top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advanced techniques for IoT applications : proceedings of EAIT 2020 ; Kalyani, India, November 2020 / / editors, Jyotsna Kumar Mandal, Debashis De
Advanced techniques for IoT applications : proceedings of EAIT 2020 ; Kalyani, India, November 2020 / / editors, Jyotsna Kumar Mandal, Debashis De
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (626 pages) : illustrations (some color)
Disciplina 004
Collana Lecture Notes in Networks and Systems
Soggetto topico Internet of things
Electronic data processing
ISBN 981-16-4435-7
981-16-4434-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910743265503321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applications of networks, sensors and autonomous systems analytics : proceedings of ICANSAA 2020 / / edited by Jyotsna Kumar Mandal [and three others]
Applications of networks, sensors and autonomous systems analytics : proceedings of ICANSAA 2020 / / edited by Jyotsna Kumar Mandal [and three others]
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (363 pages)
Disciplina 621.39
Collana Studies in Autonomic, Data-Driven and Industrial Computing
Soggetto topico Microelectromechanical systems
Sensor networks
ISBN 981-16-7304-7
981-16-7305-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- 1 Application of IoT in Industries: A Survey of Security Concern -- 1 Introduction -- 1.1 Background -- 1.2 Architecture of IoT -- 2 Security Threats in IoT -- 2.1 Security Threats in Sensing Layer -- 2.2 Security Threats in Network Layer -- 2.3 Security Threats in Service Layer -- 2.4 Security Threats in Interface Layer -- 3 Conclusion -- References -- 2 A Survey on Autonomous Vehicles in the Field of Intelligent Transport System -- 1 Introduction -- 2 Domains of Interaction between Autonomous Vehicles and Humans -- 3 Analysis of Using Electronic Gadgets by Pedestrians and Drivers on Roads -- 4 Approaches for Collision Prevention in Autonomous Vehicle Technology Used in Intelligent Transports System -- 5 Context-Based Pedestrian Path Prediction -- 6 Hand, Eye, and Head Patterns at Intersections -- 7 Conclusion -- References -- 3 Decentralized Voting: A Blockchain-Based Voting System -- 1 Introduction -- 1.1 Decentralized Computing Systems -- 1.2 Blockchain -- 1.3 Ethereum -- 1.4 Smart Contacts -- 1.5 Digital Identity Management Using Blockchain-An Approach Towards Self Sovereign Identity -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Flow of User Registration in Decentralized Voting App -- 3.2 Flow of Admin/Electoral Admin in Decentralized Voting App -- 3.3 Candidate Voting in Decentralized Voting App -- 4 Result Analysis -- 5 Conclusions -- 6 Related Works -- References -- 4 Asymptotic Behaviour for First-Order Difference Equations I -- 1 Introduction -- 2 Sufficient Conditions for Oscillation -- References -- 5 Development of a Framework for Smart Energy Meter Reader Using Image Processing -- 1 Introduction -- 2 Literature Survey -- 3 Architectural Framework -- 4 Description -- 4.1 The Algorithm in the Digit Recognition System -- 5 Implementation and Output -- 6 Conclusion.
References -- 6 Real-Time Air Quality Monitoring System Based on IoT -- 1 Introduction -- 2 Methodology -- 2.1 Hardware Components -- 2.2 Workflow Diagram -- 3 Working Principle -- 4 Result and Discussion -- 5 Conclusion -- 6 Future Scope -- References -- 7 A Comparative Analysis of Sensor-Based Pipe Crack Detection System -- 1 Introduction -- 2 Sensor-Based Methods of Crack Detection -- 3 Comparative Discussion of Various Crack Detection Methods -- 4 Conclusion -- References -- 8 A Two Layer Dynamic Load Balancing Algorithm Applied in Cloud Computing -- 1 Introduction -- 1.1 Cloud Computing -- 1.2 Load Balancing -- 2 Proposed Model -- 3 Result Analysis and Discussion -- References -- 9 Brief Study on the Usage of Smart Meter and Artificial Intelligence in Energy Savings -- 1 Introduction -- 2 Methodology -- 3 Result -- 4 Theoretical Deductions and Discussion -- 5 Conclusion -- References -- 10 Application of Blockchain in Healthcare Especially to Fight Against COVID-19-A Survey -- 1 Introduction -- 1.1 What is COVID-19? -- 1.2 Mechanism of Fast Affecting Peoples all Over the World -- 1.3 What is Blockchain Technology? [3] -- 2 What are the Involvements of Blockchain Technology in Healthcare [4] -- 2.1 Management of Medical Information -- 2.2 Evolution in the Medicine-Industry -- 2.3 Medical Tribunals -- 2.4 Safety of Information -- 2.5 Main Challenges of the Pandemic -- 3 Influence of Blockchain Technology in Stopping the COVID-19 [8-10] -- 3.1 Tracing in Spreading of Communicable Illnesses -- 3.2 Contributions Tracing -- 3.3 Crisis Management -- 3.4 Securing Medical Supply Chains -- 3.5 Sharing of Data -- 4 Blockchain Technology Adopted by the World Health Organization and Other Popular Companies to Compete with this Pandemic [1] -- 5 Conclusion -- References -- 11 A Novel Approach to Microgrid Fault Detection Using Empirical Mode Decomposition.
1 Introduction -- 1.1 Background -- 1.2 Microgrid System -- 1.3 Power System Faults -- 2 Literature Survey -- 3 Architecture of the Proposed Fault Diagnosis Approach -- 3.1 Process -- 4 Results -- 5 Conclusion -- References -- 12 Approximate computing: Error Tolerant Adder -- 1 Introduction -- 2 Brief Overview on Error Tolerant -- 3 Block Diagram -- 4 Functional Operation -- 5 Mathematical Deduction -- 6 Calculation of Accurate Section -- 7 Calculation of Inaccurate Section -- 8 Traditional Computing -- 9 Comparison and Selection -- 10 Advantages of Approximate Computing -- 11 Conclusion -- References -- 13 A Low-Latency Scheme Using Real-Time Constraints for V2V Communication in VANET -- 1 Introduction -- 2 Literature Survey -- 3 Present Work -- 3.1 Message Format -- 3.2 Generator Function -- 3.3 Checking Function -- 3.4 Message Interpreter -- 4 Conclusion -- References -- 14 Loopbeat-A Novel Technical Approach to Enhance the Home Automation Ability of a NodeMCU Using Demultiplexer ICs and 555 Timer ICs with Cloud-Based Remote Access -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Cloud Implementation -- 3.2 Software Implementation -- 3.3 Hardware Implementation -- 4 Results and Discussions -- 5 Conclusions -- References -- 15 Prediction of Stock Price Using Machine Learning -- 1 Introduction -- 2 Related Works -- 2.1 Background Study -- 2.2 Brief Description of Used Algorithm -- 3 Literature Review -- 4 Process Involved -- 5 Result Analysis -- 5.1 Visualizing Data -- 5.2 Forecasting Result by Each algorithm -- 5.3 Obtained Accuracy by Each Algorithm -- 6 Conclusions -- 7 Future Scope -- References -- 16 Encryption and Error Control in Satellite Images Using Linear Block Code -- 1 Introduction -- 2 Methodology -- 3 Result -- 4 Conclusion -- References -- 17 A Fundamental Review on Hyperspectral Segmentation Algorithms.
1 Introduction -- 2 Remote Sensing in Digital Image Processing -- 3 Segmentation in Hyperspectral Images -- 4 Conclusion -- References -- 18 A Decision Support System for Big Data Analytics Integrated Internet of Things-Based Condition Monitoring System of Transformers Fleet -- 1 Introduction -- 2 Materials and Methods -- 2.1 Data Reduction -- 2.2 Weight Assessment of Attributes -- 2.3 Score Aggregation and Ranking of Attributes -- 2.4 Centrality Estimators -- 2.5 Data Pre-Processing -- 3 Proposed Framework -- 3.1 IoT-BDA-Based CMS Architecture -- 3.2 MCDM Aggregation Engine -- 4 Implementation and Results -- 4.1 Data Pre-Processing -- 4.2 Data Reduction -- 4.3 Weight Assessment -- 4.4 Aggregation of Scores -- 4.5 Fusion of Scores and Ranking -- 5 Conclusion -- References -- 19 A Machine Learning Approach to Predict Disease for Accurate Diagnosis -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Feature Engineering and Data Visualisation -- 3.3 k-NN Used for Classification -- 4 Result and Discussion -- 5 Conclusion -- References -- 20 Rotogravure Printing Band Analysis with the Help of Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology and Implementation -- 4 Result and Discussions -- 5 Conclusions -- References -- 21 Remote Health Support for a Person with Probable High Risk of COVID-19 Under Machine Learning Framework -- 1 Introduction -- 2 Proposed Model -- 3 Result Analysis and Discussion -- 4 Conclusion -- References -- 22 Credit Card Fraud Detection Using Soft Computing -- 1 Materials and Methods -- 2 Experiment -- 3 Results and Analysis -- 4 Conclusion -- References -- 23 Deep Learning-Based Approach Using Word and Character Embedding for Named Entity Recognition from Hindi-English Tweets -- 1 Introduction -- 2 Background and Related Work -- 3 Proposed Approach.
3.1 Training Phase -- 3.2 Testing Phase -- 4 Dataset and Experimental Results -- 5 Result Analysis and Comparison -- 6 Conclusion -- References -- 24 A Survey on COVID-19 Case Analysis Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Comparative Analysis -- 4 Analysis on COVID-19 Patient -- 5 Conclusion -- References -- 25 An Intelligent Approach for Detecting COVID-19 Probability -- 1 Introduction -- 2 Background Study -- 3 Methodology -- 4 Result and Analysis -- 5 Conclusion -- References -- 26 Fuzzy Model for Evaluating Water Quality of Ganga During Durga Puja -- 1 Introduction -- 2 Study Area -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusions -- References -- 27 Vehicle License Plate Image Preprocessing Strategy Under Fog/Hazy Weather Conditions -- 1 Introduction -- 2 Proposed Preprocessing Technique -- 2.1 Description -- 3 Validation -- 4 Conclusions -- 5 Future Works -- References -- 28 Performance Analysis of Hetero-Junction Dielectric TFETs -- 1 Introduction -- 2 Methodology -- 3 Results and Discussions -- 4 Conclusion -- References -- 29 Thermal Entanglement of a Spin-1/2 Transverse Ising Model-Heisenberg Model on a Balanced DNA Helix -- 1 Introduction -- 2 Theoretical Background -- References -- 30 PID Control Parameter Tuning Using Linear Multivariate Model -- 1 Introduction -- 2 PID Controller -- 3 Plant Model -- 4 Partial Least Square Regression -- 5 Simulation -- 6 Results and Discussions -- 6.1 Modeling of Kp -- 6.2 Modeling of Kd -- 6.3 Modeling of Ki -- 6.4 Validation, Calibration, and Prediction of PLSR -- 7 Conclusion -- References -- 31 The Effects of Metal Ion Doped Ceramic Fillers into Poly (Vinylidene Fluoride) Matrix: A Comparative Investigation and Its Application in Micro-Electronics Industry -- 1 Introduction -- 2 Experimental Procedure -- 2.1 Materials -- 2.2 Methodology.
2.3 Investigating Instruments.
Record Nr. UNINA-9910743380303321
Gateway East, Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational intelligence and machine learning : proceedings of the 7th International Conference on Advanced Computing, Networking, and Informatics (ICACNI 2019) / / Jyotsna Kumar Mandal [and four others] editors
Computational intelligence and machine learning : proceedings of the 7th International Conference on Advanced Computing, Networking, and Informatics (ICACNI 2019) / / Jyotsna Kumar Mandal [and four others] editors
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (XI, 200 p. 84 illus., 61 illus. in color.)
Disciplina 006.3
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
ISBN 981-15-8610-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Minutiae Points Extraction using Faster R-CNN -- Genetic Algorithm based Optimization of Clustering Data Points by Propagating Probabilities -- Detection of Malaria Parasites in Thin Blood Smears using CNN Based Approach -- A Deep Learning Approach for Predicting Air Pollution in Smart Cities -- Structural Design of Convolutional Neural Network based Steganalysis -- Sarcasm Detection of Media Text using Deep Neural Networks -- Sentiment Analysis Using Twitter -- A Type-Specific Attention Model for Fine Grained Entity Type Classification -- A Two Phase Approach using LDA for Effective Domain Specific Tweets Conveying Sentiments -- News Background Linking using Document Similarity Techniques.
Record Nr. UNINA-9910484166903321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational intelligence in communications and business analytics : third International Conference, CICBA 2021, Santiniketan, India, January 7-8, 2021, revised selected papers / / Paramartha Dutta, Jyotsna K. Mandal, Somnath Mukhopadhyay (editors)
Computational intelligence in communications and business analytics : third International Conference, CICBA 2021, Santiniketan, India, January 7-8, 2021, revised selected papers / / Paramartha Dutta, Jyotsna K. Mandal, Somnath Mukhopadhyay (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (281 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Computational intelligence
ISBN 3-030-75529-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464499003316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computational intelligence in communications and business analytics : third International Conference, CICBA 2021, Santiniketan, India, January 7-8, 2021, revised selected papers / / Paramartha Dutta, Jyotsna K. Mandal, Somnath Mukhopadhyay (editors)
Computational intelligence in communications and business analytics : third International Conference, CICBA 2021, Santiniketan, India, January 7-8, 2021, revised selected papers / / Paramartha Dutta, Jyotsna K. Mandal, Somnath Mukhopadhyay (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (281 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Computational intelligence
ISBN 3-030-75529-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484647303321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Frontiers of ICT in Healthcare : Proceedings of EAIT 2022 / / edited by Jyotsna Kumar Mandal, Debashis De
Frontiers of ICT in Healthcare : Proceedings of EAIT 2022 / / edited by Jyotsna Kumar Mandal, Debashis De
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (700 pages)
Disciplina 004
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Technology—Sociological aspects
Information technology
Medical informatics
Communication in medicine
Computational Intelligence
Information and Communication Technologies (ICT)
Health Informatics
Health Communication
ISBN 9789811951916
9789811951909
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A method of genome sequence comparison based on a new form of fuzzy polynucleotide space -- Similarity Study of Spike Protein of Corona Virus by PCA Using Physical Properties of Amino Acids -- Identification of Humans by using Machine LearningModels on Gait Features -- Analysis of spread of COVID-19 based on Socio Economic Factors: A Comparison of Prediction Models -- Efficient Heart Disease Prediction using Modified Hybrid Classifier -- Continuous Speech Recognition in Hindi for Healthcare using Deep Learning -- Improving Mental Health through Multimodal Emotion Detection from Speech and Text Data using Long-Short Term Memory -- An unstructured mammogram analysis for feasible classification and detection of breast cancer using a convolutional approach -- MediFi : An IoT Based Health Monitoring Device -- Emotion Recognition from EEG Data Using Hybrid Deep Learning Approach.
Record Nr. UNINA-9910717428103321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovations in signal processing and embedded systems : proceedings of ICISPES 2021 / / Jyotsna Kumar Mandal, Mike Hinchey and K. Sreenivas Rao, editors
Innovations in signal processing and embedded systems : proceedings of ICISPES 2021 / / Jyotsna Kumar Mandal, Mike Hinchey and K. Sreenivas Rao, editors
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore Pte Ltd., , [2023]
Descrizione fisica 1 online resource (489 pages)
Disciplina 004.16
Collana Algorithms for intelligent systems
Soggetto topico Signal processing - Digital techniques
Artificial intelligence
Embedded computer systems
ISBN 981-19-1669-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- E-Voting System Using Blockchain -- 1 Introduction -- 2 Existing Method -- 2.1 Paper Ballots -- 2.2 E-Voting -- 2.3 I-Voting -- 3 Proposed System -- 4 Architecture -- 5 Components of Proposed System -- 5.1 Client Browser, Metamask, Ganache -- 6 Results -- 7 Conclusion -- 8 Future Work -- References -- Video-Based Abnormal Driving Behavior Detection and Risk Control Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Method -- 4 Methodology -- 5 Algorithm -- 6 Results -- 7 Conclusion -- References -- Design and Development of IoT-Based Women Auspice System by Using NodeMCU -- 1 Introduction -- 2 Related Work -- 3 Existing Method -- 4 Proposed Method -- 5 Materials and Method -- 6 Working Methodology -- 7 Experimental Results -- 8 Conclusion -- 9 Future Scope -- References -- Efficient Identity-Based Integrity Auditing for Cloud Storage and Data Sharing -- 1 Introduction -- 2 Literature Survey -- 3 Feasibility Study -- 4 Proposed Scheme -- 5 Results -- 6 Conclusion and Future Scope -- References -- High‑speed 4:2 Compressor Toward Image Processing -- 1 Introduction -- 2 Suggested FULL ADDER Unit -- 3 Simulation Setup -- 4 Simulation Results Assessment and Comparison -- 5 Conclusion -- References -- Double MAC Supported CNN Accelerator -- 1 Introduction -- 2 Existing System -- 2.1 CNN Accelerator -- 2.2 Related Work -- 3 Proposed System -- 3.1 Proposed Double MAC Architecture -- 3.2 SIMD Multiplication of Unsigned Numbers -- 3.3 Accumulation and Double MAC Architecture -- 4 CNN Accelerator Based on Double MAC -- 5 Results -- 5.1 Modified DSP Block with Double MAC -- 5.2 RTL Schematic of CNN Accelerator -- 5.3 Timing Report -- 6 Conclusion -- References -- Hybrid Cryptosystem's Design with AES and SHA-1 Algorithms -- 1 Introduction -- 2 Literature Review.
3 Proposed System -- 4 Methodology -- 5 Xilinx ISE -- 6 FPGA -- 6.1 FPGA Basics -- 7 Results -- 8 Conclusion -- References -- BTI Reliability Analysis of Low Leakage Fully Half-Select-Robust Free SRAM Design -- 1 Introduction -- 2 Existing Design -- 3 Proposed System -- 4 Results and Comparison -- 5 Conclusion -- References -- Intelligent Traffic Light System Using YOLO -- 1 Introduction -- 2 Work Flow -- 3 Database and Experimental Setup -- 4 Experimental Results -- 5 Conclusion -- References -- An Efficient Implementation of Programmable IIR Filter for FPGA -- 1 Introduction -- 1.1 Introduction to FPGA -- 2 Proposed Work -- 3 Simulation Result -- 4 Comparative Analysis -- 5 Conclusion -- References -- ASIC Implementation of Division Circuit Using Reversible Logic Gates Applicable in ALUs -- 1 Introduction -- 2 Proposed Model -- 3 Results Obtained for 32-Bit Division Circuit Employing Reversible Logic Gates -- 4 Conclusions -- References -- Operation of Asymmetric Hopfield Associative Memory: Orientation Selectivity -- 1 Introduction -- 2 State of the Art -- 3 Left Stable States, Right Stable States: Asymmetric Hopfield Neural Network -- 4 Programming of a Asymmetric Hopfield Neural Network -- 5 Associative Memory Architecture: HAM, AHNN Interconnection -- 6 Numerical Results -- 7 Conclusions -- References -- Intelligent Traffic Monitoring Systems Using Deep Learning Algorithms -- 1 Introduction -- 2 Related Work -- 3 Proposed DL Architecture -- 3.1 Establishment of Deep Learning Model Using CNN and LSTM -- 4 Implementation of DL Model -- 4.1 Parallel Training for DL Model -- 5 Performance Evaluation -- 6 Conclusion -- 7 Future Work -- References -- Multi-layer Hopfield Like Neural Network -- 1 Introduction -- 2 Review of Related Research Literature -- 2.1 Significance of Connectivity Structure -- 2.2 Biological Motivation.
3 Multi-layer Hopfield Associative Memory -- 3.1 Incremental Expansion of ANN -- 3.2 Modes of Operation of Multi-layer Hopfield Like Neural Network -- 3.3 Application Significance of Proposed ANN -- 4 Numerical Results -- 5 Conclusions -- References -- Applications of Artificial Intelligence for Autonomous Landing and Multicopter Unmanned Aerial Vehicles Design by Space Exploration Machines -- 1 Introduction -- 1.1 Artificial Intelligence -- 1.2 Landing System -- 2 Applications of Artificial Intelligence in Landing -- 3 How Autonomous Landing by Using Artificial Intelligence Changes the Future -- 4 Conclusion -- References -- Automated Skin Disease Detection Using Machine Learning Techniques -- 1 Introduction -- 2 Review of Literature -- 3 Design Requirements for Hybrid Skin Disease Detection System -- 3.1 System Architecture -- 4 General Framework for of the Skin Disease Detection System -- 5 Methodology -- 5.1 K-Nearest Neighbor -- 6 Performance Metrics -- 6.1 Accuracy -- 6.2 Precision -- 6.3 Recall -- 6.4 F1-Score -- 7 Result and Discussion -- 8 Conclusion -- References -- FinFET-Based SRAM Design Using MGDI Technique for Ultra-Low-Power Applications -- 1 Introduction -- 2 CMOS Inverter Design Using GDI -- 2.1 DC Analysis -- 2.2 Transfer Characteristics -- 2.3 Static Power -- 2.4 Total Power -- 3 GDI SRAM Design -- 3.1 Read and Write Operation of GDI SRAM -- 3.2 Power Analysis -- 4 Modified Gate Diffused Input FinFET (M-GDI)-Based SRAM -- 4.1 DC Analysis -- 4.2 Power Analysis -- 5 Design of FinFET-Based MGDI 6T SRAM -- 5.1 Power Analysis -- References -- Design and Implementation of Efficient Counter-Based IoT DDoS Attacks Detection System Using Machine Learning -- 1 Introduction -- 2 Internet of Things (IoT) -- 2.1 Authentication for IoT Devices -- 2.2 DDoS Attacks Detection.
3 Internet of Things DDoS Attack Detection System Using Machine Learning -- 3.1 Methodology -- 3.2 IoT Devices -- 3.3 Data Preprocessing -- 3.4 Normalization -- 3.5 Feature Extraction -- 3.6 Feature Selection -- 3.7 Cross Validation -- 3.8 Machine Learning Methods -- 4 Results -- 5 Conclusion -- References -- Advancements of Artificial Intelligence in Microbiological Study by Extraction and Identification of Different Micro-organism Clusters -- 1 Introduction -- 2 Machine Learning Processes -- 3 Deep Learning Processes -- 4 AI Interventions in Microbiology -- 4.1 Study of Relation Between Human Health and Microorganisms -- 4.2 Extraction of a Microorganism Cluster from a Community of Different Microbial Species -- 4.3 Identification of Different Bacterial Species in Food -- 4.4 Identifying Nosocomial Infection in Hospitals -- 4.5 Identifying Bacteriophages in Metagenomic Bins and Contigs -- 4.6 Antiviral Peptides (AVP) -- 4.7 Identifying Tuberculosis Using Convolutional Neural Networks -- 4.8 Creating Drugs Capable of Killing Antibiotic Resistance Pathogens -- 4.9 AI in Fighting COVID-19 Pandemic -- 5 Conclusion -- References -- Rice Disease Detection and Classification Using Artificial Intelligence -- 1 Introduction -- 2 Classification of Rice Diseases -- 3 Related Work -- 4 Methodology -- 5 Results and Discussion -- 6 Conclusion -- References -- Network Intrusion Detection Using Machine Learning for Virtualized Data -- 1 Introduction -- 2 Network Intrusion Detection System -- 2.1 Support Vector Machine -- 2.2 Naive Bayes -- 3 Network Intrusion Detection Using Machine Learning -- 3.1 Attack Flows -- 3.2 Pre-processing -- 3.3 Feature Selection -- 3.4 Feature Reduction Using CfsSubsetEval -- 3.5 SVM Classification -- 3.6 Naïve Bayes Classification -- 4 Results -- 5 Conclusion -- References.
Detection of Human Behavior Using Swarm Technique and Neural Networks -- 1 Introduction -- 2 Related Work -- 3 Particle Swarm Method Using ANN -- 4 Results and Discussion -- 5 Conclusion -- References -- Machine Learning-Based Approach for Classification of Weed Images -- 1 Introduction -- 2 Literature Survey -- 3 Methodologies -- 4 Results -- 5 Conclusion -- References -- Intelligence Speech Has Collapsed and Talking Unconsciously Circumstance Using Diva Module -- 1 Introduction -- 1.1 DIVA Module -- 2 Existing Method -- 2.1 Matching Pursuit Algorithm -- 2.2 Problem Finding of Existing Method -- 2.3 Experimental Tools -- 3 Proposed System -- 3.1 Problem Finding of Proposed Method -- 3.2 Description of ICA Analysis -- 3.3 Implementation of Eeglab -- 3.4 Path Setup to EEGLAB -- 4 Execution Results -- 5 Simulation Result for Denoising Signal -- 5.1 Output Graphs of Denoising Signal -- 6 Conclusion and Future Scope -- References -- A Wavelet-Based De-Noising Speech Signal Performance with Objective Measures -- 1 Introduction -- 2 Literature Survey -- 2.1 Weiner Filtering -- 2.2 Wavelet Transform -- 2.3 Discrete Wavelet Transform -- 2.4 Speech Quality Measures -- 2.5 The Weighted Spectral Slope Measure (WSSM) -- 3 Existing Method -- 4 Proposed Method -- 4.1 Algorithm -- 4.2 DWT Decomposition -- 4.3 Algorithm -- 4.4 Speech Corpus -- 4.5 Windowing Technique -- 5 Results and Discussion -- 5.1 Experiment results: Speech signal input 1: Characteristics -- 6 Conclusion and Future Scope Conclusion -- References -- Multispectral Image Compression Using Adaptive Thresholding in Wavelet Domain with Binary Plane Techniques -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Experimental Setup Results -- 5 Conclusion and Future Scope -- References -- Privacy Ensured Transmission of Healthcare Records Using IoT-Enabled Systems -- 1 Introduction.
2 Literature Survey.
Record Nr. UNINA-9910627267803321
Singapore : , : Springer Nature Singapore Pte Ltd., , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Microelectronics, communication systems, machine learning and internet of things : select proceedings of MCMI 2020 / / Vijay Nath and Jyotsna Kumar Mandal, editors
Microelectronics, communication systems, machine learning and internet of things : select proceedings of MCMI 2020 / / Vijay Nath and Jyotsna Kumar Mandal, editors
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore Pte Ltd., , [2023]
Descrizione fisica 1 online resource (698 pages)
Disciplina 004.678
Collana Lecture notes in electrical engineering
Soggetto topico Machine learning
Microelectronics
Internet of things
ISBN 981-19-1906-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910627271203321
Singapore : , : Springer Nature Singapore Pte Ltd., , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Nanoelectronics, circuits and communication systems : proceeding of NCCS 2019 / / Vijay Nath, J. K. Mandal, editors
Nanoelectronics, circuits and communication systems : proceeding of NCCS 2019 / / Vijay Nath, J. K. Mandal, editors
Edizione [1st edition 2021.]
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (XIII, 817 p. 543 illus., 344 illus. in color.)
Disciplina 621.381
Collana Lecture Notes in Electrical Engineering
Soggetto topico Nanoelectronics
Wireless communication systems
Internet of things
ISBN 981-15-7486-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Active Security by Implementing Intrusion Detection and Facial Recognition -- Image Processing Using Median Filtering for Identification of Leaf Disease -- Cloud Computing: Security Issues and Challenges -- Application of Knowledge and Data Mining to Build Intelligent Systems -- Hybrid Model for Stress Detection in Social Media by Using Dynamic Factor Graph Model and Convolutional Neural Networks -- Modelling and Forecasting of Bitcoin Prices Using Bayesian Regularization Neural Network -- Machine learning based Implementation of Image Corner Detection Using SVM Algorithm for Biomedical Applications -- Switching Mechanism of Internal Model Control based PI Controller for Lag Dominating Processes -- Calculation of Torque Ripple and Derating Factor of a Symmetrical Six-Phase Induction Motor (SSPIM) under the Loss of Phase Conditions.
Record Nr. UNINA-9910483780603321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of International Conference on Advanced Computing Applications : ICACA 2021 / / Jyotsna Kumar Mandal, Rajkumar Buyya, Debashis De, editors
Proceedings of International Conference on Advanced Computing Applications : ICACA 2021 / / Jyotsna Kumar Mandal, Rajkumar Buyya, Debashis De, editors
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (837 pages)
Disciplina 006.3
Collana Advances in intelligent systems and computing
Soggetto topico Artificial intelligence
Internet of things
ISBN 981-16-5207-4
981-16-5206-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910743246903321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui