AI, IoT, Big Data and Cloud Computing for Industry 4.0 / / edited by Amy Neustein, Parikshit N. Mahalle, Prachi Joshi, Gitanjali Rahul Shinde |
Autore | Neustein Amy |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (589 pages) |
Disciplina | 658.40380285 |
Altri autori (Persone) |
MahalleParikshit N
JoshiPrachi ShindeGitanjali Rahul |
Collana | Signals and Communication Technology |
Soggetto topico |
Computational intelligence
Telecommunication Artificial intelligence Computational Intelligence Communications Engineering, Networks Artificial Intelligence |
ISBN | 3-031-29713-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Section 1: Fundamentals of the Industry 4.0 -- Fundamental of IoT -- Architecture of IoT -- Automation -- Big data challenges -- Cloud computing services -- convergence of IoT and cloud computing -- Section 2: Emerging trends in Artificial Intelligence -- Knowledge representation -- Machine learning -- Deep learning -- AI based industry automation -- Section 3: AI based data management, architecture and framework -- Algorithms and techniques for data management and cloud -- Reference architectures -- Frameworks for integrating IoT, ML and Cloud -- Section 4: Software Portability and Virtual Machine Design -- Virtual Machine designs -- VM design and programming-language/compiler theory concerns -- Section 5: Security for industry 4.0 -- Industry 4.0 -- Artificial intelligence -- Machine Learning -- Signal Processing -- Multimedia -- Big data -- Software Portability -- Virtual Machines -- Conclusion. . |
Record Nr. | UNINA-9910736004203321 |
Neustein Amy | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 4 |
Autore | Choudrie Jyoti |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (611 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9766-78-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910903799503321 |
Choudrie Jyoti | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 3 |
Autore | Choudrie Jyoti |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (623 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9766-75-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Risk Analysis for Fall Detection: Exploiting Using GAIT, Part Affinity Field and Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Gait Analysis Using Image Processing -- 2.2 OpenPose: Realtime Multi-person 2D Pose Estimation Using Part Affinity Fields -- 2.3 Fall Detection Based on Key Points of Human-Skelet Using Open Pose -- 3 Methodology -- 3.1 Open Pose -- 3.2 Confidence Maps -- 3.3 Part Affinity Field -- 3.4 Fall Detection -- 4 Conclusion -- References -- Optimizing Content-Based Image Retrieval System Using Convolutional Neural Network Models -- 1 Introduction -- 2 Related Word -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Deep Features Extraction Using ResNet Pre-trained CNN -- 4 Results and Discussion -- 5 Conclusion -- References -- Advancements in Convolutional Neural Networks for Accurate and Efficient Skin Cancer Classification: A Comprehensive Survey -- 1 Introduction -- 2 Related Word -- 3 Why Does Skin Cancer Develop? -- 3.1 Other Types of Skin Cancers -- 4 Input Data -- 5 Proposed Methodology -- 5.1 ML Approaches Used in Skin Cancer Detection -- 5.2 CNN with Deep Learning Methods in Skin Cancer -- 5.3 Transfer Learning (TL) with CNN Architectures -- 5.4 Managerial Implications of the Methodologies -- 6 Conclusions -- References -- DestinAI: Your Personalized Travel Itinerary Planner and Chat Catalyst Using Generative AI -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- Technical and Economic Sustainability of Alternative Livelihood Strategies at the Grassroots: A Case Study in Byse, Karnataka, India -- 1 Introduction -- 1.1 Study Area -- 2 Methodology -- 2.1 Phase 1: Participatory Community and Challenge Understanding -- 2.2 Phase 2: Looking for Solutions.
3 Results -- 3.1 Technical Sustainability Assessment: A User-Centred Approach -- 3.2 Business Sustainability Assessment -- 4 Discussion -- 5 Conclusion -- References -- Comprehensive Certificate Validation and Verification System for Educational Institutes Using Blockchain -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Architecture -- 3.2 Workflow -- 4 Result and Discussion -- 5 Conclusion and Future Scope -- References -- An IOT and Machine Learning-Based System for Detecting Driver Drowsiness -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Design -- 3.2 Dataset -- 3.3 Preprocessing -- 3.4 Feature Extraction -- 3.5 Model Selection -- 3.6 IOT Technology -- 3.7 Jetson Nano -- 4 Result and Feature Work -- 4.1 Result -- 4.2 Feature Work -- 5 Conclusion -- References -- A Survey on Data Preprocessing Techniques in Stream Mining -- 1 Introduction -- 2 Challenges During Preprocessing Stream of Data -- 3 Data Reduction Techniques -- 3.1 Dimensionality Reduction -- 3.2 Instance Reduction Techniques -- 4 Data Cleaning -- 4.1 Imputing Missing Values -- 4.2 Noisy Data Removal -- 5 Data Integration -- 5.1 Extract -- 5.2 Transform -- 5.3 Load -- 6 Data Transformation -- 7 Conclusion -- References -- Data Privacy Attacks on Federated Learning -- 1 Introduction -- 2 Security Vulnerabilities in FL -- 2.1 Model Inversion Attacks -- 2.2 Poisoning Attacks -- 2.3 Data Reconstruction Attacks -- 2.4 Sybil Attacks -- 2.5 Generative Adversarial Network-Based Attacks -- 2.6 Model Stealing Attacks -- 3 Possible Solutions -- 3.1 Differential Privacy -- 3.2 Homomorphic Encryption -- 3.3 Secure Aggregation -- 3.4 Secure Multiparty Computation (SMC) -- 3.5 Attack Detection -- 3.6 Participant Authentication -- 3.7 Regular Auditing -- 4 Analysis of Existing Approach -- 5 Conclusion -- References. Augmented Generalized Quadrature Spatial Modulation (AGQSM): Performance Evaluation in Spatially Correlated Channels for Next-Generation Wireless Communications -- 1 Introduction -- 2 System Model -- 3 Detection Methods -- 4 Findings and Analysis -- 5 Conclusion -- References -- Enhancing Security in a University Network Using Snort and Wireshark -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Proposed Work -- 5 Implementation and Result Analysis -- 6 Conclusion and Future Work -- References -- Social Responsibility of Business Entities in Achieving Sustainability: A CSR Review -- 1 Introduction -- 2 Defining Sustainability -- 3 Noteworthiness of Sustainable Development as a CSR Activity -- 4 Modus Operandi -- 5 Cases Used for the Study -- 5.1 Cummins India Ltd. -- 5.2 DB Corporation Ltd. -- 5.3 Karnataka Bank Ltd. -- 5.4 Century Plyboard India Ltd. -- 5.5 Tata Sponge Iron -- 5.6 Power Finance Corp Ltd. -- 5.7 Bharat Heavy Electrical Ltd. -- 5.8 Amrutanjan Healthcare -- 5.9 Atul Ltd. -- 6 Futuristics Research and Conclusion -- References -- Factors Affecting Digital Shifting of Food Industries Through Food Apps for Business Sustainability: an Empirical Study -- 1 Introduction -- 2 Conceptual Background and Hypothesis Development -- 2.1 TAM Facets -- 2.2 Relation Between ATT and INTFA -- 2.3 TPB Facets -- 2.4 Affordance as Moderator -- 3 Methodology and Results -- 3.1 Data Collection -- 3.2 Common Method Bias -- 3.3 Measurement Model: Reliability and Validity Testing -- 3.4 Structural Model: Hypothesis Testing -- 3.5 Moderation Analysis -- 4 Discussion -- 5 Conclusion -- 6 Theoretical and Managerial Implications -- 7 Study Limitations and Future Scope -- References -- Blockchain Organ Transplant Network with Fitness Check -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Architecture -- 3.2 Smart Contract -- 4 Result -- 5 Conclusion. References -- An Implementation of Monte Carlo Tree Search Algorithm: Comparison with Random Samples -- 1 Introduction -- 2 Monte Carlo Tree Search -- 3 An Overview of Advanced Tic-Tac-Toe -- 4 Implementation -- 5 Results -- 6 Conclusion -- References -- Ur's Corporator-Innovating Citizen Corporator Interaction Through ML-Enabled Comprehensive Framework -- 1 Introduction -- 2 Problem Statement -- 3 Methodology -- 4 Applications -- 5 Literature Review -- 6 System Architecture -- 6.1 Explanation of System Architecture -- 7 Result and Discussion -- 8 Conclusion -- 9 Future Scope -- References -- Research Trends in Technology for Achieving Sustainable Development Goals -- 1 Introduction -- 2 Related Work -- 3 Methods -- 4 Results -- 4.1 Publication and Citation Trends -- 4.2 Impact of Open Access -- 4.3 Fields of Research -- 4.4 Prolific Institutions -- 4.5 Top Funders -- 5 Conclusion -- References -- A Comparative Evaluation of Different Distance Measures for Determining Initial Seeds in the K-means Algorithm -- 1 Introduction -- 2 The QuIK Algorithm -- 3 Some Popular Distance Measures for Numerical Data -- 4 The Novel Distance Function in the QuIK Seeding -- 5 Literature Review -- 6 Methodology -- 7 Experiments and Results -- 8 Conclusion -- References -- Etherdocs: Student Document Management Using Ethereum Blockchain and IPFS -- 1 Introduction -- 2 Problem Statement -- 3 Literature Review -- 3.1 Assumptions -- 3.2 Limitations of Existing Systems -- 4 Methodology -- 4.1 Issuer -- 4.2 Verifier -- 5 Implementation -- 6 Results -- 7 Conclusion -- References -- Beyond Ledgers: Exploring the Impact of Blockchain on Global Supply Chain Networks -- 1 Introduction -- 1.1 Background -- 1.2 Scope and Objectives -- 2 Fundamentals of Blockchain in Supply Chain -- 2.1 Blockchain Architecture -- 2.2 Blockchain in Supply Chain Management. 