Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad |
Autore | Tomar Ranjeet Singh |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (350 pages) |
Disciplina |
621.39
004.6 |
Altri autori (Persone) |
VermaShekhar
ChaurasiaBrijesh Kumar SinghVrijendra AbawajyJemal H AkasheShyam HsiungPao-Ann PrasadRamjee |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Artificial intelligence Data structures (Computer science) Information theory Image processing - Digital techniques Computer vision Computer Engineering and Networks Artificial Intelligence Data Structures and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-031-43140-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Wired and Wireless Communication Systems -- Networks and Information Security -- Electronics Circuits for Communication Systems. |
Record Nr. | UNISA-996550551003316 |
Tomar Ranjeet Singh
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad |
Autore | Tomar Ranjeet Singh |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (330 pages) |
Disciplina |
621.39
004.6 |
Altri autori (Persone) |
VermaShekhar
ChaurasiaBrijesh Kumar SinghVrijendra AbawajyJemal H AkasheShyam HsiungPao-Ann PrasadRamjee |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Artificial intelligence Data structures (Computer science) Information theory Image processing - Digital techniques Computer vision Computer Engineering and Networks Artificial Intelligence Data Structures and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-031-43145-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- High Dimensional Data Representation and Processing -- Brain Tumor Classification Using Feature Extraction and Non-linear SVM Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 VGG-SVM Model -- 3.1 Model Architecture -- 3.2 Implementation Details and Preprocessing -- 3.3 Dataset Description -- 4 Experimental Results and Discussion -- 4.1 Results -- 4.2 Discussion -- 5 Conclusion -- References -- Lightweight Django-Based Customer Relationship Management System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Feasibility and Requirement Analysis -- 3.2 Design of the System -- 3.3 Development Tools Used are Majorly Django, HTML, CSS, Bootstrap, and SQLite -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References -- Single Server Banking Management System -- 1 Introduction -- 1.1 Background and Overview -- 1.2 Problem Statement -- 1.3 Objective -- 1.4 Scope -- 1.5 Organization of the Paper -- 2 Paper Preparation -- 3 Characteristics and Features -- 3.1 SIP Calculator -- 3.2 EMI Calculator -- 3.3 OTP Verification -- 3.4 Email Facility -- 4 Methodology -- 4.1 Results -- 5 Conclusion -- 5.1 Future Scope -- References -- Prioritization of MQTT Messages: A Novel Approach -- 1 Introduction -- 1.1 Message Queuing Telemetry Transport (MQTT) Protocol -- 1.2 Problem Statement -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Identifying min-max Range -- 3.2 Forwarding High Priority Messages -- 3.3 Identifying Trivial Range -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of Crop Yield Prediction Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Methodology -- 5 Result Analysis -- 6 Conclusion -- 7 Future work -- References.
Big Data Analytics for Classification in Sentiment Analysis -- 1 Introduction -- 1.1 The 5 V'S of Big Data -- 1.2 Big Data Generation -- 1.3 Sentiment Analysis -- 2 Literature Review -- References -- Ensemble Classifiers for Classification of Imbalanced Dataset of Malicious and Benign Websites -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Data Summarization -- 3.3 Data Analysis and Preprocessing -- 3.4 Data Sampling and Balancing -- 3.5 Machine Learning Classifiers -- 4 Performance Evaluation -- 5 Conclusion -- References -- Forecasting of Congestive Cardiac Failure Using Deep Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Architecture -- 3.2 Algorithms -- 4 Result -- 5 Conclusion -- References -- Internet of Things-Based Smart Irrigation System for Moisture in the Soil and Weather Forecast -- 1 Introduction -- 2 Related Work -- 3 Benefits of Smart Irrigation System -- 4 Impect of Sustainability on Smart Irrigation System -- 5 The Smart Irrigation Systems' Basic Architecture and Layout -- 6 Difficulties and Potential Outcome -- 7 Conclusion -- References -- Visual Cryptography: An Emerging Technology -- 1 Introduction -- 1.1 Visual Cryptography for Binary Image -- 1.2 Visual Cryptography for Gray Image -- 1.3 Visual Cryptography for Colored Images -- 2 Literature Survey -- 3 Applications of Visual Cryptography -- 3.1 Watermarking -- 3.2 Anti- Phishing Systems -- 3.3 Human Machine Identification -- 3.4 Secure Banking Communication -- 3.5 Defense System -- 3.6 Captcha -- 4 Results -- 5 Conclusions -- References -- Computing Techniques for Efficient Networks Design -- Machine Learning Based Techniques for the Network Design of Advanced 5G Network, Beyond 5G (B5G) and Towards 6G: Challenges and Trends -- 1 Introduction -- 2 Motivation -- 2.1 Key Contributions. 3 Challenges Associated with NGWN -- 3.1 Deployment 5G (Denser) Cells -- 3.2 MIMO Along with Beam Forming -- 3.3 Challenges Associated with the System or Network Latency -- 3.4 Improvement of the Spectral Efficiency -- 4 The Requirements of Network Intelligence: ML in Advanced 5G -- 5 Application Areas of ML in 5G/B5G: Industry Perspective -- 6 State-of-the-Art ML Approached in Advanced 5G, B5G and Towards 6G -- 6.1 The Architecture of Radio Learning -- 7 Challenges Associated with Applying ML in NGWN -- 7.1 Challenges of Implementing the Process of Desired Learning -- 7.2 Challenges of Implementing the Network Edge Intelligence -- 7.3 The Trends for Addressing Challenges in Advanced 5G -- 8 ML Incorporation: Open Issues Offer Research Directions -- 8.1 Trends Towards ML-Powered 6G Network: Edge Intelligence -- 9 Conclusion -- References -- Recognition of Speech Emotion Using Machine Learning Techniques -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Collection -- 2.2 Data Preparation -- 2.3 Data Visualization -- 2.4 Feature Extraction and Model Building -- 3 Results and Discussions -- 4 Conclusion -- References -- Convolution Neural Network Based Model for Classification and Identification of Fake Profile on Social Network -- 1 Introduction -- 2 Social Media -- 3 Social Media Mining -- 4 Social Media Spam -- 5 Related Work -- 6 Proposed framework for Identifying Malicious Profile over Social Media -- 7 Result Analysis -- 8 Conclusion -- References -- Social Distance Monitoring and Infection Risk Assessment in COVID-19 Pandemic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Human Detection -- 3.2 Location Tracking -- 3.3 Inter Distance Estimation -- 3.4 Inter Distance Estimation -- 3.5 Inter Distance Estimation -- 4 Results -- 5 Conclusion -- References -- Vibrations Signal Analysis of Cantilever Beam Using Machine Learning. 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results -- 5 Future Scope of the Work -- References -- Pneumonia Detection Using Deep Learning: A Bibliometric Study -- 1 Introduction -- 2 Materials and Methods -- 2.1 Selection of Articles -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Numerical Simulation Design of Multiple Users Offloading Using Improved Optimization Approach for Edge Computing -- 1 Introduction -- 2 Mobile Edge/Fog Computing -- 3 Related Works -- 4 Modelling of the System -- 5 Simulation and Results -- 6 Conclusion -- References -- Numerical Simulation and Mathematical Modelling of Machine Learning Based Improved Crypto Currency Forecasting System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result Analysis -- 4.1 Dataset -- 4.2 Flow Chart of Simulation -- 4.3 Result Discussion -- 5 Conclusion and Future Scope -- References -- Reinforcement Learning in Blockchain-Enabled IIoT Networks -- 1 Introduction -- 2 Interconnection Between Blockchain, IIoT, and AI -- 3 Blockchain Technology and IIoT -- 4 Reinforcement Learning Techniques -- 4.1 Q-Learning -- 4.2 Multi-armed Bandit Learning -- 4.3 Actor-Critic Learning -- 5 Blockchain-Enabled IIoT Network -- 5.1 Security -- 5.2 Cost Effectiveness -- 5.3 Trustless -- 5.4 Autonomy -- 5.5 Smart Contracts -- 5.6 Blockchain-Enabled IIoT Layers -- 5.7 Physical Layer -- 5.8 Network Layer -- 5.9 Application Layer -- 6 Reinforcement Learning Applications in Blockchain-Enabled IIoT Network -- 6.1 Minimizing Forking Events -- 6.2 Improving Energy Efficiency -- 6.3 Time to Finality Minimization -- 6.4 Enhancing Transaction Throughput -- 6.5 Improving Link Security -- 6.6 Average Blocktime Reduction -- 7 Conclusion -- References -- Practical Challenges in Implementation of Information and Communication Technology -- 1 Introduction. 2 Research Methodology -- 3 Bibliometric Details -- 3.1 Authors -- 3.2 Source Documents and Keywords -- 3.3 Countries, Sponsors, and Affiliations -- 4 Thematic Discussion -- 4.1 Technological and Implementation Challenges -- 4.2 Infrastructure Based Challenges -- 4.3 Teacher Related Challenges -- 4.4 Student Related Challenges -- 4.5 Other Challenges -- 5 Future Research Agenda -- 5.1 Other Challenges -- 5.2 Research Niches -- 6 Conclusion -- References -- Facial Analytics or Virtual Avatars: Competencies and Design Considerations for Student-Teacher Interaction in AI-Powered Online Education for Effective Classroom Engagement -- 1 Introduction -- 2 Background -- 3 Conceptual Foundation -- 4 AI-Powered Online Learning -- 5 Methods and Methodology -- 5.1 Creation of a Storyboard -- 5.2 Participants -- 5.3 Procedure -- 5.4 Data Analysis -- 6 Findings -- 6.1 Communication -- 6.2 Quantity and Quality -- 6.3 Responsibility -- 6.4 Support -- 6.5 Agency -- 6.6 Connection -- 6.7 Surveillance -- 7 Analysis and Conclusion -- References -- Vehicular Technology and Applications -- Real Time Connectivity Analysis of Vehicles in Different City Dense Environment -- 1 Introduction -- 2 Problem Description -- 2.1 VANET Scenario -- 2.2 VANETsim Overview -- 3 Performance Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Analysis of Energy Efficient Wireless Senor Network with 6LoWPAN IoT Gateway -- 1 Introduction -- 2 Wireless Energy Harvesting and Implementation Techniques -- 2.1 Role of Performance Parameters in the Proposed System -- 3 Proposed System Model of Wireless Sensor Network with 6LoWPAN Gateway -- 4 Simulation Results and Discussion -- 5 Conclusion and Future Work -- References -- Energy-Efficient Data Routing Protocols for Sink Mobility in Wireless Sensor Networks -- 1 Introduction -- 1.1 Motivation -- 2 Related Work. 3 Research Gaps. |
Record Nr. | UNISA-996550551503316 |
Tomar Ranjeet Singh
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Communication, Networks and Computing : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad |
Autore | Tomar Ranjeet Singh |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (330 pages) |
Disciplina |
621.39
004.6 |
Altri autori (Persone) |
VermaShekhar
ChaurasiaBrijesh Kumar SinghVrijendra AbawajyJemal H AkasheShyam HsiungPao-Ann PrasadRamjee |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Artificial intelligence Data structures (Computer science) Information theory Image processing - Digital techniques Computer vision Computer Engineering and Networks Artificial Intelligence Data Structures and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-031-43145-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- High Dimensional Data Representation and Processing -- Brain Tumor Classification Using Feature Extraction and Non-linear SVM Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 VGG-SVM Model -- 3.1 Model Architecture -- 3.2 Implementation Details and Preprocessing -- 3.3 Dataset Description -- 4 Experimental Results and Discussion -- 4.1 Results -- 4.2 Discussion -- 5 Conclusion -- References -- Lightweight Django-Based Customer Relationship Management System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Feasibility and Requirement Analysis -- 3.2 Design of the System -- 3.3 Development Tools Used are Majorly Django, HTML, CSS, Bootstrap, and SQLite -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References -- Single Server Banking Management System -- 1 Introduction -- 1.1 Background and Overview -- 1.2 Problem Statement -- 1.3 Objective -- 1.4 Scope -- 1.5 Organization of the Paper -- 2 Paper Preparation -- 3 Characteristics and Features -- 3.1 SIP Calculator -- 3.2 EMI Calculator -- 3.3 OTP Verification -- 3.4 Email Facility -- 4 Methodology -- 4.1 Results -- 5 Conclusion -- 5.1 Future Scope -- References -- Prioritization of MQTT Messages: A Novel Approach -- 1 Introduction -- 1.1 Message Queuing Telemetry Transport (MQTT) Protocol -- 1.2 Problem Statement -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Identifying min-max Range -- 3.2 Forwarding High Priority Messages -- 3.3 Identifying Trivial Range -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of Crop Yield Prediction Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Methodology -- 5 Result Analysis -- 6 Conclusion -- 7 Future work -- References.
Big Data Analytics for Classification in Sentiment Analysis -- 1 Introduction -- 1.1 The 5 V'S of Big Data -- 1.2 Big Data Generation -- 1.3 Sentiment Analysis -- 2 Literature Review -- References -- Ensemble Classifiers for Classification of Imbalanced Dataset of Malicious and Benign Websites -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Data Summarization -- 3.3 Data Analysis and Preprocessing -- 3.4 Data Sampling and Balancing -- 3.5 Machine Learning Classifiers -- 4 Performance Evaluation -- 5 Conclusion -- References -- Forecasting of Congestive Cardiac Failure Using Deep Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Architecture -- 3.2 Algorithms -- 4 Result -- 5 Conclusion -- References -- Internet of Things-Based Smart Irrigation System for Moisture in the Soil and Weather Forecast -- 1 Introduction -- 2 Related Work -- 3 Benefits of Smart Irrigation System -- 4 Impect of Sustainability on Smart Irrigation System -- 5 The Smart Irrigation Systems' Basic Architecture and Layout -- 6 Difficulties and Potential Outcome -- 7 Conclusion -- References -- Visual Cryptography: An Emerging Technology -- 1 Introduction -- 1.1 Visual Cryptography for Binary Image -- 1.2 Visual Cryptography for Gray Image -- 1.3 Visual Cryptography for Colored Images -- 2 Literature Survey -- 3 Applications of Visual Cryptography -- 3.1 Watermarking -- 3.2 Anti- Phishing Systems -- 3.3 Human Machine Identification -- 3.4 Secure Banking Communication -- 3.5 Defense System -- 3.6 Captcha -- 4 Results -- 5 Conclusions -- References -- Computing Techniques for Efficient Networks Design -- Machine Learning Based Techniques for the Network Design of Advanced 5G Network, Beyond 5G (B5G) and Towards 6G: Challenges and Trends -- 1 Introduction -- 2 Motivation -- 2.1 Key Contributions. 3 Challenges Associated with NGWN -- 3.1 Deployment 5G (Denser) Cells -- 3.2 MIMO Along with Beam Forming -- 3.3 Challenges Associated with the System or Network Latency -- 3.4 Improvement of the Spectral Efficiency -- 4 The Requirements of Network Intelligence: ML in Advanced 5G -- 5 Application Areas of ML in 5G/B5G: Industry Perspective -- 6 State-of-the-Art ML Approached in Advanced 5G, B5G and Towards 6G -- 6.1 The Architecture of Radio Learning -- 7 Challenges Associated with Applying ML in NGWN -- 7.1 Challenges of Implementing the Process of Desired Learning -- 7.2 Challenges of Implementing the Network Edge Intelligence -- 7.3 The Trends for Addressing Challenges in Advanced 5G -- 8 ML Incorporation: Open Issues Offer Research Directions -- 8.1 Trends Towards ML-Powered 6G Network: Edge Intelligence -- 9 Conclusion -- References -- Recognition of Speech Emotion Using Machine Learning Techniques -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Collection -- 2.2 Data Preparation -- 2.3 Data Visualization -- 2.4 Feature Extraction and Model Building -- 3 Results and Discussions -- 4 Conclusion -- References -- Convolution Neural Network Based Model for Classification and Identification of Fake Profile on Social Network -- 1 Introduction -- 2 Social Media -- 3 Social Media Mining -- 4 Social Media Spam -- 5 Related Work -- 6 Proposed framework for Identifying Malicious Profile over Social Media -- 7 Result Analysis -- 8 Conclusion -- References -- Social Distance Monitoring and Infection Risk Assessment in COVID-19 Pandemic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Human Detection -- 3.2 Location Tracking -- 3.3 Inter Distance Estimation -- 3.4 Inter Distance Estimation -- 3.5 Inter Distance Estimation -- 4 Results -- 5 Conclusion -- References -- Vibrations Signal Analysis of Cantilever Beam Using Machine Learning. 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results -- 5 Future Scope of the Work -- References -- Pneumonia Detection Using Deep Learning: A Bibliometric Study -- 1 Introduction -- 2 Materials and Methods -- 2.1 Selection of Articles -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Numerical Simulation Design of Multiple Users Offloading Using Improved Optimization Approach for Edge Computing -- 1 Introduction -- 2 Mobile Edge/Fog Computing -- 3 Related Works -- 4 Modelling of the System -- 5 Simulation and Results -- 6 Conclusion -- References -- Numerical Simulation and Mathematical Modelling of Machine Learning Based Improved Crypto Currency Forecasting System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result Analysis -- 4.1 Dataset -- 4.2 Flow Chart of Simulation -- 4.3 Result Discussion -- 5 Conclusion and Future Scope -- References -- Reinforcement Learning in Blockchain-Enabled IIoT Networks -- 1 Introduction -- 2 Interconnection Between Blockchain, IIoT, and AI -- 3 Blockchain Technology and IIoT -- 4 Reinforcement Learning Techniques -- 4.1 Q-Learning -- 4.2 Multi-armed Bandit Learning -- 4.3 Actor-Critic Learning -- 5 Blockchain-Enabled IIoT Network -- 5.1 Security -- 5.2 Cost Effectiveness -- 5.3 Trustless -- 5.4 Autonomy -- 5.5 Smart Contracts -- 5.6 Blockchain-Enabled IIoT Layers -- 5.7 Physical Layer -- 5.8 Network Layer -- 5.9 Application Layer -- 6 Reinforcement Learning Applications in Blockchain-Enabled IIoT Network -- 6.1 Minimizing Forking Events -- 6.2 Improving Energy Efficiency -- 6.3 Time to Finality Minimization -- 6.4 Enhancing Transaction Throughput -- 6.5 Improving Link Security -- 6.6 Average Blocktime Reduction -- 7 Conclusion -- References -- Practical Challenges in Implementation of Information and Communication Technology -- 1 Introduction. 2 Research Methodology -- 3 Bibliometric Details -- 3.1 Authors -- 3.2 Source Documents and Keywords -- 3.3 Countries, Sponsors, and Affiliations -- 4 Thematic Discussion -- 4.1 Technological and Implementation Challenges -- 4.2 Infrastructure Based Challenges -- 4.3 Teacher Related Challenges -- 4.4 Student Related Challenges -- 4.5 Other Challenges -- 5 Future Research Agenda -- 5.1 Other Challenges -- 5.2 Research Niches -- 6 Conclusion -- References -- Facial Analytics or Virtual Avatars: Competencies and Design Considerations for Student-Teacher Interaction in AI-Powered Online Education for Effective Classroom Engagement -- 1 Introduction -- 2 Background -- 3 Conceptual Foundation -- 4 AI-Powered Online Learning -- 5 Methods and Methodology -- 5.1 Creation of a Storyboard -- 5.2 Participants -- 5.3 Procedure -- 5.4 Data Analysis -- 6 Findings -- 6.1 Communication -- 6.2 Quantity and Quality -- 6.3 Responsibility -- 6.4 Support -- 6.5 Agency -- 6.6 Connection -- 6.7 Surveillance -- 7 Analysis and Conclusion -- References -- Vehicular Technology and Applications -- Real Time Connectivity Analysis of Vehicles in Different City Dense Environment -- 1 Introduction -- 2 Problem Description -- 2.1 VANET Scenario -- 2.2 VANETsim Overview -- 3 Performance Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Analysis of Energy Efficient Wireless Senor Network with 6LoWPAN IoT Gateway -- 1 Introduction -- 2 Wireless Energy Harvesting and Implementation Techniques -- 2.1 Role of Performance Parameters in the Proposed System -- 3 Proposed System Model of Wireless Sensor Network with 6LoWPAN Gateway -- 4 Simulation Results and Discussion -- 5 Conclusion and Future Work -- References -- Energy-Efficient Data Routing Protocols for Sink Mobility in Wireless Sensor Networks -- 1 Introduction -- 1.1 Motivation -- 2 Related Work. 3 Research Gaps. |
Record Nr. | UNINA-9910746997303321 |
Tomar Ranjeet Singh
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Communication, Networks and Computing : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad |
Autore | Tomar Ranjeet Singh |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (350 pages) |
Disciplina |
621.39
004.6 |
Altri autori (Persone) |
VermaShekhar
ChaurasiaBrijesh Kumar SinghVrijendra AbawajyJemal H AkasheShyam HsiungPao-Ann PrasadRamjee |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Artificial intelligence Data structures (Computer science) Information theory Image processing - Digital techniques Computer vision Computer Engineering and Networks Artificial Intelligence Data Structures and Information Theory Computer Imaging, Vision, Pattern Recognition and Graphics |
ISBN | 3-031-43140-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Wired and Wireless Communication Systems -- Networks and Information Security -- Electronics Circuits for Communication Systems. |
Record Nr. | UNINA-9910746951803321 |
Tomar Ranjeet Singh
![]() |
||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Computing and Network Sustainability : Proceedings of IRSCNS 2016 / / edited by H.R . Vishwakarma, Shyam Akashe |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (427 pages) : illustrations |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Electrical engineering
Computer communication systems Computer security Communications Engineering, Networks Computer Communication Networks Systems and Data Security |
ISBN | 981-10-3935-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- About the editors -- Conference Orgainising Committee -- Table of Contents -- Chapters -- Author Index. |
Record Nr. | UNINA-9910254313903321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT Infrastructure and Computing . Volume 3 : Proceedings of ICT4SD 2023 / / Milan Tuba, Shyam Akashe, and Amit Joshi, editors |
Edizione | [First edition.] |
Pubbl/distr/stampa | Singapore : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (620 pages) |
Disciplina | 338.927 |
Collana | Lecture Notes in Networks and Systems Series |
Soggetto topico | Sustainable development |
ISBN | 981-9949-32-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Traffic Classification of Software Defined Networks using Machine Learning -- Rice Leaf Disease Detection Using Different Models And Comparative Analysis -- 5G Mobile System Drawbacks and Limitations -- Survey on implementation of Machine Learning in Cloud Security -- Deep learning approach to predict crop yield using IOT sensor data -- Classification of Pomegranate Fruit Disease using CNN -- NICE: Navagraha Iconography Classification Engine -- Autograder: A Feature Based Quantitative Essay Grad-ing System Using BERT -- Bluetooth Automated Wheel Chair -- SCADA in Healthcare -- Data Security in a Cloud Environment using Cryptographic Mechanisms -- Secure data education: leveraging big data for enhanced academic performance and student success in educational institutions -- Drought Monitoring and Assessment Through Remote Sensing Data in Bundelkhand Area of Madhya Pradesh -- Smart glasses designed using ESP32- cam coupled with Google lens -- Hardware Architecture of Reinforcement Learning for Edge Devices -- Strengthening the Privacy of Blockchain with Zero Knowledge Proof Case Study: Online Exam Student Verification. |
Record Nr. | UNINA-9910746995203321 |
Singapore : , : Springer, , [2023] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT Infrastructure and Computing : Proceedings of ICT4SD 2022 / / edited by Milan Tuba, Shyam Akashe, Amit Joshi |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (749 pages) |
Disciplina | 620.00286 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Telecommunication Technology—Sociological aspects Information technology Internet of things Computer networks Computational Intelligence Communications Engineering, Networks Information and Communication Technologies (ICT) Internet of Things Computer Networks |
ISBN | 981-19-5331-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Survey Paper on Multi-View Object Detection: Challenges and Techniques -- 2. Exploring the Scheduling techniques for the RTOS -- 3. Grid Power Smoothing Management for Direct Drive PMSG Variable Speed Wind Energy Conversion System with Multilevel Converter -- 4. Fall Detection using Transformer Model -- 5. Survey on various IOT based irrigation techniques in India -- 6. Empirical analysis of crop-yield analysis and disease detection systems: A statistical perspective -- 7.Analysis of Public Perception of Autonomous Vehicles Based on Unlabelled Data from Twitter -- 8. DFCNNet: A Convolutional Neural Network to Detect Deepfakes -- 9. White Blood Cells Classification Using Deep Learning Technique -- 10. Comparative Analysis of Convolutional Neural Network in Object Detection -- 11. A Review of the Applications and Future Scope of Artificial Intelligence in Smart Transport -- 12.Besuited EEG Signal Analysis for Stress Monitoring Using BIONIC Sensor -- 13. Publish –Subscribe With Iot For A Smart Soil Moisture Irrigation System -- 14. An Optimized Taxonomy And Identification Of Retinal Eye Diseases For Diabetes Patients Using CNN -- 15. Axiomatically Designed Research Support Systems -- 16. Detection Of Hepatitis-B Virus Using NFC-Enabled Smartphone Based Portable Amperometric Immunosensor -- 17. Encrypto – Decrypto -- 18. Enhancing the employability of engineering graduates: An assertion on fundamental educational aspect of engineering education with proposing a hypothesis of ‘Wishing Theory’ based on prospective machine learning model -- 19. UpMove DownMove Strategy using NeuralNetwork Techniques For The Prediction Of Stock Prices -- 20. Breast Cancer Detection Using Bag Of visual Words -- etc. |
Record Nr. | UNINA-9910624322203321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT Systems and Sustainability : Proceedings of ICT4SD 2023, Volume 1 |
Autore | Tuba Milan |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
Descrizione fisica | 1 online resource (628 pages) |
Altri autori (Persone) |
AkasheShyam
JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9956-52-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Web Application for Monitoring Foundry Processes Using IoT -- 1 Introductıon -- 1.1 Web Application -- 1.2 JavaScript -- 1.3 CSS -- 1.4 JSX -- 2 Methods and Materıal -- 2.1 Objectives -- 2.2 Existing System -- 2.3 Requirement Specifications -- 2.4 Functional Requirements -- 2.5 Non-functional Requirements -- 2.6 Hardware and Software Specifications -- 3 Design Details -- 3.1 Data Flow Diagram -- 3.2 Use Case Diagram -- 3.3 Activity Diagram -- 4 Results -- 4.1 System Design -- 5 Drawbacks in the Current System -- 6 Conclusion and Future Scope -- References -- BlueKei as an Example of Technology-Based Efficient and Cost-Effective Production Processes -- 1 Introduction -- 2 Literature Review -- 3 Research Objective -- 3.1 Research Methodology -- 3.2 Findings -- 4 Conclusion and Recommendations -- References -- Plant Disease Detection with Learning-Based Models -- 1 Introduction -- 1.1 Literature Survey -- 2 Proposed Methodology -- 2.1 VGG19 Model -- 2.2 14DCNN Model -- 3 Results and Discussion -- 3.1 Dataset Curation -- 3.2 Data Augmentation -- 3.3 Model Accuracy -- 3.4 Training/Testing of Dataset -- 4 Conclusions -- References -- A Bibliometric Analysis of Artificial Intelligence and Human Resource Management -- 1 Introduction -- 2 Methodology -- 2.1 Search Criteria -- 3 Result and Analysis -- 3.1 Analysis of Citations (Highly Cited Papers and Authors) -- 3.2 Co-Authorship Network Map -- 3.3 Intercountry Co-authorship Map -- 4 Keyword Co-occurrence Map -- 5 Implications -- 6 Limitations of the Study -- References -- A Review on Verifiable Image Licensing Approaches -- 1 Introduction -- 1.1 Organization of the Paper -- 2 Literature -- 2.1 Cryptography-Based Image Authentication -- 2.2 Admissible Image Processing -- 2.3 Implementation and Testing.
2.4 Scalability of Multi-person Authorization -- 3 Analysis -- 4 Conclusion -- References -- A Review on Multimodal Face Anti-Spoofing in Multi-layer Environment -- 1 Introduction -- 1.1 Organization of the Paper -- 2 Literature -- 2.1 Face Anti-Spoofing -- 2.2 Multi-modal Face Anti-Spoofing -- 2.3 Patch-Based Face Anti-spoofing -- 2.4 Conv-MLP -- 2.5 Patch Generation and Multimodal Fusion -- 2.6 Moat Loss -- 3 Analysis -- 4 Conclusion -- References -- A Review on Quantum Blockchain Based Consensus Mechanism Approaches -- 1 Introduction -- 1.1 Organization of Paper -- 2 Literature -- 2.1 Brief Info about Blockchain -- 2.2 Brief Info about Quantum Blockchain -- 3 Analysis -- 4 Conclusion -- References -- A Review on Poligraph: System for False News Detection -- 1 Introduction -- 1.1 Organization of the Paper -- 2 Literature -- 2.1 Detection of False News -- 2.2 Byzantine Fault Tolerance -- 2.3 Blockchains -- 3 Analysis -- 4 Conclusion -- References -- A Secure and Practical Scientific Computation Outsourcing Application in Cloud Computing -- 1 Introduction -- 2 Theoretical Background -- 2.1 Power-Iterative Method -- 2.2 Homomorphic Encryption -- 2.3 Case Study: Usefulness Example for Parallel Computation in Cloud -- 3 System Prototype Model -- 4 Proposed Method -- 4.1 Problem Transformation -- 4.2 Problem Solving -- 4.3 Result Verification -- 5 Theoretical Examination and Experimental Results -- 5.1 Theoretical Analysis -- 5.2 Experimental Evaluation and Obtained Results -- 6 Conclusion -- References -- Navigating the Complexities of Cryptography: Trends, Problems, and Solutions -- 1 Introduction -- 2 Trends -- 3 Problems -- 4 Solutions -- 5 Cryptography Tool: Kerberos -- 6 Conclusion -- References -- Food-Block: IoT-Blockchain-Based Framework for Agriculture Food Supply Chain -- 1 Introduction -- 1.1 Food Supply Chain -- 1.2 Food Safety. 1.3 Food Security -- 1.4 Food Integrity -- 2 Blockchain for Food Supply Chain -- 3 Food-Block Framework -- 3.1 IoT-Blockchain Integration -- 3.2 Decentralized Application Flow -- 3.3 Blockchain Platforms and Electric Load Consumption -- 4 Conclusion -- References -- Speech Emotion Recognition Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 The Proposed Method -- 3.1 MFCC -- 3.2 CNN -- 4 Result -- 5 Conclusion -- References -- WhatsApp Chat Analyser -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Analysis -- 3.2 Tools Used -- 3.3 Implementation -- 4 Result and Discussion -- 4.1 Analysis Performed -- 5 Conclusion -- References -- Real-Time Suppression of Non-stationary Noise for Web-Based Calling Applications -- 1 Introduction -- 2 Literature Survey -- 2.1 Traditional Methods -- 2.2 Deep Learning Methods -- 3 Proposed Methodology -- 3.1 Audio-Video Chat Application -- 3.2 Noise Suppression Module -- 4 Outcomes and Results -- 4.1 Dataset -- 4.2 Metrics and Evaluation -- 5 Conclusions and Future Work -- References -- Event Management Using Blockchain -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results -- 5 Future Scope -- 6 Conclusion -- References -- Impact of Artificial Intelligence on Human Resource Management Practices in Private Organizations of India -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Population and Sample Selection -- 3.2 Survey Instrument-Questionnaire -- 3.3 Objectives -- 3.4 Hypotheses (S) -- 3.5 Regression Models -- 4 Results -- 4.1 AI-Based Application and Organizational Performance -- 4.2 AI-Based Application and Decision Making -- 4.3 AI and Ease of Human Resource Management Operations -- 5 Conclusions -- References -- Artificial Intelligence in Finance and Accounting: Opportunities and Challenges -- 1 Introduction -- 2 Review of Literature. 2.1 Global Perspective -- 2.2 Indian Perspective -- 3 Opportunities of Artificial Intelligence in Finance and Accounting -- 3.1 Improved Efficiency -- 3.2 Enhanced Accuracy -- 3.3 Better Customer Service -- 3.4 Cost Savings -- 3.5 Increased Compliance -- 3.6 Improved Risk Management -- 3.7 New Revenue Streams -- 3.8 Advanced Data Analytics -- 3.9 Predictive Maintenance -- 3.10 Fraud Detection -- 3.11 Investment Recommendations -- 3.12 Intelligent Automation -- 3.13 Personalization -- 3.14 Real-Time Decision-Making -- 3.15 Improved Credit Risk Assessment -- 3.16 Portfolio Management -- 3.17 Regulatory Compliance -- 3.18 Cybersecurity -- 4 Challenges of Artificial Intelligence in Finance and Accounting -- 4.1 Data Quality -- 4.2 Bias -- 4.3 Lack of Transparency -- 4.4 Privacy Concerns -- 4.5 Regulatory Compliance -- 4.6 Ethical Considerations -- 4.7 Lack of Expertise -- 4.8 Integration with Legacy Systems -- 4.9 Reliance on Third-Party Vendors -- 4.10 Cost -- 4.11 Scalability -- 4.12 Workforce Impact -- 5 Conclusion -- References -- Available Bandwidth Estimation in MANET Using FPECM-MFL-GRRSU for Adaptive Video Streaming -- 1 Introduction -- 1.1 Problem Definition -- 2 Proposed Available BWE Framework -- 2.1 Node Initialization -- 2.2 LEACH Protocol -- 2.3 Optimal Route Selection -- 2.4 Test Packet Transmission -- 2.5 Feature Extraction -- 2.6 Dimensionality Reduction -- 2.7 Classifier -- 2.8 Testing Phase -- 3 Results and Discussion -- 3.1 Performance Measure of the Proposed FPECM -- 3.2 Performance Analysis of USA-WHO -- 3.3 Performance Analysis of Classifier -- 3.4 Comparison Analysis of Classifier with and without LIDA -- 3.5 Comparative Measurement with Literature Papers -- 4 Conclusion -- References -- Online Meeting Summarization Based on Text and Image Processing -- 1 Introduction -- 1.1 Taxonomy for Text Summarization. 1.2 Taxonomy for Sentiment Analysis -- 2 Proposed System -- 2.1 Algorithm and Working -- 2.2 Implementation -- 2.3 Layout -- 3 Conclusion and Future Scope -- 3.1 Conclusion -- 3.2 Future Work -- References -- A Byte Transformation Technique for Lossy Image Compression -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Method -- 3.1 Compression Algorithm -- 3.2 Decompression Algorithm -- 4 Discussion of Results -- 5 Conclusion and Future Scope -- References -- Antenna at Terahertz Band: Challenges, Fabrication and Specification -- 1 Introduction -- 2 Terahertz Antenna -- 3 THz Band Antenna Challenges -- 4 Literature Revıew of Latest Terahertz Antenna -- 5 Fabrıcatıon and Measurement Method for Tera Hertz Antenna -- 5.1 Measurement Method -- 6 Conclusion -- References -- Support Vector Machine Classifier for Wheat Grain Identification Based on Grid Search Optimization Technique -- 1 Introduction -- 2 Materials and Methodology -- 2.1 About Dataset -- 2.2 Methodology -- 3 Result and Discussion -- 4 Conclusion -- References -- RTOS Schedulers for Periodic and Aperiodic Taskset -- 1 Introduction -- 2 System Model -- 3 Implementation and Analysis of Schedulers -- 4 Rate Monotonic Scheduler (RM) -- 5 Earliest Deadline First (EDF) Scheduler -- 6 Scheduling Analysis of Sporadic Task with EDF and RM Algorithms -- 7 URM Schedulability Test-Based Scheduler -- 8 Conclusions -- References -- Neural Transfer of Style Learning and Its Application -- 1 Introduction -- 2 Convolutional Neural Network -- 3 Transfer of Style for Images -- 3.1 Content Loss -- 3.2 Style Loss -- 3.3 Adam Optimizer -- 4 Transfer of Style for Images -- 5 Transfer of Style for Video Files -- 6 Conclusion -- References -- Identity-Based Encryption (IBE)-Based Improved Data Possession Techniques -- 1 Introduction -- 2 Motivation -- 3 Modeling IBE-RDP -- 3.1 Proposed Solution (IBE-RDP-I). 3.2 Proposed Solution (IBE-RDP-II). |
Record Nr. | UNINA-9910760295403321 |
Tuba Milan
![]() |
||
Singapore : , : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT systems and sustainability : proceedings of ICT4SD 2022 / / Milan Tuba, Shyam Akashe, and Amit Joshi |
Autore | Tuba Milan |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (814 pages) |
Disciplina | 338.927 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Sustainable development - Data processing
Sustainable engineering |
ISBN | 981-19-5221-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910629298203321 |
Tuba Milan
![]() |
||
Singapore : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT systems and sustainability Proceedings of ICT4SD 2021 . Volume 1 / / Milan Tuba, Shyam Akashe and Amit Joshi, editors |
Edizione | [1st edition.] |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (914 pages) : (XXXI, 932 p. 401 illus., 317 illus. in color) |
Disciplina | 338.927 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico | Sustainable development |
ISBN |
981-16-5987-7
981-16-5986-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910743374103321 |
Singapore : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|