top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
2020 International Conference on Applications and Techniques in Cyber Intelligence : Applications and Techniques in Cyber Intelligence (ATCI 2020) / / edited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman
2020 International Conference on Applications and Techniques in Cyber Intelligence : Applications and Techniques in Cyber Intelligence (ATCI 2020) / / edited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (1,162 pages) : illustrations
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Engineering - Data processing
Computational intelligence
Data Engineering
Computational Intelligence
ISBN 3-030-53980-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Combination of Information Technology and College English in the Age of Media -- The Application of Computer Internet of Things in Modern Agricultural Planting Management -- The Influencing Factors Analysis of Network Interactive Teaching Mode Validity -- The Application Analysis of Computer Network Security Data Encryption Technology -- The Application of Computer Technology in Sports Training and Competition -- The Application of BIM Technology in Landscape Garden Engineering Projects -- College Physical Education Based on Multimedia Network Teaching Platform -- Development and Implementation of Health Information Management Platform in Medical Institutions -- Teaching Methods of University Economic Management Course Based on Python -- Innovative Application Paths of Big Data of Automobile Based on Internet of Vehicles.
Record Nr. UNINA-9910483970303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances on Computational Intelligence in Energy : The Applications of Nature-Inspired Metaheuristic Algorithms in Energy / / edited by Tutut Herawan, Haruna Chiroma, Jemal H. Abawajy
Advances on Computational Intelligence in Energy : The Applications of Nature-Inspired Metaheuristic Algorithms in Energy / / edited by Tutut Herawan, Haruna Chiroma, Jemal H. Abawajy
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (228 pages)
Disciplina 006.3
Collana Green Energy and Technology
Soggetto topico Energy systems
Computational intelligence
Algorithms
Energy policy
Energy and state
Energy Systems
Computational Intelligence
Energy Policy, Economics and Management
ISBN 3-319-69889-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Basic descriptions of computational intelligence algorithms (single, hybrid, ensemble, integrated and etc -- Credible sources of energy datasets -- Applications of computational algorithms in energy -- Practical application of cuckoo search and neural network in the prediction of OECD oil consumption -- Hybrid of Fuzzy systems and particle swarm optimization in the forecasting gas flaring from oil consumption -- Forecasting of OECD gas flaring using Elman neural network and cuckoo search algorithm -- Artificial bee colony and neural network for the forecasting of Malaysia renewable energy -- Soft computing methods in the modelling of OECD carbon dioxide emission from petroleum consumption -- Modelling energy crises based on Soft computing -- The forecasting of WTI and Dubai crude oil prices benchmarks based on soft computing -- A new approach for the forecasting of IAEA energy -- Modelling of gasoline prices using fuzzy multi-criteria decision making -- Soft computing for the prediction of Australia petroleum consumption based on OECD countries -- Future research problems in the area of computational intelligence algorithms in energy. .
Record Nr. UNINA-9910337596503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Big Data in Complex Systems : Challenges and Opportunities / / edited by Aboul Ella Hassanien, Ahmad Taher Azar, Vaclav Snasael, Janusz Kacprzyk, Jemal H. Abawajy
Big Data in Complex Systems : Challenges and Opportunities / / edited by Aboul Ella Hassanien, Ahmad Taher Azar, Vaclav Snasael, Janusz Kacprzyk, Jemal H. Abawajy
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (502 p.)
Disciplina 005.74
Collana Studies in Big Data
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-319-11056-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cloud Computing Infrastructure for Massive Data: A Gigantic Task Ahead -- Big Data Movement: a Challenge in Data Processing -- Towards Robust Performance Guarantees for Models Learned from High-Dimensional Data -- Stream Clustering Algorithms: A Primer -- Cross Language Duplicate Record Detection in Big Data -- A Novel Hybridized Rough Set And Improved Harmony Search Based Feature Selection For Protein Sequence Classification -- Autonomic Discovery of News Evolvement in Twitter -- Hybrid Tolerance Rough Set based Intelligent Approaches for Social Tagging Systems -- Exploitation Of Healthcare Databases In Anesthesiology And Surgical Care For Comparing Comorbidity Indexes In Cholecystectomized Patients -- Sickness Absence And Record Linkage Using Primary Healthcare, Hospital And Occupational Databases -- Classification of ECG Cardiac Arrhythmias using Bijective Soft Set -- Semantic Geographic Space: from Big Data to Ecosystems of Data -- DNA Methylation Data Analysis and Visualizing in a Common Form of Breast Cancer -- Data Quality, Analytics, and Privacy in Big Data -- Search, analysis and visual comparison of massive and heterogeneous data: Application in the medical field -- Modified Soft Rough set based ECG signal Classification for Cardiac arrhythmias -- Towards a new architecture for the description and manipulation of large distributed data.
Record Nr. UNINA-9910741166703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Autore Tomar Ranjeet Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (350 pages)
Disciplina 621.39
004.6
Altri autori (Persone) VermaShekhar
ChaurasiaBrijesh Kumar
SinghVrijendra
AbawajyJemal H
AkasheShyam
HsiungPao-Ann
PrasadRamjee
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Image processing - Digital techniques
Computer vision
Computer Engineering and Networks
Artificial Intelligence
Data Structures and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-031-43140-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wired and Wireless Communication Systems -- Networks and Information Security -- Electronics Circuits for Communication Systems.
Record Nr. UNISA-996550551003316
Tomar Ranjeet Singh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Autore Tomar Ranjeet Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (330 pages)
Disciplina 621.39
004.6
Altri autori (Persone) VermaShekhar
ChaurasiaBrijesh Kumar
SinghVrijendra
AbawajyJemal H
AkasheShyam
HsiungPao-Ann
PrasadRamjee
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Image processing - Digital techniques
Computer vision
Computer Engineering and Networks
Artificial Intelligence
Data Structures and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-031-43145-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- High Dimensional Data Representation and Processing -- Brain Tumor Classification Using Feature Extraction and Non-linear SVM Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 VGG-SVM Model -- 3.1 Model Architecture -- 3.2 Implementation Details and Preprocessing -- 3.3 Dataset Description -- 4 Experimental Results and Discussion -- 4.1 Results -- 4.2 Discussion -- 5 Conclusion -- References -- Lightweight Django-Based Customer Relationship Management System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Feasibility and Requirement Analysis -- 3.2 Design of the System -- 3.3 Development Tools Used are Majorly Django, HTML, CSS, Bootstrap, and SQLite -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References -- Single Server Banking Management System -- 1 Introduction -- 1.1 Background and Overview -- 1.2 Problem Statement -- 1.3 Objective -- 1.4 Scope -- 1.5 Organization of the Paper -- 2 Paper Preparation -- 3 Characteristics and Features -- 3.1 SIP Calculator -- 3.2 EMI Calculator -- 3.3 OTP Verification -- 3.4 Email Facility -- 4 Methodology -- 4.1 Results -- 5 Conclusion -- 5.1 Future Scope -- References -- Prioritization of MQTT Messages: A Novel Approach -- 1 Introduction -- 1.1 Message Queuing Telemetry Transport (MQTT) Protocol -- 1.2 Problem Statement -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Identifying min-max Range -- 3.2 Forwarding High Priority Messages -- 3.3 Identifying Trivial Range -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of Crop Yield Prediction Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Methodology -- 5 Result Analysis -- 6 Conclusion -- 7 Future work -- References.
Big Data Analytics for Classification in Sentiment Analysis -- 1 Introduction -- 1.1 The 5 V'S of Big Data -- 1.2 Big Data Generation -- 1.3 Sentiment Analysis -- 2 Literature Review -- References -- Ensemble Classifiers for Classification of Imbalanced Dataset of Malicious and Benign Websites -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Data Summarization -- 3.3 Data Analysis and Preprocessing -- 3.4 Data Sampling and Balancing -- 3.5 Machine Learning Classifiers -- 4 Performance Evaluation -- 5 Conclusion -- References -- Forecasting of Congestive Cardiac Failure Using Deep Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Architecture -- 3.2 Algorithms -- 4 Result -- 5 Conclusion -- References -- Internet of Things-Based Smart Irrigation System for Moisture in the Soil and Weather Forecast -- 1 Introduction -- 2 Related Work -- 3 Benefits of Smart Irrigation System -- 4 Impect of Sustainability on Smart Irrigation System -- 5 The Smart Irrigation Systems' Basic Architecture and Layout -- 6 Difficulties and Potential Outcome -- 7 Conclusion -- References -- Visual Cryptography: An Emerging Technology -- 1 Introduction -- 1.1 Visual Cryptography for Binary Image -- 1.2 Visual Cryptography for Gray Image -- 1.3 Visual Cryptography for Colored Images -- 2 Literature Survey -- 3 Applications of Visual Cryptography -- 3.1 Watermarking -- 3.2 Anti- Phishing Systems -- 3.3 Human Machine Identification -- 3.4 Secure Banking Communication -- 3.5 Defense System -- 3.6 Captcha -- 4 Results -- 5 Conclusions -- References -- Computing Techniques for Efficient Networks Design -- Machine Learning Based Techniques for the Network Design of Advanced 5G Network, Beyond 5G (B5G) and Towards 6G: Challenges and Trends -- 1 Introduction -- 2 Motivation -- 2.1 Key Contributions.
3 Challenges Associated with NGWN -- 3.1 Deployment 5G (Denser) Cells -- 3.2 MIMO Along with Beam Forming -- 3.3 Challenges Associated with the System or Network Latency -- 3.4 Improvement of the Spectral Efficiency -- 4 The Requirements of Network Intelligence: ML in Advanced 5G -- 5 Application Areas of ML in 5G/B5G: Industry Perspective -- 6 State-of-the-Art ML Approached in Advanced 5G, B5G and Towards 6G -- 6.1 The Architecture of Radio Learning -- 7 Challenges Associated with Applying ML in NGWN -- 7.1 Challenges of Implementing the Process of Desired Learning -- 7.2 Challenges of Implementing the Network Edge Intelligence -- 7.3 The Trends for Addressing Challenges in Advanced 5G -- 8 ML Incorporation: Open Issues Offer Research Directions -- 8.1 Trends Towards ML-Powered 6G Network: Edge Intelligence -- 9 Conclusion -- References -- Recognition of Speech Emotion Using Machine Learning Techniques -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Collection -- 2.2 Data Preparation -- 2.3 Data Visualization -- 2.4 Feature Extraction and Model Building -- 3 Results and Discussions -- 4 Conclusion -- References -- Convolution Neural Network Based Model for Classification and Identification of Fake Profile on Social Network -- 1 Introduction -- 2 Social Media -- 3 Social Media Mining -- 4 Social Media Spam -- 5 Related Work -- 6 Proposed framework for Identifying Malicious Profile over Social Media -- 7 Result Analysis -- 8 Conclusion -- References -- Social Distance Monitoring and Infection Risk Assessment in COVID-19 Pandemic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Human Detection -- 3.2 Location Tracking -- 3.3 Inter Distance Estimation -- 3.4 Inter Distance Estimation -- 3.5 Inter Distance Estimation -- 4 Results -- 5 Conclusion -- References -- Vibrations Signal Analysis of Cantilever Beam Using Machine Learning.
1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results -- 5 Future Scope of the Work -- References -- Pneumonia Detection Using Deep Learning: A Bibliometric Study -- 1 Introduction -- 2 Materials and Methods -- 2.1 Selection of Articles -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Numerical Simulation Design of Multiple Users Offloading Using Improved Optimization Approach for Edge Computing -- 1 Introduction -- 2 Mobile Edge/Fog Computing -- 3 Related Works -- 4 Modelling of the System -- 5 Simulation and Results -- 6 Conclusion -- References -- Numerical Simulation and Mathematical Modelling of Machine Learning Based Improved Crypto Currency Forecasting System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result Analysis -- 4.1 Dataset -- 4.2 Flow Chart of Simulation -- 4.3 Result Discussion -- 5 Conclusion and Future Scope -- References -- Reinforcement Learning in Blockchain-Enabled IIoT Networks -- 1 Introduction -- 2 Interconnection Between Blockchain, IIoT, and AI -- 3 Blockchain Technology and IIoT -- 4 Reinforcement Learning Techniques -- 4.1 Q-Learning -- 4.2 Multi-armed Bandit Learning -- 4.3 Actor-Critic Learning -- 5 Blockchain-Enabled IIoT Network -- 5.1 Security -- 5.2 Cost Effectiveness -- 5.3 Trustless -- 5.4 Autonomy -- 5.5 Smart Contracts -- 5.6 Blockchain-Enabled IIoT Layers -- 5.7 Physical Layer -- 5.8 Network Layer -- 5.9 Application Layer -- 6 Reinforcement Learning Applications in Blockchain-Enabled IIoT Network -- 6.1 Minimizing Forking Events -- 6.2 Improving Energy Efficiency -- 6.3 Time to Finality Minimization -- 6.4 Enhancing Transaction Throughput -- 6.5 Improving Link Security -- 6.6 Average Blocktime Reduction -- 7 Conclusion -- References -- Practical Challenges in Implementation of Information and Communication Technology -- 1 Introduction.
2 Research Methodology -- 3 Bibliometric Details -- 3.1 Authors -- 3.2 Source Documents and Keywords -- 3.3 Countries, Sponsors, and Affiliations -- 4 Thematic Discussion -- 4.1 Technological and Implementation Challenges -- 4.2 Infrastructure Based Challenges -- 4.3 Teacher Related Challenges -- 4.4 Student Related Challenges -- 4.5 Other Challenges -- 5 Future Research Agenda -- 5.1 Other Challenges -- 5.2 Research Niches -- 6 Conclusion -- References -- Facial Analytics or Virtual Avatars: Competencies and Design Considerations for Student-Teacher Interaction in AI-Powered Online Education for Effective Classroom Engagement -- 1 Introduction -- 2 Background -- 3 Conceptual Foundation -- 4 AI-Powered Online Learning -- 5 Methods and Methodology -- 5.1 Creation of a Storyboard -- 5.2 Participants -- 5.3 Procedure -- 5.4 Data Analysis -- 6 Findings -- 6.1 Communication -- 6.2 Quantity and Quality -- 6.3 Responsibility -- 6.4 Support -- 6.5 Agency -- 6.6 Connection -- 6.7 Surveillance -- 7 Analysis and Conclusion -- References -- Vehicular Technology and Applications -- Real Time Connectivity Analysis of Vehicles in Different City Dense Environment -- 1 Introduction -- 2 Problem Description -- 2.1 VANET Scenario -- 2.2 VANETsim Overview -- 3 Performance Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Analysis of Energy Efficient Wireless Senor Network with 6LoWPAN IoT Gateway -- 1 Introduction -- 2 Wireless Energy Harvesting and Implementation Techniques -- 2.1 Role of Performance Parameters in the Proposed System -- 3 Proposed System Model of Wireless Sensor Network with 6LoWPAN Gateway -- 4 Simulation Results and Discussion -- 5 Conclusion and Future Work -- References -- Energy-Efficient Data Routing Protocols for Sink Mobility in Wireless Sensor Networks -- 1 Introduction -- 1.1 Motivation -- 2 Related Work.
3 Research Gaps.
Record Nr. UNISA-996550551503316
Tomar Ranjeet Singh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Communication, Networks and Computing : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Communication, Networks and Computing : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Autore Tomar Ranjeet Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (330 pages)
Disciplina 621.39
004.6
Altri autori (Persone) VermaShekhar
ChaurasiaBrijesh Kumar
SinghVrijendra
AbawajyJemal H
AkasheShyam
HsiungPao-Ann
PrasadRamjee
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Image processing - Digital techniques
Computer vision
Computer Engineering and Networks
Artificial Intelligence
Data Structures and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-031-43145-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- High Dimensional Data Representation and Processing -- Brain Tumor Classification Using Feature Extraction and Non-linear SVM Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 VGG-SVM Model -- 3.1 Model Architecture -- 3.2 Implementation Details and Preprocessing -- 3.3 Dataset Description -- 4 Experimental Results and Discussion -- 4.1 Results -- 4.2 Discussion -- 5 Conclusion -- References -- Lightweight Django-Based Customer Relationship Management System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Feasibility and Requirement Analysis -- 3.2 Design of the System -- 3.3 Development Tools Used are Majorly Django, HTML, CSS, Bootstrap, and SQLite -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References -- Single Server Banking Management System -- 1 Introduction -- 1.1 Background and Overview -- 1.2 Problem Statement -- 1.3 Objective -- 1.4 Scope -- 1.5 Organization of the Paper -- 2 Paper Preparation -- 3 Characteristics and Features -- 3.1 SIP Calculator -- 3.2 EMI Calculator -- 3.3 OTP Verification -- 3.4 Email Facility -- 4 Methodology -- 4.1 Results -- 5 Conclusion -- 5.1 Future Scope -- References -- Prioritization of MQTT Messages: A Novel Approach -- 1 Introduction -- 1.1 Message Queuing Telemetry Transport (MQTT) Protocol -- 1.2 Problem Statement -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Identifying min-max Range -- 3.2 Forwarding High Priority Messages -- 3.3 Identifying Trivial Range -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of Crop Yield Prediction Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Methodology -- 5 Result Analysis -- 6 Conclusion -- 7 Future work -- References.
Big Data Analytics for Classification in Sentiment Analysis -- 1 Introduction -- 1.1 The 5 V'S of Big Data -- 1.2 Big Data Generation -- 1.3 Sentiment Analysis -- 2 Literature Review -- References -- Ensemble Classifiers for Classification of Imbalanced Dataset of Malicious and Benign Websites -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Data Summarization -- 3.3 Data Analysis and Preprocessing -- 3.4 Data Sampling and Balancing -- 3.5 Machine Learning Classifiers -- 4 Performance Evaluation -- 5 Conclusion -- References -- Forecasting of Congestive Cardiac Failure Using Deep Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Architecture -- 3.2 Algorithms -- 4 Result -- 5 Conclusion -- References -- Internet of Things-Based Smart Irrigation System for Moisture in the Soil and Weather Forecast -- 1 Introduction -- 2 Related Work -- 3 Benefits of Smart Irrigation System -- 4 Impect of Sustainability on Smart Irrigation System -- 5 The Smart Irrigation Systems' Basic Architecture and Layout -- 6 Difficulties and Potential Outcome -- 7 Conclusion -- References -- Visual Cryptography: An Emerging Technology -- 1 Introduction -- 1.1 Visual Cryptography for Binary Image -- 1.2 Visual Cryptography for Gray Image -- 1.3 Visual Cryptography for Colored Images -- 2 Literature Survey -- 3 Applications of Visual Cryptography -- 3.1 Watermarking -- 3.2 Anti- Phishing Systems -- 3.3 Human Machine Identification -- 3.4 Secure Banking Communication -- 3.5 Defense System -- 3.6 Captcha -- 4 Results -- 5 Conclusions -- References -- Computing Techniques for Efficient Networks Design -- Machine Learning Based Techniques for the Network Design of Advanced 5G Network, Beyond 5G (B5G) and Towards 6G: Challenges and Trends -- 1 Introduction -- 2 Motivation -- 2.1 Key Contributions.
3 Challenges Associated with NGWN -- 3.1 Deployment 5G (Denser) Cells -- 3.2 MIMO Along with Beam Forming -- 3.3 Challenges Associated with the System or Network Latency -- 3.4 Improvement of the Spectral Efficiency -- 4 The Requirements of Network Intelligence: ML in Advanced 5G -- 5 Application Areas of ML in 5G/B5G: Industry Perspective -- 6 State-of-the-Art ML Approached in Advanced 5G, B5G and Towards 6G -- 6.1 The Architecture of Radio Learning -- 7 Challenges Associated with Applying ML in NGWN -- 7.1 Challenges of Implementing the Process of Desired Learning -- 7.2 Challenges of Implementing the Network Edge Intelligence -- 7.3 The Trends for Addressing Challenges in Advanced 5G -- 8 ML Incorporation: Open Issues Offer Research Directions -- 8.1 Trends Towards ML-Powered 6G Network: Edge Intelligence -- 9 Conclusion -- References -- Recognition of Speech Emotion Using Machine Learning Techniques -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Collection -- 2.2 Data Preparation -- 2.3 Data Visualization -- 2.4 Feature Extraction and Model Building -- 3 Results and Discussions -- 4 Conclusion -- References -- Convolution Neural Network Based Model for Classification and Identification of Fake Profile on Social Network -- 1 Introduction -- 2 Social Media -- 3 Social Media Mining -- 4 Social Media Spam -- 5 Related Work -- 6 Proposed framework for Identifying Malicious Profile over Social Media -- 7 Result Analysis -- 8 Conclusion -- References -- Social Distance Monitoring and Infection Risk Assessment in COVID-19 Pandemic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Human Detection -- 3.2 Location Tracking -- 3.3 Inter Distance Estimation -- 3.4 Inter Distance Estimation -- 3.5 Inter Distance Estimation -- 4 Results -- 5 Conclusion -- References -- Vibrations Signal Analysis of Cantilever Beam Using Machine Learning.
1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results -- 5 Future Scope of the Work -- References -- Pneumonia Detection Using Deep Learning: A Bibliometric Study -- 1 Introduction -- 2 Materials and Methods -- 2.1 Selection of Articles -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Numerical Simulation Design of Multiple Users Offloading Using Improved Optimization Approach for Edge Computing -- 1 Introduction -- 2 Mobile Edge/Fog Computing -- 3 Related Works -- 4 Modelling of the System -- 5 Simulation and Results -- 6 Conclusion -- References -- Numerical Simulation and Mathematical Modelling of Machine Learning Based Improved Crypto Currency Forecasting System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result Analysis -- 4.1 Dataset -- 4.2 Flow Chart of Simulation -- 4.3 Result Discussion -- 5 Conclusion and Future Scope -- References -- Reinforcement Learning in Blockchain-Enabled IIoT Networks -- 1 Introduction -- 2 Interconnection Between Blockchain, IIoT, and AI -- 3 Blockchain Technology and IIoT -- 4 Reinforcement Learning Techniques -- 4.1 Q-Learning -- 4.2 Multi-armed Bandit Learning -- 4.3 Actor-Critic Learning -- 5 Blockchain-Enabled IIoT Network -- 5.1 Security -- 5.2 Cost Effectiveness -- 5.3 Trustless -- 5.4 Autonomy -- 5.5 Smart Contracts -- 5.6 Blockchain-Enabled IIoT Layers -- 5.7 Physical Layer -- 5.8 Network Layer -- 5.9 Application Layer -- 6 Reinforcement Learning Applications in Blockchain-Enabled IIoT Network -- 6.1 Minimizing Forking Events -- 6.2 Improving Energy Efficiency -- 6.3 Time to Finality Minimization -- 6.4 Enhancing Transaction Throughput -- 6.5 Improving Link Security -- 6.6 Average Blocktime Reduction -- 7 Conclusion -- References -- Practical Challenges in Implementation of Information and Communication Technology -- 1 Introduction.
2 Research Methodology -- 3 Bibliometric Details -- 3.1 Authors -- 3.2 Source Documents and Keywords -- 3.3 Countries, Sponsors, and Affiliations -- 4 Thematic Discussion -- 4.1 Technological and Implementation Challenges -- 4.2 Infrastructure Based Challenges -- 4.3 Teacher Related Challenges -- 4.4 Student Related Challenges -- 4.5 Other Challenges -- 5 Future Research Agenda -- 5.1 Other Challenges -- 5.2 Research Niches -- 6 Conclusion -- References -- Facial Analytics or Virtual Avatars: Competencies and Design Considerations for Student-Teacher Interaction in AI-Powered Online Education for Effective Classroom Engagement -- 1 Introduction -- 2 Background -- 3 Conceptual Foundation -- 4 AI-Powered Online Learning -- 5 Methods and Methodology -- 5.1 Creation of a Storyboard -- 5.2 Participants -- 5.3 Procedure -- 5.4 Data Analysis -- 6 Findings -- 6.1 Communication -- 6.2 Quantity and Quality -- 6.3 Responsibility -- 6.4 Support -- 6.5 Agency -- 6.6 Connection -- 6.7 Surveillance -- 7 Analysis and Conclusion -- References -- Vehicular Technology and Applications -- Real Time Connectivity Analysis of Vehicles in Different City Dense Environment -- 1 Introduction -- 2 Problem Description -- 2.1 VANET Scenario -- 2.2 VANETsim Overview -- 3 Performance Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Analysis of Energy Efficient Wireless Senor Network with 6LoWPAN IoT Gateway -- 1 Introduction -- 2 Wireless Energy Harvesting and Implementation Techniques -- 2.1 Role of Performance Parameters in the Proposed System -- 3 Proposed System Model of Wireless Sensor Network with 6LoWPAN Gateway -- 4 Simulation Results and Discussion -- 5 Conclusion and Future Work -- References -- Energy-Efficient Data Routing Protocols for Sink Mobility in Wireless Sensor Networks -- 1 Introduction -- 1.1 Motivation -- 2 Related Work.
3 Research Gaps.
Record Nr. UNINA-9910746997303321
Tomar Ranjeet Singh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication, Networks and Computing : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Communication, Networks and Computing : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Autore Tomar Ranjeet Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (350 pages)
Disciplina 621.39
004.6
Altri autori (Persone) VermaShekhar
ChaurasiaBrijesh Kumar
SinghVrijendra
AbawajyJemal H
AkasheShyam
HsiungPao-Ann
PrasadRamjee
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Image processing - Digital techniques
Computer vision
Computer Engineering and Networks
Artificial Intelligence
Data Structures and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-031-43140-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wired and Wireless Communication Systems -- Networks and Information Security -- Electronics Circuits for Communication Systems.
Record Nr. UNINA-9910746951803321
Tomar Ranjeet Singh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 : Applications and Techniques in Cyber Intelligence / / edited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman
International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 : Applications and Techniques in Cyber Intelligence / / edited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xxxii, 2,132 pages) : illustrations
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-030-25128-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484249303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the International Conference on Data Engineering 2015 (DaEng-2015) / / edited by Jemal H. Abawajy, Mohamed Othman, Rozaida Ghazali, Mustafa Mat Deris, Hairulnizam Mahdin, Tutut Herawan
Proceedings of the International Conference on Data Engineering 2015 (DaEng-2015) / / edited by Jemal H. Abawajy, Mohamed Othman, Rozaida Ghazali, Mustafa Mat Deris, Hairulnizam Mahdin, Tutut Herawan
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (624 pages)
Disciplina 006.3
Collana Lecture Notes in Electrical Engineering
Soggetto topico Computational intelligence
Data mining
Database management
Computational Intelligence
Data Mining and Knowledge Discovery
Database Management
ISBN 981-13-1799-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1: Database Theory and Applications -- Chapter 1. A New Approach to Secure and Manage Load Balancing of the Distributed Database using SQL Firewall -- Chapter 2. Object-Based Simulators for Large Scale Distributed Virtual Environment -- Chapter 3. 1P1O: A Large Scale Distributed Virtual Environment -- Chapter 4.Optimize Performance Load Balancing Techniques using Binary Vote Assignment Grid Quorum (BVAGQ): A Systematic Review -- Chapter 5.Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model -- Chapter 6.DGMS: Dataset Generator Based On Malay Stemmer Algorithm -- Chapter 7.A Survey of UML Tools -- Chapter 8.Hybrid Landscape Change Detection Methods in a Noisy Data Environment -- Part 2: Data Warehousing and Mining -- 9.Concept Based Lattice Mining (CBLM) Using Formal Concept Analysis (FCA) for Text Mining -- 10. 2M-SELAR: A Model for Mining Sequential Least Association Rules.
Record Nr. UNINA-9910483802303321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Recent Advances on Soft Computing and Data Mining : Proceedings of the Sixth International Conference on Soft Computing and Data Mining (SCDM 2024), August 21-22 2024
Recent Advances on Soft Computing and Data Mining : Proceedings of the Sixth International Conference on Soft Computing and Data Mining (SCDM 2024), August 21-22 2024
Autore Ghazali Rozaida
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (451 pages)
Altri autori (Persone) NawiNazri Mohd
DerisMustafa Mat
AbawajyJemal H
ArbaiyNureize
Collana Lecture Notes in Networks and Systems Series
ISBN 3-031-66965-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Conference Organization -- Contents -- Prediction of OPEC Carbon Dioxide Emissions Using K-Means Clustering and Ensemble Algorithm -- 1 Introduction -- 2 Related Works -- 3 Fuzzy Nearest Neighbor -- 4 Sequential Minimal Optimization -- 5 Logistic Regression -- 6 K-Means Clustering -- 7 Proposed Methodology -- 8 Experimental Setup and Analysis -- 8.1 Assessment Measures -- 8.2 Dataset Description -- 8.3 Simulation Results -- 9 Conclusion -- References -- Detection of Phishing Websites from URLs Using Hybrid Ensemble-Based Machine Learning Technique -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Description of the Machine Learning Classifiers -- 3.2 Dataset Description -- 3.3 Model Construction -- 4 Performance Evaluation Metrics -- 5 Result -- 6 Conclusion -- 7 Future Work -- References -- Minimal Data for Maximum Impact: An Indonesian Part-of-Speech Tagging Case Study -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Semi-supervised Learning Preprocessing -- 3.3 Feature Selection -- 3.4 Classification -- 3.5 Evaluation -- 4 Result and Discussion -- 5 Conclusion -- 5.1 Summary -- 5.2 Future Work -- References -- Alleviating Sparsity to Enhance Group Recommendation with Cross-Linked Domain Model -- 1 Introduction -- 2 Literature Review -- 2.1 Group Recommender System -- 2.2 Cross-Domain Recommender System -- 2.3 Linked Open Data -- 3 Methodology -- 3.1 Experiment Setup -- 4 Result and Discussion -- 5 Conclusion and Recommendation -- References -- Evaluating Deep Transfer Learning Models for Detecting Various Face Mask Wearings -- 1 Introduction -- 2 Literature Review -- 2.1 Deep Learning -- 2.2 Transfer Learning -- 2.3 Existing Works -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusions -- References.
Classification of Stunting Events: Case Study in West Java, Indonesia -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Dataset Collection -- 3.2 Data Pre-processing -- 3.3 Model Comparison -- 3.4 Model Implementation -- 3.5 Model Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- The Effects of Data Reduction Using Rough Set Theory on Logistic Regression Model -- 1 Introduction -- 2 The Basic Theories and Methodology -- 2.1 Rough Set Theory (RST) -- 2.2 Logistic Regression Model -- 3 Implementation Hybrid Classification Approach with LR Analysis and RST -- 3.1 Implementation Hybrid Model on Anemia Data Set -- 3.2 Implementation Hybrid Model on Diabetes Data Set -- 3.3 Discussion -- 4 Conclusion -- References -- Robust Heart Disease Prognosis: Integrating Extended Isolation Forest Outlier Detection with Advanced Prediction Models -- 1 Introduction -- 2 Methodology -- 2.1 Summary of Dataset -- 2.2 Data Preprocessing -- 2.3 Machine Learning Techniques -- 2.4 Deep Learning Algorithm -- 2.5 Evaluation Parameters -- 3 Results Evaluation -- 3.1 Implementing the First Strategy, Which Involves Neither Feature Selection nor Outlier Detection -- 3.2 Implementing the 2nd Strategy: Feature Selection Without Outlier Detection -- 3.3 Employing the 3rd Strategy (Feature Selection and Detection of Outliers) -- 4 Conclusion -- References -- Overlapping Granular Clustering: Application in Fuzzy Rule-Based Classification -- 1 Introduction -- 2 GrC-Fuzzy Logic Models -- 2.1 Granular Clustering -- 2.2 Formation of Fuzzy Logic Rule Base -- 3 Overlapping GrC -- 3.1 R-Value -- 3.2 A New Overlapping Measure During the Iterative Data Granulation -- 4 Case Study and Simulation Results -- 5 Interpretability Index -- 6 Conclusion -- References -- Improved Rough-Multiple Regression for Unemployment Rate Model in Indonesia -- 1 Introduction.
2 Variable Framework and Methods -- 2.1 Multiple Linear Regression -- 2.2 Rough Sets Theory -- 3 Results and Discussion -- 3.1 Descriptive Statistics for Unemployment Rate and Its Variables -- 3.2 Multiple Linear Regression Model for Unemployment Rate -- 3.3 Rough-Multiple Regression Model for Unemployment Rate -- 3.4 Comparison Multiple Regression and Rough-Multiple Regression -- 4 Conclusion -- References -- Utilizing Machine Learning for Gene Expression Data: Incorporating Gene Sequencing, K-Mer Counting and Asymmetric N-Grams Features -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data Pre-processing -- 2.2 Classification Model -- 2.3 Performance Metrics -- 3 Result and Discussion -- 4 Conclusion and Future Work -- References -- Text Sentiment Analysis on VIX's Impact on Market Sentiment Dynamics -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Sentiment Analysis of SnowNLP -- 3.3 Sentiment Index -- 3.4 Pearson's Correlation -- 3.5 Linear Correlation -- 3.6 Granger Causality Test -- 4 Empirical Result and Analysis -- 4.1 Data Description and Cleaning -- 4.2 Text Sentiment Index -- 4.3 Pearson's Correlation -- 4.4 Linear Correlation -- 4.5 Granger Causality Test -- 4.6 Test for Chinese Market -- 5 Conclusion -- References -- Multilevel Monte Carlo Simulation Model for Air Pollution Index Prediction of a Smart Network -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Monte Carlo Simulation -- 3.2 Multilevel Monte Carlo Simulation -- 3.3 Air Pollution Dataset -- 3.4 Performance Evaluation Metrics -- 4 Results and Discussion -- 4.1 Correlation Analysis -- 5 Conclusion -- References -- An In-Depth Strategy using Deep Generative Adversarial Networks for Addressing the Cold Start in Movie Recommendation Systems -- 1 Introduction -- 2 Related Works -- 3 Research Methodology -- 3.1 Data Preparation.
3.2 Collaborative Filtering with Singular Value Decomposition (CF-SVD) -- 3.3 Generative Adversarial Networks (GANs) -- 3.4 Collaborative Filtering (CF) with SVD and GANs -- 3.5 Content Based Filtering (CB) -- 4 Results -- 5 Conclusion -- References -- Predicting Undergraduate Academic Success with Machine Learning Approaches -- 1 Introduction -- 2 Related Work -- 3 Research Design and Methodology -- 3.1 Dataset Source -- 3.2 Exploratory Data Analysis -- 3.3 Data Preprocessing -- 3.4 Classification Algorithms -- 4 Results and Discussion -- 4.1 Evaluations of Classifiers Using Default Parameters -- 4.2 Model Parameter Optimization by Hyperparameter Tuning -- 5 Conclusion -- References -- Comparative Assessment of Facial Expression Recognition Models for Unraveling Emotional Signals with Convolutional Neural Networks -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Methodology -- 4.1 Pre-processing -- 4.2 Feature Extraction -- 4.3 CNN Architecture -- 5 Results -- 6 Discussions and Future Work -- References -- Evaluating Path-Finding Algorithms for Real-Time Route Recommendation System Built using FreeRTOS -- 1 Introduction -- 2 Related Work -- 3 Research Design and Methodology -- 3.1 Adjacency Matrix -- 3.2 Path Finding Algorithms -- 3.3 Real-Time Operating System (RTOS) -- 3.4 Functional Diagram of the Simulated System using FreeRTOS -- 4 Results and Discussion -- 4.1 Validate the accuracy of the recommended route -- 4.2 Performance Evaluation -- 5 Conclusion -- References -- Machine Learning-Based Phishing Website Detection: A Comparative Analysis and Web Application Development -- 1 Introduction -- 2 Literature Review -- 3 Research Design -- 3.1 Dataset Overview -- 3.2 Feature Selection -- 3.3 Detection Techniques Implementation -- 3.4 Performance Evaluation and Comparison -- 3.5 Web Application Development.
4 Results and Discussion -- 5 Conclusion -- References -- Comparative Performance of Multi-level Pre-trained Embeddings on CNN, LSTM and CNN-LSTM for Hate Speech and Offensive Language Detection -- 1 Introduction -- 2 The Architecture of HSOLC Detection Model -- 2.1 Text Embedding Layer -- 2.2 Representation Layer -- 2.3 Output Layer -- 3 Experimental Setup -- 4 Dataset and Results -- 4.1 Results and Discussion -- 5 Conclusion -- References -- Improved Classifier Chain Method Based on Particle Swarm Optimization and Genetic Algorithm for Multilabel Classification Problem -- 1 Introduction -- 1.1 Motivation -- 1.2 Random Label Sequence Ordering (RLSO) -- 2 Related Work -- 3 Method -- 3.1 Dataset -- 3.2 Data Preprocessing -- 3.3 Classification (Proposed Model) -- 3.4 Performance Measures -- 4 Results and Discussion -- 5 Conclusion -- References -- Sentiment Analysis on Umrah Packages Review in Malaysia -- 1 Introduction -- 2 Sentiment Analysis on Social Media -- 2.1 Related Works of Similar -- 2.2 Mobile Phone Reviews from Amazon Using Support Vector Machine -- 2.3 Sentiment Classification of Online Consumer Reviews Using Word Vector Representation -- 2.4 Online Reviews of Hospitality Services Using Naïve Bayes -- 2.5 Customer Satisfaction Towards Umrah Travel Agencies in Malaysia -- 3 Methodology -- 3.1 Preliminary Study -- 3.2 Data Analysis -- 3.3 Interface and Architecture Design -- 3.4 System Development -- 4 Analysis and Discussions -- 4.1 Naïve Bayes - Gaussian -- 4.2 Naïve Bayes - Multinomial -- 4.3 Support Vector Machine -- 4.4 Random Forest -- 4.5 Analysis -- 5 Conclusion and Recommendations -- References -- Opinion Mining System for Influence Detection Using Machine Learning to Secure Business Reputation -- 1 Introduction -- 2 Related Works -- 2.1 Sentiment Analysis -- 2.2 Supervised Machine Learning Approach -- 3 Methodology.
3.1 Data Preprocessing and Feature Extraction.
Record Nr. UNINA-9910878056303321
Ghazali Rozaida  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui