ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 2 |
Autore | Choudrie Jyoti |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (382 pages) |
Altri autori (Persone) |
TubaEva
PerumalThinagaran JoshiAmit |
Collana | Smart Innovation, Systems and Technologies Series |
ISBN | 981-9758-10-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910890169803321 |
Choudrie Jyoti | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 1 |
Autore | Choudrie Jyoti |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (407 pages) |
Altri autori (Persone) |
TubaEva
PerumalThinagaran JoshiAmit |
Collana | Smart Innovation, Systems and Technologies Series |
ISBN | 981-9757-99-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910890171303321 |
Choudrie Jyoti | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 4 |
Autore | Choudrie Jyoti |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (611 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9766-78-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910903799503321 |
Choudrie Jyoti | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 3 |
Autore | Choudrie Jyoti |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (623 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9766-75-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Risk Analysis for Fall Detection: Exploiting Using GAIT, Part Affinity Field and Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Gait Analysis Using Image Processing -- 2.2 OpenPose: Realtime Multi-person 2D Pose Estimation Using Part Affinity Fields -- 2.3 Fall Detection Based on Key Points of Human-Skelet Using Open Pose -- 3 Methodology -- 3.1 Open Pose -- 3.2 Confidence Maps -- 3.3 Part Affinity Field -- 3.4 Fall Detection -- 4 Conclusion -- References -- Optimizing Content-Based Image Retrieval System Using Convolutional Neural Network Models -- 1 Introduction -- 2 Related Word -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Deep Features Extraction Using ResNet Pre-trained CNN -- 4 Results and Discussion -- 5 Conclusion -- References -- Advancements in Convolutional Neural Networks for Accurate and Efficient Skin Cancer Classification: A Comprehensive Survey -- 1 Introduction -- 2 Related Word -- 3 Why Does Skin Cancer Develop? -- 3.1 Other Types of Skin Cancers -- 4 Input Data -- 5 Proposed Methodology -- 5.1 ML Approaches Used in Skin Cancer Detection -- 5.2 CNN with Deep Learning Methods in Skin Cancer -- 5.3 Transfer Learning (TL) with CNN Architectures -- 5.4 Managerial Implications of the Methodologies -- 6 Conclusions -- References -- DestinAI: Your Personalized Travel Itinerary Planner and Chat Catalyst Using Generative AI -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- Technical and Economic Sustainability of Alternative Livelihood Strategies at the Grassroots: A Case Study in Byse, Karnataka, India -- 1 Introduction -- 1.1 Study Area -- 2 Methodology -- 2.1 Phase 1: Participatory Community and Challenge Understanding -- 2.2 Phase 2: Looking for Solutions.
3 Results -- 3.1 Technical Sustainability Assessment: A User-Centred Approach -- 3.2 Business Sustainability Assessment -- 4 Discussion -- 5 Conclusion -- References -- Comprehensive Certificate Validation and Verification System for Educational Institutes Using Blockchain -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Architecture -- 3.2 Workflow -- 4 Result and Discussion -- 5 Conclusion and Future Scope -- References -- An IOT and Machine Learning-Based System for Detecting Driver Drowsiness -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Design -- 3.2 Dataset -- 3.3 Preprocessing -- 3.4 Feature Extraction -- 3.5 Model Selection -- 3.6 IOT Technology -- 3.7 Jetson Nano -- 4 Result and Feature Work -- 4.1 Result -- 4.2 Feature Work -- 5 Conclusion -- References -- A Survey on Data Preprocessing Techniques in Stream Mining -- 1 Introduction -- 2 Challenges During Preprocessing Stream of Data -- 3 Data Reduction Techniques -- 3.1 Dimensionality Reduction -- 3.2 Instance Reduction Techniques -- 4 Data Cleaning -- 4.1 Imputing Missing Values -- 4.2 Noisy Data Removal -- 5 Data Integration -- 5.1 Extract -- 5.2 Transform -- 5.3 Load -- 6 Data Transformation -- 7 Conclusion -- References -- Data Privacy Attacks on Federated Learning -- 1 Introduction -- 2 Security Vulnerabilities in FL -- 2.1 Model Inversion Attacks -- 2.2 Poisoning Attacks -- 2.3 Data Reconstruction Attacks -- 2.4 Sybil Attacks -- 2.5 Generative Adversarial Network-Based Attacks -- 2.6 Model Stealing Attacks -- 3 Possible Solutions -- 3.1 Differential Privacy -- 3.2 Homomorphic Encryption -- 3.3 Secure Aggregation -- 3.4 Secure Multiparty Computation (SMC) -- 3.5 Attack Detection -- 3.6 Participant Authentication -- 3.7 Regular Auditing -- 4 Analysis of Existing Approach -- 5 Conclusion -- References. Augmented Generalized Quadrature Spatial Modulation (AGQSM): Performance Evaluation in Spatially Correlated Channels for Next-Generation Wireless Communications -- 1 Introduction -- 2 System Model -- 3 Detection Methods -- 4 Findings and Analysis -- 5 Conclusion -- References -- Enhancing Security in a University Network Using Snort and Wireshark -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Proposed Work -- 5 Implementation and Result Analysis -- 6 Conclusion and Future Work -- References -- Social Responsibility of Business Entities in Achieving Sustainability: A CSR Review -- 1 Introduction -- 2 Defining Sustainability -- 3 Noteworthiness of Sustainable Development as a CSR Activity -- 4 Modus Operandi -- 5 Cases Used for the Study -- 5.1 Cummins India Ltd. -- 5.2 DB Corporation Ltd. -- 5.3 Karnataka Bank Ltd. -- 5.4 Century Plyboard India Ltd. -- 5.5 Tata Sponge Iron -- 5.6 Power Finance Corp Ltd. -- 5.7 Bharat Heavy Electrical Ltd. -- 5.8 Amrutanjan Healthcare -- 5.9 Atul Ltd. -- 6 Futuristics Research and Conclusion -- References -- Factors Affecting Digital Shifting of Food Industries Through Food Apps for Business Sustainability: an Empirical Study -- 1 Introduction -- 2 Conceptual Background and Hypothesis Development -- 2.1 TAM Facets -- 2.2 Relation Between ATT and INTFA -- 2.3 TPB Facets -- 2.4 Affordance as Moderator -- 3 Methodology and Results -- 3.1 Data Collection -- 3.2 Common Method Bias -- 3.3 Measurement Model: Reliability and Validity Testing -- 3.4 Structural Model: Hypothesis Testing -- 3.5 Moderation Analysis -- 4 Discussion -- 5 Conclusion -- 6 Theoretical and Managerial Implications -- 7 Study Limitations and Future Scope -- References -- Blockchain Organ Transplant Network with Fitness Check -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Architecture -- 3.2 Smart Contract -- 4 Result -- 5 Conclusion. References -- An Implementation of Monte Carlo Tree Search Algorithm: Comparison with Random Samples -- 1 Introduction -- 2 Monte Carlo Tree Search -- 3 An Overview of Advanced Tic-Tac-Toe -- 4 Implementation -- 5 Results -- 6 Conclusion -- References -- Ur's Corporator-Innovating Citizen Corporator Interaction Through ML-Enabled Comprehensive Framework -- 1 Introduction -- 2 Problem Statement -- 3 Methodology -- 4 Applications -- 5 Literature Review -- 6 System Architecture -- 6.1 Explanation of System Architecture -- 7 Result and Discussion -- 8 Conclusion -- 9 Future Scope -- References -- Research Trends in Technology for Achieving Sustainable Development Goals -- 1 Introduction -- 2 Related Work -- 3 Methods -- 4 Results -- 4.1 Publication and Citation Trends -- 4.2 Impact of Open Access -- 4.3 Fields of Research -- 4.4 Prolific Institutions -- 4.5 Top Funders -- 5 Conclusion -- References -- A Comparative Evaluation of Different Distance Measures for Determining Initial Seeds in the K-means Algorithm -- 1 Introduction -- 2 The QuIK Algorithm -- 3 Some Popular Distance Measures for Numerical Data -- 4 The Novel Distance Function in the QuIK Seeding -- 5 Literature Review -- 6 Methodology -- 7 Experiments and Results -- 8 Conclusion -- References -- Etherdocs: Student Document Management Using Ethereum Blockchain and IPFS -- 1 Introduction -- 2 Problem Statement -- 3 Literature Review -- 3.1 Assumptions -- 3.2 Limitations of Existing Systems -- 4 Methodology -- 4.1 Issuer -- 4.2 Verifier -- 5 Implementation -- 6 Results -- 7 Conclusion -- References -- Beyond Ledgers: Exploring the Impact of Blockchain on Global Supply Chain Networks -- 1 Introduction -- 1.1 Background -- 1.2 Scope and Objectives -- 2 Fundamentals of Blockchain in Supply Chain -- 2.1 Blockchain Architecture -- 2.2 Blockchain in Supply Chain Management. 3 Current Trends and Challenges -- 3.1 Challenges in Traditional Supply Chains -- 3.2 Previous Studies -- 3.3 The Promise of Blockchain Technology -- 3.4 Applications of Blockchain in Supply Chain -- 4 Challenges in Adopting Blockchain in SCM and Preferable Solution -- 5 Future Directions and Research Gaps -- 6 Conclusion -- References -- Farmer-Based Smart Vegetable Vending Machine for the Modern Era -- 1 Introduction -- 2 Background and Related Work -- 3 Research Gap -- 4 Proposed Solution -- References -- Automated Question Generation System Using NLP -- 1 Introduction -- 2 Literature Review -- 2.1 TF-IDF and N-Grammode -- 2.2 RNN Encoder-Decoder -- 2.3 BART -- 2.4 BERT -- 2.5 T-5 -- 3 Implementation -- 3.1 Data Preparation -- 3.2 WorkFlow -- 3.3 Training -- 4 Results -- 5 Conclusion -- References -- Transforming Workspaces: The Convergence of Li-Fi, FTTO, and PoE -- 1 Introduction -- 2 Literature Review -- 2.1 Building Energy Management System: A Review -- 2.2 Seamless Interfacing with Thunderbolt™ 4.0 -- 3 Methodology -- 3.1 Assessment -- 3.2 Technology Selection -- 3.3 System Design -- 3.4 Implementation -- 3.5 Evaluation and Optimization -- 4 Hardware Components -- 4.1 BMS Device with ARM Processor -- 4.2 CCTV -- 4.3 Ethernet Cable (802.3bt) -- 4.4 PoE Switches -- 4.5 Wi-Fi Router -- 4.6 USB Type-C Port -- 4.7 Li-Fi Technology -- 4.8 Split AC -- 4.9 Polycarbonate Sheets -- 4.10 Batteries -- 5 Hardware and Software Architecture -- 5.1 Block Diagram -- 5.2 AutoCAD and REVIT Design -- 6 Conclusion -- References -- Precise AI-Driven Cattle Identification and Classification System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Preparation -- 3.2 Image Validation -- 3.3 Muzzle Point Detection and Extraction -- 3.4 Pattern Extraction and Matching -- 4 Results and Discussions -- 5 Conclusions -- References. Instagram Reels Bites: Factors Influencing Food Customer Engagement and Intention to Purchase Food Through Instagram Reels. |
Record Nr. | UNINA-9910900178903321 |
Choudrie Jyoti | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT for Intelligent Systems : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
Autore | Choudrie Jyoti |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (524 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Smart Innovation, Systems and Technologies |
Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
ISBN | 981-9939-82-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intrusion Detection Model for IoT Networks using Graph Convolution Networks(GCN) -- Drowsiness Detection System -- A Deep Learning Technique to Recommend Music based on Facial and Speech Emotions -- Smart Chair Posture Detection and Correction Using IOT -- The Opinions Imparted On Singular’s Face. |
Record Nr. | UNINA-9910746086103321 |
Choudrie Jyoti | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT with Intelligent Applications : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
Autore | Choudrie Jyoti |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (647 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
ISBN | 981-9937-58-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Monitoring Algorithm for Datafication and Information Control for Data Optimization -- 1 Introduction -- 1.1 Datafication -- 1.2 Information Control -- 2 Literature Review -- 3 Datafication and Information Control -- 4 Algorithm for Datafication and Information Control -- 5 Conclusion -- References -- Understanding Customer Perception Regarding Branded Fuel 'XP-95' in IOCL Retail Outlets Using Business Intelligence (BI) by the Help of NVIVO and SPSS Software -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 3.1 Qualitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 3.2 Quantitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 4 Discussion and Findings -- 5 Conclusion -- References -- Investigation of Aadhaar Card Enrolment in Government Schools Using R -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Steps Involved in the Data Analysis -- 3.2 Data Preprocessing -- 4 Results and Discussion -- 4.1 Data Collection -- 4.2 Data Analysis -- 4.3 Correlation and Regression Line -- 4.4 Line Graph -- 4.5 Comparison of Aadhaar Enrolment -- 5 Conclusion -- References -- Automated Spurious Product Review Auditing System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Signed Interface Algorithm Working -- 4 Result and Analysis -- 5 Conclusion -- References -- A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloud/Fog Computing -- 1 Introduction -- 1.1 Cloud Computing -- 1.2 Fog Computing -- 1.3 Internet of Things (IoT) -- 2 Background -- 2.1 Rivest-Shamir-Adleman Algorithm (RSA) -- 2.2 Elliptical Curve Cryptography Algorithm (ECC) -- 2.3 ECC Standardization Process -- 3 Comparison of ECC and RSA Algorithm -- 4 Conclusion -- References.
Data Prevention Protocol for Cloud Computing Security Using Blockchain Technology -- 1 Introduction -- 2 Block-Chain Technology -- 3 Structure of Block-Chain -- 4 Features of Block-Chain System -- 5 Challenges -- 6 Secure Solution for Cloud -- 7 Requirements of Cloud -- 8 Solutions for Cloud Data Security Based on Block-Chain Technology -- 9 Examples of Cloud Data Security Based Block-Chain Technology -- 9.1 Secure Cloud Data Privacy -- 9.2 Cloud Data Unity -- 9.3 Cloud Data Detectability -- 10 Review Outcomes and Research Gap -- 11 Conclusions -- References -- Intelligence Monitoring of Home Security -- 1 Introduction -- 2 Proposed Device -- 3 Components Specifications -- 4 Future Scope -- References -- TB Bacteria and WBC Detection from ZN-Stained Sputum Smear Images Using Object Detection Model -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 TB Bacteria Detection Using RetinaNet Object Detection Model -- 2.3 Implementation Details -- 2.4 Comparison with Other Object Detection Model -- 2.5 Performance Metrics -- 3 Result and Discussion -- 4 Conclusion -- References -- AuraCodes: Barcodes in the Aural Band -- 1 Introduction -- 2 Technical Analysis -- 2.1 Components of the EAN13 Barcode -- 2.2 Components of the QR Code -- 3 Proposition -- 4 Implementation -- 5 Experimental Results -- 6 Future Work -- 7 Conclusion -- References -- A Scrutiny and Investigation on Student Response System to Assess the Rating on Profuse Dataset-An Aerial View -- 1 Introduction -- 2 Literature Survey -- 3 Motivation and Background Study -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization -- 3.4 Stemming -- 3.5 Future Selection -- 3.6 Classification -- 3.7 Evaluation -- 3.8 Visualization -- 4 Dataset -- 5 Observations and Analysis -- 6 Results and Discussions -- 7 Conclusions -- References. Analysis of Hospital Patient Data Using Computational Models -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Creation -- 3.2 Data Preprocessing -- 3.3 Model Building -- 3.4 Evaluation -- 3.5 Clustering -- 4 Results -- 4.1 Elbow Method -- 4.2 Silhouette Analysis -- 5 Conclusion -- References -- A Research on the Impact of Big Data Analytics on the Telecommunications Sector -- 1 Introduction -- 2 Trends in the Implementation of Big Data Analytics in the Telecom Industry -- 3 Regional Insight -- 4 Challenges of the Telecommunication Industry -- 4.1 Operation-Related Costs -- 4.2 Needs for Consumers -- 4.3 Information Security and Breaches -- 4.4 Collaboration -- 4.5 High-Speed Data-in-Motion -- 4.6 Support for Application and Network Intelligence -- 4.7 Real-Time Actionable Insights -- 5 Telecommunication Industry, Big Data Analytics, and Customer Services -- 6 Conclusion -- References -- Face Mask Isolation Canister Design for Healthcare Sector Towards Preventive Approach -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Gap Analysis -- 5 Proposed Design -- 6 Working -- 7 Applications -- 8 Future Scope -- 9 Conclusion -- References -- Modeling the Impact of Access to Finance on MSMEs' Contribution Towards Exports of the Economy -- 1 Introduction -- 2 Reviews of Related Literatures -- 3 Objectives of the Research -- 4 Methodology of the Study -- 5 Linear Regression Model -- 6 Analysis of Data and Discussion -- 6.1 Export Contribution of Indian MSME Sector -- 6.2 Regression Analysis and Their Interpretation -- 7 Scope for Future Research -- 8 Conclusion and Recommendations -- References -- Privacy Challenges and Solutions in Implementing Searchable Encryption for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 2.1 Proxy Re-encryption with and without Keyword Search -- 3 Conclusion -- References. Multi-objective Optimization with Practical Constraints Using AALOA -- 1 Introduction -- 2 Problem Formulation -- 2.1 Objective Functions -- 2.2 Constraints -- 3 Proposed Algorithm -- 4 Multi-objective Optimization Strategies -- 4.1 Non-dominated Sorting -- 4.2 Archive Selection -- 4.3 Fuzzy Approach -- 5 Results and Analysis -- 5.1 Example-1: Benchmark Test Functions -- 5.2 Example-2: Electrical Test System -- 6 Conclusion -- References -- An Implementation of Lightweight Cryptographic Algorithm for IOT Healthcare System -- 1 Introduction -- 2 Methodology -- 2.1 Materials -- 2.2 Proposed Architecture -- 3 Experimental Setup and Results -- 3.1 Performance Evaluation -- 4 Discussions -- 5 Conclusions and Future Work -- References -- Home Appliances Automation Using IPv6 Transmission Over BLE -- 1 Introduction -- 2 Work Flow -- 3 Proposed Algorithm -- 4 Initial Setup and Plateform -- 5 Experimental Setup for Connect Raspberry BLE with Mobile nRF Connect App -- 6 Experimental Results -- 7 Conclusion -- References -- IoT Based Collision Avoidance System with the Case Study Using IR Sensor for Vehicles -- 1 Introduction -- 1.1 Types of Collision Avoidance Assist Systems -- 2 Literature Review -- 3 Motivation -- 4 Methodology -- 4.1 Arduino Uno -- 4.2 Ultrasonic Sensors -- 4.3 Motor Driver -- 5 Result and Discussion -- 6 Conclusion and Future Work -- References -- Airline Ticket Price Forecasting Using Time Series Model -- 1 Introduction -- 2 Related Work -- 3 Background of the Work -- 4 Proposed Work -- 4.1 Important Packages -- 4.2 Dataset Collection -- 4.3 Building Model -- 5 Flask Python Web Framework -- 6 Experimental Results -- 6.1 Accuracy -- 7 Conclusion -- References -- AI Powered Authentication for Smart Home Security-A Survey -- 1 Introduction -- 2 Related Work -- 3 Face Recognition Technologies -- 3.1 Appearance-Based Methods. 3.2 Single-Shot Methods -- 3.3 Multi-shot Methods -- 3.4 Rgbd-Based Approaches -- 4 Proposed Methodologies -- 4.1 Grassman Algorithm -- 4.2 Convolutional Neural Network Algorithm -- 4.3 Limitations -- 4.4 Future Works -- 5 Conclusion -- References -- WSRR: Weighted Rank-Relevance Sampling for Dense Text Retrieval -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Experiments and Results -- 5 Conclusions -- References -- Tweet Based Sentiment Analysis for Stock Price Prediction -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 System Architecture -- 3.2 Module Descrption -- 3.3 Data Processing: Data Training -- 3.4 Model Training -- 4 Implementation -- 4.1 CEA Algorithm -- 5 Result and Analysis -- 6 Conclusion and Future Work -- References -- A Study on the Stock Market Trend Predictions -- 1 Introduction -- 2 Background -- 2.1 Research Mainly Based on Technical Analysis -- 2.2 Research Mainly Based on Sentiment Analysis -- 3 Conclusion -- References -- Optimization of Partial Products in Modified Booth Multiplier -- 1 Introduction -- 2 Booth's Algorithm -- 3 Modified Booth's Algorithm -- 4 Optimized Booth's Multiplier (OBM) -- 4.1 Proposed Algorithm to Reduce Partial Products -- 4.2 16 × 16 Multiplication Using OBM -- 5 Results and Discussion -- 5.1 FPGA Device Utilization -- 5.2 Simulation Results -- 6 Conclusion -- References -- Comparative Study on Text-to-Image Synthesis Using GANs -- 1 Introduction -- 2 Literature Review -- 2.1 Cycle-Consistent Inverse GAN for Text-to-Image Synthesis -- 2.2 Dynamic Aspect-Aware GAN for Text-to-Image Synthesis -- 2.3 Cycle Text-to-Image GAN with BERT -- 3 Conclusion -- References -- Online Hate Speech Identification Using Fine-tuned ALBERT -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Experiment -- 4.1 Training Details of ALBERT Base Version 2. 4.2 Fine-Tuned ALBERT. |
Record Nr. | UNINA-9910746286703321 |
Choudrie Jyoti | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IOT with Smart Systems : ICTIS 2023, Volume 2 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
Autore | Choudrie Jyoti |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (660 pages) |
Disciplina | 004 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
ISBN | 981-9937-61-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface ICTIS 2023 -- Contents -- Editors and Contributors -- The Current State of Art-Indian Unleavened Flat Bread Cooking -- 1 Introduction -- 2 Survey of Existing Methods of Chapati and Other Foods Cooking with New Techniques -- 3 Material and Methods of Dough Preparation, Chapati Making -- 4 Challenges and Future Scope -- 5 Database and Software/hardware Tools -- 6 Conclusion -- References -- An Efficient Abstractive Summarization of Research Articles Using Pegasus Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 5 Conclusions and Future Enhancements -- References -- Performance Analysis of Classification Techniques in Heart Disease Prediction -- 1 Introduction -- 2 Related Work -- 3 Implementation Details -- 3.1 Dataset Information -- 3.2 Classification Methods -- 4 Experimental Results -- 4.1 Correlation Results -- 4.2 Performance Analysis -- 5 Conclusion -- References -- Early Phase Identification and Detection for Plant Poor Growth in Rural Areas: A Survey of the State of the Art -- 1 Introduction -- 2 Related Work -- 3 Issues and Challenges -- 4 Proposed Work -- 4.1 Parametric Evaluation of Related Work -- 5 Methodology Enriching Datasets -- 5.1 RoCoLe Dataset -- 5.2 BRACOL Dataset -- 5.3 Rice Leaf Blight Dataset Rice Leaf Blight Dataset -- 5.4 Plant Pathology Dataset Plant Pathology Dataset -- 5.5 Citrus Dataset -- 6 Conclusion -- 7 Discussion -- References -- Pothole Detection and Road Condition Updation on Google Maps -- 1 Introduction -- 2 System Design -- 2.1 Pothole Detection -- 2.2 Vehicle Tracking -- 2.3 Updating the Database -- 2.4 Rendering Database on Google Maps -- 3 Implementation -- 3.1 Training Phase -- 3.2 Server-Side -- 3.3 Client-Side -- 3.4 Algorithm -- 3.5 Flowchart -- 4 Result and Analysis -- 5 Conclusion -- References.
Fetal Cardiac Detection Using Deep Learning from Echocardiographic Image-A Survey -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Methods for Cardiographic Image Analysis -- 4 Deep Learning Framework for Disease Prediction -- 5 Experimental Results -- 6 Conclusion -- References -- Analysing the Factor Influencing Post COVID-19 Experience Through User-Generated Content: Luxury Hotel in India -- 1 Introduction -- 2 Literature Review -- 3 System Description -- 3.1 Data Pre-processing -- 3.2 Sentiment Analysis -- 3.3 Theme Identification -- 4 Methodology -- 5 Analysing the Theme -- 6 Result -- 6.1 Positive Sentiments -- 6.2 Negative Sentiments -- 7 Conclusion -- References -- Text Detection and Recognition from the Scene Images Using RCNN and EasyOCR -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Text Detection -- 3.2 Text Recognition -- 4 Experimentation and Results -- 4.1 Datasets -- 4.2 Implementation Details -- 4.3 Result Analysis -- 5 Conclusion -- References -- The Important Role of Industry Data Connectivity Using M2M and IoT Applications for Processing and Analysis -- 1 Introduction -- 2 Devices to Networks and Platforms -- 2.1 Data Collection -- 2.2 Data Communication -- 3 Strengthen the Data Management Platform -- 3.1 Centralized Device Management -- 3.2 High-Performance Data Management -- 3.3 Enhanced Administration and Security -- 3.4 Flexible Application Development -- 4 Data Transfer with MQTT -- 4.1 Topic and Quality of Service (QoS) -- 4.2 Results -- 5 Discussion -- 6 Conclusion -- 7 Future Study -- References -- Classification of Non-proliferative Diabetic Retinopathy in Terms of Dark and Bright Lesions Using Multi-layered Perceptron (MLP) -- 1 Introduction -- 2 Methodology -- 2.1 Separation of Mask from Fundus -- 2.2 Removal of Optic Disc -- 2.3 Extraction of Retinal Blood Vessels -- 2.4 Microaneurysms. 2.5 Hemorrhages -- 2.6 Exudates -- 2.7 Cotton Wool Spots -- 3 Result -- 4 Conclusion -- References -- An Efficient Saliency Detection Using Wavelet Fusion -- 1 Introduction -- 1.1 Related Work -- 2 Proposed Methodology -- 2.1 Haar Wavelet Transform for Edge Enhancement and Noise Removal -- 2.2 Edge (Curve) Detection -- 2.3 Convolutional Neural Networks CNN -- 3 Experimental Results -- 4 Conclusion -- References -- Segmentation of Brain Tumor Images Using Morphological Reconstruction -- 1 Introduction -- 2 Literature Review -- 3 Existing System -- 3.1 Pre-processing -- 3.2 Skull Stripping -- 3.3 Segmentation -- 4 Proposed Model -- 4.1 Input -- 4.2 Gray Scaling of Images Using OpenCV -- 4.3 Thresholding -- 4.4 Watershed Algorithm for Image Segmentation -- 4.5 Compute Morphological Operations -- 5 Implementation and Results -- 6 Conclusion -- 7 Future Scope -- References -- Navigation Planning for Efficient Area Covering for Surface Cleaning -- 1 Introduction -- 2 Proposed Method -- 2.1 Deadlock Detection and Escaping -- 2.2 Task of Environment Modeling -- 3 Empirical Analysis -- 3.1 Performance Parameter -- 3.2 Implementation -- 3.3 Tested in an Unknown Environment -- 4 Results -- 5 Conclusion -- References -- Pathfinding Visualizer: A Survey of the State-of-Art -- 1 Introduction -- 1.1 Pathfinding Algorithms and Visualizer Overview -- 2 Literature Review -- 2.1 Overview of Existing Pathfinding Visualizers -- 2.2 Visualizing Pathfinding Algorithms: Importance of Visual AI& -- DS in Learning -- 3 Pathfinding Visualizer -- 3.1 Understanding the Pathfinding Visualizer -- 3.2 Design of the Pathfinding Visualizer -- 3.3 Implementation Details, Including Programming Languages and Tools Used -- 4 Results -- 4.1 Details on the Implementation and Functionality of Algorithms in the Pathfinding Visualizer -- 5 Discussion. 5.1 Discussion on How the Visualizer Contributes to a Better Understanding of Pathfinding Algorithms -- 6 Conclusion -- 7 Future Work -- Bibliography -- A Study on Cyber Security and its Challenges in India -- 1 Introduction -- 2 Literature Review -- 3 Background -- 4 Proposing Guidelines for Cyber Safe India -- 4.1 Need for a Correct Legal Framework in Order to Remove Ambiguities from Data Protection Laws -- 4.2 Changes in Current 2013 Cyber Security Policy -- 5 Need for Cyber Security Education in School -- 6 Current Scenario of Cyber Security in India -- 7 Conclusion -- References -- Implementation of AES Algorithm -- 1 Introduction -- 2 Block Diagram -- 2.1 Encryption Process -- 2.2 FPGA Implementation -- 3 Methodology -- 3.1 Byte Substitution -- 3.2 Shiftrows -- 3.3 MixColumns -- 3.4 Add Round Keys -- 3.5 Inverse Subbytes -- 4 Implementation of AES on FPGA -- 5 Results -- 5.1 AES Encryption and Decryption Xilinx Simulated Results -- 5.2 AES Encryption Results on FPGA -- 6 Conclusion -- References -- Feature Extractor Techniques for Alzheimer's Predictive Model in Brain Imaging -- 1 Introduction -- 2 Related Work -- 3 Experimental Framework -- 4 Observations and Results -- 5 Conclusions and Future Research -- References -- User Preference Recommendation System and Analytics for News Articles -- 1 Introduction -- 2 Overview -- 2.1 Problem Statement -- 2.2 Objectives -- 3 Literature Survey -- 4 Recommendation Systems -- 4.1 Content-Based Filtering -- 4.2 Collaborative Filtering -- 4.3 Hybrid Approach -- 5 Proposed Design -- 5.1 Introduction -- 5.2 Flow of the System -- 6 System Implementation -- 6.1 Data Generation -- 6.2 Model Formation -- 6.3 Visualisation -- 7 Result -- 8 Conclusion and Future Work -- References -- Design and Development of Focus Controller for the 50/80 cm ARIES Schmidt Telescope -- 1 Introduction -- 2 Focus Mechanism. 3 Embedded Controller -- 3.1 Motion Control -- 3.2 Telemetry -- 3.3 Firmware -- 3.4 Operation -- 4 GUI Software -- 4.1 Software Architecture -- 4.2 Setup Dialog Box -- 4.3 Focus Dialog Box -- 5 System Performance -- 6 Conclusion -- References -- Predicting Fishing Effort: Data Collection for Machine Learning Model Using Scientific and Indigenous Method -- 1 Introduction -- 2 Methods -- 2.1 Azure Machine Learning -- 3 Datasets -- 3.1 Area -- 3.2 Types of Data -- 4 Data Pre-processing -- 5 Model Selection and Parameter Tuning -- 6 Result -- 7 Conclusions -- References -- A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 3 Existing Method -- 4 Proposed Method -- 4.1 Algorithm -- 5 Testing Results -- 6 Conclusion -- References -- Model Design to Analyse Coronary Artery Disease Using Machine Learning Techniques (MDACADMLT) -- 1 Introduction -- 2 Literature Review -- 3 System Model -- 3.1 Logistic Regression -- 3.2 K-Nearest Neighbor -- 3.3 Support Vector Machine -- 3.4 Naïve Bayes -- 3.5 Decision Tree -- 3.6 Random Forest -- 4 Experimental Results -- 5 Conclusion -- References -- Impact of Geo-positioning Information in Limiting Forest Fire Damage -- 1 Overview of the Forest Fire Damage Around the World -- 2 A Rapidly Expanding Area of Research -- 3 Early Detection Forest Fire Systems Design -- 4 Simulation and Results -- 5 Conclusion -- References -- Automatic Music Melody Generation Using LSTM and Markov Chain Model -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Long Short-Term Memory (LSTM) -- 3.2 Markov Chain Model -- 4 Mathematical Model -- 4.1 Long Short-Term Memory (LSTM) -- 4.2 Markov Chain Model -- 5 Results and Discussion -- 5.1 Long Short-Term Memory (LSTM) -- 5.2 Markov Chain Model -- 6 Limitations -- 7 Future Scope -- 8 Conclusion -- References. Federated Learning Approaches to Diverse Machine Learning Model: A Review. |
Record Nr. | UNINA-9910743689003321 |
Choudrie Jyoti | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|