ICT : Proceedings of ICTCS 2023, Volume 1 |
Autore | Joshi Amit |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (493 pages) |
Altri autori (Persone) |
MahmudMufti
RagelRoshan G KartikS |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 9789819702107 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910855384203321 |
Joshi Amit
![]() |
||
Singapore : , : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT : Proceedings of ICTCS 2023, Volume 3 |
Autore | Joshi Amit |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2024 |
Descrizione fisica | 1 online resource (502 pages) |
Altri autori (Persone) |
MahmudMufti
RagelRoshan G KartikS |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9707-44-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Scalability Analysis of Molecular Dynamics Simulation Using NAMD on Ampere-Based Dense GPU Supercomputer -- 1 Introduction -- 2 NAMD -- 3 Experimental System (PARAM Siddhi-AI) -- 4 Input Datasets -- 5 Results and Discussion -- 5.1 NAMD Intra-node GPU Scalability -- 5.2 NAMD Inter-node GPU Scalability -- 5.3 NAMD Scalability Analysis on A100 and V100 GPUs -- 6 Conclusions -- References -- Digital Muhadathah: Framework Model Development for Digital Arabic Language Learning -- 1 Introduction -- 2 Literature Review -- 2.1 Digital Muhadathah for Arabic Learning Instruction Support -- 2.2 Digital Muhadathah for Technology-Enhanced Arabic Language Learning -- 3 Methodology -- 4 Result and Discussion -- 4.1 Developing Digital Muhadathah for Arabic Language Learning Support -- 4.2 Enhancing Digital Muhadathah Supporting System for Arabic Language Learning -- 5 Conclusion -- References -- Proficient Exam Monitoring System Using Deep Learning Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Description of the Models Used -- 3.1 Face Detection Model (Caffe Model from OpenCV's DNN Module) -- 3.2 Speech-To-Text Model -- 3.3 Object Detection Model (YOLO) -- 3.4 Haar Cascade Model -- 4 Proposed Methodology -- 4.1 Face Detection -- 4.2 Facial Recognition -- 4.3 Face Spoofing Detection -- 4.4 Head-Pose Estimation -- 4.5 Eye Tracking -- 4.6 Mouth Ratio Analysis -- 4.7 Facial Landmark Identification -- 4.8 Object Detection -- 4.9 Distance Estimation -- 4.10 Audio Recording and Speech-To-Text Conversion -- 4.11 Plagiarism Checker -- 5 Results -- 6 Conclusion -- 7 Future Work -- 7.1 Improved Cheating Detection Algorithms -- 7.2 Biometric Authentication Integration -- 7.3 Robust Data Privacy and Security Measures -- 7.4 Ethical Considerations and Bias Mitigation.
7.5 User Experience and Interface Design -- 7.6 Integration with Learning Management Systems (LMS) -- 7.7 Continuous Monitoring and Adaptive Proctoring -- 7.8 Collaboration and Group Assessment Features -- References -- Object Detection in Rainy Images Based on Multi-stage Image Deraining Network -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 3.1 Deraining -- 3.2 Object Detection in Rainy Images -- 4 Experimental Results and Discussion -- 4.1 Performance Measures -- 4.2 Experimental Setup -- 4.3 Quantitative Analysis -- 4.4 Qualitative Analysis -- 4.5 Object Detection in Rainy and Derained Image -- 4.6 Comparative Analysis in YOLO Framework -- 5 Conclusion -- References -- ApnaMarket.NFT: Empowering Art and Collectibles in the NFT Marketplace -- 1 Introduction -- 2 Literature Review -- 3 Implementation -- 4 Conclusion -- References -- Smart Homes of Tomorrow: IoT-Enabled Lifestyle Enhancements -- 1 Introduction -- 1.1 Motivation -- 1.2 Objectives -- 1.3 Key Components -- 2 Pipeline Flow of IoT-Based Smart Home Algorithm -- 3 Architecture -- 4 Application Interface -- 5 Component Used in IoT-Based Home Automation System -- 6 Modules -- 7 Conclusion -- References -- Human Activity Recognition Using Supervised Machine Learning Classifiers -- 1 Introduction -- 2 Dataset -- 3 Literature Survey -- 4 Methodology -- 4.1 Data Import -- 4.2 Preprocessing of Data -- 4.3 Support Vector Machine (SVM) -- 4.4 Random Forest -- 4.5 Decision Tree -- 4.6 Confusion Matrix -- 5 Visualization of Data -- 6 Experimental Result -- 7 Comparison Chart -- 8 Conclusion -- References -- Application of Deep Learning in Detection and Classification -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Hardware and Software Requirements -- 5 Algorithm Description -- 6 Results and Inferences -- 7 Conclusion -- References. Gesture-Based Alphabet Detection and Scoring Using OpenCV and Tesseract-OCR -- 1 Introduction -- 2 Related Work -- 3 Proposed System and Methodology -- 3.1 Flowchart -- 3.2 Tools Used in the Application -- 4 Experiment and Result Analysis -- 5 Conclusion and Future Work -- References -- Sign-Kiosk: A Real-Time Virtual Assistant -- 1 Introduction -- 2 Methodology -- 2.1 Assumptions and Problems -- 2.2 Conversion of Sign to Text -- 2.3 Generation of Response to Text -- 2.4 Conversion of Text-to-Sign and Speech -- 3 Results -- 4 Conclusion -- References -- A Graph-Based Strategy for Intrusion Detection in Connected Vehicles -- 1 Introduction -- 2 Background -- 2.1 Threat Model -- 3 Related Works -- 4 Methodology -- 5 Performance Evaluation -- 5.1 Evaluation Metrics -- 5.2 Results and Discussions -- 6 Conclusion -- References -- Correlation Analysis Between INR-USD Exchange Rates and Public Sentiments Using Twitter -- 1 Introduction -- 2 Literature Survey -- 3 Model Selection -- 3.1 Currency Exchange -- 3.2 Sentiment Analysis -- 4 Implementation -- 5 Results and Analysis -- 6 Conclusion -- References -- Improving Farm Yield Through Agent-Based Modelling -- 1 Introduction -- 2 Literature Review -- 2.1 Observations -- 3 Methodology -- 3.1 Agent-Based Model Development -- 3.2 NetLogo -- 3.3 The Simulation Stages -- 3.4 Experimentation and Analysis -- 3.5 Flow Chart -- 3.6 Limitations -- 4 Implementation and Results -- 4.1 Identifying Variables -- 4.2 Results -- 4.3 Conclusion -- References -- A Recommendation System for Food Tourism -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Content-Based Filtering -- 3.4 User-Preferences and Location -- 3.5 Interface and Presentation -- 3.6 Integration of Website with the Backend -- 3.7 Taking Input from the User and Displaying the Output. 4 Result and Evaluation -- References -- Working of the Tesseract OCR on Different Fonts of Gujarati Language -- 1 Introduction -- 2 Architecture of Tesseract -- 3 Working of Tesseract OCR -- 4 Observation and Analysis -- 5 Conclusion -- References -- Exploring Innovations for Streamlining Orphan Adoption: Harnessing Blockchain and Decentralized Solutions-A Survey and Comprehensive Framework -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Prospective Implementation Details of Proposed Methodology -- 4.1 Scenario-Wise Elaboration of Orphan Management System -- 5 Conclusion -- 6 Future Scope -- References -- Encryption + Watermarking: A Duo Approach for Secure Image Communication in Transform Domain -- 1 Introduction -- 2 Literature Survey -- 3 Results and Discussions -- 3.1 Differential Analysis -- 3.2 Error Metric Analysis -- 3.3 Statistical Analysis -- 4 Conclusion -- References -- Animal Detection in Wildlife Conservation Using Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 4 Proposed Methodology -- 4.1 Pretraining in ImageNet -- 4.2 Evaluation Metrics -- 4.3 Training -- 4.4 Validation -- 4.5 Testing -- 5 Results and Discussion -- 6 Ethical Statement -- 7 Conclusion and Future Scope -- References -- Real-Time Groundwater Monitoring Using IoT Sensors for Sustainable Resource Management -- 1 Introduction -- 2 Background Study -- 3 Materials and Methods -- 3.1 Groundwater Sensor -- 3.2 Pressure Transducer -- 3.3 Ultrasonic Sensors -- 3.4 Submersible Pressure Sensors -- 3.5 An Analog-to-Digital Converter (ADC) -- 3.6 Capacitive Sensors -- 3.7 Conductivity Sensors -- 3.8 IoT Gateway -- 3.9 Cloud Platform -- 3.10 Data Storage and Analysis -- 4 Results and Discussion -- 5 Conclusion -- References -- Cultivating Digital Fields: A Cloud-Centric Blueprint for Stakeholder Engagement in the Indian Agriculture. 1 Introduction -- 2 Literature Review -- 3 Discussions -- 3.1 Assessment and Planning Phase -- 3.2 Cloud Provider Selection and Setup -- 3.3 Automation Framework Development -- 3.4 Application and Service Modernization -- 3.5 Implementation and Deployment -- 3.6 Training and Change Management -- 3.7 Security and Compliance -- 3.8 Monitoring and Optimization -- 3.9 Continuous Improvement -- 3.10 Scaling and Expansion -- 4 Suggestions -- 5 Conclusion -- References -- Determining the Impact of ICT-Based Promotional Initiatives on the Effectiveness of E-Business Using Structural Equation Modeling -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 4 Analysis and Result -- 5 Discussion -- 6 Implication -- 7 Conclusion -- References -- Artificial Intelligence-Based Conversational Agents in the Indian Banking System: An Adoption and Integration Perspective -- 1 Introduction -- 2 Theoretical Background and Hypotheses Development -- 2.1 Theoretical Background -- 2.2 Hypotheses Development -- 3 Methodology -- 3.1 Measures -- 4 Results -- 4.1 Reliability -- 4.2 Convergent Validity -- 4.3 Discriminant Validity -- 4.4 SEM Analysis -- 5 Discussion -- 5.1 Theoretical Implication -- 5.2 Practical Implication -- 6 Conclusion -- References -- Understanding the Dynamics and Interconnectedness of Cryptocurrency and Stock Markets: A Survey -- 1 Introduction -- 2 Methodology -- 3 Stock Market and Cryptocurrencies Relationship -- 3.1 Correlation Between Cryptocurrencies and Stock Market -- 3.2 Causation Between Cryptocurrencies and Stock Market -- 3.3 Stock Market and Cryptocurrency Integration -- 3.4 Stock Market and Cryptocurrency Volatility -- 4 Future Research Directions -- 5 Conclusion -- References -- Sensing Methodologies in Hydroponics for Optimal Growth and Nutrient Monitoring -- 1 Introduction -- 2 Literature Review. 3 Hydroponic Methods and Tools. |
