Communication, Networks and Computing : First International Conference, CNC 2018, Gwalior, India, March 22-24, 2018, Revised Selected Papers / / edited by Shekhar Verma, Ranjeet Singh Tomar, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal Abawajy |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIII, 654 p. 438 illus.) |
Disciplina | 004.6 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Artificial intelligence Computer Engineering and Networks Artificial Intelligence |
ISBN | 981-13-2372-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Wired and wireless communication systems -- High dimensional data representation and processing -- Networks and information security -- Computing techniques for efficient networks design -- Electronic circuits for communication system. |
Record Nr. | UNINA-9910350239803321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information, Communication and Computing Technology : 8th International Conference, ICICCT 2023, New Delhi, India, May 27, 2023, Revised Selected Papers / / Jemal Abawajy [and four others] |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (204 pages) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science Series |
Soggetto topico |
Artificial intelligence
Computer networks |
ISBN | 3-031-43838-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Intelligent Systems -- Using BERT for Swiss German Sentence Prediction -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Research Questions -- 2 Literature Review -- 2.1 Power of BERT -- 2.2 Multilingual BERT -- 2.3 The Swiss German Struggle -- 2.4 Audio BERT -- 2.5 Research Gap -- 3 Research Design -- 4 Experiments -- 4.1 Architecture Overview and Application Concept of BERT -- 4.2 Adaptation and Application Scenario of BERT -- 5 Results -- 6 Conclusion -- Appendix - Examples of Masked Sentence Predictions -- References -- An ARIMA and XGBoost Model Utilized for Forecasting Municipal Solid Waste Generation -- 1 Introduction -- 2 Related Work -- 3 Material and Methods -- 3.1 Study Area Information -- 3.2 Data Acquisition and Preparation -- 3.3 XGBoost -- 3.4 ARIMA -- 4 Experiments and Results -- 5 Conclusion and Future Work -- References -- An Empirical Study of Intrusion Detection by Combining Clustering and Classification Methods -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Personalized Movie Recommendation Prediction Using Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 2.1 Reinforcement Learning for Recommendation -- 2.2 Novelty of Our Approach -- 3 Methodology -- 3.1 Data Cleaning and Visualization -- 3.2 RL Algorithm -- 4 Experimental Setup -- 4.1 Dataset -- 5 Results and Discussion -- 5.1 Evaluation Metrics -- 5.2 Analysis of Recommendations -- 5.3 Limitations and Future Work -- 6 Conclusions and Perspective -- References -- An Ensemble and Deep Neural Network Based Approaches for Automated Sentiment Analysis -- 1 Introduction -- 1.1 Challenges -- 1.2 Contributions of the Paper -- 2 Literature Review -- 2.1 Machine Learning Approach -- 2.2 Deep Learning Approach -- 2.3 Hybrid Model Approach -- 3 Methodology.
3.1 Dataset and Pre-Processing -- 3.2 Ensemble Model -- 3.3 Implementation Using Bidirectional Long Short-Term Memory -- 3.4 Implementation Using Bidirectional Encoder Representations from Transformers (BERT) -- 3.5 The Proposed Hybrid CNN-LSTM Model -- 3.6 Evaluation Metrics -- 4 Results and Discussion -- 4.1 Results Obtained -- 4.2 Findings Based on Models Used Machine Learning Results -- 5 Conclusion and Future Works -- References -- In-store Product Placement Using LiDAR-Assisted Discrete PSO Algorithm -- 1 Introduction -- 2 Related Works -- 3 LiDAR-Assisted In-store Product Placement -- 3.1 Architecture -- 4 Discrete PSO-Algorithm and Stages -- 4.1 Algorithm -- 5 Experimental Results -- 5.1 Experimental Setup -- 5.2 LiDAR-Based Data Collection -- 5.3 Discrete PSO Sequencer -- 6 Conclusion -- References -- Pattern Recognition -- Deep Residual Variational Autoencoder for Image Super-Resolution -- 1 Introduction -- 2 Related Work -- 2.1 Conventional SR Methods -- 2.2 DL-Based SR Models -- 3 Methodology -- 3.1 Encoder Model -- 3.2 Decoder Model -- 3.3 Loss Function -- 4 Experiments -- 4.1 Training Dataset -- 4.2 Hardware -- 4.3 Training Details -- 4.4 Experimental Results -- 4.5 Comparative Evaluation -- 5 Conclusion -- References -- Hybrid HAN Model to Investigate Depression from Twitter Posts -- 1 Introduction -- 2 Background Study -- 3 Depression Detection Model -- 3.1 BiGRU Layer -- 3.2 Word Attention Context Layer -- 3.3 BiLSTM Layer -- 3.4 Sentence Attention Context Layer -- 3.5 Overall Architecture of Depression Detection Model -- 3.6 Dataset -- 3.7 Lexicon -- 3.8 Dataset Preprocessing -- 4 Performance Analysis -- 5 Conclusion -- References -- Transfer Learning-Based Encoder-Decoder Model for Skin Lesion Segmentation -- 1 Introduction -- 1.1 Study Objectives -- 2 Related Literature -- 3 Methods and Materials -- 3.1 U-Net Design. 3.2 Proposed Framework -- 3.3 Dataset -- 3.4 Experimental Setup -- 3.5 Performance Metrics -- 4 Discussion of Results -- 5 Conclusion -- References -- A System for Liver Tumor Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 3.1 Preprocessing -- 3.2 Augmentation -- 3.3 Segmentation -- 3.4 Classification Model -- 3.5 Performance Measures -- 4 Results with Discussion -- 4.1 Dataset Description -- 4.2 Computer Settings and Parameters -- 4.3 Preprocessing -- 4.4 Liver Segmentation -- 4.5 Tumor Detection -- 5 Conclusion and Future Work -- References -- High Speed and Efficient Reconfigurable Histogram Equalisation Architecture for Image Contrast Enhancement -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Comparator Design -- 3.2 Counter Circuit Design -- 3.3 Pixel Mapping Unit Design -- 4 Experimental Results -- 4.1 Simulation Results -- 4.2 Synthesis Results and Analysis of Proposed Architecture -- 5 Conclusion -- References -- A Practical Use for AI-Generated Images -- 1 Introduction -- 2 Diffusion Probabilistic Model -- 3 Object Detection -- 4 Related Studies -- 5 Proposed Work -- 5.1 Datasets -- 5.2 Performance Metrics -- 5.3 Model Training -- 6 Result Analysis -- 7 Conclusion -- References -- Homomorphic Encryption Schemes Using Nested Matrices -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Previous HE Model -- 3.2 Proposed HE Model -- 4 Homomorphic Property Proofs -- 4.1 Homomorphic Property for 2 2 Nested Matrix -- 4.2 Encryption Algorithm with Partially Homomorphic Property -- 5 Experimental Results -- 5.1 Evaluation Metrics -- 5.2 Results -- 6 Discussion -- 7 Conclusions -- References -- A Deep Learning Model for Heterogeneous Dataset Analysis - Application to Winter Wheat Crop Yield Prediction -- 1 Introduction -- 2 Literature -- 3 Data Description -- 4 Data Pre-processing. 5 Proposed Approach -- 5.1 Training: Description of Time Steps -- 5.2 Training: Description of Forward/Backward Propagation -- 6 Experiment Setup -- 7 Experimental Results -- 8 Conclusion -- References -- Author Index. |
Record Nr. | UNINA-9910746069903321 |
Cham : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information, Communication and Computing Technology : 8th International Conference, ICICCT 2023, New Delhi, India, May 27, 2023, Revised Selected Papers / / Jemal Abawajy [and four others] |
Edizione | [First edition.] |
Pubbl/distr/stampa | Cham : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (204 pages) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science Series |
Soggetto topico |
Artificial intelligence
Computer networks |
ISBN | 3-031-43838-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Intelligent Systems -- Using BERT for Swiss German Sentence Prediction -- 1 Introduction -- 1.1 Problem Statement -- 1.2 Research Questions -- 2 Literature Review -- 2.1 Power of BERT -- 2.2 Multilingual BERT -- 2.3 The Swiss German Struggle -- 2.4 Audio BERT -- 2.5 Research Gap -- 3 Research Design -- 4 Experiments -- 4.1 Architecture Overview and Application Concept of BERT -- 4.2 Adaptation and Application Scenario of BERT -- 5 Results -- 6 Conclusion -- Appendix - Examples of Masked Sentence Predictions -- References -- An ARIMA and XGBoost Model Utilized for Forecasting Municipal Solid Waste Generation -- 1 Introduction -- 2 Related Work -- 3 Material and Methods -- 3.1 Study Area Information -- 3.2 Data Acquisition and Preparation -- 3.3 XGBoost -- 3.4 ARIMA -- 4 Experiments and Results -- 5 Conclusion and Future Work -- References -- An Empirical Study of Intrusion Detection by Combining Clustering and Classification Methods -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Personalized Movie Recommendation Prediction Using Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 2.1 Reinforcement Learning for Recommendation -- 2.2 Novelty of Our Approach -- 3 Methodology -- 3.1 Data Cleaning and Visualization -- 3.2 RL Algorithm -- 4 Experimental Setup -- 4.1 Dataset -- 5 Results and Discussion -- 5.1 Evaluation Metrics -- 5.2 Analysis of Recommendations -- 5.3 Limitations and Future Work -- 6 Conclusions and Perspective -- References -- An Ensemble and Deep Neural Network Based Approaches for Automated Sentiment Analysis -- 1 Introduction -- 1.1 Challenges -- 1.2 Contributions of the Paper -- 2 Literature Review -- 2.1 Machine Learning Approach -- 2.2 Deep Learning Approach -- 2.3 Hybrid Model Approach -- 3 Methodology.
3.1 Dataset and Pre-Processing -- 3.2 Ensemble Model -- 3.3 Implementation Using Bidirectional Long Short-Term Memory -- 3.4 Implementation Using Bidirectional Encoder Representations from Transformers (BERT) -- 3.5 The Proposed Hybrid CNN-LSTM Model -- 3.6 Evaluation Metrics -- 4 Results and Discussion -- 4.1 Results Obtained -- 4.2 Findings Based on Models Used Machine Learning Results -- 5 Conclusion and Future Works -- References -- In-store Product Placement Using LiDAR-Assisted Discrete PSO Algorithm -- 1 Introduction -- 2 Related Works -- 3 LiDAR-Assisted In-store Product Placement -- 3.1 Architecture -- 4 Discrete PSO-Algorithm and Stages -- 4.1 Algorithm -- 5 Experimental Results -- 5.1 Experimental Setup -- 5.2 LiDAR-Based Data Collection -- 5.3 Discrete PSO Sequencer -- 6 Conclusion -- References -- Pattern Recognition -- Deep Residual Variational Autoencoder for Image Super-Resolution -- 1 Introduction -- 2 Related Work -- 2.1 Conventional SR Methods -- 2.2 DL-Based SR Models -- 3 Methodology -- 3.1 Encoder Model -- 3.2 Decoder Model -- 3.3 Loss Function -- 4 Experiments -- 4.1 Training Dataset -- 4.2 Hardware -- 4.3 Training Details -- 4.4 Experimental Results -- 4.5 Comparative Evaluation -- 5 Conclusion -- References -- Hybrid HAN Model to Investigate Depression from Twitter Posts -- 1 Introduction -- 2 Background Study -- 3 Depression Detection Model -- 3.1 BiGRU Layer -- 3.2 Word Attention Context Layer -- 3.3 BiLSTM Layer -- 3.4 Sentence Attention Context Layer -- 3.5 Overall Architecture of Depression Detection Model -- 3.6 Dataset -- 3.7 Lexicon -- 3.8 Dataset Preprocessing -- 4 Performance Analysis -- 5 Conclusion -- References -- Transfer Learning-Based Encoder-Decoder Model for Skin Lesion Segmentation -- 1 Introduction -- 1.1 Study Objectives -- 2 Related Literature -- 3 Methods and Materials -- 3.1 U-Net Design. 3.2 Proposed Framework -- 3.3 Dataset -- 3.4 Experimental Setup -- 3.5 Performance Metrics -- 4 Discussion of Results -- 5 Conclusion -- References -- A System for Liver Tumor Detection -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model -- 3.1 Preprocessing -- 3.2 Augmentation -- 3.3 Segmentation -- 3.4 Classification Model -- 3.5 Performance Measures -- 4 Results with Discussion -- 4.1 Dataset Description -- 4.2 Computer Settings and Parameters -- 4.3 Preprocessing -- 4.4 Liver Segmentation -- 4.5 Tumor Detection -- 5 Conclusion and Future Work -- References -- High Speed and Efficient Reconfigurable Histogram Equalisation Architecture for Image Contrast Enhancement -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Comparator Design -- 3.2 Counter Circuit Design -- 3.3 Pixel Mapping Unit Design -- 4 Experimental Results -- 4.1 Simulation Results -- 4.2 Synthesis Results and Analysis of Proposed Architecture -- 5 Conclusion -- References -- A Practical Use for AI-Generated Images -- 1 Introduction -- 2 Diffusion Probabilistic Model -- 3 Object Detection -- 4 Related Studies -- 5 Proposed Work -- 5.1 Datasets -- 5.2 Performance Metrics -- 5.3 Model Training -- 6 Result Analysis -- 7 Conclusion -- References -- Homomorphic Encryption Schemes Using Nested Matrices -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Previous HE Model -- 3.2 Proposed HE Model -- 4 Homomorphic Property Proofs -- 4.1 Homomorphic Property for 2 2 Nested Matrix -- 4.2 Encryption Algorithm with Partially Homomorphic Property -- 5 Experimental Results -- 5.1 Evaluation Metrics -- 5.2 Results -- 6 Discussion -- 7 Conclusions -- References -- A Deep Learning Model for Heterogeneous Dataset Analysis - Application to Winter Wheat Crop Yield Prediction -- 1 Introduction -- 2 Literature -- 3 Data Description -- 4 Data Pre-processing. 5 Proposed Approach -- 5.1 Training: Description of Time Steps -- 5.2 Training: Description of Forward/Backward Propagation -- 6 Experiment Setup -- 7 Experimental Results -- 8 Conclusion -- References -- Author Index. |
Record Nr. | UNISA-996550556603316 |
Cham : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
International Conference on Applications and Techniques in Cyber Security and Intelligence : Applications and Techniques in Cyber Security and Intelligence / / edited by Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Edizioni della Normale, , 2018 |
Descrizione fisica | 1 online resource (xv, 520 pages) : 160 illustrations |
Disciplina | 006.3 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN | 3-319-67071-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910299878803321 |
Cham : , : Springer International Publishing : , : Imprint : Edizioni della Normale, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
International Conference on Applications and Techniques in Cyber Security and Intelligence ATCI 2018 : Applications and Techniques in Cyber Security and Intelligence / / edited by Jemal Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (305 pages) |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN | 3-319-98776-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Convolutional Neural Network Deep-Learning Models for Prediction of Shared Bicycle Demand -- Analysis of Feature Selection Techniques for Correlation-Based Network Anomaly Detection -- An RFID Path Authentication Protocol Based on Chebyshev Polynomials -- An Efficient Authentication Protocol for RFID-based Supply Chains -- Research on the Two Stage Full Life Cycle Management of Police Equipment -- Research on Audio and Video Transmission Strategy for Android -- Emojis Sentiment Analysis Based on Big Social Media Data -- A Transfer Learning Approach for Credit Scoring -- A Parallel Programming Model Research Based on Heterogeneous Multi-core Embedded Processor -- An Improved Apriori-Pro Algorithm -- An Improved Fuzzy Support Vector Machine Algorithm Based on Refactoring Class Center -- An Ensemble Data Stream Mining Algorithm for Class-imbalanced Applications -- A Gaussian-Based Trust Model for Nodes of Sensor Networks -- A Study of Face Recognition System’s Testing and Evaluation Methods -- Network Security Problems and Solutions of Video Surveillance System -- Image Encryption Algorithms Based on Chaos Through Dual Scrambling of Dynamic Josephus Ring and Bit -- Statistical Analysis of Traffic-related Social Media Data of Multiple Cities in China -- Exploring Influential Factors in Recommending Algorithms for All Items and Niche Items -- A Distributed Approach of Accompany Vehicle Discovery -- Spatial Context for Correlation Filter Tracking -- The Automobile Recommendation Method Based on Sentiment Analysis of Online Comments -- An Adaptive Tracking Algorithm for Micro-Blog Topic based on Association Semantic Network -- Knowledge Extracting from Micro-Blog Topic -- Personal Relations Extraction from Microblog Text Based on Relations Trigger Words -- Recommendation Algorithm Based on Latent Semantic of Tags -- Ontology-supported Case-based Reasoning Approach for Double Scenario Model Construction in International Disaster Medical Relief Action -- Web Sanitization from Malicious Code Injection Attacks -- Event Element Recognition Based on Improved K-means Algorithm -- A Comparative Method of Legal Documents Based on LDA -- Feature Selection Approach for Twitter Sentiment Analysis and Text classification Based on Chi-square and Naïve Bayes -- A Combined Approach of Long Term Spectral Flatness and Formant Based Voice Activity Detection -- Design and Development of Automatic Packaging Equipment for Boxed Drugs -- Development of Automatic Material Sorting Machine Based on PLC -- Intelligent Counter-terrorism Equipment Status and Development -- A Monitoring System of Ground-Air Interaction Multi-Sensory Fusion Plant Growth Condition -- RSCHE: A Virtual Grid Structure Based Routing Scheme with Cell-Header Group Exchanged for Wireless Sensor Network -- A Improved Person Reidentification Method by Selective Convolutional Descriptor Aggregation -- A Survey of Multi-object Video Tracking Algorithms -- An Overview of Image-based Person Re-identification -- Electrical Data Recovery with Weather Information via Collective Matrix Factorization -- Two-Phases Detection Scheme: Detecting Android Malware in Android Markets -- A Software Quality Testing Evaluation Method and its Power Grid Application -- An Index Display Software Evaluation Architecture for Power Grid Application on Big Data Platform -- A Unified Access Method of Heterogeneous Big Data in Power Grid Application -- Regional Power Grid dispatch and Control Integrated Backup System Based on Cloud Computing -- Detection of Anomaly in Firewall Rule-Sets -- Classification and Coding of Pipe Gallery BIM Model for Operation and Maintenance -- A UAV Operational Situation Similarity Measurement Method Based on Empirical Mode Decomposition -- Research on Parking Guidance Information System Based on "Internet Plus" -- Dynamic Multi-objective Optimization for Mixed Traffic Flow Based on Partial Least Squares Prediction Model -- Multi-objective Genetic Algorithm BasedPrefabricated Component Production Process Optimization Considering the Demand Fluctuations in the Construction Site -- Anomaly Detection in Time Series Data Based on Unthresholded Recurrence Plots -- A Two-stage Temporal Anomaly Detection Algorithm Based on Danger Theory -- A Data-driven Framework for Tunnel Infrastructure Maintenance -- A Heuristic for Legacy Information System Remodularization -- E-maintenance Platform Design for Public Infrastructure based on IFC and Semantic Web Technologies -- Building and Application of Shield Construction Big Data Analysis Platform -- A Professional Competence Measurement Approach Based on a Modified PageRank Algorithm -- Particle-Filter-based Prediction for Anomaly Detection -- Analysis on Building a Green Eco-smart City Based on Block Chain Technology -- 3D Indoor Network Model for Emergency Response of Multi-utility Tunnel -- Computer Data Integration Analysis of the Personal Credit Reporting System -- Digital Image Encryption Algorithm Based on Affine Cipher -- Research on the Evaluation Methods of the Guidance and Test on the Student Employment Based on the Computer Model -- Research on the Ideological and Political Assessment System Based on the Data Visualization -- Research on the Interaction Mechanism Between the Ideological and Political Education and the Computer Network Under the New Media Environment -- Research on the Key Technology of the Computer Graphics and Image Processing -- Research on the Security Management Information System Based on the Data Mining. |
Record Nr. | UNINA-9910484527703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|