top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Big Data and Cloud Computing [[electronic resource] ] : Select Proceedings of ICBCC 2022 / / edited by Neelanarayanan Venkataraman, Lipo Wang, Xavier Fernando, Ahmed F. Zobaa
Big Data and Cloud Computing [[electronic resource] ] : Select Proceedings of ICBCC 2022 / / edited by Neelanarayanan Venkataraman, Lipo Wang, Xavier Fernando, Ahmed F. Zobaa
Autore Venkataraman Neelanarayanan
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (383 pages)
Disciplina 620.00285
Altri autori (Persone) WangLipo
FernandoXavier
ZobaaAhmed F
Collana Lecture Notes in Electrical Engineering
Soggetto topico Engineering - Data processing
Computational intelligence
Big data
Data protection
Mobile computing
Data Engineering
Computational Intelligence
Big Data
Data and Information Security
Mobile Computing
ISBN 981-9910-51-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Architecture -- 2. MapReduce -- 3. Security and Privacy -- 4. Services and Applications -- 5. Virtualization. .
Record Nr. UNINA-9910731487203321
Venkataraman Neelanarayanan  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 [[electronic resource] /] / edited by Jude Hemanth, Xavier Fernando, Pavel Lafata, Zubair Baig
International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 [[electronic resource] /] / edited by Jude Hemanth, Xavier Fernando, Pavel Lafata, Zubair Baig
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (1,636 pages)
Disciplina 006.3
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
ISBN 3-030-03146-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security Effect on AES in Terms of Avalanche Effect by using Alternate S-Box -- Enhanced Portable Customer Experience Using Community Computation in Offline Retail -- Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization -- A Study on Cross-Layer TCP Performance in Wireless Ad Hoc Network -- Hyper Elliptic Curve based Homomorphic Encryption Scheme for Cloud Data Security -- Support Vector Neural Network and Principal Component Analysis for Fault Diagnosis of Analog Circuits -- Performance Evaluation of Symmetric Block Cipher RC6 with ECB and CBC Operation Modes -- An Improved Block-based Motion Estimation Algorithm for Compressing a Video -- Hierarchical View on Detection of Attacks in Closed Loop Control Systems -- Facial Expression Recognition System for Visually Impaired -- A Systematic Mapping Study of Content Based Filtering Recommender Systems -- Named Entity Recognition in Marathi Language -- Self Configurable Air Pollution Monitoring System Using IoT and Data Mining Techniques -- Novel Defence Scheme for Phishing Attacks in Mobile Phones -- New Automated Vehicle Crash Avoidance System Based on Dipping and RF Techniques.
Record Nr. UNINA-9910484092303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB) [[electronic resource] /] / edited by Durai Pandian, Xavier Fernando, Zubair Baig, Fuqian Shi
Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB) [[electronic resource] /] / edited by Durai Pandian, Xavier Fernando, Zubair Baig, Fuqian Shi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (1,868 pages)
Disciplina 006.37
Collana Lecture Notes in Computational Vision and Biomechanics
Soggetto topico Biomedical engineering
Image processing - Digital techniques
Computer vision
Biotechnology
Biomedical Engineering and Bioengineering
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-030-00665-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Digital Image Watermarking using Sine Transformation Technique -- Chapter 2. A Review on Protein Structure Classification -- Chapter 3. Motion Detection Algorithm for Surveillance Videos -- Chapter 4. 6D Pose Estimation of 3D Objects in Scenes with Mutual Similarities and Occlusions -- Chapter 5. A Simple and Enhanced Low-Light Image Enhancement Process Using Effective Illumination Mapping Approach -- Chapter 6. Comparison of Particle Swarm Optimization and Weighted Artificial Bee Colony Techniques in Classification of Dementia Using MRI Images -- Chapter 7. Automatic Segmentation of Malaria Affected Erythrocyte in Thin Blood Films -- Chapter 8. Enhanced Portable Customer Experience Using Community Computation in Offline Retail -- Chapter 9. Detection and Recognition Of Vehicle Using Principal Component Analysis -- Chapter 10. Convolution Neural Networks: A Case Study on Brain Tumor Segmentation in Medical Care -- Chapter 11. Vision based algorithm for fire detection in smart buildings -- Chapter 12. Comparative performance analysis of local feature descriptors for biomedical image retrieval -- Chapter 13. Emotion Analysis Through EEG & Peripheral Physiological Signals Using KNN Classifier -- Chapter 14. Detection Of Liver Tumor Using Gradient Vector Flow Algorithm -- Chapter 15. Hyperspectral Image Classification using Semisupervised Random Forest -- Chapter 16. Clustering of various parameters to catalog human bone disorders through soft computing simulation -- Chapter 17. IoT Based Embedded Smart Lock Control using Face Recognition System -- Chapter 18. MediCloud: Cloud-based solution to patient’s medical records -- Chapter 19. A Trio Approach Satisfying CIA Triad for Medical Image Security -- Chapter 20. A Novel Hybrid Method for Time Series Forecasting Using Soft Computing Approach -- Chapter 21. Medical Image Classification Using MRI: An Investigation -- Chapter 22. Tumor Detection and Analysis using Improved Fuzzy C-Means Algorithm -- Chapter 23. MediCloud: Cloud-based solution to patient’s medical records -- Chapter 24. Enhancement of Optical Coherence Tomography Images: An Iterative Approach Using Various Filters -- Chapter 25. An o -- Chapter 26. the Shelf CNN Features based approach for Vehicle Classication using Acoustics -- Chapter 27. Conjunctival Vasculature liveness detection based on DCT Features -- Chapter 28. Unusual Social Event Detection by Analyzing Call Data Records -- Chapter 29. Long Short Term Memory based Recurrent Neural Network approach for intrusion detection -- Chapter 30. Drunk Driving and Drowsiness Detection Alert System -- Chapter 31. A Survey on Intelligent Face Recognition System -- Chapter 32. Real Time Health Monitoring System Implemented on a Bicycle -- Chapter 33. A Fuzzy Rule based Diagnosis of Parkinson’s Disease -- Chapter 34. A Comprehensive Study of Retinal Vessel Classification Methods in Fundus Images for detection of Hyper-tensive Retinopathy and Cardiovascular diseases -- Chapter 35. Estimation of parameters to model a fabric in a way to identify defects -- Chapter 36. Hybrid Method For Copy-Move Forgery Detection In Digital Images -- Chapter 37. Error Detection Technique For A Median Filter Using Denoising Algorithm -- Chapter 38. Retinal Image Processing and Classification using Convolutional Neural Networks -- Chapter 39. Comparison of Thermography and 3D Mammography Screening and Classification Techniques for Breast Cancer -- Chapter 40. IEFA- A Fuzzy Framework for Image Enrichment -- Chapter 41. Hidden Markov Random Field and Gaussian Mixture Model based Hidden Markov Random Field for Contour Labelling of Exudates in Diabetic Retinopathy-A Comparative Study -- Chapter 42. AUGEN: An Ocular Support for Visually Impaired Using Deep Learning -- Chapter 43. A Novel Flight Controller Interface for Vision Guided Autonomous Drone -- Chapter 44. Sliding Discrete Fourier Transform for 2D Signal Processing -- Chapter 45. Automated Lung Nodules And Ground Glass Opacity Nodules Detection And Classification From Computed Tomography Images -- Chapter 46. Detection Of Static And Dynamic Abnormal Activities In Crowded Areas Using Hybrid Clustering -- Chapter 47. Gait Recognition using Normal Distance Map and Sparse Multilinear Laplacian Discriminant Analysis -- Chapter 48. A Review – Edge Detection Techniques in Dental Images -- Chapter 49. Detection of Exudates and Removal of Optic Disc in Fundus Images Using Genetic Algorithm -- Chapter 50. Analysis of Feature Ranking Methods on X-ray Images -- Chapter 51. Salient Object Detection for Synthetic Dataset -- Chapter 52. Atherosclerotic Plaque Detection Using Intra-Vascular Ultrasound (IVUS) Images. -- Chapter 53. Correlative Feature Selection for Multimodal Medical Image Fusion through QWT -- Chapter 54. A Two Stage Validation Approach for Early Detection of Proliferative Diabetic Retinopathy in Neovascularization at the Disc by Observing Retinal Vascular Structure -- Chapter 55. Finding Center of Optic Disc from Fundus Images for Image Characterization and Analysis -- Chapter 56. A Robust Method for Image Copy Move Passive Forgery Detection with Enhanced Speed -- Chapter 57. Detection of Objects and Evaluation with The IO Link Using Miniature Laser Sensor -A Review -- Chapter 58. Development of Medical Image Segmentation Algorithms using Deformable Models -- Chapter 59. Feature Extraction and Classification of Epileptic EEG signals using Wavelet transforms and Artificial Neural Networks -- Chapter 60. 3D Printed Surgical Guides in Orthoganthic Surgery- A Pathway to Positive Surgical Outcomes -- Chapter 61. Image-Based Method for Analysis of Root Canal Geometry -- Chapter 62. Analysis of Explicit Parallelism of Image Pre-Processing Algorithms A Case Study -- Chapter 63. A Comprehensive Study on Character Segmentation -- Chapter 64. Framework For Image Forgery Detection And Classification Using Machine Learning -- Chapter 65. EZW, SPIHT and WDR Methods for CT Scan and X-Ray Images Compression Applications -- Chapter 66. Human Identification based on Ear Image Contour and it’s Properties -- Chapter 67. Defocus Map Based Segmentation of Automotive Vehicles -- Chapter 68. Multi-Insight Monocular Vision System using a Refractive Projection Model -- Chapter 69. Comparative Study and Analysis of Pulse Rate Measurement by Vowel Speech and EVM -- Chapter 70. ONESTOP:A Tool for Performing Generic Operations With Visual Support -- Chapter 71. Performance evaluation of DCT, DWT and SPIHT techniques for Medical Image Compression -- Chapter 72. Structural Health Monitoring –An Integrated Approach for Vibration Analysis with Wireless Sensors to Steel Structure using Image Processing -- Chapter 73. An Improved image pre-processing method for concrete crack detection -- Chapter 74. Grape crop disease classification using transfer learning approach -- Chapter 75. Exploring Image Classification of Thyroid Ultrasound Images using Deep Learning -- Chapter 76. Medical Applications of Additive Manufacturing -- Chapter 77. A Study on Comparative Analysis of Automated and Semi automated Segmentation Techniques on Knee Osteoarthritis X-Ray Radiographs -- Chapter 78. Plant Disease Detection Based on Region Based Segmentation and KNN Classifier -- Chapter 79. Analyzing e-CALLISTO Images: Sunspot Number, 10.7 cm Flux and Radio Solar Bursts -- Chapter 80. Real Time Input Text Recognition System For The Aid Of Visually Impaired -- Chapter 81. A homogenous prototype design for IED detection using subsurface Ground Penetrating RADAR -- Chapter 82. A study on various Deep Learning Algorithms to diagnose Alzheimer’s disease -- Chapter 83. Performance Analysis of Image Enhancement Techniques for Mammogram Images -- Chapter 84. A Study on Preprocessing Techniques for Ultra Sound Images of Carotid Artery -- Chapter 85. Fractional Reaction Diffusion Model for Parkinson’s Disease -- Chapter 86. Analysis Of A Novel Algorithm For Steganography Using Openexr Image As Cover -- Chapter 87. Prediction-based Lossless Image Compression -- Chapter 88. Audio and Video Streaming in Telepresence application using WebRTC for Healthcare System -- Chapter 89. Review on Image Segmentation Techniques Incorporated with Machine Learning in the Scrutinization of Leukemic Microscopic Stained Blood Smear Images -- Chapter 90. Detection of Gaze Direction for Human-Computer Interaction -- Chapter 91. Compromising Cloud Security and Privacy by DOS, DDOS, Botnet Attacks and their countermeasures -- Chapter 92. Road Detection by Boundary Extraction Technique and Hough Transform -- Chapter 93. Investigating the Impact of Various Feature Selection Techniques on the Attributes used in the Diagnosis of Alzheimer’s Disease -- Chapter 94. Detection Of Sleep Apnea Based On Hrv Analysis Of Ecg Signal -- Chapter 95. Performance Comparison of SVM Classifier based on Kernel Functions in Colposcopic image Segmentation for Cervical Cancer -- Chapter 96. GPU based Denoising Filter for Knee MRI -- Chapter 97. Performance Evaluation of Audio Watermarking Algorithms using DWT and LFSR -- Chapter 98. Biometric Image Encryption Algorithm Based on Modified Rubik’s Cube Principle -- Chapter 99. A Comprehensive Study on Character Segmentation -- Chapter 100. Leaf Disease Detection Based On Machine Learning -- Chapter 101. Cross Domain Recommendation System using Ontology and Sequential Pattern Mining -- Chapter 102. A New Automated Medicine Prescription System for Plant Diseases -- Chapter 103. Identifying the risk factors for Diabetic Retinopathy using Decision Tree -- Chapter 104. Logarithmic Transform based Digital Watermarking Scheme -- Chapter 105. A comparative assessment of segmentations on skin lesion through various entropy and six sigma thresholds -- Chapter 106. Impact of Speckle Filtering on the Decomposition and Classification of Fully Polarimetric RADARSAT-2 Data -- Chapter 107. Estimation of Precipitation from the Doppler Weather Radar Images -- Chapt.
Record Nr. UNINA-9910337641403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Soft Computing for Security Applications : Proceedings of ICSCS 2021
Soft Computing for Security Applications : Proceedings of ICSCS 2021
Autore Ranganathan G
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (944 pages)
Altri autori (Persone) FernandoXavier
ShiFuqian
El AlliouiYoussouf
Collana Advances in Intelligent Systems and Computing Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-5301-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Facial Image Denoising and Reconstruction -- 1 Introduction -- 2 Related Work -- 2.1 Image Denoising -- 2.2 Image Outpainting -- 3 Dataset -- 3.1 Description -- 3.2 Preprocessing -- 4 Methodology -- 4.1 Image Denoising -- 4.2 Image Reconstruction -- 5 Metrics -- 6 Model Architecture -- 6.1 Image Denoising -- 6.2 Image Reconstruction -- 7 Results -- 7.1 Image Denoising -- 8 Conclusion -- 9 Future Works -- References -- One Method for RC5 Algorithm's Cryptographic Strength Improving -- 1 Introduction -- 2 Priming the Modification to the RC5 Algorithm -- 2.1 Nonlinear Functions to Improve RC5 Cryptocurrency -- 2.2 Obtained Results of Improved RC5 Algorithm Operation -- 3 Cryptoresistance Evaluation of the RC5 Algorithm Improving -- 3.1 Cryptanalytic Stability Evaluation -- 3.2 Determination of Additional Bits When Encoding in a Crypto Algorithm -- 3.3 Simple Search Cryptanalysis (Brute Force) -- 4 Conclusion -- References -- Multiclass Classification of Firewall Log Files Using Shallow Neural Network for Network Security Applications -- 1 Introduction -- 2 Dataset of Internet Firewall -- 3 Action Classification System Internet Firewall -- 4 Development and Experimental Environment -- 5 Results and Discussion -- 6 Conclusions -- References -- On the Possibility of Evasion Attacks with Macro Malware -- 1 Introduction -- 2 Related Work -- 2.1 Detection with Machine Learning -- 2.2 Evasion for Machine Learning-Based Detection -- 2.3 Evasion for Natural Languages -- 3 Background -- 3.1 Bag of Words (BoW) -- 3.2 Latent Semantic Indexing (LSI) -- 4 Proposed Method -- 4.1 Outline -- 4.2 Training Process -- 4.3 Evasion Process -- 4.4 Replacing Method -- 4.5 Inserting Method -- 4.6 Implementation -- 5 Experiment -- 5.1 Dataset -- 5.2 Outline -- 5.3 The Effect of the Replacing Method.
5.4 The Effect of the Simple Inserting Method -- 5.5 The Effect of the Modified Inserting Method -- 5.6 Optimizing the Number of LSI Topics -- 6 Discussion -- 6.1 The Risk of Evasion Attacks with VBA Malware -- 6.2 Resilience to the Attacks -- 6.3 Countermeasure Against Evasion Attacks -- 6.4 Limitation of This Study -- 6.5 Ethics of This Study -- 7 Conclusion -- References -- IoT-Based Smart Crop Field Monitoring and Protection System from Heavy Rainfall Utilizing Raspberry Pi -- 1 Introduction -- 2 Literature Survey -- 3 Existing System -- 4 Proposed System -- 5 Results and Discussion -- 6 Conclusion -- References -- A Systematic Review of Adoption of Blockchain and Machine Learning Technology and Its Application -- 1 Introduction -- 2 Research Methodology -- 2.1 Definition of Research Questions -- 2.2 Descriptive Analysis -- 2.3 Result -- 3 Blockchain Application -- 3.1 Blockchain Impact on Various Sectors -- 3.2 Ongoing Projects on Blockchain Technology -- 4 Conclusion -- References -- Review of Malicious URL Detection Using Machine Learning -- 1 Introduction -- 2 Background Study -- 3 Related Works -- 4 Observed Issues -- 5 Research Challenges -- 6 Conclusion -- References -- Securing IoT Using Artificial Intelligence and Feature Engineering -- 1 Introduction -- 2 Related Work -- 3 Botnet and Types of IoT botnet -- 4 Dataset -- 5 Proposed Methodology -- 6 Results and Discussion -- 7 Conclusion -- References -- A Novel Framework for NIDS Using Stacked Ensemble Learning -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 3.1 Framework -- 3.2 Stacking Method -- 4 Experimental Setup -- 4.1 Dataset Description -- 4.2 Performance Metrics -- 5 Results and Discussion -- 6 Conclusion -- References -- Butterfly Algorithm Boosted Deep Random Vector Functional Link Network for Keystroke Dynamics -- 1 Introduction -- 2 Related Work -- 3 Background.
3.1 Keystroke Vector -- 3.2 Artificial Neural Network -- 3.3 Multilayer Perceptron -- 3.4 Deep Neural Network -- 4 Methodology: Butterfly Optimization Boosted Deep Random Vector Functional Link Network for Prediction of Continuous Keystroke Dynamic Authentication -- 4.1 Overall Architecture -- 4.2 Random Vector Functional Link Network (RVFLN) -- 4.3 Deep Random Vector Functional Link Network -- 4.4 Butterfly Optimization Algorithm (BOA) -- 5 Results and Discussions -- 6 Conclusion -- References -- Hybrid Context-Aware Recommendation System Using Deep Autoencoder -- 1 Introduction -- 2 Preliminaries -- 2.1 Collaborative Filtering -- 2.2 Deep Autoencoders -- 3 Related Works -- 4 Model -- 5 Experiments and Results -- 5.1 Dataset -- 5.2 Experimental Setup -- 5.3 Side Information -- 5.4 Impact of Contextual Information -- 5.5 Impact of Different Activation Function and Increasing the No. of Layers -- 5.6 Impact of Different Activation Type and no. Of Layers -- 6 General Results -- 7 Conclusion -- References -- Exploration and Implementation of RSA-KEM Algorithm -- 1 Introduction -- 2 RSA (Rivest, Shamir, Adleman) Algorithm -- 2.1 Algorithm -- 2.2 Primality Testing of a Number -- 3 RSA-KEM (Rivest, Shamir, Adleman-Key Encapsulation Mechanism) Algorithm -- 3.1 Algorithm -- 3.2 Password-Based Key Derivation Function (PBKDF) -- 3.3 Advanced Encryption Standard (AES) -- 4 Results -- 5 Conclusions -- References -- Botnet Attack Detection Using Machine Learning Algorithm Integrated With Ensemble Algorithm -- 1 Introduction -- 2 Review of the Literature -- 3 Proposed Botnet Attack Detectıon Method -- 3.1 Machine Learning Model -- 3.2 Ensemble Classifier Model -- 4 Result and Analysis -- 5 Conclusion -- References -- Artificial Intelligence-Based Automation System for Health Care Applications: Medbot -- 1 Introduction -- 2 Experimental Workflow Analysis.
3 Module Description -- 3.1 Data Collection -- 3.2 Preprocessing -- 3.3 Intent Identification -- 3.4 Response Selection -- 3.5 Suggestions and Dialogue Management -- 4 Implementation and Result -- 4.1 Validation Process -- 5 Conclusion -- References -- An Approach for Maintaining Safety at Work Places During the COVID-19 Pandemic Using Deep Learning and Contact Tracing Applications -- 1 Introduction -- 2 Literature Survey -- 3 System Description -- 3.1 Data Collection -- 3.2 Classification Model: YOLOv3 Algorithm -- 3.3 Web site and Contact Tracing Application Along with Multipurpose Wearable -- 4 Results and Analysis -- 5 Conclusion -- References -- Online Certificate Generation and Verification Using Blockchain Framework -- 1 Introduction -- 2 Preliminary Concept -- 2.1 Blockchain -- 2.2 Ethereum -- 2.3 SVG-Scalar Vector Graphics -- 3 Literature Survey -- 3.1 Shanmuga Priya R, Swetha N ``Online Certificate Validation Using Blockchain'' ch16b6 -- 3.2 Nitin Kumavat, Swapnil Mengade, Dishant Desai, JesalVarolia ``Certificate Verification System Using Blockchain'' ch16b7 -- 4 Proposed System Architecture -- 4.1 Methodology -- 4.2 Certificate Generation -- 4.3 Certificate Validation -- 4.4 Working of Application -- 5 Conclusion -- References -- A Survey on LiDAR-Based SLAM Technique for an Autonomous Model Using Particle Filters -- 1 Introduction -- 2 Overview of Different Slam Techniques -- 2.1 EKF-Based SLAM -- 2.2 GridMap-Based SLAM -- 2.3 Graph-Based SLAM -- 2.4 Comparison Between Different SLAM Techniques -- 3 Implementation of RBPF-Based SLAM with LiDAR -- 3.1 Hardware Used -- 3.2 Software Used -- 4 Results -- 4.1 Maps-From the Simulation -- 4.2 Maps from 2D LiDAR Scan Data -- 5 Conclusion -- 6 Limitations and Discussion -- References -- TrafficNN: CNN-Based Road Traffic Conditions Classification -- 1 Introduction -- 2 Related Works.
3 Convolutional Neural Network (CNN) -- 3.1 Convolutional Layer -- 3.2 Pooling Layer -- 3.3 Flatten Layer -- 3.4 Fully Connected Layer -- 3.5 Padding -- 3.6 Rectified Linear Units (ReLU) -- 3.7 Batch Normalization -- 3.8 Dropout -- 3.9 Softmax -- 4 Proposed Methodology -- 4.1 Data Collection -- 4.2 Data Augmentation -- 4.3 Data Preprocessing -- 4.4 TrafficNN Architecture -- 5 Performance Evaluation -- 5.1 Training the Model -- 5.2 Result Discussion -- 5.3 Comparison Using Transfer Learning -- 6 Future Work -- 7 Conclusions -- References -- Review of Malware Detection Using Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Deep Learning Over Machine Learning -- 4 Discussion -- 5 Future Work -- 6 Conclusion -- References -- ANN Based Hybrid RSSI-TDOA DOA Estimation and Beamforming -- 1 Introduction -- 2 Problem Formulation -- 3 System Model for DOA Estimation -- 3.1 ANN Optimized Hybrid RSSI-TDOA Model Based DOA Estimation -- 4 System Model for Beamforming -- 4.1 Recursive Least Squares (RLS) -- 5 Hardware Platform -- 5.1 Antenna -- 5.2 Eight Element Uniform Linear Array (ULA) -- 5.3 System Configuration -- 6 Results and Discussion -- 7 Conclusion -- References -- FPGA Implementation of Nested Binary Phase Codes Using DDS Approach for Radar Pulse Compression -- 1 Introduction -- 2 Binary Phase Coded Waveforms -- 2.1 Nested Barker Codes -- 3 Generation of a Barker and Nested Barker Codes Using FPGA -- 3.1 Direct Digital Synthesizers (DDS) -- 3.2 The Proposed Method to Generate Barker Codes Using DDS -- 3.3 Generation and Implementation of 13-Bit Barker Code Using FPGA -- 3.4 Generation and Implementation of Nested Barker Code Using FPGA -- 4 Conclusion -- References -- Cloud Computing-Based Li-Ion Battery-BMS Design for Constant DC Load Applications -- 1 Introduction -- 2 Literature Survey -- 3 Experimental Setup -- 4 Results and Discussion.
4.1 Charging Cycle.
Record Nr. UNINA-9910506400903321
Ranganathan G  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui