top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced Machine Learning and Deep Learning Approaches for Remote Sensing / / edited by Gwanggil Jeon
Advanced Machine Learning and Deep Learning Approaches for Remote Sensing / / edited by Gwanggil Jeon
Pubbl/distr/stampa [Place of publication not identified] : , : MDPI - Multidisciplinary Digital Publishing Institute, , 2023
Descrizione fisica 1 online resource (362 pages)
Disciplina 621.3678
Soggetto topico Deep learning (Machine learning)
Machine learning
Remote sensing
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910734348503321
[Place of publication not identified] : , : MDPI - Multidisciplinary Digital Publishing Institute, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence-Based Learning Approaches for Remote Sensing
Artificial Intelligence-Based Learning Approaches for Remote Sensing
Autore Jeon Gwanggil
Pubbl/distr/stampa Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022
Descrizione fisica 1 electronic resource (382 p.)
Soggetto topico Technology: general issues
History of engineering & technology
Environmental science, engineering & technology
Soggetto non controllato pine wilt disease dataset
GIS application visualization
test-time augmentation
object detection
hard negative mining
video synthetic aperture radar (SAR)
moving target
shadow detection
deep learning
false alarms
missed detections
synthetic aperture radar (SAR)
on-board
ship detection
YOLOv5
lightweight detector
remote sensing image
spectral domain translation
generative adversarial network
paired translation
synthetic aperture radar
ship instance segmentation
global context modeling
boundary-aware box prediction
land-use and land-cover
built-up expansion
probability modelling
landscape fragmentation
machine learning
support vector machine
frequency ratio
fuzzy logic
artificial intelligence
remote sensing
interferometric phase filtering
sparse regularization (SR)
deep learning (DL)
neural convolutional network (CNN)
semantic segmentation
open data
building extraction
unet
deeplab
classifying-inversion method
AIS
atmospheric duct
ship detection and classification
rotated bounding box
attention
feature alignment
weather nowcasting
ResNeXt
radar data
spectral-spatial interaction network
spectral-spatial attention
pansharpening
UAV visual navigation
Siamese network
multi-order feature
MIoU
imbalanced data classification
data over-sampling
graph convolutional network
semi-supervised learning
troposcatter
tropospheric turbulence
intercity co-channel interference
concrete bridge
visual inspection
defect
deep convolutional neural network
transfer learning
interpretation techniques
weakly supervised semantic segmentation
ISBN 3-0365-6084-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910639984703321
Jeon Gwanggil  
Basel, : MDPI - Multidisciplinary Digital Publishing Institute, 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cybersecurity Vigilance and Security Engineering of Internet of Everything / / edited by Kashif Naseer Qureshi, Thomas Newe, Gwanggil Jeon, Abdellah Chehri
Cybersecurity Vigilance and Security Engineering of Internet of Everything / / edited by Kashif Naseer Qureshi, Thomas Newe, Gwanggil Jeon, Abdellah Chehri
Autore Naseer Qureshi Kashif
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (229 pages)
Disciplina 621.382
Altri autori (Persone) NeweThomas
JeonGwanggil
ChehriAbdellah
Collana Internet of Things, Technology, Communications and Computing
Soggetto topico Telecommunication
Cooperating objects (Computer systems)
Internet of things
Security systems
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
Security Science and Technology
ISBN 3-031-45162-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Part A: Security Threats and Vulnerabilities -- Internet of Everything: Evolution and fundamental concepts -- Cybersecurity Threats and Attacks in IoE Networks -- Attacks Detection Mechanism for IoE Networks -- Cyber Resilience, Principles, and Practices -- Future Cybersecurity Challenges for IoE Networks -- Part B: Security Vigilance and Security Engineering for IoE Networks -- Networking and Security Architectures for IoE Networks -- Machine Learning-Based Detection and Prevention Systems for IoE -- Role of Blockchain Models for IoE Infrastructures and Applications -- Cybersecurity as a Service -- Big data Analytics for Cybersecurity in IoE Networks -- Cybersecurity Standards and Policies for CPS in IoE -- Future Privacy, and Trust Challenges for IoE Networks -- Conclusion.
Record Nr. UNINA-9910767586503321
Naseer Qureshi Kashif  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data analytics for internet of things infrastructure / / Rohit Sharma, Gwanggil Jeon, Yan Zhang, editors
Data analytics for internet of things infrastructure / / Rohit Sharma, Gwanggil Jeon, Yan Zhang, editors
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2023
Descrizione fisica 1 online resource (xv, 326 pages) : illustrations
Disciplina 004.678
Altri autori (Persone) SharmaRohit (Rohit Y.)
