top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 2
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 2
Autore Choudrie Jyoti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (382 pages)
Altri autori (Persone) TubaEva
PerumalThinagaran
JoshiAmit
Collana Smart Innovation, Systems and Technologies Series
ISBN 981-9758-10-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910890169803321
Choudrie Jyoti  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 1
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 1
Autore Choudrie Jyoti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (407 pages)
Altri autori (Persone) TubaEva
PerumalThinagaran
JoshiAmit
Collana Smart Innovation, Systems and Technologies Series
ISBN 981-9757-99-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910890171303321
Choudrie Jyoti  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 4
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 4
Autore Choudrie Jyoti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (611 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9766-78-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910903799503321
Choudrie Jyoti  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 3
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 3
Autore Choudrie Jyoti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (623 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9766-75-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Risk Analysis for Fall Detection: Exploiting Using GAIT, Part Affinity Field and Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Gait Analysis Using Image Processing -- 2.2 OpenPose: Realtime Multi-person 2D Pose Estimation Using Part Affinity Fields -- 2.3 Fall Detection Based on Key Points of Human-Skelet Using Open Pose -- 3 Methodology -- 3.1 Open Pose -- 3.2 Confidence Maps -- 3.3 Part Affinity Field -- 3.4 Fall Detection -- 4 Conclusion -- References -- Optimizing Content-Based Image Retrieval System Using Convolutional Neural Network Models -- 1 Introduction -- 2 Related Word -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Deep Features Extraction Using ResNet Pre-trained CNN -- 4 Results and Discussion -- 5 Conclusion -- References -- Advancements in Convolutional Neural Networks for Accurate and Efficient Skin Cancer Classification: A Comprehensive Survey -- 1 Introduction -- 2 Related Word -- 3 Why Does Skin Cancer Develop? -- 3.1 Other Types of Skin Cancers -- 4 Input Data -- 5 Proposed Methodology -- 5.1 ML Approaches Used in Skin Cancer Detection -- 5.2 CNN with Deep Learning Methods in Skin Cancer -- 5.3 Transfer Learning (TL) with CNN Architectures -- 5.4 Managerial Implications of the Methodologies -- 6 Conclusions -- References -- DestinAI: Your Personalized Travel Itinerary Planner and Chat Catalyst Using Generative AI -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- Technical and Economic Sustainability of Alternative Livelihood Strategies at the Grassroots: A Case Study in Byse, Karnataka, India -- 1 Introduction -- 1.1 Study Area -- 2 Methodology -- 2.1 Phase 1: Participatory Community and Challenge Understanding -- 2.2 Phase 2: Looking for Solutions.
3 Results -- 3.1 Technical Sustainability Assessment: A User-Centred Approach -- 3.2 Business Sustainability Assessment -- 4 Discussion -- 5 Conclusion -- References -- Comprehensive Certificate Validation and Verification System for Educational Institutes Using Blockchain -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Architecture -- 3.2 Workflow -- 4 Result and Discussion -- 5 Conclusion and Future Scope -- References -- An IOT and Machine Learning-Based System for Detecting Driver Drowsiness -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Design -- 3.2 Dataset -- 3.3 Preprocessing -- 3.4 Feature Extraction -- 3.5 Model Selection -- 3.6 IOT Technology -- 3.7 Jetson Nano -- 4 Result and Feature Work -- 4.1 Result -- 4.2 Feature Work -- 5 Conclusion -- References -- A Survey on Data Preprocessing Techniques in Stream Mining -- 1 Introduction -- 2 Challenges During Preprocessing Stream of Data -- 3 Data Reduction Techniques -- 3.1 Dimensionality Reduction -- 3.2 Instance Reduction Techniques -- 4 Data Cleaning -- 4.1 Imputing Missing Values -- 4.2 Noisy Data Removal -- 5 Data Integration -- 5.1 Extract -- 5.2 Transform -- 5.3 Load -- 6 Data Transformation -- 7 Conclusion -- References -- Data Privacy Attacks on Federated Learning -- 1 Introduction -- 2 Security Vulnerabilities in FL -- 2.1 Model Inversion Attacks -- 2.2 Poisoning Attacks -- 2.3 Data Reconstruction Attacks -- 2.4 Sybil Attacks -- 2.5 Generative Adversarial Network-Based Attacks -- 2.6 Model Stealing Attacks -- 3 Possible Solutions -- 3.1 Differential Privacy -- 3.2 Homomorphic Encryption -- 3.3 Secure Aggregation -- 3.4 Secure Multiparty Computation (SMC) -- 3.5 Attack Detection -- 3.6 Participant Authentication -- 3.7 Regular Auditing -- 4 Analysis of Existing Approach -- 5 Conclusion -- References.
Augmented Generalized Quadrature Spatial Modulation (AGQSM): Performance Evaluation in Spatially Correlated Channels for Next-Generation Wireless Communications -- 1 Introduction -- 2 System Model -- 3 Detection Methods -- 4 Findings and Analysis -- 5 Conclusion -- References -- Enhancing Security in a University Network Using Snort and Wireshark -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Proposed Work -- 5 Implementation and Result Analysis -- 6 Conclusion and Future Work -- References -- Social Responsibility of Business Entities in Achieving Sustainability: A CSR Review -- 1 Introduction -- 2 Defining Sustainability -- 3 Noteworthiness of Sustainable Development as a CSR Activity -- 4 Modus Operandi -- 5 Cases Used for the Study -- 5.1 Cummins India Ltd. -- 5.2 DB Corporation Ltd. -- 5.3 Karnataka Bank Ltd. -- 5.4 Century Plyboard India Ltd. -- 5.5 Tata Sponge Iron -- 5.6 Power Finance Corp Ltd. -- 5.7 Bharat Heavy Electrical Ltd. -- 5.8 Amrutanjan Healthcare -- 5.9 Atul Ltd. -- 6 Futuristics Research and Conclusion -- References -- Factors Affecting Digital Shifting of Food Industries Through Food Apps for Business Sustainability: an Empirical Study -- 1 Introduction -- 2 Conceptual Background and Hypothesis Development -- 2.1 TAM Facets -- 2.2 Relation Between ATT and INTFA -- 2.3 TPB Facets -- 2.4 Affordance as Moderator -- 3 Methodology and Results -- 3.1 Data Collection -- 3.2 Common Method Bias -- 3.3 Measurement Model: Reliability and Validity Testing -- 3.4 Structural Model: Hypothesis Testing -- 3.5 Moderation Analysis -- 4 Discussion -- 5 Conclusion -- 6 Theoretical and Managerial Implications -- 7 Study Limitations and Future Scope -- References -- Blockchain Organ Transplant Network with Fitness Check -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Architecture -- 3.2 Smart Contract -- 4 Result -- 5 Conclusion.
References -- An Implementation of Monte Carlo Tree Search Algorithm: Comparison with Random Samples -- 1 Introduction -- 2 Monte Carlo Tree Search -- 3 An Overview of Advanced Tic-Tac-Toe -- 4 Implementation -- 5 Results -- 6 Conclusion -- References -- Ur's Corporator-Innovating Citizen Corporator Interaction Through ML-Enabled Comprehensive Framework -- 1 Introduction -- 2 Problem Statement -- 3 Methodology -- 4 Applications -- 5 Literature Review -- 6 System Architecture -- 6.1 Explanation of System Architecture -- 7 Result and Discussion -- 8 Conclusion -- 9 Future Scope -- References -- Research Trends in Technology for Achieving Sustainable Development Goals -- 1 Introduction -- 2 Related Work -- 3 Methods -- 4 Results -- 4.1 Publication and Citation Trends -- 4.2 Impact of Open Access -- 4.3 Fields of Research -- 4.4 Prolific Institutions -- 4.5 Top Funders -- 5 Conclusion -- References -- A Comparative Evaluation of Different Distance Measures for Determining Initial Seeds in the K-means Algorithm -- 1 Introduction -- 2 The QuIK Algorithm -- 3 Some Popular Distance Measures for Numerical Data -- 4 The Novel Distance Function in the QuIK Seeding -- 5 Literature Review -- 6 Methodology -- 7 Experiments and Results -- 8 Conclusion -- References -- Etherdocs: Student Document Management Using Ethereum Blockchain and IPFS -- 1 Introduction -- 2 Problem Statement -- 3 Literature Review -- 3.1 Assumptions -- 3.2 Limitations of Existing Systems -- 4 Methodology -- 4.1 Issuer -- 4.2 Verifier -- 5 Implementation -- 6 Results -- 7 Conclusion -- References -- Beyond Ledgers: Exploring the Impact of Blockchain on Global Supply Chain Networks -- 1 Introduction -- 1.1 Background -- 1.2 Scope and Objectives -- 2 Fundamentals of Blockchain in Supply Chain -- 2.1 Blockchain Architecture -- 2.2 Blockchain in Supply Chain Management.