3 Current Trends and Challenges -- 3.1 Challenges in Traditional Supply Chains -- 3.2 Previous Studies -- 3.3 The Promise of Blockchain Technology -- 3.4 Applications of Blockchain in Supply Chain -- 4 Challenges in Adopting Blockchain in SCM and Preferable Solution -- 5 Future Directions and Research Gaps -- 6 Conclusion -- References -- Farmer-Based Smart Vegetable Vending Machine for the Modern Era -- 1 Introduction -- 2 Background and Related Work -- 3 Research Gap -- 4 Proposed Solution -- References -- Automated Question Generation System Using NLP -- 1 Introduction -- 2 Literature Review -- 2.1 TF-IDF and N-Grammode -- 2.2 RNN Encoder-Decoder -- 2.3 BART -- 2.4 BERT -- 2.5 T-5 -- 3 Implementation -- 3.1 Data Preparation -- 3.2 WorkFlow -- 3.3 Training -- 4 Results -- 5 Conclusion -- References -- Transforming Workspaces: The Convergence of Li-Fi, FTTO, and PoE -- 1 Introduction -- 2 Literature Review -- 2.1 Building Energy Management System: A Review -- 2.2 Seamless Interfacing with Thunderbolt™ 4.0 -- 3 Methodology -- 3.1 Assessment -- 3.2 Technology Selection -- 3.3 System Design -- 3.4 Implementation -- 3.5 Evaluation and Optimization -- 4 Hardware Components -- 4.1 BMS Device with ARM Processor -- 4.2 CCTV -- 4.3 Ethernet Cable (802.3bt) -- 4.4 PoE Switches -- 4.5 Wi-Fi Router -- 4.6 USB Type-C Port -- 4.7 Li-Fi Technology -- 4.8 Split AC -- 4.9 Polycarbonate Sheets -- 4.10 Batteries -- 5 Hardware and Software Architecture -- 5.1 Block Diagram -- 5.2 AutoCAD and REVIT Design -- 6 Conclusion -- References -- Precise AI-Driven Cattle Identification and Classification System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Preparation -- 3.2 Image Validation -- 3.3 Muzzle Point Detection and Extraction -- 3.4 Pattern Extraction and Matching -- 4 Results and Discussions -- 5 Conclusions -- References. Instagram Reels Bites: Factors Influencing Food Customer Engagement and Intention to Purchase Food Through Instagram Reels. |
Record Nr. | UNINA-9910900178903321 |
Choudrie Jyoti | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT for Intelligent Systems : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
Autore | Choudrie Jyoti |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (524 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Smart Innovation, Systems and Technologies |
Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
ISBN | 981-9939-82-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intrusion Detection Model for IoT Networks using Graph Convolution Networks(GCN) -- Drowsiness Detection System -- A Deep Learning Technique to Recommend Music based on Facial and Speech Emotions -- Smart Chair Posture Detection and Correction Using IOT -- The Opinions Imparted On Singular’s Face. |
Record Nr. | UNINA-9910746086103321 |
Choudrie Jyoti | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT with Intelligent Applications : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
Autore | Choudrie Jyoti |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (647 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
ISBN | 981-9937-58-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Monitoring Algorithm for Datafication and Information Control for Data Optimization -- 1 Introduction -- 1.1 Datafication -- 1.2 Information Control -- 2 Literature Review -- 3 Datafication and Information Control -- 4 Algorithm for Datafication and Information Control -- 5 Conclusion -- References -- Understanding Customer Perception Regarding Branded Fuel 'XP-95' in IOCL Retail Outlets Using Business Intelligence (BI) by the Help of NVIVO and SPSS Software -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 3.1 Qualitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 3.2 Quantitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 4 Discussion and Findings -- 5 Conclusion -- References -- Investigation of Aadhaar Card Enrolment in Government Schools Using R -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Steps Involved in the Data Analysis -- 3.2 Data Preprocessing -- 4 Results and Discussion -- 4.1 Data Collection -- 4.2 Data Analysis -- 4.3 Correlation and Regression Line -- 4.4 Line Graph -- 4.5 Comparison of Aadhaar Enrolment -- 5 Conclusion -- References -- Automated Spurious Product Review Auditing System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Signed Interface Algorithm Working -- 4 Result and Analysis -- 5 Conclusion -- References -- A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloud/Fog Computing -- 1 Introduction -- 1.1 Cloud Computing -- 1.2 Fog Computing -- 1.3 Internet of Things (IoT) -- 2 Background -- 2.1 Rivest-Shamir-Adleman Algorithm (RSA) -- 2.2 Elliptical Curve Cryptography Algorithm (ECC) -- 2.3 ECC Standardization Process -- 3 Comparison of ECC and RSA Algorithm -- 4 Conclusion -- References.
Data Prevention Protocol for Cloud Computing Security Using Blockchain Technology -- 1 Introduction -- 2 Block-Chain Technology -- 3 Structure of Block-Chain -- 4 Features of Block-Chain System -- 5 Challenges -- 6 Secure Solution for Cloud -- 7 Requirements of Cloud -- 8 Solutions for Cloud Data Security Based on Block-Chain Technology -- 9 Examples of Cloud Data Security Based Block-Chain Technology -- 9.1 Secure Cloud Data Privacy -- 9.2 Cloud Data Unity -- 9.3 Cloud Data Detectability -- 10 Review Outcomes and Research Gap -- 11 Conclusions -- References -- Intelligence Monitoring of Home Security -- 1 Introduction -- 2 Proposed Device -- 3 Components Specifications -- 4 Future Scope -- References -- TB Bacteria and WBC Detection from ZN-Stained Sputum Smear Images Using Object Detection Model -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 TB Bacteria Detection Using RetinaNet Object Detection Model -- 2.3 Implementation Details -- 2.4 Comparison with Other Object Detection Model -- 2.5 Performance Metrics -- 3 Result and Discussion -- 4 Conclusion -- References -- AuraCodes: Barcodes in the Aural Band -- 1 Introduction -- 2 Technical Analysis -- 2.1 Components of the EAN13 Barcode -- 2.2 Components of the QR Code -- 3 Proposition -- 4 Implementation -- 5 Experimental Results -- 6 Future Work -- 7 Conclusion -- References -- A Scrutiny and Investigation on Student Response System to Assess the Rating on Profuse Dataset-An Aerial View -- 1 Introduction -- 2 Literature Survey -- 3 Motivation and Background Study -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization -- 3.4 Stemming -- 3.5 Future Selection -- 3.6 Classification -- 3.7 Evaluation -- 3.8 Visualization -- 4 Dataset -- 5 Observations and Analysis -- 6 Results and Discussions -- 7 Conclusions -- References. Analysis of Hospital Patient Data Using Computational Models -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Creation -- 3.2 Data Preprocessing -- 3.3 Model Building -- 3.4 Evaluation -- 3.5 Clustering -- 4 Results -- 4.1 Elbow Method -- 4.2 Silhouette Analysis -- 5 Conclusion -- References -- A Research on the Impact of Big Data Analytics on the Telecommunications Sector -- 1 Introduction -- 2 Trends in the Implementation of Big Data Analytics in the Telecom Industry -- 3 Regional Insight -- 4 Challenges of the Telecommunication Industry -- 4.1 Operation-Related Costs -- 4.2 Needs for Consumers -- 4.3 Information Security and Breaches -- 4.4 Collaboration -- 4.5 High-Speed Data-in-Motion -- 4.6 Support for Application and Network Intelligence -- 4.7 Real-Time Actionable Insights -- 5 Telecommunication Industry, Big Data Analytics, and Customer Services -- 6 Conclusion -- References -- Face Mask Isolation Canister Design for Healthcare Sector Towards Preventive Approach -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Gap Analysis -- 5 Proposed Design -- 6 Working -- 7 Applications -- 8 Future Scope -- 9 Conclusion -- References -- Modeling the Impact of Access to Finance on MSMEs' Contribution Towards Exports of the Economy -- 1 Introduction -- 2 Reviews of Related Literatures -- 3 Objectives of the Research -- 4 Methodology of the Study -- 5 Linear Regression Model -- 6 Analysis of Data and Discussion -- 6.1 Export Contribution of Indian MSME Sector -- 6.2 Regression Analysis and Their Interpretation -- 7 Scope for Future Research -- 8 Conclusion and Recommendations -- References -- Privacy Challenges and Solutions in Implementing Searchable Encryption for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 2.1 Proxy Re-encryption with and without Keyword Search -- 3 Conclusion -- References. Multi-objective Optimization with Practical Constraints Using AALOA -- 1 Introduction -- 2 Problem Formulation -- 2.1 Objective Functions -- 2.2 Constraints -- 3 Proposed Algorithm -- 4 Multi-objective Optimization Strategies -- 4.1 Non-dominated Sorting -- 4.2 Archive Selection -- 4.3 Fuzzy Approach -- 5 Results and Analysis -- 5.1 Example-1: Benchmark Test Functions -- 5.2 Example-2: Electrical Test System -- 6 Conclusion -- References -- An Implementation of Lightweight Cryptographic Algorithm for IOT Healthcare System -- 1 Introduction -- 2 Methodology -- 2.1 Materials -- 2.2 Proposed Architecture -- 3 Experimental Setup and Results -- 3.1 Performance Evaluation -- 4 Discussions -- 5 Conclusions and Future Work -- References -- Home Appliances Automation Using IPv6 Transmission Over BLE -- 1 Introduction -- 2 Work Flow -- 3 Proposed Algorithm -- 4 Initial Setup and Plateform -- 5 Experimental Setup for Connect Raspberry BLE with Mobile nRF Connect App -- 6 Experimental Results -- 7 Conclusion -- References -- IoT Based Collision Avoidance System with the Case Study Using IR Sensor for Vehicles -- 1 Introduction -- 1.1 Types of Collision Avoidance Assist Systems -- 2 Literature Review -- 3 Motivation -- 4 Methodology -- 4.1 Arduino Uno -- 4.2 Ultrasonic Sensors -- 4.3 Motor Driver -- 5 Result and Discussion -- 6 Conclusion and Future Work -- References -- Airline Ticket Price Forecasting Using Time Series Model -- 1 Introduction -- 2 Related Work -- 3 Background of the Work -- 4 Proposed Work -- 4.1 Important Packages -- 4.2 Dataset Collection -- 4.3 Building Model -- 5 Flask Python Web Framework -- 6 Experimental Results -- 6.1 Accuracy -- 7 Conclusion -- References -- AI Powered Authentication for Smart Home Security-A Survey -- 1 Introduction -- 2 Related Work -- 3 Face Recognition Technologies -- 3.1 Appearance-Based Methods. 3.2 Single-Shot Methods -- 3.3 Multi-shot Methods -- 3.4 Rgbd-Based Approaches -- 4 Proposed Methodologies -- 4.1 Grassman Algorithm -- 4.2 Convolutional Neural Network Algorithm -- 4.3 Limitations -- 4.4 Future Works -- 5 Conclusion -- References -- WSRR: Weighted Rank-Relevance Sampling for Dense Text Retrieval -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Experiments and Results -- 5 Conclusions -- References -- Tweet Based Sentiment Analysis for Stock Price Prediction -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 System Architecture -- 3.2 Module Descrption -- 3.3 Data Processing: Data Training -- 3.4 Model Training -- 4 Implementation -- 4.1 CEA Algorithm -- 5 Result and Analysis -- 6 Conclusion and Future Work -- References -- A Study on the Stock Market Trend Predictions -- 1 Introduction -- 2 Background -- 2.1 Research Mainly Based on Technical Analysis -- 2.2 Research Mainly Based on Sentiment Analysis -- 3 Conclusion -- References -- Optimization of Partial Products in Modified Booth Multiplier -- 1 Introduction -- 2 Booth's Algorithm -- 3 Modified Booth's Algorithm -- 4 Optimized Booth's Multiplier (OBM) -- 4.1 Proposed Algorithm to Reduce Partial Products -- 4.2 16 × 16 Multiplication Using OBM -- 5 Results and Discussion -- 5.1 FPGA Device Utilization -- 5.2 Simulation Results -- 6 Conclusion -- References -- Comparative Study on Text-to-Image Synthesis Using GANs -- 1 Introduction -- 2 Literature Review -- 2.1 Cycle-Consistent Inverse GAN for Text-to-Image Synthesis -- 2.2 Dynamic Aspect-Aware GAN for Text-to-Image Synthesis -- 2.3 Cycle Text-to-Image GAN with BERT -- 3 Conclusion -- References -- Online Hate Speech Identification Using Fine-tuned ALBERT -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Experiment -- 4.1 Training Details of ALBERT Base Version 2. 4.2 Fine-Tuned ALBERT. |
Record Nr. | UNINA-9910746286703321 |
Choudrie Jyoti | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT with Intelligent Applications : Proceedings of ICTIS 2021, Volume 1 |
Autore | Senjyu Tomonobu |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2022 |
Descrizione fisica | 1 online resource (802 pages) |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Smart Innovation, Systems and Technologies Ser. |
Soggetto genere / forma | Electronic books. |
ISBN |
9789811641770
9789811641763 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910512167403321 |
Senjyu Tomonobu | ||
Singapore : , : Springer Singapore Pte. Limited, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information and Communication Technology for Competitive Strategies [[electronic resource] ] : Proceedings of Third International Conference on ICTCS 2017 / / edited by Simon Fong, Shyam Akashe, Parikshit N. Mahalle |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (769 pages) |
Disciplina | 004 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Telecommunication
Data mining Engineering Communications Engineering, Networks Data Mining and Knowledge Discovery Computational Intelligence |
ISBN | 981-13-0586-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Multi-Layer Visual Cryptography with Soft Computing Approach for Authentication -- Knowledge Management Systems leveraging the competitive advantage of top IT organizations: A Multi-case study of Benchmarking Practices -- Performance Analysis of Parallel Implementation of Morphological Operations -- US Dollar’s Influence on Indian Gold price Assessment using Artificial Neural Network -- Attribute based storage mechanism with de-duplication filter: A Review Paper -- Review and Analysis of Simulation Results for Consumer Attack Model and Grid Sensor Placement Algorithm -- An Approach to Analyze Behaviour of Network Events in NS2 & NS3 using AWK & Xgraph -- Hybrid Latent Semantic Analysis and Random Indexing Model for Text Summarization -- Digitization of Disaster Management: A Multimedia Ontological Approach -- Prevalent Study of Cooperative Biometric Identification System Using Multimodal Biometrics -- Most Persistent Feature Selection method for Opinion mining of social media reviews -- Physical Layer Security with Energy Harvesting Techniques: A Study -- One-tip Secure: Nex-Gen of Text Based Password -- New Text Based User Authentication Scheme Using CAPTCHA -- FPGA Implementation of Parallel Transformative Approach in AES Algorithm -- An Approach to Wireless Sensor Networks for Healthcare Scrutiny in Hospitals -- Foetal Heart Beat and Volume Detection using Spherical Harmonics Shape Model for Level Set Segmentation -- An Efficient approach for Clustering US census data based on Cluster similarity using Rough Entropy on Categorical Data -- Age classification with LPCC features using SVM and ANN -- Existing and Relevant Methodologies for Energy Efficient Cloud Data centers -- An Enhanced Scheme for PHR on Cloud Servers Using CP-ABE -- Decision Tree Algorithms for prediction of Heart Diseases -- Green communication for wireless cooperative networks: A survey -- Instance Selection using Multi-objective CHC Evolutionary Algorithm -- Inclusive device to connect people with the surrounding World -- Profiling based Effective Resource Utilization in Cloud Environment using Divide and Conquer Method -- Algorithmic approach for error-correcting capability and decoding of linear codes arising from Algebraic Geometry -- Periocular Region Based Biometric Identification Using Local Binary Pattern and Its Variants -- Hand Geometry and Palmprint Based Biometric System with Image Deblurring -- A Low Power, High Swing and Robust Folded Cascode Amplifier at Deep Submicron Technology -- Syllable Based Concatenative Speech Synthesis for Marathi Language -- Inverted U-Shape Monopole Antenna with Notch Band Characteristics for UWB Communication Applications -- A Distance-Based Outlier Detection using Particle Swarm Optimization Technique -- Fast and Memory Leak Free Verication for Bridge Transitions in VLSI designs -- Privacy Preserving K-NN Classification Using Vector Operations -- A Comparative Study on Segmentation Techniques for Brain Tumor MRI -- Integrating Concentrating Solar Plant based System in Multi Area AGC using LabVIEW -- Maximal Stable Extremal Region Extraction of MRI Tumor Images using Successive Otsu Algorithm -- Synthesis of Reversible Array Divider Circuit -- Finding Right Doctors and Hospitals: A Personalized Health Recommender -- An Improved Hybrid Offset Based Min-Sum Decoding Algorithm -- Simulation of Phasor Measurement Unit for Research and Teaching Applications -- Maximum Network Flow Aware Multi-Lightpath Survivable Routing in WDM Networks -- Various Machine Learning Algorithms for Twitter Sentiment Analysis. |
Record Nr. | UNINA-9910350286603321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Internet of Things integrated augmented reality / / Gitanjali Rahul Shinde [et al.] |
Autore | Shinde Gitanjali Rahul <1983-> |
Edizione | [1st edition 2021.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (xiii, 78 pages) : color illustrations |
Disciplina | 004.678 |
Collana | SpringerBriefs in Computational Intelligence |
Soggetto topico |
Artificial intelligence
Augmented reality Computer vision Internet of things Machine learning |
ISBN | 981-15-6374-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- IoT Overview -- Emerging Trends in IoT -- IoT Use Cases -- Energy and Utilities -- Context Management in IoT -- Context and Context Management -- Context-aware Architecture -- Augmented Reality and IoT -- Augmented Reality and IoT design Issues -- Augmented Reality and IoT enabled Architecture -- Conclusions. |
Record Nr. | UNINA-9910483751903321 |
Shinde Gitanjali Rahul <1983-> | ||
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IOT with Smart Systems : ICTIS 2023, Volume 2 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
Autore | Choudrie Jyoti |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (660 pages) |
Disciplina | 004 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
ISBN | 981-9937-61-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface ICTIS 2023 -- Contents -- Editors and Contributors -- The Current State of Art-Indian Unleavened Flat Bread Cooking -- 1 Introduction -- 2 Survey of Existing Methods of Chapati and Other Foods Cooking with New Techniques -- 3 Material and Methods of Dough Preparation, Chapati Making -- 4 Challenges and Future Scope -- 5 Database and Software/hardware Tools -- 6 Conclusion -- References -- An Efficient Abstractive Summarization of Research Articles Using Pegasus Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 5 Conclusions and Future Enhancements -- References -- Performance Analysis of Classification Techniques in Heart Disease Prediction -- 1 Introduction -- 2 Related Work -- 3 Implementation Details -- 3.1 Dataset Information -- 3.2 Classification Methods -- 4 Experimental Results -- 4.1 Correlation Results -- 4.2 Performance Analysis -- 5 Conclusion -- References -- Early Phase Identification and Detection for Plant Poor Growth in Rural Areas: A Survey of the State of the Art -- 1 Introduction -- 2 Related Work -- 3 Issues and Challenges -- 4 Proposed Work -- 4.1 Parametric Evaluation of Related Work -- 5 Methodology Enriching Datasets -- 5.1 RoCoLe Dataset -- 5.2 BRACOL Dataset -- 5.3 Rice Leaf Blight Dataset Rice Leaf Blight Dataset -- 5.4 Plant Pathology Dataset Plant Pathology Dataset -- 5.5 Citrus Dataset -- 6 Conclusion -- 7 Discussion -- References -- Pothole Detection and Road Condition Updation on Google Maps -- 1 Introduction -- 2 System Design -- 2.1 Pothole Detection -- 2.2 Vehicle Tracking -- 2.3 Updating the Database -- 2.4 Rendering Database on Google Maps -- 3 Implementation -- 3.1 Training Phase -- 3.2 Server-Side -- 3.3 Client-Side -- 3.4 Algorithm -- 3.5 Flowchart -- 4 Result and Analysis -- 5 Conclusion -- References.
Fetal Cardiac Detection Using Deep Learning from Echocardiographic Image-A Survey -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Methods for Cardiographic Image Analysis -- 4 Deep Learning Framework for Disease Prediction -- 5 Experimental Results -- 6 Conclusion -- References -- Analysing the Factor Influencing Post COVID-19 Experience Through User-Generated Content: Luxury Hotel in India -- 1 Introduction -- 2 Literature Review -- 3 System Description -- 3.1 Data Pre-processing -- 3.2 Sentiment Analysis -- 3.3 Theme Identification -- 4 Methodology -- 5 Analysing the Theme -- 6 Result -- 6.1 Positive Sentiments -- 6.2 Negative Sentiments -- 7 Conclusion -- References -- Text Detection and Recognition from the Scene Images Using RCNN and EasyOCR -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Text Detection -- 3.2 Text Recognition -- 4 Experimentation and Results -- 4.1 Datasets -- 4.2 Implementation Details -- 4.3 Result Analysis -- 5 Conclusion -- References -- The Important Role of Industry Data Connectivity Using M2M and IoT Applications for Processing and Analysis -- 1 Introduction -- 2 Devices to Networks and Platforms -- 2.1 Data Collection -- 2.2 Data Communication -- 3 Strengthen the Data Management Platform -- 3.1 Centralized Device Management -- 3.2 High-Performance Data Management -- 3.3 Enhanced Administration and Security -- 3.4 Flexible Application Development -- 4 Data Transfer with MQTT -- 4.1 Topic and Quality of Service (QoS) -- 4.2 Results -- 5 Discussion -- 6 Conclusion -- 7 Future Study -- References -- Classification of Non-proliferative Diabetic Retinopathy in Terms of Dark and Bright Lesions Using Multi-layered Perceptron (MLP) -- 1 Introduction -- 2 Methodology -- 2.1 Separation of Mask from Fundus -- 2.2 Removal of Optic Disc -- 2.3 Extraction of Retinal Blood Vessels -- 2.4 Microaneurysms. 2.5 Hemorrhages -- 2.6 Exudates -- 2.7 Cotton Wool Spots -- 3 Result -- 4 Conclusion -- References -- An Efficient Saliency Detection Using Wavelet Fusion -- 1 Introduction -- 1.1 Related Work -- 2 Proposed Methodology -- 2.1 Haar Wavelet Transform for Edge Enhancement and Noise Removal -- 2.2 Edge (Curve) Detection -- 2.3 Convolutional Neural Networks CNN -- 3 Experimental Results -- 4 Conclusion -- References -- Segmentation of Brain Tumor Images Using Morphological Reconstruction -- 1 Introduction -- 2 Literature Review -- 3 Existing System -- 3.1 Pre-processing -- 3.2 Skull Stripping -- 3.3 Segmentation -- 4 Proposed Model -- 4.1 Input -- 4.2 Gray Scaling of Images Using OpenCV -- 4.3 Thresholding -- 4.4 Watershed Algorithm for Image Segmentation -- 4.5 Compute Morphological Operations -- 5 Implementation and Results -- 6 Conclusion -- 7 Future Scope -- References -- Navigation Planning for Efficient Area Covering for Surface Cleaning -- 1 Introduction -- 2 Proposed Method -- 2.1 Deadlock Detection and Escaping -- 2.2 Task of Environment Modeling -- 3 Empirical Analysis -- 3.1 Performance Parameter -- 3.2 Implementation -- 3.3 Tested in an Unknown Environment -- 4 Results -- 5 Conclusion -- References -- Pathfinding Visualizer: A Survey of the State-of-Art -- 1 Introduction -- 1.1 Pathfinding Algorithms and Visualizer Overview -- 2 Literature Review -- 2.1 Overview of Existing Pathfinding Visualizers -- 2.2 Visualizing Pathfinding Algorithms: Importance of Visual AI& -- DS in Learning -- 3 Pathfinding Visualizer -- 3.1 Understanding the Pathfinding Visualizer -- 3.2 Design of the Pathfinding Visualizer -- 3.3 Implementation Details, Including Programming Languages and Tools Used -- 4 Results -- 4.1 Details on the Implementation and Functionality of Algorithms in the Pathfinding Visualizer -- 5 Discussion. 5.1 Discussion on How the Visualizer Contributes to a Better Understanding of Pathfinding Algorithms -- 6 Conclusion -- 7 Future Work -- Bibliography -- A Study on Cyber Security and its Challenges in India -- 1 Introduction -- 2 Literature Review -- 3 Background -- 4 Proposing Guidelines for Cyber Safe India -- 4.1 Need for a Correct Legal Framework in Order to Remove Ambiguities from Data Protection Laws -- 4.2 Changes in Current 2013 Cyber Security Policy -- 5 Need for Cyber Security Education in School -- 6 Current Scenario of Cyber Security in India -- 7 Conclusion -- References -- Implementation of AES Algorithm -- 1 Introduction -- 2 Block Diagram -- 2.1 Encryption Process -- 2.2 FPGA Implementation -- 3 Methodology -- 3.1 Byte Substitution -- 3.2 Shiftrows -- 3.3 MixColumns -- 3.4 Add Round Keys -- 3.5 Inverse Subbytes -- 4 Implementation of AES on FPGA -- 5 Results -- 5.1 AES Encryption and Decryption Xilinx Simulated Results -- 5.2 AES Encryption Results on FPGA -- 6 Conclusion -- References -- Feature Extractor Techniques for Alzheimer's Predictive Model in Brain Imaging -- 1 Introduction -- 2 Related Work -- 3 Experimental Framework -- 4 Observations and Results -- 5 Conclusions and Future Research -- References -- User Preference Recommendation System and Analytics for News Articles -- 1 Introduction -- 2 Overview -- 2.1 Problem Statement -- 2.2 Objectives -- 3 Literature Survey -- 4 Recommendation Systems -- 4.1 Content-Based Filtering -- 4.2 Collaborative Filtering -- 4.3 Hybrid Approach -- 5 Proposed Design -- 5.1 Introduction -- 5.2 Flow of the System -- 6 System Implementation -- 6.1 Data Generation -- 6.2 Model Formation -- 6.3 Visualisation -- 7 Result -- 8 Conclusion and Future Work -- References -- Design and Development of Focus Controller for the 50/80 cm ARIES Schmidt Telescope -- 1 Introduction -- 2 Focus Mechanism. 3 Embedded Controller -- 3.1 Motion Control -- 3.2 Telemetry -- 3.3 Firmware -- 3.4 Operation -- 4 GUI Software -- 4.1 Software Architecture -- 4.2 Setup Dialog Box -- 4.3 Focus Dialog Box -- 5 System Performance -- 6 Conclusion -- References -- Predicting Fishing Effort: Data Collection for Machine Learning Model Using Scientific and Indigenous Method -- 1 Introduction -- 2 Methods -- 2.1 Azure Machine Learning -- 3 Datasets -- 3.1 Area -- 3.2 Types of Data -- 4 Data Pre-processing -- 5 Model Selection and Parameter Tuning -- 6 Result -- 7 Conclusions -- References -- A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 3 Existing Method -- 4 Proposed Method -- 4.1 Algorithm -- 5 Testing Results -- 6 Conclusion -- References -- Model Design to Analyse Coronary Artery Disease Using Machine Learning Techniques (MDACADMLT) -- 1 Introduction -- 2 Literature Review -- 3 System Model -- 3.1 Logistic Regression -- 3.2 K-Nearest Neighbor -- 3.3 Support Vector Machine -- 3.4 Naïve Bayes -- 3.5 Decision Tree -- 3.6 Random Forest -- 4 Experimental Results -- 5 Conclusion -- References -- Impact of Geo-positioning Information in Limiting Forest Fire Damage -- 1 Overview of the Forest Fire Damage Around the World -- 2 A Rapidly Expanding Area of Research -- 3 Early Detection Forest Fire Systems Design -- 4 Simulation and Results -- 5 Conclusion -- References -- Automatic Music Melody Generation Using LSTM and Markov Chain Model -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Long Short-Term Memory (LSTM) -- 3.2 Markov Chain Model -- 4 Mathematical Model -- 4.1 Long Short-Term Memory (LSTM) -- 4.2 Markov Chain Model -- 5 Results and Discussion -- 5.1 Long Short-Term Memory (LSTM) -- 5.2 Markov Chain Model -- 6 Limitations -- 7 Future Scope -- 8 Conclusion -- References. Federated Learning Approaches to Diverse Machine Learning Model: A Review. |
Record Nr. | UNINA-9910743689003321 |
Choudrie Jyoti | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Quality of Work-Life During Pandemic : Data Analysis and Mathematical Modeling |
Autore | Shinde Gitanjali Rahul |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (127 pages) |
Altri autori (Persone) |
MajumderSoumi
BhapkarHaribhau R MahalleParikshit N |
Collana | Studies in Big Data Ser. |
Soggetto genere / forma | Electronic books. |
ISBN |
9789811675232
9789811675225 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910510534403321 |
Shinde Gitanjali Rahul | ||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|