JeonGwanggil
ZhangYan
Collana Internet of Things Series
ISBN 3-031-33808-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Key Features -- Contents -- About the Editors -- Big Data in Cloud Today: A Comprehensive Survey -- 1 Introduction -- 2 Characteristics of Big Data -- 3 Classification of Big Data -- 4 Importance of Big Data -- 5 Examples for Big Data -- 6 Tools and Techniques -- 7 Big Data Analytics and Its Benefits -- 8 Cloud Computing -- 9 Working of Cloud Computing -- 10 Conclusion -- References -- Cloud of Things Platform for a Water Meter Network -- 1 Introduction -- 2 Related Work and Problem Motivation -- 2.1 Related Work -- 2.2 IoT Paradigm -- 2.3 Problem Motivation -- 3 Proposed IoT Architecture -- 3.1 System Model -- 3.2 Methodology -- 3.3 Development of Active Switch -- 3.4 Development of an Active Sensor -- 3.5 Integration -- 4 Simulation and Result -- 4.1 Setup Process -- 4.2 Analysis -- 5 Conclusion -- References -- Online Newspaper Development within the Internet of Things Environment: The Role of Computer-Mediated Communication -- 1 Computer-Mediated Communication -- 2 Scholarly Information Related to CMC -- 3 CMC and Development of Online Newspapers -- 3.1 Advantages of Online Newspapers -- 3.2 Delivery of Online News and Information -- 3.3 CMC Journalism Is a Better Option -- 4 Interactivity with News Through CMC and Issues Within IoT Environment -- 4.1 CMC as a Tool for Organizations and Governments to Spread Information and News -- 4.2 The Use of Social Media and Its Social Outcomes Concerning CMC -- 4.3 Emerging Issues Related to the Use of CMC -- 4.4 Reconfiguration of Territorially and Interest-Based Associations -- 4.5 Introduction of New Artifacts and Their Social Outcomes -- 4.6 The Mutual Shaping of Consumers and Technologies -- 5 Conclusion -- References -- FATS (Fuzzy Authentication to Provide Trust-Based Security) in VANET to Mitigate Black Hole Attack -- 1 Introduction -- 2 VANET Architecture.
3 Attacks and Threats Generated in VANET -- 3.1 Selfish Node Attack -- 3.2 Jellyfish Attack -- 3.3 Data Flooding Attack -- 3.4 Black Hole Attack -- 4 Prominent Issues Caused by a Black Hole Node -- 5 Fuzzy Logic and Its Role in the Proposed Approach -- 5.1 Introduction About Fuzzy Logic -- 5.2 Mamdani Fuzzy Inference System -- 5.2.1 Max-Min Inference Method -- 5.2.2 Max-product inference method -- 6 Fuzzy Logic Trust-Based Authentication Schemes in VANET -- 7 Proposed Algorithm FATS (Fuzzy Authentication to Provide Trust-Based Security) for Black Hole Attack Detection -- 7.1 Pseudocode for Providing a Communication Link to the New Node -- 7.2 Formation of Fuzzy Rules Using Mamdani Inference System in MATLAB -- 8 Implementation of FATS -- 9 Conclusion -- References -- AI-Based Chatbot Agents as Drivers of Purchase Intentions: An Interdisciplinary Study -- 1 Introduction -- 2 Conceptual Background and Development of Hypothesis -- 3 Informational Support of Chatbots and Predicting Purchase Intentions -- 4 Trust, Emotional Credibility, and Predicting Purchase Intentions -- 5 Research Gap -- 6 Objectives -- 7 Methods -- 7.1 Sampling Framework and Questionnaire Design -- 7.2 Measures -- 8 Research Tools and Techniques -- 9 Measurement Model -- 10 Analysis of Structural Model -- 11 Conclusion and Future Research Works -- 12 Limitations -- References -- An Intelligent Model for Identifying Fluctuations in the Stock Market and Predicting Investment Policies with Guaranteed Returns -- 1 Introduction -- 2 Literature Survey -- 3 Impact of Big Data in Stock Market -- 3.1 Big Data -- 3.1.1 Big Data Architecture -- 3.2 Structure of Big Data -- 3.2.1 Structured Data -- 3.2.2 Unstructured Data -- 3.2.3 Semistructured Data -- 3.3 Big Data in the Stock Market -- 3.4 Nature of Dynamic Data in the Stock Market -- 4 Proposed Model (Fig. 2) -- 4.1 Objectives.
4.2 Mathematical Implementation -- 4.2.1 Statistical Analysis -- 4.2.2 Fuzzy Inferences -- 5 Implementation -- 5.1 Data Preparation -- 5.2 Data Cleaning and Data Preprocessing -- 5.2.1 Data Normalisation -- 5.3 Fuzzy Inference -- 5.3.1 Axis Bank -- 5.3.2 Tata Steel -- 5.3.3 Titan -- 5.3.4 Threshold Value -- 5.3.5 Parameters -- 5.3.6 Fuzzy Rules -- 6 Results and Discussion -- 6.1 Performance Analysis -- 7 Conclusion -- References -- Sandwiched Metasurface Antenna for Small Spacecrafts in IoT Infrastructure -- 1 Introduction -- 2 Antenna Design and Geometrical Analysis -- 3 Results, Data Analysis, and Discussions -- 4 Conclusions and Future Works -- References -- Development of Laser-Beam Cutting-Edge Technology and IOT-Based Race Car Lapse Time Computational System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 3.1 Block Diagram -- 3.2 Simulation of Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- A Study of Cloud-Based Solution for Data Analytics -- 1 Introduction -- 2 Methodology -- 2.1 Amazon Web Services (AWS) Cloud Platform for Data Analytics -- 2.1.1 Architecture Study of a Data Analytics System Using AWS -- 2.1.2 Data Ingestion and Processing -- 2.1.3 Data Preparation -- 2.1.4 AI/ML Workbench -- 2.2 Google Cloud Platform (GCP) for Data Analytics -- 2.2.1 Architecture Study of a Data Analytics System Using GCP -- 2.2.2 Data Ingestion and Processing -- 2.2.3 Data Preparation -- 3 Comparative Analysis of Services Required from AWS and GCP -- 4 Challenges -- 5 Conclusion -- References -- An Intelligent Model for Optimizing Sparsity Problem Toward Movie Recommendation Paradigm Using Machine Learning -- 1 Introduction -- 2 Similar Works Done -- 3 Fundamentals of Big Data -- 3.1 Properties of Big Data -- 3.2 Big Data in Entertainment Industry -- 3.2.1 Uses of Big Data in Media and Entertainment.
4 Proposed Model -- 4.1 Mathematical Background -- 4.2 Ant Colony Optimization (ACO) -- 4.2.1 Theoretical Considerations on ACO -- 4.3 Data Preparation -- 5 Results and Discussion -- 5.1 Performance Analysis -- 5.1.1 Evaluation Metrics -- 6 Conclusion -- References -- Techniques to Identify Image Objects Under Adverse Environmental Conditions: A Systematic Literature Review -- 1 Introduction -- 1.1 Morphological Operations on Image -- 1.2 Impact of the Environment on Objects -- 2 Methodology and Research Description -- 3 Findings and Results -- 4 Conclusion -- References -- Technology-Enhanced Teaching and Learning During the COVID-19 Pandemic -- 1 Introduction -- 2 Current Perspectives on Technology-Enhanced Language Teaching and Learning -- 3 Computer-Mediated Communication and Interaction Approach -- 4 Research on Remote Teaching in Crisis Situations -- 5 Technology Acceptance Model -- 6 Responsive Online Teaching in Crises -- 7 Bloom's Digital Taxonomy -- 8 Recommendations -- 9 Conclusion -- References -- The Symbiotic Relation of IoT and AI for Applications in Various Domains: Trends and Future Directions -- 1 Introduction -- 2 Recent Works on IoT and AI in Various Domains -- 2.1 Healthcare -- 2.2 Sustainability -- 2.3 Information Security -- 2.4 Education -- 2.5 Pollution Monitoring (Table 5) -- 2.6 Robotics (Table 6) -- 2.7 Other Related Works -- 3 Conclusion and Future Directions -- References -- Text Summarization for Big Data Analytics: A Comprehensive Review of GPT 2 and BERT Approaches -- 1 Introduction -- 2 Related Works -- 2.1 Text Summarization Using Deep Learning -- 2.2 Need for Text Summarization in Big Data Analytics -- 3 BERT -- 3.1 BERT Architecture -- 3.2 Phases in Generating the Summary -- 3.2.1 Input Document -- 3.2.2 Interval Segment Embedding -- 3.2.3 Embedding -- 3.2.4 Segment Embeddings -- 3.2.5 Position Embeddings.
3.2.6 Summarization -- 3.2.7 Inter Sentence Transformer -- 4 GPT-2 -- 5 Experiment Setup -- 5.1 About the Dataset -- 5.2 Training the Models -- 5.3 Evaluation Metrics -- 5.4 Summary Snippets -- 6 Comparison of Results -- 7 Conclusion -- References -- Leveraging Secured E-Voting Using Decentralized Blockchain Technology -- 1 Introduction -- 2 Blockchain -- 2.1 What Is Blockchain? -- 2.2 Working of a Blockchain -- 2.2.1 Elliptic Curve Digital Signature Technique (ECDSA) -- 2.3 Features of Blockchain Technology -- 2.3.1 Immutability -- 2.3.2 Auditability -- 2.3.3 Persistency -- 2.3.4 Decentralization -- 2.3.5 Anonymity -- 3 Types, Consensus Protocols, and Unfilled Gaps -- 3.1 Types of Blockchain -- 3.1.1 Public Blockchain -- 3.1.2 Private Blockchain -- 3.1.3 Consortium Blockchain -- 3.1.4 Hybrid Blockchain -- 3.2 Consensus Protocols -- 3.2.1 Proof of Work -- 3.2.2 Proof of Burn -- 3.2.3 Proof of Stake -- 3.2.4 Delegated Proof of Stake -- 3.2.5 Proof of Elapsed Time -- 3.2.6 Proof of Participation -- 3.2.7 Proof of Authority -- 3.2.8 Proof of Importance -- 3.2.9 Proof of Capacity -- 3.2.10 Proof of History -- 3.3 Challenges Faced by Existing Systems -- 3.3.1 Paper and Ballot Systems -- 3.3.2 Digital E-Voting Systems -- 4 Recent Advances -- 5 Conclusion -- References -- Multilayer Security and Privacy Provision in Internet of Things Networks: Challenges and Future Trends -- 1 The Internet of Things -- 2 Architecture and Technologies of IoT -- 3 Security Requirements in Distributed IoT Applications -- 4 Existing Challenges and Issues in IoT -- 4.1 Security Issues in the Network Layer -- 4.2 Security Issues at Physical Layer -- 5 Countermeasures for Security in IoT -- 5.1 Attacks on and Threats to IoT -- 5.2 Defenses Against IoT Attacks on Each Layer -- 6 Privacy Issues in IoT -- 6.1 Existing Security Models for IoT Networks -- 7 The Future of IoT -- 7.1 Top-Ten IoT Developments.
Record Nr. UNISA-996550554203316
Cham : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Data analytics for internet of things infrastructure / / Rohit Sharma, Gwanggil Jeon, Yan Zhang, editors
Data analytics for internet of things infrastructure / / Rohit Sharma, Gwanggil Jeon, Yan Zhang, editors
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2023
Descrizione fisica 1 online resource (xv, 326 pages) : illustrations
Disciplina 004.678
Altri autori (Persone) SharmaRohit (Rohit Y.)
JeonGwanggil
ZhangYan
Collana Internet of Things Series
ISBN 3-031-33808-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Key Features -- Contents -- About the Editors -- Big Data in Cloud Today: A Comprehensive Survey -- 1 Introduction -- 2 Characteristics of Big Data -- 3 Classification of Big Data -- 4 Importance of Big Data -- 5 Examples for Big Data -- 6 Tools and Techniques -- 7 Big Data Analytics and Its Benefits -- 8 Cloud Computing -- 9 Working of Cloud Computing -- 10 Conclusion -- References -- Cloud of Things Platform for a Water Meter Network -- 1 Introduction -- 2 Related Work and Problem Motivation -- 2.1 Related Work -- 2.2 IoT Paradigm -- 2.3 Problem Motivation -- 3 Proposed IoT Architecture -- 3.1 System Model -- 3.2 Methodology -- 3.3 Development of Active Switch -- 3.4 Development of an Active Sensor -- 3.5 Integration -- 4 Simulation and Result -- 4.1 Setup Process -- 4.2 Analysis -- 5 Conclusion -- References -- Online Newspaper Development within the Internet of Things Environment: The Role of Computer-Mediated Communication -- 1 Computer-Mediated Communication -- 2 Scholarly Information Related to CMC -- 3 CMC and Development of Online Newspapers -- 3.1 Advantages of Online Newspapers -- 3.2 Delivery of Online News and Information -- 3.3 CMC Journalism Is a Better Option -- 4 Interactivity with News Through CMC and Issues Within IoT Environment -- 4.1 CMC as a Tool for Organizations and Governments to Spread Information and News -- 4.2 The Use of Social Media and Its Social Outcomes Concerning CMC -- 4.3 Emerging Issues Related to the Use of CMC -- 4.4 Reconfiguration of Territorially and Interest-Based Associations -- 4.5 Introduction of New Artifacts and Their Social Outcomes -- 4.6 The Mutual Shaping of Consumers and Technologies -- 5 Conclusion -- References -- FATS (Fuzzy Authentication to Provide Trust-Based Security) in VANET to Mitigate Black Hole Attack -- 1 Introduction -- 2 VANET Architecture.
3 Attacks and Threats Generated in VANET -- 3.1 Selfish Node Attack -- 3.2 Jellyfish Attack -- 3.3 Data Flooding Attack -- 3.4 Black Hole Attack -- 4 Prominent Issues Caused by a Black Hole Node -- 5 Fuzzy Logic and Its Role in the Proposed Approach -- 5.1 Introduction About Fuzzy Logic -- 5.2 Mamdani Fuzzy Inference System -- 5.2.1 Max-Min Inference Method -- 5.2.2 Max-product inference method -- 6 Fuzzy Logic Trust-Based Authentication Schemes in VANET -- 7 Proposed Algorithm FATS (Fuzzy Authentication to Provide Trust-Based Security) for Black Hole Attack Detection -- 7.1 Pseudocode for Providing a Communication Link to the New Node -- 7.2 Formation of Fuzzy Rules Using Mamdani Inference System in MATLAB -- 8 Implementation of FATS -- 9 Conclusion -- References -- AI-Based Chatbot Agents as Drivers of Purchase Intentions: An Interdisciplinary Study -- 1 Introduction -- 2 Conceptual Background and Development of Hypothesis -- 3 Informational Support of Chatbots and Predicting Purchase Intentions -- 4 Trust, Emotional Credibility, and Predicting Purchase Intentions -- 5 Research Gap -- 6 Objectives -- 7 Methods -- 7.1 Sampling Framework and Questionnaire Design -- 7.2 Measures -- 8 Research Tools and Techniques -- 9 Measurement Model -- 10 Analysis of Structural Model -- 11 Conclusion and Future Research Works -- 12 Limitations -- References -- An Intelligent Model for Identifying Fluctuations in the Stock Market and Predicting Investment Policies with Guaranteed Returns -- 1 Introduction -- 2 Literature Survey -- 3 Impact of Big Data in Stock Market -- 3.1 Big Data -- 3.1.1 Big Data Architecture -- 3.2 Structure of Big Data -- 3.2.1 Structured Data -- 3.2.2 Unstructured Data -- 3.2.3 Semistructured Data -- 3.3 Big Data in the Stock Market -- 3.4 Nature of Dynamic Data in the Stock Market -- 4 Proposed Model (Fig. 2) -- 4.1 Objectives.
4.2 Mathematical Implementation -- 4.2.1 Statistical Analysis -- 4.2.2 Fuzzy Inferences -- 5 Implementation -- 5.1 Data Preparation -- 5.2 Data Cleaning and Data Preprocessing -- 5.2.1 Data Normalisation -- 5.3 Fuzzy Inference -- 5.3.1 Axis Bank -- 5.3.2 Tata Steel -- 5.3.3 Titan -- 5.3.4 Threshold Value -- 5.3.5 Parameters -- 5.3.6 Fuzzy Rules -- 6 Results and Discussion -- 6.1 Performance Analysis -- 7 Conclusion -- References -- Sandwiched Metasurface Antenna for Small Spacecrafts in IoT Infrastructure -- 1 Introduction -- 2 Antenna Design and Geometrical Analysis -- 3 Results, Data Analysis, and Discussions -- 4 Conclusions and Future Works -- References -- Development of Laser-Beam Cutting-Edge Technology and IOT-Based Race Car Lapse Time Computational System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 3.1 Block Diagram -- 3.2 Simulation of Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- A Study of Cloud-Based Solution for Data Analytics -- 1 Introduction -- 2 Methodology -- 2.1 Amazon Web Services (AWS) Cloud Platform for Data Analytics -- 2.1.1 Architecture Study of a Data Analytics System Using AWS -- 2.1.2 Data Ingestion and Processing -- 2.1.3 Data Preparation -- 2.1.4 AI/ML Workbench -- 2.2 Google Cloud Platform (GCP) for Data Analytics -- 2.2.1 Architecture Study of a Data Analytics System Using GCP -- 2.2.2 Data Ingestion and Processing -- 2.2.3 Data Preparation -- 3 Comparative Analysis of Services Required from AWS and GCP -- 4 Challenges -- 5 Conclusion -- References -- An Intelligent Model for Optimizing Sparsity Problem Toward Movie Recommendation Paradigm Using Machine Learning -- 1 Introduction -- 2 Similar Works Done -- 3 Fundamentals of Big Data -- 3.1 Properties of Big Data -- 3.2 Big Data in Entertainment Industry -- 3.2.1 Uses of Big Data in Media and Entertainment.
4 Proposed Model -- 4.1 Mathematical Background -- 4.2 Ant Colony Optimization (ACO) -- 4.2.1 Theoretical Considerations on ACO -- 4.3 Data Preparation -- 5 Results and Discussion -- 5.1 Performance Analysis -- 5.1.1 Evaluation Metrics -- 6 Conclusion -- References -- Techniques to Identify Image Objects Under Adverse Environmental Conditions: A Systematic Literature Review -- 1 Introduction -- 1.1 Morphological Operations on Image -- 1.2 Impact of the Environment on Objects -- 2 Methodology and Research Description -- 3 Findings and Results -- 4 Conclusion -- References -- Technology-Enhanced Teaching and Learning During the COVID-19 Pandemic -- 1 Introduction -- 2 Current Perspectives on Technology-Enhanced Language Teaching and Learning -- 3 Computer-Mediated Communication and Interaction Approach -- 4 Research on Remote Teaching in Crisis Situations -- 5 Technology Acceptance Model -- 6 Responsive Online Teaching in Crises -- 7 Bloom's Digital Taxonomy -- 8 Recommendations -- 9 Conclusion -- References -- The Symbiotic Relation of IoT and AI for Applications in Various Domains: Trends and Future Directions -- 1 Introduction -- 2 Recent Works on IoT and AI in Various Domains -- 2.1 Healthcare -- 2.2 Sustainability -- 2.3 Information Security -- 2.4 Education -- 2.5 Pollution Monitoring (Table 5) -- 2.6 Robotics (Table 6) -- 2.7 Other Related Works -- 3 Conclusion and Future Directions -- References -- Text Summarization for Big Data Analytics: A Comprehensive Review of GPT 2 and BERT Approaches -- 1 Introduction -- 2 Related Works -- 2.1 Text Summarization Using Deep Learning -- 2.2 Need for Text Summarization in Big Data Analytics -- 3 BERT -- 3.1 BERT Architecture -- 3.2 Phases in Generating the Summary -- 3.2.1 Input Document -- 3.2.2 Interval Segment Embedding -- 3.2.3 Embedding -- 3.2.4 Segment Embeddings -- 3.2.5 Position Embeddings.
3.2.6 Summarization -- 3.2.7 Inter Sentence Transformer -- 4 GPT-2 -- 5 Experiment Setup -- 5.1 About the Dataset -- 5.2 Training the Models -- 5.3 Evaluation Metrics -- 5.4 Summary Snippets -- 6 Comparison of Results -- 7 Conclusion -- References -- Leveraging Secured E-Voting Using Decentralized Blockchain Technology -- 1 Introduction -- 2 Blockchain -- 2.1 What Is Blockchain? -- 2.2 Working of a Blockchain -- 2.2.1 Elliptic Curve Digital Signature Technique (ECDSA) -- 2.3 Features of Blockchain Technology -- 2.3.1 Immutability -- 2.3.2 Auditability -- 2.3.3 Persistency -- 2.3.4 Decentralization -- 2.3.5 Anonymity -- 3 Types, Consensus Protocols, and Unfilled Gaps -- 3.1 Types of Blockchain -- 3.1.1 Public Blockchain -- 3.1.2 Private Blockchain -- 3.1.3 Consortium Blockchain -- 3.1.4 Hybrid Blockchain -- 3.2 Consensus Protocols -- 3.2.1 Proof of Work -- 3.2.2 Proof of Burn -- 3.2.3 Proof of Stake -- 3.2.4 Delegated Proof of Stake -- 3.2.5 Proof of Elapsed Time -- 3.2.6 Proof of Participation -- 3.2.7 Proof of Authority -- 3.2.8 Proof of Importance -- 3.2.9 Proof of Capacity -- 3.2.10 Proof of History -- 3.3 Challenges Faced by Existing Systems -- 3.3.1 Paper and Ballot Systems -- 3.3.2 Digital E-Voting Systems -- 4 Recent Advances -- 5 Conclusion -- References -- Multilayer Security and Privacy Provision in Internet of Things Networks: Challenges and Future Trends -- 1 The Internet of Things -- 2 Architecture and Technologies of IoT -- 3 Security Requirements in Distributed IoT Applications -- 4 Existing Challenges and Issues in IoT -- 4.1 Security Issues in the Network Layer -- 4.2 Security Issues at Physical Layer -- 5 Countermeasures for Security in IoT -- 5.1 Attacks on and Threats to IoT -- 5.2 Defenses Against IoT Attacks on Each Layer -- 6 Privacy Issues in IoT -- 6.1 Existing Security Models for IoT Networks -- 7 The Future of IoT -- 7.1 Top-Ten IoT Developments.
Record Nr. UNINA-9910746286103321
Cham : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data Analytics for Smart Grids Applications--A Key to Smart City Development
Data Analytics for Smart Grids Applications--A Key to Smart City Development
Autore Kumar Sharma Devendra
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (466 pages)
Altri autori (Persone) SharmaRohit
JeonGwanggil
KumarRaghvendra
Collana Intelligent Systems Reference Library
ISBN 3-031-46092-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- About This Book -- Key Features -- Contents -- About the Editors -- 1 Data Analytics for Smart Grids and Applications-Present and Future Directions -- 1.1 Introduction -- 1.2 Literature Review -- 1.3 Smart Grid Infrastructure -- 1.4 Data Analytics in Smart Grids -- 1.4.1 Data Pre Processing Techniques in Smart Grids -- 1.4.2 Case Study of Data Analytics in Smart Grids -- 1.5 Artificial Intelligence in Smart Grids -- 1.5.1 Event Detection Using Data Analytics and Cloud Computing for Intelligent IoT System -- 1.6 Conclusion -- References -- 2 Design, Optimization and Performance Analysis of Microgrids Using Multi-agent Q-Learning -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Proposed Model -- 2.4 Experiments -- 2.5 Conclusion -- References -- 3 Big Data Analytics for Smart Grid: A Review on State-of-Art Techniques and Future Directions -- 3.1 Introduction -- 3.2 State-of-Art Techniques for Big Data Analytics in Smart Grids -- 3.3 Challenges in Big Data Analytics for Smart Grids -- 3.4 Big Data Analytics for Smart Grids -- 3.5 Applications of Big Data Analytics in Smart Grids -- 3.6 Challenges and Future Directions for Big Data Analytics in Smart Grids -- 3.7 Case Studies of Big Data Analytics in Smart Grids -- 3.7.1 Case Study 1: Duke Energy's Grid Modernization Program -- 3.7.2 Case Study 2: National Grid's Smart Grid Program -- 3.7.3 Case Study 3: ENEL's Smart Grid Program -- 3.8 Future Directions for Big Data Analytics in Smart Grids -- 3.9 Real-Time Big Data Analytics for Smart Grids -- 3.10 Conclusion -- References -- 4 Smart Grid Management for Smart City Infrastructure Using Wearable Sensors -- 4.1 Introduction -- 4.1.1 Smart Grid Versus Traditional Electricity Grids -- 4.1.2 Why Do We Need Smart Grids? -- 4.1.3 Smart Grid Features -- 4.1.4 Smart Grid Technologies -- 4.1.5 Smart Grid Approaches.
4.1.6 Smart Meters and Home EMS -- 4.1.7 Smart Appliances -- 4.1.8 Home Power Generation -- 4.1.9 Machine Learning for Data Analytics in Smart Grids and Energy Management -- 4.1.10 Security for Industrial Control Systems in Smart Grids -- 4.1.11 Power Flow Modelling and Optimization in Smart Grids -- 4.1.12 Grid Stability and Security in Smart Grids -- 4.1.13 Integration of Renewable Energy Sources in Smart Grid Management -- 4.1.14 Demand Response Strategies for Efficient Smart Grid Management -- 4.1.15 Cybersecurity Measures for Smart Grid Management -- 4.1.16 Energy Storage Systems and Their Role in Smart Grid Management -- 4.1.17 Data Analytics and Artificial Intelligence in Smart Grid Management -- 4.1.18 Smart Grid Communication Protocols and Infrastructure -- 4.1.19 Advantages of Smart Grids -- 4.1.20 Disadvantages of Smart Grids -- 4.2 Conclusion -- References -- 5 Studies on Conventional and Advanced Machine Learning Algorithm Towards Framing of Robust Data Analytics for the Smart Grid Application -- 5.1 Introduction -- 5.2 Review of Different Smart Grid Based Approaches -- 5.3 Smart Grid Model -- 5.3.1 Smart Grids as Coordinators for Data Flow and Energy Flow -- 5.3.2 Big Data -- 5.4 Features of Big Data to Be Integrated into the Smart Grid -- 5.5 Contribution of the Smart Grid as Data Source -- 5.6 Smart Grid in Supply of Data Gathering -- 5.6.1 Data Transmission Methodology -- 5.6.2 Data Analysis Methodology -- 5.6.3 Data Extraction from Smart Grid -- 5.6.4 Grid for Production of Renewable Source of Energy -- 5.6.5 Big Data in Smart Grid -- 5.6.6 Machine Learning Approach to the Data Grid -- 5.6.7 Application of IOT to the Smart Grid Technology -- 5.7 IOT Based Solutions Towards Grid Problems -- 5.7.1 Stability of IOT Based Connection -- 5.7.2 Cost Effectiveness in Implementation -- 5.7.3 Security to the Information.
5.8 Application of Data Grid in Mobile Sink Based Wireless Sensor Network -- 5.8.1 Assumptions of Network Characteristics -- 5.9 Virtual Grid Architecture -- 5.9.1 Different Structures of Virtual Grids -- 5.9.2 Virtual Grid Construction Cost -- 5.9.3 Reading of the Smart Meter Data and Its Analysis by the Smart Grid with Future Prediction -- 5.9.4 Prediction Analysis of Smart Meter Data -- 5.10 Future Research Direction -- 5.11 Conclusion -- References -- 6 Prediction and Classification for Smart Grid Applications -- 6.1 Introduction -- 6.2 Smart Grid -- 6.3 Predictive and Classification Models in Smart Grid Applications -- 6.4 Predictive Modeling -- 6.5 Classification Modeling -- 6.6 Smart Grid Management -- 6.7 Intelligent Data Collection Devices -- 6.8 Data Science Pertaining to Smart Grid Analytics -- 6.9 Machine Learning for Data Analytics -- 6.10 Data Security for Smart Grid Applications -- 6.11 Conclusion -- References -- 7 A Review on Smart Metering Using Artificial Intelligence and Machine Learning Techniques: Challenges and Solutions -- 7.1 Introduction -- 7.1.1 Trends of the Smart Metering Systems -- 7.1.2 Challenges of Smart Meters -- 7.1.3 Key Elements of Smart Meter -- 7.1.4 IoT in Smart Metering -- 7.1.5 Integration of IoT with AI and Machine Learning for Smart Meter -- 7.1.6 Artificial Intelligence Techniques -- 7.2 Conclusion -- References -- 8 Machine Learning Applications for the Smart Grid Infrastructure -- 8.1 Introduction -- 8.2 IoT in Distribution System -- 8.3 Techniques Using Machine Learning -- 8.4 Conclusion -- References -- 9 A Privacy Mitigating Framework for the Smart Grid Internet of Things Data -- 9.1 Introduction -- 9.1.1 Overview of the Smart Grid and Its Significance in Modern Energy Systems -- 9.1.2 Introduction to the IoT and Its Integration with the Smart Grid -- 9.1.3 Importance of Privacy in Smart Grid IoT Data.
9.2 Privacy Challenges in Smart Grid IoT Data -- 9.3 Privacy Mitigation Techniques -- 9.4 Privacy Mitigation Framework for Smart Grid -- 9.4.1 Privacy Monitoring Engine Description -- 9.5 Results -- 9.6 Conclusion -- References -- 10 Protecting Future of Energy: Data Security and Privacy for Smart Grid Applications Using MATLAB -- 10.1 Introduction -- 10.1.1 Data Security and Privacy Threats -- 10.1.2 Data Security and Privacy Solutions -- 10.1.3 MATLAB Solution -- 10.1.4 Key Features and Capabilities -- 10.2 MATLAB Tools and Inbuilt Functions for Data Security in Applications of Smart Grid -- 10.3 MATLAB Functions for Data Security and Privacy in Smart Grid Applications Include -- 10.4 MATLAB Techniques for Data Security and Privacy in Smart Grid Applications -- 10.5 Matlab Algorithm for Privacy-Preserving Data Mining for Smart Grid Applications -- 10.6 Threats to Data Security and Privacy in Smart Grid Applications -- 10.6.1 Preventive Measures -- 10.7 Case Studies and Practical Implementations of Data Security and Privacy in Smart Grid Applications -- 10.7.1 Case Study 1: Securing Smart Meters Using Blockchain -- 10.7.2 Case Study 2: Machine Learning-Based Anomaly Detection in Power Grids -- 10.7.3 Case Study 3: Privacy-Preserving Data Aggregation in Smart Grids -- 10.7.4 Case Study 4: Secure Data Sharing in Smart Grids Using Homomorphic Encryption -- 10.7.5 Case Study 5: Anomaly Detection in Smart Grids Using Machine Learning (ML) with Matlab -- 10.8 Conclusion -- References -- 11 Revolutionizing Smart Grids with Big Data Analytics: A Case Study on Integrating Renewable Energy and Predicting Faults -- 11.1 Introduction -- 11.2 Current Trends in Smart Grid Based Big Data Analytics -- 11.2.1 There is a Notable Surge in Speculation in Smart Grid Projects and, Consequently, Smart Grid Analytics [9-11].
11.2.2 Smart Grid Analytics Effectively Handle Real-Time Data Despite the Increased Speed and Diverse Requirements -- 11.2.3 Digital Technologies and Cloud Computing Will Continue to Improve, Facilitating Enhanced Data Computation Capabilities -- 11.2.4 Smart Grid and Its Benefits for Renewable Energy -- 11.3 Challenges of Smart Grid Analytics -- 11.3.1 Benefits of Analytics in Smart Grid -- 11.3.2 Trends in the Utility Industry -- 11.4 Technologies for Smart Grid Analytics and Its Importance -- 11.4.1 Business Intelligence (BI) and Data Analysis -- 11.4.2 Other Framework Technologies-Databases Such as Apache Hadoop, MapReduce, and SQL -- 11.4.3 The Significance of Big Data in Smart Grid Analytics -- 11.5 Gaining Perceptions Through a Smart Grid and Big Data: A Case Study -- 11.5.1 Case Studies in Focus -- 11.5.2 Smart Grid Based Data Analytics Use-Cases in Europe -- 11.6 Future and Scope of Big Data Analytics in Smart Grids -- 11.6.1 Customer Acceptance and Engagement -- 11.6.2 Regulatory Policies -- 11.6.3 Innovative Structures -- 11.7 Conclusion -- References -- 12 Fake User Account Detection in Online Social Media Networks Using Machine Learning and Neural Network Techniques -- 12.1 Introduction -- 12.1.1 Statistics of Social Media Usage -- 12.1.2 Why Are Fake Profiles Created? -- 12.2 Literature Review -- 12.3 Proposed System for Detecting Fake Accounts on Twitter Using AI -- 12.3.1 Artificial Neural Network (ANN) -- 12.3.2 Support Vector Machine (SVM) -- 12.3.3 Random Forest (RF) -- 12.4 Findings and Discussions -- 12.5 Conclusion -- References -- 13 Data Analytics for Smart Grids Applications to Improve Performance, Optimize Energy Consumption, and Gain Insights -- 13.1 Introduction -- 13.2 Leveraging Smart Grids for Predictive Energy Analytics -- 13.3 Big Data Analytics for Grid Resiliency and Security.
13.4 Machine Learning Techniques for Smart Grid Optimization.
Record Nr. UNINA-9910767529203321
Kumar Sharma Devendra  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui