top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Proceedings of Fifth International Conference on Computer and Communication Technologies : IC3T 2023, Volume 1
Proceedings of Fifth International Conference on Computer and Communication Technologies : IC3T 2023, Volume 1
Autore Devi B. Rama
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (438 pages)
Altri autori (Persone) KumarKishore
RajuM
RajuK. Srujan
SellathuraiMathini
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9997-04-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Committees -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- Square Shaped SIW Based Slotted MIMO Antenna -- 1 Introduction -- 2 Antenna Design -- 3 S-parameter and Gain Characteristics of the Antenna -- 4 Multi-beam and Polarisation Characteristics of the Antenna -- 4.1 Individual Excitation of the Ports with Zero Phase -- 4.2 Excitation of Two Ports with a Phase Difference of 90° -- 5 Conclusion -- References -- Food Recognition and Calorie Measurement Using Machine Learning -- 1 Introduction -- 2 Problem Statement -- 3 Existing Work -- 4 Study and Assessment of the Indian Food Recipe Images Dataset -- 5 Methodology -- 5.1 Implementation of CNN -- 5.2 Plan of Implementation -- 6 Working of the Proposed System -- 6.1 System Architecture -- 7 Results and Discussion -- 8 Future Enhancements -- 9 Conclusion -- References -- Breast Cancer Prediction with Gradient Boost and XGBoost -- 1 Introduction -- 1.1 Breast Cancer -- 2 Related Work -- 3 Proposed System -- 3.1 Breast Cancer Dataset -- 3.2 Data Preprocessing -- 3.3 Architecture of Proposed Model -- 3.4 Selection of Features -- 3.5 Classification of Models -- 3.6 Model Training -- 4 Result Analysis -- 5 Conclusion -- References -- Data Cube Technology for Accessing of Large Database -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusions -- References -- Handwritten Character Recognition for South Indian Languages Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dataset Description -- 3.2 Pre-processing -- 3.3 Bounding Box -- 3.4 Feature Extraction -- 3.5 Model Comparison -- 3.6 Perform Evaluation -- 4 Results and Discussions -- 5 Conclusion -- 6 Future Work -- References -- CavFind: A Novel Algorithm to Detect Cavities on Protein Structure -- 1 Introduction -- 2 Materials and Methods.
3 Results and Discussion -- 4 Conclusion -- References -- Tire Imprint Identification and Classification using VGG19 -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Training and Testing Process -- 3.2 Dataset Description -- 3.3 Pre-processing -- 3.4 Segmentation -- 3.5 Feature Extraction -- 3.6 Model Comparison -- 4 Experimental Setup -- 4.1 Dataset -- 4.2 Pre-processing -- 4.3 Segmentation -- 4.4 Feature Extraction -- 4.5 Template Matching -- 4.6 VGG19 -- 5 Results and Discussion -- 5.1 Performance Evaluation Graph -- 6 Conclusion -- 7 Future Work -- References -- Uncovering Insights in Agroforestry: A Text Mining Analysis Using Web Scraping and Topic Modeling -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Design Strategy -- 3.2 System Architecture Diagram -- 3.3 Methods Used -- 4 Observations and Results -- 4.1 Metadata from Google Scholar -- 4.2 Observations -- 5 Conclusion and Future Study -- References -- Generative Adversarial Networks: A Comprehensive Review -- 1 Introduction -- 1.1 Motivation Behind GAN -- 1.2 Structure of GAN -- 1.3 Loss Functions and Training Challenges -- 2 Variants of GAN -- 2.1 Vanilla GAN -- 2.2 DCGAN -- 2.3 BiGAN -- 3 Evaluation Metrics -- 3.1 Quantitative Metrics -- 4 Conclusion and Future Directions -- References -- System Modification Process to Reduce Calculation Complexity in Backward Forward Sweep Algorithm -- 1 Introduction -- 2 Backward Forward Sweep Algorithm -- 2.1 Backward Forward Sweep Algorithm for 3 Bus Lateral System -- 3 Decoupled Backward Forward Sweep (DBFS) Method -- 3.1 DBFS Method for a 3 Bus Lateral System -- 4 DBFS Method-Case Study-55 Bus Unbalanced Radial Distribution System (URDS) -- 5 Conclusion -- References -- Exploit Reversible Gates to Implement Fast Quantum Sorting Algorithm -- 1 Introduction -- 2 Background -- 3 Proposed Methodology -- 4 Complexity Analysis.
