top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced Informatics for Computing Research [[electronic resource] ] : Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh
Advanced Informatics for Computing Research [[electronic resource] ] : Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part I / / edited by Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XXI, 830 p. 495 illus., 313 illus. in color.)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computers
Artificial Intelligence
Information Systems and Communication Service
ISBN 981-13-3140-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computing methodologies -- Hardware -- Information systems -- Networks -- Security and privacy -- Computing methodologies. .
Record Nr. UNINA-9910350238203321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advanced Informatics for Computing Research [[electronic resource] ] : Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part II / / edited by Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh
Advanced Informatics for Computing Research [[electronic resource] ] : Second International Conference, ICAICR 2018, Shimla, India, July 14–15, 2018, Revised Selected Papers, Part II / / edited by Ashish Kumar Luhach, Dharm Singh, Pao-Ann Hsiung, Kamarul Bin Ghazali Hawari, Pawan Lingras, Pradeep Kumar Singh
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XXII, 604 p. 330 illus., 209 illus. in color.)
Disciplina 004
Collana Communications in Computer and Information Science
Soggetto topico Artificial intelligence
Computers
Artificial Intelligence
Information Systems and Communication Service
ISBN 981-13-3143-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computing methodologies -- Hardware -- Information systems -- Networks -- Security and privacy -- Computing methodologies. .
Record Nr. UNINA-9910350238403321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Automated Technology for Verification and Analysis [[electronic resource] ] : 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14, 2011, Proceedings / / edited by Tevfik Bultan, Pao-Ann Hsiung
Automated Technology for Verification and Analysis [[electronic resource] ] : 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14, 2011, Proceedings / / edited by Tevfik Bultan, Pao-Ann Hsiung
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIV, 532 p.)
Disciplina 005.1
Collana Programming and Software Engineering
Soggetto topico Software engineering
Computer programming
Computer communication systems
Computer logic
Programming languages (Electronic computers)
Software Engineering
Programming Techniques
Computer Communication Networks
Logics and Meanings of Programs
Programming Languages, Compilers, Interpreters
Software Engineering/Programming and Operating Systems
ISBN 3-642-24372-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465884503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Autore Tomar Ranjeet Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (350 pages)
Disciplina 621.39
004.6
Altri autori (Persone) VermaShekhar
ChaurasiaBrijesh Kumar
SinghVrijendra
AbawajyJemal H
AkasheShyam
HsiungPao-Ann
PrasadRamjee
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Image processing - Digital techniques
Computer vision
Computer Engineering and Networks
Artificial Intelligence
Data Structures and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-031-43140-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wired and Wireless Communication Systems -- Networks and Information Security -- Electronics Circuits for Communication Systems.
Record Nr. UNINA-9910746951803321
Tomar Ranjeet Singh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Autore Tomar Ranjeet Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (350 pages)
Disciplina 621.39
004.6
Altri autori (Persone) VermaShekhar
ChaurasiaBrijesh Kumar
SinghVrijendra
AbawajyJemal H
AkasheShyam
HsiungPao-Ann
PrasadRamjee
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Image processing - Digital techniques
Computer vision
Computer Engineering and Networks
Artificial Intelligence
Data Structures and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-031-43140-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wired and Wireless Communication Systems -- Networks and Information Security -- Electronics Circuits for Communication Systems.
Record Nr. UNISA-996550551003316
Tomar Ranjeet Singh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Autore Tomar Ranjeet Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (330 pages)
Disciplina 621.39
004.6
Altri autori (Persone) VermaShekhar
ChaurasiaBrijesh Kumar
SinghVrijendra
AbawajyJemal H
AkasheShyam
HsiungPao-Ann
PrasadRamjee
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Image processing - Digital techniques
Computer vision
Computer Engineering and Networks
Artificial Intelligence
Data Structures and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-031-43145-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- High Dimensional Data Representation and Processing -- Brain Tumor Classification Using Feature Extraction and Non-linear SVM Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 VGG-SVM Model -- 3.1 Model Architecture -- 3.2 Implementation Details and Preprocessing -- 3.3 Dataset Description -- 4 Experimental Results and Discussion -- 4.1 Results -- 4.2 Discussion -- 5 Conclusion -- References -- Lightweight Django-Based Customer Relationship Management System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Feasibility and Requirement Analysis -- 3.2 Design of the System -- 3.3 Development Tools Used are Majorly Django, HTML, CSS, Bootstrap, and SQLite -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References -- Single Server Banking Management System -- 1 Introduction -- 1.1 Background and Overview -- 1.2 Problem Statement -- 1.3 Objective -- 1.4 Scope -- 1.5 Organization of the Paper -- 2 Paper Preparation -- 3 Characteristics and Features -- 3.1 SIP Calculator -- 3.2 EMI Calculator -- 3.3 OTP Verification -- 3.4 Email Facility -- 4 Methodology -- 4.1 Results -- 5 Conclusion -- 5.1 Future Scope -- References -- Prioritization of MQTT Messages: A Novel Approach -- 1 Introduction -- 1.1 Message Queuing Telemetry Transport (MQTT) Protocol -- 1.2 Problem Statement -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Identifying min-max Range -- 3.2 Forwarding High Priority Messages -- 3.3 Identifying Trivial Range -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of Crop Yield Prediction Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Methodology -- 5 Result Analysis -- 6 Conclusion -- 7 Future work -- References.
Big Data Analytics for Classification in Sentiment Analysis -- 1 Introduction -- 1.1 The 5 V'S of Big Data -- 1.2 Big Data Generation -- 1.3 Sentiment Analysis -- 2 Literature Review -- References -- Ensemble Classifiers for Classification of Imbalanced Dataset of Malicious and Benign Websites -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Data Summarization -- 3.3 Data Analysis and Preprocessing -- 3.4 Data Sampling and Balancing -- 3.5 Machine Learning Classifiers -- 4 Performance Evaluation -- 5 Conclusion -- References -- Forecasting of Congestive Cardiac Failure Using Deep Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Architecture -- 3.2 Algorithms -- 4 Result -- 5 Conclusion -- References -- Internet of Things-Based Smart Irrigation System for Moisture in the Soil and Weather Forecast -- 1 Introduction -- 2 Related Work -- 3 Benefits of Smart Irrigation System -- 4 Impect of Sustainability on Smart Irrigation System -- 5 The Smart Irrigation Systems' Basic Architecture and Layout -- 6 Difficulties and Potential Outcome -- 7 Conclusion -- References -- Visual Cryptography: An Emerging Technology -- 1 Introduction -- 1.1 Visual Cryptography for Binary Image -- 1.2 Visual Cryptography for Gray Image -- 1.3 Visual Cryptography for Colored Images -- 2 Literature Survey -- 3 Applications of Visual Cryptography -- 3.1 Watermarking -- 3.2 Anti- Phishing Systems -- 3.3 Human Machine Identification -- 3.4 Secure Banking Communication -- 3.5 Defense System -- 3.6 Captcha -- 4 Results -- 5 Conclusions -- References -- Computing Techniques for Efficient Networks Design -- Machine Learning Based Techniques for the Network Design of Advanced 5G Network, Beyond 5G (B5G) and Towards 6G: Challenges and Trends -- 1 Introduction -- 2 Motivation -- 2.1 Key Contributions.
3 Challenges Associated with NGWN -- 3.1 Deployment 5G (Denser) Cells -- 3.2 MIMO Along with Beam Forming -- 3.3 Challenges Associated with the System or Network Latency -- 3.4 Improvement of the Spectral Efficiency -- 4 The Requirements of Network Intelligence: ML in Advanced 5G -- 5 Application Areas of ML in 5G/B5G: Industry Perspective -- 6 State-of-the-Art ML Approached in Advanced 5G, B5G and Towards 6G -- 6.1 The Architecture of Radio Learning -- 7 Challenges Associated with Applying ML in NGWN -- 7.1 Challenges of Implementing the Process of Desired Learning -- 7.2 Challenges of Implementing the Network Edge Intelligence -- 7.3 The Trends for Addressing Challenges in Advanced 5G -- 8 ML Incorporation: Open Issues Offer Research Directions -- 8.1 Trends Towards ML-Powered 6G Network: Edge Intelligence -- 9 Conclusion -- References -- Recognition of Speech Emotion Using Machine Learning Techniques -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Collection -- 2.2 Data Preparation -- 2.3 Data Visualization -- 2.4 Feature Extraction and Model Building -- 3 Results and Discussions -- 4 Conclusion -- References -- Convolution Neural Network Based Model for Classification and Identification of Fake Profile on Social Network -- 1 Introduction -- 2 Social Media -- 3 Social Media Mining -- 4 Social Media Spam -- 5 Related Work -- 6 Proposed framework for Identifying Malicious Profile over Social Media -- 7 Result Analysis -- 8 Conclusion -- References -- Social Distance Monitoring and Infection Risk Assessment in COVID-19 Pandemic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Human Detection -- 3.2 Location Tracking -- 3.3 Inter Distance Estimation -- 3.4 Inter Distance Estimation -- 3.5 Inter Distance Estimation -- 4 Results -- 5 Conclusion -- References -- Vibrations Signal Analysis of Cantilever Beam Using Machine Learning.
1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results -- 5 Future Scope of the Work -- References -- Pneumonia Detection Using Deep Learning: A Bibliometric Study -- 1 Introduction -- 2 Materials and Methods -- 2.1 Selection of Articles -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Numerical Simulation Design of Multiple Users Offloading Using Improved Optimization Approach for Edge Computing -- 1 Introduction -- 2 Mobile Edge/Fog Computing -- 3 Related Works -- 4 Modelling of the System -- 5 Simulation and Results -- 6 Conclusion -- References -- Numerical Simulation and Mathematical Modelling of Machine Learning Based Improved Crypto Currency Forecasting System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result Analysis -- 4.1 Dataset -- 4.2 Flow Chart of Simulation -- 4.3 Result Discussion -- 5 Conclusion and Future Scope -- References -- Reinforcement Learning in Blockchain-Enabled IIoT Networks -- 1 Introduction -- 2 Interconnection Between Blockchain, IIoT, and AI -- 3 Blockchain Technology and IIoT -- 4 Reinforcement Learning Techniques -- 4.1 Q-Learning -- 4.2 Multi-armed Bandit Learning -- 4.3 Actor-Critic Learning -- 5 Blockchain-Enabled IIoT Network -- 5.1 Security -- 5.2 Cost Effectiveness -- 5.3 Trustless -- 5.4 Autonomy -- 5.5 Smart Contracts -- 5.6 Blockchain-Enabled IIoT Layers -- 5.7 Physical Layer -- 5.8 Network Layer -- 5.9 Application Layer -- 6 Reinforcement Learning Applications in Blockchain-Enabled IIoT Network -- 6.1 Minimizing Forking Events -- 6.2 Improving Energy Efficiency -- 6.3 Time to Finality Minimization -- 6.4 Enhancing Transaction Throughput -- 6.5 Improving Link Security -- 6.6 Average Blocktime Reduction -- 7 Conclusion -- References -- Practical Challenges in Implementation of Information and Communication Technology -- 1 Introduction.
2 Research Methodology -- 3 Bibliometric Details -- 3.1 Authors -- 3.2 Source Documents and Keywords -- 3.3 Countries, Sponsors, and Affiliations -- 4 Thematic Discussion -- 4.1 Technological and Implementation Challenges -- 4.2 Infrastructure Based Challenges -- 4.3 Teacher Related Challenges -- 4.4 Student Related Challenges -- 4.5 Other Challenges -- 5 Future Research Agenda -- 5.1 Other Challenges -- 5.2 Research Niches -- 6 Conclusion -- References -- Facial Analytics or Virtual Avatars: Competencies and Design Considerations for Student-Teacher Interaction in AI-Powered Online Education for Effective Classroom Engagement -- 1 Introduction -- 2 Background -- 3 Conceptual Foundation -- 4 AI-Powered Online Learning -- 5 Methods and Methodology -- 5.1 Creation of a Storyboard -- 5.2 Participants -- 5.3 Procedure -- 5.4 Data Analysis -- 6 Findings -- 6.1 Communication -- 6.2 Quantity and Quality -- 6.3 Responsibility -- 6.4 Support -- 6.5 Agency -- 6.6 Connection -- 6.7 Surveillance -- 7 Analysis and Conclusion -- References -- Vehicular Technology and Applications -- Real Time Connectivity Analysis of Vehicles in Different City Dense Environment -- 1 Introduction -- 2 Problem Description -- 2.1 VANET Scenario -- 2.2 VANETsim Overview -- 3 Performance Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Analysis of Energy Efficient Wireless Senor Network with 6LoWPAN IoT Gateway -- 1 Introduction -- 2 Wireless Energy Harvesting and Implementation Techniques -- 2.1 Role of Performance Parameters in the Proposed System -- 3 Proposed System Model of Wireless Sensor Network with 6LoWPAN Gateway -- 4 Simulation Results and Discussion -- 5 Conclusion and Future Work -- References -- Energy-Efficient Data Routing Protocols for Sink Mobility in Wireless Sensor Networks -- 1 Introduction -- 1.1 Motivation -- 2 Related Work.
3 Research Gaps.
Record Nr. UNINA-9910746997303321
Tomar Ranjeet Singh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Autore Tomar Ranjeet Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (330 pages)
Disciplina 621.39
004.6
Altri autori (Persone) VermaShekhar
ChaurasiaBrijesh Kumar
SinghVrijendra
AbawajyJemal H
AkasheShyam
HsiungPao-Ann
PrasadRamjee
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Image processing - Digital techniques
Computer vision
Computer Engineering and Networks
Artificial Intelligence
Data Structures and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-031-43145-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- High Dimensional Data Representation and Processing -- Brain Tumor Classification Using Feature Extraction and Non-linear SVM Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 VGG-SVM Model -- 3.1 Model Architecture -- 3.2 Implementation Details and Preprocessing -- 3.3 Dataset Description -- 4 Experimental Results and Discussion -- 4.1 Results -- 4.2 Discussion -- 5 Conclusion -- References -- Lightweight Django-Based Customer Relationship Management System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Feasibility and Requirement Analysis -- 3.2 Design of the System -- 3.3 Development Tools Used are Majorly Django, HTML, CSS, Bootstrap, and SQLite -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References -- Single Server Banking Management System -- 1 Introduction -- 1.1 Background and Overview -- 1.2 Problem Statement -- 1.3 Objective -- 1.4 Scope -- 1.5 Organization of the Paper -- 2 Paper Preparation -- 3 Characteristics and Features -- 3.1 SIP Calculator -- 3.2 EMI Calculator -- 3.3 OTP Verification -- 3.4 Email Facility -- 4 Methodology -- 4.1 Results -- 5 Conclusion -- 5.1 Future Scope -- References -- Prioritization of MQTT Messages: A Novel Approach -- 1 Introduction -- 1.1 Message Queuing Telemetry Transport (MQTT) Protocol -- 1.2 Problem Statement -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Identifying min-max Range -- 3.2 Forwarding High Priority Messages -- 3.3 Identifying Trivial Range -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of Crop Yield Prediction Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Methodology -- 5 Result Analysis -- 6 Conclusion -- 7 Future work -- References.
Big Data Analytics for Classification in Sentiment Analysis -- 1 Introduction -- 1.1 The 5 V'S of Big Data -- 1.2 Big Data Generation -- 1.3 Sentiment Analysis -- 2 Literature Review -- References -- Ensemble Classifiers for Classification of Imbalanced Dataset of Malicious and Benign Websites -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Data Summarization -- 3.3 Data Analysis and Preprocessing -- 3.4 Data Sampling and Balancing -- 3.5 Machine Learning Classifiers -- 4 Performance Evaluation -- 5 Conclusion -- References -- Forecasting of Congestive Cardiac Failure Using Deep Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Architecture -- 3.2 Algorithms -- 4 Result -- 5 Conclusion -- References -- Internet of Things-Based Smart Irrigation System for Moisture in the Soil and Weather Forecast -- 1 Introduction -- 2 Related Work -- 3 Benefits of Smart Irrigation System -- 4 Impect of Sustainability on Smart Irrigation System -- 5 The Smart Irrigation Systems' Basic Architecture and Layout -- 6 Difficulties and Potential Outcome -- 7 Conclusion -- References -- Visual Cryptography: An Emerging Technology -- 1 Introduction -- 1.1 Visual Cryptography for Binary Image -- 1.2 Visual Cryptography for Gray Image -- 1.3 Visual Cryptography for Colored Images -- 2 Literature Survey -- 3 Applications of Visual Cryptography -- 3.1 Watermarking -- 3.2 Anti- Phishing Systems -- 3.3 Human Machine Identification -- 3.4 Secure Banking Communication -- 3.5 Defense System -- 3.6 Captcha -- 4 Results -- 5 Conclusions -- References -- Computing Techniques for Efficient Networks Design -- Machine Learning Based Techniques for the Network Design of Advanced 5G Network, Beyond 5G (B5G) and Towards 6G: Challenges and Trends -- 1 Introduction -- 2 Motivation -- 2.1 Key Contributions.
3 Challenges Associated with NGWN -- 3.1 Deployment 5G (Denser) Cells -- 3.2 MIMO Along with Beam Forming -- 3.3 Challenges Associated with the System or Network Latency -- 3.4 Improvement of the Spectral Efficiency -- 4 The Requirements of Network Intelligence: ML in Advanced 5G -- 5 Application Areas of ML in 5G/B5G: Industry Perspective -- 6 State-of-the-Art ML Approached in Advanced 5G, B5G and Towards 6G -- 6.1 The Architecture of Radio Learning -- 7 Challenges Associated with Applying ML in NGWN -- 7.1 Challenges of Implementing the Process of Desired Learning -- 7.2 Challenges of Implementing the Network Edge Intelligence -- 7.3 The Trends for Addressing Challenges in Advanced 5G -- 8 ML Incorporation: Open Issues Offer Research Directions -- 8.1 Trends Towards ML-Powered 6G Network: Edge Intelligence -- 9 Conclusion -- References -- Recognition of Speech Emotion Using Machine Learning Techniques -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Collection -- 2.2 Data Preparation -- 2.3 Data Visualization -- 2.4 Feature Extraction and Model Building -- 3 Results and Discussions -- 4 Conclusion -- References -- Convolution Neural Network Based Model for Classification and Identification of Fake Profile on Social Network -- 1 Introduction -- 2 Social Media -- 3 Social Media Mining -- 4 Social Media Spam -- 5 Related Work -- 6 Proposed framework for Identifying Malicious Profile over Social Media -- 7 Result Analysis -- 8 Conclusion -- References -- Social Distance Monitoring and Infection Risk Assessment in COVID-19 Pandemic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Human Detection -- 3.2 Location Tracking -- 3.3 Inter Distance Estimation -- 3.4 Inter Distance Estimation -- 3.5 Inter Distance Estimation -- 4 Results -- 5 Conclusion -- References -- Vibrations Signal Analysis of Cantilever Beam Using Machine Learning.
1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results -- 5 Future Scope of the Work -- References -- Pneumonia Detection Using Deep Learning: A Bibliometric Study -- 1 Introduction -- 2 Materials and Methods -- 2.1 Selection of Articles -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Numerical Simulation Design of Multiple Users Offloading Using Improved Optimization Approach for Edge Computing -- 1 Introduction -- 2 Mobile Edge/Fog Computing -- 3 Related Works -- 4 Modelling of the System -- 5 Simulation and Results -- 6 Conclusion -- References -- Numerical Simulation and Mathematical Modelling of Machine Learning Based Improved Crypto Currency Forecasting System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result Analysis -- 4.1 Dataset -- 4.2 Flow Chart of Simulation -- 4.3 Result Discussion -- 5 Conclusion and Future Scope -- References -- Reinforcement Learning in Blockchain-Enabled IIoT Networks -- 1 Introduction -- 2 Interconnection Between Blockchain, IIoT, and AI -- 3 Blockchain Technology and IIoT -- 4 Reinforcement Learning Techniques -- 4.1 Q-Learning -- 4.2 Multi-armed Bandit Learning -- 4.3 Actor-Critic Learning -- 5 Blockchain-Enabled IIoT Network -- 5.1 Security -- 5.2 Cost Effectiveness -- 5.3 Trustless -- 5.4 Autonomy -- 5.5 Smart Contracts -- 5.6 Blockchain-Enabled IIoT Layers -- 5.7 Physical Layer -- 5.8 Network Layer -- 5.9 Application Layer -- 6 Reinforcement Learning Applications in Blockchain-Enabled IIoT Network -- 6.1 Minimizing Forking Events -- 6.2 Improving Energy Efficiency -- 6.3 Time to Finality Minimization -- 6.4 Enhancing Transaction Throughput -- 6.5 Improving Link Security -- 6.6 Average Blocktime Reduction -- 7 Conclusion -- References -- Practical Challenges in Implementation of Information and Communication Technology -- 1 Introduction.
2 Research Methodology -- 3 Bibliometric Details -- 3.1 Authors -- 3.2 Source Documents and Keywords -- 3.3 Countries, Sponsors, and Affiliations -- 4 Thematic Discussion -- 4.1 Technological and Implementation Challenges -- 4.2 Infrastructure Based Challenges -- 4.3 Teacher Related Challenges -- 4.4 Student Related Challenges -- 4.5 Other Challenges -- 5 Future Research Agenda -- 5.1 Other Challenges -- 5.2 Research Niches -- 6 Conclusion -- References -- Facial Analytics or Virtual Avatars: Competencies and Design Considerations for Student-Teacher Interaction in AI-Powered Online Education for Effective Classroom Engagement -- 1 Introduction -- 2 Background -- 3 Conceptual Foundation -- 4 AI-Powered Online Learning -- 5 Methods and Methodology -- 5.1 Creation of a Storyboard -- 5.2 Participants -- 5.3 Procedure -- 5.4 Data Analysis -- 6 Findings -- 6.1 Communication -- 6.2 Quantity and Quality -- 6.3 Responsibility -- 6.4 Support -- 6.5 Agency -- 6.6 Connection -- 6.7 Surveillance -- 7 Analysis and Conclusion -- References -- Vehicular Technology and Applications -- Real Time Connectivity Analysis of Vehicles in Different City Dense Environment -- 1 Introduction -- 2 Problem Description -- 2.1 VANET Scenario -- 2.2 VANETsim Overview -- 3 Performance Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Analysis of Energy Efficient Wireless Senor Network with 6LoWPAN IoT Gateway -- 1 Introduction -- 2 Wireless Energy Harvesting and Implementation Techniques -- 2.1 Role of Performance Parameters in the Proposed System -- 3 Proposed System Model of Wireless Sensor Network with 6LoWPAN Gateway -- 4 Simulation Results and Discussion -- 5 Conclusion and Future Work -- References -- Energy-Efficient Data Routing Protocols for Sink Mobility in Wireless Sensor Networks -- 1 Introduction -- 1.1 Motivation -- 2 Related Work.
3 Research Gaps.
Record Nr. UNISA-996550551503316
Tomar Ranjeet Singh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Multicore hardware-software design and verification techniques [[electronic resource] /] / edited by Pao-Ann Hsiung, Yean-Ru Chen, Chao-Sheng Lin
Multicore hardware-software design and verification techniques [[electronic resource] /] / edited by Pao-Ann Hsiung, Yean-Ru Chen, Chao-Sheng Lin
Pubbl/distr/stampa [Oak Park, Ill.?], : Bentham eBooks, [2011]
Descrizione fisica 1 online resource (105 p.)
Disciplina 005.10685
Altri autori (Persone) HsiungPao-Ann
ChenYean-Ru
LinChao-Sheng
Soggetto topico Computer software - Development
Software engineering
Computer input-output equipment
Soggetto genere / forma Electronic books.
ISBN 1-60805-225-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 01 Title.pdf; 02 Cover Page; 03 eBooks End User License Agreement-Website; 04 Dedication; 05 Contents; 06 Foreword; 07 Preface; 08 List-of-Contributors; 09 ACKNOWLEDGMENTS; 10 Chapter 01; 11 Chapter 02; 12 Chapter 03; 13 Chapter 04; 14 Chapter 05; 15 Index
Record Nr. UNINA-9910457424803321
[Oak Park, Ill.?], : Bentham eBooks, [2011]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Multicore hardware-software design and verification techniques [[electronic resource] /] / edited by Pao-Ann Hsiung, Yean-Ru Chen, Chao-Sheng Lin
Multicore hardware-software design and verification techniques [[electronic resource] /] / edited by Pao-Ann Hsiung, Yean-Ru Chen, Chao-Sheng Lin
Pubbl/distr/stampa [Oak Park, Ill.?], : Bentham eBooks, [2011]
Descrizione fisica 1 online resource (105 p.)
Disciplina 005.10685
Altri autori (Persone) HsiungPao-Ann
ChenYean-Ru
LinChao-Sheng
Soggetto topico Computer software - Development
Software engineering
Computer input-output equipment
ISBN 1-60805-225-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 01 Title.pdf; 02 Cover Page; 03 eBooks End User License Agreement-Website; 04 Dedication; 05 Contents; 06 Foreword; 07 Preface; 08 List-of-Contributors; 09 ACKNOWLEDGMENTS; 10 Chapter 01; 11 Chapter 02; 12 Chapter 03; 13 Chapter 04; 14 Chapter 05; 15 Index
Record Nr. UNINA-9910781977703321
[Oak Park, Ill.?], : Bentham eBooks, [2011]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Multicore hardware-software design and verification techniques [[electronic resource] /] / edited by Pao-Ann Hsiung, Yean-Ru Chen, Chao-Sheng Lin
Multicore hardware-software design and verification techniques [[electronic resource] /] / edited by Pao-Ann Hsiung, Yean-Ru Chen, Chao-Sheng Lin
Edizione [1st ed.]
Pubbl/distr/stampa [Oak Park, Ill.?], : Bentham eBooks, [2011]
Descrizione fisica 1 online resource (105 p.)
Disciplina 005.10685
Altri autori (Persone) HsiungPao-Ann
ChenYean-Ru
LinChao-Sheng
Soggetto topico Computer software - Development
Software engineering
Computer input-output equipment
ISBN 1-60805-225-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 01 Title.pdf; 02 Cover Page; 03 eBooks End User License Agreement-Website; 04 Dedication; 05 Contents; 06 Foreword; 07 Preface; 08 List-of-Contributors; 09 ACKNOWLEDGMENTS; 10 Chapter 01; 11 Chapter 02; 12 Chapter 03; 13 Chapter 04; 14 Chapter 05; 15 Index
Record Nr. UNINA-9910814256203321
[Oak Park, Ill.?], : Bentham eBooks, [2011]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui