Vai al contenuto principale della pagina

Data Intelligence and Cognitive Informatics : Proceedings of ICDICI 2023



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Jacob I. Jeena Visualizza persona
Titolo: Data Intelligence and Cognitive Informatics : Proceedings of ICDICI 2023 Visualizza cluster
Pubblicazione: Singapore : , : Springer Singapore Pte. Limited, , 2024
©2024
Edizione: 1st ed.
Descrizione fisica: 1 online resource (579 pages)
Altri autori: PiramuthuSelwyn  
Falkowski-GilskiPrzemyslaw  
Nota di contenuto: Intro -- Preface -- Contents -- About the Editors -- Automatic Sentence Classification: A Crucial Component of Sentiment Analysis -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization of Data -- 3.4 Algorithm Feeding -- 3.5 Best Model Selection -- 4 Result and Discussion -- 4.1 Statistical Analysis -- 4.2 Accuracy Graph -- 4.3 Confusion Matrix -- 4.4 Classification Report -- 5 Conclusion and Future Work -- References -- Real-Time Health Monitoring System of Patients on Utilizing Red Tacton -- 1 Introduction -- 2 Implementation -- 3 Proposed Methodology -- 4 Results -- 5 Conclusion -- References -- An Efficient Botnet Detection Using Machine Learning and Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Load Dataset -- 3.2 Data Pre-Processing -- 3.3 Feature Selection -- 3.4 Handling Class Imbalance -- 3.5 Partition Dataset in Training and Testing -- 3.6 Apply ML/DL Models -- 3.7 Bot Detection -- 3.8 Model Evaluation -- 4 Experiments and Results -- 5 Conclusion -- References -- Wavelet Selection for Novel MD5-Protected DWT-Based Double Watermarking and Image Hiding Algorithm -- 1 Introduction -- 2 Related Works -- 3 Methodology Used -- 3.1 Architecture of Proposed System -- 3.2 Watermark Embedder -- 3.3 Watermark Extractor -- 4 Experimental Results -- 4.1 Pseudorandomness in Watermark Embedding -- 4.2 Performance Evaluation Metrics -- 4.3 Selection of Wavelet -- 4.4 Watermark Embedding and Extraction -- 4.5 Image Hiding -- 5 Conclusion and Future Work -- References -- Chaotic Map Based Encryption Algorithm for Secured Medical Data Analytics -- 1 Introduction -- 2 Related Work -- 3 Existing Techniques -- 3.1 Algorithm -- 3.2 Cryptography -- 3.3 Encryption -- 3.4 Decryption -- 3.5 Key -- 3.6 Steganography -- 3.7 Symmetric Encryption.
4 Proposed Methodology -- 4.1 Secret Key Generation -- 4.2 Hahn's Discrete Orthogonal Moment -- 4.3 QR Code -- 4.4 Modified Logistic Map -- 5 Results and Discussions -- References -- Gold Price Forecast Using Variational Mode Decomposition-Aided Long Short-Term Model Tuned by Modified Whale Optimization Algorithm -- 1 Introduction -- 2 Background and Related Works -- 2.1 LSTM Overview -- 2.2 Variation Mode Decomposition Details -- 2.3 Metaheuristics Optimization -- 2.4 AI Applications for Gold Price Forecasting -- 3 Whale Optimization Algorithm -- 3.1 Elementary WOA -- 3.2 Proposed Improved WOA Algorithm Used in Time-Series Forecasting Framework -- 4 Experimental Setup -- 4.1 Results and Discussion -- 5 Conclusion -- References -- Requirements for a Career in Information Security: A Comprehensive Review -- 1 Introduction -- 2 Cybersecurity Foundation -- 2.1 Information Security Expertise -- 2.2 Duties and Tasks of an IS Professional -- 2.3 Job Nature and Requirements -- 3 Research Approach -- 3.1 Words Used to Search -- 3.2 Selection Criteria -- 3.3 Rejection Criteria -- 3.4 Data Gathering -- 3.5 Quality Appraisal -- 4 Results -- 5 Conclusion -- References -- Intrusion Detection Using Bloom and XOR Filters -- 1 Introduction -- 2 Literature Survey -- 3 NIDS Implementation Using Bloom Filter -- 4 NIDS Implementation Using XOR Filter -- 5 Experimental Results and Discussions -- 6 Conclusions and Future Work -- References -- A Model for Privacy-Preservation of User Query in Location-Based Services -- 1 Introduction -- 2 Related Work and Literature Survey -- 3 Methodology -- 4 Results -- 5 Conclusion -- 6 Future Work -- References -- A GPS Based Bus Tracking and Unreserved Ticketing System Using QR Based Verification and Validation -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 System Architecture -- 5 System Functionality.
5.1 QR Code -- 5.2 Crowd Management -- 5.3 GPS Location -- 5.4 Automatic Ticket Expiry -- 5.5 Passenger Application -- 5.6 Conductor Application -- 6 Backend -- 6.1 Seat Availability -- 6.2 Passenger Information -- 6.3 Administrative Information -- 7 Conclusion and Future Scope -- References -- FileFox: A Blockchain-Based File Storage Using Ethereum and IPFS -- 1 Introduction -- 2 Background -- 2.1 Blockchain Storage -- 2.2 INFURA -- 2.3 Truffle -- 2.4 MetaMask -- 3 Related Work -- 4 Proposed System -- 5 Implementation -- 6 Result and Discussion -- 7 Conclusion and Future Scope -- References -- Minimizing Web Diversion Using Query Classification and Text Mining -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Feature Extraction -- 3.3 Semantic Matching -- 3.4 Web Query Classification -- 3.5 Machine Learning Models -- 3.6 Deep Learning Models -- 3.7 Evaluation Metrics -- 4 Results and Discussion -- 5 Future Scope -- 6 Conclusion -- References -- Connect: A Secure Approach for Collaborative Learning by Building a Social Media Platform -- 1 Introduction -- 1.1 Critical Characteristics of Social Media Are as Follows -- 1.2 Social Media Platforms -- 1.3 Need for Using Collaborative Learning -- 1.4 Challenges and Issues to Build Social Networking -- 1.5 Cloud Computing -- 1.6 Encryption -- 1.7 Importance of Social Media Platforms for Collaborative Learning -- 1.8 Advantages of Collaborative Learning for Faculty-To-Faculty Interaction -- 1.9 Security Concerns While Building a Social Media Platform -- 1.10 Conventional Threats -- 1.11 Modern Threats -- 1.12 Targeted Threats -- 1.13 Reasons Behind Online Social Media Security -- 2 Literature Review -- 2.1 Encryption Techniques Used -- 3 Summary of Literature Review -- 3.1 Importance of the Study.
3.2 The Opportunities that Will Be Provided Among the Users of the System Are as Follows -- 4 Proposed System -- 4.1 Proposed Algorithmic Process -- 5 Discussion -- 6 Conclusion -- References -- Smart Analytics System for Digital Farming -- 1 Introduction -- 2 Need for the Study -- 3 Related Works -- 4 Proposed Work -- 5 Conclusion -- References -- Sarcasm Detection for Marathi and the role of emoticons -- 1 Introduction -- 2 Related Work -- 3 Dataset and Annotation -- 3.1 Distribution of Tweets -- 3.2 Emoji Analysis -- 4 Pre-processing of Tweets -- 4.1 Cleaning of Tweets -- 4.2 Tokenization -- 5 Feature Extraction and Sarcasm Detection -- 5.1 Sentence Embedding Using Language Model -- 5.2 Embeddings for Emojis in the Tweet -- 6 Experiments and Result Analysis -- 7 Conclusion -- References -- Fleet Management Mobile Application Using GPS Shortest Path -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Modules -- 3.2 Algorithm Used -- 3.3 Database -- 4 Result and Discussion -- 5 Conclusions -- References -- Finger Vein Biometric System Based on Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Image Enhancement -- 3.2 Features Extraction -- 3.3 AES Encryption and Decryption -- 3.4 Convolution Neural Network -- 4 Result and Discussion -- 4.1 Image Enhancement -- 4.2 Feature Extraction -- 4.3 AES Encryption and Decryption -- 5 Conclusion -- References -- Embedding and Extraction of Data in Speech for Covert Communication -- 1 Introduction -- 2 Literature Survey -- 3 Existing Methodology -- 4 Proposed Methodology -- 5 Results and Evaluation -- 5.1 Results -- 5.2 Evaluation Metrics -- 6 Conclusion and Future Work -- References -- A Machine Learning Based Model for Classification of Customer Service's Email -- 1 Introduction -- 2 Problem Statement.
2.1 Shared Inboxes Fail in Managing the Emails as the Number Grows -- 3 Proposed Solution -- 3.1 Advantages of Email Multi-folder Categorization for Better Customer Support -- 3.2 Email with Multi-folder Categorization Works Well with a Database System -- 3.3 Work Together to Solve Problems at a Fast Pace -- 3.4 Provide Support in the 100% Context -- 3.5 Measure Individual Performance with Intuitive Reports -- 3.6 Architecture of Automatic Classification of Email -- 4 Research Methodology -- 4.1 Classification of Email Using the Technique of Machine Learning -- 4.2 Machine Learning Terminologies Used in Classification -- 4.3 Support Vector Machine -- 4.4 Advantages and Disadvantages for Using Support Vector Machine -- 4.5 Validation Tool/Dataset Used -- 5 Results -- 6 Conclusion -- 7 Limitations and Future Scope -- References -- Intelligent Identification and Multiclass Segmentation of Agricultural Crops Problem Areas by Neural Network Methods -- 1 Introduction -- 2 Methods and Materials -- 3 Results and Discussion -- 3.1 Justification of the Segmentation DNN Architecture -- 3.2 Learning Outcomes Developed by DNN -- 3.3 Discussion of the Results -- 4 Conclusions -- References -- Perishable Products: Enhancing Delivery Time Efficiency with Big Data, AI, and IoT -- 1 Introduction -- 2 Delivery Time in Our Context -- 2.1 Optimizing Delivery Time in Transportation: Exploring Algorithmic Approaches -- 2.2 Objective -- 2.3 Advantage -- 2.4 Challenger -- 2.5 Delivery Time Description -- 3 The Proposed Optimization -- 3.1 Model System -- 3.2 The Proposed Optimization for Delivery Time -- 3.3 Specification Parameter -- 4 Optımızatıon Results Analysis -- 4.1 Comparing CT with Integrated Recent Transportation Technologies -- 4.2 Evaluation and Comparison of Optimization Results -- 5 Conclusion -- References -- CNN Approach for Identification of Medicinal Plants.
1 Introduction.
Titolo autorizzato: Data Intelligence and Cognitive Informatics  Visualizza cluster
ISBN: 981-9979-62-5
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910799231503321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Algorithms for Intelligent Systems Series