Advances in Intelligent Informatics / / edited by El-Sayed M. El-Alfy, Sabu M. Thampi, Hideyuki Takagi, Selwyn Piramuthu, Thomas Hanne |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (663 p.) |
Disciplina |
006.3
620 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Artificial intelligence Computational Intelligence Artificial Intelligence |
ISBN | 3-319-11218-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
""Preface""; ""Organization""; ""Contents""; ""Artificial Immune System Based Image Enhancement Technique""; ""1 Introduction""; ""2 Methodology""; ""2.1 Overview of Artificial Immune System""; ""2.2 Functions Used""; ""2.3 Proposed Method""; ""3 Results and Discussions""; ""4 Conclusions""; ""References""; ""Grayscale to Color Map Transformation for Efficient Image Analysis on Low Processing Devices""; ""1 Introduction""; ""2 Proposed Grayscale to Color Transform""; ""3 Experimental Results and Analysis""; ""3.1 k-Means Clustering Algorithm""; ""3.2 Applications and Scopes""
""4 Conclusion and Future""""References""; ""Automatic Classification of Brain MRI Images Using SVM and Neural Network Classifiers""; ""1 Introduction""; ""2 Related Works""; ""3 Design of the CAD System""; ""3.1 Preprocessing""; ""3.2 Segmentation""; ""3.3 Classification""; ""4 Experimental Results""; ""4.1 Data Set Used""; ""4.2 Performance Analysis of FCM on Original and Reduced Image Data""; ""4.3 Parameters Used for Classifier Evaluation""; ""4.4 Experiments Conducted""; ""5 Conclusion and Future Work""; ""References"" ""An Investigation of fSVD and Ridgelet Transform for Illumination and Expression Invariant Face Recognition""""1 Introduction""; ""2 Proposed Methodology""; ""2.1 flustered SVD (fSVD)""; ""2.2 Ridgelet Transform""; ""2.3 Classification""; ""3 Experimental Results and Performance Analysis""; ""4 Conclusion""; ""References""; ""Coslets: A Novel Approach to Explore Object Taxonomy in Compressed DCT Domain for Large Image Datasets""; ""1 Introduction""; ""2 Proposed Method""; ""2.1 Segmentation in Complex Hybrid Color Space""; ""2.2 Feature Extraction and Classification"" ""3 Experimental Results and Performance Analysis""""3.1 Caltech - 101 Dataset""; ""3.2 Caltech - 256 Dataset""; ""4 Discussion and Conclusion""; ""References""; ""AI Based Automated Identification and Estimation of Noise in Digital Images""; ""1 Introduction""; ""2 Probabilistic Neural Network (PNN)[2]""; ""3 Methodology""; ""3.1 Noise Identification Stage""; ""3.2 Noise Level Estimation Stage""; ""4 Implementation and Results""; ""5 Conclusion""; ""References""; ""SV-M/D: Support Vector Machine-Singular Value Decomposition Based Face Recognition""; ""1 Introduction""; ""2 Methodology"" ""2.1 Support Vector Machine (SVM)""""2.2 Singular Value Decomposition (SVD)""; ""3 Results and Discussion""; ""4 Conclusion""; ""Appendix I - Solving for Dual Optimization Problem6""; ""Appendix II - Mercer-Hilbert-Schmidt Theorem""; ""References""; ""A New Single Image Dehazing Approach Using Modified Dark Channel Prior ""; ""1 Introduction""; ""2 Related Work""; ""2.1 Optical Model of Hazy Images""; ""2.2 Dark Channel Prior""; ""2.3 Transmission Estimation""; ""2.4 Restoration of Input Image""; ""3 Proposed Meth hodology""; ""3.1 Convert RGB to o LAB Color Space"" ""3.2 Estimation of R Refined Transmission Map Using Dark Channel Prior"" |
Record Nr. | UNINA-9910299669703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent Systems Design and Applications : Information and Network Security, Volume 3 |
Autore | Abraham Ajith |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (497 pages) |
Altri autori (Persone) |
PllanaSabri
HanneThomas SiarryPatrick |
Collana | Lecture Notes in Networks and Systems Series |
ISBN |
9783031646508
9783031646492 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Misdirection Attack in Wireless Sensor Network Using Threshold Method -- 1 Introduction -- 1.1 Generic Security Requirements in a WSN -- 1.2 Types of Attacks in WSN -- 1.3 Misdirection Attack -- 2 Literature Review -- 3 Research Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Blockchain for Data Traceability in the Agricultural Sector -- 1 Introduction -- 2 Related Work -- 3 Blockchain Overview -- 3.1 Blockchain -- 3.2 Ethereum -- 4 Methodology -- 4.1 Choice of the Blockchain -- 4.2 Adaptability to Low Consumption Systems -- 5 Results -- 5.1 Application Development -- 5.2 Implementation -- 6 Disccusion and Future Work -- 6.1 Advantages and Qualities of the Approach -- 6.2 Deficiencies and Future Work -- 7 Conclusion -- References -- Detection of Fake URLs Using Deep LSTM Architecture over Social Media -- 1 Introduction -- 1.1 Structure of URL -- 2 Background and Related Work -- 3 Data Collection -- 4 Fake URL Detection System -- 4.1 Ensemble Methods -- 4.2 Long-Short Term Memory (LSTM) -- 5 Experimental Evaluation -- 5.1 Results -- 6 Conclusion and Future Scope -- References -- Leveraging Blockchain for Secure Water Meter Reading -- 1 Introduction -- 2 Related Works -- 2.1 Blockchain -- 2.2 Blockchain Applications -- 2.3 Blockchain for Water Monitoring -- 3 Method -- 3.1 Application Architecture -- 3.2 Watermeter Reading Application -- 3.3 Blockchain Integration -- 4 Results -- 4.1 Water Meter Reading Process -- 4.2 Application Realization -- 5 Discussion -- 6 Conclusion -- References -- A Hybrid Differential-Evolution-Based Approach to the Sensor Network Localisation Problem -- 1 Introduction -- 2 Related Work -- 3 The Sensor Network Localisation Problem -- 3.1 Formulation as a Least Squares Problem -- 4 Methods -- 5 Numerical Experiments -- 6 Conclusion -- References.
A Review on Physical Abuse Detection Techniques Using Video Surveillance Systems -- 1 Introduction -- 2 Literature Review -- 3 Conclusion -- References -- Detection of Suspicious Activities at Hypervisor in Cloud Computing: A Brief Study -- 1 Introduction -- 2 Literature Survey -- 2.1 Hypervisor Attacks and Defenses -- 2.2 Security Analysis -- 3 Conclusion -- References -- A Simple Genetic Algorithm for the Maximum Min-Sum Dispersion Problem (Max-MinSum DP) and New Node Similarity-Based Variants -- 1 Introduction -- 2 Problem Formulation and Related Work -- 3 DP-sGA - The Proposed Genetic Algorithm -- 4 Numerical Experiments -- 4.1 Benchmarks -- 4.2 Parameter Tuning -- 4.3 Comparisons with Other Methods -- 4.4 Node Similarity-Based Dispersion Problem -- 5 Conclusion -- References -- Towards Analysis of Threat Modeling of Software Systems According to Key Criteria -- 1 Introduction -- 2 Threat Modeling -- 2.1 Threat Modeling Process -- 2.2 Threat Models - STRIDE, PASTA and DREAD -- 3 Analysis of Threat Modeling According to Key Criteria -- 4 Conclusion and Future Work -- References -- Deepfake Detection System for Facial Evidence Verification in Criminal Justice and Its Legal and Ethical Implications -- 1 Introduction -- 2 Related Work -- 2.1 Threat of Deepfake to Facial Evidence Verification Techniques -- 2.2 Previous Studies on Deepfake Detection Techniques -- 2.3 Existing Methods for Facial Evidence Verification in Criminal Justice -- 2.4 Comparison of Existing Methods with the Proposed System -- 3 Implementation Method -- 3.1 Dataset Creation, Feature Extraction, and Representation -- 3.2 System Prototype -- 4 Experiment -- 5 Discussion -- 5.1 Important Findings on the Proposed System's Method -- 5.2 Legal Challenges and Implications of the Proposed System -- 5.3 Ethical Considerations in the Usage of the Proposed System -- 6 Conclusions. References -- A Methodology to Evaluate the Security of Block Ciphers Against Neurocryptanalytic Attacks -- 1 Introduction -- 2 Cryptography and Cryptanalysis -- 3 Block Ciphers -- 4 Methodology -- 4.1 Data: Source and Handling -- 4.2 Neural Network Settings -- 4.3 Evaluation Metrics -- 5 Experiments and Analysis -- 5.1 Comparison Among Database Sizes -- 5.2 Comparison Among Key Sizes -- 6 Conclusions -- References -- Enhancing Positivity on Social Media: A Review of Offensive Comment Classification -- 1 Introduction -- 2 Offensive Language Review -- 2.1 Forms of Offensive Language -- 2.2 Data Collection -- 2.3 Data Sources -- 2.4 Text Normalization -- 3 Related Work -- 3.1 Features Extraction Technique -- 3.2 Machine Learning-Based Approaches -- 3.3 Deep Learning-Based Approaches -- 3.4 Transformer Model-Based Approaches -- 4 Discussion -- 5 Conclusion -- References -- Object Recognition and Tracking for Enhanced Security Using Computer Vision -- 1 Introduction -- 2 Background Details and Related Work -- 3 Proposed Approach -- 4 Implementation of the System -- 5 Conclusions -- References -- Improving the Cryptocurrency Price Prediction Using Deep Learning -- 1 Introduction -- 2 Related Works -- 3 Exploring Cryptocurrencies -- 4 Proposed Methodology -- 4.1 Data Collection -- 4.2 Data Preprocessing -- 4.3 Feature Selection -- 4.4 Data Splitting -- 4.5 Model Architecture -- 5 Metric Analysis -- 6 Result Analysis -- 7 Conclusion -- 8 Future Works -- References -- Analysis of Privacy Preservation on Mobile Ad-Hoc Networks -- 1 Introduction -- 2 Literature Survey -- 3 Attack Strategies to Affect Privacy in MANET -- 3.1 Breaching of Confidentiality -- 3.2 Breaching of Integrity -- 3.3 Breaching of Availability -- 3.4 Breaching of Authentication -- 4 Applied Privacy-Preservation Techniques on MANET -- 5 Conclusion -- References. Multi Face Detection Based Attendance System -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Arabic Hate Speech Detection on Social Media Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Machine Learning -- 2.2 Deep Learning -- 3 Proposed Approach -- 3.1 Data Preprocessing -- 3.2 Features Extraction -- 4 Models -- 4.1 Logistic Regression -- 4.2 Linear Support Vector Classification -- 4.3 The Bidirectional Long-Short-Term Memory -- 5 Result and Discussions -- 5.1 Dataset Description -- 5.2 Machine Learning Models Results -- 5.3 Deep Learning Model Result: BI-LSTM -- 5.4 Comparison with State of the Art Approaches for Arabic Languages -- 6 Conclusion -- References -- Secure Ranked Search over Encrypted Cloud Data -- 1 Introduction -- 2 Literature Review -- 3 Problem Formulation -- 4 Proposed Methodology -- 5 Efficiency -- 6 Conclusions and Future Work -- References -- Web Application Exploitation and Account Takeover: A Comprehensive Study of Techniques and Mitigation Strategies -- 1 Introduction -- 2 Background -- 2.1 Web Vulnerabilities -- 2.2 Account Takeover -- 3 Techniques and Scenarios -- 3.1 Exploring the Impact of Unicode Mapping Collision on Account Takeover Attacks -- 3.2 Addressing Pre-account Takeover Threats in OAuth-Enabled Applications -- 3.3 Exploiting Host Headers for Account Takeover Attacks -- 3.4 Hijacking the Response: Understanding and Mitigating Response Manipulation Attacks -- 3.5 Broken Authentication Vulnerabilities in Reset Password and Email Change Features -- 4 Conclusion -- References -- Secured Encryption Technique in S-Box Using Fermat Encoding -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Illustration -- 5 Performance Analysis -- 6 Conclusion -- References. Enhanced Gaining-Sharing Knowledge Optimization Algorithm for 3D Compression of Intrusion Detection Dataset -- 1 Introduction -- 2 Gaining-Sharing Knowledge Optimization Algorithm -- 3 EGSK-CIDD Model -- 3.1 Description of the KDDCup99 Dataset -- 3.2 Preprocessing the Datasets -- 3.3 Modularity of GSK -- 3.4 Records Filtering Process -- 3.5 Multilayer Perceptron Implementation -- 4 Implementation of the EGSK-CIDD Model -- 5 Conclusion -- References -- Uses of Blockchain in Internet of Medical Things: A Systematic Review -- 1 Introduction -- 2 Literature Review -- 2.1 Authentication Topic Utilize Blockchain -- 2.2 Intrusion Detection in Blockchain -- 2.3 Federate and Deep Learning Issue -- 2.4 Task Scheduling -- 3 Challenges and Solution by Using Blockchain in IoMT -- 4 Discussion -- 5 Conclusions -- References -- Secured Banking System Using Decentralized Approach - Block Chain -- 1 Introduction -- 1.1 Consensus Mechanism -- 1.2 Block Validation -- 1.3 Transactions -- 1.4 Block Creation -- 1.5 Proof of Work -- 2 Related Work -- 3 Proposed Work -- 3.1 Functional Modules Design and Analysis -- 4 Results and Discussion -- 5 Conclusion -- References -- A Multi-batch Differential Binary Motion Image and Deep Hashing Network for Human Action Recognition -- 1 Introduction -- 2 Methodology -- 2.1 Multiple Batches of Differential Binary Motion History -- 2.2 Description and Encoding of Features -- 2.3 Handcrafted Features: DBMH/HOG -- 2.4 Spatio-Temporal Deep AE Pattern (STDAEP) -- 3 Evaluation and Results -- 4 Conclusion -- References -- Intelligent Traffic Sign Detection and Recognition Using Computer Vision -- 1 Introduction -- 2 Related Work -- 3 Proposed System Architecture -- 4 Implementation and Results -- 5 Conclusion -- References -- Digital Guardians: Enhancing Women's Security with Artificial Intelligence and IoT -- 1 Introduction. 2 Related Work. |
Record Nr. | UNINA-9910874680603321 |
Abraham Ajith | ||
Cham : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent Systems Design and Applications : Machine Learning Solutions, Volume 7 |
Autore | Abraham Ajith |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (510 pages) |
Altri autori (Persone) |
BajajAnu
HanneThomas |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 9783031647765 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Comparative Study of Image Compression Methods Using Artificial Neural Networks Based on Semi-log Quantization -- 1 Introduction -- 2 Related Work -- 3 Image Compression by Neural Networks -- 3.1 Image Compression by Back-Propagation Neural Networks -- 3.2 Image Compression by Adaptive Neural Networks -- 3.3 Image Compression by Kohonen Networks -- 4 The Suggested Approach to Improve Compression Based on ANN -- 5 Experimental Study and Discussion -- 6 Conclusion -- References -- Granular Clustering for Maritime Situation Awareness -- 1 Introduction -- 2 Situation Awareness -- 3 Maritime Situation Awareness Based on Granular Clustering -- 3.1 Situation Representation Using Rough K-Means -- 4 Evaluation -- 4.1 Dataset -- 4.2 Results -- 5 Conclusions and Future Work -- References -- Hybrid Approach for Medical Decision-Making: Integrating ResNet-Darknet19 Based Transfer Learning with Radiomics Features for COVID-19 Classification -- 1 Introduction -- 2 ResNet-Darknet19 Transfer Learning -- 3 Radiomics Features -- 4 Hybrid Approach: Integration of ResNet-Darknet19 Transfer Learning with Radiomics Features -- 5 Methods and Materials -- 5.1 Phase 1: Transfer Learning on X-ray Lung Images -- 5.2 Phase 2: Radiomics-Based Feature Extraction and Retraining -- 6 Results and Findings -- 7 Discussion -- 8 Conclusion -- References -- Hate Speech Detection Using Deep Learning Algorithms -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 System Architecture -- 3.2 Modules -- 4 Implementation -- 5 Result and Analysis -- 6 Conclusion and Future Work -- References -- Classification of Cardiac Arrhythmia Using Machine Learning Algorithms -- 1 Introduction -- 1.1 Cardiac Arrhythmia -- 1.2 ECG Signals -- 2 Literature Review -- 3 Research Methodology -- 3.1 Machine Learning -- 3.2 Description of Dataset.
3.3 Pre-processing -- 3.4 Performance Measures -- 4 Machine Learning Algorithms -- 4.1 Decision Tree -- 4.2 K-Nearest Neighbor -- 4.3 Support Vector Machine -- 4.4 XGBoost -- 4.5 Ensemble Algorithm-Random Forest -- 5 Statistical Analysis of Results -- 5.1 Classification Result -- 6 Limitations -- 7 Future Scope -- 8 Conclusion -- References -- Exploring Machine Learning Approaches for Precipitation Prediction: Post Processing of Daily Accumulated North American Forecasts -- 1 Introduction -- 2 Data -- 2.1 Input Weather Models -- 2.2 Data Preprocessing -- 3 Models and Metrics -- 4 Results and Discussion -- 4.1 Discussion -- References -- Deep Learning-Based Classification of Conference Paper Reviews: Accept or Reject? -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Dataset Description -- 3.2 Data Cleaning and Preprocessing -- 3.3 Proposed Model -- 3.4 Explainable AI Techniques -- 4 Experimental Results -- 4.1 Performance Evaluations -- 4.2 Explanation of Bi-GRU-LSTM-CNN Model Using XAI Techniques -- 4.3 Response of Proposed RQs -- 5 Conclusions -- References -- A Layout Independent Deep Learning Framework for Recognition of Courtesy-Amount in Bank-Cheque Image -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Mask-RCNN Model-Based Courtesy Field Detection -- 3.2 Refinement of the Mask-RCNN Detection -- 3.3 Handwritten Digit Extraction -- 3.4 CNN-Based Digit Sequence Recognition -- 4 Experimentation, Results and Analysis -- 4.1 Data Set Preparation -- 4.2 Results and Performance Analysis -- 5 Conclusion -- References -- Convolutional Neural Network (CNN) Classifiers Used in Land Use/Land Cover Monitoring and Classification: A Review -- 1 Introduction -- 2 General Architecture -- 3 Datasets -- 4 Evaluation Metrics -- 5 Literature Survey -- 6 Challenges and Issues -- 7 Future Directions and Conclusion. References -- Classification of Obesity Level Using Deep Neural Networks*-8pt -- 1 Introduction -- 2 Related Work -- 3 Background -- 4 Material and Methods -- 4.1 Machine Learnings Models -- 4.2 Dataset Description -- 4.3 Methodology -- 4.4 Metrics -- 5 Simulation Results -- 6 Conclusions -- References -- Analysis of Deepfake Attacks and Detection Techniques in Smart City Applications -- 1 Introduction -- 2 Related Works -- 3 Proposed Models -- 3.1 Convolutional Neural Network (CNN) VGG16 -- 3.2 Recurrent Neural Network (RNN) LSTM -- 3.3 k-Nearest Neighbors (kNN) -- 3.4 Evaluation Metrics -- 4 Data Analysis and Results -- 4.1 The CNN VGG16 Model Using CelebDF Dataset -- 4.2 The CNN VGG16 Model Using DFDC Dataset -- 4.3 The kNN Model Using DFDC Dataset -- 4.4 The RNN LSTM Model Using CelebDF -- 4.5 The RNN LSTM Model Using DFDC -- 5 Conclusions -- References -- Deep-Net: Brain Lesion Segmentation with 3D CNN and Residual Connections -- 1 Introduction -- 2 Proposed Approach -- 3 Experimental Results -- 4 Conclusion -- References -- A Bimodal Autism Spectrum Disorder Detection Using fMRI Images -- 1 Introduction -- 2 Proposed Method -- 2.1 Feature Extraction -- 2.2 Classification -- 3 Experiments and Results -- 3.1 Experimental Settings -- 3.2 Experimental Results -- 4 Conclusion -- References -- Brood Parasitism Identification Using a Deep Learning Model with Mish Activation Function -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Pre-processing of Egg Images -- 3.2 Convolutional Neural Network with Mish Activation Function -- 4 Experimental Study -- 4.1 Dataset -- 4.2 Experimental Results -- 5 Conclusion -- References -- Mobile Application for Diabetic Foot Ulcer Detection -- 1 Introduction -- 2 Related Work -- 3 Software Development Methodology -- 3.1 Software Requirements -- 3.2 Design Patterns and Architecture. 3.3 Languages and Frameworks -- 4 Lesions Detection -- 4.1 Image Dataset -- 4.2 Object Detection Algorithms Evaluated -- 4.3 Assessment Metrics -- 5 Results and Discussion -- 5.1 Application Prototype -- 5.2 Results of Lesion Detection -- 6 Conclusion and Future Work -- References -- Unlocking the Power of LLM-Based Question Answering Systems: Enhancing Reasoning, Insight, and Automation with Knowledge Graphs -- 1 Introduction -- 2 Business Case -- 3 Knowledge Modelling: Ontology Development -- 3.1 Knowledge Graph Queries for Insights -- 3.2 From Insight to Action -- 4 Experimental Setup -- 4.1 Knowledge Graph-Prompting -- 4.2 Knowledge Graph Embedding (KGE) -- 4.3 Translating Text Queries to Graph Queries -- 4.4 Building the Knowledge Graph -- 5 Results -- 6 Discussion and Conclusion -- References -- Comparative Analysis of Machine Learning Models for Breast Cancer Patients' Survival Prediction -- 1 Introduction -- 2 Machine Learning Methods Applied to Survival Analysis -- 2.1 Cox Proportional Hazards -- 2.2 Gradient Boosting Survival -- 2.3 Random Survival Forest -- 2.4 Survival Support Vector Machine -- 3 Material and Methods -- 3.1 Database and Data Preprocessing -- 3.2 Methods, Attributes, and Hyperparameters -- 3.3 Performance Metrics -- 4 Results and Discussion -- 5 Conclusion -- References -- Unsupervised Analysis of Clinical and Laboratory Parameters of Chronic Kidney Disease -- 1 Introduction -- 2 Related Work -- 3 Material and Methods -- 3.1 Clustering Methods -- 3.2 Dataset -- 3.3 Pre-processing -- 3.4 Data Filtering and Analysis -- 3.5 Classification of Exam Values -- 4 Results and Discussion -- 4.1 Class Distribution Analysis by Stage -- 4.2 Computational Experiment -- 4.3 Results from the Clustering Algorithm -- 4.4 Dimensionality Reduction Method -- 5 Conclusion -- References. Use of Deep Learning for the Segmentation of Aquaculture Fishponds in the State of Minas Gerais, Brazil -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data Acquisition -- 2.2 YOLO Model -- 2.3 Evalutation Metrics -- 2.4 Calculating the Location and Area of the Fishponds -- 3 Results and Discussion -- 3.1 The Model -- 3.2 Area of the Fishponds -- 4 Conclusions -- References -- Bridging the Mind-Machine Gap: Harnessing AI and ML for EEG Signal Processing and Brainwave Decoding -- 1 Introduction -- 1.1 Decoding the Neuroelectric Lexicon -- 1.2 Applications: Unveiling the Brain's Enigma -- 1.3 The Essence of Feature Extraction -- 1.4 Pioneering Future Frontiers -- 2 Literature Review -- 3 Understanding EEG Data -- 4 Preprocessing of EEG Data: Enhancing Signal Quality for Accurate Analysis -- 4.1 Filtering -- 4.2 Artifact Removal -- 4.3 Referencing -- 4.4 Spatial Features: Visualizing Brain Activity Distribution -- 5 Advanced Analysis Techniques in EEG Signal Processing -- 5.1 Event-Related Potentials (ERPs): Probing Brain Responses -- 5.2 Time-Frequency Analysis: Unveiling Temporal and Frequency Dynamics -- 5.3 Machine Learning and Deep Learning: Decoding Brain Patterns -- 6 Brain-Computer Interfaces (BCIs): A Paradigm of Neurotechnology -- 6.1 Neurofeedback: Training the Brain for Therapeutic Gains -- 6.2 Cognitive Neuroscience: Unraveling Brain Functions and Cognitive Processes -- 6.3 Clinical Diagnosis: Detecting and Addressing Neurological Disorders -- 7 Conclusion -- 7.1 Advanced Techniques in EEG Signal Processing -- 7.2 Applications of EEG Signal Processing -- 7.3 The Future: Advancements and Possibilities -- References -- Analysis of Intelligent Crop Recommendation System -- 1 Introduction -- 2 Literature Review -- 3 Methods and Material -- 4 Results and Discussion -- 5 Conclusion -- References. Multiclass Chest X-Ray Image Classification for Respiratory Diseases: A Deep Learning Framework. |
Record Nr. | UNINA-9910874686303321 |
Abraham Ajith | ||
Cham : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent Systems Design and Applications : Smart Healthcare, Volume 1 |
Autore | Abraham Ajith |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (0 pages) |
Altri autori (Persone) |
BajajAnu
HanneThomas SiarryPatrick |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 9783031648137 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Identifying Lung Cancer from CT-Scan Images with VGG16 Convolutional Neural Net -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Model Building & -- Training -- 3.4 Results & -- Discussion -- 4 Conclusion -- References -- Cause and Effect of Dementia on Women in Technological Environment -- 1 Introduction -- 2 Literature Survey -- 3 Cause of Dementia -- 4 Comparative Analysis of Dementia -- 5 An Intelligent Dementia Detector -- 6 Conclusion -- References -- Machine Learning Techniques for Pancreatic Cancer Detection -- 1 Introduction -- 1.1 Pancreatic Cancer: A Lethal Challenge -- 1.2 Importance of Early Detection -- 1.3 Role of Machine Learning in Cancer Detection -- 2 Literature Review -- 3 Empowering Cancer Detection with ML -- 3.1 Basic Machine Learning Algorithms for Pancreatic Cancer Detection -- 3.2 Advance Machine Learning Techniques -- 3.3 Deep Learning Methods for Pancreatic Cancer Detection -- 4 Materials and Methods -- 4.1 Data Collection -- 4.2 Data Preprocessing -- 4.3 Machine Learning Algorithms -- 4.4 Interpretability and Explainability -- 4.5 Performance Evaluation -- 5 Results -- 5.1 Performance Evaluation Metrics: -- 5.2 Performance Comparison -- 5.3 Feature Importance Analysis: -- 6 Discussion -- 7 Conclusion -- References -- Integrating Artificial Intelligence and Data Analytics for Enhanced Healthcare Management: Innovations and Challenges -- 1 Introduction -- 2 Background -- 3 Research Methodology -- 4 Applications of AI in Healthcare Industry -- 4.1 AI for Drug Discovery -- 4.2 AI for Clinical Trials -- 5 Challenges of Artificial Intelligence in Healthcare Management -- 5.1 Data Availability and Its Quality -- 5.2 Data Privacy and Security -- 5.3 Interoperability -- 6 Conclusion -- References.
An Intelligent Model for Post Covid Hearing Loss -- 1 Introduction -- 2 Mathematical Model -- 3 Non-negativity and Boundedness of the Solutions -- 4 Stability Analysis -- 5 Numerical Simulations -- 6 Result -- 7 Conclusion and Future Work -- References -- Medical Reports Simplification Using Large Language Models -- 1 Introduction -- 2 Materials and Methods -- 2.1 Fine-Tuning T5 -- 3 Results and Discussion -- 4 Conclusion -- References -- Analysis of Magnetic Resonance Imaging for Parkinson's Disease -- 1 Introduction -- 2 Dataset Description -- 3 Methodology -- 4 Simulation Results -- 5 Conclusion -- References -- Study on Health Issue Identification Using Deep Learning and Convolutional Neural Networks -- 1 Introduction -- 1.1 Benefits of Deep Learning in the Medical Field -- 1.2 Enhanced Diagnostics -- 2 Methods -- 3 Conclusion -- References -- Early-Stage Lung Cancer Prediction: A Machine Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Pre-processing -- 3.3 Exploratory Data Analysis -- 3.4 Machine Learning Algorithms -- 3.5 Model Evaluation -- 3.6 GridSearchCV -- 3.7 Feature Importance -- 4 Results -- 4.1 Results of EDA -- 4.2 Model Evaluation -- 5 Discussion -- 6 Conclusion -- References -- Convolutional Neural Network-Based Brain Tumor Segmentation Using Detectron2 -- 1 Introduction -- 2 Problem Statement -- 3 Convolutional Neural Networks -- 3.1 Mask R-CNN -- 3.2 Detectron2 -- 4 Results and Discussion -- 4.1 Quantitative Evaluation -- 4.2 Qualitative Evaluation -- 5 Conclusion and Future Works -- References -- Deep Learning-Based Histopathological Analysis for Colon Cancer Diagnosis: A Comparative Study of CNN and Transformer Models with Image Preprocessing Techniques -- 1 Introduction -- 2 Related Works -- 3 Proposed System -- 3.1 Preprocessing -- 3.2 Deep Learning Networks. 4 Results and Discussion -- 4.1 Dataset Description -- 4.2 Data Augmentation -- 4.3 Performance Analysis -- 5 Conclusion -- References -- Detecting Parkinson's Disease at an Early Stage Through Machine Learning Analysis of Brain MRI Images -- 1 Introduction -- 2 Methodology -- 2.1 Data Collection and Pre-processing -- 2.2 Skull Stripping Segmentation -- 2.3 Feature Extraction -- 2.4 Machine Learning Classification -- 2.5 Validation -- 3 Results -- 3.1 Segmentation -- 3.2 Feature Extraction -- 3.3 Brain Shape Analysis -- 3.4 Performance of Machine Learning Classifiers -- 4 Discussion -- 5 Conclusion -- References -- Early-Stage Cervical Cancer Detection via Ensemble Learning and Image Feature Integration -- 1 Introduction -- 2 Related Works -- 3 Methods -- 3.1 Preprocessing Module -- 3.2 Classification Module -- 3.3 Proposed Feature Integration -- 4 Results -- 4.1 Experimental Environment -- 4.2 Dataset -- 4.3 Evaluation Criteria -- 4.4 Experimental Results -- 5 Conclusion -- References -- Comprehensive Comparative Analysis of Breast Cancer Forecasting Using Machine Learning Algorithms and Feature Selection Methods -- 1 Introduction -- 2 Methodology -- 2.1 Dataset Preparation -- 2.2 Machine Learning Model -- 2.3 Dataset -- 3 Result and Discussion -- 4 Conclusion -- References -- Classification of Arrhythmia Using Deep Learning -- 1 Introduction -- 1.1 Motivation -- 1.2 Objectives -- 1.3 Advantages of the Proposed Methodology -- 2 Background -- 2.1 Limitations of the Existing Model -- 3 Proposed Methodology -- 3.1 Dataset Pre-processing: -- 3.2 Terms -- 4 Results -- 5 Future Work -- 6 Conclusion -- References -- An Integrated Machine Learning and IoT Based Approach for Enhanced Healthcare Efficiency and Personalized Treatment -- 1 Introduction -- 2 Methodology -- 2.1 Sensors Used in This Research -- 2.2 Machine Learning Algorithm. 3 Working of the Proposed System -- 4 Result and Discussion -- 5 Conclusion -- References -- CeLaTis: A Large Scale Multimodal Dataset with Deep Region Network to Diagnose Cervical Cancer -- 1 Introduction -- 2 Related Works -- 2.1 Colposcope Image Datasets -- 2.2 Automated Diagnostic Models on Colposcope Images -- 3 CeLaTis Dataset -- 3.1 Data Acquisition -- 3.2 Acquisition Procedure -- 3.3 Features -- 4 Methodology -- 4.1 Segmentation -- 4.2 Lesion Recognition Network -- 4.3 Classification -- 5 Conclusion -- References -- A Deep Learning Approach With Sparse Autoencoder for Alzheimers Disease Classification -- 1 Introduction -- 2 Research Background -- 3 Dataset -- 4 Proposed Methodology -- 4.1 Preprocessing -- 4.2 Feature Extraction and Dimensionality Reduction -- 4.3 Deep Neural Network -- 5 Results and Discussion -- 6 Conclusion -- References -- An Improved Gradient Based Joint Histogram Equalization Technique for Mammogram Image Contrast Enhancement -- 1 Introduction -- 2 Suggested Methodology -- 2.1 Extraction of the Gradient Image -- 2.2 Contrast Enhancement Using Joint Histogram -- 3 Results and Discussion -- 4 Conclusion -- References -- Comparative Performance Analysis of Deep Learning Models in Cervical Cancer Detection -- 1 Introduction -- 2 Related Literature -- 3 Methods -- 3.1 DenseNet -- 3.2 AlexNet -- 3.3 ResNet -- 3.4 Vgg 16 -- 4 Results -- 4.1 Experimental Environment -- 4.2 Dataset -- 4.3 Evaluation Criteria -- 4.4 Experimental Results -- 5 Conclusion -- References -- Comparative Analysis for Feature Selection Approaches for Parkinson's Disease Prediction -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Data -- 3.2 Exploratory Analysis of Data -- 3.3 Feature Selection Methods -- 3.4 Classification Algorithm -- 4 Result Analysis -- 4.1 Metrics -- 4.2 Statistical Analysis -- 5 Conclusion and Future Works. References -- Autism Spectrum Disorder Prediction: A Machine Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Pre-processing -- 3.3 Exploratory Data Analysis -- 3.4 Machine Learning Algorithms -- 3.5 Model Evaluation -- 3.6 K-fold Cross-Validation -- 3.7 Feature Importance -- 4 Results -- 4.1 Results of EDA -- 4.2 Model Evaluation -- 5 Discussion -- 6 Conclusion -- References -- Epileptic Seizure Detection on EEG Images Using the Decimal Descriptor Pattern -- 1 Introduction -- 2 Methodology -- 2.1 Database -- 2.2 Feature Extraction -- 2.3 Support Vector Machine (SVM) Classifier -- 2.4 Proposed Approach -- 3 Results and Discussion -- 4 Conclusion -- References -- Influence of Rician Noise on Cardiac MR Image Segmentation Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 MRI Dataset -- 3.2 Rician Noise in MRI Image -- 3.3 AI Segmentation Models -- 3.4 Assessing the Noise Resilience of the Model -- 4 Result -- 5 Discussion -- 6 Conclusion -- References -- A Single-Stage Deep Learning Approach for Multiple Treatment and Diagnosis in Panoramic X-ray -- 1 Introduction -- 2 Material and Methods -- 2.1 Dataset and Annotation -- 2.2 Proposed Method -- 2.3 Experimental Setup -- 3 Results and Discussion -- 4 Conclusion -- References -- Precision Care in Addiction Treatment: A Bayesian-Based Machine Learning Analysis for Adults with Substance Use Disorders -- 1 Introduction -- 2 Related Works -- 2.1 Machine Learning for HealthCare -- 2.2 Machine Learning for SUD Treatment -- 3 Methods -- 3.1 Proposed Structure -- 3.2 Data Pre-Processing and Filtration Criteria -- 4 Results and Discussion -- 4.1 Outcome Obtained Through Cross-Validation Methods -- 5 Conclusion and Future Work -- References. Hybrid Network Model for the Prediction of Retinopathy of Prematurity from Neonatal fundus images. |
Record Nr. | UNINA-9910878050103321 |
Abraham Ajith | ||
Cham : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent Systems Design and Applications : Deep Learning, Volume 2 |
Autore | Abraham Ajith |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2024 |
Descrizione fisica | 1 online resource (514 pages) |
Altri autori (Persone) |
BajajAnu
HanneThomas HongTzung-Pei |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 3-031-64836-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Deep Learning Approach for Autonomous Spacecraft Landing -- 1 Introduction -- 2 Related Work -- 3 Simulation Details -- 4 Training a Deep Neural Network -- 5 Results -- 6 Conclusion and Future Scope -- References -- Deep Learning Approach for Flood Mapping Using Satellite Images Dataset -- 1 Introduction -- 2 Related Works -- 3 Proposed Algorithm -- 4 Data Analysis and Results -- 4.1 Sample Output -- 4.2 Performance Analysis -- 4.3 Performance Graph -- 5 Conclusion -- References -- Large Language Models for Named Entity Recognition (NER) of Skills in Job Postings in German -- 1 Introduction -- 2 Problem Description -- 2.1 Problem -- 2.2 Optimization Methods -- 2.3 Implementation and Comparison of Different Optimization Methods -- 3 Models -- 4 Evaluation Methods -- 5 Standard NER Functionality -- 6 Context Model -- 7 Few-Shot Learning Model -- 8 Cost Considerations -- 9 Conclusions -- References -- Machine Learning Approaches for Investing Strategies in Stock Market -- 1 Introduction -- 2 Literature Review -- 3 System Architecture: Enhancing Investing Strategies with Ml -- 3.1 Architecture and System Architecture for Machine Learning Approaches in Investing Strategies for Stock Market -- 3.2 Data Preprocessing -- 3.3 Model Training -- 3.4 Model Evaluation -- 3.5 Model Deployment -- 3.6 System Architecture -- 3.7 Flowchart -- 4 Description of the Experiment -- 4.1 Model Training -- 4.2 DNN Model Training -- 4.3 Evaluation -- 5 Strategic Stock ML Implementation -- 6 Results and Decision Making: Leveraging Machine Learning for Stock Market Investing -- 6.1 Better Prediction -- 6.2 Entry/Exit Points -- 6.3 Data-Driven Decisions -- 6.4 Portfolio Performance -- 6.5 Decision Making -- 7 Comparison of Machine Learning Techniques for Investing Strategies in the Stock Market -- 7.1 Math Foundations.
7.2 Predictive Skills -- 7.3 Graphical Representations: -- 8 Conclusion: Embracing the Future of Stock Market Investing with Machine Learning -- 8.1 Data-Driven Decision Making -- 8.2 Future Scope -- References -- OP-FedELM: One-Pass Privacy-Preserving Federated Classification via Evolving Clustering Method and Extreme Learning Machine Hybrid -- 1 Introduction -- 2 Literature Survey -- 3 Preliminaries -- 3.1 Evolving Clustering Machine -- 3.2 Extreme Learning Machine -- 4 Proposed Methodology -- 4.1 Phase I: Generation of the Perturbed Dataset -- 4.2 PHASE II: OP-FedELM -- 5 Dataset Description -- 6 Results and Discussions -- 6.1 Computational Analysis -- 7 Conclusions and Future Directions -- References -- Gamma Corrected Pyramid Pix2pix - Breast Cancer HE to IHC Image Generation -- 1 Introduction -- 2 Existing Solutions and Objective of Present Study -- 3 Methods and Materials -- 3.1 The Programming Environment -- 4 Proposed Methodology -- 5 Results and Discussions -- 5.1 Projection Profile Comparison -- 5.2 Qualitative Validation -- 6 Conclusions and Future Scope -- References -- Unveiling Deepfakes: Convolutional Neural Networks for Detection -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 Proposed Method -- 5 Results and Discussion -- 6 Conclusion -- References -- The Nasdaq Composite Index Prediction Using LSTM and Bi-LSTM Multivariate Deep Learning Approaches -- 1 Introduction -- 2 Related Studies -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- PlastOcean: Detecting Floating Marine Macro Litter (FMML) Using Deep Learning Models -- 1 Introduction -- 1.1 Effect of FMML on CO2 Cycle -- 1.2 Effect of FMML on Aquatic Life -- 1.3 Estimation of Plastic Production -- 1.4 Non-AI-Based Estimation Methodologies of FMML Identification -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Constructing Datasets. 3.2 Enhancing PlastOcean Dataset -- 3.3 Building Deep Neural Network for Object Detection -- 4 Results -- 5 Discussion -- 5.1 Previous Results by the Ocean Cleanup -- 5.2 Improving the Dataset -- 6 Conclusion and Future Work -- References -- Data Augmentation Using Generative Neural Networks Based on Fourier Feature Mapping -- 1 Introduction -- 2 Related Work -- 2.1 Data-Level Approaches -- 2.2 Data-Level Approaches -- 2.3 Cost-Sensitive Learning -- 3 Proposed Approach -- 3.1 Basic Concept -- 3.2 Approach Details -- 4 Experiment -- 4.1 Experimental Data and Environment -- 4.2 Experimental Settings -- 4.3 Experimental Results -- 5 Conclusions -- References -- Delay Risk Detection in Road Construction Projects Utilizing Large Language Model -- 1 Introduction -- 2 Related Work -- 2.1 Delay Risk Identification in Construction Projects -- 2.2 Text Mining in Construction Project Management -- 3 Road Construction Delay Risk Detection System -- 4 Experiment and Results -- 4.1 Experiment Setup -- 4.2 Results -- 5 Conclusion -- References -- Unlocking the Potential of Novel LSTM in Airline Recommendation Prediction -- 1 Introduction -- 2 Literature Review -- 2.1 Customer Recommendations -- 2.2 Online Reviews -- 3 Proposed Methodology -- 3.1 Dataset Description -- 3.2 Data Pre-processing -- 3.3 Feature Selection -- 3.4 Machine Learning Methodologies -- 3.5 Model Architecture -- 4 Result Analysis -- 4.1 Training -- 4.2 Testing -- 5 Conclusion -- References -- Pylung: A Supporting Tool for Comparative Study of ViT and CNN-Based Models Used for Lung Nodules Classification -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Dataset -- 3.2 Preparing the Dataset -- 3.3 Models -- 3.4 Pylung Tool -- 4 Results -- 5 Discussion -- 6 Conclusion -- References. Deep Learning Model for Predicting Rice Plant Disease Identification and Classification for Improving the Yield -- 1 Introduction -- 2 Methodology -- 2.1 Dataset Description -- 2.2 Types and Number of Diseases Represented -- 2.3 Description of Neural Architecture Search (NAS) -- 3 Proposed Methodology -- 4 Results and Discussion -- 4.1 Performance of Proposed Method -- 4.2 Comparison with Other Disease Detection Methods -- 5 Conclusion -- References -- Deep Learning-Based Active Fire Detection Using Satellite Imagery -- 1 Introduction -- 2 Methods -- 2.1 Dataset -- 2.2 Data Source -- 2.3 Approach -- 3 Results -- 4 Conclusion -- References -- Evaluating Time Series Classification with GAN-Generated Synthetic Data -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- Word2Vec-GloVe-BERT Embeddings for Query Expansion -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Word2Vec Term Embeddings Creation and Selection -- 3.2 GloVe Term Embeddings Creation and Selection -- 3.3 BERT Term Embeddings Creation and Selection -- 4 Evaluation -- 4.1 Experimental Setup -- 4.2 Experimental Results -- 5 Conclusion -- References -- A BERT Based Architecture for Detecting Arabic Fake News -- 1 Introduction -- 2 Related Work -- 2.1 Classical Machine Learning Approaches -- 2.2 Deep Learning Approaches -- 2.3 Bidirectional Encoder Representations from Transformer (BERT) Approaches -- 3 Dataset Details -- 4 Proposed Approach -- 4.1 Bidirectional Encoder Representations from Transformers (BERT) -- 4.2 AraBERT -- 4.3 AraBERT V2.0 -- 4.4 Other Models -- 5 Experiments and Results -- 5.1 Experimental Setup -- 5.2 Experimental Results -- 6 Conclusion -- References -- Deep Learning-Based Approaches for Facial Recognition Technology Through Convolutional Neural Networks -- 1 Introduction. 2 Background Details and Related Work -- 3 Proposed Approach -- 4 Implementation of the System -- 5 Conclusions -- References -- Cognizant Prognostication: An In-Depth Comparative Study of Machine Learning Models for Predictive Employee Turnover Analysis in the Realm of Human Resources Analytics -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Data Pre-processing -- 3.2 Feature Engineering -- 3.3 Dataset Split and Model Selection -- 4 Model Training and Evaluation -- 4.1 Model Training -- 4.2 Model Evaluation -- 4.3 Results and Comparison -- 5 Discussion -- 6 Results -- 6.1 Model Training -- 6.2 Model Evaluation -- 7 Comparison Table -- 8 Roc Curves -- 9 Discussion -- 10 Conclusion -- References -- Enhancing Road Infrastructure Maintenance Using Deep Learning Approach -- 1 Introduction -- 2 Related Works -- 3 Model Introduction and Improvement -- 4 Dataset -- 5 Design and Implementation -- 5.1 Implementation -- 5.2 Image Dataset -- 5.3 Dataset Preparation -- 5.4 Model Training -- 6 Experimental Results and Discussion -- 6.1 YOLOV8 with Crack Class -- 6.2 YOLOV8 with Pothole Class -- 6.3 YOLOV8 with Two Classes -- 6.4 Visual Analysis -- 7 Conclusion and Future Works -- References -- E-Learning Facial Emotion Recognition Using Deep Learning Models -- 1 Introduction -- 2 Related Work -- 2.1 Approaches to Emotion Recognition (ER) -- 2.2 E-Learnig Emotion Recongition -- 3 Data Collection and Preprocessing -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 4 Methodology -- 4.1 Face Detection -- 4.2 Emotion Recognition (ER) -- 5 Dataset Preparation and Results -- 5.1 Data-Set Preparation -- 5.2 Results -- 6 Comparaison with Others Works -- 7 Conclusion -- References -- Music Recommender Based on the Facial Emotion of the User Identified Using YOLOV8 -- 1 Introduction -- 2 Literature Review -- 3 Proposed Model. 3.1 Dataset Description and Pre-processing. |
Record Nr. | UNINA-9910878044703321 |
Abraham Ajith | ||
Cham : , : Springer International Publishing AG, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent Systems Design and Applications : Natural Language Processing, Volume 4 |
Autore | Abraham Ajith |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing AG, , 2024 |
Descrizione fisica | 1 online resource (500 pages) |
Altri autori (Persone) |
BajajAnu
HanneThomas SiarryPatrick |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 3-031-64779-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Automatic Textual Normalization for Hate Speech Detection -- 1 Introduction -- 2 Related Works -- 3 Dataset Creation -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Data Annotation -- 3.4 Error Analysis of Annotation -- 3.5 Dataset Statistics -- 4 Methodology -- 4.1 Normalization Methods -- 4.2 Experimental Settings -- 4.3 Evaluation Metrics -- 4.4 Experimental Results -- 4.5 Error Analysis of Normalization -- 4.6 Leveraging Automatic Textual Normalization for Hate Speech Detection -- 5 Conclusion and Future Direction -- References -- SOTW: Semantics Oriented Tagging of Web Pages -- 1 Introduction -- 2 Related Works -- 3 Proposed System Architecture -- 4 Performance Evaluation and Results -- 5 Conclusion -- References -- Crowdsourcing Applications in Smart Cities -- 1 Introduction -- 2 Overview of MCS in Smart Cities -- 2.1 Outline of Mobile Crowdsourcing -- 2.2 Classification of MCS Systems -- 3 Technologies of Task Scheduling, and Incentive Mechanism -- 3.1 Task Feasibility -- 3.2 Completion Time -- 3.3 Task Pricing -- 3.4 Spacial Factors -- 3.5 Task Complexity -- 4 Task Administration and Assignment -- 4.1 Assigning Subtasks -- 4.2 Participation Information -- 5 Future Challenges -- 5.1 Scarce Resources -- 5.2 Privacy Control -- 5.3 Trustworthy Assessment of Information -- 5.4 Heterogeneity of Hardware and Podiums -- 5.5 Nonparticipator Observation -- 6 Conclusion -- References -- Evaluation of Vendor Analysis Using AHP at TUV Manufacturing Company -- 1 Introduction -- 1.1 Problem Definition -- 1.2 Research Question -- 1.3 Objectives of This Study -- 2 Literature Support -- 3 Research Methodology -- 3.1 AHP Method - Step by Step Procedure -- 3.2 Structural Hierarchy of the Study -- 4 Procurement Department Process in TUV - Chennai, Tamil Nadu -- 4.1 Vendors Analysis.
5 Results and Discussions -- 6 Conclusion -- References -- TESA: Tagging of Educational Videos Using Semantics Oriented Artificial Intelligence -- 1 Introduction -- 2 Related Works -- 3 Proposed System Architecture -- 4 Implementation, Performance Evaluation and Results -- 5 Conclusions -- References -- SISRR: Semantically Inclined Strategic Learning Model for Software Requirement Recommendation Using Artificial Intelligence -- 1 Introduction -- 2 Related Work -- 3 Proposed System Architecture -- 4 Implementation and Result -- 5 Conclusion -- References -- Isolated Word Recognition Based on Power Normalized Cepstrum and Machine Learning Clusters -- 1 Introduction -- 2 Isolated Word Recognition - Experimental Framework -- 2.1 PNCC Extraction -- 2.2 Template Creation Framework -- 2.3 Testing of Speech Recognition System -- 2.4 Results and Discussion -- 3 Conclusion -- References -- A Core Domain Ontology for Specifying the Business View of Enterprise Information Systems -- 1 Introduction -- 2 Related Work: "Three Fit" Problems -- 3 Sensitive Business Process Specification: A Core Domain Ontology -- 3.1 Our Reference Ontological Framework -- 3.2 Overview of COSBP Ontology -- 4 Conclusion and Perspectives -- References -- Data-Driven Exploration of Pandemic's Psychological Impact and Lifestyle Changes Through Clustering Approach -- 1 Introduction -- 1.1 Problem Formulation -- 1.2 Motivation -- 1.3 Objectives -- 2 Literature Review -- 2.1 Exploring Psychological Distress and Mental Health Outcomes -- 2.2 Analyzing Sentiment, Machine Learning, and Mental Health Interventions -- 2.3 Long-Term Psychological Impact and Varied Dimensions -- 2.4 Insights from Indian Studies on Psychological Impact of COVID-19 -- 3 Methodology -- 4 Results and Discussion -- 4.1 Data-Driven Exploration and EDA -- 4.2 Supervised Learning Models -- 4.3 Unsupervised Learning Models. 5 Conclusions -- References -- Explainable Artificial Intelligence for Analytical Customer Relationship Management in Banking and Finance -- 1 Introduction -- 1.1 Overview of LIME -- 1.2 Overview of SHAP -- 2 Literature Review -- 3 Description of Datasets -- 4 Experiments -- 4.1 Node Description -- 4.2 Workflow Description -- 5 Results and Discussions -- 5.1 LIME -- 5.2 SHAP -- 6 Conclusions -- References -- Artificial Intelligence Based Chatbots is Killing Creative Minds: An Effective Discussion on Modern Education -- 1 Introduction - AI Based Chatbots/Tools -- 1.1 Organization of the Work -- 2 Importance of Creativity in Education -- 2.1 Defining Creativity and Its Significance -- 2.2 The Link Between Creativity and Critical Thinking -- 3 AI-Based Chatbots and Their Impact on Creativity -- 3.1 Limitations in Nurturing Creative Problem-Solving -- 3.2 The Role of Educators and AI-Based Chatbots -- 4 Nurturing Creativity in the Digital Age -- 5 Ethical Issues and Challenges Towards AI-Driven Education -- 6 The Future of AI Based Chatbots in Modern Education -- 7 Recommendations for Educators, Institutions, and Policy Makers for AI Driven Education in Today's Smart Era -- 8 Conclusion -- References -- SIGAN: Self-inhibited Graph Attention Network for Text Classification -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Text Graph Construction -- 3.2 Self-inhibited Graph Attention Network -- 3.3 Text Classification -- 4 Experiment -- 4.1 Dataset -- 4.2 Baseline Models -- 4.3 Ablation Experiments -- 5 Conclusoin and Future Work -- References -- Unfolding the Misinformation Spread: An In-Depth Analysis Through Explainable Link Predictions and Data Mining -- 1 Introduction -- 2 Related Works -- 3 Research Methodology -- 4 Research Findings. 4.1 What Are the Most Frequent Relationships? Are the Paths Driven More by Interpersonal Relationships or Affinity Among Ideas? -- 4.2 Analysis on Subnetworks -- 4.3 What Kind of Relationship is this Starting One? How Does the Path Develop Differently from this One? -- 4.4 Additional Analysis -- 5 Conclusion -- References -- Schematic Review of Sentiment Analysis Techniques -- 1 Introduction -- 1.1 Artificial Neural Network -- 1.2 Role of NLP in Opinion Mining -- 1.3 Evolution of Sentiment Analysis -- 2 Existing Researches -- 3 Challenges -- 4 Process Flow of Work -- 5 Conclusion -- References -- How Can Credit Scoring Benefit from Machine Learning? SWOT Analysis -- 1 Introduction -- 2 Literature Review -- 2.1 Statistical Models -- 2.2 Machine Learning Models -- 3 Research Methodology -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Gesture Recognition to Text Conversion for Human-Computer Interaction Through Computer Vision Technology -- 1 Introduction -- 2 Background Details and Related Work -- 3 Proposed Approach -- 4 Implementation of the system -- 5 Conclusions -- References -- Performance Measurement of Reading Teaching-Learning Business Processes: Case of Whole-Word and Syllabic Reading Methods in Primary Schools -- 1 Introduction -- 2 Business Process Management in the Context of Education -- 2.1 BPM and BP Definition -- 2.2 Educational BPM -- 3 KPI in the Context of Education -- 3.1 KPI Definition -- 3.2 KPI in BPM -- 3.3 KPI in the Educational Context -- 4 Approach for Performance Measurement of Languages Learning Business Processes -- 4.1 Step 1: Modeling of Languages' Learning Business Processes -- 4.2 Step 2: Languages Learning KPI Identification - Extraction -- 4.3 Step 3: Business Process Execution Using Identified Learning KPI -- 4.4 Step 4: Business Processes Performance Measurement. 5 Case Study: Primary School - 3rd Year -- 6 Discussion -- 7 Conclusion -- References -- EDULE: An AI-Enhanced Collaborative Learning Platform for Students -- 1 Introduction -- 2 Related Work -- 3 Proposed System Architecture -- 4 Implementation and Results -- 5 Conclusion -- References -- Textual Semantics Analysis Using String Kernels-Based Spectral Clustering with Incremental Hierarchical Topic Clustering -- 1 Introduction -- 2 Related Studies -- 3 Materials and Methods -- 3.1 Datasets -- 3.2 String Kernels -- 3.3 String Similarity Measures -- 4 Proposed Approach -- 5 Experiments -- 6 Results and Discussion -- 7 Conclusions and Future Scope -- References -- Preprocess the Text Based Customer Review Data for Sentiment Analysis -- 1 Introduction -- 2 Review of Literature -- 3 Preprocessing Methods -- 4 Experimental Results -- 5 Conclusion -- References -- Data Warehouse Design to Support Social Media Analysis: The Case of Twitter and Facebook -- 1 Introduction -- 2 Related Works -- 3 Overview of the Proposed Approach -- 4 Data Extraction and Cleaning -- 5 Data Mapping from Social Media -- 6 Multidimensional Schema Concepts -- 7 Experimental Results -- 8 Conclusions -- References -- Machine Learning in Tourism Research: A Bibliometric Analysis Using Dimensions Database -- 1 Introduction -- 2 Methodology -- 2.1 Bibliometric Analysis -- 2.2 Database -- 2.3 Analytical Tool -- 3 Results -- 3.1 Top Contributing Authors -- 3.2 Top Contributing Institutions and Countries -- 3.3 Top Contributing Sources and Top Cited Documents -- 3.4 Keyword Analysis -- 4 Conclusion -- References -- Efficiency of Dropout Regularization in Character Recognition: Introducing the Dropout Efficiency Score Within Intelligent Systems Architectures -- 1 Introduction -- 2 Literature Review -- 3 Background Concepts -- 3.1 Regularization -- 3.2 Challenges -- 4 Methodology. 4.1 Model Architecture. |
Record Nr. | UNINA-9910878048703321 |
Abraham Ajith | ||
Cham : , : Springer International Publishing AG, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent Systems Design and Applications : Real World Applications, Volume 5 |
Autore | Abraham Ajith |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (523 pages) |
Altri autori (Persone) |
BajajAnu
HanneThomas SiarryPatrick MaKun |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 3-031-64847-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- ISDA 2023 Preface - Volume 5 -- Organizing Committees -- Contents -- Multi-player Gaming Application Based on Human Body Gesture Control -- 1 Introduction -- 2 Existing System -- 2.1 Traditional Input Devices in Gaming -- 2.2 Enhanced Physical Gaming Systems -- 2.3 Advanced Body Movements in Games -- 3 Proposed System -- 3.1 Dynamic Gameplay -- 3.2 Multiplayer Capability -- 3.3 Physical Activity Promotion -- 3.4 Dashboard with Statical Data -- 3.5 Interaction Among Players -- 3.6 High Level Gaming Experience -- 4 Literature Survey -- 5 Methodology -- 5.1 Objective -- 5.2 Approaches Considered -- 5.3 Gesture Detection and Tracking -- 5.4 Virtual Switches Mechanism -- 5.5 MediaPipe Gesture Fusion -- 5.6 Multiplayer Considerations -- 5.7 Implementation Details -- 5.8 Optimizations and Challenges -- 6 Results -- 7 Conclusion -- References -- Some Novel Fixed Point Findings in Intuitionistic Fuzzy b-Metric Spaces -- 1 Introduction -- 2 Preliminaries -- 3 New Findings -- 4 Conclusion -- References -- Impact Investigation for Gain Flattening Optimization of EDFA-Based Systems for Long-Haul WDM Applications -- 1 Introduction -- 2 Proposed Methodology -- 3 Results and Discussions -- 4 Conclusions -- References -- Modelling Inters Seasonal Variability Impact on Water Demand in a Smart City -- 1 Introduction -- 2 Materials and Method -- 2.1 Study Area Description -- 3 Sample Design and Procedure -- 3.1 Dataset Analyses -- 4 Results and Discussion -- 5 Conclusions -- 6 Limitations of the Study -- References -- Eco-designed Recirculating Vertical Aquaponic Lettuce Production System Through Mamdani Fuzzy Logic-Based Adaptive Fertigation -- 1 Introduction -- 2 Materials and Methods -- 3 Results and Discussion -- 4 Conclusion and Future Works -- References -- Video Codec Using Machine Learning Image Compression Techniques -- 1 Introduction.
2 Artificial Intelligence for Image Encoding -- 3 Artificial Intelligence to Generalize Image-Encoding Technique to Video Encoding -- 4 The Experiment -- 5 Conclusion -- References -- mRMR Feature Selection to Handle High Dimensional Datasets: Vertical Partitioning Based Iterative MapReduce Framework -- 1 Introduction -- 2 Theoretical Discussion on mRMR -- 3 Analysis of the Extant MapReduce Approaches for mRMR -- 3.1 SparkVIFS -- 3.2 SparkInfo-Theoretic -- 4 Proposed Methodology -- 5 Results and Discussions -- 5.1 Cluster Configuration -- 5.2 Computational Gain -- 5.3 Comparative Analysis Between VMRmRMR with SparkVIFS -- 5.4 Comparative Analysis Between VMRmRMR and SparkInfo-Theoretic -- 5.5 Comparative Analysis Between HMRmRMR and VMRmRMR -- 6 Conclusion -- References -- Design and Development of Low-Cost Smart Safety System for Residence -- 1 Introduction -- 2 Background Study -- 2.1 Related Work -- 3 Proposed Model and Design -- 3.1 System Architecture/3D Model -- 3.2 Block Diagram and Algorithm of Proposed Model -- 4 Simulation Analysis -- 5 Hardware Implementation and Result Analysis -- 5.1 Result Analysis -- 6 Conclusions -- References -- Teaching Service-Oriented Architectures Using a Two-Player Online Game -- 1 Introduction -- 2 Context -- 3 The Project -- 3.1 Service Endpoints -- 3.2 Client Frontend -- 3.3 Security and Penetration Testing -- 3.4 Reflection -- 4 Project Execution -- 5 Evaluation -- 6 Summary and Conclusion -- References -- Distribution Methodology for Objects Extraction from Complex Network and Colorization -- 1 Introduction -- 2 Related Work -- 3 Theoretical Background -- 3.1 AVI Header -- 3.2 Cellular Automata -- 3.3 PageRank Algorithm -- 4 Proposed Method -- 5 Experiments -- 6 Discussion and Conclusions -- References -- Multiparameter Physiological Estimation Based on Multi-electrodes and Bioimpedance Measurement Method. 1 Introduction -- 2 Materials and Methods -- 2.1 Design the Block Diagram of the System -- 2.2 Algorithm Flow Chart -- 3 Experiments -- 3.1 Experiment with Resistance -- 3.2 Determine Locations for Positioning the Electrodes on the Body -- 3.3 Testing with Volunteers -- 4 Results and Discussion -- 4.1 Measurements on Several Volunteers Results -- 5 Discussion -- 6 Conclusion -- References -- Solar Power Production Forecasting Model Using Random Forest Algorithm -- 1 Introduction -- 2 Related Work -- 2.1 Random Forest Algorithm Application -- 2.2 Solar Power Production Forecast using Random Forest -- 3 Research Method -- 4 Result Analysis -- 5 Conclusion -- References -- Requirements Analysis in a Systems Engineering Process Approach to the Design of Gas Detection Systems for the Philippine Industries -- 1 Introduction -- 2 Philippine Regulation Settings -- 3 Gas Detection Operation -- 4 Gas Detection Design -- 5 Practical Considerations -- 5.1 Systems Engineering Processes - Standards -- 5.2 Safety Considerations -- 5.3 Gas Detection Requirements, Maintenance and Reliability -- 5.4 Economic Considerations -- 6 System Engineering Based Gas Detection Design -- 7 Conclusions and Recommendations -- References -- A Graph Partitioning Approach to Optimize Test Patterns -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Test Pattern Generator -- 3.2 Kernighan Lin (KL) Algorithm -- 3.3 Prim's Algorithm -- 3.4 PCB Design -- 4 Results and Discussion -- 5 Conclusion -- References -- DNA Computing: Challenges and Opportunities for Future -- 1 Introduction -- 1.1 Fundamentals of DNA Computing -- 1.2 DNA as a Computational Medium -- 1.3 DNA Encoding and Manipulation -- 1.4 Key Concepts in DNA Computing -- 1.5 Organization of the Work -- 2 Background and Scope of DNA Computing -- 3 Applications of DNA Computing. 4 Issues and Challenges in DNA Computing -- 4.1 Privacy and Security Issues in DNA Computing -- 5 Future Opportunities/Future Directions Towards in DNA Computing -- 5.1 Future of DNA Computing with Other Emerging Technology -- 5.2 The Future of DNA Computing with Quantum Computing -- 6 Current Status Towards Practical Implementations of DNA Computing in Real World's Sectors -- 7 Conclusion -- References -- Early Warning System for Flood Disaster Risk Reduction Using Predictive Analytics -- 1 Introduction -- 2 Background -- 3 Proposed Flood Early Warning Predictive Analytics -- 3.1 Study Area and Data Pre-processing -- 3.2 Training of the LSTM Model -- 3.3 Evaluation Metrics -- 4 Discussion -- 5 Conclusion -- References -- Machine Learning Techniques for VLSI Circuit Design: A Review -- 1 Introduction -- 2 ML-AI for VLSI Circuit Design and Simulation -- 3 Bibliometric Analysis -- 4 Current State of VLSI Design Using ML/AI -- 5 Conclusion -- References -- Rice Leaf Disease Diagnosis Using Dense EfficientNet Model -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Image Acquisition -- 3.2 Preprocessing -- 3.3 Image Segmentation -- 3.4 Image Classification -- 4 Performance Evaluation and Analysis -- 4.1 Validation and Results -- 4.2 Performance Evaluation -- 5 Conclusion -- References -- A Cooperative Machine Learning-Based Algorithm: The Case of Max-Min Knapsack Problem with Multiple Scenarios -- 1 Introduction -- 2 Background -- 3 A Cooperative Algorithm for Solving PMSKP -- 3.1 Application of Q-Table -- 3.2 Strategy for Exploitation -- 3.3 Diversification Operator -- 3.4 Framework of the Designed Cooperative Method -- 4 Results and Discussions -- 4.1 Effect of the Strategies Employed by the Algorithm -- 4.2 CA's Results Versus Published Bounds -- 5 Conclusion -- References. Performance Enhancement of a Film Bulk Acoustic Resonator Using Taguchi DoE and ANOVA Techniques -- 1 Introduction -- 2 Conclusions -- References -- Enhanced Learning in IoT-Based Intelligent Plant Irrigation System for Optimal Growth and Water Management -- 1 Introduction -- 2 Methodology -- 2.1 Cloud Storage -- 2.2 Machine Learning Algorithm -- 2.3 Support Vector Machine -- 2.4 Artificial Neural Network -- 2.5 Convolutional Neural Network -- 3 Result and Discussion -- 4 Conclusion -- References -- A Real-Time Based System for Personalized Processing Using Fog Computing: A Complete Architecture -- 1 Introduction -- 2 Related Works -- 3 Architecture of Fog Recommender Model for Real Time Processing -- 3.1 Mobile User Profile -- 3.2 Process of Ubiquitous and Fog Personalized Recommendations -- 3.3 Mobile User Interface -- 3.4 Fog Data Processing -- 3.5 Recommendation Algorithms -- 4 Experiments -- 4.1 Data Preprocessing -- 4.2 Fog Content Cache Recommendation Experiment -- 5 Conclusion -- References -- Automatic Group Labeling Using Attribute Information Gain Filters and Unsupervised Learning -- 1 Introduction -- 2 Theoretical Framework -- 2.1 Related Works -- 2.2 Feature Selection Algorithms Evaluated -- 3 Proposed Method -- 3.1 Clustering -- 3.2 Attribute Selection -- 3.3 Discretization -- 3.4 Labeling -- 4 Results and Discussion -- 5 Conclusion -- References -- Solar Intensity Classification with Imbalanced Data -- 1 Introduction -- 2 Classification Models -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Data Preprocessing -- 4 Results and Discussion -- 4.1 Case Study 1 - Benchmarking Case -- 4.2 Case Study 2 - Imbalanced Data -- 4.3 Case Study 3 - Undersampling -- 4.4 Case Study 4 - Sequencial Oversampling -- 4.5 Case Study 5 - Iterative Oversampling -- 4.6 Case Study 6 - Random Oversampling -- 5 Conclusion -- References. DNA Transcription and Translation Inspired Deep Features for Classification-Based CBIR. |
Record Nr. | UNINA-9910878065103321 |
Abraham Ajith | ||
Cham : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent Systems Design and Applications : Industrial Applications, Volume 6 |
Autore | Abraham Ajith |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Cham : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (526 pages) |
Altri autori (Persone) |
BajajAnu
HanneThomas SiarryPatrick MaKun |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 3-031-64850-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Optimizing Energy Consumption in Android Mobile Devices Based on User Recommendations -- 1 Introduction -- 2 Related Work -- 3 Method and Prototyping -- 3.1 Data Collect -- 3.2 Selection of Features for Analysis -- 3.3 Technical Details -- 3.4 Saving Time -- 3.5 Notifications and Feedback -- 4 Results and Discussions -- 4.1 Energy Consumption Analysis -- 5 Final Considerations -- References -- Identification and Analysis of Barriers for In-Service Pressure Vessel and Piping Inspection Using DEMATEL Approach -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 4 Application of Proposed Approach -- 5 Result and Discussions -- 6 Managerial Implications -- 7 Conclusions and Scope for Future Research -- Appendix A -- References -- Micro Expression Recognition - Contemporary Challenges, Options and Analysis -- 1 Introduction -- 2 MEs Recognition -- 3 Factors Affecting MEs Recognition -- 3.1 Emotional Context -- 3.2 Duration of Expression -- 3.3 Annotation Biasness -- 4 Methods of MEs Recognition -- 4.1 Facial Feature Extraction -- 4.2 Classification -- 4.3 Existing MEs Datasets -- 5 Challenges Occurs, Open Issues and Future Direction -- 5.1 Challenges -- 5.2 Open Issues -- 5.3 Future Directions -- References -- Traffic Signal Timing Optimization on Superstreet Using Ecology-Based Optimization -- 1 Introduction -- 2 Methodology -- 3 Numerical Example -- 4 Conclusion -- References -- IntelliFarmAssist - A Novel Machine Learning integrated Genetic Algorithm Based Optimal Crop Recommendation System -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work - Intelligence Assisted Crop Recommendation System -- 3.1 Proposed Methodology -- 3.2 Proposed Framework -- 3.3 Proposed GA Based Optimization Algorithm -- 4 Proposed GA Algorithm -- 5 Experimentation and Result Analysis.
6 Conclusion and Future Work -- References -- Real-Time ETL for Multimedia Sources: A Systematic Literature Review -- 1 Introduction -- 2 Planning the Review on Real-Time ETL for Multimedia Sources -- 2.1 Fixing Research Objectives -- 2.2 Identifying the Research Questions on Real-Time ETL for Multimedia Sources -- 3 Study Selected Related to Real-Time ETL -- 3.1 Electronic Sources and Search String -- 3.2 The Selection of Relevant Studies Related to Real-Time ETL -- 4 Data Extraction and Mapping of Relevant Studies -- 5 Data Synthesis and Overview of Selected Studies -- 6 Conclusion -- References -- Wastewater Monitoring and Control Using Cloud Based IoT System -- 1 Introduction -- 2 Literature Review -- 3 System for Monitoring and Controlling Wastewater Currently in Place -- 4 Existing System Components -- 5 Existing System Limitations -- 6 Proposed System -- 6.1 System Overview -- 6.2 System Architecture -- 6.3 Hardware Components -- 6.4 The Software Components -- 7 Conclusion -- References -- Multimodal Emotion Classification: Implications for Cognitive Science and Human Behaviour -- 1 Introduction -- 2 Related Work -- 3 MAHNOB-HCI Dataset -- 3.1 Data Modalities -- 4 Proposed Methodology -- 4.1 Data Preprocessing -- 4.2 Feature Extraction and Selection -- 4.3 Unimodal Classification -- 4.4 Multimodal Classification -- 5 Gender-Specific Analysis -- 6 Results and Discussions -- 7 Conclusion -- References -- Uniting Optimization and Deep Learning for Complex Problem Solving: A Comprehensive Review -- 1 Introduction -- 2 Literature Survey -- 3 Optimization Techniques -- 3.1 Particle Swarm Optimization (PSO) -- 3.2 Bat Algorithm (BA) -- 3.3 Cuckoo Algorithm (COA) -- 3.4 Whale Optimization Algorithm (WOA) -- 3.5 Firefly Algorithm (FA) -- 4 Conclusion -- References. Novel Predictive Machine Learning Approach for Identification of Microbial Niche and Microbial Communities from Omics Dataset of Kaveri River, Tamil-Nadu, India -- 1 Introduction -- 2 Methodology -- 2.1 Feature Selection -- 2.2 Microbial Community Classification -- 3 Experimental Results -- 4 Conclusion -- References -- A Review of Path Planning Algorithms -- 1 Introduction -- 2 Path Planning Approaches Classification -- 2.1 Classical Approaches -- 2.2 Heuristic Approaches -- 2.3 Metaheuristic Approaches -- 2.4 Machine Learning Approaches -- 2.5 Hybrid Approaches -- 3 Path Planning Approaches Challenges -- 4 Analytic Comparison -- 5 Conclusion -- References -- Application of WASPAS Method on Selecting Best Deemed University in India -- 1 Introduction -- 2 Literature Support -- 3 Research Methodology -- 4 Application - Selection of Best Deemed University -- 5 Results -- 5.1 Comparative Study -- 6 Conclusions -- References -- Valuation of Trash Management in Railway Compartment Using ENTROPY - A MCDM Method -- 1 Introduction -- 2 Literature Support -- 3 Research Methodology -- 4 Case Study - Trip from Chennai to Mangalore -- 5 Application of ENTROPY Method -- 6 Results and Discussions -- 7 Conclusion -- References -- Adaptive Windowing (ADWIN3) to Learning from Time-Changing Data Stream -- 1 Introduction -- 1.1 Adaptive Stream Mining Methodology -- 1.2 Time Change Predictors and Detectors -- 1.3 HoeffdingTrees (HT) Incremental Decision Trees -- 1.4 Adaptive Windowing Algorithm (ADWIN) -- 1.5 CVFDT -- 1.6 Hoeffding Adaptive Trees (HAT) -- 1.7 Early Drift Detection Method (EDDM) -- 2 Related Works -- 3 Proposed Method -- 3.1 ADWIN3 -- 4 Results and Discussion -- 5 Conclusion -- References -- Towards Enhancing Driver's Perceived Safety in Autonomous Driving: A Shield-Based Approach -- 1 Introduction -- 2 Background -- 2.1 Reinforcement Learning. 2.2 Shielding -- 3 Related Work -- 4 Personalized Perceived Safety Shielding -- 4.1 Autonomous Driving Module -- 4.2 Human Interaction Module -- 5 Evaluation -- 5.1 Experiment Setting -- 5.2 Experiment Result -- 5.3 Discussion -- 6 Conclusion and Future Work -- References -- A Uniplanar Asymmetric Circular Slotted Patch Antenna for 5.8 GHz Applications -- 1 Introduction -- 2 Uniplanar Asymmetric Circular Slotted Antenna-Design -- 3 Result Discussions on Uniplanar Asymmetric Circular Slotted Antenna -- 4 Conclusion -- References -- A Discrete Event Formalism for Fast Simulation of On-Demand Transportation Systems -- 1 Introduction -- 1.1 Related Work -- 1.2 Problem Statement -- 1.3 Contribution -- 2 System Theory -- 2.1 Intersections, Segments and Locations -- 2.2 Charging Stations, Demands and Vehicles -- 3 Discrete Events -- 3.1 Vehicle-Intersection Location Events -- 3.2 Vehicle-Charging Station Location Events -- 3.3 Vehicle-Demand Location Events -- 3.4 Vehicle-Vehicle Location Events -- 3.5 Demand Events -- 3.6 Speed Events -- 3.7 Battery Events -- 4 Conclusion -- References -- Algorithm for Boycotting Behavior for Fake Goods -- 1 Introduction -- 2 Method -- 2.1 Sample Size -- 2.2 Blinding -- 2.3 Datasets -- 2.4 Model Choice -- 3 Results -- 3.1 Regression -- 3.2 AIC -- 4 Conclusion -- References -- Assessing for Online Teaching Effectiveness Using VIKOR Method During Covid Pandemic Times -- 1 Introduction -- 2 Literature Support -- 3 Research Methodology -- 4 Survey - Deemed University Students in South India -- 5 Application of VIKOR Method -- 6 Results and Discussions -- 7 Conclusion -- References -- ChronoEdgeMiner: A Novel Algorithm for Extracting Frequent Temporal Graphs from Data -- 1 Introduction -- 2 Problem Definitions -- 3 ChronoEdgeMiner -- 4 Experiments -- 4.1 Experimental Setup -- 4.2 Analysis of ChronoEdgeMiner. 5 Conclusion and Future Work -- References -- A Survey on Educational Processes Based on Agile, BPM, and PM -- 1 Introduction -- 2 Methodology -- 3 Literature Review -- 3.1 Agility -- 3.2 BPM (Business Process Management) -- 3.3 Process Mining (PM) -- 4 Obtained Results for Educational Processes -- 4.1 The Educational Process -- 4.2 Overview of the Proposed Framework -- 5 Conclusion -- References -- Telecom Churn Movement Prediction Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Data Collection and Preprocessing -- 3.2 Model Development -- 4 Results and Discussion -- 4.1 Parameters for Evaluation -- 4.2 Performance -- 5 Conclusion -- References -- Tracking Sigmoid Regression with Multicollinearity in Phase I: An Approach Incorporating Control Charts -- 1 Introduction -- 2 Sigmoid Regression Model-Based Control Charts -- 2.1 Multicollinearity -- 2.2 Principal Component -- 2.3 Iterative Re-Weighted Least Square Algorithm -- 2.4 Sigmoid Regression -- 3 Intended Control Charts -- 3.1 Control Chart Based on Ordinary Residuals, Deviance Residuals, and Pearson's Residuals -- 4 Illustration of the Application of the Control Chart in Phase I -- 5 Discussion and Findings -- References -- AR-Driven Smart Homes: Enhancing Automation and User Experience -- 1 Introduction -- 2 Related Works -- 2.1 AR-Based Smart Home Control -- 2.2 AR and IoT Integration -- 2.3 AR for Access Control and Security -- 2.4 AR and AI Synergy -- 2.5 Mixed Reality for IoT Control and Monitoring -- 3 Methodology -- 3.1 Contribution -- 3.2 Proposed Methodology -- 4 Results -- 4.1 Target Image and Virtual Button -- 4.2 IoT Setup -- 5 Conclusion and Inference -- 6 Future Works -- References -- Overview of Vehicular Resource Allocation: Review and Future Directions -- 1 Introduction -- 1.1 Related Surveys and Scope of the Paper. 1.2 Contributions. |
Record Nr. | UNINA-9910878980603321 |
Abraham Ajith | ||
Cham : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Sustainability in Software Engineering and Business Information Management : Proceedings of the Conference SSEBIM 2022 / / edited by Varun Gupta, Luis Rubalcaba, Chetna Gupta, Thomas Hanne |
Autore | Gupta Varun |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (175 pages) |
Disciplina | 658.4038 |
Altri autori (Persone) |
RubalcabaLuis
GuptaChetna HanneThomas |
Collana | Lecture Notes in Information Systems and Organisation |
Soggetto topico |
Business information services
Sustainability Software engineering Financial risk management Information technology—Management Business Information Systems Software Engineering Risk Management Business IT Infrastructure |
Soggetto non controllato | Mathematics |
ISBN |
9783031324369
9783031324352 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Fairness requirement in AI engineering – a review on current research and future directions -- An Operational Profile for Normative Multi-agent Systems -- Self-repair measurement in FPGA-based partial reconfigurable systems -- Gender equality in software engineering education – a study of female participation in customer-driven projects -- Digital technologies and sustainability paradoxes – an empirical study of a Norwegian media group -- The Leading Locations of Information Technology Jobs in South Africa. |
Record Nr. | UNINA-9910725084503321 |
Gupta Varun | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|