ICT analysis and applications / / Simon Fong, Nilanjan Dey, Amit Joshi |
Autore | Fong Simon |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (942 pages) |
Disciplina | 338.927 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Sustainable development - Data processing
Sustainable engineering |
ISBN |
981-16-5654-1
981-16-5655-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910743374203321 |
Fong Simon | ||
Singapore : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT Analysis and Applications : Proceedings of ICT4SD 2022 |
Autore | Fong Simon |
Pubbl/distr/stampa | Singapore : , : Springer, , 2022 |
Descrizione fisica | 1 online resource (763 pages) |
Disciplina | 004 |
Altri autori (Persone) |
DeyNilanjan
JoshiAmit |
Collana | Lecture Notes in Networks and Systems |
Soggetto non controllato |
Technology
Technology & Engineering |
ISBN | 981-19-5224-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Survey of Data Processing Software Tools for Global Navigation Satellite System -- 1 Introduction -- 2 Desktop-Based Software -- 2.1 Bernese -- 2.2 RTKLIB -- 2.3 GLAB -- 2.4 Teqc -- 3 Comparison -- 4 Conclusion -- References -- POS Tagging for the Primitive Languages of the World and Introducing a New Set of Universal POS Tagging for Sanskrit -- 1 Introduction -- 1.1 New Set of POS in Sanskrit -- 1.2 Analysis of UPOS in Sanskrit -- 2 Comparative Study of the Previous Work -- 3 Analysis of Primitive Languages -- 3.1 Word Order -- 3.2 The Compound -- 3.3 The Basis of Grammar in Primitive Languages -- 3.4 The Main and Sub-Tag Classification -- 3.5 The Main Tags with Their Common and Uncommon Sub-Tags Classification -- 4 UPOS Interface Designed for Creating the Database for Sanskrit Language -- 5 Observations and Findings -- 6 Future Work -- 7 Conclusion -- References -- A Study on Medical Image Data Augmentation Using Learning Techniques -- 1 Introduction -- 2 Literature Survey -- 2.1 Geometric Transformations -- 2.2 Color Space Transformations -- 2.3 Kernel Filters -- 2.4 Mixing Images -- 2.5 Random Erasing -- 2.6 Feature Space Augmentation -- 2.7 Adversarial Training -- 2.8 GAN-Based Data Augmentation -- 2.9 Neural Style Transfer -- 3 Conclusion -- References -- Data Classification Using Mesh Generation and Hough Transform -- 1 Introduction -- 2 Preliminaries -- 2.1 Linear Regression -- 2.2 Analytical Straight Line -- 2.3 Standard Hough Transform -- 3 Method Description -- 4 Simulation and Discussions -- 4.1 Computing Average of StartAbsoluteValue a Subscript j comma 1 Baseline minus a Subscript i comma 1 Baseline EndAbsoluteValue |aj, 1-ai, 1| and StartAbsoluteValue a Subscript j comma 2 Baseline minus a Subscript i comma 2 Baseline EndAbsoluteValue |aj, 2-ai, 2| with i not equals= j.
4.2 Using Arbitrary Pairs (l comma upper Kl, K) -- 5 Conclusion and Perspectives -- 6 Appendix -- References -- Data Acquisition Techniques from IOT Devices for Smart Transportation: A Brief Overview -- 1 Introduction -- 2 Modern Techniques -- 2.1 UAV-Aided Data Acquisition Using Swarm Intelligence -- 2.2 Data Acquisition Using Deep Reinforcement Learning in UAVs -- 2.3 Data Acquisition Using Deep Reinforcement Learning for Multi-UAVs -- 2.4 Data Acquisition Using Blockchain in UAV -- 3 Conclusion -- References -- Analysis of Student Behavioural Patterns by Machine Learning -- 1 Introduction -- 2 Framework of Study -- 2.1 Data Set Collection -- 2.2 Feature Extraction -- 2.3 Clustering Analysis -- 2.4 Prediction -- 2.5 Visualization -- 3 Algorithms -- 3.1 Initial Clustering Using Density-Based Spatial Clustering of Application with Noise(DBSCAN) -- 3.2 Subdivision Clustering Using K-Means -- 3.3 Random Forest Algorithm -- 4 Experimental Results -- 5 Conclusions -- References -- Similar Incident Detection for IT Service Management (ITSM) in Multilingual Records Using Information Retrieval Model -- 1 Introduction -- 2 Background-ITIL Service Operations Framework -- 3 Problem Statement -- 4 Objectives -- 5 Current Scope -- 6 Solution Architecture -- 7 Obtained Results -- 8 Limitations of the Work -- 9 Conclusion and Future Scope -- References -- Design of Efficient Energy Management Solution for the Internet of Things-Based Smart Microgrid -- 1 Introduction -- 2 System Description -- 3 Energy Management Domain Structure -- 4 Proposed IoT-Based Smart Wearable Tags -- 5 Results and Discussion -- 6 Conclusion -- References -- Building Secured Software Defined Networks by Analyzing Anomaly Detection Algorithms on Various Attacks -- 1 Introduction -- 2 Experimental Setup -- 3 Experiments and Analysis -- 4 Efficiency of the Proposed Model. 5 Conclusions and Future Works -- References -- Ultra-Sensitive Optical Sensor to Detect Single Waterborne Bacterium -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Structure for Waterborne Bacteria Analysis -- 4 Simulation Results -- 4.1 Results for Detection of Vibrio cholera (Refractive Index: 1.365) -- 4.2 Results for Detection of E. coli (Refractive Index: 1.388) -- 4.3 Results for Detection of Shigella flexneri (Refractive Index: 1.388) -- 4.4 Calculation of Performance Parameter -- 4.5 Result Observation -- 5 Conclusion -- References -- Analysis of Energy Efficient Routing Protocol for Wireless Sensor Network in Environmental Monitoring -- 1 Introduction -- 2 Background -- 3 Previous Work Done -- 4 Existing Methodologies -- 5 Analysis and Discussion -- 6 Proposed Methodology -- 7 Outcome and Results -- 8 Conclusion -- 9 Future Scope -- References -- A Virtual Tutor to Enhance the Solving Skills of School Children Using Performance Evaluation and Navigation System -- 1 Introduction -- 2 Objectives -- 3 Literature Survey -- 3.1 Existing Applications -- 3.2 Research Papers -- 4 Proposed Methodology -- 4.1 Database Generation -- 4.2 Question Recommender -- 4.3 Performance Analyzer -- 4.4 Navigation -- 4.5 DOD Clustering Module -- 5 Implementation -- 5.1 CSV Generation -- 5.2 Navigation -- 5.3 DOD Clustering -- 6 Results -- 7 Conclusion -- References -- A Survey of Learning Techniques for Detecting DDOS Assaults -- 1 Introduction -- 1.1 Signature-Based Detection -- 1.2 Anomaly-Based Detection -- 2 Literature Survey -- 2.1 Decision Tree -- 2.2 Support Vector Machines (SVM) -- 2.3 Naive Bayes -- 2.4 Neural Networks -- 3 Comparison of Machine Learning Techniques -- 3.1 Fuzzy Logic -- 3.2 Neural Networks -- 3.3 Support Vector Machine (SVM) -- 3.4 Naïve Bayes -- 3.5 Decision Tree -- 4 Conclusion -- References. Review on 5G and Wi-Fi 6 Wireless Internet Connectivity -- 1 Introduction -- 2 Literature Review -- 3 Technical Aspects of 5G -- 4 Technical Aspects of Wi-Fi 6 -- 5 5G versus Wi-Fi 6-A Comparison as Well as Contrast -- 6 Conclusion -- References -- Handwriting Recognition and Conversion Using Neural Networks -- 1 Introduction -- 2 Literature Review -- 3 Limitations -- 4 Previous Work -- 5 Implementation -- 6 Conclusion -- References -- On Cordial Totally Magic Labeling of Flower Graphs -- 1 Introduction -- 1.1 Preliminaries -- 2 Main Results -- 3 Conclusion -- References -- Missing Value Imputation Using Weighted KNN and Genetic Algorithm -- 1 Introduction -- 2 Problem Formulation -- 3 Literature Survey -- 4 Proposed Technique -- 5 Result and Discussion -- 5.1 Dataset Description -- 5.2 Performance and Evaluation -- 5.3 Experimental Design -- 6 Conclusion -- References -- Aqua Pura: An IoT-Based System to Make Rainwater Salvageable and Manageable at a Low Cost -- 1 Introduction -- 2 Related Work -- 3 Applications -- 4 Working Mechanism -- 5 Programming Mechanism -- 6 Circuit Diagram -- 7 Required Hardware Components -- 8 Design and Implementation -- 9 Future Prospects and Conclusion -- References -- FMDCDTL: Design of Fusion-Based Model for Identification of Drowsy Drivers via Cascaded Deep Transfer Learning -- 1 Introduction -- 2 Literature Review -- 3 Design of the Proposed Fusion-Based Model -- 3.1 Design of the VGGNet-19-Based CNN Model for Analysis of Facial Features -- 3.2 Design of Feature Extraction Model for Driving Patterns and EEG Signals -- 3.3 Design of the Ensemble Learning and Statistical Analysis Layer for Drowsiness Classification Decisions -- 4 Result Evaluation and Comparison -- 5 Conclusion and Future Scope -- References -- Predicting the Heart Disease Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Work. 3 Research Methodology -- 4 Results and Discussion -- 4.1 Finding the Best ML-Based HDP Model (R1) -- 4.2 Statistical Justification (R2) -- 5 Conclusion -- References -- Synthetically Generated High-Resolution Reflected Ultra Violet Imaging System (RUVIS) Database Using Generative Adversarial Network -- 1 Introduction -- 2 Related Work -- 3 Synthetic Latent Fingerprint Generation -- 3.1 Adaptive Discriminator Augmentation (StyleGan2-Ada) -- 3.2 StyleGan2-Ada Training Dataset -- 3.3 Adaptive Discriminator Augmentation -- 4 Experimental Results and Discussions -- 4.1 Visual Analysis -- 4.2 Multi-Scale Structural Similarity -- 5 Conclusion -- References -- Understanding and Comparative Analysis of Consensus Algorithms -- 1 Introduction -- 2 Literature Review -- 3 Blockchain Technology -- 3.1 Working of Blockchain -- 3.2 Consensus Algorithms -- 4 Conclusion -- References -- Attack Detection in Internet of Things: A Systematic Literature Review -- 1 Introduction -- 1.1 IOT and Security -- 1.2 Cloud Computing and Fog Computing -- 2 Literature Review -- 2.1 Literature Survey -- 3 Result and Discussion -- 3.1 Dataset Description -- 3.2 Result Analysis -- 3.3 Limitations and Future Scope -- 4 Conclusion -- References -- Effect of COVID-19 on Construction Industry in Mumbai -- 1 Introduction -- 1.1 Infrastructure -- 1.2 Real Estate -- 1.3 Repair Industry -- 2 Literature Review -- 3 Research Methodology and Observations -- 3.1 Effect of Covid-19 on Construction Industry -- 4 Conclusion and Future Scope -- References -- TranslateIT: Android-Based Mobile Application for Multilingual Translation -- 1 Introduction -- 2 Literature Review -- 3 Results -- 3.1 Results of Text to Text -- 3.2 Results of Voice to Text -- 4 Conclusion -- References -- Visualizing Commenters Opinions Through Topic Analysis -- 1 Introduction -- 2 Background. 2.1 Non-Negative Matrix Factorization (NMF). |
Record Nr. | UNINA-9910624308703321 |
Fong Simon | ||
Singapore : , : Springer, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|