2020 International Conference on Applications and Techniques in Cyber Intelligence : Applications and Techniques in Cyber Intelligence (ATCI 2020) / / edited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (1,162 pages) : illustrations |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Engineering - Data processing
Computational intelligence Data Engineering Computational Intelligence |
ISBN | 3-030-53980-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Combination of Information Technology and College English in the Age of Media -- The Application of Computer Internet of Things in Modern Agricultural Planting Management -- The Influencing Factors Analysis of Network Interactive Teaching Mode Validity -- The Application Analysis of Computer Network Security Data Encryption Technology -- The Application of Computer Technology in Sports Training and Competition -- The Application of BIM Technology in Landscape Garden Engineering Projects -- College Physical Education Based on Multimedia Network Teaching Platform -- Development and Implementation of Health Information Management Platform in Medical Institutions -- Teaching Methods of University Economic Management Course Based on Python -- Innovative Application Paths of Big Data of Automobile Based on Internet of Vehicles. |
Record Nr. | UNINA-9910483970303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances on Computational Intelligence in Energy : The Applications of Nature-Inspired Metaheuristic Algorithms in Energy / / edited by Tutut Herawan, Haruna Chiroma, Jemal H. Abawajy |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (228 pages) |
Disciplina | 006.3 |
Collana | Green Energy and Technology |
Soggetto topico |
Energy systems
Computational intelligence Algorithms Energy policy Energy and state Energy Systems Computational Intelligence Energy Policy, Economics and Management |
ISBN | 3-319-69889-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Basic descriptions of computational intelligence algorithms (single, hybrid, ensemble, integrated and etc -- Credible sources of energy datasets -- Applications of computational algorithms in energy -- Practical application of cuckoo search and neural network in the prediction of OECD oil consumption -- Hybrid of Fuzzy systems and particle swarm optimization in the forecasting gas flaring from oil consumption -- Forecasting of OECD gas flaring using Elman neural network and cuckoo search algorithm -- Artificial bee colony and neural network for the forecasting of Malaysia renewable energy -- Soft computing methods in the modelling of OECD carbon dioxide emission from petroleum consumption -- Modelling energy crises based on Soft computing -- The forecasting of WTI and Dubai crude oil prices benchmarks based on soft computing -- A new approach for the forecasting of IAEA energy -- Modelling of gasoline prices using fuzzy multi-criteria decision making -- Soft computing for the prediction of Australia petroleum consumption based on OECD countries -- Future research problems in the area of computational intelligence algorithms in energy. . |
Record Nr. | UNINA-9910337596503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Big Data in Complex Systems : Challenges and Opportunities / / edited by Aboul Ella Hassanien, Ahmad Taher Azar, Vaclav Snasael, Janusz Kacprzyk, Jemal H. Abawajy |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (502 p.) |
Disciplina | 005.74 |
Collana | Studies in Big Data |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN | 3-319-11056-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cloud Computing Infrastructure for Massive Data: A Gigantic Task Ahead -- Big Data Movement: a Challenge in Data Processing -- Towards Robust Performance Guarantees for Models Learned from High-Dimensional Data -- Stream Clustering Algorithms: A Primer -- Cross Language Duplicate Record Detection in Big Data -- A Novel Hybridized Rough Set And Improved Harmony Search Based Feature Selection For Protein Sequence Classification -- Autonomic Discovery of News Evolvement in Twitter -- Hybrid Tolerance Rough Set based Intelligent Approaches for Social Tagging Systems -- Exploitation Of Healthcare Databases In Anesthesiology And Surgical Care For Comparing Comorbidity Indexes In Cholecystectomized Patients -- Sickness Absence And Record Linkage Using Primary Healthcare, Hospital And Occupational Databases -- Classification of ECG Cardiac Arrhythmias using Bijective Soft Set -- Semantic Geographic Space: from Big Data to Ecosystems of Data -- DNA Methylation Data Analysis and Visualizing in a Common Form of Breast Cancer -- Data Quality, Analytics, and Privacy in Big Data -- Search, analysis and visual comparison of massive and heterogeneous data: Application in the medical field -- Modified Soft Rough set based ECG signal Classification for Cardiac arrhythmias -- Towards a new architecture for the description and manipulation of large distributed data. |
Record Nr. | UNINA-9910741166703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad |
Autore | Tomar Ranjeet Singh |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (350 pages) |
Disciplina |
621.39
004.6 |
Altri autori (Persone) |
VermaShekhar
ChaurasiaBrijesh Kumar SinghVrijendra AbawajyJemal H AkasheShyam HsiungPao-Ann PrasadRamjee |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Artificial intelligence Data structures (Computer science) Information theory Image processing - Digital techniques Computer vision Computer Engineering and Networks Artificial Intelligence Data Structures and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-031-43140-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Wired and Wireless Communication Systems -- Networks and Information Security -- Electronics Circuits for Communication Systems. |
Record Nr. | UNISA-996550551003316 |
Tomar Ranjeet Singh
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad |
Autore | Tomar Ranjeet Singh |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (330 pages) |
Disciplina |
621.39
004.6 |
Altri autori (Persone) |
VermaShekhar
ChaurasiaBrijesh Kumar SinghVrijendra AbawajyJemal H AkasheShyam HsiungPao-Ann PrasadRamjee |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Artificial intelligence Data structures (Computer science) Information theory Image processing - Digital techniques Computer vision Computer Engineering and Networks Artificial Intelligence Data Structures and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-031-43145-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- High Dimensional Data Representation and Processing -- Brain Tumor Classification Using Feature Extraction and Non-linear SVM Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 VGG-SVM Model -- 3.1 Model Architecture -- 3.2 Implementation Details and Preprocessing -- 3.3 Dataset Description -- 4 Experimental Results and Discussion -- 4.1 Results -- 4.2 Discussion -- 5 Conclusion -- References -- Lightweight Django-Based Customer Relationship Management System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Feasibility and Requirement Analysis -- 3.2 Design of the System -- 3.3 Development Tools Used are Majorly Django, HTML, CSS, Bootstrap, and SQLite -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References -- Single Server Banking Management System -- 1 Introduction -- 1.1 Background and Overview -- 1.2 Problem Statement -- 1.3 Objective -- 1.4 Scope -- 1.5 Organization of the Paper -- 2 Paper Preparation -- 3 Characteristics and Features -- 3.1 SIP Calculator -- 3.2 EMI Calculator -- 3.3 OTP Verification -- 3.4 Email Facility -- 4 Methodology -- 4.1 Results -- 5 Conclusion -- 5.1 Future Scope -- References -- Prioritization of MQTT Messages: A Novel Approach -- 1 Introduction -- 1.1 Message Queuing Telemetry Transport (MQTT) Protocol -- 1.2 Problem Statement -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Identifying min-max Range -- 3.2 Forwarding High Priority Messages -- 3.3 Identifying Trivial Range -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of Crop Yield Prediction Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Methodology -- 5 Result Analysis -- 6 Conclusion -- 7 Future work -- References.
Big Data Analytics for Classification in Sentiment Analysis -- 1 Introduction -- 1.1 The 5 V'S of Big Data -- 1.2 Big Data Generation -- 1.3 Sentiment Analysis -- 2 Literature Review -- References -- Ensemble Classifiers for Classification of Imbalanced Dataset of Malicious and Benign Websites -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Data Summarization -- 3.3 Data Analysis and Preprocessing -- 3.4 Data Sampling and Balancing -- 3.5 Machine Learning Classifiers -- 4 Performance Evaluation -- 5 Conclusion -- References -- Forecasting of Congestive Cardiac Failure Using Deep Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Architecture -- 3.2 Algorithms -- 4 Result -- 5 Conclusion -- References -- Internet of Things-Based Smart Irrigation System for Moisture in the Soil and Weather Forecast -- 1 Introduction -- 2 Related Work -- 3 Benefits of Smart Irrigation System -- 4 Impect of Sustainability on Smart Irrigation System -- 5 The Smart Irrigation Systems' Basic Architecture and Layout -- 6 Difficulties and Potential Outcome -- 7 Conclusion -- References -- Visual Cryptography: An Emerging Technology -- 1 Introduction -- 1.1 Visual Cryptography for Binary Image -- 1.2 Visual Cryptography for Gray Image -- 1.3 Visual Cryptography for Colored Images -- 2 Literature Survey -- 3 Applications of Visual Cryptography -- 3.1 Watermarking -- 3.2 Anti- Phishing Systems -- 3.3 Human Machine Identification -- 3.4 Secure Banking Communication -- 3.5 Defense System -- 3.6 Captcha -- 4 Results -- 5 Conclusions -- References -- Computing Techniques for Efficient Networks Design -- Machine Learning Based Techniques for the Network Design of Advanced 5G Network, Beyond 5G (B5G) and Towards 6G: Challenges and Trends -- 1 Introduction -- 2 Motivation -- 2.1 Key Contributions. 3 Challenges Associated with NGWN -- 3.1 Deployment 5G (Denser) Cells -- 3.2 MIMO Along with Beam Forming -- 3.3 Challenges Associated with the System or Network Latency -- 3.4 Improvement of the Spectral Efficiency -- 4 The Requirements of Network Intelligence: ML in Advanced 5G -- 5 Application Areas of ML in 5G/B5G: Industry Perspective -- 6 State-of-the-Art ML Approached in Advanced 5G, B5G and Towards 6G -- 6.1 The Architecture of Radio Learning -- 7 Challenges Associated with Applying ML in NGWN -- 7.1 Challenges of Implementing the Process of Desired Learning -- 7.2 Challenges of Implementing the Network Edge Intelligence -- 7.3 The Trends for Addressing Challenges in Advanced 5G -- 8 ML Incorporation: Open Issues Offer Research Directions -- 8.1 Trends Towards ML-Powered 6G Network: Edge Intelligence -- 9 Conclusion -- References -- Recognition of Speech Emotion Using Machine Learning Techniques -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Collection -- 2.2 Data Preparation -- 2.3 Data Visualization -- 2.4 Feature Extraction and Model Building -- 3 Results and Discussions -- 4 Conclusion -- References -- Convolution Neural Network Based Model for Classification and Identification of Fake Profile on Social Network -- 1 Introduction -- 2 Social Media -- 3 Social Media Mining -- 4 Social Media Spam -- 5 Related Work -- 6 Proposed framework for Identifying Malicious Profile over Social Media -- 7 Result Analysis -- 8 Conclusion -- References -- Social Distance Monitoring and Infection Risk Assessment in COVID-19 Pandemic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Human Detection -- 3.2 Location Tracking -- 3.3 Inter Distance Estimation -- 3.4 Inter Distance Estimation -- 3.5 Inter Distance Estimation -- 4 Results -- 5 Conclusion -- References -- Vibrations Signal Analysis of Cantilever Beam Using Machine Learning. 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results -- 5 Future Scope of the Work -- References -- Pneumonia Detection Using Deep Learning: A Bibliometric Study -- 1 Introduction -- 2 Materials and Methods -- 2.1 Selection of Articles -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Numerical Simulation Design of Multiple Users Offloading Using Improved Optimization Approach for Edge Computing -- 1 Introduction -- 2 Mobile Edge/Fog Computing -- 3 Related Works -- 4 Modelling of the System -- 5 Simulation and Results -- 6 Conclusion -- References -- Numerical Simulation and Mathematical Modelling of Machine Learning Based Improved Crypto Currency Forecasting System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result Analysis -- 4.1 Dataset -- 4.2 Flow Chart of Simulation -- 4.3 Result Discussion -- 5 Conclusion and Future Scope -- References -- Reinforcement Learning in Blockchain-Enabled IIoT Networks -- 1 Introduction -- 2 Interconnection Between Blockchain, IIoT, and AI -- 3 Blockchain Technology and IIoT -- 4 Reinforcement Learning Techniques -- 4.1 Q-Learning -- 4.2 Multi-armed Bandit Learning -- 4.3 Actor-Critic Learning -- 5 Blockchain-Enabled IIoT Network -- 5.1 Security -- 5.2 Cost Effectiveness -- 5.3 Trustless -- 5.4 Autonomy -- 5.5 Smart Contracts -- 5.6 Blockchain-Enabled IIoT Layers -- 5.7 Physical Layer -- 5.8 Network Layer -- 5.9 Application Layer -- 6 Reinforcement Learning Applications in Blockchain-Enabled IIoT Network -- 6.1 Minimizing Forking Events -- 6.2 Improving Energy Efficiency -- 6.3 Time to Finality Minimization -- 6.4 Enhancing Transaction Throughput -- 6.5 Improving Link Security -- 6.6 Average Blocktime Reduction -- 7 Conclusion -- References -- Practical Challenges in Implementation of Information and Communication Technology -- 1 Introduction. 2 Research Methodology -- 3 Bibliometric Details -- 3.1 Authors -- 3.2 Source Documents and Keywords -- 3.3 Countries, Sponsors, and Affiliations -- 4 Thematic Discussion -- 4.1 Technological and Implementation Challenges -- 4.2 Infrastructure Based Challenges -- 4.3 Teacher Related Challenges -- 4.4 Student Related Challenges -- 4.5 Other Challenges -- 5 Future Research Agenda -- 5.1 Other Challenges -- 5.2 Research Niches -- 6 Conclusion -- References -- Facial Analytics or Virtual Avatars: Competencies and Design Considerations for Student-Teacher Interaction in AI-Powered Online Education for Effective Classroom Engagement -- 1 Introduction -- 2 Background -- 3 Conceptual Foundation -- 4 AI-Powered Online Learning -- 5 Methods and Methodology -- 5.1 Creation of a Storyboard -- 5.2 Participants -- 5.3 Procedure -- 5.4 Data Analysis -- 6 Findings -- 6.1 Communication -- 6.2 Quantity and Quality -- 6.3 Responsibility -- 6.4 Support -- 6.5 Agency -- 6.6 Connection -- 6.7 Surveillance -- 7 Analysis and Conclusion -- References -- Vehicular Technology and Applications -- Real Time Connectivity Analysis of Vehicles in Different City Dense Environment -- 1 Introduction -- 2 Problem Description -- 2.1 VANET Scenario -- 2.2 VANETsim Overview -- 3 Performance Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Analysis of Energy Efficient Wireless Senor Network with 6LoWPAN IoT Gateway -- 1 Introduction -- 2 Wireless Energy Harvesting and Implementation Techniques -- 2.1 Role of Performance Parameters in the Proposed System -- 3 Proposed System Model of Wireless Sensor Network with 6LoWPAN Gateway -- 4 Simulation Results and Discussion -- 5 Conclusion and Future Work -- References -- Energy-Efficient Data Routing Protocols for Sink Mobility in Wireless Sensor Networks -- 1 Introduction -- 1.1 Motivation -- 2 Related Work. 3 Research Gaps. |
Record Nr. | UNISA-996550551503316 |
Tomar Ranjeet Singh
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Communication, Networks and Computing : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad |
Autore | Tomar Ranjeet Singh |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (330 pages) |
Disciplina |
621.39
004.6 |
Altri autori (Persone) |
VermaShekhar
ChaurasiaBrijesh Kumar SinghVrijendra AbawajyJemal H AkasheShyam HsiungPao-Ann PrasadRamjee |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Artificial intelligence Data structures (Computer science) Information theory Image processing - Digital techniques Computer vision Computer Engineering and Networks Artificial Intelligence Data Structures and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-031-43145-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- High Dimensional Data Representation and Processing -- Brain Tumor Classification Using Feature Extraction and Non-linear SVM Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 VGG-SVM Model -- 3.1 Model Architecture -- 3.2 Implementation Details and Preprocessing -- 3.3 Dataset Description -- 4 Experimental Results and Discussion -- 4.1 Results -- 4.2 Discussion -- 5 Conclusion -- References -- Lightweight Django-Based Customer Relationship Management System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Feasibility and Requirement Analysis -- 3.2 Design of the System -- 3.3 Development Tools Used are Majorly Django, HTML, CSS, Bootstrap, and SQLite -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References -- Single Server Banking Management System -- 1 Introduction -- 1.1 Background and Overview -- 1.2 Problem Statement -- 1.3 Objective -- 1.4 Scope -- 1.5 Organization of the Paper -- 2 Paper Preparation -- 3 Characteristics and Features -- 3.1 SIP Calculator -- 3.2 EMI Calculator -- 3.3 OTP Verification -- 3.4 Email Facility -- 4 Methodology -- 4.1 Results -- 5 Conclusion -- 5.1 Future Scope -- References -- Prioritization of MQTT Messages: A Novel Approach -- 1 Introduction -- 1.1 Message Queuing Telemetry Transport (MQTT) Protocol -- 1.2 Problem Statement -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Identifying min-max Range -- 3.2 Forwarding High Priority Messages -- 3.3 Identifying Trivial Range -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of Crop Yield Prediction Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Methodology -- 5 Result Analysis -- 6 Conclusion -- 7 Future work -- References.
Big Data Analytics for Classification in Sentiment Analysis -- 1 Introduction -- 1.1 The 5 V'S of Big Data -- 1.2 Big Data Generation -- 1.3 Sentiment Analysis -- 2 Literature Review -- References -- Ensemble Classifiers for Classification of Imbalanced Dataset of Malicious and Benign Websites -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Data Summarization -- 3.3 Data Analysis and Preprocessing -- 3.4 Data Sampling and Balancing -- 3.5 Machine Learning Classifiers -- 4 Performance Evaluation -- 5 Conclusion -- References -- Forecasting of Congestive Cardiac Failure Using Deep Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Architecture -- 3.2 Algorithms -- 4 Result -- 5 Conclusion -- References -- Internet of Things-Based Smart Irrigation System for Moisture in the Soil and Weather Forecast -- 1 Introduction -- 2 Related Work -- 3 Benefits of Smart Irrigation System -- 4 Impect of Sustainability on Smart Irrigation System -- 5 The Smart Irrigation Systems' Basic Architecture and Layout -- 6 Difficulties and Potential Outcome -- 7 Conclusion -- References -- Visual Cryptography: An Emerging Technology -- 1 Introduction -- 1.1 Visual Cryptography for Binary Image -- 1.2 Visual Cryptography for Gray Image -- 1.3 Visual Cryptography for Colored Images -- 2 Literature Survey -- 3 Applications of Visual Cryptography -- 3.1 Watermarking -- 3.2 Anti- Phishing Systems -- 3.3 Human Machine Identification -- 3.4 Secure Banking Communication -- 3.5 Defense System -- 3.6 Captcha -- 4 Results -- 5 Conclusions -- References -- Computing Techniques for Efficient Networks Design -- Machine Learning Based Techniques for the Network Design of Advanced 5G Network, Beyond 5G (B5G) and Towards 6G: Challenges and Trends -- 1 Introduction -- 2 Motivation -- 2.1 Key Contributions. 3 Challenges Associated with NGWN -- 3.1 Deployment 5G (Denser) Cells -- 3.2 MIMO Along with Beam Forming -- 3.3 Challenges Associated with the System or Network Latency -- 3.4 Improvement of the Spectral Efficiency -- 4 The Requirements of Network Intelligence: ML in Advanced 5G -- 5 Application Areas of ML in 5G/B5G: Industry Perspective -- 6 State-of-the-Art ML Approached in Advanced 5G, B5G and Towards 6G -- 6.1 The Architecture of Radio Learning -- 7 Challenges Associated with Applying ML in NGWN -- 7.1 Challenges of Implementing the Process of Desired Learning -- 7.2 Challenges of Implementing the Network Edge Intelligence -- 7.3 The Trends for Addressing Challenges in Advanced 5G -- 8 ML Incorporation: Open Issues Offer Research Directions -- 8.1 Trends Towards ML-Powered 6G Network: Edge Intelligence -- 9 Conclusion -- References -- Recognition of Speech Emotion Using Machine Learning Techniques -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Collection -- 2.2 Data Preparation -- 2.3 Data Visualization -- 2.4 Feature Extraction and Model Building -- 3 Results and Discussions -- 4 Conclusion -- References -- Convolution Neural Network Based Model for Classification and Identification of Fake Profile on Social Network -- 1 Introduction -- 2 Social Media -- 3 Social Media Mining -- 4 Social Media Spam -- 5 Related Work -- 6 Proposed framework for Identifying Malicious Profile over Social Media -- 7 Result Analysis -- 8 Conclusion -- References -- Social Distance Monitoring and Infection Risk Assessment in COVID-19 Pandemic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Human Detection -- 3.2 Location Tracking -- 3.3 Inter Distance Estimation -- 3.4 Inter Distance Estimation -- 3.5 Inter Distance Estimation -- 4 Results -- 5 Conclusion -- References -- Vibrations Signal Analysis of Cantilever Beam Using Machine Learning. 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results -- 5 Future Scope of the Work -- References -- Pneumonia Detection Using Deep Learning: A Bibliometric Study -- 1 Introduction -- 2 Materials and Methods -- 2.1 Selection of Articles -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Numerical Simulation Design of Multiple Users Offloading Using Improved Optimization Approach for Edge Computing -- 1 Introduction -- 2 Mobile Edge/Fog Computing -- 3 Related Works -- 4 Modelling of the System -- 5 Simulation and Results -- 6 Conclusion -- References -- Numerical Simulation and Mathematical Modelling of Machine Learning Based Improved Crypto Currency Forecasting System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result Analysis -- 4.1 Dataset -- 4.2 Flow Chart of Simulation -- 4.3 Result Discussion -- 5 Conclusion and Future Scope -- References -- Reinforcement Learning in Blockchain-Enabled IIoT Networks -- 1 Introduction -- 2 Interconnection Between Blockchain, IIoT, and AI -- 3 Blockchain Technology and IIoT -- 4 Reinforcement Learning Techniques -- 4.1 Q-Learning -- 4.2 Multi-armed Bandit Learning -- 4.3 Actor-Critic Learning -- 5 Blockchain-Enabled IIoT Network -- 5.1 Security -- 5.2 Cost Effectiveness -- 5.3 Trustless -- 5.4 Autonomy -- 5.5 Smart Contracts -- 5.6 Blockchain-Enabled IIoT Layers -- 5.7 Physical Layer -- 5.8 Network Layer -- 5.9 Application Layer -- 6 Reinforcement Learning Applications in Blockchain-Enabled IIoT Network -- 6.1 Minimizing Forking Events -- 6.2 Improving Energy Efficiency -- 6.3 Time to Finality Minimization -- 6.4 Enhancing Transaction Throughput -- 6.5 Improving Link Security -- 6.6 Average Blocktime Reduction -- 7 Conclusion -- References -- Practical Challenges in Implementation of Information and Communication Technology -- 1 Introduction. 2 Research Methodology -- 3 Bibliometric Details -- 3.1 Authors -- 3.2 Source Documents and Keywords -- 3.3 Countries, Sponsors, and Affiliations -- 4 Thematic Discussion -- 4.1 Technological and Implementation Challenges -- 4.2 Infrastructure Based Challenges -- 4.3 Teacher Related Challenges -- 4.4 Student Related Challenges -- 4.5 Other Challenges -- 5 Future Research Agenda -- 5.1 Other Challenges -- 5.2 Research Niches -- 6 Conclusion -- References -- Facial Analytics or Virtual Avatars: Competencies and Design Considerations for Student-Teacher Interaction in AI-Powered Online Education for Effective Classroom Engagement -- 1 Introduction -- 2 Background -- 3 Conceptual Foundation -- 4 AI-Powered Online Learning -- 5 Methods and Methodology -- 5.1 Creation of a Storyboard -- 5.2 Participants -- 5.3 Procedure -- 5.4 Data Analysis -- 6 Findings -- 6.1 Communication -- 6.2 Quantity and Quality -- 6.3 Responsibility -- 6.4 Support -- 6.5 Agency -- 6.6 Connection -- 6.7 Surveillance -- 7 Analysis and Conclusion -- References -- Vehicular Technology and Applications -- Real Time Connectivity Analysis of Vehicles in Different City Dense Environment -- 1 Introduction -- 2 Problem Description -- 2.1 VANET Scenario -- 2.2 VANETsim Overview -- 3 Performance Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Analysis of Energy Efficient Wireless Senor Network with 6LoWPAN IoT Gateway -- 1 Introduction -- 2 Wireless Energy Harvesting and Implementation Techniques -- 2.1 Role of Performance Parameters in the Proposed System -- 3 Proposed System Model of Wireless Sensor Network with 6LoWPAN Gateway -- 4 Simulation Results and Discussion -- 5 Conclusion and Future Work -- References -- Energy-Efficient Data Routing Protocols for Sink Mobility in Wireless Sensor Networks -- 1 Introduction -- 1.1 Motivation -- 2 Related Work. 3 Research Gaps. |
Record Nr. | UNINA-9910746997303321 |
Tomar Ranjeet Singh
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Communication, Networks and Computing : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad |
Autore | Tomar Ranjeet Singh |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (350 pages) |
Disciplina |
621.39
004.6 |
Altri autori (Persone) |
VermaShekhar
ChaurasiaBrijesh Kumar SinghVrijendra AbawajyJemal H AkasheShyam HsiungPao-Ann PrasadRamjee |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Artificial intelligence Data structures (Computer science) Information theory Image processing - Digital techniques Computer vision Computer Engineering and Networks Artificial Intelligence Data Structures and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-031-43140-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Wired and Wireless Communication Systems -- Networks and Information Security -- Electronics Circuits for Communication Systems. |
Record Nr. | UNINA-9910746951803321 |
Tomar Ranjeet Singh
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019 : Applications and Techniques in Cyber Intelligence / / edited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Rafiqul Islam, Zheng Xu, Mohammed Atiquzzaman |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xxxii, 2,132 pages) : illustrations |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN | 3-030-25128-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484249303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the International Conference on Data Engineering 2015 (DaEng-2015) / / edited by Jemal H. Abawajy, Mohamed Othman, Rozaida Ghazali, Mustafa Mat Deris, Hairulnizam Mahdin, Tutut Herawan |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (624 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico |
Computational intelligence
Data mining Database management Computational Intelligence Data Mining and Knowledge Discovery Database Management |
ISBN | 981-13-1799-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1: Database Theory and Applications -- Chapter 1. A New Approach to Secure and Manage Load Balancing of the Distributed Database using SQL Firewall -- Chapter 2. Object-Based Simulators for Large Scale Distributed Virtual Environment -- Chapter 3. 1P1O: A Large Scale Distributed Virtual Environment -- Chapter 4.Optimize Performance Load Balancing Techniques using Binary Vote Assignment Grid Quorum (BVAGQ): A Systematic Review -- Chapter 5.Managing MyGRANTS Fragmented Database Using Binary Vote Assignment Grid Quorum with Association Rule (BVAGQ-AR) Replication Model -- Chapter 6.DGMS: Dataset Generator Based On Malay Stemmer Algorithm -- Chapter 7.A Survey of UML Tools -- Chapter 8.Hybrid Landscape Change Detection Methods in a Noisy Data Environment -- Part 2: Data Warehousing and Mining -- 9.Concept Based Lattice Mining (CBLM) Using Formal Concept Analysis (FCA) for Text Mining -- 10. 2M-SELAR: A Model for Mining Sequential Least Association Rules. |
Record Nr. | UNINA-9910483802303321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Recent Advances on Soft Computing and Data Mining : Proceedings of the Sixth International Conference on Soft Computing and Data Mining (SCDM 2024), August 21-22 2024 |
Autore | Ghazali Rozaida |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (451 pages) |
Altri autori (Persone) |
NawiNazri Mohd
DerisMustafa Mat AbawajyJemal H ArbaiyNureize |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 3-031-66965-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Conference Organization -- Contents -- Prediction of OPEC Carbon Dioxide Emissions Using K-Means Clustering and Ensemble Algorithm -- 1 Introduction -- 2 Related Works -- 3 Fuzzy Nearest Neighbor -- 4 Sequential Minimal Optimization -- 5 Logistic Regression -- 6 K-Means Clustering -- 7 Proposed Methodology -- 8 Experimental Setup and Analysis -- 8.1 Assessment Measures -- 8.2 Dataset Description -- 8.3 Simulation Results -- 9 Conclusion -- References -- Detection of Phishing Websites from URLs Using Hybrid Ensemble-Based Machine Learning Technique -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Description of the Machine Learning Classifiers -- 3.2 Dataset Description -- 3.3 Model Construction -- 4 Performance Evaluation Metrics -- 5 Result -- 6 Conclusion -- 7 Future Work -- References -- Minimal Data for Maximum Impact: An Indonesian Part-of-Speech Tagging Case Study -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Semi-supervised Learning Preprocessing -- 3.3 Feature Selection -- 3.4 Classification -- 3.5 Evaluation -- 4 Result and Discussion -- 5 Conclusion -- 5.1 Summary -- 5.2 Future Work -- References -- Alleviating Sparsity to Enhance Group Recommendation with Cross-Linked Domain Model -- 1 Introduction -- 2 Literature Review -- 2.1 Group Recommender System -- 2.2 Cross-Domain Recommender System -- 2.3 Linked Open Data -- 3 Methodology -- 3.1 Experiment Setup -- 4 Result and Discussion -- 5 Conclusion and Recommendation -- References -- Evaluating Deep Transfer Learning Models for Detecting Various Face Mask Wearings -- 1 Introduction -- 2 Literature Review -- 2.1 Deep Learning -- 2.2 Transfer Learning -- 2.3 Existing Works -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusions -- References.
Classification of Stunting Events: Case Study in West Java, Indonesia -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Dataset Collection -- 3.2 Data Pre-processing -- 3.3 Model Comparison -- 3.4 Model Implementation -- 3.5 Model Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- The Effects of Data Reduction Using Rough Set Theory on Logistic Regression Model -- 1 Introduction -- 2 The Basic Theories and Methodology -- 2.1 Rough Set Theory (RST) -- 2.2 Logistic Regression Model -- 3 Implementation Hybrid Classification Approach with LR Analysis and RST -- 3.1 Implementation Hybrid Model on Anemia Data Set -- 3.2 Implementation Hybrid Model on Diabetes Data Set -- 3.3 Discussion -- 4 Conclusion -- References -- Robust Heart Disease Prognosis: Integrating Extended Isolation Forest Outlier Detection with Advanced Prediction Models -- 1 Introduction -- 2 Methodology -- 2.1 Summary of Dataset -- 2.2 Data Preprocessing -- 2.3 Machine Learning Techniques -- 2.4 Deep Learning Algorithm -- 2.5 Evaluation Parameters -- 3 Results Evaluation -- 3.1 Implementing the First Strategy, Which Involves Neither Feature Selection nor Outlier Detection -- 3.2 Implementing the 2nd Strategy: Feature Selection Without Outlier Detection -- 3.3 Employing the 3rd Strategy (Feature Selection and Detection of Outliers) -- 4 Conclusion -- References -- Overlapping Granular Clustering: Application in Fuzzy Rule-Based Classification -- 1 Introduction -- 2 GrC-Fuzzy Logic Models -- 2.1 Granular Clustering -- 2.2 Formation of Fuzzy Logic Rule Base -- 3 Overlapping GrC -- 3.1 R-Value -- 3.2 A New Overlapping Measure During the Iterative Data Granulation -- 4 Case Study and Simulation Results -- 5 Interpretability Index -- 6 Conclusion -- References -- Improved Rough-Multiple Regression for Unemployment Rate Model in Indonesia -- 1 Introduction. 2 Variable Framework and Methods -- 2.1 Multiple Linear Regression -- 2.2 Rough Sets Theory -- 3 Results and Discussion -- 3.1 Descriptive Statistics for Unemployment Rate and Its Variables -- 3.2 Multiple Linear Regression Model for Unemployment Rate -- 3.3 Rough-Multiple Regression Model for Unemployment Rate -- 3.4 Comparison Multiple Regression and Rough-Multiple Regression -- 4 Conclusion -- References -- Utilizing Machine Learning for Gene Expression Data: Incorporating Gene Sequencing, K-Mer Counting and Asymmetric N-Grams Features -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data Pre-processing -- 2.2 Classification Model -- 2.3 Performance Metrics -- 3 Result and Discussion -- 4 Conclusion and Future Work -- References -- Text Sentiment Analysis on VIX's Impact on Market Sentiment Dynamics -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Sentiment Analysis of SnowNLP -- 3.3 Sentiment Index -- 3.4 Pearson's Correlation -- 3.5 Linear Correlation -- 3.6 Granger Causality Test -- 4 Empirical Result and Analysis -- 4.1 Data Description and Cleaning -- 4.2 Text Sentiment Index -- 4.3 Pearson's Correlation -- 4.4 Linear Correlation -- 4.5 Granger Causality Test -- 4.6 Test for Chinese Market -- 5 Conclusion -- References -- Multilevel Monte Carlo Simulation Model for Air Pollution Index Prediction of a Smart Network -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Monte Carlo Simulation -- 3.2 Multilevel Monte Carlo Simulation -- 3.3 Air Pollution Dataset -- 3.4 Performance Evaluation Metrics -- 4 Results and Discussion -- 4.1 Correlation Analysis -- 5 Conclusion -- References -- An In-Depth Strategy using Deep Generative Adversarial Networks for Addressing the Cold Start in Movie Recommendation Systems -- 1 Introduction -- 2 Related Works -- 3 Research Methodology -- 3.1 Data Preparation. 3.2 Collaborative Filtering with Singular Value Decomposition (CF-SVD) -- 3.3 Generative Adversarial Networks (GANs) -- 3.4 Collaborative Filtering (CF) with SVD and GANs -- 3.5 Content Based Filtering (CB) -- 4 Results -- 5 Conclusion -- References -- Predicting Undergraduate Academic Success with Machine Learning Approaches -- 1 Introduction -- 2 Related Work -- 3 Research Design and Methodology -- 3.1 Dataset Source -- 3.2 Exploratory Data Analysis -- 3.3 Data Preprocessing -- 3.4 Classification Algorithms -- 4 Results and Discussion -- 4.1 Evaluations of Classifiers Using Default Parameters -- 4.2 Model Parameter Optimization by Hyperparameter Tuning -- 5 Conclusion -- References -- Comparative Assessment of Facial Expression Recognition Models for Unraveling Emotional Signals with Convolutional Neural Networks -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Methodology -- 4.1 Pre-processing -- 4.2 Feature Extraction -- 4.3 CNN Architecture -- 5 Results -- 6 Discussions and Future Work -- References -- Evaluating Path-Finding Algorithms for Real-Time Route Recommendation System Built using FreeRTOS -- 1 Introduction -- 2 Related Work -- 3 Research Design and Methodology -- 3.1 Adjacency Matrix -- 3.2 Path Finding Algorithms -- 3.3 Real-Time Operating System (RTOS) -- 3.4 Functional Diagram of the Simulated System using FreeRTOS -- 4 Results and Discussion -- 4.1 Validate the accuracy of the recommended route -- 4.2 Performance Evaluation -- 5 Conclusion -- References -- Machine Learning-Based Phishing Website Detection: A Comparative Analysis and Web Application Development -- 1 Introduction -- 2 Literature Review -- 3 Research Design -- 3.1 Dataset Overview -- 3.2 Feature Selection -- 3.3 Detection Techniques Implementation -- 3.4 Performance Evaluation and Comparison -- 3.5 Web Application Development. 4 Results and Discussion -- 5 Conclusion -- References -- Comparative Performance of Multi-level Pre-trained Embeddings on CNN, LSTM and CNN-LSTM for Hate Speech and Offensive Language Detection -- 1 Introduction -- 2 The Architecture of HSOLC Detection Model -- 2.1 Text Embedding Layer -- 2.2 Representation Layer -- 2.3 Output Layer -- 3 Experimental Setup -- 4 Dataset and Results -- 4.1 Results and Discussion -- 5 Conclusion -- References -- Improved Classifier Chain Method Based on Particle Swarm Optimization and Genetic Algorithm for Multilabel Classification Problem -- 1 Introduction -- 1.1 Motivation -- 1.2 Random Label Sequence Ordering (RLSO) -- 2 Related Work -- 3 Method -- 3.1 Dataset -- 3.2 Data Preprocessing -- 3.3 Classification (Proposed Model) -- 3.4 Performance Measures -- 4 Results and Discussion -- 5 Conclusion -- References -- Sentiment Analysis on Umrah Packages Review in Malaysia -- 1 Introduction -- 2 Sentiment Analysis on Social Media -- 2.1 Related Works of Similar -- 2.2 Mobile Phone Reviews from Amazon Using Support Vector Machine -- 2.3 Sentiment Classification of Online Consumer Reviews Using Word Vector Representation -- 2.4 Online Reviews of Hospitality Services Using Naïve Bayes -- 2.5 Customer Satisfaction Towards Umrah Travel Agencies in Malaysia -- 3 Methodology -- 3.1 Preliminary Study -- 3.2 Data Analysis -- 3.3 Interface and Architecture Design -- 3.4 System Development -- 4 Analysis and Discussions -- 4.1 Naïve Bayes - Gaussian -- 4.2 Naïve Bayes - Multinomial -- 4.3 Support Vector Machine -- 4.4 Random Forest -- 4.5 Analysis -- 5 Conclusion and Recommendations -- References -- Opinion Mining System for Influence Detection Using Machine Learning to Secure Business Reputation -- 1 Introduction -- 2 Related Works -- 2.1 Sentiment Analysis -- 2.2 Supervised Machine Learning Approach -- 3 Methodology. 3.1 Data Preprocessing and Feature Extraction. |
Record Nr. | UNINA-9910878056303321 |
Ghazali Rozaida
![]() |
||
Cham : , : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|