Record Nr. | UNINA-9910857790303321 |
Joshi Amit
![]() |
||
Singapore : , : Springer Singapore Pte. Limited, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information and Communication Technology for Competitive Strategies (ICTCS 2020) : ICT: Applications and Social Interfaces |
Autore | Joshi Amit |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (1128 pages) |
Altri autori (Persone) |
MahmudMufti
RagelRoshan G ThakurNileshsingh V |
Collana | Lecture Notes in Networks and Systems Ser. |
Soggetto genere / forma | Electronic books. |
ISBN | 981-16-0739-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Information and Communication Technology for Competitive Strategies |
Record Nr. | UNINA-9910497107203321 |
Joshi Amit
![]() |
||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Information and Communication Technology for Competitive Strategies (ICTCS 2022) [[electronic resource] ] : ICT: Applications and Social Interfaces / / edited by Amit Joshi, Mufti Mahmud, Roshan G. Ragel |
Autore | Joshi Amit |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (866 pages) |
Disciplina | 621.382 |
Altri autori (Persone) |
MahmudMufti
RagelRoshan G |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Telecommunication
Technology—Sociological aspects Information technology Data protection Artificial intelligence Computational intelligence Communications Engineering, Networks Information and Communication Technologies (ICT) Data and Information Security Artificial Intelligence Computational Intelligence |
Soggetto non controllato |
Sociology
Computer Security Artificial Intelligence Engineering Telecommunication Social Science Computers Technology & Engineering |
ISBN | 981-19-9638-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Optimization Accuracy of Tweets for Coronavirus Pandemic using BERT Based CNN Model -- Deep Learning Neural Networks for Forecasting the Abrasive Wear in machining tools for Cryogenic treatment by process parameter optimization -- Real Time Indian Sign Language Detection -- Measuring Impact of Text Features and Image Features on Classifier’s performance for Heterogeneous data formats -- Time delay approximation effect on open loop performance of a delayed industrial process model -- Enhancement Of The Effective Bandwidth Available To A Client Host In A Network By Using Multiple Network Devices Concurrently -- Enhanced dynamic source routing based on link capacity and queue optimization in MANET (DSR-LQ) -- Statistical Analysis of Feature Selection and Clustering for Building the Optimised Drug Toxicity Prediction Model -- Towards GPU Accelerated Computation for Stock Prediction Based on News Headlines -- A Novel Approach for the Enterprise Hospital Management Application with Full Stack Development -- IoT-Based Platform for Smart Automobile System -- Improving Attitudes of Underrepresented High School Students towards STEM: A Virtual Summer Program -- Diabetic Eye Diseases Detection and Classification Using Deep Learning Techniques - A Survey -- A Review to Analyze Insider Threats Using Machine Learning Techniques -- Machine Learning Model for the Email Spam Detection with Data Mining Techniques -- Statistical Investigation of Smoking Patterns and Smoking Cessation Enthusiasm in Rural Areas of Jaipur -- A Smart Assistive Device for the Blind People -- Implementing Fog Computing Architecture using AWS IoT Greengrass -- Detection of Log4j attack in SDN Environment -- Green marketing and its effects on consumer behavior -- Complementing Malware Epidemic Agent Based Models with Routing Protocols of Communication Networks using NetLogo -- Machine Learning and Deep Learning Methods for the Detection of Schizophrenia using Magnetic Resonance Images and EEG Signals: An Overview of the Recent Advancements. |
Record Nr. | UNINA-9910728952803321 |
Joshi Amit
![]() |
||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|