5 Qiskit Simulation -- 6 Conclusion -- References -- Analyzing the Performance Variations of Naive Bayes, Linear SVM, and Random Forest for Spam Detection: A Comprehensive Study on the & -- Quot -- Spam or Ham& -- quot -- Dataset -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Result -- 5 Conclusion -- References -- A Novel Encryption Framework to Improve the Security of Medical Images -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Cuttlefish Algorithm -- 3.2 Particle Swarm Algorithm -- 3.3 Cuttlefish Particle Swarm Optimization -- 3.4 Ciphertext-Policy Weighted Attribute Encryption (CPWAE) -- 4 Result -- 5 Conclusion -- References -- Enhancing DDoS Attack Detection in SDN: A Novel Approach with IG-RFFI Feature Selection -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Dataset Description -- 3.2 Feature Selection -- 3.3 Information Gain (or) Mutual Information (IG) -- 3.4 Random Forest Feature Importance (RFFI) -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- A Novel Fusion Study on Disease Detection in Cotton Plants Using Embedded Approaches of Neural Networks -- 1 Introduction -- 1.1 Leaf Disease Detection Using Different Techniques -- 2 Literature Review -- 3 Materials Available -- 4 Discussions -- 5 Conclusion -- References -- A Security Framework for the Detection of Targeted Attacks Using Honeypot -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 4 Results -- 5 Conclusions -- References -- SNMP Watcher: A Model to Detect DoS and DDoS Attacks Using SNMP Management Information Base Analysis -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Classifiers -- 3.3 Metrics for Assessing Performance -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References.
Comparative Analysis for Loan Approval Prediction System Using Machine Learning Algorithms -- 1 Introduction -- 2 Literature Review -- 3 Data Presentation -- 4 Methodology -- 4.1 Exploratory Data Analysis -- 4.2 Data Modeling -- 4.3 Splitting the Data -- 4.4 Selecting the Algorithm -- 4.5 Training or Validating Model -- 5 Results and Discussion -- 6 Conclusion -- References -- Classification of Credit Card Delinquent Customers Using Random Forest Algorithm -- 1 Introduction -- 1.1 Contributions -- 2 Literature Review -- 3 Experimental Setup -- 3.1 The Sample Pseudocode of the Proposed Algorithm is Given Below -- 4 Results and Discussion -- 5 Conclusion and Future Direction -- References -- Evaluating E-learning Engagement Through EEG Signal Analysis with Convolutional Neural Networks -- 1 Introduction -- 2 Challenges Facing in E-Learning Approaches -- 3 Methodology -- 3.1 EEG Signal Classification in Real-Time -- 3.2 Summary of Real-Time E-Learning EEG Data Collection -- 3.3 EEG Data Discretization -- 3.4 EEG Signal Preprocessing Methods -- 4 Implementation Approach -- 4.1 Label Encoding -- 4.2 Representation Learning -- 5 Results -- 6 Discussion -- 7 Conclusion -- References -- Food Item Recognition and Calories Estimation Using YOLOv5 -- 1 Introduction -- 2 Related Works -- 3 Research Methodology -- 3.1 Data Collection -- 3.2 Data Annotation and Preprocessing -- 3.3 YOLOv5 Architecture and Training -- 4 Evaluation and Performance Analysis -- 4.1 Loss Function -- 4.2 Precision -- 4.3 Recall -- 4.4 F1 Score -- 5 Conclusion and Future Improvements: -- References -- Fuzzy Cognitive Security Techniques for Data Aggregation in Capillary Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results -- 5 Conclusions -- References.
Performance Analysis on Optimal Data Integrity and Security-Constrained Cloud Storage Framework with Meta-heuristic-Based Mechanism -- 1 Introduction -- 2 Literature Survey -- 3 Dual Attribute Merging Scheme for Privacy Protection in Cloud Storage Framework -- 3.1 OM-SRC-Based Optimal Sensitive Attribute Protection -- 3.2 Non-sensitive Attribute Protection Based on Shuffling Algorithm -- 4 Focusing on Data Integrity and Security Using Privacy Preservation Technique -- 4.1 Proposed Cloud Storage Model -- 4.2 Data Collection -- 4.3 Optimal Selection of Sensitive Attribute with PFA -- 5 Experimentation of Result Analysis -- 5.1 Validation Set-Up -- 5.2 State-of-the-Art Observation of the Designed Technique Over Data Sets -- 5.3 Key Sensitive Analysis on the Implemented Framework -- 5.4 Analysis of Convergence in the Suggested Model -- 5.5 Statistical Validation of the Implemented Method -- 6 Conclusion -- References -- Computer Vision-Based Model for Classification of Citrus Fruits Diseases with Pertinent Image Preprocessing Method -- 1 Introduction -- 2 Related Work -- 2.1 Identified Research Gap -- 2.2 Our Contribution -- 3 Proposed Work -- 3.1 Materials and Methods -- 3.2 Preprocessing of Images -- 3.3 Deep Convolutional Neural Network -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- FLAML-HDPS Model: An Efficient and Intelligent AutoML Approach for Heart Disease Prediction -- 1 Introduction -- 2 Literature Works -- 3 Proposed Methodologies -- 3.1 Dataset Description -- 3.2 Workflow of Fast and Lightweight AutoML -- 4 Experimental Results and Analysis -- 5 Conclusions -- References -- An Efficient Selective Features Approach to Detect Hypothyroid Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Principal Component Analysis -- 3.2 Extra Trees Classifier -- 3.3 Borderline SMOTE.
3.4 Decision Trees.
Record Nr. UNINA-9910835059003321
Devi B. Rama
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Fifth International Conference on Computer and Communication Technologies : IC3T 2023, Volume 2
Proceedings of Fifth International Conference on Computer and Communication Technologies : IC3T 2023, Volume 2
Autore Devi B. Rama
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (422 pages)
Disciplina 004.6
Altri autori (Persone) KumarKishore
RajuM
RajuK. Srujan
SellathuraiMathini
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9997-07-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Committees -- Preface -- Acknowledgements -- Contents -- Editors and Contributors -- Implementation of Digital Down Conversion Technique Using FPGA for Atmospheric RADAR Application -- 1 Introduction -- 2 Literature Review -- 3 Methodologies of Implementing DDC -- 3.1 Existing DDC System -- 3.2 Proposed DDC System -- 4 Analog to Digital Conversion (ADC) by Using AD6654 -- 5 Working with XILINX ISE -- 6 Experimental Setup and Simulation Results -- 7 Conclusions -- References -- Predictive Data Analysis to Support Decision-Making Based on Long-Term Impacts of Disasters -- 1 Introduction -- 2 Significance of Datasets in Disaster Management -- 3 Impacts of Disaster -- 4 Challenges of Regional Administration -- 5 Methodology -- 6 Proposed Algorithm and Implementation -- 7 Discussion -- 8 Conclusion -- References -- Generative Adversarial Networks: Challenges, Solutions, and Evaluation Metrics -- 1 Introduction -- 2 Related Works -- 3 Advantages -- 4 Challenges -- 5 GAN Training Tricks -- 6 Evaluation Metrics -- 7 Applications -- 8 Future Works -- 9 Conclusion -- References -- Improving Accuracy and Robustness in Depression Detection with Ensemble Learning and Optimization Techniques -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Problem Statement -- 3.2 Dataset -- 3.3 Text Processing -- 3.4 Optimization Techniques -- 4 Results -- 5 Conclusion and Future Scope -- References -- Spatial-Spectral Features-Based Dimensionality Reduction Technique for Robust Multivariate Image Classification -- 1 Introduction -- 2 Spatial-Spectral DR Method -- 2.1 GLCM and Fusion Matrix -- 2.2 Principal Component Analysis (PCA) for Dimensionality Reduction -- 2.3 DR Using Locally Linear Embedding (LLE) -- 2.4 Classification Using Support Vector Machine (SVM) -- 3 Experiment and Result -- 4 Conclusion -- References.
Improving Breast Cancer Prognosis with DL-Based Image Classification -- 1 Introduction -- 2 Literature Review -- 3 Dataset Overview -- 3.1 Data Collection -- 3.2 Image Resizing -- 3.3 Image Normalization -- 3.4 Image Data Augmentation -- 3.5 Image Label Encoding -- 4 Experimental Analysis and Discussion -- 4.1 Performance Analysis of the Models -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- A Lightweight Encryption Method for Preserving E-Healthcare Data Privacy Using Dual Signature on Twisted Edwards Curves -- 1 Introduction -- 2 Preliminaries -- 2.1 Healthcare Device -- 2.2 Edge Computing Device -- 2.3 Cloud Storage -- 2.4 Dual Signature -- 3 Proposed Scheme -- 4 Correctness of Scheme -- 5 Performance Analysis and Result Comparison -- 6 Conclusion -- References -- Intrusion Classification and Detection System Using Machine Learning Models on NSL-KDD Dataset -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 3.1 Linear Support Vector Machine (SVM) -- 3.2 Quadratic Support Vector Machine (SVM) -- 3.3 K-Nearest-Neighbor (KNN) -- 3.4 Linear Discriminant Analysis (LDA) -- 3.5 Quadratic Discriminant Analysis (QDA) -- 3.6 Multi-layer Perceptron (MLP) -- 3.7 Long Short-Term Memory (LSTM) -- 3.8 Auto Encoder -- 4 Implementation -- 4.1 Dataset -- 4.2 Illustrative Example -- 5 Result -- 5.1 Linear Support Vector Machine -- 5.2 Quadratic Support Vector Machine -- 5.3 K-Nearest-Neighbor -- 5.4 Linear Discriminant Analysis -- 5.5 Quadratic Discriminant Analysis -- 5.6 Multi-layer Perceptron -- 5.7 Long Short-Term Memory -- 5.8 Auto Encoder -- 5.9 Comparative Result of Models -- 6 Conclusion -- References -- A Comprehensive Review of the Application of Greenhouse Using the Internet of Things -- 1 Introduction -- 1.1 Problems Occurred in Agriculture Department -- 2 Literature Review -- 3 Observation -- 4 Techniques.
4.1 Proper Light for Photosynthesis -- 4.2 Proper Irrigation Techniques -- 4.3 Technique for Humidity and Temperature -- 5 Conclusion -- References -- Controlling PowerPoint Slide Presentations Through Hand Gestures -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Algorithm -- 3.3 Euclidean Distance -- 3.4 Bounding Box -- 4 Result and Discussion -- 5 Conclusion -- References -- Design of Multiband GaN HEMT Power Amplifier for Radar Applications -- 1 Introduction -- 2 Design Methodology -- 2.1 DC Analysis -- 2.2 Stability Analysis -- 2.3 Load Pull Analysis -- 2.4 Input and Output Matching Circuit -- 2.5 Layout Preparation -- 3 Results and Discussions -- 4 Conclusion -- References -- SqueezeNet-Based Model for Subject Identification from Off-Angle Iris Image -- 1 Introduction -- 2 Background Work -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Brain Tumor Detection and Segmentation Using Deep Learning Models with Dual Attention Mechanism -- 1 Introduction -- 2 Literature Review -- 3 Investigating Deep Models with Dual Attention Mechanism -- 3.1 Dual Attention Mechanism -- 3.2 Proposed Methodology -- 4 Experimental Results and Evaluation -- 5 Conclusions -- References -- Exploring Machine Learning Algorithms for Accurate Breast Cancer Classification: A Comparative Analysis Using F2 Metric -- 1 Introduction -- 2 Related Work -- 3 Research Methodology -- 3.1 Dataset -- 3.2 Work Flow Model -- 4 Performance Metrics -- 4.1 Confusion Matrix -- 4.2 Accuracy -- 4.3 Precision -- 4.4 Recall or Sensitivity -- 4.5 F-Measure -- 4.6 FBeta Measure -- 5 Implementation -- 5.1 Decision Tree Classifier -- 5.2 Logistic Regression -- 5.3 Support Vector Machine -- 5.4 K-Nearest Neighbors -- 5.5 Naïve Bayes -- 6 Results and Discussion -- 7 Conclusion -- References.
Optimizing Gene Expression Analysis Using Clustering Algorithms -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- Prevention and Mitigation of Intrusion Using an Efficient Ensemble Classification in Fog Computing -- 1 Introduction -- 2 Related Works -- 2.1 Literature Survey -- 2.2 Challenges -- 3 Computational System Model -- 4 RSLO for IDS -- 4.1 Training Data Phase via Cloud Layer -- 4.2 End Layer and Fog Layer -- 5 Results and Discussion -- 6 Conclusion -- References -- Fake News Detector Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Flowchart -- 3.2 Tools and Technology Used -- 3.3 Python Libraries -- 3.4 Dataset and Data Preprocessing -- 3.5 Algorithm of Decision Tree -- 3.6 Algorithm of Random Forest -- 3.7 Algorithm of Naïve Bayes -- 3.8 Algorithm of Logistic Regression -- 4 Results and Discussion -- 5 Conclusion -- References -- Electric Vehicle Energy Management System Using Fuzzy Logic Controller -- 1 Introduction -- 2 Literature Survey -- 3 Existing System -- 3.1 PI Controller -- 4 Proposed System -- 4.1 Fuzzy Logic Controller -- 5 Results -- 6 Conclusion -- References -- Optimized Fall Detection Algorithm with Adaptive Sum Vector Magnitude and Axis-Weighted Features from Wearable Accelerometer Data -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 4 Classification -- 5 Performance Evaluation -- 5.1 Dataset Description -- 5.2 Quantitative Analysis -- 6 Conclusion and Future Work -- References -- Deep Learning-Based Real-Time Face Mask Detection for Human Using Novel YOLOv2 with Higher Accuracy -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 YOLOv2 Algorithm-Based Detection Network -- 3.2 Proposed Classification Network Architecture -- 4 Discussion and Experimental Result.
5 Conclusion -- References -- Smart University Application: Internet of Things (IoT)-Based Smart and Random Method to Collect Waste Management System in a University Campus by Using Ant Colony Optimization (ACO) Algorithm -- 1 Introduction -- 2 Ant Colony Optimization (Aco)-An Overview -- 3 Literature Survey -- 4 Ant Colony Optimization (ACO) Algorithm -- 5 Result and Discussion -- 6 . -- 7 Conclusion -- References -- Tomato Leaf Disease Detection and Classification by Using Novel CNN Model -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Dataset Description -- 3.2 Convolutional Neural Network -- 3.3 Depth-Wise Separable Convolution -- 3.4 Implemented Novel CNN Method for Detection of Tomato Leaf Diseases -- 4 Results -- 4.1 Results of the Experiments -- 4.2 Transfer Learning Models Comparison -- 5 Conclusion -- References -- Adaptive Trajectory Data Stream Clustering -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Statistical Model for JR -- 3.2 Statistical Model for BM -- 3.3 Statistical Model for SP -- 4 Experimental Results and Evaluation -- 5 Conclusions -- References -- Ransomware Classification and Detection: A Supervised Machine Learning Approach -- 1 Introduction -- 1.1 Types of Ransomware -- 1.2 Top Ransomware Targets -- 1.3 Recognition of Attacks -- 1.4 Ransomware Detection Techniques -- 1.5 Prevent Ransomware Attacks -- 2 Proposed Methodology -- 3 Implementation -- 3.1 The Effect of Features Dimension -- 3.2 The Impact of Tree and Seed Numbers -- 4 Conclusion -- References -- Comparing Ensemble Learning Algorithms to Improve Flight Prediction Accuracy and Reliability -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Experimental Framework -- 3.2 Data Balancing and Preprocessing -- 3.3 Feature Selection -- 3.4 Building Ensemble Models -- 4 Results and Discussion.
4.1 Data Balancing and Preprocessing.
Record Nr. UNINA-9910842296503321
Devi B. Rama  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui