top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applications of Internet of Things : Proceedings of ICCCIOT 2020 / / edited by Jyotsna K. Mandal, Somnath Mukhopadhyay, Alak Roy
Applications of Internet of Things : Proceedings of ICCCIOT 2020 / / edited by Jyotsna K. Mandal, Somnath Mukhopadhyay, Alak Roy
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (258 pages) : illustrations
Disciplina 361.32
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Computer engineering
Internet of things
Embedded computer systems
Computer software
Computational Intelligence
Artificial Intelligence
Cyber-physical systems, IoT
Professional Computing
ISBN 981-15-6198-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1.Design of an Industrial Internet of Things enabled Energy Management System of a Grid Connected Solar-Wind Hybrid System based Battery Swapping Charging Station for Electric Vehicle -- Chapter 2.Modeling and Implementation of Advanced Electronic Circuit Breaker Technique for Protection -- Chapter 3. Peristaltic Transport of Casson Fluid in a Porous Channel in Presence of Hall Current -- Chapter 4.Fingerprint Authentication System for BaaS Protocol -- Chapter 5.Design of a Low Cost Li-Fi System Using Table Lamp -- Chapter 6. A Study of Micro Ring Resonator Based Optical Sensor -- Chapter 7. An Efficient Decision Fusion Scheme for Cooperative Spectrum Sensing in Cognitive Radio Networks -- Chapter 8. Detection of early Breast Cancer using A-priori rule mining and Machine learning approaches -- Chapter 9. Effect of Linear Features to Determination of Sleep Stages Classification from Dual-Channel of EEG signal using Machine Learning Techniques -- Chapter 10. A Tree Multicast Routing based on Fuzzy mathematics in Mobile Ad-hoc Networks.
Record Nr. UNINA-9910484222803321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Intelligence in Communications and Business Analytics : 6th International Conference, CICBA 2024, Patna, India, January 23–25, 2024, Revised Selected Papers, Part III / / edited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta
Computational Intelligence in Communications and Business Analytics : 6th International Conference, CICBA 2024, Patna, India, January 23–25, 2024, Revised Selected Papers, Part III / / edited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta
Autore Singh Jyoti Prakash
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (475 pages)
Disciplina 005.73
003.54
Altri autori (Persone) SinghMaheshwari Prasad
SinghAmit Kumar
MukhopadhyaySomnath
MandalJyotsna K
DuttaParamartha
Collana Communications in Computer and Information Science
Soggetto topico Data structures (Computer science)
Information theory
Computer engineering
Computer networks
Artificial intelligence
Application software
Data Structures and Information Theory
Computer Engineering and Networks
Computer Communication Networks
Artificial Intelligence
Computer and Information Systems Applications
ISBN 9783031813368
3031813367
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Theories and Applications to Data Communications and Analytics -- Optuna and Decision Tree Based Network Intrusion Detection System for Internet of Things -- Restful Architecture for Achieving Syntactic Interoperability in IoT Systems -- Energy Optimized Clustering and Cluster Head Selection in WSNs an MDB-KMC and Cuttlefish Approach -- D2Stege Using Decteron2 to Segment Medical Image with Security Through Steganography and Encryption -- A Novel Chaos and DNA Computing for Medical Image Encryption -- Session Based Symmetric Key Cryptography Using Digital Circuit Based on Two Left Shift -- Digital Images Encryption Using PWLCM and Sine Map -- Hybrid Humor Classification and Detection Based on Machine Learning -- Data Anomaly Detection in Wireless Sensor Network Using Principal Component Analysis and Decision Tree -- Industry Monitoring with Data Logger in Google Sheet Using Respberry Pi -- ECCNN A Novel Efficient Compressed Convolutional Neural Network -- A Modified Low Energy Consuming Mac Protocol for Wireless Sensor Networks -- Text Data Security Through Hybrid Method Using Visual Cryptography and Image Steganography Algorithms -- CASCAIN Cascaded Attention Infused Networks for Named Entity Recognition in Code Mixed Setting -- Secure Non Fungible Token Marketplaces Using ERC 721 -- A Detailed Comparative Study of Regression Models for Stock Price Prediction -- An Optimal Cluster Head Selection in UAV Networks Using Grey Wolf Optimization -- Multi Modal Probabilistic Conditional Generative Adversarial Networks for Electric Vehicles Range Prediction -- Entry Point Adaptive Keystroke Dynamics Based User Authentication for Evolving Passwords -- Malicious node detection in Industrial internet of things using swarm based optimization algorithm A cyber security perspective -- Is software defined smart grid secure An analysis of security issues and solutions -- Energy Efficiency Optimization in IoT Based Machine Learning for Smart Environmental Monitoring -- Smart Tech Cane Navigator (STCN) for Physically Challenged -- A Real Time Machine Learning based Statistical Approach for Power Generation Prediction for Solar PV Plant -- CipherCraft An Integrated Approach to Cryptographic Data Security in Modern Computing Environments -- Unveiling Dynamics of Structural Breaks in Global Stock Markets and Implications for Forecasting Accuracy.
Record Nr. UNINA-9910983297803321
Singh Jyoti Prakash  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Intelligence in Communications and Business Analytics : 6th International Conference, CICBA 2024, Patna, India, January 23–25, 2024, Revised Selected Papers, Part II / / edited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta
Computational Intelligence in Communications and Business Analytics : 6th International Conference, CICBA 2024, Patna, India, January 23–25, 2024, Revised Selected Papers, Part II / / edited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta
Autore Singh Jyoti Prakash
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (453 pages)
Disciplina 005.73
003.54
Altri autori (Persone) SinghMaheshwari Prasad
SinghAmit Kumar
MukhopadhyaySomnath
MandalJyotsna K
DuttaParamartha
Collana Communications in Computer and Information Science
Soggetto topico Data structures (Computer science)
Information theory
Computer engineering
Computer networks
Artificial intelligence
Application software
Data Structures and Information Theory
Computer Engineering and Networks
Computer Communication Networks
Artificial Intelligence
Computer and Information Systems Applications
ISBN 9783031813399
3031813391
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computational Intelligence II -- Multimodal Skin Cancer Classification Optimized Convolutional Network with Customized Loss and RNN Based FCNN Fusion -- Deep Learning Based MLP Model in Detection of Cotton Plant Leaf Disease -- Enhancing Drug Candidate Generation Comparing Genetic Algorithm And WGAN GP Approaches -- Predicting Employee Job Satisfaction by Using Vector Space Model -- Simplernn Based Human Emotion Recognition Using EEFG Signals -- Improving Melanoma Classification Using Transfer Learning Based Wavelet Features -- Research Challenges and Future Perspective in Semantic Segmentation of Brain Stroke Lesions in Magnetic Resonance Imaging -- Revolutionizing Suicide Ideation Detection in Social Media An Ensemble Optimized Bi GRU With Attention Approach -- A Computer Vision Model Utilizing Autoencoders for Surface Defect Recognition -- A Study on the Impact of Partitioning on Community Detection in Graph Networks -- Load Combination Optimization for Trailer Design using Genetic Algorithm -- Features Extraction from Android Apps Using Reverse Engineering -- Efficient Near Infrared Spectroscopy Based Feature Selection of Tannic Acid for Black Tea Evaluation -- Taming the Monkeypox Outbreak with Deep Learning for Skin Lesion Detection -- A Comprehensive Review of AI based Low Back Pain Assessment and Rehabilitation -- Analysis of Multidomain Abstractive Summarization Using Salience Allocation -- Detection and Localization of Malignant Cells from Surgical Images for Robot Assisted Invasive Surgery using Deep Learning -- An Intelligent Integrated Prediction Based Approach for Heart Disease Detection A Comprehensive Study -- Multi Modal Approach for Ethereum Smart Contract Vulnerability Detection -- Kcst Net Deep Learning Based Classification of Kidney Diseases Using CT Images -- High Yield Model Compression Paradigms for Low Footprint Signal Classification Supplementing Resource Constrained Embedded Environments -- Regularizing CNNs using Confusion Penalty Based Label Smoothing for Histopathology Images -- Leveraging Generative Pre Trained Models and Discriminative Pre Trained Language Models for Sentiment Analysis -- Advancing Lung Cancer Diagnosis and Prognosis through Machine Learning Algorithm -- Influent sewage water classification using machine learning -- Fine grained Image Classification on Skin Cancer Dataset -- Learning based soiling loss estimation in solar panels and solar panel soiling database generation -- CNN ML Framework Based Predominant Musical Instrument Recognition Using Mel Spectrogram.
Record Nr. UNINA-9910983481703321
Singh Jyoti Prakash  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Intelligence in Communications and Business Analytics : 6th International Conference, CICBA 2024, Patna, India, January 23–25, 2024, Revised Selected Papers, Part I / / edited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta
Computational Intelligence in Communications and Business Analytics : 6th International Conference, CICBA 2024, Patna, India, January 23–25, 2024, Revised Selected Papers, Part I / / edited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta
Autore Singh Jyoti Prakash
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (481 pages)
Disciplina 005.73
003.54
Altri autori (Persone) SinghMaheshwari Prasad
SinghAmit Kumar
MukhopadhyaySomnath
MandalJyotsna K
DuttaParamartha
Collana Communications in Computer and Information Science
Soggetto topico Data structures (Computer science)
Information theory
Computer engineering
Computer networks
Artificial intelligence
Application software
Data Structures and Information Theory
Computer Engineering and Networks
Computer Communication Networks
Artificial Intelligence
Computer and Information Systems Applications
ISBN 9783031813429
3031813421
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computational Intelligence I -- Depression Clinic People's Mental Health Prediction Using Information from Online Social Media Networks (OSN) -- A Novel Hindi Voice Based Assistant System Architecture for E Commerce -- Early Classification of Alzheimer’s Disease Using Deep Learning Technique -- Spoken Metro Station Name Identification A Deep Learning Based Approach -- EDR DT A Novel Energy Function Based Enhanced Decision Tree Model for Classification -- Enhancing Agriculture Using Machine Learning Powered Smart Agricultural Systems -- Classification Of Tomato Maturity Levels An Efficient Approach with Statistical Features -- Iot Based Multifunctional Agriculture Monitoring and Smart Irrigation System -- Covid Ct H Unet A Novel Covid 19 CT Segmentation Network Based on Attention Mechanism and Bi Category Hybrid Loss -- A Review on The Efficacy of Different Data Augmentation Technique for Deep Learning -- MLAEDensenet Multi Layer Attention Enhanced Densenet for Efficient Video Action Recognition -- Word Sense Disambiguation for Bodo Language Using Simplified Lesk -- Smali Code Based Fake Application Detection -- From Haze and Smoke to Clarity An Integration of Deep Learning and Atmospheric Model -- Integrating BiLSTM BiGRU with Autoencoders for Enhanced Feature Representation and Deep Q Networks for Clinical Event Classification in Medical Records -- Agile Development Using A Hybrid Approach For Cost Estimation of IT Projects -- Lung Cancer Diagnosis Using Image Enhancement and Machine Learning Methods -- An Ml Based Hybrid Model for IIoT Attack Classification in Industry 4.0 Ecosystem -- Design of an explainable AI Model with Q Convolutional Neural Networks for Patient Health Reporting -- Convolutional Neural Networks for Patient -- Enhancing Visual Question Answering with Beam Search in Transformer Models -- Analyzing The Effect of Coffee Consumption on Visual Pathway Using Visual Evoked Potential (VEP) Signals and Machine Learning Algorithms -- A Survey on Machine Learning Techniques for Recognizing Human Activities Using Smartphone Data -- Digital Twin for Diabetes Management Using System Dynamics Simulation The Case of India -- Analysis Of Occupational Stress Effects and Coping Among Prison Officers A Case of RAK Prison Centre, United Arab Emirates -- Custom Ensemble Machine Learning Algorithm for Interactive Symptom Based Disease Prediction -- Leveraging Handwriting Dynamics, Explainable AI And Machine Learning for Alzheimer Prediction -- Machine Learning Powered Insights A Comprehensive Survey on Pcos Detection and Diagnosis.
Record Nr. UNINA-9910983376403321
Singh Jyoti Prakash  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational intelligence in communications and business analytics : 4th international conference, CICBA 2022, Silchar, India, January 7-8, 2022 : revised selected papers / / edited by Somnath Mukhopadhyay [and four others]
Computational intelligence in communications and business analytics : 4th international conference, CICBA 2022, Silchar, India, January 7-8, 2022 : revised selected papers / / edited by Somnath Mukhopadhyay [and four others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (460 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Computational intelligence
ISBN 3-031-10766-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Computational Intelligence -- A Brief Review on Multi-Attribute Decision Making in the Emerging Fields of Computer Science -- 1 Introduction -- 2 An Overview of MADM and Its Associated Techniques -- 2.1 Outranking Methods -- 2.2 Ranking Methods -- 2.3 Other Methods -- 2.4 Fuzzy and Hybrid Methods -- 3 Assessment of MADM Approaches in Different Domains -- 3.1 MADM Applications in the Field of Cloud Computing -- 3.2 MADM Applications in the Field of IoT -- 3.3 MADM Applications in the Field of Big Data -- 4 Discussion -- 5 Conclusion -- References -- Statistical and Syllabification Based Model for Nepali Machine Transliteration -- 1 Introduction -- 2 Related Works -- 3 Preprocessing of Corpus for Transliteration -- 3.1 Word Splitter -- 3.2 Syllabification -- 3.3 Truecasing -- 4 Proposed English-Nepali Transliteration System -- 4.1 Implementation -- 5 Results and Discussion -- 6 Conclusion -- References -- Learning Based Image Classification Techniques -- 1 Introduction -- 2 Few Shot Learning (FSL) -- 3 One Shot Learning (OSL) -- 4 Zero Shot Learning (ZSL) -- 5 Result Comparison of Different Methods with Different Datasets -- 6 Summary -- 7 Conclusion -- References -- eXtreme Gradient Boosting Scheme for Fundus Vessels Separation -- 1 Introduction -- 2 Feature Extraction -- 2.1 32 Gabor Filters -- 2.2 The Different Edge Detectors -- 2.3 Blurring Methods -- 3 XGBoost -- 3.1 Decision Trees -- 3.2 Tree Boosting -- 3.3 XGBoost -- 4 Algorithm: Way of Working -- 5 Analysis and Evaluation of Results -- 6 Future Prospects and Conclusion -- References -- Deep-learning Based Autoencoder Model for Label Distribution Learning -- 1 Introduction -- 2 Methodology -- 2.1 Autoencoder -- 3 DL-based LDL Model -- 4 Experimental Datasets, Results and Analysis -- 4.1 Training Protocol -- 4.2 Datasets.
4.3 Result Comparisons -- 5 Conclusion -- References -- A Secure Image Watermarking Technique Using Chinese Remainder Theorem in Integer Wavelet Transformation Domain -- 1 Introduction -- 2 Literature Review -- 3 Chinese Remainder Theorem (CRT) and Integer Wavelet Transform (IWT) -- 3.1 Chinese Remainder Theorem (CRT) -- 3.2 Integer Wavelet Transform (IWT) -- 4 Proposed Scheme -- 4.1 Embedding Procedure -- 4.2 Extraction Process -- 5 Experiment and Comparative Evaluation -- 5.1 Imperceptibility Analysis -- 5.2 Robustness Analysis -- 6 Conclusion -- References -- A Dual Image Based Data Hiding Scheme Based on Difference of Pixel Values in Integer Wavelet Transform Domain -- 1 Introduction -- 2 Literature Review -- 3 Integer Wavelet Transform and Center Folding Strategy -- 3.1 Integer Wavelet Transform (IWT) -- 3.2 Center Folding Strategy -- 4 The Proposed Scheme -- 4.1 Embedding Procedure -- 4.2 Extraction Procedure -- 5 Experiment Results and Analysis -- 5.1 Imperceptibility Analysis -- 5.2 Robustness Analysis -- 6 Conclusion -- References -- An IWT Based Reversible Watermarking Scheme Using Lagrange Interpolation Polynomial -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Secret Sharing -- 4 Proposed Scheme -- 4.1 Embedding Process -- 4.2 Extraction Process -- 5 Experimental Analysis and Discussion -- 5.1 Imperceptibility Analysis -- 5.2 Complexity -- 6 Conclusion -- References -- A New Image Encryption Based on Two Chaotic Maps and Affine Transform -- 1 Introduction -- 2 Preliminaries -- 2.1 Cubic Map -- 2.2 Hénon Map -- 2.3 Affine Ciphering Technique -- 2.4 Nonlinear Key Mixing (Nmix) -- 3 Proposed Scheme -- 3.1 Image Substitution -- 3.2 Key Expansion -- 3.3 Image Encryption -- 4 Experimental Results, Security Analysis and Comparative Analysis -- 4.1 Encryption Decryption Test -- 4.2 Key Space Analysis.
4.3 Resistance Against Differential Attack -- 4.4 Key Sensitivity -- 4.5 Histogram Analysis -- 4.6 Correlation, Entropy and PSNR Analyses -- 4.7 Test of Randomness -- 4.8 Time Complexity of Encryption and Key Generation Schemes -- 4.9 Comparative Analysis -- 5 Conclusion -- References -- miRNA and mRNA Expression Analysis of Human Breast Cancer Subtypes to Identify New Markers -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Dataset -- 3.2 Pre-processing of miRNA Expression Profiles to Find Differentially Expressed miRNAs for Each Subtype -- 3.3 Integrated Analysis of miRNA and mRNA Expressions Data to Select Relevant miRNA Targets -- 3.4 Identify Significantly Differentially Expressed miRNAs and Target mRNAs in Each Subtype of Breast Cancer -- 3.5 Enriched Pathways Identification for Significantly Differentially Expressed miRNA Targets -- 3.6 Investigate the Biological Significance of miRNA/mRNA Signatures in Clinico-Pathological Characteristics -- 4 Results -- 4.1 Identify Significantly Differentially Expressed miRNAs and Target mRNAs -- 4.2 KEGG Pathways Associated with Significantly Differentially Expressed miRNA Targets -- 4.3 Gene Ontology Analysis -- 4.4 Survival Analysis -- 5 Conclusions -- References -- A Survey on Computational Intelligence Techniques in Learning and Memory -- 1 Introduction -- 2 Computational Intelligence Techniques -- 2.1 Recurrent Neural Network -- 2.2 Long Short Term Memory -- 2.3 Convolutional Neural Network -- 3 Related Work -- 4 Conclusion -- References -- Enhanced Marker-Controlled Watershed Segmentation Algorithm for Brain Tumor Segmentation -- 1 Introduction -- 2 Literature Survey -- 3 Enhanced Marker-Controlled Watershed Segmentation Algorithm -- 4 Results and Discussion -- 5 Conclusion -- References -- Computational Intelligence in Communication.
GSA Based FOPID Controller Tuning in NSOF Domain for a Class of Nonlinear Systems -- 1 Introduction -- 2 Problem Formulation -- 3 Operators of Non-Sinusoidal Orthogonal Function Domain -- 3.1 Hybrid Function Set -- 3.2 Operational Matrix in HF Domain -- 4 Design of FOPID Controller -- 4.1 FOPID Controller in NSOF Domain -- 4.2 System Dynamics in NSOF Domain -- 4.3 Stability Analysis -- 5 Tuning of FOPID Controller via GSA -- 5.1 Gravitational Search Algorithm -- 5.2 PID Controller Tuning -- 6 Simulation Results -- 6.1 Conventional FOPID Controller -- 6.2 NSOF Domain-Based FOPID Controller -- 7 Conclusion -- References -- Artificial Neural Network for Fault Diagnosis in Active Distribution Network -- 1 Introduction -- 2 Fault Diagnosis in Active Distribution Network (ADN) -- 3 Artificial Neural Network -- 3.1 ANN Based Fault Diagnosis -- 4 Proposed Model and Case Studies -- 5 Result Analysis -- 5.1 Case Study-I -- 5.2 Case Study II -- 6 Conclusion -- References -- A Secure Communication Gateway with Parity Generator Implementation in QCA Platform -- 1 Introduction -- 1.1 Basics of QCA -- 2 Related Prior Work -- 3 Proposed QCA Parity Generator Circuit -- 4 Proposed Work for Secure Network Channel -- 5 Result and Discussion -- 6 Conclusion -- References -- VCI Construction and Shifting Strategy Based Steganography for 3D Images -- 1 Introduction -- 2 Related Works -- 3 Proposed Scheme -- 3.1 VCI Construction and Shifting Strategy -- 3.2 Embedding Procedure -- 3.3 Extraction Procedure -- 4 Experimental Results -- 5 Conclusion -- References -- Optimal MAC Scheduling Algorithm for Time-Sensitive Applications in Multi-UE Scenarios in 5G NR MmWave -- 1 Introduction -- 2 Literature Review -- 2.1 Round-robin Scheduling -- 2.2 Fair Scheduling -- 2.3 Proportional Fair Scheduler -- 2.4 Max Throughput Scheduler -- 3 Methodology -- 4 Results and Discussions.
5 Conclusion and Future Work -- References -- Computational Intelligence in Analytics -- N-Gram Feature Based Resume Classification Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Proposed Method -- 4 Experimental Results -- 5 Conclusion -- References -- Generating Equations from Math Word Problem Using Deep Learning Approach -- 1 Introduction -- 2 Related Works -- 3 Dataset -- 4 Proposed Method -- 5 Training -- 6 Result -- 7 Observation -- 8 Conclusion and Future Work -- References -- Clustering-Based Semi-supervised Technique for Credit Card Fraud Detection -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Preparation of Training Dataset -- 2.2 Formation of K-D Tree Based Model -- 3 Experiment and Results -- 4 Conclusion -- References -- Fake News Identification Through Natural Language Processing and Machine Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Dataset and Pre-processing -- 3.1 Dataset Used -- 3.2 Data Preprocessing -- 4 Feature Extraction -- 5 Result and Discussion -- 5.1 Results -- 6 Conclusion -- References -- An Empirical Analysis on Abstractive Text Summarization -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 System Architecture -- 4.1 Encoder-Decoder Architecture -- 5 Experimental Results -- 6 Conclusions and Future Scope -- References -- Facial Emotion Recognition in Static and Live Streaming Image Dataset Using CNN -- 1 Introduction -- 2 Proposed Work -- 2.1 Datasets -- 2.2 Proposed FER Model -- 3 Experimental Results -- 4 Conclusion -- References -- An UAV Assisted Need Assessment and Prediction System for COVID-19 Vaccination -- 1 Introduction -- 1.1 Motivation -- 1.2 Contribution -- 2 Objectives -- 3 Literature Survey -- 4 Proposed System -- 4.1 UAV Design -- 4.2 Android App Development -- 4.3 Data Collection -- 4.4 Data Storage -- 4.5 Data Analysis.
4.6 Proposed Prediction System.
Record Nr. UNISA-996483157203316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computational intelligence in communications and business analytics : 4th international conference, CICBA 2022, Silchar, India, January 7-8, 2022 : revised selected papers / / edited by Somnath Mukhopadhyay [and four others]
Computational intelligence in communications and business analytics : 4th international conference, CICBA 2022, Silchar, India, January 7-8, 2022 : revised selected papers / / edited by Somnath Mukhopadhyay [and four others]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (460 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Computational intelligence
ISBN 3-031-10766-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Computational Intelligence -- A Brief Review on Multi-Attribute Decision Making in the Emerging Fields of Computer Science -- 1 Introduction -- 2 An Overview of MADM and Its Associated Techniques -- 2.1 Outranking Methods -- 2.2 Ranking Methods -- 2.3 Other Methods -- 2.4 Fuzzy and Hybrid Methods -- 3 Assessment of MADM Approaches in Different Domains -- 3.1 MADM Applications in the Field of Cloud Computing -- 3.2 MADM Applications in the Field of IoT -- 3.3 MADM Applications in the Field of Big Data -- 4 Discussion -- 5 Conclusion -- References -- Statistical and Syllabification Based Model for Nepali Machine Transliteration -- 1 Introduction -- 2 Related Works -- 3 Preprocessing of Corpus for Transliteration -- 3.1 Word Splitter -- 3.2 Syllabification -- 3.3 Truecasing -- 4 Proposed English-Nepali Transliteration System -- 4.1 Implementation -- 5 Results and Discussion -- 6 Conclusion -- References -- Learning Based Image Classification Techniques -- 1 Introduction -- 2 Few Shot Learning (FSL) -- 3 One Shot Learning (OSL) -- 4 Zero Shot Learning (ZSL) -- 5 Result Comparison of Different Methods with Different Datasets -- 6 Summary -- 7 Conclusion -- References -- eXtreme Gradient Boosting Scheme for Fundus Vessels Separation -- 1 Introduction -- 2 Feature Extraction -- 2.1 32 Gabor Filters -- 2.2 The Different Edge Detectors -- 2.3 Blurring Methods -- 3 XGBoost -- 3.1 Decision Trees -- 3.2 Tree Boosting -- 3.3 XGBoost -- 4 Algorithm: Way of Working -- 5 Analysis and Evaluation of Results -- 6 Future Prospects and Conclusion -- References -- Deep-learning Based Autoencoder Model for Label Distribution Learning -- 1 Introduction -- 2 Methodology -- 2.1 Autoencoder -- 3 DL-based LDL Model -- 4 Experimental Datasets, Results and Analysis -- 4.1 Training Protocol -- 4.2 Datasets.
4.3 Result Comparisons -- 5 Conclusion -- References -- A Secure Image Watermarking Technique Using Chinese Remainder Theorem in Integer Wavelet Transformation Domain -- 1 Introduction -- 2 Literature Review -- 3 Chinese Remainder Theorem (CRT) and Integer Wavelet Transform (IWT) -- 3.1 Chinese Remainder Theorem (CRT) -- 3.2 Integer Wavelet Transform (IWT) -- 4 Proposed Scheme -- 4.1 Embedding Procedure -- 4.2 Extraction Process -- 5 Experiment and Comparative Evaluation -- 5.1 Imperceptibility Analysis -- 5.2 Robustness Analysis -- 6 Conclusion -- References -- A Dual Image Based Data Hiding Scheme Based on Difference of Pixel Values in Integer Wavelet Transform Domain -- 1 Introduction -- 2 Literature Review -- 3 Integer Wavelet Transform and Center Folding Strategy -- 3.1 Integer Wavelet Transform (IWT) -- 3.2 Center Folding Strategy -- 4 The Proposed Scheme -- 4.1 Embedding Procedure -- 4.2 Extraction Procedure -- 5 Experiment Results and Analysis -- 5.1 Imperceptibility Analysis -- 5.2 Robustness Analysis -- 6 Conclusion -- References -- An IWT Based Reversible Watermarking Scheme Using Lagrange Interpolation Polynomial -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Secret Sharing -- 4 Proposed Scheme -- 4.1 Embedding Process -- 4.2 Extraction Process -- 5 Experimental Analysis and Discussion -- 5.1 Imperceptibility Analysis -- 5.2 Complexity -- 6 Conclusion -- References -- A New Image Encryption Based on Two Chaotic Maps and Affine Transform -- 1 Introduction -- 2 Preliminaries -- 2.1 Cubic Map -- 2.2 Hénon Map -- 2.3 Affine Ciphering Technique -- 2.4 Nonlinear Key Mixing (Nmix) -- 3 Proposed Scheme -- 3.1 Image Substitution -- 3.2 Key Expansion -- 3.3 Image Encryption -- 4 Experimental Results, Security Analysis and Comparative Analysis -- 4.1 Encryption Decryption Test -- 4.2 Key Space Analysis.
4.3 Resistance Against Differential Attack -- 4.4 Key Sensitivity -- 4.5 Histogram Analysis -- 4.6 Correlation, Entropy and PSNR Analyses -- 4.7 Test of Randomness -- 4.8 Time Complexity of Encryption and Key Generation Schemes -- 4.9 Comparative Analysis -- 5 Conclusion -- References -- miRNA and mRNA Expression Analysis of Human Breast Cancer Subtypes to Identify New Markers -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Dataset -- 3.2 Pre-processing of miRNA Expression Profiles to Find Differentially Expressed miRNAs for Each Subtype -- 3.3 Integrated Analysis of miRNA and mRNA Expressions Data to Select Relevant miRNA Targets -- 3.4 Identify Significantly Differentially Expressed miRNAs and Target mRNAs in Each Subtype of Breast Cancer -- 3.5 Enriched Pathways Identification for Significantly Differentially Expressed miRNA Targets -- 3.6 Investigate the Biological Significance of miRNA/mRNA Signatures in Clinico-Pathological Characteristics -- 4 Results -- 4.1 Identify Significantly Differentially Expressed miRNAs and Target mRNAs -- 4.2 KEGG Pathways Associated with Significantly Differentially Expressed miRNA Targets -- 4.3 Gene Ontology Analysis -- 4.4 Survival Analysis -- 5 Conclusions -- References -- A Survey on Computational Intelligence Techniques in Learning and Memory -- 1 Introduction -- 2 Computational Intelligence Techniques -- 2.1 Recurrent Neural Network -- 2.2 Long Short Term Memory -- 2.3 Convolutional Neural Network -- 3 Related Work -- 4 Conclusion -- References -- Enhanced Marker-Controlled Watershed Segmentation Algorithm for Brain Tumor Segmentation -- 1 Introduction -- 2 Literature Survey -- 3 Enhanced Marker-Controlled Watershed Segmentation Algorithm -- 4 Results and Discussion -- 5 Conclusion -- References -- Computational Intelligence in Communication.
GSA Based FOPID Controller Tuning in NSOF Domain for a Class of Nonlinear Systems -- 1 Introduction -- 2 Problem Formulation -- 3 Operators of Non-Sinusoidal Orthogonal Function Domain -- 3.1 Hybrid Function Set -- 3.2 Operational Matrix in HF Domain -- 4 Design of FOPID Controller -- 4.1 FOPID Controller in NSOF Domain -- 4.2 System Dynamics in NSOF Domain -- 4.3 Stability Analysis -- 5 Tuning of FOPID Controller via GSA -- 5.1 Gravitational Search Algorithm -- 5.2 PID Controller Tuning -- 6 Simulation Results -- 6.1 Conventional FOPID Controller -- 6.2 NSOF Domain-Based FOPID Controller -- 7 Conclusion -- References -- Artificial Neural Network for Fault Diagnosis in Active Distribution Network -- 1 Introduction -- 2 Fault Diagnosis in Active Distribution Network (ADN) -- 3 Artificial Neural Network -- 3.1 ANN Based Fault Diagnosis -- 4 Proposed Model and Case Studies -- 5 Result Analysis -- 5.1 Case Study-I -- 5.2 Case Study II -- 6 Conclusion -- References -- A Secure Communication Gateway with Parity Generator Implementation in QCA Platform -- 1 Introduction -- 1.1 Basics of QCA -- 2 Related Prior Work -- 3 Proposed QCA Parity Generator Circuit -- 4 Proposed Work for Secure Network Channel -- 5 Result and Discussion -- 6 Conclusion -- References -- VCI Construction and Shifting Strategy Based Steganography for 3D Images -- 1 Introduction -- 2 Related Works -- 3 Proposed Scheme -- 3.1 VCI Construction and Shifting Strategy -- 3.2 Embedding Procedure -- 3.3 Extraction Procedure -- 4 Experimental Results -- 5 Conclusion -- References -- Optimal MAC Scheduling Algorithm for Time-Sensitive Applications in Multi-UE Scenarios in 5G NR MmWave -- 1 Introduction -- 2 Literature Review -- 2.1 Round-robin Scheduling -- 2.2 Fair Scheduling -- 2.3 Proportional Fair Scheduler -- 2.4 Max Throughput Scheduler -- 3 Methodology -- 4 Results and Discussions.
5 Conclusion and Future Work -- References -- Computational Intelligence in Analytics -- N-Gram Feature Based Resume Classification Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Proposed Method -- 4 Experimental Results -- 5 Conclusion -- References -- Generating Equations from Math Word Problem Using Deep Learning Approach -- 1 Introduction -- 2 Related Works -- 3 Dataset -- 4 Proposed Method -- 5 Training -- 6 Result -- 7 Observation -- 8 Conclusion and Future Work -- References -- Clustering-Based Semi-supervised Technique for Credit Card Fraud Detection -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Preparation of Training Dataset -- 2.2 Formation of K-D Tree Based Model -- 3 Experiment and Results -- 4 Conclusion -- References -- Fake News Identification Through Natural Language Processing and Machine Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Dataset and Pre-processing -- 3.1 Dataset Used -- 3.2 Data Preprocessing -- 4 Feature Extraction -- 5 Result and Discussion -- 5.1 Results -- 6 Conclusion -- References -- An Empirical Analysis on Abstractive Text Summarization -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 System Architecture -- 4.1 Encoder-Decoder Architecture -- 5 Experimental Results -- 6 Conclusions and Future Scope -- References -- Facial Emotion Recognition in Static and Live Streaming Image Dataset Using CNN -- 1 Introduction -- 2 Proposed Work -- 2.1 Datasets -- 2.2 Proposed FER Model -- 3 Experimental Results -- 4 Conclusion -- References -- An UAV Assisted Need Assessment and Prediction System for COVID-19 Vaccination -- 1 Introduction -- 1.1 Motivation -- 1.2 Contribution -- 2 Objectives -- 3 Literature Survey -- 4 Proposed System -- 4.1 UAV Design -- 4.2 Android App Development -- 4.3 Data Collection -- 4.4 Data Storage -- 4.5 Data Analysis.
4.6 Proposed Prediction System.
Record Nr. UNINA-9910585785203321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Intelligence, Communications, and Business Analytics : Second International Conference, CICBA 2018, Kalyani, India, July 27–28, 2018, Revised Selected Papers, Part I / / edited by Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
Computational Intelligence, Communications, and Business Analytics : Second International Conference, CICBA 2018, Kalyani, India, July 27–28, 2018, Revised Selected Papers, Part I / / edited by Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (512 pages)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Data structures (Computer science)
Artificial intelligence
Computer networks
Optical data processing
Computers
Computer system failures
Data Structures and Information Theory
Artificial Intelligence
Computer Communication Networks
Image Processing and Computer Vision
Information Systems and Communication Service
System Performance and Evaluation
ISBN 981-13-8578-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computational Intelligence -- Signal Processing and Communications -- Microelectronics, Sensors, and Intelligent Networks -- Data Science & Advanced Data Analytics -- Intelligent Data Mining & Data Warehousing -- Computational Forensics (Privacy and Security). .
Record Nr. UNINA-9910350217903321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Intelligence, Communications, and Business Analytics : Second International Conference, CICBA 2018, Kalyani, India, July 27–28, 2018, Revised Selected Papers, Part II / / edited by Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
Computational Intelligence, Communications, and Business Analytics : Second International Conference, CICBA 2018, Kalyani, India, July 27–28, 2018, Revised Selected Papers, Part II / / edited by Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (515 pages) : illustrations (some color), charts
Disciplina 005.73
Collana Communications in Computer and Information Science
Soggetto topico Data structures (Computer science)
Computers
Artificial intelligence
Data protection
Computer organization
Data Structures and Information Theory
Information Systems and Communication Service
Artificial Intelligence
Security
Computer Systems Organization and Communication Networks
ISBN 981-13-8581-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Computational Intelligence -- Signal Processing and Communications -- Microelectronics, Sensors, and Intelligent Networks -- Data Science & Advanced Data Analytics -- Intelligent Data Mining & Data Warehousing -- Computational Forensics (Privacy and Security). .
Record Nr. UNINA-9910350218003321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part I / / edited by J. K. Mandal, Paramartha Dutta, Somnath Mukhopadhyay
Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part I / / edited by J. K. Mandal, Paramartha Dutta, Somnath Mukhopadhyay
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXXI, 595 p. 295 illus.)
Disciplina 004
Collana Communications in Computer and Information Science
Soggetto topico Data structures (Computer science)
Computer security
Computers
Data Structures and Information Theory
Systems and Data Security
Information Systems and Communication Service
ISBN 981-10-6427-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data science and advanced data analytics -- Signal processing and communications -- Microelectronics, sensors, intelligent networks -- Computational forensics (privacy and security) -- Computational intelligence in bio-computing -- Computational intelligence in mobile and quantum computing -- Intelligent data mining and data warehousing -- Computational intelligence.
Record Nr. UNINA-9910254843003321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part II / / edited by J. K. Mandal, Paramartha Dutta, Somnath Mukhopadhyay
Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part II / / edited by J. K. Mandal, Paramartha Dutta, Somnath Mukhopadhyay
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXXI, 631 p. 307 illus.)
Disciplina 004
Collana Communications in Computer and Information Science
Soggetto topico Data structures (Computer science)
Computer security
Computers
Data Structures and Information Theory
Systems and Data Security
Information Systems and Communication Service
ISBN 981-10-6430-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data science and advanced data analytics -- Signal processing and communications -- Microelectronics, sensors, intelligent networks -- Computational forensics (privacy and security) -- Computational intelligence in bio-computing -- Computational intelligence in mobile and quantum computing -- Intelligent data mining and data warehousing -- Computational intelligence.
Record Nr. UNINA-9910254847603321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui