top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
ICT Analysis and Applications . Volume 2 : Proceedings of ICT4SD 2023 / / Simon Fong, Nilanjan Dey, and Amit Joshi, editors
ICT Analysis and Applications . Volume 2 : Proceedings of ICT4SD 2023 / / Simon Fong, Nilanjan Dey, and Amit Joshi, editors
Edizione [First edition.]
Pubbl/distr/stampa Singapore : , : Springer, , [2023]
Descrizione fisica 1 online resource (623 pages)
Disciplina 338.927
Collana Lecture Notes in Networks and Systems Series
Soggetto topico Sustainable development
Sustainable engineering
ISBN 981-9965-68-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Analysis of Smart Health Monitoring Systems -- 1 Introduction -- 1.1 Objective -- 1.2 Targeted Users -- 2 Literature Review -- 3 Smart Remote Health Monitoring Systems Applications -- 3.1 Smart Health Monitoring Systems Applications -- 3.2 Benefits of Smart Health Monitoring System -- 3.3 Smart Health Monitoring System Architecture -- 4 Conclusion -- References -- Nerve Segmentation Using Multi-scale Attention Mechanism-U-Net -- 1 Introduction -- 2 Material and Methodology -- 2.1 About Dataset -- 2.2 Methodology -- 3 Result and Discussion -- 4 Conclusion -- References -- A Comparative Study of Register Allocation Algorithms -- 1 Introduction -- 2 Register Allocation Algorithms -- 2.1 Graph Coloring -- 3 Chaitin-Briggs -- 3.1 SSA-Based -- 3.2 Linear Scan -- 3.3 Tree -- 3.4 Fusion-Based -- 4 Comparison and Results -- 5 Conclusion -- 6 Future Scope -- References -- Brain Tumor Detection Using Machine Learning -- 1 Introduction -- 2 Information Pre-handling -- 3 Straight Regression -- 4 Ridge Regression -- 5 Previous Analysis -- 6 Deep Learning -- 7 CNN -- 8 Linear Regression -- 9 Vector Regression -- 10 Artificial Neural Network -- 11 Gradient Boost -- 12 Methodology -- 13 Future Scope -- References -- Restoration of Ancient Kannada Handwritten Palm Leaf Manuscripts with Modified Sauvola Method Using Integral Images -- 1 Introduction -- 2 Proposed Method -- 2.1 Implementation of Modified Sauvola Method Using Integral Images -- 3 Experimental Results and Discussion -- 4 Conclusion -- References -- Conversion of Gujarati Alphabet to Gujarati Sign Language Using Synthetic Animation -- 1 Introduction -- 1.1 HamNoSys Symbols -- 2 Literature Review -- 3 Architecture -- 4 Conclusion -- References -- Wearable Device to Monitor the Health Parameters of a Cyclist -- 1 Introduction.
1.1 Research Paper Study -- 2 Modules -- 3 Design and Development -- 4 Algorithms -- 5 Product Comparisons -- 6 Results -- 7 Challenges Faced -- 8 Conclusion -- 9 Future Scope -- References -- A Machine Learning-Based Detection of IoT Cyberattacks in Smart City Application -- 1 Introduction -- 2 Related Work -- 3 Proposed Model for Cyberattacks Detection -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- A Comprehensive Survey on Security Aspects of Using Blockchain Technology for Digital Degree Verification Solutions -- 1 Introduction -- 2 Taxonomy of Blockchain Technology -- 3 Study of Literature Survey -- 3.1 KMI -- 3.2 RecordsKeeper -- 3.3 Blockcerts -- 3.4 EduCTX -- 3.5 UNIC -- 3.6 UZHBC -- 3.7 SmartCert -- 3.8 BCDiploma -- 3.9 SuperCert -- 4 Conclusion -- References -- Augmented Reality-Based Education Ecosystem for Specially Abled Children -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System Architecture -- 4 Implementation and Results -- 4.1 Creating a Scene Using Unity -- 4.2 Building 3D Objects Using Blender -- 4.3 Creating Image Targets Using Vuforia Engine -- 4.4 Integrate Through Android Studio -- 4.5 Results and Discussion -- 5 Conclusion and Future Enhancement -- References -- Intelligent Filter for Internet Traffic Monitoring and Analysis of Possible Cyber Threats -- 1 Introduction -- 2 Motivation -- 3 Ease of Use -- 3.1 Container-Based Solution -- 3.2 Comparative Case Study in Existing Technology -- 3.3 (a) Tools Used (b) Implementation Architecture -- 3.4 Flow of Data -- 3.5 Detection of Attack on the Data Link Layer -- 3.6 Detection of Attack on the Transport Layer -- 3.7 Detection of Attack on the IP Layer -- 3.8 Detection of Attack on the Application Layer -- 4 Conclusion -- 5 Future Scope -- References -- Detection of Autism Using Artificial Intelligence -- 1 Introduction -- 1.1 Autism Spectrum Disorder (ASD).
