Vai al contenuto principale della pagina

Computing, communication and learning : first international conference, CoCoLe 2022, Warangal, India, October 27-29, 2022, proceedings / / edited by Sanjaya Kumar Panda [and five others]



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Computing, communication and learning : first international conference, CoCoLe 2022, Warangal, India, October 27-29, 2022, proceedings / / edited by Sanjaya Kumar Panda [and five others] Visualizza cluster
Pubblicazione: Cham, Switzerland : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (323 pages)
Disciplina: 929.605
Soggetto topico: Computer science
Persona (resp. second.): PandaSanjaya Kumar
Nota di bibliografia: Includes bibliographical references and index.
Nota di contenuto: Intro -- Preface -- Organization -- Contents -- Computing -- A Lightweight Block Cipher for Cloud-Based Healthcare Systems -- 1 Introduction -- 2 Related Work -- 3 Proposed System for Secure Healthcare System -- 4 Software Implementation -- 5 Results and Findings -- 5.1 Statistical Analysis -- 5.2 Accuracy -- 5.3 Key Analysis -- 6 Conclusion -- References -- Developing a Cloud Intrusion Detection System with Filter-Based Features Selection Techniques and SVM Classifier -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Pre-processing -- 3.2 Feature Selection -- 3.3 Classification Approach -- 4 Implementation and Result Analysis -- 4.1 Dataset -- 4.2 Evaluation Criteria -- 4.3 Result Analysis -- 5 Conclusion -- References -- A Study on Effect of Learning Rates Using Adam Optimizer in LSTM Deep Intelligent Model for Detection of DDoS Attack to Support Fog Based IoT Systems -- 1 Introduction -- 2 Related Work -- 3 Optimizers -- 3.1 Gradient Descent (GD) -- 3.2 Stochastic Gradient Descent (SGD) -- 3.3 SGD+Momentum -- 3.4 Adagrad -- 3.5 RMSProp -- 3.6 Addelta -- 3.7 Adam -- 4 DDoS Attack Model -- 5 Overview of Dataset -- 6 Results and Discussion -- 7 Conclusion -- References -- Comparative Study of Workflow Modeling Services Based on Activity Complexity -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Serverless Workflow Modeling Concepts -- 4.1 Serverless Computing -- 4.2 Function as a Service -- 4.3 Serverless Application as Workflow Model -- 5 Feature Comparison of Serverless Workflow Services -- 6 Experiments and Results -- 6.1 Experimental Setup and Dataset Preparation -- 6.2 Evaluation Parameters -- 6.3 Results and Discussion -- 7 Conclusion -- References -- Granular Access Control of Smart Contract Using Hyperledger Framework -- 1 Introduction -- 2 Literature Review -- 2.1 Findings -- 2.2 Gap Analysis -- 2.3 Problem Definition.
3 Methodology -- 3.1 Proposed Solutions -- 3.2 Discussion and Analysis -- 4 Conclusion -- References -- Cyclomatic Complexity Analysis for Smart Contract Using Control Flow Graph -- 1 Introduction -- 2 Related Work -- 3 Problem Approach -- 3.1 Creation of CFG -- 3.2 Cyclomatic Complexity with the Help of Control Flow Graph -- 4 Experimental Studies -- 5 Conclusion and Future Work -- References -- An Improved GWO Algorithm for Data Clustering -- 1 Introduction -- 2 Literature Work -- 2.1 Partitional Clustering Algorithms -- 2.2 Grey Wolf Optimization -- 2.3 JAYA Algorithm -- 3 Methodology -- 3.1 Proposed Clustering Methods Using Meta-heuristic Approaches -- 4 Experimental Setup and Result Analysis -- 4.1 Dataset Description -- 4.2 Result Analysis Using Individual Dataset -- 4.3 Analysis Using Non-parametric Test -- 5 Conclusion -- References -- Anticipation of Heart Disease Using Improved Optimization Techniques -- 1 Introduction -- 1.1 Problem Statement -- 2 Literature Review -- 3 Research Question -- 4 Proposed Model -- 4.1 Data Collection -- 4.2 Manual Exploration -- 4.3 Data Preprocessing -- 4.4 Feature Selection -- 4.5 Optimization Algorithms -- 4.6 Performance Measure -- 5 Results and Discussion -- 6 Conclusion -- References -- Decentralized Energy Management in Smart Cities Using Blockchain Technology -- 1 Introduction -- 1.1 Bockchain Technology -- 1.2 Motivation -- 1.3 Scope -- 1.4 Objectives of the Paper -- 1.5 The Significance of Paper -- 2 Literature Survey -- 3 Proposed Scheme -- 3.1 Smart Meters and Cloud Server -- 3.2 Cloud Server and Blockchain -- 4 Implementation -- 4.1 Limitations of the Proposed System -- 5 Results and Comparisons -- 5.1 Traditional Bill Payment Process: -- 5.2 E-Bill Payment System ch9CASINO201955,ch9 https:spsspsdoi.orgsps10.1002spser.7927 -- 5.3 System Security Analysis: -- 6 Conclusion and Future Works.
6.1 Conclusion -- 6.2 Future Scope -- References -- Design and FPGA Realization of an Energy Efficient Artificial Neural Modular Exponentiation Architecture -- 1 Introduction -- 2 Designs of Various Full Adders -- 2.1 RTL Full Adder -- 2.2 SLC Full Adder -- 2.3 RLG Full Adder -- 2.4 ANN Full Adder -- 3 Design of Modular Exponentiation (ME) Architecture -- 3.1 Introduction -- 3.2 Estimation of Average Switching Activity of ME Circuit Designs -- 4 Simulation and Performance Results -- 4.1 Simulation Results -- 4.2 Synthesis Results -- 4.3 Performance Metrics Evaluation -- References -- Comparative Analysis of Power Management System for Microbial Fuel Cell -- 1 Introduction -- 2 Electrical Equivalent Model of MFC -- 3 Analysis of PMS for MFC -- 4 Conclusion -- References -- Communication -- Localized Hop-Count Based Routing (LHR) Protocol for Underwater Acoustic Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 Design of Localized Hop-Count Based Routing (LHR) Protocol -- 3.1 Phase-I: Initial Network Setup -- 3.2 Phase-II: Localized Hop-Count Updation and Next-Hop Selection -- 4 Implementation of LHR in UnetStack -- 4.1 UnetStack -- 4.2 User-Defined Agents in LHR -- 5 Results and Analysis -- 6 Conclusion -- References -- Underwater Acoustic Sensor Networks' Performance Evaluation Tool (UASN-PET) for UnetStack -- 1 Introduction -- 2 Introduction to UnetStack and Its Simulation Output -- 2.1 Output Files of a Simulation in UnetStack -- 3 Design of UASN-PET -- 3.1 Approach Taken -- 3.2 Architecture of UnetStack Trace Analyzer -- 3.3 Layers Are Described Briefly Below -- 4 Implementation of UASN-PET -- 4.1 Tracing a Data Packet on Multi-hop Communication -- 5 Result and Analysis of UASN-PET -- 5.1 Result Analysis on Network Topology -- 5.2 Prerequisites for the Tool -- 6 Conclusions and Future Work -- References.
Zero Watermarking Scheme Based on Polar Harmonic Fourier Moments -- 1 Introduction -- 2 Literature Survey -- 2.1 Related Work -- 2.2 Existing Problem -- 3 Proposed Methodology -- 3.1 Embedding -- 3.2 Extraction Process -- 4 Experimental Results -- 4.1 Experimental Result on Reconstruction of PHFMS -- 5 Conclusion and Future Scope -- References -- Dual Image Watermarking Technique Using IWT-SVD and Diffie Hellman Key Exchange Algorithm -- 1 Introduction -- 2 Related Works -- 3 Contribution of Our Work -- 4 Fundamental Concepts -- 4.1 IWT -- 4.2 SVD -- 4.3 DHKE -- 5 Proposed Method -- 5.1 Embedding Algorithm -- 5.2 Extraction Algorithm -- 6 Simulation Result and Analysis -- 7 Conclusion -- References -- A Communication-Efficient Federated Learning: A Probabilistic Approach -- 1 Introduction -- 2 Related Work -- 3 Communication-Efficient FL -- 3.1 Basic Concepts of FL -- 3.2 Probability Based Gadget Selection Method -- 4 Simulation Results -- 5 Conclusion and Future Scope -- References -- Learning -- Pavement Distress Detection Using Deep Learning Based Methods: A Survey on Role, Challenges and Opportunities -- 1 Introduction -- 2 Basic Concepts and Terminologies -- 2.1 Deep Learning -- 2.2 Convolutional Neural Networks -- 2.3 Object Detection Algorithms -- 3 Literature Review -- 4 Challenges in This Domain and Contributions of Our Study -- 5 Conclusion and Future Scope -- References -- Performance Enhancement of Animal Species Classification Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Data Preparation -- 3.1 Dataset Used -- 3.2 Image Augmentation and Pre-processing -- 3.3 Artificial Neural Network (ANN) -- 3.4 Convolutional Neural Network (CNN) -- 3.5 Transfer Learning -- 3.6 Software and Hardware Used -- 4 Experimentation and Results -- 4.1 Experiments and Analysis -- 4.2 Results of Selected Model -- 5 Conclusion and Future Work.
References -- Intelligent Intrusion Detection System Using Deep Learning Technique -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dataset Pre-processing -- 3.2 RNN-GRU (Recurrent Neural Network-Gated Recurrent Unit) -- 4 Experiments and Results -- 5 Conclusion -- References -- Rice Leaf Disease Detection and Classification Using a Deep Neural Network -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Rice Disease Type and Dataset Description -- 4.1 Bacterial Blight -- 4.2 Blast -- 4.3 Brown Spot -- 4.4 Tungro -- 5 Implementation -- 5.1 Simulation Environment -- 5.2 Image Acquisition -- 5.3 Image Preprocessing and Augmentation -- 5.4 Deep Neural Network Model Training -- 6 Result Analysis -- 6.1 Simulation Environment -- 6.2 Error Analysis -- 7 Conclusion and Future Scope -- References -- Training Scheme for Stereo Audio Generation -- 1 Introduction -- 2 Literature Review -- 2.1 Audio Generative Model -- 2.2 Multi-channel Audio -- 3 Proposed Method -- 3.1 Training Scheme -- 3.2 Custom Dataset -- 4 Experiments -- 4.1 Representation for Stereo Audio -- 4.2 Evaluation Metrics -- 4.3 Experimental Results -- 5 Conclusion -- References -- A Machine Learning Approach for Classification of Lemon Leaf Diseases -- 1 Introduction -- 2 Related Works -- 3 Proposed Method for Classification of Lemon Leaf Disease -- 3.1 Image Pre-processing -- 3.2 Image Segmentation -- 3.3 Feature Extraction -- 3.4 Classification -- 4 Results and Analysis -- 5 Conclusion -- References -- Optimization of Random Forest Hyperparameter Using Improved PSO for Handwritten Digits Classification -- 1 Introduction -- 2 Related Work -- 3 Hyperparameter Optimization -- 3.1 Random Forest -- 3.2 Improved Particle Swarm Optimization (PSO) -- 3.3 Proposed Model Using Improved PSO Optimizer -- 4 Result and Analysis -- 5 Conclusion -- References.
Risk Identification Using Quantum Machine Learning for Fleet Insurance Premium.
Titolo autorizzato: Computing, communication and learning  Visualizza cluster
ISBN: 3-031-21750-0
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 996503562403316
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Serie: Communications in Computer and Information Science