framework -- 4 CIA Triad -- 5 Website Threats and Vulnerabilities -- 6 Literature Survey -- 7 Proposed Methodology -- 7.1 Sucuri -- 7.2 UpGuard -- 8 Result -- 9 Conclusion and Future Work -- References -- A Study on Conventional and Adaptive Narrowband Beamformer for MIMO RADAR -- 1 Introduction -- 2 Classification of Radar -- 3 Beamforming -- 3.1 Type of Beamforming -- 4 Signal Model -- 5 Phase Shift Beamformer -- 6 Minimum Variance Distortionless Response (MVDR) -- 6.1 Advantage of MVDR Over PHASE SHIFT Beamformer -- 7 Linear Constraint Minimum Variance Beamforming Algorithm (LCMV) -- 7.1 Advantages of LCMV Over MVDR -- 8 Simulation and Results -- 8.1 Phase Shift Beamformer -- 8.2 Minimum Variance Distortionless Method (MVDR) -- 8.3 LCMV Beamformer -- 9 Conclusion -- References -- Automating Error Identification and Evaluating Web Accessibility for Differently Abled Users -- 1 Introduction -- 1.1 Web Content Accessibility Guidelines -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result and Discussion -- 5 Conclusion and Future Works -- References -- IoT eHealth Big Data Analytics Based on Machine Learning -- 1 Introduction -- 2 Related Work and Background Study -- 3 The Proposed Model -- 3.1 Support Vector Machine (SVM) -- 3.2 K-Nearest Neighbors (KNN) -- 3.3 Random Forest Tree -- 4 Results and Discussions -- 5 Conclusion -- References -- Language Identification Using Multinomial Naive Bayes Technique -- 1 Introduction -- 2 Literature Review -- 2.1 Gap Analysis -- 3 Methodology -- 3.1 Workflow -- 3.2 Mechanism Implemented -- 4 Result -- 5 Conclusion -- References -- Novel Framework for Image Classification Based on Patch-Based CNN Model -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Image Processing.
3.2 Data Augmentation.
Titolo autorizzato: Proceedings of Data Analytics and Management  Visualizza cluster
ISBN: 981-9965-47-0
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910799250203321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems Series