top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data Intelligence and Cognitive Informatics : Proceedings of ICDICI 2023
Data Intelligence and Cognitive Informatics : Proceedings of ICDICI 2023
Autore Jacob I. Jeena
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2024
Descrizione fisica 1 online resource (579 pages)
Altri autori (Persone) PiramuthuSelwyn
Falkowski-GilskiPrzemyslaw
Collana Algorithms for Intelligent Systems Series
ISBN 981-9979-62-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Automatic Sentence Classification: A Crucial Component of Sentiment Analysis -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization of Data -- 3.4 Algorithm Feeding -- 3.5 Best Model Selection -- 4 Result and Discussion -- 4.1 Statistical Analysis -- 4.2 Accuracy Graph -- 4.3 Confusion Matrix -- 4.4 Classification Report -- 5 Conclusion and Future Work -- References -- Real-Time Health Monitoring System of Patients on Utilizing Red Tacton -- 1 Introduction -- 2 Implementation -- 3 Proposed Methodology -- 4 Results -- 5 Conclusion -- References -- An Efficient Botnet Detection Using Machine Learning and Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Load Dataset -- 3.2 Data Pre-Processing -- 3.3 Feature Selection -- 3.4 Handling Class Imbalance -- 3.5 Partition Dataset in Training and Testing -- 3.6 Apply ML/DL Models -- 3.7 Bot Detection -- 3.8 Model Evaluation -- 4 Experiments and Results -- 5 Conclusion -- References -- Wavelet Selection for Novel MD5-Protected DWT-Based Double Watermarking and Image Hiding Algorithm -- 1 Introduction -- 2 Related Works -- 3 Methodology Used -- 3.1 Architecture of Proposed System -- 3.2 Watermark Embedder -- 3.3 Watermark Extractor -- 4 Experimental Results -- 4.1 Pseudorandomness in Watermark Embedding -- 4.2 Performance Evaluation Metrics -- 4.3 Selection of Wavelet -- 4.4 Watermark Embedding and Extraction -- 4.5 Image Hiding -- 5 Conclusion and Future Work -- References -- Chaotic Map Based Encryption Algorithm for Secured Medical Data Analytics -- 1 Introduction -- 2 Related Work -- 3 Existing Techniques -- 3.1 Algorithm -- 3.2 Cryptography -- 3.3 Encryption -- 3.4 Decryption -- 3.5 Key -- 3.6 Steganography -- 3.7 Symmetric Encryption.
4 Proposed Methodology -- 4.1 Secret Key Generation -- 4.2 Hahn's Discrete Orthogonal Moment -- 4.3 QR Code -- 4.4 Modified Logistic Map -- 5 Results and Discussions -- References -- Gold Price Forecast Using Variational Mode Decomposition-Aided Long Short-Term Model Tuned by Modified Whale Optimization Algorithm -- 1 Introduction -- 2 Background and Related Works -- 2.1 LSTM Overview -- 2.2 Variation Mode Decomposition Details -- 2.3 Metaheuristics Optimization -- 2.4 AI Applications for Gold Price Forecasting -- 3 Whale Optimization Algorithm -- 3.1 Elementary WOA -- 3.2 Proposed Improved WOA Algorithm Used in Time-Series Forecasting Framework -- 4 Experimental Setup -- 4.1 Results and Discussion -- 5 Conclusion -- References -- Requirements for a Career in Information Security: A Comprehensive Review -- 1 Introduction -- 2 Cybersecurity Foundation -- 2.1 Information Security Expertise -- 2.2 Duties and Tasks of an IS Professional -- 2.3 Job Nature and Requirements -- 3 Research Approach -- 3.1 Words Used to Search -- 3.2 Selection Criteria -- 3.3 Rejection Criteria -- 3.4 Data Gathering -- 3.5 Quality Appraisal -- 4 Results -- 5 Conclusion -- References -- Intrusion Detection Using Bloom and XOR Filters -- 1 Introduction -- 2 Literature Survey -- 3 NIDS Implementation Using Bloom Filter -- 4 NIDS Implementation Using XOR Filter -- 5 Experimental Results and Discussions -- 6 Conclusions and Future Work -- References -- A Model for Privacy-Preservation of User Query in Location-Based Services -- 1 Introduction -- 2 Related Work and Literature Survey -- 3 Methodology -- 4 Results -- 5 Conclusion -- 6 Future Work -- References -- A GPS Based Bus Tracking and Unreserved Ticketing System Using QR Based Verification and Validation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 System Architecture -- 5 System Functionality.
5.1 QR Code -- 5.2 Crowd Management -- 5.3 GPS Location -- 5.4 Automatic Ticket Expiry -- 5.5 Passenger Application -- 5.6 Conductor Application -- 6 Backend -- 6.1 Seat Availability -- 6.2 Passenger Information -- 6.3 Administrative Information -- 7 Conclusion and Future Scope -- References -- FileFox: A Blockchain-Based File Storage Using Ethereum and IPFS -- 1 Introduction -- 2 Background -- 2.1 Blockchain Storage -- 2.2 INFURA -- 2.3 Truffle -- 2.4 MetaMask -- 3 Related Work -- 4 Proposed System -- 5 Implementation -- 6 Result and Discussion -- 7 Conclusion and Future Scope -- References -- Minimizing Web Diversion Using Query Classification and Text Mining -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Feature Extraction -- 3.3 Semantic Matching -- 3.4 Web Query Classification -- 3.5 Machine Learning Models -- 3.6 Deep Learning Models -- 3.7 Evaluation Metrics -- 4 Results and Discussion -- 5 Future Scope -- 6 Conclusion -- References -- Connect: A Secure Approach for Collaborative Learning by Building a Social Media Platform -- 1 Introduction -- 1.1 Critical Characteristics of Social Media Are as Follows -- 1.2 Social Media Platforms -- 1.3 Need for Using Collaborative Learning -- 1.4 Challenges and Issues to Build Social Networking -- 1.5 Cloud Computing -- 1.6 Encryption -- 1.7 Importance of Social Media Platforms for Collaborative Learning -- 1.8 Advantages of Collaborative Learning for Faculty-To-Faculty Interaction -- 1.9 Security Concerns While Building a Social Media Platform -- 1.10 Conventional Threats -- 1.11 Modern Threats -- 1.12 Targeted Threats -- 1.13 Reasons Behind Online Social Media Security -- 2 Literature Review -- 2.1 Encryption Techniques Used -- 3 Summary of Literature Review -- 3.1 Importance of the Study.
3.2 The Opportunities that Will Be Provided Among the Users of the System Are as Follows -- 4 Proposed System -- 4.1 Proposed Algorithmic Process -- 5 Discussion -- 6 Conclusion -- References -- Smart Analytics System for Digital Farming -- 1 Introduction -- 2 Need for the Study -- 3 Related Works -- 4 Proposed Work -- 5 Conclusion -- References -- Sarcasm Detection for Marathi and the role of emoticons -- 1 Introduction -- 2 Related Work -- 3 Dataset and Annotation -- 3.1 Distribution of Tweets -- 3.2 Emoji Analysis -- 4 Pre-processing of Tweets -- 4.1 Cleaning of Tweets -- 4.2 Tokenization -- 5 Feature Extraction and Sarcasm Detection -- 5.1 Sentence Embedding Using Language Model -- 5.2 Embeddings for Emojis in the Tweet -- 6 Experiments and Result Analysis -- 7 Conclusion -- References -- Fleet Management Mobile Application Using GPS Shortest Path -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Modules -- 3.2 Algorithm Used -- 3.3 Database -- 4 Result and Discussion -- 5 Conclusions -- References -- Finger Vein Biometric System Based on Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Image Enhancement -- 3.2 Features Extraction -- 3.3 AES Encryption and Decryption -- 3.4 Convolution Neural Network -- 4 Result and Discussion -- 4.1 Image Enhancement -- 4.2 Feature Extraction -- 4.3 AES Encryption and Decryption -- 5 Conclusion -- References -- Embedding and Extraction of Data in Speech for Covert Communication -- 1 Introduction -- 2 Literature Survey -- 3 Existing Methodology -- 4 Proposed Methodology -- 5 Results and Evaluation -- 5.1 Results -- 5.2 Evaluation Metrics -- 6 Conclusion and Future Work -- References -- A Machine Learning Based Model for Classification of Customer Service's Email -- 1 Introduction -- 2 Problem Statement.
2.1 Shared Inboxes Fail in Managing the Emails as the Number Grows -- 3 Proposed Solution -- 3.1 Advantages of Email Multi-folder Categorization for Better Customer Support -- 3.2 Email with Multi-folder Categorization Works Well with a Database System -- 3.3 Work Together to Solve Problems at a Fast Pace -- 3.4 Provide Support in the 100% Context -- 3.5 Measure Individual Performance with Intuitive Reports -- 3.6 Architecture of Automatic Classification of Email -- 4 Research Methodology -- 4.1 Classification of Email Using the Technique of Machine Learning -- 4.2 Machine Learning Terminologies Used in Classification -- 4.3 Support Vector Machine -- 4.4 Advantages and Disadvantages for Using Support Vector Machine -- 4.5 Validation Tool/Dataset Used -- 5 Results -- 6 Conclusion -- 7 Limitations and Future Scope -- References -- Intelligent Identification and Multiclass Segmentation of Agricultural Crops Problem Areas by Neural Network Methods -- 1 Introduction -- 2 Methods and Materials -- 3 Results and Discussion -- 3.1 Justification of the Segmentation DNN Architecture -- 3.2 Learning Outcomes Developed by DNN -- 3.3 Discussion of the Results -- 4 Conclusions -- References -- Perishable Products: Enhancing Delivery Time Efficiency with Big Data, AI, and IoT -- 1 Introduction -- 2 Delivery Time in Our Context -- 2.1 Optimizing Delivery Time in Transportation: Exploring Algorithmic Approaches -- 2.2 Objective -- 2.3 Advantage -- 2.4 Challenger -- 2.5 Delivery Time Description -- 3 The Proposed Optimization -- 3.1 Model System -- 3.2 The Proposed Optimization for Delivery Time -- 3.3 Specification Parameter -- 4 Optımızatıon Results Analysis -- 4.1 Comparing CT with Integrated Recent Transportation Technologies -- 4.2 Evaluation and Comparison of Optimization Results -- 5 Conclusion -- References -- CNN Approach for Identification of Medicinal Plants.
1 Introduction.
Record Nr. UNINA-9910799231503321
Jacob I. Jeena  
Singapore : , : Springer Singapore Pte. Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Evolutionary Artificial Intelligence : Proceedings of ICEAI 2023
Evolutionary Artificial Intelligence : Proceedings of ICEAI 2023
Autore Asirvatham David
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (563 pages)
Disciplina 006.3
Altri autori (Persone) Gonzalez-LongattFrancisco M
Falkowski-GilskiPrzemyslaw
KanthavelR
Collana Algorithms for Intelligent Systems Series
ISBN 981-9984-38-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910845081903321
Asirvatham David  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IoT Based Control Networks and Intelligent Systems : Proceedings of 4th ICICNIS 2023 / / P. P. Joby, Marcelo S. Alencar, and Przemyslaw Falkowski-Gilski, editors
IoT Based Control Networks and Intelligent Systems : Proceedings of 4th ICICNIS 2023 / / P. P. Joby, Marcelo S. Alencar, and Przemyslaw Falkowski-Gilski, editors
Edizione [First edition.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore Pte Ltd., , [2024]
Descrizione fisica 1 online resource (XXIV, 793 p. 382 illus., 304 illus. in color.)
Disciplina 629.8
Collana Lecture Notes in Networks and Systems Series
Soggetto topico Intelligent control systems
Internet of things
ISBN 981-9965-86-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- A Comparative Analysis of ISLRS Using CNN and ViT -- 1 Introduction -- 2 Literatures -- 3 Methodology -- 3.1 Dataset -- 3.2 Custom CNN Model -- 3.3 Vision Transformer -- 4 Results and Discussion -- 5 Conclusion and Scope of Future Work -- References -- Vehicle Information Management System Using Hyperledger Fabric -- 1 Introduction -- 2 Existing Vehicle Registration System -- 3 Existing Techniques for Vehicle Registration Using Blockchain -- 4 Proposed Scheme -- 4.1 New Vehicle Registration -- 4.2 Query -- 4.3 Interstate Vehicle Transfer -- 5 Implementation -- 6 Result -- 6.1 Performance Evaluation of Query Smart Contract -- 6.2 Performance Evaluation of CreateVehicle() Smart Contract -- 6.3 Performance Evaluation of Transfer(): Smart Contract -- 7 Conclusion and Future Work -- References -- S-SCRUM-Methodology for Software Securitisation at Agile Development. Application to Smart University -- 1 Introduction -- 2 Security SCRUM -- 2.1 The Role of the Security Expert -- 2.2 Security Analysis Process -- 3 S-SCRUM in Smart University -- 3.1 Sprint Securitisation-APR-Publish API Rest -- 3.2 Results of Implementing S-SCRUM at Smart University -- 4 Contributions and Lessons Learned -- 5 Conclusions -- References -- Energy-Efficient Reliable Communication Routing Using Forward Relay Selection Algorithm for IoT-Based Underwater Networks -- 1 Introduction -- 2 Underwater Sensor Network Architecture, Key Issues, and Challenges -- 2.1 Power Consumption -- 2.2 High Propagation Delay -- 2.3 Low Security -- 2.4 Navigation -- 2.5 Multipath Weakening -- 2.6 Link Budget -- 2.7 Synchronization -- 2.8 Channel Utilization -- 3 Related Works -- 4 Proposed Methodology -- 5 Results and Discussion -- 6 Conclusion -- References -- Deep Learning Approach based Plant Seedlings Classification with Xception Model.
1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Data Preprocessing -- 4 Methods-Deep Pretrained Models -- 5 Results Analysis -- 5.1 Aarhus Dataset -- 5.2 Experimental Results -- 6 Performance Analysis on Aarhus Dataset -- 7 Conclusion -- References -- Improving Node Energy Efficiency in Wireless Sensor Networks (WSNs) Using Energy Efficiency-Based Clustering Adaptive Routing Scheme -- 1 Introduction -- 2 Related Works -- 3 Materials and Method -- 3.1 Node Initialization and Formation of Cluster -- 3.2 Influencing Cluster Routing Protocol -- 3.3 Time Energy Efficiency-Based Clustering Adaptive Routing Scheme (EECARS) -- 4 Result and Discussion -- 5 Conclusion -- References -- An Evaluation of Prediction Method for Educational Data Mining Based on Dimensionality Reduction -- 1 Introduction -- 2 Related Study -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Data Preprocessing -- 3.3 Implemented Model -- 3.4 Principal Component Analysis -- 3.5 Linear Discriminant Analysis -- 3.6 Logistic Regression -- 4 Experimental Result -- 4.1 Employing Different Algorithms for Comparison -- 5 Discussion -- 6 Conclusion and Future Work -- References -- High-Performance Intelligent System for Real-Time Medical Image Using Deep Learning and Augmented Reality -- 1 Introduction -- 2 Related Works -- 3 Dataset Description -- 4 Methodology -- 4.1 Convolutional Neural Network -- 4.2 Brain Hemorrhage -- 4.3 Eye Retinopathy -- 4.4 Architectural Diagram -- 5 Experiment -- 6 Results and Discussion -- 7 Conclusion -- 8 Future Work -- References -- Diabetic Retinopathy Detection Using Machine Learning Techniques and Transfer Learning Approach -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Machine Learning Techniques -- 3.4 Transfer Learning Techniques -- 4 Result Analysis -- 4.1 Binary Classification.
4.2 Multiclass Classification -- 5 Conclusion -- References -- Recommender System of Site Information Content for Optimal Display in Search Engines -- 1 Introduction -- 2 Review of Methods for Attracting New Customers Using Online Search Engines -- 3 Results and Discussion -- 4 Conclusions -- References -- Development of IoT-Based Vehicle Speed Infringement and Alcohol Consumption Detection System -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Working -- 4 Result Analysis -- 5 Conclusion -- References -- Phonocardiogram Identification Using Mel Frequency and Gammatone Cepstral Coefficients and an Ensemble Learning Classifier -- 1 Introduction -- 2 Materials and Method -- 2.1 Database -- 2.2 Preprocessing -- 3 Features Extraction -- 3.1 Mel Frequency Cepstral Coefficients MFCC -- 3.2 Gammatone Cepstral Coefficients GTCC -- 4 Classification -- 5 Results and Discussion -- 6 Conclusion -- References -- Automatic Conversion of Image Design into HTML and CSS -- 1 Introduction -- 2 Related Work -- 3 Tools for Creating and Converting the Design into Code -- 4 Converting Image Design into HTML/CSS -- 4.1 Step 1-Create a Graphic Design Mockup -- 4.2 Step 2-Convert a Graphic Design Mockup to HTML/CSS -- 5 Conclusion -- References -- Customizing Arduino LMiC Library Through LEAN and Scrum to Support LoRaWAN v1.1 Specification for Developing IoT Prototypes -- 1 Introduction -- 2 Methodology -- 3 Proposed Work -- 3.1 Identification -- 3.2 Planning -- 3.3 Execution -- 3.4 Review -- 4 Result Analysis -- 4.1 LoRaWAN v1.1 Class A OTAA Unconfirmed Uplinks -- 4.2 LoRaWAN v1.1 Class A ABP Confirmed Uplinks -- 4.3 LoRaWAN v1.1 Class A ABP Confirmed Downlinks -- 4.4 LoRaWAN v1.1 Key Persistence and Device Restart -- 4.5 LoRaWAN v1.0 Class A ABP Versus LoRaWAN v1.1 Class A ABP -- 5 Conclusions -- References.
Prevention of Wormhole Attack Using Mobile Secure Neighbour Discovery Protocol in Wireless Sensor Networks -- 1 Introduction -- 2 Related Works -- 3 System Model -- 3.1 Threat Model -- 3.2 Problem Formulation -- 4 Proposed Method -- 4.1 Ranging -- 5 Security Analysis -- 6 Result and Discussion -- 7 Conclusion -- References -- Comparison of Feature Extraction Methods Between MFCC, BFCC, and GFCC with SVM Classifier for Parkinson's Disease Diagnosis -- 1 Introduction -- 2 Materials and Methods -- 2.1 Database -- 2.2 Feature Extraction Techniques -- 2.3 Classification Methods -- 2.4 The Proposed Algorithm -- 2.5 Evaluation Metrics -- 3 Results and Discussion -- 4 Conclusion -- References -- A Comprehensive Study on Artificial Intelligence-Based Face Recognition Technologies -- 1 Introduction -- 2 Related Work -- 3 Techniques Used -- 3.1 Deep Convolutional Neural Networks -- 3.2 Deep Face -- 3.3 VGG-Face -- 3.4 Capsule Networks -- 3.5 3D Face Recognition -- 3.6 Principal Component Analysis -- 3.7 Linear Discriminant Analysis -- 3.8 FaceNet -- 4 Proposed Model -- 4.1 Future Scope in Proposed Model -- 5 Application -- 6 Conclusion -- References -- Design of IoT-Based Smart Wearable Device for Human Safety -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Working -- 4 Result -- 5 Conclusion and Future Enhancement -- References -- Detection of Artery/Vein in Retinal Images Using CNN and GCN for Diagnosis of Hypertensive Retinopathy -- 1 Introduction -- 2 Related Work -- 2.1 Segmentation of Blood Vessels -- 2.2 Classification of Artery/Vein -- 2.3 Classification of HR -- 3 Proposed Method -- 3.1 Datasets -- 3.2 Preprocessing -- 3.3 Segmentation of Blood Vessels -- 3.4 Classification of Artery/Vein Using Graph Convolutional Network (GCN) -- 4 Computation of AVR -- 5 Grading of HR -- 6 Experiments and Results -- 6.1 Determine of Parameters.
6.2 Results and Discussion -- 7 Conclusion -- References -- An Evolutionary Optimization Based on Clustering Algorithm to Enhance VANET Communication Services -- 1 Introduction -- 1.1 VANET Overview -- 1.2 Various Optimization Techniques in VANET -- 1.3 Clustering Optimization -- 2 Related Research -- 3 Challenges -- 3.1 Clustering -- 4 Objective -- 5 Proposed Methodology of Honey Badger Algorithm in the VANET Approach -- 5.1 General Biology of the Honey Badger -- 5.2 Inspiration -- 5.3 Mathematical Framework -- 6 Performance Analysis Metrics -- 6.1 Packet Delivery Ratio (PDR) -- 6.2 End-to-End Delay -- 6.3 Network Overhead -- 6.4 Throughput -- 6.5 Energy Consumption -- 7 Result and Discussion -- 7.1 Experimental Setup -- 7.2 Performance Parameters for 1000 Iteration -- 7.3 Performance Parameters for 2000 Iterations -- 8 Conclusion -- References -- Visual Sentiment Analysis: An Analysis of Emotions in Video and Audio -- 1 Introduction -- 2 Literature Survey -- 3 Related Work -- 3.1 Facial Expression Recognition of FER-2013 -- 3.2 Micro-Classification of Facial Expression -- 4 Results Analysis -- 4.1 Prediction Test of Facial Expression -- 5 Future Scope -- 6 Conclusion -- References -- Design and Functional Implementation of Green Data Center -- 1 Introduction -- 2 Literature Reviews -- 2.1 Related Work -- 3 Proposed System -- 3.1 Architecture of Our Green Data Center -- 4 Algorithm -- 4.1 Power Management Algorithms -- 4.2 Cooling Management Algorithms -- 4.3 Load Balancing Algorithms -- 5 Math Model -- 5.1 Power Usages Effectiveness -- 5.2 Carbon Usages Effectiveness -- 5.3 Energy Reuse Factor -- 5.4 Carbon Utility -- 6 Performance Evaluation -- 6.1 Power Usages Effectiveness -- 6.2 Carbon Usages Effectiveness -- 6.3 Energy Reuse Factor -- 6.4 Limitations and Challenges -- 7 Conclusion -- References.
Patient Pulse Rate and Oxygen Level Monitoring System Using IoT.
Record Nr. UNINA-9910766882703321
Singapore : , : Springer Nature Singapore Pte Ltd., , [2024]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui