Vai al contenuto principale della pagina

Innovative Computing and Communications : Proceedings of ICICC 2024, Volume 2 / / edited by Aboul Ella Hassanien, Sameer Anand, Ajay Jaiswal, Prabhat Kumar



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Hassanien Aboul Ella Visualizza persona
Titolo: Innovative Computing and Communications : Proceedings of ICICC 2024, Volume 2 / / edited by Aboul Ella Hassanien, Sameer Anand, Ajay Jaiswal, Prabhat Kumar Visualizza cluster
Pubblicazione: Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Edizione: 1st ed. 2024.
Descrizione fisica: 1 online resource (662 pages)
Disciplina: 621.382
Soggetto topico: Telecommunication
Internet of things
Machine learning
Artificial intelligence
Communications Engineering, Networks
Internet of Things
Machine Learning
Artificial Intelligence
Altri autori: AnandSameer  
JaiswalAjay  
KumarPrabhat  
Nota di contenuto: Intro -- Preface -- Steering Committee -- Contents -- Editors and Contributors -- Bangladeshi CF Guard: Unveiling Bangladeshi Counterfeit Currency Through Transfer Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Security Features' Analysis -- 3.2 Data Collection -- 3.3 System Architecture -- 4 Result and Discussion -- 4.1 Experimental Outcomes -- 4.2 Discussion -- 5 Conclusion -- 5.1 Conclusion -- 5.2 Limitations and Future Work -- References -- Recognition of Sign Language Using Hybrid CNN-RNN Model -- 1 Introduction -- 2 Literature -- 3 Proposed Method -- 3.1 Preprocessing -- 3.2 Classification and Recognition -- 3.3 Proposed Work -- 4 Evaluation Strategies -- 4.1 Dataset -- 5 Experiment and Result -- 5.1 Dataset I -- 5.2 Dataset II -- 6 Conclusion and Future Direction -- References -- Nanotech Drones: An Investigation of Air Quality Index in Environment -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 3 Discussions and Results -- 3.1 Air Quality Index -- 3.2 Working of Nanotech Drone -- 4 Conclusion -- References -- Systematic Vulnerability Assessment: Mapping Architecture Flow and Ranking Components for Vulnerability in Connected Automated Vehicles -- 1 Introduction -- 2 Literature Review -- 3 Architectural Flow -- 4 Scoring Criterion -- 5 Score Analysis -- 6 Results and Discussions -- 7 Conclusions -- References -- AI and Blockchain in Food and Beverage: Marketing 5.0 Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Starbucks Advanced Advertising -- 2.2 Digital Promotion -- 2.3 Marketing 5.0 -- 2.4 Applications of Blockchain Technology in F& -- B Industry -- 3 Methodological Framework -- 3.1 Exploring Knowledge Through Group Discussions -- 3.2 Quantitative and Qualitative Analysis of Content -- 3.3 The Analytical Cognizance of Content Scrutiny -- 4 Results.
5 Conclusion and Recommendations for Further Research -- References -- A Deep Learning-Based Cervical Tumor Classification System for Telehealthcare Monitoring -- 1 Introduction -- 2 Literature-Related Works -- 3 Stages of Prior Cervical Cancer -- 4 Class Activation Map (CAM) -- 5 System Methodology -- 5.1 Analyzing Prior Tumor Infiltration Evidence -- 5.2 DCNN Based on Prior Evidence -- 6 Experimental Findings -- 6.1 Improvement of Prediction Based on Prior Evidence -- 6.2 Staging Methods for Cervical Cancer Compared to Others -- 7 Conclusion -- References -- Big Data-Driven Intelligence Healthcare Framework for Smart Citizen -- 1 Introduction -- 1.1 The Importance of Big Data -- 1.2 Intelligent System for Healthcare -- 2 Background and Related Work -- 2.1 Digitization of Healthcare and Big Data -- 2.2 Technologically Advanced Urban Areas (Modern City) -- 2.3 Optimal Health -- 3 Dimensional Framework Paradigm -- 3.1 Advanced Healthcare Technologies -- 4 Proposed Intelligent Healthcare System -- 5 Pros, Cons, and Application -- 6 Conclusion -- References -- Smart Device with Arduino Controller for Home Inverter -- 1 Introduction -- 2 Design of Proposed System -- 2.1 Mathematical Analysis of Proposed System -- 2.2 Mathematical Calculations of Proposed System -- 2.3 Algorithm and Flowchart -- 3 Hardware Results and Discussions -- 4 Conclusion -- References -- Feature Selection with Particle Swarm for Improved Classification on High-Dimensional Datasets -- 1 Introduction -- 2 Literature Survey -- 2.1 PSO-Based Approaches -- 2.2 ACO-Based Approaches -- 2.3 FA-Based Approaches -- 2.4 GWO-Based Approaches -- 2.5 SSO-Based Approaches -- 3 Proposed Methodology -- 3.1 PSO-Based Feature Selection -- 3.2 PSO Pseudocode -- 4 Experimental Results -- 4.1 Dataset -- 4.2 Comparative Analysis -- 4.3 Statistical Analysis -- 4.4 Runtime Computation (min:sec:milli_sec).
5 Conclusion -- References -- Breast Cancer Prediction Using Hybridization of Machine Learning and Optimization Technique -- 1 Introduction -- 2 Literature Survey -- 2.1 Previous Work Done Using Machine Learning Classifiers -- 2.2 Previous Work Done Using Deep Learning -- 2.3 Previous Work Done Using Optimization Techniques -- 2.4 Previous Work Done Using Genetic Algorithm -- 3 Methodology -- 3.1 Classifiers Used -- 3.2 Dataset Used -- 3.3 Optimization Technique Used -- 3.4 Parameters Setting -- 3.5 Implementation -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Securing Pictorial Data Transfer Through a Novel Digital Image Encryption Method -- 1 Introduction -- 2 Proposed Work -- 3 Structure of Encryption -- 4 Concept of Decryption -- 5 Pictorial Representation -- 6 Comparison with Visual Cryptography -- 7 Conclusion -- Appendix -- The idea of rotating matrices -- References -- IoT Routing Reimagined: Dynamic Phantom Routing with ACO for Efficient Source Location Privacy -- 1 Introduction -- 1.1 Contributions -- 1.2 Organization -- 2 Related Works -- 3 Problem Statement -- 4 Proposed System -- 4.1 Network Condition-Based Dynamic Phantom Node Selection (NCDPNS) -- 4.2 Bio-inspired Algorithm-Aided Multi-path Selection-Based Routing (BAMSR) -- 5 Results -- 6 Conclusion and Future Work -- References -- Deep Learning-Based Evaluation of ICU Requirements in COVID-19 Cases -- 1 Introduction -- 2 Related Works -- 3 Overview the Proposed System -- 4 Methodology -- 5 Experimental Results -- 6 Discussion -- 7 Conclusion -- References -- Deep Learning-Based Tea Fermentation Grading -- 1 Introduction -- 2 Related Work -- 3 Methods and Materials -- 4 Evaluation -- 5 Results -- 6 Comparison -- 7 Conclusion -- 7.1 Statements and Declarations -- References.
An Exploratory Study of the Relationship Between Students' Positive Attitudes Toward Artificial Intelligence and Computational Thinking Needed in the 6G Communications' Era -- 1 Introduction -- 2 Methodology -- 2.1 Survey Procedure and Survey Participants -- 2.2 Questionnaire Items -- 2.3 Analysis Procedure -- 3 Results -- 3.1 Preliminary Analysis -- 3.2 Descriptive Statistics of Positive Awareness of AI and Computational Thinking -- 3.3 Results of Logistic Regression Analysis -- 4 Discussions -- 4.1 Implications for Educational Program Development -- 5 Conclusion -- References -- Optimization of Double-Tuned Mass Dampers via Jaya Algorithm -- 1 Introduction -- 2 Methodology -- 3 The Numerical Example -- 4 Conclusion -- References -- Application of Wavelet Packet Transform for Detecting Bearing Issues -- 1 Introduction -- 2 History of Motor Vibration Data -- 3 Time-Frequency Domain Analysis -- 3.1 Analysis Based on DWT -- 3.2 Analysis Based on WPT -- 4 Results and Discussion -- 4.1 DWT-Based Frequency Range Determination of Outer Race Defect -- 4.2 WPT Based on Frequency Range Determination of Outer Race Fault -- 5 Conclusion and Future Scope -- References -- Detection of Potholes in Roads Using Siamese Neural Network for Safe Transportation -- 1 Introduction -- 2 Literature Survey -- 3 Methods and Technology Used -- 3.1 Dataset -- 3.2 Siamese Neural Network -- 3.3 Contrastive Loss Function -- 3.4 Training & -- Testing Set -- 3.5 Proposed Methodology -- 4 Results and Analysis -- 5 Conclusion -- References -- On the Security of Privacy-Preserving Bilateral Attribute-Based Encryption -- 1 Introduction -- 1.1 Our Contribution -- 2 The Scheme Presented by Sun et al. -- 2.1 System Model -- 2.2 Algorithms -- 2.3 Detailed Scheme -- 3 Cryptanalysis of the Scheme -- 3.1 Violating Receiver Privacy -- 3.2 Violating Sender Privacy -- 4 Conclusion.
References -- Analyzing the Financial Performance of Corporate Social Responsibility Using Machine Learning-Enabled Financial Enterprise Model -- 1 Introduction -- 2 Related Work -- 3 Proposed Method: Machine Learning Using a Financial Enterprise Model -- 4 Result and Discussion -- 5 Conclusion -- References -- A Survey on Driver Monitoring System Using Computer Vision Techniques -- 1 Introduction -- 2 Motivation -- 3 Literature Review -- 4 The Proposed System -- 4.1 Drowsiness Detection -- 4.2 Gaze Detection -- 4.3 Activity Recognition -- 4.4 Emotion Recognition -- 5 Conclusion -- References -- ICT-Based Smart Cities Planning: A Case Study of Rashid Camp -- 1 Introduction -- 2 Smart City: A Contemporary Revolution for Urban Space Management -- 3 The Geographic Information System (GIS) and Remote Sensing (RS): Smart Planning Support Tool -- 4 Description of the Case Study Al-Rashid Camp -- 5 Methodology and Approach -- 6 Results and Discussion -- 7 Conclusion -- References -- Detection of Hate Speech Using Ensemble Models -- 1 Introduction -- 2 Related Works -- 3 Experimental Setup and Proposed Methodology -- 3.1 Datasets -- 3.2 Data Collection and Preprocessing -- 3.3 Models -- 3.4 Classifier Evaluation -- 4 Result and Discussion -- 4.1 Model Training and Evaluation Metrics -- 5 Result and Discussion -- 6 Conclusion -- References -- Development of Dermatological Lesion Detection System Using EfficientNet with Fairness Evaluation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Methodology Flowchart -- 3.2 Algorithm Used -- 3.3 Proposed Model's Pseudocode -- 3.4 Steps Followed -- 4 Experimental Results and Discussion -- 4.1 Dataset Used -- 4.2 Performance Assessment -- 4.3 Performance Comparative Analysis -- 5 Conclusion -- References -- Quantum Computing's Path to Supremacy: Progress in the NISQ Epoch -- 1 Introduction.
2 The History of Quantum Computing.
Sommario/riassunto: This book includes high-quality research papers presented at the Seventh International Conference on Innovative Computing and Communication (ICICC 2024), which is held at the Shaheed Sukhdev College of Business Studies, University of Delhi, Delhi, India, on 16–17 February 2024. Introducing the innovative works of scientists, professors, research scholars, students, and industrial experts in the field of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.
Titolo autorizzato: Innovative Computing and Communications  Visualizza cluster
ISBN: 9789819735914
9789819735907
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910878065203321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Networks and Systems, . 2367-3389 ; ; 1021