Vai al contenuto principale della pagina
| Autore: |
Kumar Sandeep
|
| Titolo: |
Proceedings of International Conference on Communication and Computational Technologies : ICCCT 2024, Volume 1 / / edited by Sandeep Kumar, Saroj Hiranwal, Ritu Garg, S. D. Purohit
|
| Pubblicazione: | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
| Edizione: | 1st ed. 2024. |
| Descrizione fisica: | 1 online resource (528 pages) |
| Disciplina: | 621.382 |
| Soggetto topico: | Computational intelligence |
| Signal processing | |
| Telecommunication | |
| Artificial intelligence | |
| Computational Intelligence | |
| Signal, Speech and Image Processing | |
| Communications Engineering, Networks | |
| Artificial Intelligence | |
| Altri autori: |
HiranwalSaroj
GargRitu
PurohitS. D
|
| Nota di contenuto: | Intro -- Organization -- Preface -- Contents -- Editors and Contributors -- Economically Growth and Impact of Indian Regional Navigation Satellite System at International Level -- 1 Introduction -- 2 Applications of IRNSS System -- 3 Growth and Impact at International Level -- 4 Growth and Impact at Indian Economy -- 5 Conclusion -- References -- Predictive Tomato Leaf Disease Detection and Classification: A Hybrid Deep Learning Framework -- 1 Introduction -- 2 Dataset -- 2.1 Plant Village -- 2.2 Plantdoc -- 3 Object Detection Models -- 3.1 Faster R-CNN -- 3.2 YOLO -- 3.3 SSD -- 3.4 Mask R-CNN -- 4 Image Classification Models -- 4.1 Visual Geometry Group (VGG) -- 4.2 Residual Network (ResNet) -- 4.3 Inception (GoogLeNet) -- 4.4 MobileNet -- 4.5 Xception -- 5 Review on Tomato Plant Leaf Diseases Prediction -- 6 Proposed Methodology -- 7 Result and Discussion -- 8 Conclusion -- References -- Conceptual Framework for Risk Mitigation and Monitoring in Software Organizations Based on Artificial Immune System -- 1 Introduction -- 2 Background and Motivation -- 3 Findings -- 4 A New Conceptual Framework for Risk Mitigation and Monitoring Based on Immune Clonal Approach-The Design/Proposed -- 5 Conclusions and Future Scope -- References -- A Multilevel Home Fire Detection and Alert System Using Internet of Things (IoT) -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 System Model -- 3.2 System Requirements -- 3.3 Multilevel Fire Detection -- 3.4 Multilevel Fire Alerts -- 4 Experimental Prototype, Results, and Discussion -- 5 Conclusion -- References -- Smart Baby Warmer with Integrated Weight Sensing -- 1 Introduction -- 1.1 Internet of Things (IoT) -- 1.2 Global System for Mobile Communication (GSM) -- 2 Working Principle -- 2.1 Methodology -- 2.2 Block Diagram -- 2.3 Flow Chart -- 2.4 Working of LM35 Sensor. |
| 2.5 Working of Load Cell and HX711 -- 2.6 Sending SMS Using GSM -- 2.7 Circuit Connection -- 3 Results and Analysis -- 3.1 SMS Alert -- 3.2 Output -- 3.3 Heater on -- 3.4 Heater off -- 3.5 Analysis -- 4 Conclusion -- References -- A Robust Multi-head Self-attention-Based Framework for Melanoma Detection -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Pre-processing and Patch Embedding -- 3.2 Multi-head Self-attention Model -- 3.3 Classification -- 4 Experimental Results -- 4.1 Dataset -- 4.2 Data Augmentation -- 4.3 Simulation Results -- 4.4 Comparative Analysis -- 4.5 Discussion -- 5 Conclusion -- References -- Domain Knowledge Based Multi-CNN Approach for Dynamic and Personalized Video Summarization -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 3.1 Input -- 3.2 Domain Activity Video Segmentation -- 3.3 Umpire Detection and Pose Recognition -- 3.4 Key Segments -- 3.5 Personalized and Dynamic Video Summarization -- 4 Result Analysis -- 5 Conclusion -- References -- Efficient Information Retrieval: AWS Textract in Action -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Input Documents -- 3.2 Analyzing Documents -- 3.3 Detecting Text -- 3.4 Confidence Scores -- 3.5 Deployment -- 4 Results and Discussion -- 4.1 Image as an Input -- 4.2 PDF as an Input -- 4.3 Table as an Input -- 5 Conclusion and Future Work -- References -- Text Summarization Techniques for Kannada Language -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Extractive Summarization Using TF-IDF Method -- 3.2 Abstractive Summarization Using the LSTM Method -- 4 Results and Discussions -- 5 Conclusion -- References -- Parkinson's Detection From Gait Time Series Classification Using LSTM Tuned by Modified RSA Algorithm -- 1 Introduction -- 2 Related Works -- 2.1 Long Short-Term Memory. | |
| 2.2 Metaheuristics Optimization -- 3 Methods -- 3.1 The Original RSA -- 3.2 Genetically Inspired RSA -- 4 Experiments -- 4.1 Dataset -- 4.2 Simulation Setup -- 4.3 Metrics -- 4.4 Simulation Results -- 5 Conclusion -- References -- Human Action Recognition Using Depth Motion Images and Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Algorithm for Displaying Depth Map Sequence -- 3.2 Algorithm for Depth Motion Images -- 3.3 Convolutional Neural Network Model -- 4 Results and Discussion -- 5 Conclusion -- References -- Maximizing Portfolio Returns in Stock Market Using Deep Reinforcement Techniques -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Methodology -- 4 Result Analysis -- 5 Backtest Results -- 6 Conclusion -- References -- Detecting AI Generated Content: A Study of Methods and Applications -- 1 Introduction -- 2 Background -- 2.1 Watermarking -- 2.2 Classification -- 2.3 Statistical Analysis -- 3 Generative Models -- 4 Detecting AI-Generated Content -- 4.1 Linguistic-Based Methods -- 4.2 Statistical-Based Methods -- 4.3 Learning-Based Methods -- 5 Challenges in AI Content Detection -- 6 Applications and Scenarios -- 7 Conclusion -- References -- A Systemic Review of Machine Learning Approaches for Malicious URL Detection -- 1 Introduction -- 2 Identifying URLs with Malicious Hidden Links -- 2.1 Traditional Approaches to Malicious URL Detection -- 2.2 Heuristic Based Methods -- 2.3 Machine Learning Approaches -- 2.4 List of features extracted from the URL: -- 3 Malicious URL Classification with Artificial Intelligence -- 3.1 Random Forest Algorithm -- 3.2 PhishAri: Automatic Real-Time Phishing Detection on Twitter -- 3.3 Support Vector Machine (SVM) -- 4 Deep Learning Methods -- 4.1 Models Based on Convolutional Neural Networks -- 4.2 Models Based on Recurrent Neural Networks. | |
| 4.3 Models Based on a Combination of CNN and RNN -- 4.4 Models Based on Transformers -- 5 Conclusion -- References -- Digital Image Forgery Detection Based on Convolutional Neural Networks -- 1 Introduction -- 2 Related Work -- 2.1 Block-Based Approach -- 2.2 Key Point-Based Approach -- 2.3 Machine Learning-Based Approach -- 3 The Proposed CNN Model -- 3.1 Image Preprocessing -- 3.2 Image Resizing -- 3.3 CNN Architecture -- 3.4 Classification -- 4 Experimental Results -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 The Results -- 4.4 Discussion -- 4.5 Comparison with Other Works -- 5 Concluding Remarks -- References -- Banana Freshness Classification: A Deep Learning Approach with VGG16 -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection and Dataset Composition -- 3.2 Data Preprocessing -- 3.3 Data Augmentation -- 4 Experimental Work -- 4.1 Model Architecture -- 4.2 Model Training -- 5 Results and Analysis -- 5.1 Model Performance -- 5.2 Confusion Matrix -- 5.3 Classification Report -- 6 Conclusions And Future Work -- References -- GreenHarvest: Data-Driven Crop Yield Prediction and Eco-Friendly Fertilizer Guidance for Sustainable Agriculture -- 1 Introduction -- 2 Literature Survey -- 3 Problem Definition -- 4 Objectives -- 5 Methodology -- 6 Results and Algorithms -- 7 Conclusion -- References -- Real-Time Deep Learning Based Image Compression Techniques: Review -- 1 Introduction -- 2 Image Compression -- 2.1 Lossy Compression -- 2.2 Lossless Compression -- 3 Deep Learning -- 3.1 Auto-Encoder -- 3.2 Recurrent Neural Network -- 3.3 Convolution Neural Network -- 4 Literature Review -- 5 Discussion -- 6 Conclusion -- References -- Fog-Cloud Enabled Human Falls Prediction System Using a Hybrid Feature Selection Approach -- 1 Introduction -- 2 Related Works -- 3 Proposed Human Fall Prediction System. | |
| 4 Hybrid Feature Selection Approach -- 5 Experimental Results -- 6 Conclusion and Future Enhancement -- References -- A 4-Input 8-Bit Comparator with Enhanced Binary Subtraction -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Full Adder Logic -- 3.2 8-Bit Adder Logic -- 3.3 Comparator Logic -- 4 Novelty -- 5 Analysis -- 5.1 Register Transfer Level (RTL) Components Analysis -- 5.2 Power Analysis -- 5.3 Part Resource Analysis -- 6 Results -- 6.1 Input Scenario and Output -- 6.2 Circuit Justification -- 7 Conclusion and Future Scope -- References -- Multivalued Dependency in Neutrosophic Database System -- 1 Introduction -- 2 Basic Definitions -- 2.1 Neutrosophic Set -- 2.2 α-Equal of Neutrosophic Tuples -- 2.3 Neutrosophic Functional Dependency -- 3 A New Concept: Neutrosophic Multivalued Dependency (α-nmvd) -- 3.1 Multivalued Dependency -- 3.2 Neutrosophic Multivalued Dependency -- 3.3 Inference Rules for α-nmvd -- 4 Conclusion -- References -- Traffic Sign Recognition Framework Using Zero-Shot Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Result and Analysis -- 4.1 Dataset -- 4.2 Result -- 5 Conclusion -- References -- Machine Learning Techniques to Categorize the Sentiment Analysis of Amazon Customer Reviews -- 1 Introduction -- 2 Related Work -- 3 Data Preprocessing -- 4 Methodology -- 4.1 Data Source and Data Set -- 5 Experiment and Result -- 6 Conclusion -- References -- Alzheimer's Disease Diagnosis Using Machine Learning and Deep Learning Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Datasets -- 4 Experimental Results -- 5 Conclusion -- References -- Sentinel Eyes Violence Detection System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Openpose -- 3.2 Yolov8 -- 3.3 Cnn-Lstm -- 4 Result -- 4.1 Object Detection Models -- 4.2 Architectures -- 5 Conclusion -- References. | |
| Detection of Alzheimer's Disease from Brain MRI Images Using Convolutional Neural Network. | |
| Sommario/riassunto: | This book gathers selected papers presented at 6th International Conference on Communication and Computational Technologies (ICCCT 2024), jointly organized by Soft Computing Research Society (SCRS) and Rajasthan Institute of Engineering & Technology (RIET), Jaipur, during January 8–9, 2024. The book is a collection of state-of-the art research work in the cutting-edge technologies related to the communication and intelligent systems. The topics covered are algorithms and applications of intelligent systems, informatics and applications, and communication and control systems. |
| Titolo autorizzato: | Proceedings of International Conference on Communication and Computational Technologies ![]() |
| ISBN: | 9789819774234 |
| 9819774233 | |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910917189803321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |