AI and Data Analytics in Precision Agriculture for Sustainable Development / / edited by Sita Rani, Soumi Dutta, Álvaro Rocha, Korhan Cengiz
| AI and Data Analytics in Precision Agriculture for Sustainable Development / / edited by Sita Rani, Soumi Dutta, Álvaro Rocha, Korhan Cengiz |
| Autore | Rani Sita |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (438 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
DuttaSoumi
RochaÁlvaro CengizKorhan |
| Collana | Studies in Computational Intelligence |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Agriculture Artificial intelligence Computational Intelligence Data Engineering Artificial Intelligence |
| ISBN | 3-031-93087-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Precision Agriculture for Sustainable Development: Concepts and Applications -- AI4AI: Revolutionizing Agriculture with Artificial Intelligence -- Evolving Role of Applied AI in Crop Farming -- Role of Artificial Intelligence in Precision Farming -- Precision Agriculture: Fuzzy Logic or Deep Neural Network Models for Robust Crop Disease Screening -- Machine Learning Models for Crop Management -- Enhancing Agricultural Climate Resilience through Machine Learning Models and Hyper-Parameter Tuning -- Enhancing Crop Resilience to Climate Change with AI -- AI-Based Smart Irrigation Systems for Water Conservation -- Sensor Technologies and Blockchain Integration for Data-Driven Precision Agriculture -- Satellite Imagery and GIS Applications in Precision Agriculture -- Leveraging GIS and Remote Sensing for Agricultural Advancement and Economic Development -- Projecting Ecological Footprint and Biocapacity: Insights into Sustainable Agriculture and Development -- Projecting Ecological Footprint and Biocapacity: Insights into Sustainable Agriculture and Development -- Evaluating Sentinel-2 and Sentinel-1 for Land Use / Land Cover Classification in a Rice-Producing Region of Uruguay -- Enhancing Potato Crop Health: A CNN-Based System for Early Detection of Early and Late Blight -- Development of a Neutrosophic Set Theory based Feature Selection method for Classification of Paddy Seed -- Optimizing Potato Crop Water Quality: A Comparative Analysis of Machine Learning Techniques and Gradient Boosting Approaches -- EFFECTS OF THE FREQUENCY EMISSIONS OF THE Tadarita brasiliensis SIMULATED USING ELECTRONIC DEVICE FOR REPELLING Copitarsia decolora (Lepidoptera: Noctuidae) ADULTS. |
| Record Nr. | UNINA-9911015865903321 |
Rani Sita
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational Intelligence in Pattern Recognition : Proceedings of CIPR 2021
| Computational Intelligence in Pattern Recognition : Proceedings of CIPR 2021 |
| Autore | Das Asit Kumar |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
| Descrizione fisica | 1 online resource (756 pages) |
| Altri autori (Persone) |
NayakJanmenjoy
NaikBighnaraj DuttaSoumi PelusiDanilo |
| Collana | Advances in Intelligent Systems and Computing Ser. |
| Soggetto genere / forma | Electronic books. |
| ISBN | 981-16-2543-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Computational Intelligence in Pattern Recognition |
| Record Nr. | UNINA-9910497095603321 |
Das Asit Kumar
|
||
| Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational Intelligence in Pattern Recognition : Proceedings of CIPR 2020 / / edited by Asit Kumar Das, Janmenjoy Nayak, Bighnaraj Naik, Soumi Dutta, Danilo Pelusi
| Computational Intelligence in Pattern Recognition : Proceedings of CIPR 2020 / / edited by Asit Kumar Das, Janmenjoy Nayak, Bighnaraj Naik, Soumi Dutta, Danilo Pelusi |
| Edizione | [1st ed. 2020.] |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
| Descrizione fisica | 1 online resource (xxvii, 596 pages) : illustrations |
| Disciplina | 006.3 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Optical data processing Data mining Computational Intelligence Computer Imaging, Vision, Pattern Recognition and Graphics Data Mining and Knowledge Discovery |
| ISBN | 981-15-2449-1 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Inference Based Statistical Analysis for Suspicious Activity Detection Using Facial Analysis -- A Conceptual Approach for Framework to Design Radar System Using Arduino with Initial Experiments -- Stratification of Indian Dance Forms through Audio Signal -- Forecasting House Price with an Optimum Set of Features -- Deep Learning based Automated Feature Engineering for Rice Leaf Disease Prediction -- Feature Extraction and Disease Prediction from Paddy Crops Using Data Mining Techniques -- A Proposed Gene Selection Approach for Disease Detection -- Modern Trends in Monitoring and Analysis of Chemical Pesticides by Using Artificial Neural Networks -- Raw Data Redundancy Elimination on Cloud Database -- Secured Cloud System Using Deep Learning -- Golf-worm Swarm Optimized 2DOF-PIDN controller for Frequency Regulation of Hybrid Power System. |
| Record Nr. | UNINA-9910483250003321 |
| Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber Intelligence and Information Retrieval : Proceedings of CIIR 2021
| Cyber Intelligence and Information Retrieval : Proceedings of CIIR 2021 |
| Autore | Tavares João Manuel R. S |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
| Descrizione fisica | 1 online resource (630 pages) |
| Altri autori (Persone) |
DuttaParamartha
DuttaSoumi SamantaDebabrata |
| Collana | Lecture Notes in Networks and Systems Ser. |
| Soggetto genere / forma | Electronic books. |
| ISBN | 981-16-4284-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Cyber Intelligence -- DTNMA: Identifying Routing Attacks in Delay-Tolerant Network -- 1 Introduction -- 2 Key Challenges of Routing Attacks -- 3 Identification of Routing Attacks -- 3.1 Packet Dropping Attack -- 3.2 Black Hole Attack -- 3.3 Worm Hole Attack -- 3.4 Gray Hole Attack -- 3.5 Jelly Fish Attack -- 3.6 Tailgating Attack -- 3.7 Packet Misrouting Attack -- 3.8 Routing Information Falsification Attack -- 3.9 Acknowledgment Falsification Attack -- 3.10 Sleep Deprivation Attack -- 3.11 Identity Impersonation Attack -- 3.12 Lack of Cooperation Attack -- 3.13 Byzantine Attack -- 3.14 Flooding Attack -- 4 Conclusion and Future Work -- References -- Security Aspects for Mutation Testing in Mobile Applications -- 1 Introduction -- 2 Mobile Applications and Testing -- 3 Mutation Testing -- 3.1 Mutation Analysis of Android Applications -- 3.2 Crashes/Bugs in Android -- 4 Mutation Operators in Android -- 4.1 Based on Bug Taxonomy -- 4.2 Fail-On-Null -- 4.3 Orientation Lock -- 4.4 Based on APP-ELEMENTS -- 5 Mutation Test Results for Sample Program -- 6 Conclusion -- References -- Classification Framework for Fraud Detection Using Hidden Markov Model -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Algorithms -- 5 Conclusion -- References -- A Review on Security Issues in Healthcare Cyber-Physical Systems -- 1 Introduction -- 2 Why Does Privacy Stand as a Major Factor in Healthcare? -- 3 MCPS and Vulnerabilities Explained -- 4 CPS in Health Care -- 4.1 Security Requirements in Case of Sensor Networks -- 5 State of Art -- 6 Possible Cyber Measures and Breaches in Healthcare -- 7 Comparative Study -- 8 Security Advancements Proposed -- 8.1 Strong Security Policies -- 8.2 Sensor Only Network -- 8.3 Future Scope -- 9 Conclusion -- References.
Analysis of the Beaufort Cipher Expansion Technique and Its Usage in Providing Data Security in Cloud -- 1 Introduction -- 1.1 Cloud Computing -- 2 Beaufort Cipher -- 2.1 Beaufort Cipher Algorithm -- 2.2 Demerits of Beaufort Cipher -- 2.3 Frequency Analysis of the Extended Beaufort Cipher Algorithm -- 3 Literature Survey -- 4 Implementation and Simulation -- 4.1 Importance of Simulation in the Cloud Environment -- 4.2 CloudSim -- 4.3 Implementation -- 5 Comparison with Other Methods -- 6 Conclusion -- References -- Distribution of Internet Banking Credentials Using Visual Cryptography and Watermarking Techniques -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 4.1 Encryption -- 4.2 Decryption -- 5 Result -- 6 Conclusion -- References -- Pattern Recognition -- Virtual Keyboard Using Image Processing and Computer Vision -- 1 Introduction -- 2 Review Work -- 3 Result Analysis and Discussion -- 3.1 Masking -- 3.2 Image Feed Preprocessing -- 3.3 Threshold Binarization -- 3.4 Contour Generation -- 3.5 Finger-Pointer Detection -- 3.6 Keyboard Output and Workflow Model -- 4 Future Scope -- 5 Conclusion -- References -- Facial Expression Recognition Using Convoluted Neural Network (CNN) -- 1 Introduction -- 1.1 Background -- 2 Problem Statement -- 3 Tools and Libraries -- 4 Result Analysis and Discussion -- 5 Conclusion -- References -- Next Step to the Future of Restaurants Through Artificial Intelligence and Facial Recognition -- 1 Introduction -- 2 Literature Review -- 3 Artificial Intelligence -- 3.1 Theory of Mind -- 3.2 Reactive Machines -- 3.3 Self Awareness -- 3.4 Limited Memory -- 4 Growth of Artificial Intelligence -- 5 Applications of Artificial Intelligence -- 5.1 Application of Artificial Intelligence in Finance -- 5.2 Application of Artificial Intelligence in Banking. 5.3 Application of Artificial Intelligence in Healthcare Services -- 5.4 Application of Artificial Intelligence in Travel -- 5.5 Artificial Intelligence in Social Media -- 5.6 Security in Artificial Intelligence -- 6 Framework for Restaurant Using Artificial Intelligence and Facial Recognition -- 6.1 Tablet Device -- 6.2 Face Recognition -- 7 Conclusion -- References -- Extensive Feature Analysis and Baseline Model for Stance Detection Task -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Vector Representation -- 3.3 Language Model Based Representations -- 3.4 Propose and Implement Alternative Features -- 3.5 Analysing Key Features -- 3.6 Train-Validate Split -- 3.7 Linear and Logistic Regression Implementation -- 3.8 Model Evaluation -- 3.9 Model Tuning and Enhancement -- 4 Results -- 4.1 Importance of Features -- 4.2 Final Baseline -- 5 Conclusion -- References -- A Comparative Study into Stock Market Prediction Through Various Sentiment Analysis Algorithms -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Naïve Bayes Classifier -- 3.2 Logistic Regression -- 3.3 Support Vector Machine -- 3.4 k-Nearest Neighbor Algorithm (k-NN) -- 4 The Proposed Model -- 4.1 Data Description -- 4.2 Sentiment Analysis Component -- 4.3 Text Pre-processing -- 4.4 Abbreviation Processing -- 5 Programming Language and Simulator -- 6 Conclusion and Future Scope -- References -- The Survey on Handwritten Mathematical Expressions Recognition -- 1 Introduction -- 2 Motivation -- 3 Overview of Mathematical Symbols and Expression -- 4 Survey on Online and Offline Handwritten Mathematical Expressions -- 5 Conclusion -- References -- 13 Bangla Document Categorization Using Deep RNN Model with Attention Mechanism -- Abstract -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection. 3.2 Document Classification Dataset -- 3.3 Data Preprocessing -- 3.4 Classification Model -- 4 Experimental Setup and Result Analysis -- 4.1 Result Analysis -- 4.2 Result Comparison -- 5 Conclusion -- References -- Bangla Handwritten Digit Recognition -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experimental Details -- 4.1 Data Collection -- 4.2 Dataset Preparation for Overall NumtaDB and Own Dataset -- 4.3 Dataset Preparation for Every Single Training Dataset -- 4.4 Feature Extraction and Classification Steps -- 4.5 Architecture of Model for Every Training Single Dataset -- 5 Result Analysis -- 6 Conclusion -- References -- Audio Watermarking in Linear Canonical Transform Domain Using Frequency-Dependent Clustering -- 1 Introduction -- 2 Related Work on Transform Domain Audio Watermarking -- 3 The Linear Canonical Transform: A Primer -- 3.1 Continuous Domain Transformation -- 3.2 Discrete Domain Transformation -- 4 Proposed Methodology -- 4.1 Watermark Embedding Stage -- 4.2 Watermark Detection Stage -- 5 Experimental Configuration and Simulation Parameters -- 6 Results -- 7 Conclusion -- References -- Secure Cloud Services Using Quantum-Blockchain Technology -- 1 Introduction -- 2 State-Of-The-Art -- 2.1 Research Gap -- 3 Proposed Framework -- 3.1 Significance of the Proposed Approach -- 3.2 Proposed Algorithm -- 4 Experimental Setup and Result -- 5 Conclusion -- References -- Information Retrieval -- Multi-label Classification: Detailed Analysis -- 1 Introduction -- 2 Multi-label Classification Techniques -- 3 Evaluation Metrics and Statistics -- 3.1 Bipartition Based Metrics -- 3.2 Ranking-Based Metrics -- 3.3 Label Based Metrics -- 4 Comparative Analysis of MLC Algorithms -- 5 Progress of Multi-Label Classification Techniques -- 6 Challenges -- 7 Conclusion -- References. A Comparative Study on Sentiment Analysis Influencing Word Embedding Using SVM and KNN -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Feature Extraction -- 3.3 Classifier -- 4 Result and Analysis -- 5 Comparative Study -- 6 Conclusion -- References -- ML and GIS-Based Approaches to Flood Prediction: A Comparative Study -- 1 Introduction -- 2 Hydrological Modeling -- 3 Related Work -- 3.1 Predicting Flood Susceptibility Using Long Short-Term Memory (LSTM) Neural Network Model -- 3.2 Flood Prediction Using Support Vector Machines (SVM) -- 3.3 Artificial Neural Networks for Flood Susceptibility Mapping in Data-Scarce Urban Areas -- 3.4 Height Above the Nearest Drainage, a Hydrologically Relevant New Terrain Model -- 3.5 Flood Modeling of Mangalam River Using GIS and HEC-RAS -- 3.6 Application of ASTER DEM in Watershed Management as Flood Zonation Mapping in Koyna River of the Western Ghats -- 3.7 Terrain Analysis Enhancements to the Height Above Nearest Drainage Flood Inundation Mapping Method -- 3.8 Flood Risk Mapping Using GIS and Multi-criteria Analysis: A Greater Toronto Area Case -- 4 Analysis -- 5 The Proposed System -- 6 Conclusions -- References -- Implementation of Machine Learning in Lung Cancer Prediction and Prognosis: A Review -- 1 Introduction -- 2 Growth of Lung Cancer in Past Decade -- 3 Related Works -- 4 Comparative Analysis -- 5 Conclusion and Future Work -- References -- Fetching Information Through Crowdsourcing Within a Social Networking Site -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Problem Statement -- 5 Results and Discussion -- 6 Conclusion -- References -- Soil Nutrient Assessment and Crop Estimation with Machine Learning Method: A Survey -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Soil Fertility -- 3.2 Machine Learning Algorithm -- 4 Results -- 5 Discussion. 6 Conclusion. |
| Altri titoli varianti | Cyber Intelligence and Information Retrieval |
| Record Nr. | UNINA-9910502659603321 |
Tavares João Manuel R. S
|
||
| Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Data Mining and Information Security : Proceedings of ICDMIS 2024, Volume 5 / / edited by Soumi Dutta, Abhishek Bhattacharya, Vung Pham, Zdzislaw Polkowski
| Data Mining and Information Security : Proceedings of ICDMIS 2024, Volume 5 / / edited by Soumi Dutta, Abhishek Bhattacharya, Vung Pham, Zdzislaw Polkowski |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XVIII, 612 p. 325 illus., 279 illus. in color.) |
| Disciplina | 006.3 |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Artificial intelligence Data mining Data protection Computational Intelligence Artificial Intelligence Data Mining and Knowledge Discovery Data and Information Security |
| ISBN | 9789819660667 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Forecasting Future Stock Market Values Using Long-Term Memory Models and Sentiment Analysis -- Early Detection and Classification of Blight Diseases in Tomato and Potato Leaf Using Deep Convolution Neural Networks -- A Smartphone based Robust Model for Intelligent Prediction of Thyroid disease -- Analysis of leveraging machine learning and data analytics to predict Cardiac Disease -- Comparative Analysis of Machine Learning Algorithms for Early Sepsis Detection. |
| Record Nr. | UNINA-9911021148503321 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Data Mining and Information Security : Proceedings of ICDMIS 2024, Volume 4 / / edited by Soumi Dutta, Abhishek Bhattacharya, Valentina E. Balas, Mohammad Kamrul Hasan
| Data Mining and Information Security : Proceedings of ICDMIS 2024, Volume 4 / / edited by Soumi Dutta, Abhishek Bhattacharya, Valentina E. Balas, Mohammad Kamrul Hasan |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (XVIII, 629 p. 302 illus., 260 illus. in color.) |
| Disciplina | 006.3 |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Artificial intelligence Data mining Data protection Computational Intelligence Artificial Intelligence Data Mining and Knowledge Discovery Data and Information Security |
| ISBN | 981-9660-63-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Exploring AI Classifiers to Identify Gestational Diabetes Mellitus during pregnancy -- Indian Sign Language Translator -- Desktop-based virtual assistant using python based on natural language processing -- Leveraging Machine Learning for Robust IoT Security: A Focus on Anomaly Detection Systems -- Analyzing the Effectiveness of Machine Learning Algorithms in Intrusion Detection. |
| Record Nr. | UNINA-9911021976603321 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Emerging Technologies in Data Mining and Information Security [[electronic resource] ] : Proceedings of IEMIS 2018, Volume 2 / / edited by Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta
| Emerging Technologies in Data Mining and Information Security [[electronic resource] ] : Proceedings of IEMIS 2018, Volume 2 / / edited by Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (864 pages) : illustrations |
| Disciplina | 006.312 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Engineering
Artificial intelligence Computer security Computational Intelligence Artificial Intelligence Systems and Data Security |
| ISBN | 981-13-1498-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | The Study of Sentimental State of Human from Tweet Text -- Data Analytic Techniques with Hardware Based Encryption for High Profile Dataset -- Exploring Student Migration in Rural Region of Bangladesh -- Analysis on Lightning News And Correlation With Lightning Imaging Sensor (LIS) Data -- Design of Business Canvas Model for Social Media -- EEG Signal Analysis Using Different Clustering Techniques -- Viable Crop Prediction Scenario in Big Data Using a Novel Approach -- A Graph Based Approach on Extractive Summarization -- Promises and Challenges of Big Data in a Data Driven World -- A Proposed Approach for Improving Hadoop Performance For Handling Small Files -- Identification of the Recurrence of Breast Cancer by Discriminant Analysis -- Spam Detection in SMS based on Feature Selection Techniques -- Analysis and Design of an Efficient Temporal Data Mining Model for the Indian Stock Market -- Community Detection Methods in Social Network Analysis -- A Comparative Study on Cluster Analysis of Micro-Blogging Data. |
| Record Nr. | UNINA-9910484325803321 |
| Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Emerging Technologies in Data Mining and Information Security [[electronic resource] ] : Proceedings of IEMIS 2018, Volume 1 / / edited by Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta
| Emerging Technologies in Data Mining and Information Security [[electronic resource] ] : Proceedings of IEMIS 2018, Volume 1 / / edited by Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (848 pages) : illustrations |
| Disciplina | 006.312 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Engineering
Artificial intelligence Computer security Computational Intelligence Artificial Intelligence Systems and Data Security |
| ISBN | 981-13-1951-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1: Application of ANN for On-line Monitoring and Security Estimation of Power System -- Chapter 2: Crop Prediction Models – A Review -- Chapter 3: Rainfall Prediction : A Comparative study of Neural Network architectures -- Chapter 4: Prediction of Bacteriophage Protein Locations Using Deep Neural Networks -- Chapter 5: Classification of Phishing Websites using Moth-flame Optimized Neural Network -- Chapter 6: Design and Analysis of Intrusion Detection System via Neural Network, SVM and Neuro fuzzy -- Chapter 7: Grammar-based White-box Testing via Automated Constraint Path Generation. |
| Record Nr. | UNINA-9910482961203321 |
| Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Emerging Technologies in Data Mining and Information Security [[electronic resource] ] : Proceedings of IEMIS 2018, Volume 3 / / edited by Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta
| Emerging Technologies in Data Mining and Information Security [[electronic resource] ] : Proceedings of IEMIS 2018, Volume 3 / / edited by Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (872 pages) : illustrations |
| Disciplina | 006.312 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Engineering
Artificial intelligence Computer security Computational Intelligence Artificial Intelligence Systems and Data Security |
| ISBN | 981-13-1501-9 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Proposed Memory Allocation Algorithm for NUMA based Soft Real Time Operating System -- Mathematical Model of Fog Computing Architecture for IoT Micro-Services -- Analysis of Attention Level of Human Body in Different Form -- Analytical Survey on Standards of Internet of Things Framework & Platforms -- A Predictive Resource Management Technique in Grid -- Cryptanalysis of a Chaotic Key based Image Encryption Scheme -- Blind RGB Image Steganography using Discrete Cosine Transformation -- Wavelet and Pyramid Histogram Features for Image based Leaf Detection -- Automated Detection of Glaucoma using Image Processing Techniques -- Chemical Reaction Optimization Algorithm for Word Detection using Pictorial Structure -- Secure Remote Patient Monitoring with Location Based Services -- Development of Joint Intelligent Millimeter Wave Sensing and Communication -- Machine Learning for Mining Imbalanced Data -- Key Feature Extraction and Machine Learning Based Automatic Text Summarization -- Prediction of Gold Price Movement Using Geopolitical Risk as a Factor. |
| Record Nr. | UNINA-9910484844903321 |
| Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Explainable AI for Education: Recent Trends and Challenges / / edited by Tanu Singh, Soumi Dutta, Sonali Vyas, Álvaro Rocha
| Explainable AI for Education: Recent Trends and Challenges / / edited by Tanu Singh, Soumi Dutta, Sonali Vyas, Álvaro Rocha |
| Autore | Singh Tanu |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (314 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
DuttaSoumi
VyasSonali RochaÁlvaro |
| Collana | Information Systems Engineering and Management |
| Soggetto topico |
Computational intelligence
Artificial intelligence Engineering - Data processing Education Education - Data processing Computational Intelligence Artificial Intelligence Data Engineering Computers and Education Intel·ligència artificial Processament de dades Educació |
| Soggetto genere / forma | Llibres electrònics |
| ISBN |
9783031724107
3031724100 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | A path analysis model of responsible usage of AI and its effectiveness on the Quality of Education: Perspective from India -- Towards Trustworthy and Explainable AI Educational Systems -- Educational AI Tools: A new Revolution in Outcome-Based Education -- Intelligent AI Driven for Digital Citizenship and Eco-Literacy to Unravelling Social Systems in Environmental Education for sustainable learning -- Unveiling the Black Box: Exploring Explainable AI in Education - Trends, Challenges, and Future Directions -- Equitable Education and Sustainable Learning: A Literary Exploration Of Integration Of Artificial Intelligence In Education For SDGs Advancement -- A Study of the Histories of People for Gerontology through Steps of Artificial Intelligence in Text Book -- Supremely Explainable Artificial Intelligence (XAI) in Education 5.0: Articulating Constructive Alignment in Teaching Learning Practices -- ARTIFICIAL INTELLIGENCE IN THE TEACHING OF NATURAL SCIENCES ON THE THRESHOLD OF THE FIFTH INDUSTRIAL REVOLUTION -- Navigating the Evolving Landscape of Personalized Learning in AIED: Recent Trends and Innovations -- Reshaping Education through AI: A Progressive Model for Developing Economies -- Innovative Pedagogical Practices through the Development and Design of EFL Teaching Materials Tailored to Sustainability through AI in the Digital Revolution -- The Dynamic Impact of Neuroscience and Artificial Intelligence on Education -- Transformative Pedagogy: A Comprehensive Framework for AI Integration in Education -- AI-Powered Proctoring: Safeguarding Online Assessment in the Education 5.0 -- An MTCNN-Based Attendance Monitoring System Powered by Inception-ResNet-v1. |
| Record Nr. | UNINA-9910913795003321 |
Singh Tanu
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||