Vai al contenuto principale della pagina
Autore: | Nanda Satyasai Jagannath |
Titolo: | Data Science and Applications : Proceedings of ICDSA 2023, Volume 3 |
Pubblicazione: | Singapore : , : Springer, , 2024 |
©2024 | |
Edizione: | 1st ed. |
Descrizione fisica: | 1 online resource (596 pages) |
Altri autori: | YadavRajendra Prasad GandomiAmir H SaraswatMukesh |
Nota di contenuto: | Intro -- Preface -- Contents -- Editors and Contributors -- PV Array System Stimulation Affected by Variability in Temperature and Location -- 1 Introduction -- 2 Phtotvoltaic Systems -- 3 System Description -- 3.1 Boost Converter -- 3.2 Inverter -- 3.3 Boost Converter Control Scheme -- 3.4 Inverter Control Scheme -- 4 Conclusion -- References -- A Real-Time Cataract Detection and Diagnosis Through Web-Based Imaging Analysis -- 1 Introduction -- 2 Literature Survey -- 3 Existing System -- 4 Proposed System -- 5 Dataset Details -- 6 Experimental Setup -- 7 Methodology -- 8 Algorithms Used -- 9 Results and Discussions -- 10 Performance Metrics -- 11 Comparative Analysis -- 12 Conclusion -- References -- A Survey of Decentralized Digital Voting System Using Blockchain Technology -- 1 Introduction -- 2 Elements of Voting Systems -- 3 Centralized Voting Technologies -- 3.1 SMS-Based Smartphone Application -- 3.2 Secure Voting Using Biometrics -- 3.3 Authenticated Web-Based Voting -- 3.4 Technologies Used in Constructing E-Voting System -- 4 Blockchain -- 4.1 Smart Contracts -- 4.2 Transactions -- 4.3 Role of Ethereum -- 5 Decentralized E-Voting Systems Overview -- 5.1 Quantum Blockchain -- 5.2 E-Voting with Blockchain -- 5.3 Verify-Your-Vote -- 5.4 E-voting Based on Blockchain and Blind Signature -- 5.5 Privacy Preserving Protocol -- 5.6 Large Scale Election Using Blockchain and Ring Signature -- 5.7 Existing Working Organizations -- 6 Challenges -- 6.1 Challenges of Blockchain -- 6.2 Scalability -- 6.3 Immatureness -- 6.4 Acceptance -- 6.5 Coercion -- 6.6 Energy Efficiency -- 6.7 Governmental Authority Opposition -- 6.8 Security Requirements -- 6.9 Open Issues -- 7 Conclusions -- References -- Multiple Infectious Disease Diagnosis and Detection Using Advanced CNN Models -- 1 Introduction -- 1.1 Paper Structure -- 2 Literature Survey -- 3 Methodology. |
3.1 Dataset -- 3.2 Preprocessing -- 3.3 Applied Models -- 3.4 Performance Metrics -- 4 Results -- 5 Conclusion -- References -- Development of Indoor Autonomous Mobile BOT for Static Obstacle Avoidance -- 1 Introduction -- 2 AutoBOT Hardware -- 2.1 NodeMCU ESP12E Module -- 2.2 Ultrasonic Sensor -- 2.3 Infrared Sensor -- 2.4 L298N Driver Module -- 3 AutoBOT Software -- 4 Environment -- 5 Control Interface -- 6 Data Collection and Hardware Results -- 7 Conclusion -- References -- Forest Fire Detection and Prediction Using HSV and MLP -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 4 Technology -- 5 Dataset, Testing and Experiments -- 6 Results and Future Work -- 7 Conclusion -- References -- An Insight into Recent Advances in the Intelligent Controller Methods -- 1 Introduction -- 1.1 Fractional-Order PID Controller (FOPIDC) -- 2 Intelligent Control -- 2.1 Characteristics, Challenges, and Application of Intelligent Control System -- 3 Evolution in Intelligent Controller -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Some Observations on Social Media Mining tools for Health Applications -- 1 Introduction -- 2 Social Media Mining for Health Applications (SMM4HA) -- 3 Issues and Challenges -- 4 Observations of Various Methods Used for SMM4HA -- 5 Conclusion -- References -- Smart Contact Lenses for Monitoring Patient's Vision: A Generic Review -- 1 Introduction -- 2 Why Do Cataracts Occur? And Its Surgery -- 3 How the Eyes Function -- 4 Human Eye Lens -- 5 Related Work -- 5.1 Screen Reader -- 5.2 Braille Displays -- 5.3 Text-to-Speech (TTS) Software -- 5.4 Navigation Aids -- 5.5 Optical Character Recognition (OCR) Software -- 5.6 Voice Assistants -- 6 Recommendation -- 7 Conclusion -- References -- Liver Lesion Detection from MR T1 In-Phase and Out-Phase Fused Images and CT Images Using YOLOv8. | |
1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experimental Setup and Results -- 4.1 Experimental Environment -- 4.2 Dataset -- 4.3 Performance Metrics -- 4.4 Experimental Setup -- 4.5 Results -- 5 Conclusion -- References -- Analyzing Blockchain Data to Detect Bitcoin Addresses Involved in Illicit Activities Using Anomaly Detection -- 1 Introduction -- 2 Literature Review -- 3 Experimental Set up and Algorithm Used -- 3.1 HPCC Systems Architecture -- 3.2 R and R Studio -- 3.3 Algorithm Used: K-Means Clustering -- 4 Methodology -- 4.1 Parser -- 4.2 Feature Extraction -- 4.3 Clustering and Analysis -- 5 Discussion of Results -- 6 Conclusion and Future Scope -- References -- Comparing Spring Boot and ReactJS with Other Web Development Frameworks: A Study -- 1 Introduction -- 1.1 History -- 1.2 Need of Study -- 1.3 Overview -- 2 Review of Literature -- 3 Methodology -- 4 Result -- 5 Discussion -- 6 Conclusion -- References -- Performance Analysis of InceptionV3, VGG16, and Resnet50 Models for Crevices Recognition on Surfaces -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Understanding the Dataset -- 3.2 Data Preprocessing -- 3.3 Designing Model for Crack Detection Using Resnet50, VGG16, and InceptionV3 -- 3.4 Training of Models -- 3.5 Testing of Models -- 4 Results and Discussion -- 5 Conclusion -- References -- A Machine Learning Approach for Moderating Toxic Hinglish Comments of YouTube Videos -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Collection and Visualization -- 3.2 Text Preprocessing -- 3.3 Model Creation -- 4 Results and Discussion -- 5 Open Challenges -- 5.1 Collecting a Larger Dataset of Hinglish Toxic Comments -- 5.2 Capturing the Contextual and Cultural Nuances of Hinglish Text -- 5.3 Utilizing More Advanced NLP and Machine Learning Techniques. | |
5.4 Mitigating Human Biases in the Manual Annotation -- 6 Conclusion -- References -- Instant Accident Detection and Emergency Alert System -- 1 Introduction -- 2 Related Work -- 3 Existing System -- 4 Proposed System -- 5 Methodology -- 5.1 Authentication Module -- 5.2 Detection Module -- 5.3 Alert Module -- 6 Results and Discussion -- 7 Conclusion -- References -- A Novel Approach to Video Summarization Using AI-GPT and Speech Recognition -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 4 Result -- 5 Discussion/Future Works -- 6 Conclusion -- References -- Classification of Underwater Fish Species Using Custom-Built Deep Learning Architectures -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Feature Extraction -- 3.2 Classification -- 3.3 Data Set -- 3.4 Data Pre-processing -- 3.5 Splitting the Data Set -- 3.6 Training the Model -- 3.7 Testing the Model -- 4 Architecture -- 4.1 Vgg16 -- 4.2 MobileNetV2 -- 4.3 ResNet50 -- 5 Results -- 5.1 Predictions -- 5.2 Graphs -- 5.3 Confusion Matrix -- 6 Conclusion -- 7 Future Enhancements -- References -- Deep Learning-Based Approach for Plant Disease Classification -- 1 Introduction -- 2 Literature Survey -- 3 Working Flow of the Model -- 4 Proposed Architecture for Neural Network -- 5 Implementation and Result Analysis -- 6 Conclusions -- References -- Prediction of Liver Disease Using Machine Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Dataset Description -- 4 Proposed Methodology -- 4.1 Data Preprocessing -- 4.2 Label Encoding -- 4.3 Pearson Correlation Coefficient-Based Feature Selection (PCC-FS) -- 4.4 Oversampling -- 4.5 Feature Scaling -- 4.6 Classification -- 4.7 Evaluation Measures -- 5 Results -- 6 Conclusion -- References -- Analysis of Detection of Glioma by Segmentation of Brain Tumor MRI Images Using Deep Learning -- 1 Introduction. | |
2 Techniques for Segmenting Brain Tumor Images -- 2.1 Manual Segmentation Methods -- 2.2 Semi-Automatic Segmentation Methods -- 2.3 Fully Automatic Segmentation Methods -- 3 Challenges in Fully Automatic Segmentation Methods -- 4 Dataset -- 5 Deep Learning Methods -- 6 Conclusions -- References -- CloneAI: A Deep Learning-Based Approach for Cloned Voice Detection -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Employed -- 3.2 Pre-processing and Feature Extraction -- 3.3 Model Implementation -- 4 Results and Discussion -- 5 Conclusion -- References -- Analyzing the Performance and Wireless Network Capacity of NOMA: Study of the Impact of OMA and NOMA on 5G Network -- 1 Introduction -- 2 System Model -- 3 Literature Survey -- 4 Compared Analysis -- 5 Conclusion -- References -- Malaria Parasite Detection Using Deep Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Data Preprocessing -- 3.3 Model Training and Classification -- 4 Experimental Results and Analysis -- 5 Conclusion -- References -- IoT-Based Agriculture: Identification and Classification of Apple Quality Using Deep Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Problem Statement -- 3.2 Proposed Methodology -- 4 Results Analysis -- 5 Conclusion -- References -- Plant Disease Detection on Edge Devices -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 4 Deep Learning Models -- 4.1 Comparison Between Model Sizes -- 4.2 Framework -- 5 Raspberry Pi Implementation -- 5.1 Integrated Gradients -- 6 Results -- 6.1 Raspberry Pi's Performance -- 7 Conclusion -- References -- Analyze the Quality of Wine Based on Machine Learning Approach -- 1 Introduction -- 2 Literature Survey -- 3 Quality Prediction Model -- 4 Results and Analysis -- 5 Conclusion -- References. | |
Safeguarding Financial Transaction with Cryptocurrency. | |
Titolo autorizzato: | Data Science and Applications |
ISBN: | 981-9978-17-3 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910805579003321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |