Vai al contenuto principale della pagina

ICT Analysis and Applications . Volume 2 : Proceedings of ICT4SD 2023 / / Simon Fong, Nilanjan Dey, and Amit Joshi, editors



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: ICT Analysis and Applications . Volume 2 : Proceedings of ICT4SD 2023 / / Simon Fong, Nilanjan Dey, and Amit Joshi, editors Visualizza cluster
Pubblicazione: Singapore : , : Springer, , [2023]
©2023
Edizione: First edition.
Descrizione fisica: 1 online resource (623 pages)
Disciplina: 338.927
Soggetto topico: Sustainable development
Sustainable engineering
Persona (resp. second.): FongSimon
DeyNilanjan
JoshiAmit
Nota di bibliografia: Includes bibliographical references.
Nota di contenuto: Intro -- Preface -- Contents -- Editors and Contributors -- Analysis of Smart Health Monitoring Systems -- 1 Introduction -- 1.1 Objective -- 1.2 Targeted Users -- 2 Literature Review -- 3 Smart Remote Health Monitoring Systems Applications -- 3.1 Smart Health Monitoring Systems Applications -- 3.2 Benefits of Smart Health Monitoring System -- 3.3 Smart Health Monitoring System Architecture -- 4 Conclusion -- References -- Nerve Segmentation Using Multi-scale Attention Mechanism-U-Net -- 1 Introduction -- 2 Material and Methodology -- 2.1 About Dataset -- 2.2 Methodology -- 3 Result and Discussion -- 4 Conclusion -- References -- A Comparative Study of Register Allocation Algorithms -- 1 Introduction -- 2 Register Allocation Algorithms -- 2.1 Graph Coloring -- 3 Chaitin-Briggs -- 3.1 SSA-Based -- 3.2 Linear Scan -- 3.3 Tree -- 3.4 Fusion-Based -- 4 Comparison and Results -- 5 Conclusion -- 6 Future Scope -- References -- Brain Tumor Detection Using Machine Learning -- 1 Introduction -- 2 Information Pre-handling -- 3 Straight Regression -- 4 Ridge Regression -- 5 Previous Analysis -- 6 Deep Learning -- 7 CNN -- 8 Linear Regression -- 9 Vector Regression -- 10 Artificial Neural Network -- 11 Gradient Boost -- 12 Methodology -- 13 Future Scope -- References -- Restoration of Ancient Kannada Handwritten Palm Leaf Manuscripts with Modified Sauvola Method Using Integral Images -- 1 Introduction -- 2 Proposed Method -- 2.1 Implementation of Modified Sauvola Method Using Integral Images -- 3 Experimental Results and Discussion -- 4 Conclusion -- References -- Conversion of Gujarati Alphabet to Gujarati Sign Language Using Synthetic Animation -- 1 Introduction -- 1.1 HamNoSys Symbols -- 2 Literature Review -- 3 Architecture -- 4 Conclusion -- References -- Wearable Device to Monitor the Health Parameters of a Cyclist -- 1 Introduction.
1.1 Research Paper Study -- 2 Modules -- 3 Design and Development -- 4 Algorithms -- 5 Product Comparisons -- 6 Results -- 7 Challenges Faced -- 8 Conclusion -- 9 Future Scope -- References -- A Machine Learning-Based Detection of IoT Cyberattacks in Smart City Application -- 1 Introduction -- 2 Related Work -- 3 Proposed Model for Cyberattacks Detection -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- A Comprehensive Survey on Security Aspects of Using Blockchain Technology for Digital Degree Verification Solutions -- 1 Introduction -- 2 Taxonomy of Blockchain Technology -- 3 Study of Literature Survey -- 3.1 KMI -- 3.2 RecordsKeeper -- 3.3 Blockcerts -- 3.4 EduCTX -- 3.5 UNIC -- 3.6 UZHBC -- 3.7 SmartCert -- 3.8 BCDiploma -- 3.9 SuperCert -- 4 Conclusion -- References -- Augmented Reality-Based Education Ecosystem for Specially Abled Children -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System Architecture -- 4 Implementation and Results -- 4.1 Creating a Scene Using Unity -- 4.2 Building 3D Objects Using Blender -- 4.3 Creating Image Targets Using Vuforia Engine -- 4.4 Integrate Through Android Studio -- 4.5 Results and Discussion -- 5 Conclusion and Future Enhancement -- References -- Intelligent Filter for Internet Traffic Monitoring and Analysis of Possible Cyber Threats -- 1 Introduction -- 2 Motivation -- 3 Ease of Use -- 3.1 Container-Based Solution -- 3.2 Comparative Case Study in Existing Technology -- 3.3 (a) Tools Used (b) Implementation Architecture -- 3.4 Flow of Data -- 3.5 Detection of Attack on the Data Link Layer -- 3.6 Detection of Attack on the Transport Layer -- 3.7 Detection of Attack on the IP Layer -- 3.8 Detection of Attack on the Application Layer -- 4 Conclusion -- 5 Future Scope -- References -- Detection of Autism Using Artificial Intelligence -- 1 Introduction -- 1.1 Autism Spectrum Disorder (ASD).
1.2 Signs of Autism Spectrum Disorder (ASD) -- 1.3 Autism Spectrum Disorder in Adults -- 1.4 Autism Symptoms in Adults at Work -- 1.5 Diagnosing ADS -- 1.6 Living with Autism -- 1.7 Treatment for Autism -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Steps in Detecting Autism -- 3.2 Convolution Neural Network -- 3.3 CNN Architecture to Detect Autism -- 3.4 VGG16 to Detect Autism -- 3.5 Dataset Description -- 3.6 Data Preprocessing -- 4 Results and Discussion -- 4.1 Pre-trained Model for Transfer Learning -- 4.2 Creation of Custom Model -- 4.3 Model Training -- 4.4 Model Validation -- 4.5 Results -- 5 Improvisation -- References -- Analyzing and Predicting Diabetes Chronic Disease Using Machine Learning Techniques -- 1 Introduction -- 2 Related Works -- 3 Dataset -- 4 Methodology -- 4.1 Pre-processing the Data -- 4.2 Algorithms Used -- 5 Results and Discussion -- 5.1 Model Performance -- 5.2 Web-UI Implementation -- 6 Conclusion -- References -- Challenges of Multimedia Education in the Lives of Human Beings -- 1 Introduction -- 2 Advantages of Multimedia -- 3 Disadvantages of Multimedia -- 4 Multimedia and Mental Health -- 5 Tackling the Harmful Effects of Multimedia -- 6 Conclusion -- References -- Effective Detection of Liver Disease Using Machine Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work Model -- 3.1 Data Collection -- 3.2 Data Pre-processing -- 3.3 Modeling -- 4 Conclusion -- References -- Digital Financial Asset Management Using Blockchain for Succession Planning of Wealth -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Analysis of the Collected Data -- 5 Conclusion -- References -- The Secured System for Continuous Improvement in Educational Institutes Using Big Data Analytics -- 1 Introduction -- 2 Problem Statement -- 3 Related Work.
3.1 Enhancing the Performance in Educational Institute -- 3.2 Designing the Educational Institute -- 3.3 Predictive Analysis -- 3.4 Secured System -- 4 Methodology -- 4.1 Collaborative Filtering -- 4.2 Map Reduce -- 4.3 Kerberos -- 4.4 Vader -- 4.5 Sqoop -- 5 Results and Discussions -- 6 Conclusion -- References -- A Brief Review of Text Summarization Approaches -- 1 Introduction -- 2 Background -- 2.1 Classification of Text Summarization -- 2.2 Summarization Methods -- 2.3 Language Model -- 3 Text Summarization Process with Encoder-Decoder Architecture -- 4 Mechanism to Improve Text Summarization System -- 5 Dataset -- 6 Evaluation of Summary Generated -- 7 Conclusion -- References -- Transfer Learning-Based Nutrient Deficiency Prediction Model for Sugarcane Crop -- 1 Introduction -- 2 Deep Learning Models Used in Agriculture -- 3 Transfer Learning Model for Nutrient Deficiency Prediction -- 3.1 Data Collection -- 3.2 Framework for Evaluation of Nutrient Deficiency -- 3.3 Algorithm for Nutrient Deficiency Prediction -- 4 Results -- 5 Conclusion -- References -- A Machine Learning Method for Stock Market Price Prediction -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Data Statistics -- 3.2 Data Splitting and Feature Identification -- 3.3 Multiple Linear Regression Approach -- 3.4 Evaluation Measures -- 4 Experimental Analysis -- 4.1 Dataset -- 4.2 Trend Analysis -- 4.3 Prediction -- 4.4 Accuracy (Evaluation Metrics) -- 5 Conclusion -- References -- Eye for Blind: A Deep Learning-Based Sensory Navigation System for the Blind -- 1 Introduction -- 2 Literature Review -- 3 Work Done -- 4 Dataset Collection and Preprocessing -- 5 Methodology -- 6 Output of the Implemented Model -- 7 Future Scope -- 8 Conclusion -- References -- Adaptive Robust Beamforming Approach for Power Optimization in Device-To-Device (D2D) Communication Network.
1 Introduction -- 1.1 Related Work -- 1.2 Notations -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Proposed Merging Scheme -- 3.1 Power Optimization Using Game Theory: An Iterative Approach -- 4 Numerical Results -- 5 Conclusion -- References -- Designing a Deep Learning Model for Video Anomaly Detection-Based Surveillance -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Sampling Method -- 3.2 Proposed Algorithm -- 4 Result -- 4.1 Dataset Labeling -- 4.2 Architectures -- 4.3 ConvNet 3D (C3D) -- 4.4 Two-Stream Inflated 3D ConvNets (I3D) -- 4.5 R(2 + 1)D -- 4.6 Hidden 2 Stream -- 4.7 Temporal 3D ConvNets (T3D) -- 4.8 Temporal Segment Network (TSN) -- 4.9 Multi-fiber (MF-Net) -- 5 Conclusion -- References -- Smart Management of DC Microgrid Using Forecasting -- 1 Introduction -- 2 Hardware Specification -- 3 Simulations -- 4 Result -- 5 Conclusion and Future Scope -- References -- LoRa-Based Farm Monitoring System -- 1 Introduction -- 2 Related Works -- 3 LoRa Technology -- 4 Implementation Details -- 5 Results -- 6 Conclusion -- References -- Breast Cancer Detection Using Image Processing -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Result -- 5 Future Scope -- 6 Conclusion -- References -- Touch-Free Biometric Authentication System -- 1 Introduction -- 2 Face Recognition -- 2.1 Related Work -- 2.2 Algorithms -- 3 Iris Recognition -- 3.1 Related Work -- 3.2 Algorithms -- 4 Fingerprint Recognition -- 4.1 Related Work -- 4.2 Algorithm and Techniques for Fingerprint Authentication -- 5 Diagram -- 6 Literature Review -- 6.1 Conclusion and Future Work -- References -- Partial Ground-Inserted H-shaped Antenna for Beyond 5G Applications -- 1 Introduction -- 2 Partial Ground-Inserted H-shaped Antenna Design -- 3 Antenna Analysis -- 4 Conclusion -- References.
Crop Recommendation Assessment for Arid Land Using Machine Learning.
Titolo autorizzato: ICT Analysis and Applications  Visualizza cluster
ISBN: 981-9965-68-3
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910799247403321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture notes in networks and systems ; ; Volume 782.