3 Current Trends and Challenges -- 3.1 Challenges in Traditional Supply Chains -- 3.2 Previous Studies -- 3.3 The Promise of Blockchain Technology -- 3.4 Applications of Blockchain in Supply Chain -- 4 Challenges in Adopting Blockchain in SCM and Preferable Solution -- 5 Future Directions and Research Gaps -- 6 Conclusion -- References -- Farmer-Based Smart Vegetable Vending Machine for the Modern Era -- 1 Introduction -- 2 Background and Related Work -- 3 Research Gap -- 4 Proposed Solution -- References -- Automated Question Generation System Using NLP -- 1 Introduction -- 2 Literature Review -- 2.1 TF-IDF and N-Grammode -- 2.2 RNN Encoder-Decoder -- 2.3 BART -- 2.4 BERT -- 2.5 T-5 -- 3 Implementation -- 3.1 Data Preparation -- 3.2 WorkFlow -- 3.3 Training -- 4 Results -- 5 Conclusion -- References -- Transforming Workspaces: The Convergence of Li-Fi, FTTO, and PoE -- 1 Introduction -- 2 Literature Review -- 2.1 Building Energy Management System: A Review -- 2.2 Seamless Interfacing with Thunderbolt™ 4.0 -- 3 Methodology -- 3.1 Assessment -- 3.2 Technology Selection -- 3.3 System Design -- 3.4 Implementation -- 3.5 Evaluation and Optimization -- 4 Hardware Components -- 4.1 BMS Device with ARM Processor -- 4.2 CCTV -- 4.3 Ethernet Cable (802.3bt) -- 4.4 PoE Switches -- 4.5 Wi-Fi Router -- 4.6 USB Type-C Port -- 4.7 Li-Fi Technology -- 4.8 Split AC -- 4.9 Polycarbonate Sheets -- 4.10 Batteries -- 5 Hardware and Software Architecture -- 5.1 Block Diagram -- 5.2 AutoCAD and REVIT Design -- 6 Conclusion -- References -- Precise AI-Driven Cattle Identification and Classification System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Preparation -- 3.2 Image Validation -- 3.3 Muzzle Point Detection and Extraction -- 3.4 Pattern Extraction and Matching -- 4 Results and Discussions -- 5 Conclusions -- References.
Instagram Reels Bites: Factors Influencing Food Customer Engagement and Intention to Purchase Food Through Instagram Reels.
Record Nr. UNINA-9910900178903321
Choudrie Jyoti  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
ICT for Intelligent Systems : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (524 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Smart Innovation, Systems and Technologies
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 981-9939-82-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Detection Model for IoT Networks using Graph Convolution Networks(GCN) -- Drowsiness Detection System -- A Deep Learning Technique to Recommend Music based on Facial and Speech Emotions -- Smart Chair Posture Detection and Correction Using IOT -- The Opinions Imparted On Singular’s Face.
Record Nr. UNINA-9910746086103321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT with Intelligent Applications : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
ICT with Intelligent Applications : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (647 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 981-9937-58-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Monitoring Algorithm for Datafication and Information Control for Data Optimization -- 1 Introduction -- 1.1 Datafication -- 1.2 Information Control -- 2 Literature Review -- 3 Datafication and Information Control -- 4 Algorithm for Datafication and Information Control -- 5 Conclusion -- References -- Understanding Customer Perception Regarding Branded Fuel 'XP-95' in IOCL Retail Outlets Using Business Intelligence (BI) by the Help of NVIVO and SPSS Software -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 3.1 Qualitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 3.2 Quantitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 4 Discussion and Findings -- 5 Conclusion -- References -- Investigation of Aadhaar Card Enrolment in Government Schools Using R -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Steps Involved in the Data Analysis -- 3.2 Data Preprocessing -- 4 Results and Discussion -- 4.1 Data Collection -- 4.2 Data Analysis -- 4.3 Correlation and Regression Line -- 4.4 Line Graph -- 4.5 Comparison of Aadhaar Enrolment -- 5 Conclusion -- References -- Automated Spurious Product Review Auditing System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Signed Interface Algorithm Working -- 4 Result and Analysis -- 5 Conclusion -- References -- A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloud/Fog Computing -- 1 Introduction -- 1.1 Cloud Computing -- 1.2 Fog Computing -- 1.3 Internet of Things (IoT) -- 2 Background -- 2.1 Rivest-Shamir-Adleman Algorithm (RSA) -- 2.2 Elliptical Curve Cryptography Algorithm (ECC) -- 2.3 ECC Standardization Process -- 3 Comparison of ECC and RSA Algorithm -- 4 Conclusion -- References.
Data Prevention Protocol for Cloud Computing Security Using Blockchain Technology -- 1 Introduction -- 2 Block-Chain Technology -- 3 Structure of Block-Chain -- 4 Features of Block-Chain System -- 5 Challenges -- 6 Secure Solution for Cloud -- 7 Requirements of Cloud -- 8 Solutions for Cloud Data Security Based on Block-Chain Technology -- 9 Examples of Cloud Data Security Based Block-Chain Technology -- 9.1 Secure Cloud Data Privacy -- 9.2 Cloud Data Unity -- 9.3 Cloud Data Detectability -- 10 Review Outcomes and Research Gap -- 11 Conclusions -- References -- Intelligence Monitoring of Home Security -- 1 Introduction -- 2 Proposed Device -- 3 Components Specifications -- 4 Future Scope -- References -- TB Bacteria and WBC Detection from ZN-Stained Sputum Smear Images Using Object Detection Model -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 TB Bacteria Detection Using RetinaNet Object Detection Model -- 2.3 Implementation Details -- 2.4 Comparison with Other Object Detection Model -- 2.5 Performance Metrics -- 3 Result and Discussion -- 4 Conclusion -- References -- AuraCodes: Barcodes in the Aural Band -- 1 Introduction -- 2 Technical Analysis -- 2.1 Components of the EAN13 Barcode -- 2.2 Components of the QR Code -- 3 Proposition -- 4 Implementation -- 5 Experimental Results -- 6 Future Work -- 7 Conclusion -- References -- A Scrutiny and Investigation on Student Response System to Assess the Rating on Profuse Dataset-An Aerial View -- 1 Introduction -- 2 Literature Survey -- 3 Motivation and Background Study -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization -- 3.4 Stemming -- 3.5 Future Selection -- 3.6 Classification -- 3.7 Evaluation -- 3.8 Visualization -- 4 Dataset -- 5 Observations and Analysis -- 6 Results and Discussions -- 7 Conclusions -- References.
Analysis of Hospital Patient Data Using Computational Models -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Creation -- 3.2 Data Preprocessing -- 3.3 Model Building -- 3.4 Evaluation -- 3.5 Clustering -- 4 Results -- 4.1 Elbow Method -- 4.2 Silhouette Analysis -- 5 Conclusion -- References -- A Research on the Impact of Big Data Analytics on the Telecommunications Sector -- 1 Introduction -- 2 Trends in the Implementation of Big Data Analytics in the Telecom Industry -- 3 Regional Insight -- 4 Challenges of the Telecommunication Industry -- 4.1 Operation-Related Costs -- 4.2 Needs for Consumers -- 4.3 Information Security and Breaches -- 4.4 Collaboration -- 4.5 High-Speed Data-in-Motion -- 4.6 Support for Application and Network Intelligence -- 4.7 Real-Time Actionable Insights -- 5 Telecommunication Industry, Big Data Analytics, and Customer Services -- 6 Conclusion -- References -- Face Mask Isolation Canister Design for Healthcare Sector Towards Preventive Approach -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Gap Analysis -- 5 Proposed Design -- 6 Working -- 7 Applications -- 8 Future Scope -- 9 Conclusion -- References -- Modeling the Impact of Access to Finance on MSMEs' Contribution Towards Exports of the Economy -- 1 Introduction -- 2 Reviews of Related Literatures -- 3 Objectives of the Research -- 4 Methodology of the Study -- 5 Linear Regression Model -- 6 Analysis of Data and Discussion -- 6.1 Export Contribution of Indian MSME Sector -- 6.2 Regression Analysis and Their Interpretation -- 7 Scope for Future Research -- 8 Conclusion and Recommendations -- References -- Privacy Challenges and Solutions in Implementing Searchable Encryption for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 2.1 Proxy Re-encryption with and without Keyword Search -- 3 Conclusion -- References.
Multi-objective Optimization with Practical Constraints Using AALOA -- 1 Introduction -- 2 Problem Formulation -- 2.1 Objective Functions -- 2.2 Constraints -- 3 Proposed Algorithm -- 4 Multi-objective Optimization Strategies -- 4.1 Non-dominated Sorting -- 4.2 Archive Selection -- 4.3 Fuzzy Approach -- 5 Results and Analysis -- 5.1 Example-1: Benchmark Test Functions -- 5.2 Example-2: Electrical Test System -- 6 Conclusion -- References -- An Implementation of Lightweight Cryptographic Algorithm for IOT Healthcare System -- 1 Introduction -- 2 Methodology -- 2.1 Materials -- 2.2 Proposed Architecture -- 3 Experimental Setup and Results -- 3.1 Performance Evaluation -- 4 Discussions -- 5 Conclusions and Future Work -- References -- Home Appliances Automation Using IPv6 Transmission Over BLE -- 1 Introduction -- 2 Work Flow -- 3 Proposed Algorithm -- 4 Initial Setup and Plateform -- 5 Experimental Setup for Connect Raspberry BLE with Mobile nRF Connect App -- 6 Experimental Results -- 7 Conclusion -- References -- IoT Based Collision Avoidance System with the Case Study Using IR Sensor for Vehicles -- 1 Introduction -- 1.1 Types of Collision Avoidance Assist Systems -- 2 Literature Review -- 3 Motivation -- 4 Methodology -- 4.1 Arduino Uno -- 4.2 Ultrasonic Sensors -- 4.3 Motor Driver -- 5 Result and Discussion -- 6 Conclusion and Future Work -- References -- Airline Ticket Price Forecasting Using Time Series Model -- 1 Introduction -- 2 Related Work -- 3 Background of the Work -- 4 Proposed Work -- 4.1 Important Packages -- 4.2 Dataset Collection -- 4.3 Building Model -- 5 Flask Python Web Framework -- 6 Experimental Results -- 6.1 Accuracy -- 7 Conclusion -- References -- AI Powered Authentication for Smart Home Security-A Survey -- 1 Introduction -- 2 Related Work -- 3 Face Recognition Technologies -- 3.1 Appearance-Based Methods.
3.2 Single-Shot Methods -- 3.3 Multi-shot Methods -- 3.4 Rgbd-Based Approaches -- 4 Proposed Methodologies -- 4.1 Grassman Algorithm -- 4.2 Convolutional Neural Network Algorithm -- 4.3 Limitations -- 4.4 Future Works -- 5 Conclusion -- References -- WSRR: Weighted Rank-Relevance Sampling for Dense Text Retrieval -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Experiments and Results -- 5 Conclusions -- References -- Tweet Based Sentiment Analysis for Stock Price Prediction -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 System Architecture -- 3.2 Module Descrption -- 3.3 Data Processing: Data Training -- 3.4 Model Training -- 4 Implementation -- 4.1 CEA Algorithm -- 5 Result and Analysis -- 6 Conclusion and Future Work -- References -- A Study on the Stock Market Trend Predictions -- 1 Introduction -- 2 Background -- 2.1 Research Mainly Based on Technical Analysis -- 2.2 Research Mainly Based on Sentiment Analysis -- 3 Conclusion -- References -- Optimization of Partial Products in Modified Booth Multiplier -- 1 Introduction -- 2 Booth's Algorithm -- 3 Modified Booth's Algorithm -- 4 Optimized Booth's Multiplier (OBM) -- 4.1 Proposed Algorithm to Reduce Partial Products -- 4.2 16 × 16 Multiplication Using OBM -- 5 Results and Discussion -- 5.1 FPGA Device Utilization -- 5.2 Simulation Results -- 6 Conclusion -- References -- Comparative Study on Text-to-Image Synthesis Using GANs -- 1 Introduction -- 2 Literature Review -- 2.1 Cycle-Consistent Inverse GAN for Text-to-Image Synthesis -- 2.2 Dynamic Aspect-Aware GAN for Text-to-Image Synthesis -- 2.3 Cycle Text-to-Image GAN with BERT -- 3 Conclusion -- References -- Online Hate Speech Identification Using Fine-tuned ALBERT -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Experiment -- 4.1 Training Details of ALBERT Base Version 2.
4.2 Fine-Tuned ALBERT.
Record Nr. UNINA-9910746286703321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IOT with Smart Systems : ICTIS 2023, Volume 2 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
IOT with Smart Systems : ICTIS 2023, Volume 2 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (660 pages)
Disciplina 004
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 981-9937-61-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface ICTIS 2023 -- Contents -- Editors and Contributors -- The Current State of Art-Indian Unleavened Flat Bread Cooking -- 1 Introduction -- 2 Survey of Existing Methods of Chapati and Other Foods Cooking with New Techniques -- 3 Material and Methods of Dough Preparation, Chapati Making -- 4 Challenges and Future Scope -- 5 Database and Software/hardware Tools -- 6 Conclusion -- References -- An Efficient Abstractive Summarization of Research Articles Using Pegasus Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 5 Conclusions and Future Enhancements -- References -- Performance Analysis of Classification Techniques in Heart Disease Prediction -- 1 Introduction -- 2 Related Work -- 3 Implementation Details -- 3.1 Dataset Information -- 3.2 Classification Methods -- 4 Experimental Results -- 4.1 Correlation Results -- 4.2 Performance Analysis -- 5 Conclusion -- References -- Early Phase Identification and Detection for Plant Poor Growth in Rural Areas: A Survey of the State of the Art -- 1 Introduction -- 2 Related Work -- 3 Issues and Challenges -- 4 Proposed Work -- 4.1 Parametric Evaluation of Related Work -- 5 Methodology Enriching Datasets -- 5.1 RoCoLe Dataset -- 5.2 BRACOL Dataset -- 5.3 Rice Leaf Blight Dataset Rice Leaf Blight Dataset -- 5.4 Plant Pathology Dataset Plant Pathology Dataset -- 5.5 Citrus Dataset -- 6 Conclusion -- 7 Discussion -- References -- Pothole Detection and Road Condition Updation on Google Maps -- 1 Introduction -- 2 System Design -- 2.1 Pothole Detection -- 2.2 Vehicle Tracking -- 2.3 Updating the Database -- 2.4 Rendering Database on Google Maps -- 3 Implementation -- 3.1 Training Phase -- 3.2 Server-Side -- 3.3 Client-Side -- 3.4 Algorithm -- 3.5 Flowchart -- 4 Result and Analysis -- 5 Conclusion -- References.
Fetal Cardiac Detection Using Deep Learning from Echocardiographic Image-A Survey -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Methods for Cardiographic Image Analysis -- 4 Deep Learning Framework for Disease Prediction -- 5 Experimental Results -- 6 Conclusion -- References -- Analysing the Factor Influencing Post COVID-19 Experience Through User-Generated Content: Luxury Hotel in India -- 1 Introduction -- 2 Literature Review -- 3 System Description -- 3.1 Data Pre-processing -- 3.2 Sentiment Analysis -- 3.3 Theme Identification -- 4 Methodology -- 5 Analysing the Theme -- 6 Result -- 6.1 Positive Sentiments -- 6.2 Negative Sentiments -- 7 Conclusion -- References -- Text Detection and Recognition from the Scene Images Using RCNN and EasyOCR -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Text Detection -- 3.2 Text Recognition -- 4 Experimentation and Results -- 4.1 Datasets -- 4.2 Implementation Details -- 4.3 Result Analysis -- 5 Conclusion -- References -- The Important Role of Industry Data Connectivity Using M2M and IoT Applications for Processing and Analysis -- 1 Introduction -- 2 Devices to Networks and Platforms -- 2.1 Data Collection -- 2.2 Data Communication -- 3 Strengthen the Data Management Platform -- 3.1 Centralized Device Management -- 3.2 High-Performance Data Management -- 3.3 Enhanced Administration and Security -- 3.4 Flexible Application Development -- 4 Data Transfer with MQTT -- 4.1 Topic and Quality of Service (QoS) -- 4.2 Results -- 5 Discussion -- 6 Conclusion -- 7 Future Study -- References -- Classification of Non-proliferative Diabetic Retinopathy in Terms of Dark and Bright Lesions Using Multi-layered Perceptron (MLP) -- 1 Introduction -- 2 Methodology -- 2.1 Separation of Mask from Fundus -- 2.2 Removal of Optic Disc -- 2.3 Extraction of Retinal Blood Vessels -- 2.4 Microaneurysms.
2.5 Hemorrhages -- 2.6 Exudates -- 2.7 Cotton Wool Spots -- 3 Result -- 4 Conclusion -- References -- An Efficient Saliency Detection Using Wavelet Fusion -- 1 Introduction -- 1.1 Related Work -- 2 Proposed Methodology -- 2.1 Haar Wavelet Transform for Edge Enhancement and Noise Removal -- 2.2 Edge (Curve) Detection -- 2.3 Convolutional Neural Networks CNN -- 3 Experimental Results -- 4 Conclusion -- References -- Segmentation of Brain Tumor Images Using Morphological Reconstruction -- 1 Introduction -- 2 Literature Review -- 3 Existing System -- 3.1 Pre-processing -- 3.2 Skull Stripping -- 3.3 Segmentation -- 4 Proposed Model -- 4.1 Input -- 4.2 Gray Scaling of Images Using OpenCV -- 4.3 Thresholding -- 4.4 Watershed Algorithm for Image Segmentation -- 4.5 Compute Morphological Operations -- 5 Implementation and Results -- 6 Conclusion -- 7 Future Scope -- References -- Navigation Planning for Efficient Area Covering for Surface Cleaning -- 1 Introduction -- 2 Proposed Method -- 2.1 Deadlock Detection and Escaping -- 2.2 Task of Environment Modeling -- 3 Empirical Analysis -- 3.1 Performance Parameter -- 3.2 Implementation -- 3.3 Tested in an Unknown Environment -- 4 Results -- 5 Conclusion -- References -- Pathfinding Visualizer: A Survey of the State-of-Art -- 1 Introduction -- 1.1 Pathfinding Algorithms and Visualizer Overview -- 2 Literature Review -- 2.1 Overview of Existing Pathfinding Visualizers -- 2.2 Visualizing Pathfinding Algorithms: Importance of Visual AI& -- DS in Learning -- 3 Pathfinding Visualizer -- 3.1 Understanding the Pathfinding Visualizer -- 3.2 Design of the Pathfinding Visualizer -- 3.3 Implementation Details, Including Programming Languages and Tools Used -- 4 Results -- 4.1 Details on the Implementation and Functionality of Algorithms in the Pathfinding Visualizer -- 5 Discussion.
5.1 Discussion on How the Visualizer Contributes to a Better Understanding of Pathfinding Algorithms -- 6 Conclusion -- 7 Future Work -- Bibliography -- A Study on Cyber Security and its Challenges in India -- 1 Introduction -- 2 Literature Review -- 3 Background -- 4 Proposing Guidelines for Cyber Safe India -- 4.1 Need for a Correct Legal Framework in Order to Remove Ambiguities from Data Protection Laws -- 4.2 Changes in Current 2013 Cyber Security Policy -- 5 Need for Cyber Security Education in School -- 6 Current Scenario of Cyber Security in India -- 7 Conclusion -- References -- Implementation of AES Algorithm -- 1 Introduction -- 2 Block Diagram -- 2.1 Encryption Process -- 2.2 FPGA Implementation -- 3 Methodology -- 3.1 Byte Substitution -- 3.2 Shiftrows -- 3.3 MixColumns -- 3.4 Add Round Keys -- 3.5 Inverse Subbytes -- 4 Implementation of AES on FPGA -- 5 Results -- 5.1 AES Encryption and Decryption Xilinx Simulated Results -- 5.2 AES Encryption Results on FPGA -- 6 Conclusion -- References -- Feature Extractor Techniques for Alzheimer's Predictive Model in Brain Imaging -- 1 Introduction -- 2 Related Work -- 3 Experimental Framework -- 4 Observations and Results -- 5 Conclusions and Future Research -- References -- User Preference Recommendation System and Analytics for News Articles -- 1 Introduction -- 2 Overview -- 2.1 Problem Statement -- 2.2 Objectives -- 3 Literature Survey -- 4 Recommendation Systems -- 4.1 Content-Based Filtering -- 4.2 Collaborative Filtering -- 4.3 Hybrid Approach -- 5 Proposed Design -- 5.1 Introduction -- 5.2 Flow of the System -- 6 System Implementation -- 6.1 Data Generation -- 6.2 Model Formation -- 6.3 Visualisation -- 7 Result -- 8 Conclusion and Future Work -- References -- Design and Development of Focus Controller for the 50/80 cm ARIES Schmidt Telescope -- 1 Introduction -- 2 Focus Mechanism.
3 Embedded Controller -- 3.1 Motion Control -- 3.2 Telemetry -- 3.3 Firmware -- 3.4 Operation -- 4 GUI Software -- 4.1 Software Architecture -- 4.2 Setup Dialog Box -- 4.3 Focus Dialog Box -- 5 System Performance -- 6 Conclusion -- References -- Predicting Fishing Effort: Data Collection for Machine Learning Model Using Scientific and Indigenous Method -- 1 Introduction -- 2 Methods -- 2.1 Azure Machine Learning -- 3 Datasets -- 3.1 Area -- 3.2 Types of Data -- 4 Data Pre-processing -- 5 Model Selection and Parameter Tuning -- 6 Result -- 7 Conclusions -- References -- A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 3 Existing Method -- 4 Proposed Method -- 4.1 Algorithm -- 5 Testing Results -- 6 Conclusion -- References -- Model Design to Analyse Coronary Artery Disease Using Machine Learning Techniques (MDACADMLT) -- 1 Introduction -- 2 Literature Review -- 3 System Model -- 3.1 Logistic Regression -- 3.2 K-Nearest Neighbor -- 3.3 Support Vector Machine -- 3.4 Naïve Bayes -- 3.5 Decision Tree -- 3.6 Random Forest -- 4 Experimental Results -- 5 Conclusion -- References -- Impact of Geo-positioning Information in Limiting Forest Fire Damage -- 1 Overview of the Forest Fire Damage Around the World -- 2 A Rapidly Expanding Area of Research -- 3 Early Detection Forest Fire Systems Design -- 4 Simulation and Results -- 5 Conclusion -- References -- Automatic Music Melody Generation Using LSTM and Markov Chain Model -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Long Short-Term Memory (LSTM) -- 3.2 Markov Chain Model -- 4 Mathematical Model -- 4.1 Long Short-Term Memory (LSTM) -- 4.2 Markov Chain Model -- 5 Results and Discussion -- 5.1 Long Short-Term Memory (LSTM) -- 5.2 Markov Chain Model -- 6 Limitations -- 7 Future Scope -- 8 Conclusion -- References.
Federated Learning Approaches to Diverse Machine Learning Model: A Review.
Record Nr. UNINA-9910743689003321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui