Vai al contenuto principale della pagina

Micro-Electronics and Telecommunication Engineering [[electronic resource] ] : Proceedings of 7th ICMETE 2023 / / edited by Devendra Kumar Sharma, Sheng-Lung Peng, Rohit Sharma, Gwanggil Jeon



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Sharma Devendra Kumar Visualizza persona
Titolo: Micro-Electronics and Telecommunication Engineering [[electronic resource] ] : Proceedings of 7th ICMETE 2023 / / edited by Devendra Kumar Sharma, Sheng-Lung Peng, Rohit Sharma, Gwanggil Jeon Visualizza cluster
Pubblicazione: Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Edizione: 1st ed. 2024.
Descrizione fisica: 1 online resource (811 pages)
Disciplina: 621.382
Soggetto topico: Telecommunication
Electronic circuits
Signal processing
Electronics
Technology - Sociological aspects
Information technology
Communications Engineering, Networks
Electronic Circuits and Systems
Signal, Speech and Image Processing
Electronics and Microelectronics, Instrumentation
Information and Communication Technologies (ICT)
Altri autori: PengSheng-Lung  
SharmaRohit  
JeonGwanggil  
Nota di contenuto: Intro -- Preface -- Contents -- Editors and Contributors -- Transportation in IoT-SDN Using Vertical Handoff Scheme -- 1 Introduction -- 2 Related Work -- 3 IoT Evolution -- 4 IoT with Transportation -- 4.1 IoT in Transportation: Applications -- 5 Intelligent Transportation Using a Vertical Handoff Method Based on Software-Defined Networks -- 6 Brief Analysis of Various Proposed Schemes and Results -- 7 Conclusion -- References -- MLP-Based Speech Emotion Recognition for Audio and Visual Features -- 1 Introduction -- 2 Review of Literature Research -- 3 Problem Statement -- 3.1 Dataset Description -- 3.2 Dataset Details -- 4 Proposed System -- 4.1 Data Exploration -- 4.2 Feature Extraction -- 5 Classifiers -- 5.1 Multi-layer Perceptron -- 5.2 Support Vector Machine -- 5.3 Random Forest Classifier -- 5.4 Decision Tree -- 6 Experimental Results -- 7 Conclusion -- References -- Drain Current and Transconductance Analysis of Double-Gate Vertical Doped Layer TFET -- 1 Introduction -- 2 Schematics of VDL-TFET -- 3 Simulations and Result -- 4 Conclusion -- References -- OpenFace Tracker and GoogleNet: To Track and Detect Emotional States for People with Asperger Syndrome -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Preprocessing -- 3.2 Cues Generation -- 3.3 Training Step -- 4 Results and Discussions -- 5 Conclusion -- References -- Vehicle Classification and License Number Plate Detection Using Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 4 Result -- 5 Conclusion -- References -- Car Price Prediction Model Using ML -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 3.1 Algorithm -- 4 Result -- 5 Conclusion -- 6 Future Scope -- References -- Effects of Material Deformation on U-shaped Optical Fiber Sensor -- 1 Introduction -- 2 Theory -- 3 Design Considerations and Results.
3.1 Sensor Characteristics -- 3.2 Evanescent Wave Absorbance -- 3.3 Sensitivity -- 4 Conclusion -- References -- Classification of DNA Sequence for Diabetes Mellitus Type Using Machine Learning Methods -- 1 Introduction -- 2 Related Works -- 3 Proposed System -- 4 Dataset -- 5 Data Preprocessing -- 5.1 Handle Missing Values -- 5.2 List to String -- 5.3 K-mer -- 5.4 Oversampling -- 5.5 Ordinal Encoding -- 5.6 Min-Max Normalization -- 6 Feature Selection -- 6.1 ANOVA -- 6.2 F-Regressor -- 6.3 Mutual Information -- 7 Classification -- 7.1 Random Forest -- 7.2 Gaussian NB -- 7.3 Support Vector Machine -- 7.4 Decision Tree -- 8 Results and Discussion -- 9 Conclusion -- References -- Unveiling the Future: A Review of Financial Fraud Detection Using Artificial Intelligence Techniques -- 1 Introduction -- 2 Literature Review -- 2.1 Machine Learning Techniques for Financial Fraud Detection -- 2.2 Deep Learning for Financial Fraud Detection -- 2.3 Ensemble Methods for Financial Fraud Detection -- 2.4 Unsupervised and Semi-supervised Learning for Financial Fraud Detection -- 2.5 Explainable AI for Financial Fraud Detection -- 2.6 Feature Selection and Feature Engineering -- 3 Models and Methodologies -- 3.1 FDS of Bayesian Learning and Dempster-Shafer Theory -- 3.2 The Evolutionary-Fuzzy System -- 3.3 Deep Artificial Neural Networks -- 3.4 BLAST-SSAHA Hybridization -- 3.5 Decision Tree -- 4 Conclusion -- References -- Remodeling E-Commerce Through Decentralization: A Study of Trust, Security and Efficiency -- 1 Introduction -- 2 Background and Related Work -- 3 Research Approach -- 3.1 Study Design -- 3.2 Proposed System Architecture -- 3.3 Implementation Methodology -- 4 Result -- 4.1 Gas Fees and Time Cost Analysis -- 4.2 Reliability Analysis -- 5 Conclusions and Future Scopes -- 5.1 Conclusions -- 5.2 Future Scopes -- References.
Estimation of Wildfire Conditions via Perimeter and Surface Area Optimization Using Convolutional Neural Network -- 1 Introduction -- 2 Existing Systems -- 3 Proposed System Architecture -- 4 Module Implementation -- 4.1 Collection of Data -- 4.2 Preprocessing the Data -- 4.3 Extraction of Features -- 4.4 Evaluating the Model -- 5 Result Analysis -- 6 Conclusion -- 7 Future Enhancements -- References -- A Framework Provides Authorized Personnel with Secure Access to Their Electronic Health Records -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Security Framework -- 4 Key Features of the Proposed Security Framework -- 5 Experimental Results and Discussion -- 6 Conclusion and Future Enhancement -- References -- Explainable Artificial Intelligence for Deep Learning Models in Diagnosing Brain Tumor Disorder -- 1 Introduction -- 2 Literature Review -- 3 XAI Approaches -- 3.1 Local Interpretable Model-Agnostic Explanations (LIMEs) -- 3.2 SHapley Additive ExPlanations (SHAPs) -- 3.3 Integrated Gradients -- 3.4 Gradient-Weighted Class Activation Mapping (Grad-CAM) -- 4 Results and Discussion -- 5 Conclusion -- References -- Pioneering a New Era of Global Transactions: Decentralized Overseas Transactions on the Blockchain -- 1 Introduction -- 2 Existing Solution -- 2.1 International Wire Transfer -- 2.2 Transactions via Cryptocurrency -- 3 Proposed Solution by Conversion of Fiat Currency -- 3.1 A Unified Payment Interface Decentralized Finance App Works Globally -- 4 Conclusion -- References -- A Perspective Review of Generative Adversarial Network in Medical Image Denoising -- 1 Introduction -- 2 Related Works -- 3 Various Types of Image-Denoising Methods Using GAN -- 4 Performance Metrics -- 5 Significance of Image Denoising Utilizing GAN -- 6 Conclusion -- References -- Osteoporosis Detection Based on X-Ray Using Deep Convolutional Neural Network.
1 Introduction -- 2 Related Works -- 3 Proposed System -- 4 Methodology -- 4.1 Preprocessing -- 4.2 Smudging -- 4.3 Deep Convolutional Neural Network (DCNN) -- 5 Result Analysis and Discussion -- 6 Conclusion -- References -- Fault Prediction and Diagnosis of Bearing Assembly -- 1 Introduction -- 2 Hardware Designing -- 2.1 AC Motor -- 2.2 T-Coupling -- 2.3 Setup Holding Base -- 2.4 Ball Bearing -- 2.5 Shaft -- 2.6 Pulley and Belt -- 2.7 Load Controller -- 2.8 Electronic Weight Machine -- 2.9 NI DAQ Card -- 2.10 Vibration Sensor -- 3 Experimental Procedure -- 4 Simulation for Fault Diagnosis -- 4.1 Parameter and Operating Conditions -- 5 Result -- 5.1 Plots for Different Loads -- 6 Conclusion -- 7 Summary -- 8 Future Scope -- References -- Bearing Fault Diagnosis Using Machine Learning Models -- 1 Introduction -- 2 Methodology -- 2.1 SVM -- 2.2 SVM Kernels -- 2.3 KNN -- 2.4 Decision Tree -- 2.5 Random Forest -- 2.6 Regression -- 3 Methodology of Machine Learning Model -- 4 Techniques for Extracting and Selecting Features from Data -- 5 Relationship Between the Statistical Features -- 6 Data Description -- 7 Comparative Study of Statistical Features -- 8 Result -- 9 Conclusion -- 10 Summary -- 11 Future Scope -- References -- A High-Payload Image Steganography Based on Shamir's Secret Sharing Scheme -- 1 Introduction -- 2 Related Work -- 3 Proposed Steganography Technique -- 3.1 Secret Distributing Scheme (SDS) -- 3.2 Shamir's Secret Sharing (SSS) Scheme for Protecting Hidden Secret Information -- 3.3 Proposed PVD-Based Steganography Method -- 4 Results and Experimental Findings -- 4.1 Robustness and Varying Embedding Capacity -- 4.2 Comparative Analysis -- 5 Conclusion -- References -- Design and Comparison of Various Parameters of T-Shaped TFET of Variable Gate Lengths and Materials -- 1 Introduction -- 2 Device Structure and Simulation.
3 Comparative Analysis on Devices and Discussion -- 3.1 ON Current and OFF Current -- 3.2 Subthreshold Swing (SSavg) -- 3.3 Transconductance (gm) -- 4 Results -- 4.1 Transfer Characteristics of Device -- 4.2 Transconductance Analysis (gm) -- 4.3 Band-to-Band Tunneling -- 4.4 Electric Field -- 4.5 Surface Potential -- 5 Conclusion -- References -- Experiment to Find Out Suitable Machine Learning Algorithm for Enzyme Subclass Classification -- 1 Introduction -- 2 Background -- 3 Brief Description of Methods Used in the Study -- 3.1 Experiment Using Logistic Regression Model -- 3.2 Experiment Using SVM -- 3.3 Experiment Using Random Forest -- 4 Computational Procedure -- 5 Data -- 6 Results and Discussion -- 7 Conclusion and Future Work -- References -- Iris Recognition Method for Non-cooperative Images -- 1 Introduction -- 2 Structure of Iris -- 3 Iris Segmentation -- 4 Literature Review -- 5 Methodology -- 5.1 Image Acquisition -- 5.2 Segmentation -- 5.3 Iris Normalization -- 5.4 Features Extraction (Iris Code) -- 5.5 Matching -- 6 Results -- 7 Conclusions -- References -- An Exploration: Deep Learning-Based Hybrid Model for Automated Diagnosis and Classification of Brain Tumor Disorder -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Recognition of Apple Leaves Infection Using DenseNet121 with Additional Layers -- 1 Introduction -- 2 DenseNet with Additional Layers -- 2.1 Preprocessing -- 2.2 Architecture -- 3 Dataset -- 4 Results -- 5 Conclusion -- References -- Techniques for Digital Image Watermarking: A Review -- 1 Introduction -- 2 Watermarking Techniques -- 3 Foundations of Presented Work -- 4 Process of Watermarking -- 5 Characteristics of Watermarking -- 6 Parameters of Quality Evaluation -- 7 Applications of the Image Watermarking -- 8 Conclusion -- References.
Improved Traffic Sign Recognition System for Driver Safety Using Dimensionality Reduction Techniques.
Sommario/riassunto: The book presents high-quality papers from the Seventh International Conference on Microelectronics and Telecommunication Engineering (ICMETE 2023). It discusses the latest technological trends and advances in major research areas such as microelectronics, wireless communications, optical communication, signal processing, image processing, Big Data, cloud computing, artificial intelligence, and sensor network applications. This book includes the contributions of national/international scientists, researchers, and engineers from both academia and the industry. The contents of this book will be useful to researchers, professionals, and students alike.
Titolo autorizzato: Micro-Electronics and Telecommunication Engineering  Visualizza cluster
ISBN: 981-9995-62-0
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910845496103321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems, . 2367-3389 ; ; 894