Data Intelligence and Cognitive Informatics : Proceedings of ICDICI 2023 / / edited by I. Jeena Jacob, Selwyn Piramuthu, Przemyslaw Falkowski-Gilski |
Autore | Jacob I. Jeena |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (579 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
PiramuthuSelwyn
Falkowski-GilskiPrzemyslaw |
Collana | Algorithms for Intelligent Systems |
Soggetto topico |
Computational intelligence
Internet of things Cooperating objects (Computer systems) Computational Intelligence Internet of Things Cyber-Physical Systems |
ISBN | 981-9979-62-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- About the Editors -- Automatic Sentence Classification: A Crucial Component of Sentiment Analysis -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization of Data -- 3.4 Algorithm Feeding -- 3.5 Best Model Selection -- 4 Result and Discussion -- 4.1 Statistical Analysis -- 4.2 Accuracy Graph -- 4.3 Confusion Matrix -- 4.4 Classification Report -- 5 Conclusion and Future Work -- References -- Real-Time Health Monitoring System of Patients on Utilizing Red Tacton -- 1 Introduction -- 2 Implementation -- 3 Proposed Methodology -- 4 Results -- 5 Conclusion -- References -- An Efficient Botnet Detection Using Machine Learning and Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Load Dataset -- 3.2 Data Pre-Processing -- 3.3 Feature Selection -- 3.4 Handling Class Imbalance -- 3.5 Partition Dataset in Training and Testing -- 3.6 Apply ML/DL Models -- 3.7 Bot Detection -- 3.8 Model Evaluation -- 4 Experiments and Results -- 5 Conclusion -- References -- Wavelet Selection for Novel MD5-Protected DWT-Based Double Watermarking and Image Hiding Algorithm -- 1 Introduction -- 2 Related Works -- 3 Methodology Used -- 3.1 Architecture of Proposed System -- 3.2 Watermark Embedder -- 3.3 Watermark Extractor -- 4 Experimental Results -- 4.1 Pseudorandomness in Watermark Embedding -- 4.2 Performance Evaluation Metrics -- 4.3 Selection of Wavelet -- 4.4 Watermark Embedding and Extraction -- 4.5 Image Hiding -- 5 Conclusion and Future Work -- References -- Chaotic Map Based Encryption Algorithm for Secured Medical Data Analytics -- 1 Introduction -- 2 Related Work -- 3 Existing Techniques -- 3.1 Algorithm -- 3.2 Cryptography -- 3.3 Encryption -- 3.4 Decryption -- 3.5 Key -- 3.6 Steganography -- 3.7 Symmetric Encryption.
4 Proposed Methodology -- 4.1 Secret Key Generation -- 4.2 Hahn's Discrete Orthogonal Moment -- 4.3 QR Code -- 4.4 Modified Logistic Map -- 5 Results and Discussions -- References -- Gold Price Forecast Using Variational Mode Decomposition-Aided Long Short-Term Model Tuned by Modified Whale Optimization Algorithm -- 1 Introduction -- 2 Background and Related Works -- 2.1 LSTM Overview -- 2.2 Variation Mode Decomposition Details -- 2.3 Metaheuristics Optimization -- 2.4 AI Applications for Gold Price Forecasting -- 3 Whale Optimization Algorithm -- 3.1 Elementary WOA -- 3.2 Proposed Improved WOA Algorithm Used in Time-Series Forecasting Framework -- 4 Experimental Setup -- 4.1 Results and Discussion -- 5 Conclusion -- References -- Requirements for a Career in Information Security: A Comprehensive Review -- 1 Introduction -- 2 Cybersecurity Foundation -- 2.1 Information Security Expertise -- 2.2 Duties and Tasks of an IS Professional -- 2.3 Job Nature and Requirements -- 3 Research Approach -- 3.1 Words Used to Search -- 3.2 Selection Criteria -- 3.3 Rejection Criteria -- 3.4 Data Gathering -- 3.5 Quality Appraisal -- 4 Results -- 5 Conclusion -- References -- Intrusion Detection Using Bloom and XOR Filters -- 1 Introduction -- 2 Literature Survey -- 3 NIDS Implementation Using Bloom Filter -- 4 NIDS Implementation Using XOR Filter -- 5 Experimental Results and Discussions -- 6 Conclusions and Future Work -- References -- A Model for Privacy-Preservation of User Query in Location-Based Services -- 1 Introduction -- 2 Related Work and Literature Survey -- 3 Methodology -- 4 Results -- 5 Conclusion -- 6 Future Work -- References -- A GPS Based Bus Tracking and Unreserved Ticketing System Using QR Based Verification and Validation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 System Architecture -- 5 System Functionality. 5.1 QR Code -- 5.2 Crowd Management -- 5.3 GPS Location -- 5.4 Automatic Ticket Expiry -- 5.5 Passenger Application -- 5.6 Conductor Application -- 6 Backend -- 6.1 Seat Availability -- 6.2 Passenger Information -- 6.3 Administrative Information -- 7 Conclusion and Future Scope -- References -- FileFox: A Blockchain-Based File Storage Using Ethereum and IPFS -- 1 Introduction -- 2 Background -- 2.1 Blockchain Storage -- 2.2 INFURA -- 2.3 Truffle -- 2.4 MetaMask -- 3 Related Work -- 4 Proposed System -- 5 Implementation -- 6 Result and Discussion -- 7 Conclusion and Future Scope -- References -- Minimizing Web Diversion Using Query Classification and Text Mining -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Feature Extraction -- 3.3 Semantic Matching -- 3.4 Web Query Classification -- 3.5 Machine Learning Models -- 3.6 Deep Learning Models -- 3.7 Evaluation Metrics -- 4 Results and Discussion -- 5 Future Scope -- 6 Conclusion -- References -- Connect: A Secure Approach for Collaborative Learning by Building a Social Media Platform -- 1 Introduction -- 1.1 Critical Characteristics of Social Media Are as Follows -- 1.2 Social Media Platforms -- 1.3 Need for Using Collaborative Learning -- 1.4 Challenges and Issues to Build Social Networking -- 1.5 Cloud Computing -- 1.6 Encryption -- 1.7 Importance of Social Media Platforms for Collaborative Learning -- 1.8 Advantages of Collaborative Learning for Faculty-To-Faculty Interaction -- 1.9 Security Concerns While Building a Social Media Platform -- 1.10 Conventional Threats -- 1.11 Modern Threats -- 1.12 Targeted Threats -- 1.13 Reasons Behind Online Social Media Security -- 2 Literature Review -- 2.1 Encryption Techniques Used -- 3 Summary of Literature Review -- 3.1 Importance of the Study. 3.2 The Opportunities that Will Be Provided Among the Users of the System Are as Follows -- 4 Proposed System -- 4.1 Proposed Algorithmic Process -- 5 Discussion -- 6 Conclusion -- References -- Smart Analytics System for Digital Farming -- 1 Introduction -- 2 Need for the Study -- 3 Related Works -- 4 Proposed Work -- 5 Conclusion -- References -- Sarcasm Detection for Marathi and the role of emoticons -- 1 Introduction -- 2 Related Work -- 3 Dataset and Annotation -- 3.1 Distribution of Tweets -- 3.2 Emoji Analysis -- 4 Pre-processing of Tweets -- 4.1 Cleaning of Tweets -- 4.2 Tokenization -- 5 Feature Extraction and Sarcasm Detection -- 5.1 Sentence Embedding Using Language Model -- 5.2 Embeddings for Emojis in the Tweet -- 6 Experiments and Result Analysis -- 7 Conclusion -- References -- Fleet Management Mobile Application Using GPS Shortest Path -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Modules -- 3.2 Algorithm Used -- 3.3 Database -- 4 Result and Discussion -- 5 Conclusions -- References -- Finger Vein Biometric System Based on Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Image Enhancement -- 3.2 Features Extraction -- 3.3 AES Encryption and Decryption -- 3.4 Convolution Neural Network -- 4 Result and Discussion -- 4.1 Image Enhancement -- 4.2 Feature Extraction -- 4.3 AES Encryption and Decryption -- 5 Conclusion -- References -- Embedding and Extraction of Data in Speech for Covert Communication -- 1 Introduction -- 2 Literature Survey -- 3 Existing Methodology -- 4 Proposed Methodology -- 5 Results and Evaluation -- 5.1 Results -- 5.2 Evaluation Metrics -- 6 Conclusion and Future Work -- References -- A Machine Learning Based Model for Classification of Customer Service's Email -- 1 Introduction -- 2 Problem Statement. 2.1 Shared Inboxes Fail in Managing the Emails as the Number Grows -- 3 Proposed Solution -- 3.1 Advantages of Email Multi-folder Categorization for Better Customer Support -- 3.2 Email with Multi-folder Categorization Works Well with a Database System -- 3.3 Work Together to Solve Problems at a Fast Pace -- 3.4 Provide Support in the 100% Context -- 3.5 Measure Individual Performance with Intuitive Reports -- 3.6 Architecture of Automatic Classification of Email -- 4 Research Methodology -- 4.1 Classification of Email Using the Technique of Machine Learning -- 4.2 Machine Learning Terminologies Used in Classification -- 4.3 Support Vector Machine -- 4.4 Advantages and Disadvantages for Using Support Vector Machine -- 4.5 Validation Tool/Dataset Used -- 5 Results -- 6 Conclusion -- 7 Limitations and Future Scope -- References -- Intelligent Identification and Multiclass Segmentation of Agricultural Crops Problem Areas by Neural Network Methods -- 1 Introduction -- 2 Methods and Materials -- 3 Results and Discussion -- 3.1 Justification of the Segmentation DNN Architecture -- 3.2 Learning Outcomes Developed by DNN -- 3.3 Discussion of the Results -- 4 Conclusions -- References -- Perishable Products: Enhancing Delivery Time Efficiency with Big Data, AI, and IoT -- 1 Introduction -- 2 Delivery Time in Our Context -- 2.1 Optimizing Delivery Time in Transportation: Exploring Algorithmic Approaches -- 2.2 Objective -- 2.3 Advantage -- 2.4 Challenger -- 2.5 Delivery Time Description -- 3 The Proposed Optimization -- 3.1 Model System -- 3.2 The Proposed Optimization for Delivery Time -- 3.3 Specification Parameter -- 4 Optımızatıon Results Analysis -- 4.1 Comparing CT with Integrated Recent Transportation Technologies -- 4.2 Evaluation and Comparison of Optimization Results -- 5 Conclusion -- References -- CNN Approach for Identification of Medicinal Plants. 1 Introduction. |
Record Nr. | UNINA-9910799231503321 |
Jacob I. Jeena | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Evolutionary Artificial Intelligence : Proceedings of ICEAI 2023 / / edited by David Asirvatham, Francisco M. Gonzalez-Longatt, Przemyslaw Falkowski-Gilski, R. Kanthavel |
Autore | Asirvatham David |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (563 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
Gonzalez-LongattFrancisco M
Falkowski-GilskiPrzemyslaw KanthavelR |
Collana | Algorithms for Intelligent Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Image processing Algorithms Computational Intelligence Artificial Intelligence Image Processing |
ISBN | 981-9984-38-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Empowering Multilingual Abstractive Text Summarization: A Comparative Study of Word Embedding Techniques -- A more effective ensemble ML method for detecting breast cancer -- Model Accuracy Test for Early Stage of Diabetes Risk Prediction with Data Science Approach -- Financial Statement Fraud Detection using Optimized Deep Neural Network -- Managing Operations in Chaotic Environments with Evolutionary Software Agents -- Identification of Plant Leaf Disease using Synthetic Data Augmentation ProGAN to Improve the Performance of Deep Learning Models -- IoT and Satellite Image Driven Water Quality Monitoring and Assessment Method in Coastal Region -- Machine Learning-powered Cloud-based Text Summarization -- Image Classification Using Few Shot Learning -- A Survey on Thyroid Nodule Detection and Classification -- XGBoost tuned by hybridized SCA metaheuristics for intrusion detection in healthcare 4.0 IoT systems -- Chaotic Biogeography Based Optimization using Deep Stacked Auto Encoder for Big DataClassification -- CigaretteCNN: A Convolutional neural network for detecting cigarette smoking activity -- Predicting Customer Churn in Subscriptio n-Based Enterprises Using Machine Learning -- Improved Edge Detection for Brain Tumor using Multi-Threading and Advanced Parallelism -- Impact of Artificial Intelligence on Investment: A Narrative Review -- Power Quality Conditioner with Hybrid Ant Colony Optimization -- Diagnosis of Early Cardiac Disease by Applying Machine Learning Algorithms -- Fault-Tolerant Mobile Agent System using eXtensible Volunteer Algorithm enabled Dynamic Role Based Access Control in a Conclave Environment -- Hyperparameter Tuning by Evolutionary Algorithm for Object Detection on Multimodal Satellite Imagery -- Comparative Examination of Credit Card Fraud Detection Using Machine Learning Algorithms -- Wagging Based Whale Optimization Algorithm To Enhance The Prediction of Intrusions In IoT Network -- Redefining Leadership in the Age of AI: Tools, Applications, and Limitations -- Happiness Index: Prediction with Machine Learning -- Malicious Domain Detection using Random Indexing and Machine Learning -- Multi Objective Neuro Evolution Based Xception For Fault Detection In Edge System -- Deep Neuro Evaluation With Stacked Auto Encoders Opimization For Biomedical Cancer Text Classification. |
Record Nr. | UNINA-9910845081903321 |
Asirvatham David | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IoT Based Control Networks and Intelligent Systems : Proceedings of 4th ICICNIS 2023 / / edited by P. P. Joby, Marcelo S. Alencar, Przemyslaw Falkowski-Gilski |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (XXIV, 793 p. 382 illus., 304 illus. in color.) |
Disciplina | 629.8 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Telecommunication
Automatic control Robotics Automation Computational intelligence Artificial intelligence Communications Engineering, Networks Control, Robotics, Automation Computational Intelligence Artificial Intelligence |
ISBN | 981-9965-86-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- A Comparative Analysis of ISLRS Using CNN and ViT -- 1 Introduction -- 2 Literatures -- 3 Methodology -- 3.1 Dataset -- 3.2 Custom CNN Model -- 3.3 Vision Transformer -- 4 Results and Discussion -- 5 Conclusion and Scope of Future Work -- References -- Vehicle Information Management System Using Hyperledger Fabric -- 1 Introduction -- 2 Existing Vehicle Registration System -- 3 Existing Techniques for Vehicle Registration Using Blockchain -- 4 Proposed Scheme -- 4.1 New Vehicle Registration -- 4.2 Query -- 4.3 Interstate Vehicle Transfer -- 5 Implementation -- 6 Result -- 6.1 Performance Evaluation of Query Smart Contract -- 6.2 Performance Evaluation of CreateVehicle() Smart Contract -- 6.3 Performance Evaluation of Transfer(): Smart Contract -- 7 Conclusion and Future Work -- References -- S-SCRUM-Methodology for Software Securitisation at Agile Development. Application to Smart University -- 1 Introduction -- 2 Security SCRUM -- 2.1 The Role of the Security Expert -- 2.2 Security Analysis Process -- 3 S-SCRUM in Smart University -- 3.1 Sprint Securitisation-APR-Publish API Rest -- 3.2 Results of Implementing S-SCRUM at Smart University -- 4 Contributions and Lessons Learned -- 5 Conclusions -- References -- Energy-Efficient Reliable Communication Routing Using Forward Relay Selection Algorithm for IoT-Based Underwater Networks -- 1 Introduction -- 2 Underwater Sensor Network Architecture, Key Issues, and Challenges -- 2.1 Power Consumption -- 2.2 High Propagation Delay -- 2.3 Low Security -- 2.4 Navigation -- 2.5 Multipath Weakening -- 2.6 Link Budget -- 2.7 Synchronization -- 2.8 Channel Utilization -- 3 Related Works -- 4 Proposed Methodology -- 5 Results and Discussion -- 6 Conclusion -- References -- Deep Learning Approach based Plant Seedlings Classification with Xception Model.
1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Data Preprocessing -- 4 Methods-Deep Pretrained Models -- 5 Results Analysis -- 5.1 Aarhus Dataset -- 5.2 Experimental Results -- 6 Performance Analysis on Aarhus Dataset -- 7 Conclusion -- References -- Improving Node Energy Efficiency in Wireless Sensor Networks (WSNs) Using Energy Efficiency-Based Clustering Adaptive Routing Scheme -- 1 Introduction -- 2 Related Works -- 3 Materials and Method -- 3.1 Node Initialization and Formation of Cluster -- 3.2 Influencing Cluster Routing Protocol -- 3.3 Time Energy Efficiency-Based Clustering Adaptive Routing Scheme (EECARS) -- 4 Result and Discussion -- 5 Conclusion -- References -- An Evaluation of Prediction Method for Educational Data Mining Based on Dimensionality Reduction -- 1 Introduction -- 2 Related Study -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Data Preprocessing -- 3.3 Implemented Model -- 3.4 Principal Component Analysis -- 3.5 Linear Discriminant Analysis -- 3.6 Logistic Regression -- 4 Experimental Result -- 4.1 Employing Different Algorithms for Comparison -- 5 Discussion -- 6 Conclusion and Future Work -- References -- High-Performance Intelligent System for Real-Time Medical Image Using Deep Learning and Augmented Reality -- 1 Introduction -- 2 Related Works -- 3 Dataset Description -- 4 Methodology -- 4.1 Convolutional Neural Network -- 4.2 Brain Hemorrhage -- 4.3 Eye Retinopathy -- 4.4 Architectural Diagram -- 5 Experiment -- 6 Results and Discussion -- 7 Conclusion -- 8 Future Work -- References -- Diabetic Retinopathy Detection Using Machine Learning Techniques and Transfer Learning Approach -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Machine Learning Techniques -- 3.4 Transfer Learning Techniques -- 4 Result Analysis -- 4.1 Binary Classification. 4.2 Multiclass Classification -- 5 Conclusion -- References -- Recommender System of Site Information Content for Optimal Display in Search Engines -- 1 Introduction -- 2 Review of Methods for Attracting New Customers Using Online Search Engines -- 3 Results and Discussion -- 4 Conclusions -- References -- Development of IoT-Based Vehicle Speed Infringement and Alcohol Consumption Detection System -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Working -- 4 Result Analysis -- 5 Conclusion -- References -- Phonocardiogram Identification Using Mel Frequency and Gammatone Cepstral Coefficients and an Ensemble Learning Classifier -- 1 Introduction -- 2 Materials and Method -- 2.1 Database -- 2.2 Preprocessing -- 3 Features Extraction -- 3.1 Mel Frequency Cepstral Coefficients MFCC -- 3.2 Gammatone Cepstral Coefficients GTCC -- 4 Classification -- 5 Results and Discussion -- 6 Conclusion -- References -- Automatic Conversion of Image Design into HTML and CSS -- 1 Introduction -- 2 Related Work -- 3 Tools for Creating and Converting the Design into Code -- 4 Converting Image Design into HTML/CSS -- 4.1 Step 1-Create a Graphic Design Mockup -- 4.2 Step 2-Convert a Graphic Design Mockup to HTML/CSS -- 5 Conclusion -- References -- Customizing Arduino LMiC Library Through LEAN and Scrum to Support LoRaWAN v1.1 Specification for Developing IoT Prototypes -- 1 Introduction -- 2 Methodology -- 3 Proposed Work -- 3.1 Identification -- 3.2 Planning -- 3.3 Execution -- 3.4 Review -- 4 Result Analysis -- 4.1 LoRaWAN v1.1 Class A OTAA Unconfirmed Uplinks -- 4.2 LoRaWAN v1.1 Class A ABP Confirmed Uplinks -- 4.3 LoRaWAN v1.1 Class A ABP Confirmed Downlinks -- 4.4 LoRaWAN v1.1 Key Persistence and Device Restart -- 4.5 LoRaWAN v1.0 Class A ABP Versus LoRaWAN v1.1 Class A ABP -- 5 Conclusions -- References. Prevention of Wormhole Attack Using Mobile Secure Neighbour Discovery Protocol in Wireless Sensor Networks -- 1 Introduction -- 2 Related Works -- 3 System Model -- 3.1 Threat Model -- 3.2 Problem Formulation -- 4 Proposed Method -- 4.1 Ranging -- 5 Security Analysis -- 6 Result and Discussion -- 7 Conclusion -- References -- Comparison of Feature Extraction Methods Between MFCC, BFCC, and GFCC with SVM Classifier for Parkinson's Disease Diagnosis -- 1 Introduction -- 2 Materials and Methods -- 2.1 Database -- 2.2 Feature Extraction Techniques -- 2.3 Classification Methods -- 2.4 The Proposed Algorithm -- 2.5 Evaluation Metrics -- 3 Results and Discussion -- 4 Conclusion -- References -- A Comprehensive Study on Artificial Intelligence-Based Face Recognition Technologies -- 1 Introduction -- 2 Related Work -- 3 Techniques Used -- 3.1 Deep Convolutional Neural Networks -- 3.2 Deep Face -- 3.3 VGG-Face -- 3.4 Capsule Networks -- 3.5 3D Face Recognition -- 3.6 Principal Component Analysis -- 3.7 Linear Discriminant Analysis -- 3.8 FaceNet -- 4 Proposed Model -- 4.1 Future Scope in Proposed Model -- 5 Application -- 6 Conclusion -- References -- Design of IoT-Based Smart Wearable Device for Human Safety -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Working -- 4 Result -- 5 Conclusion and Future Enhancement -- References -- Detection of Artery/Vein in Retinal Images Using CNN and GCN for Diagnosis of Hypertensive Retinopathy -- 1 Introduction -- 2 Related Work -- 2.1 Segmentation of Blood Vessels -- 2.2 Classification of Artery/Vein -- 2.3 Classification of HR -- 3 Proposed Method -- 3.1 Datasets -- 3.2 Preprocessing -- 3.3 Segmentation of Blood Vessels -- 3.4 Classification of Artery/Vein Using Graph Convolutional Network (GCN) -- 4 Computation of AVR -- 5 Grading of HR -- 6 Experiments and Results -- 6.1 Determine of Parameters. 6.2 Results and Discussion -- 7 Conclusion -- References -- An Evolutionary Optimization Based on Clustering Algorithm to Enhance VANET Communication Services -- 1 Introduction -- 1.1 VANET Overview -- 1.2 Various Optimization Techniques in VANET -- 1.3 Clustering Optimization -- 2 Related Research -- 3 Challenges -- 3.1 Clustering -- 4 Objective -- 5 Proposed Methodology of Honey Badger Algorithm in the VANET Approach -- 5.1 General Biology of the Honey Badger -- 5.2 Inspiration -- 5.3 Mathematical Framework -- 6 Performance Analysis Metrics -- 6.1 Packet Delivery Ratio (PDR) -- 6.2 End-to-End Delay -- 6.3 Network Overhead -- 6.4 Throughput -- 6.5 Energy Consumption -- 7 Result and Discussion -- 7.1 Experimental Setup -- 7.2 Performance Parameters for 1000 Iteration -- 7.3 Performance Parameters for 2000 Iterations -- 8 Conclusion -- References -- Visual Sentiment Analysis: An Analysis of Emotions in Video and Audio -- 1 Introduction -- 2 Literature Survey -- 3 Related Work -- 3.1 Facial Expression Recognition of FER-2013 -- 3.2 Micro-Classification of Facial Expression -- 4 Results Analysis -- 4.1 Prediction Test of Facial Expression -- 5 Future Scope -- 6 Conclusion -- References -- Design and Functional Implementation of Green Data Center -- 1 Introduction -- 2 Literature Reviews -- 2.1 Related Work -- 3 Proposed System -- 3.1 Architecture of Our Green Data Center -- 4 Algorithm -- 4.1 Power Management Algorithms -- 4.2 Cooling Management Algorithms -- 4.3 Load Balancing Algorithms -- 5 Math Model -- 5.1 Power Usages Effectiveness -- 5.2 Carbon Usages Effectiveness -- 5.3 Energy Reuse Factor -- 5.4 Carbon Utility -- 6 Performance Evaluation -- 6.1 Power Usages Effectiveness -- 6.2 Carbon Usages Effectiveness -- 6.3 Energy Reuse Factor -- 6.4 Limitations and Challenges -- 7 Conclusion -- References. Patient Pulse Rate and Oxygen Level Monitoring System Using IoT. |
Record Nr. | UNINA-9910766882703321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|