1.2 Signs of Autism Spectrum Disorder (ASD) -- 1.3 Autism Spectrum Disorder in Adults -- 1.4 Autism Symptoms in Adults at Work -- 1.5 Diagnosing ADS -- 1.6 Living with Autism -- 1.7 Treatment for Autism -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Steps in Detecting Autism -- 3.2 Convolution Neural Network -- 3.3 CNN Architecture to Detect Autism -- 3.4 VGG16 to Detect Autism -- 3.5 Dataset Description -- 3.6 Data Preprocessing -- 4 Results and Discussion -- 4.1 Pre-trained Model for Transfer Learning -- 4.2 Creation of Custom Model -- 4.3 Model Training -- 4.4 Model Validation -- 4.5 Results -- 5 Improvisation -- References -- Analyzing and Predicting Diabetes Chronic Disease Using Machine Learning Techniques -- 1 Introduction -- 2 Related Works -- 3 Dataset -- 4 Methodology -- 4.1 Pre-processing the Data -- 4.2 Algorithms Used -- 5 Results and Discussion -- 5.1 Model Performance -- 5.2 Web-UI Implementation -- 6 Conclusion -- References -- Challenges of Multimedia Education in the Lives of Human Beings -- 1 Introduction -- 2 Advantages of Multimedia -- 3 Disadvantages of Multimedia -- 4 Multimedia and Mental Health -- 5 Tackling the Harmful Effects of Multimedia -- 6 Conclusion -- References -- Effective Detection of Liver Disease Using Machine Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work Model -- 3.1 Data Collection -- 3.2 Data Pre-processing -- 3.3 Modeling -- 4 Conclusion -- References -- Digital Financial Asset Management Using Blockchain for Succession Planning of Wealth -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Analysis of the Collected Data -- 5 Conclusion -- References -- The Secured System for Continuous Improvement in Educational Institutes Using Big Data Analytics -- 1 Introduction -- 2 Problem Statement -- 3 Related Work.
3.1 Enhancing the Performance in Educational Institute -- 3.2 Designing the Educational Institute -- 3.3 Predictive Analysis -- 3.4 Secured System -- 4 Methodology -- 4.1 Collaborative Filtering -- 4.2 Map Reduce -- 4.3 Kerberos -- 4.4 Vader -- 4.5 Sqoop -- 5 Results and Discussions -- 6 Conclusion -- References -- A Brief Review of Text Summarization Approaches -- 1 Introduction -- 2 Background -- 2.1 Classification of Text Summarization -- 2.2 Summarization Methods -- 2.3 Language Model -- 3 Text Summarization Process with Encoder-Decoder Architecture -- 4 Mechanism to Improve Text Summarization System -- 5 Dataset -- 6 Evaluation of Summary Generated -- 7 Conclusion -- References -- Transfer Learning-Based Nutrient Deficiency Prediction Model for Sugarcane Crop -- 1 Introduction -- 2 Deep Learning Models Used in Agriculture -- 3 Transfer Learning Model for Nutrient Deficiency Prediction -- 3.1 Data Collection -- 3.2 Framework for Evaluation of Nutrient Deficiency -- 3.3 Algorithm for Nutrient Deficiency Prediction -- 4 Results -- 5 Conclusion -- References -- A Machine Learning Method for Stock Market Price Prediction -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Data Statistics -- 3.2 Data Splitting and Feature Identification -- 3.3 Multiple Linear Regression Approach -- 3.4 Evaluation Measures -- 4 Experimental Analysis -- 4.1 Dataset -- 4.2 Trend Analysis -- 4.3 Prediction -- 4.4 Accuracy (Evaluation Metrics) -- 5 Conclusion -- References -- Eye for Blind: A Deep Learning-Based Sensory Navigation System for the Blind -- 1 Introduction -- 2 Literature Review -- 3 Work Done -- 4 Dataset Collection and Preprocessing -- 5 Methodology -- 6 Output of the Implemented Model -- 7 Future Scope -- 8 Conclusion -- References -- Adaptive Robust Beamforming Approach for Power Optimization in Device-To-Device (D2D) Communication Network.
1 Introduction -- 1.1 Related Work -- 1.2 Notations -- 2 System Model and Problem Formulation -- 2.1 System Model -- 2.2 Problem Formulation -- 3 Proposed Merging Scheme -- 3.1 Power Optimization Using Game Theory: An Iterative Approach -- 4 Numerical Results -- 5 Conclusion -- References -- Designing a Deep Learning Model for Video Anomaly Detection-Based Surveillance -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Sampling Method -- 3.2 Proposed Algorithm -- 4 Result -- 4.1 Dataset Labeling -- 4.2 Architectures -- 4.3 ConvNet 3D (C3D) -- 4.4 Two-Stream Inflated 3D ConvNets (I3D) -- 4.5 R(2 + 1)D -- 4.6 Hidden 2 Stream -- 4.7 Temporal 3D ConvNets (T3D) -- 4.8 Temporal Segment Network (TSN) -- 4.9 Multi-fiber (MF-Net) -- 5 Conclusion -- References -- Smart Management of DC Microgrid Using Forecasting -- 1 Introduction -- 2 Hardware Specification -- 3 Simulations -- 4 Result -- 5 Conclusion and Future Scope -- References -- LoRa-Based Farm Monitoring System -- 1 Introduction -- 2 Related Works -- 3 LoRa Technology -- 4 Implementation Details -- 5 Results -- 6 Conclusion -- References -- Breast Cancer Detection Using Image Processing -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Result -- 5 Future Scope -- 6 Conclusion -- References -- Touch-Free Biometric Authentication System -- 1 Introduction -- 2 Face Recognition -- 2.1 Related Work -- 2.2 Algorithms -- 3 Iris Recognition -- 3.1 Related Work -- 3.2 Algorithms -- 4 Fingerprint Recognition -- 4.1 Related Work -- 4.2 Algorithm and Techniques for Fingerprint Authentication -- 5 Diagram -- 6 Literature Review -- 6.1 Conclusion and Future Work -- References -- Partial Ground-Inserted H-shaped Antenna for Beyond 5G Applications -- 1 Introduction -- 2 Partial Ground-Inserted H-shaped Antenna Design -- 3 Antenna Analysis -- 4 Conclusion -- References.
Crop Recommendation Assessment for Arid Land Using Machine Learning.
Record Nr. UNINA-9910799247403321
Singapore : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT Analysis and Applications : Proceedings of ICT4SD 2020, Volume 2 / / edited by Simon Fong, Nilanjan Dey, Amit Joshi
ICT Analysis and Applications : Proceedings of ICT4SD 2020, Volume 2 / / edited by Simon Fong, Nilanjan Dey, Amit Joshi
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (XXVII, 826 p. 396 illus., 295 illus. in color.)
Disciplina 628
Collana Lecture Notes in Networks and Systems
Soggetto topico Telecommunication
Computer networks
Mathematics - Data processing
Big data
Communications Engineering, Networks
Computer Communication Networks
Computational Science and Engineering
Big Data
ISBN 981-15-8354-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis and Development of Zero Emission Individual Transportation Vehicles - E-Bike -- Development of a Flood Hazard Prediction Model using Artificial Neural Network -- Design of Cardiovascular Disease Classification using wavelet Transform and Detection using Neural Network -- Detection of Spastic Cerebral Palsy Using Different Techniques in Infants -- Data Security using Directory Server in Identity & Ac-cess Management System -- Deep Learning techniques in Image Description -- Comparative Re-evaluation of Different Single Image Defogging Techniques: A Review -- A Framework for Implementation of Learning Analytics and Education Data Mining in Traditional Learning Environment -- Conceptual framework model for opinion mining for brands in Facebook engagements using machine learning tools -- Capacity Aware Active Monitoring Load balancing Principle for Private Cloud -- Enhanced Performance of Novel Patch Antenna Sub-Array Design for Use in L–Band Ground Station Receiver Terminals Linked to Aerospace Platforms -- Effective Knowledge Discovery using Data Mining Algorithm -- A Smart App for Pothole Detection Using Yolo Model -- Medicare With Machine Learning and Deep Learning -- A Comparative Study of Wireless Technologies Coexistence Mechanisms in IoT: a Survey -- Phishing Website Detection Using Machine Learning -- Engineering in Action -- Adaptive Tuning Parameters for Data Transmission over IEEE-802.15.4 Wireless Sensors Network -- Depth Estimation using Blob detection for Stereo Vision Images -- Internet of Things – Reinventing Business Models of Essential Services -- Augmented Reality in Visual Learning -- A Study and Analysis of Applications of Classical Computing and Quantum Computing: A Survey -- An LSTM Based Fake News Detection System Using Word Embeddings Based Feature Extraction -- Emotion and Depression Detection from Speech -- Comparison Study on Parkinson Diease Dignosis Treatment Classification using Machine Learning Classifier (PDMLC) -- Development of Security Clustering Process for Big Data in Cloud -- Agent Score-Based Intelligent Incident Allocation Engine -- An Efficient Makespan Reducing Task Scheduling Algorithm in Cloud Computing Environment -- Brain related diseases and Role of Electroencephalog-raphy (EEG) in diagnosing brain disorders -- Red Lesion Detection in Retinal Fundus Image for diagnosis of Diabetic Retinopathy -- Automated Detection and Counting of Red-Dots from Digital Fundus Images -- IoT based Patient Health Monitoring: A Comprehensive Survey -- Workflow Management through Database Migration in Cloud Computing Environment -- A Pixel Count approach for Lossy Image Compression -- Firmware Attack detection on IoT Devices using Higher Order Statistical Parameters -- Life Saver Robotic Car for Accidental or Disaster Place Emergency Situation -- Detection of fat in milk using photcon-ductivity and color Detection Tecnique with Smart Billing -- Feature Selection Optimisation Using a Hybrid Genetic Algorithm -- Medical Chatbot for Novel COVID-19 -- Design Lower-limb Exoskeleton -- Detection of Roads in Satellite Images using Deep Learning Technique -- Quantification of Multimillion Offers in ‘next-of-kin’ Unsolicited Bulk Emails -- Prevailing Standards in Requirement-Based Test Case Prioritization: An Overview -- A Novel Ontology Design and Comparative Analysis of various Retrieval Schemes on Education Domain in Protégé -- Similarity Analysis of Legal Documents: A Survey -- Performance enhancement of STATCOM integrated Wind Farm for harmonics mitigation using optimi-zation techniques -- Optimisation of Articulated Vehicular RADAR Antenna Array Parameters using Machine Learning Algorithms -- Tra c Congestion Detection from Twitter using Word2Vec -- Advanced Signal Processing for Ground Penetrating Radar -- E- Commerce in Indian Retail Industry: Its Proliferation and Performance -- Design of a Robot for Health Care Assistance in the times of Covid-19 -- A Brief Survey of Challenge-Response Authentication Mechanisms -- A Model for Automated Food Logging Through Food Recognition and Attribute Estimation Using Deep Learning -- A Deep Learning generative approach for speech to scene generation -- A Comparative Analysis of Genes Responsible for Cata-ract -- A Framework for Banana plantation growth using Blockchain Technology -- Relative study between Technology to Perceive Hand Gestures -- Implementation of Electronic Records Management Systems: Potential and Challenges A Case Study of the Water and Power Development Authority (WAPDA) in Pakistan -- Machine Learning based Approach on Predicting Suicidal Ideation -- Detection of Antisocial Personality based on Social Media Data -- Devising A Novel Means of Introducing Collaborative Decision Making to an Automated Water Bottling Plant to Study the Impact of Positive Drift -- Cluster based ensemble using distributed clustering approach for large categorical data -- New Avenues of Revenue in Indian Cinema -- E-Governance: Implementation of eDistrict Application A Case Study in the District of Kangra, Himachal Pradesh -- Data Mining Techniques to Categorize Single Paragraph Formed Self Narrated Stories -- A Survey of Intelligent Agro-Climate Decision Support Tool for Small-scale Farmers: An Integration of Indigenous Knowledge, Mobile Phone Technology And Smart Sensors -- Effectiveness of Cyberbullying Prevention Strategies in the UAE -- A Comparison Between Adaptive Neuro-Fuzzy Inference System and Autoregressive Integrated Moving Average in Predicting COVID-19 Confirmed Cases in Bangladesh -- Sensing Searching Techniques in Internet of Things: A survey, taxonomy and challenges -- SIGSv2: Enhanced Student ID Generator and Management System -- Motion Control and Sensor Fault Diagnostic Systems For Autonomous Electric Vehicle -- Virtual Simulation and Testing Platform for Self Driving Cars -- Durable Implementation of Multi-Cloud Storage with Assured Integrity for Sensitive Information -- Hidden in Plain Sight: Building a Global Sustainable Development Data Catalogue -- Characterization of Heterogeneous Malware Contagions in Wireless Sensor Networks: A Case of Uniform Random Distribution.
Record Nr. UNINA-9910484886303321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT Analysis and Applications : Proceedings of ICT4SD 2019, Volume 2 / / edited by Simon Fong, Nilanjan Dey, Amit Joshi
ICT Analysis and Applications : Proceedings of ICT4SD 2019, Volume 2 / / edited by Simon Fong, Nilanjan Dey, Amit Joshi
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XVIII, 584 p. 278 illus., 192 illus. in color.)
Disciplina 338.9270285
Collana Lecture Notes in Networks and Systems
Soggetto topico Electrical engineering
Computational intelligence
Application software
Big data
Communications Engineering, Networks
Computational Intelligence
Information Systems Applications (incl. Internet)
Big Data
ISBN 981-15-0630-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Analytical CRM OLAP Analysis Tools and Data Mining -- An Ensemble Framework for Flow based Application lay-er DDoS Attack Detection using Data Mining Techniques -- EM Design of Low RCS Proximity Coupled Patch Array -- A Double-Weighted Parametric Model for Academic Software Project Effort Estimation -- Learner Performance and Preference Meter for Better Career Guidance and Holistic Growth -- Grading of Tuberculosis Bacilli Using Computer Vision Assisted Detection Method for ZN Stained Images of Bright Field Microscopy -- Modeling the Dynamics of Carbon Dioxide over an Educational Institute -- Orthogonalizing Weights in Capsule Network Architecture -- Smart Billing using Content-based Recommender Systems Based on Fingerprint -- Identifying Classification Technique for Medical Diagnosis -- Character Recognition of MODI Script using Distance Classi er Algorithms -- Societal Transformations Through ICT as a Shared Public Infrastructure.
Record Nr. UNINA-9910377827503321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communication Technology for Competitive Strategies [[electronic resource] ] : Proceedings of Third International Conference on ICTCS 2017 / / edited by Simon Fong, Shyam Akashe, Parikshit N. Mahalle
Information and Communication Technology for Competitive Strategies [[electronic resource] ] : Proceedings of Third International Conference on ICTCS 2017 / / edited by Simon Fong, Shyam Akashe, Parikshit N. Mahalle
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (769 pages)
Disciplina 004
Collana Lecture Notes in Networks and Systems
Soggetto topico Telecommunication
Data mining
Engineering
Communications Engineering, Networks
Data Mining and Knowledge Discovery
Computational Intelligence
ISBN 981-13-0586-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multi-Layer Visual Cryptography with Soft Computing Approach for Authentication -- Knowledge Management Systems leveraging the competitive advantage of top IT organizations: A Multi-case study of Benchmarking Practices -- Performance Analysis of Parallel Implementation of Morphological Operations -- US Dollar’s Influence on Indian Gold price Assessment using Artificial Neural Network -- Attribute based storage mechanism with de-duplication filter: A Review Paper -- Review and Analysis of Simulation Results for Consumer Attack Model and Grid Sensor Placement Algorithm -- An Approach to Analyze Behaviour of Network Events in NS2 & NS3 using AWK & Xgraph -- Hybrid Latent Semantic Analysis and Random Indexing Model for Text Summarization -- Digitization of Disaster Management: A Multimedia Ontological Approach -- Prevalent Study of Cooperative Biometric Identification System Using Multimodal Biometrics -- Most Persistent Feature Selection method for Opinion mining of social media reviews -- Physical Layer Security with Energy Harvesting Techniques: A Study -- One-tip Secure: Nex-Gen of Text Based Password -- New Text Based User Authentication Scheme Using CAPTCHA -- FPGA Implementation of Parallel Transformative Approach in AES Algorithm -- An Approach to Wireless Sensor Networks for Healthcare Scrutiny in Hospitals -- Foetal Heart Beat and Volume Detection using Spherical Harmonics Shape Model for Level Set Segmentation -- An Efficient approach for Clustering US census data based on Cluster similarity using Rough Entropy on Categorical Data -- Age classification with LPCC features using SVM and ANN -- Existing and Relevant Methodologies for Energy Efficient Cloud Data centers -- An Enhanced Scheme for PHR on Cloud Servers Using CP-ABE -- Decision Tree Algorithms for prediction of Heart Diseases -- Green communication for wireless cooperative networks: A survey -- Instance Selection using Multi-objective CHC Evolutionary Algorithm -- Inclusive device to connect people with the surrounding World -- Profiling based Effective Resource Utilization in Cloud Environment using Divide and Conquer Method -- Algorithmic approach for error-correcting capability and decoding of linear codes arising from Algebraic Geometry -- Periocular Region Based Biometric Identification Using Local Binary Pattern and Its Variants -- Hand Geometry and Palmprint Based Biometric System with Image Deblurring -- A Low Power, High Swing and Robust Folded Cascode Amplifier at Deep Submicron Technology -- Syllable Based Concatenative Speech Synthesis for Marathi Language -- Inverted U-Shape Monopole Antenna with Notch Band Characteristics for UWB Communication Applications -- A Distance-Based Outlier Detection using Particle Swarm Optimization Technique -- Fast and Memory Leak Free Verication for Bridge Transitions in VLSI designs -- Privacy Preserving K-NN Classification Using Vector Operations -- A Comparative Study on Segmentation Techniques for Brain Tumor MRI -- Integrating Concentrating Solar Plant based System in Multi Area AGC using LabVIEW -- Maximal Stable Extremal Region Extraction of MRI Tumor Images using Successive Otsu Algorithm -- Synthesis of Reversible Array Divider Circuit -- Finding Right Doctors and Hospitals: A Personalized Health Recommender -- An Improved Hybrid Offset Based Min-Sum Decoding Algorithm -- Simulation of Phasor Measurement Unit for Research and Teaching Applications -- Maximum Network Flow Aware Multi-Lightpath Survivable Routing in WDM Networks -- Various Machine Learning Algorithms for Twitter Sentiment Analysis.
Record Nr. UNINA-9910350286603321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui