Applications of Internet of Things : Proceedings of ICCCIOT 2020 / / edited by Jyotsna K. Mandal, Somnath Mukhopadhyay, Alak Roy
| Applications of Internet of Things : Proceedings of ICCCIOT 2020 / / edited by Jyotsna K. Mandal, Somnath Mukhopadhyay, Alak Roy |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (258 pages) : illustrations |
| Disciplina | 361.32 |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Artificial intelligence Computer engineering Internet of things Embedded computer systems Computer software Computational Intelligence Artificial Intelligence Cyber-physical systems, IoT Professional Computing |
| ISBN | 981-15-6198-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Chapter 1.Design of an Industrial Internet of Things enabled Energy Management System of a Grid Connected Solar-Wind Hybrid System based Battery Swapping Charging Station for Electric Vehicle -- Chapter 2.Modeling and Implementation of Advanced Electronic Circuit Breaker Technique for Protection -- Chapter 3. Peristaltic Transport of Casson Fluid in a Porous Channel in Presence of Hall Current -- Chapter 4.Fingerprint Authentication System for BaaS Protocol -- Chapter 5.Design of a Low Cost Li-Fi System Using Table Lamp -- Chapter 6. A Study of Micro Ring Resonator Based Optical Sensor -- Chapter 7. An Efficient Decision Fusion Scheme for Cooperative Spectrum Sensing in Cognitive Radio Networks -- Chapter 8. Detection of early Breast Cancer using A-priori rule mining and Machine learning approaches -- Chapter 9. Effect of Linear Features to Determination of Sleep Stages Classification from Dual-Channel of EEG signal using Machine Learning Techniques -- Chapter 10. A Tree Multicast Routing based on Fuzzy mathematics in Mobile Ad-hoc Networks. |
| Record Nr. | UNINA-9910484222803321 |
| Singapore : , : Springer Singapore : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational Intelligence in Communications and Business Analytics : 6th International Conference, CICBA 2024, Patna, India, January 23–25, 2024, Revised Selected Papers, Part III / / edited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta
| Computational Intelligence in Communications and Business Analytics : 6th International Conference, CICBA 2024, Patna, India, January 23–25, 2024, Revised Selected Papers, Part III / / edited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta |
| Autore | Singh Jyoti Prakash |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (475 pages) |
| Disciplina |
005.73
003.54 |
| Altri autori (Persone) |
SinghMaheshwari Prasad
SinghAmit Kumar MukhopadhyaySomnath MandalJyotsna K DuttaParamartha |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data structures (Computer science)
Information theory Computer engineering Computer networks Artificial intelligence Application software Data Structures and Information Theory Computer Engineering and Networks Computer Communication Networks Artificial Intelligence Computer and Information Systems Applications |
| ISBN |
9783031813368
3031813367 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Theories and Applications to Data Communications and Analytics -- Optuna and Decision Tree Based Network Intrusion Detection System for Internet of Things -- Restful Architecture for Achieving Syntactic Interoperability in IoT Systems -- Energy Optimized Clustering and Cluster Head Selection in WSNs an MDB-KMC and Cuttlefish Approach -- D2Stege Using Decteron2 to Segment Medical Image with Security Through Steganography and Encryption -- A Novel Chaos and DNA Computing for Medical Image Encryption -- Session Based Symmetric Key Cryptography Using Digital Circuit Based on Two Left Shift -- Digital Images Encryption Using PWLCM and Sine Map -- Hybrid Humor Classification and Detection Based on Machine Learning -- Data Anomaly Detection in Wireless Sensor Network Using Principal Component Analysis and Decision Tree -- Industry Monitoring with Data Logger in Google Sheet Using Respberry Pi -- ECCNN A Novel Efficient Compressed Convolutional Neural Network -- A Modified Low Energy Consuming Mac Protocol for Wireless Sensor Networks -- Text Data Security Through Hybrid Method Using Visual Cryptography and Image Steganography Algorithms -- CASCAIN Cascaded Attention Infused Networks for Named Entity Recognition in Code Mixed Setting -- Secure Non Fungible Token Marketplaces Using ERC 721 -- A Detailed Comparative Study of Regression Models for Stock Price Prediction -- An Optimal Cluster Head Selection in UAV Networks Using Grey Wolf Optimization -- Multi Modal Probabilistic Conditional Generative Adversarial Networks for Electric Vehicles Range Prediction -- Entry Point Adaptive Keystroke Dynamics Based User Authentication for Evolving Passwords -- Malicious node detection in Industrial internet of things using swarm based optimization algorithm A cyber security perspective -- Is software defined smart grid secure An analysis of security issues and solutions -- Energy Efficiency Optimization in IoT Based Machine Learning for Smart Environmental Monitoring -- Smart Tech Cane Navigator (STCN) for Physically Challenged -- A Real Time Machine Learning based Statistical Approach for Power Generation Prediction for Solar PV Plant -- CipherCraft An Integrated Approach to Cryptographic Data Security in Modern Computing Environments -- Unveiling Dynamics of Structural Breaks in Global Stock Markets and Implications for Forecasting Accuracy. |
| Record Nr. | UNINA-9910983297803321 |
Singh Jyoti Prakash
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational Intelligence in Communications and Business Analytics : 6th International Conference, CICBA 2024, Patna, India, January 23–25, 2024, Revised Selected Papers, Part II / / edited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta
| Computational Intelligence in Communications and Business Analytics : 6th International Conference, CICBA 2024, Patna, India, January 23–25, 2024, Revised Selected Papers, Part II / / edited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta |
| Autore | Singh Jyoti Prakash |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (453 pages) |
| Disciplina |
005.73
003.54 |
| Altri autori (Persone) |
SinghMaheshwari Prasad
SinghAmit Kumar MukhopadhyaySomnath MandalJyotsna K DuttaParamartha |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data structures (Computer science)
Information theory Computer engineering Computer networks Artificial intelligence Application software Data Structures and Information Theory Computer Engineering and Networks Computer Communication Networks Artificial Intelligence Computer and Information Systems Applications |
| ISBN |
9783031813399
3031813391 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Computational Intelligence II -- Multimodal Skin Cancer Classification Optimized Convolutional Network with Customized Loss and RNN Based FCNN Fusion -- Deep Learning Based MLP Model in Detection of Cotton Plant Leaf Disease -- Enhancing Drug Candidate Generation Comparing Genetic Algorithm And WGAN GP Approaches -- Predicting Employee Job Satisfaction by Using Vector Space Model -- Simplernn Based Human Emotion Recognition Using EEFG Signals -- Improving Melanoma Classification Using Transfer Learning Based Wavelet Features -- Research Challenges and Future Perspective in Semantic Segmentation of Brain Stroke Lesions in Magnetic Resonance Imaging -- Revolutionizing Suicide Ideation Detection in Social Media An Ensemble Optimized Bi GRU With Attention Approach -- A Computer Vision Model Utilizing Autoencoders for Surface Defect Recognition -- A Study on the Impact of Partitioning on Community Detection in Graph Networks -- Load Combination Optimization for Trailer Design using Genetic Algorithm -- Features Extraction from Android Apps Using Reverse Engineering -- Efficient Near Infrared Spectroscopy Based Feature Selection of Tannic Acid for Black Tea Evaluation -- Taming the Monkeypox Outbreak with Deep Learning for Skin Lesion Detection -- A Comprehensive Review of AI based Low Back Pain Assessment and Rehabilitation -- Analysis of Multidomain Abstractive Summarization Using Salience Allocation -- Detection and Localization of Malignant Cells from Surgical Images for Robot Assisted Invasive Surgery using Deep Learning -- An Intelligent Integrated Prediction Based Approach for Heart Disease Detection A Comprehensive Study -- Multi Modal Approach for Ethereum Smart Contract Vulnerability Detection -- Kcst Net Deep Learning Based Classification of Kidney Diseases Using CT Images -- High Yield Model Compression Paradigms for Low Footprint Signal Classification Supplementing Resource Constrained Embedded Environments -- Regularizing CNNs using Confusion Penalty Based Label Smoothing for Histopathology Images -- Leveraging Generative Pre Trained Models and Discriminative Pre Trained Language Models for Sentiment Analysis -- Advancing Lung Cancer Diagnosis and Prognosis through Machine Learning Algorithm -- Influent sewage water classification using machine learning -- Fine grained Image Classification on Skin Cancer Dataset -- Learning based soiling loss estimation in solar panels and solar panel soiling database generation -- CNN ML Framework Based Predominant Musical Instrument Recognition Using Mel Spectrogram. |
| Record Nr. | UNINA-9910983481703321 |
Singh Jyoti Prakash
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational Intelligence in Communications and Business Analytics : 6th International Conference, CICBA 2024, Patna, India, January 23–25, 2024, Revised Selected Papers, Part I / / edited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta
| Computational Intelligence in Communications and Business Analytics : 6th International Conference, CICBA 2024, Patna, India, January 23–25, 2024, Revised Selected Papers, Part I / / edited by Jyoti Prakash Singh, Maheshwari Prasad Singh, Amit Kumar Singh, Somnath Mukhopadhyay, Jyotsna K. Mandal, Paramartha Dutta |
| Autore | Singh Jyoti Prakash |
| Edizione | [1st ed. 2025.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 |
| Descrizione fisica | 1 online resource (481 pages) |
| Disciplina |
005.73
003.54 |
| Altri autori (Persone) |
SinghMaheshwari Prasad
SinghAmit Kumar MukhopadhyaySomnath MandalJyotsna K DuttaParamartha |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data structures (Computer science)
Information theory Computer engineering Computer networks Artificial intelligence Application software Data Structures and Information Theory Computer Engineering and Networks Computer Communication Networks Artificial Intelligence Computer and Information Systems Applications |
| ISBN |
9783031813429
3031813421 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Computational Intelligence I -- Depression Clinic People's Mental Health Prediction Using Information from Online Social Media Networks (OSN) -- A Novel Hindi Voice Based Assistant System Architecture for E Commerce -- Early Classification of Alzheimer’s Disease Using Deep Learning Technique -- Spoken Metro Station Name Identification A Deep Learning Based Approach -- EDR DT A Novel Energy Function Based Enhanced Decision Tree Model for Classification -- Enhancing Agriculture Using Machine Learning Powered Smart Agricultural Systems -- Classification Of Tomato Maturity Levels An Efficient Approach with Statistical Features -- Iot Based Multifunctional Agriculture Monitoring and Smart Irrigation System -- Covid Ct H Unet A Novel Covid 19 CT Segmentation Network Based on Attention Mechanism and Bi Category Hybrid Loss -- A Review on The Efficacy of Different Data Augmentation Technique for Deep Learning -- MLAEDensenet Multi Layer Attention Enhanced Densenet for Efficient Video Action Recognition -- Word Sense Disambiguation for Bodo Language Using Simplified Lesk -- Smali Code Based Fake Application Detection -- From Haze and Smoke to Clarity An Integration of Deep Learning and Atmospheric Model -- Integrating BiLSTM BiGRU with Autoencoders for Enhanced Feature Representation and Deep Q Networks for Clinical Event Classification in Medical Records -- Agile Development Using A Hybrid Approach For Cost Estimation of IT Projects -- Lung Cancer Diagnosis Using Image Enhancement and Machine Learning Methods -- An Ml Based Hybrid Model for IIoT Attack Classification in Industry 4.0 Ecosystem -- Design of an explainable AI Model with Q Convolutional Neural Networks for Patient Health Reporting -- Convolutional Neural Networks for Patient -- Enhancing Visual Question Answering with Beam Search in Transformer Models -- Analyzing The Effect of Coffee Consumption on Visual Pathway Using Visual Evoked Potential (VEP) Signals and Machine Learning Algorithms -- A Survey on Machine Learning Techniques for Recognizing Human Activities Using Smartphone Data -- Digital Twin for Diabetes Management Using System Dynamics Simulation The Case of India -- Analysis Of Occupational Stress Effects and Coping Among Prison Officers A Case of RAK Prison Centre, United Arab Emirates -- Custom Ensemble Machine Learning Algorithm for Interactive Symptom Based Disease Prediction -- Leveraging Handwriting Dynamics, Explainable AI And Machine Learning for Alzheimer Prediction -- Machine Learning Powered Insights A Comprehensive Survey on Pcos Detection and Diagnosis. |
| Record Nr. | UNINA-9910983376403321 |
Singh Jyoti Prakash
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational intelligence in communications and business analytics : 4th international conference, CICBA 2022, Silchar, India, January 7-8, 2022 : revised selected papers / / edited by Somnath Mukhopadhyay [and four others]
| Computational intelligence in communications and business analytics : 4th international conference, CICBA 2022, Silchar, India, January 7-8, 2022 : revised selected papers / / edited by Somnath Mukhopadhyay [and four others] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
| Descrizione fisica | 1 online resource (460 pages) |
| Disciplina | 006.3 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico | Computational intelligence |
| ISBN | 3-031-10766-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Computational Intelligence -- A Brief Review on Multi-Attribute Decision Making in the Emerging Fields of Computer Science -- 1 Introduction -- 2 An Overview of MADM and Its Associated Techniques -- 2.1 Outranking Methods -- 2.2 Ranking Methods -- 2.3 Other Methods -- 2.4 Fuzzy and Hybrid Methods -- 3 Assessment of MADM Approaches in Different Domains -- 3.1 MADM Applications in the Field of Cloud Computing -- 3.2 MADM Applications in the Field of IoT -- 3.3 MADM Applications in the Field of Big Data -- 4 Discussion -- 5 Conclusion -- References -- Statistical and Syllabification Based Model for Nepali Machine Transliteration -- 1 Introduction -- 2 Related Works -- 3 Preprocessing of Corpus for Transliteration -- 3.1 Word Splitter -- 3.2 Syllabification -- 3.3 Truecasing -- 4 Proposed English-Nepali Transliteration System -- 4.1 Implementation -- 5 Results and Discussion -- 6 Conclusion -- References -- Learning Based Image Classification Techniques -- 1 Introduction -- 2 Few Shot Learning (FSL) -- 3 One Shot Learning (OSL) -- 4 Zero Shot Learning (ZSL) -- 5 Result Comparison of Different Methods with Different Datasets -- 6 Summary -- 7 Conclusion -- References -- eXtreme Gradient Boosting Scheme for Fundus Vessels Separation -- 1 Introduction -- 2 Feature Extraction -- 2.1 32 Gabor Filters -- 2.2 The Different Edge Detectors -- 2.3 Blurring Methods -- 3 XGBoost -- 3.1 Decision Trees -- 3.2 Tree Boosting -- 3.3 XGBoost -- 4 Algorithm: Way of Working -- 5 Analysis and Evaluation of Results -- 6 Future Prospects and Conclusion -- References -- Deep-learning Based Autoencoder Model for Label Distribution Learning -- 1 Introduction -- 2 Methodology -- 2.1 Autoencoder -- 3 DL-based LDL Model -- 4 Experimental Datasets, Results and Analysis -- 4.1 Training Protocol -- 4.2 Datasets.
4.3 Result Comparisons -- 5 Conclusion -- References -- A Secure Image Watermarking Technique Using Chinese Remainder Theorem in Integer Wavelet Transformation Domain -- 1 Introduction -- 2 Literature Review -- 3 Chinese Remainder Theorem (CRT) and Integer Wavelet Transform (IWT) -- 3.1 Chinese Remainder Theorem (CRT) -- 3.2 Integer Wavelet Transform (IWT) -- 4 Proposed Scheme -- 4.1 Embedding Procedure -- 4.2 Extraction Process -- 5 Experiment and Comparative Evaluation -- 5.1 Imperceptibility Analysis -- 5.2 Robustness Analysis -- 6 Conclusion -- References -- A Dual Image Based Data Hiding Scheme Based on Difference of Pixel Values in Integer Wavelet Transform Domain -- 1 Introduction -- 2 Literature Review -- 3 Integer Wavelet Transform and Center Folding Strategy -- 3.1 Integer Wavelet Transform (IWT) -- 3.2 Center Folding Strategy -- 4 The Proposed Scheme -- 4.1 Embedding Procedure -- 4.2 Extraction Procedure -- 5 Experiment Results and Analysis -- 5.1 Imperceptibility Analysis -- 5.2 Robustness Analysis -- 6 Conclusion -- References -- An IWT Based Reversible Watermarking Scheme Using Lagrange Interpolation Polynomial -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Secret Sharing -- 4 Proposed Scheme -- 4.1 Embedding Process -- 4.2 Extraction Process -- 5 Experimental Analysis and Discussion -- 5.1 Imperceptibility Analysis -- 5.2 Complexity -- 6 Conclusion -- References -- A New Image Encryption Based on Two Chaotic Maps and Affine Transform -- 1 Introduction -- 2 Preliminaries -- 2.1 Cubic Map -- 2.2 Hénon Map -- 2.3 Affine Ciphering Technique -- 2.4 Nonlinear Key Mixing (Nmix) -- 3 Proposed Scheme -- 3.1 Image Substitution -- 3.2 Key Expansion -- 3.3 Image Encryption -- 4 Experimental Results, Security Analysis and Comparative Analysis -- 4.1 Encryption Decryption Test -- 4.2 Key Space Analysis. 4.3 Resistance Against Differential Attack -- 4.4 Key Sensitivity -- 4.5 Histogram Analysis -- 4.6 Correlation, Entropy and PSNR Analyses -- 4.7 Test of Randomness -- 4.8 Time Complexity of Encryption and Key Generation Schemes -- 4.9 Comparative Analysis -- 5 Conclusion -- References -- miRNA and mRNA Expression Analysis of Human Breast Cancer Subtypes to Identify New Markers -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Dataset -- 3.2 Pre-processing of miRNA Expression Profiles to Find Differentially Expressed miRNAs for Each Subtype -- 3.3 Integrated Analysis of miRNA and mRNA Expressions Data to Select Relevant miRNA Targets -- 3.4 Identify Significantly Differentially Expressed miRNAs and Target mRNAs in Each Subtype of Breast Cancer -- 3.5 Enriched Pathways Identification for Significantly Differentially Expressed miRNA Targets -- 3.6 Investigate the Biological Significance of miRNA/mRNA Signatures in Clinico-Pathological Characteristics -- 4 Results -- 4.1 Identify Significantly Differentially Expressed miRNAs and Target mRNAs -- 4.2 KEGG Pathways Associated with Significantly Differentially Expressed miRNA Targets -- 4.3 Gene Ontology Analysis -- 4.4 Survival Analysis -- 5 Conclusions -- References -- A Survey on Computational Intelligence Techniques in Learning and Memory -- 1 Introduction -- 2 Computational Intelligence Techniques -- 2.1 Recurrent Neural Network -- 2.2 Long Short Term Memory -- 2.3 Convolutional Neural Network -- 3 Related Work -- 4 Conclusion -- References -- Enhanced Marker-Controlled Watershed Segmentation Algorithm for Brain Tumor Segmentation -- 1 Introduction -- 2 Literature Survey -- 3 Enhanced Marker-Controlled Watershed Segmentation Algorithm -- 4 Results and Discussion -- 5 Conclusion -- References -- Computational Intelligence in Communication. GSA Based FOPID Controller Tuning in NSOF Domain for a Class of Nonlinear Systems -- 1 Introduction -- 2 Problem Formulation -- 3 Operators of Non-Sinusoidal Orthogonal Function Domain -- 3.1 Hybrid Function Set -- 3.2 Operational Matrix in HF Domain -- 4 Design of FOPID Controller -- 4.1 FOPID Controller in NSOF Domain -- 4.2 System Dynamics in NSOF Domain -- 4.3 Stability Analysis -- 5 Tuning of FOPID Controller via GSA -- 5.1 Gravitational Search Algorithm -- 5.2 PID Controller Tuning -- 6 Simulation Results -- 6.1 Conventional FOPID Controller -- 6.2 NSOF Domain-Based FOPID Controller -- 7 Conclusion -- References -- Artificial Neural Network for Fault Diagnosis in Active Distribution Network -- 1 Introduction -- 2 Fault Diagnosis in Active Distribution Network (ADN) -- 3 Artificial Neural Network -- 3.1 ANN Based Fault Diagnosis -- 4 Proposed Model and Case Studies -- 5 Result Analysis -- 5.1 Case Study-I -- 5.2 Case Study II -- 6 Conclusion -- References -- A Secure Communication Gateway with Parity Generator Implementation in QCA Platform -- 1 Introduction -- 1.1 Basics of QCA -- 2 Related Prior Work -- 3 Proposed QCA Parity Generator Circuit -- 4 Proposed Work for Secure Network Channel -- 5 Result and Discussion -- 6 Conclusion -- References -- VCI Construction and Shifting Strategy Based Steganography for 3D Images -- 1 Introduction -- 2 Related Works -- 3 Proposed Scheme -- 3.1 VCI Construction and Shifting Strategy -- 3.2 Embedding Procedure -- 3.3 Extraction Procedure -- 4 Experimental Results -- 5 Conclusion -- References -- Optimal MAC Scheduling Algorithm for Time-Sensitive Applications in Multi-UE Scenarios in 5G NR MmWave -- 1 Introduction -- 2 Literature Review -- 2.1 Round-robin Scheduling -- 2.2 Fair Scheduling -- 2.3 Proportional Fair Scheduler -- 2.4 Max Throughput Scheduler -- 3 Methodology -- 4 Results and Discussions. 5 Conclusion and Future Work -- References -- Computational Intelligence in Analytics -- N-Gram Feature Based Resume Classification Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Proposed Method -- 4 Experimental Results -- 5 Conclusion -- References -- Generating Equations from Math Word Problem Using Deep Learning Approach -- 1 Introduction -- 2 Related Works -- 3 Dataset -- 4 Proposed Method -- 5 Training -- 6 Result -- 7 Observation -- 8 Conclusion and Future Work -- References -- Clustering-Based Semi-supervised Technique for Credit Card Fraud Detection -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Preparation of Training Dataset -- 2.2 Formation of K-D Tree Based Model -- 3 Experiment and Results -- 4 Conclusion -- References -- Fake News Identification Through Natural Language Processing and Machine Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Dataset and Pre-processing -- 3.1 Dataset Used -- 3.2 Data Preprocessing -- 4 Feature Extraction -- 5 Result and Discussion -- 5.1 Results -- 6 Conclusion -- References -- An Empirical Analysis on Abstractive Text Summarization -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 System Architecture -- 4.1 Encoder-Decoder Architecture -- 5 Experimental Results -- 6 Conclusions and Future Scope -- References -- Facial Emotion Recognition in Static and Live Streaming Image Dataset Using CNN -- 1 Introduction -- 2 Proposed Work -- 2.1 Datasets -- 2.2 Proposed FER Model -- 3 Experimental Results -- 4 Conclusion -- References -- An UAV Assisted Need Assessment and Prediction System for COVID-19 Vaccination -- 1 Introduction -- 1.1 Motivation -- 1.2 Contribution -- 2 Objectives -- 3 Literature Survey -- 4 Proposed System -- 4.1 UAV Design -- 4.2 Android App Development -- 4.3 Data Collection -- 4.4 Data Storage -- 4.5 Data Analysis. 4.6 Proposed Prediction System. |
| Record Nr. | UNISA-996483157203316 |
| Cham, Switzerland : , : Springer, , [2022] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Computational intelligence in communications and business analytics : 4th international conference, CICBA 2022, Silchar, India, January 7-8, 2022 : revised selected papers / / edited by Somnath Mukhopadhyay [and four others]
| Computational intelligence in communications and business analytics : 4th international conference, CICBA 2022, Silchar, India, January 7-8, 2022 : revised selected papers / / edited by Somnath Mukhopadhyay [and four others] |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
| Descrizione fisica | 1 online resource (460 pages) |
| Disciplina | 006.3 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico | Computational intelligence |
| ISBN | 3-031-10766-7 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Computational Intelligence -- A Brief Review on Multi-Attribute Decision Making in the Emerging Fields of Computer Science -- 1 Introduction -- 2 An Overview of MADM and Its Associated Techniques -- 2.1 Outranking Methods -- 2.2 Ranking Methods -- 2.3 Other Methods -- 2.4 Fuzzy and Hybrid Methods -- 3 Assessment of MADM Approaches in Different Domains -- 3.1 MADM Applications in the Field of Cloud Computing -- 3.2 MADM Applications in the Field of IoT -- 3.3 MADM Applications in the Field of Big Data -- 4 Discussion -- 5 Conclusion -- References -- Statistical and Syllabification Based Model for Nepali Machine Transliteration -- 1 Introduction -- 2 Related Works -- 3 Preprocessing of Corpus for Transliteration -- 3.1 Word Splitter -- 3.2 Syllabification -- 3.3 Truecasing -- 4 Proposed English-Nepali Transliteration System -- 4.1 Implementation -- 5 Results and Discussion -- 6 Conclusion -- References -- Learning Based Image Classification Techniques -- 1 Introduction -- 2 Few Shot Learning (FSL) -- 3 One Shot Learning (OSL) -- 4 Zero Shot Learning (ZSL) -- 5 Result Comparison of Different Methods with Different Datasets -- 6 Summary -- 7 Conclusion -- References -- eXtreme Gradient Boosting Scheme for Fundus Vessels Separation -- 1 Introduction -- 2 Feature Extraction -- 2.1 32 Gabor Filters -- 2.2 The Different Edge Detectors -- 2.3 Blurring Methods -- 3 XGBoost -- 3.1 Decision Trees -- 3.2 Tree Boosting -- 3.3 XGBoost -- 4 Algorithm: Way of Working -- 5 Analysis and Evaluation of Results -- 6 Future Prospects and Conclusion -- References -- Deep-learning Based Autoencoder Model for Label Distribution Learning -- 1 Introduction -- 2 Methodology -- 2.1 Autoencoder -- 3 DL-based LDL Model -- 4 Experimental Datasets, Results and Analysis -- 4.1 Training Protocol -- 4.2 Datasets.
4.3 Result Comparisons -- 5 Conclusion -- References -- A Secure Image Watermarking Technique Using Chinese Remainder Theorem in Integer Wavelet Transformation Domain -- 1 Introduction -- 2 Literature Review -- 3 Chinese Remainder Theorem (CRT) and Integer Wavelet Transform (IWT) -- 3.1 Chinese Remainder Theorem (CRT) -- 3.2 Integer Wavelet Transform (IWT) -- 4 Proposed Scheme -- 4.1 Embedding Procedure -- 4.2 Extraction Process -- 5 Experiment and Comparative Evaluation -- 5.1 Imperceptibility Analysis -- 5.2 Robustness Analysis -- 6 Conclusion -- References -- A Dual Image Based Data Hiding Scheme Based on Difference of Pixel Values in Integer Wavelet Transform Domain -- 1 Introduction -- 2 Literature Review -- 3 Integer Wavelet Transform and Center Folding Strategy -- 3.1 Integer Wavelet Transform (IWT) -- 3.2 Center Folding Strategy -- 4 The Proposed Scheme -- 4.1 Embedding Procedure -- 4.2 Extraction Procedure -- 5 Experiment Results and Analysis -- 5.1 Imperceptibility Analysis -- 5.2 Robustness Analysis -- 6 Conclusion -- References -- An IWT Based Reversible Watermarking Scheme Using Lagrange Interpolation Polynomial -- 1 Introduction -- 2 Related Works -- 3 Preliminaries -- 3.1 Secret Sharing -- 4 Proposed Scheme -- 4.1 Embedding Process -- 4.2 Extraction Process -- 5 Experimental Analysis and Discussion -- 5.1 Imperceptibility Analysis -- 5.2 Complexity -- 6 Conclusion -- References -- A New Image Encryption Based on Two Chaotic Maps and Affine Transform -- 1 Introduction -- 2 Preliminaries -- 2.1 Cubic Map -- 2.2 Hénon Map -- 2.3 Affine Ciphering Technique -- 2.4 Nonlinear Key Mixing (Nmix) -- 3 Proposed Scheme -- 3.1 Image Substitution -- 3.2 Key Expansion -- 3.3 Image Encryption -- 4 Experimental Results, Security Analysis and Comparative Analysis -- 4.1 Encryption Decryption Test -- 4.2 Key Space Analysis. 4.3 Resistance Against Differential Attack -- 4.4 Key Sensitivity -- 4.5 Histogram Analysis -- 4.6 Correlation, Entropy and PSNR Analyses -- 4.7 Test of Randomness -- 4.8 Time Complexity of Encryption and Key Generation Schemes -- 4.9 Comparative Analysis -- 5 Conclusion -- References -- miRNA and mRNA Expression Analysis of Human Breast Cancer Subtypes to Identify New Markers -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Dataset -- 3.2 Pre-processing of miRNA Expression Profiles to Find Differentially Expressed miRNAs for Each Subtype -- 3.3 Integrated Analysis of miRNA and mRNA Expressions Data to Select Relevant miRNA Targets -- 3.4 Identify Significantly Differentially Expressed miRNAs and Target mRNAs in Each Subtype of Breast Cancer -- 3.5 Enriched Pathways Identification for Significantly Differentially Expressed miRNA Targets -- 3.6 Investigate the Biological Significance of miRNA/mRNA Signatures in Clinico-Pathological Characteristics -- 4 Results -- 4.1 Identify Significantly Differentially Expressed miRNAs and Target mRNAs -- 4.2 KEGG Pathways Associated with Significantly Differentially Expressed miRNA Targets -- 4.3 Gene Ontology Analysis -- 4.4 Survival Analysis -- 5 Conclusions -- References -- A Survey on Computational Intelligence Techniques in Learning and Memory -- 1 Introduction -- 2 Computational Intelligence Techniques -- 2.1 Recurrent Neural Network -- 2.2 Long Short Term Memory -- 2.3 Convolutional Neural Network -- 3 Related Work -- 4 Conclusion -- References -- Enhanced Marker-Controlled Watershed Segmentation Algorithm for Brain Tumor Segmentation -- 1 Introduction -- 2 Literature Survey -- 3 Enhanced Marker-Controlled Watershed Segmentation Algorithm -- 4 Results and Discussion -- 5 Conclusion -- References -- Computational Intelligence in Communication. GSA Based FOPID Controller Tuning in NSOF Domain for a Class of Nonlinear Systems -- 1 Introduction -- 2 Problem Formulation -- 3 Operators of Non-Sinusoidal Orthogonal Function Domain -- 3.1 Hybrid Function Set -- 3.2 Operational Matrix in HF Domain -- 4 Design of FOPID Controller -- 4.1 FOPID Controller in NSOF Domain -- 4.2 System Dynamics in NSOF Domain -- 4.3 Stability Analysis -- 5 Tuning of FOPID Controller via GSA -- 5.1 Gravitational Search Algorithm -- 5.2 PID Controller Tuning -- 6 Simulation Results -- 6.1 Conventional FOPID Controller -- 6.2 NSOF Domain-Based FOPID Controller -- 7 Conclusion -- References -- Artificial Neural Network for Fault Diagnosis in Active Distribution Network -- 1 Introduction -- 2 Fault Diagnosis in Active Distribution Network (ADN) -- 3 Artificial Neural Network -- 3.1 ANN Based Fault Diagnosis -- 4 Proposed Model and Case Studies -- 5 Result Analysis -- 5.1 Case Study-I -- 5.2 Case Study II -- 6 Conclusion -- References -- A Secure Communication Gateway with Parity Generator Implementation in QCA Platform -- 1 Introduction -- 1.1 Basics of QCA -- 2 Related Prior Work -- 3 Proposed QCA Parity Generator Circuit -- 4 Proposed Work for Secure Network Channel -- 5 Result and Discussion -- 6 Conclusion -- References -- VCI Construction and Shifting Strategy Based Steganography for 3D Images -- 1 Introduction -- 2 Related Works -- 3 Proposed Scheme -- 3.1 VCI Construction and Shifting Strategy -- 3.2 Embedding Procedure -- 3.3 Extraction Procedure -- 4 Experimental Results -- 5 Conclusion -- References -- Optimal MAC Scheduling Algorithm for Time-Sensitive Applications in Multi-UE Scenarios in 5G NR MmWave -- 1 Introduction -- 2 Literature Review -- 2.1 Round-robin Scheduling -- 2.2 Fair Scheduling -- 2.3 Proportional Fair Scheduler -- 2.4 Max Throughput Scheduler -- 3 Methodology -- 4 Results and Discussions. 5 Conclusion and Future Work -- References -- Computational Intelligence in Analytics -- N-Gram Feature Based Resume Classification Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Proposed Method -- 4 Experimental Results -- 5 Conclusion -- References -- Generating Equations from Math Word Problem Using Deep Learning Approach -- 1 Introduction -- 2 Related Works -- 3 Dataset -- 4 Proposed Method -- 5 Training -- 6 Result -- 7 Observation -- 8 Conclusion and Future Work -- References -- Clustering-Based Semi-supervised Technique for Credit Card Fraud Detection -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Preparation of Training Dataset -- 2.2 Formation of K-D Tree Based Model -- 3 Experiment and Results -- 4 Conclusion -- References -- Fake News Identification Through Natural Language Processing and Machine Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Dataset and Pre-processing -- 3.1 Dataset Used -- 3.2 Data Preprocessing -- 4 Feature Extraction -- 5 Result and Discussion -- 5.1 Results -- 6 Conclusion -- References -- An Empirical Analysis on Abstractive Text Summarization -- 1 Introduction -- 2 Related Work -- 3 Dataset -- 4 System Architecture -- 4.1 Encoder-Decoder Architecture -- 5 Experimental Results -- 6 Conclusions and Future Scope -- References -- Facial Emotion Recognition in Static and Live Streaming Image Dataset Using CNN -- 1 Introduction -- 2 Proposed Work -- 2.1 Datasets -- 2.2 Proposed FER Model -- 3 Experimental Results -- 4 Conclusion -- References -- An UAV Assisted Need Assessment and Prediction System for COVID-19 Vaccination -- 1 Introduction -- 1.1 Motivation -- 1.2 Contribution -- 2 Objectives -- 3 Literature Survey -- 4 Proposed System -- 4.1 UAV Design -- 4.2 Android App Development -- 4.3 Data Collection -- 4.4 Data Storage -- 4.5 Data Analysis. 4.6 Proposed Prediction System. |
| Record Nr. | UNINA-9910585785203321 |
| Cham, Switzerland : , : Springer, , [2022] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational Intelligence, Communications, and Business Analytics : Second International Conference, CICBA 2018, Kalyani, India, July 27–28, 2018, Revised Selected Papers, Part I / / edited by Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
| Computational Intelligence, Communications, and Business Analytics : Second International Conference, CICBA 2018, Kalyani, India, July 27–28, 2018, Revised Selected Papers, Part I / / edited by Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (512 pages) |
| Disciplina | 006.3 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data structures (Computer science)
Artificial intelligence Computer networks Optical data processing Computers Computer system failures Data Structures and Information Theory Artificial Intelligence Computer Communication Networks Image Processing and Computer Vision Information Systems and Communication Service System Performance and Evaluation |
| ISBN | 981-13-8578-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Computational Intelligence -- Signal Processing and Communications -- Microelectronics, Sensors, and Intelligent Networks -- Data Science & Advanced Data Analytics -- Intelligent Data Mining & Data Warehousing -- Computational Forensics (Privacy and Security). . |
| Record Nr. | UNINA-9910350217903321 |
| Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational Intelligence, Communications, and Business Analytics : Second International Conference, CICBA 2018, Kalyani, India, July 27–28, 2018, Revised Selected Papers, Part II / / edited by Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta
| Computational Intelligence, Communications, and Business Analytics : Second International Conference, CICBA 2018, Kalyani, India, July 27–28, 2018, Revised Selected Papers, Part II / / edited by Jyotsna Kumar Mandal, Somnath Mukhopadhyay, Paramartha Dutta, Kousik Dasgupta |
| Edizione | [1st ed. 2019.] |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
| Descrizione fisica | 1 online resource (515 pages) : illustrations (some color), charts |
| Disciplina | 005.73 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data structures (Computer science)
Computers Artificial intelligence Data protection Computer organization Data Structures and Information Theory Information Systems and Communication Service Artificial Intelligence Security Computer Systems Organization and Communication Networks |
| ISBN | 981-13-8581-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Computational Intelligence -- Signal Processing and Communications -- Microelectronics, Sensors, and Intelligent Networks -- Data Science & Advanced Data Analytics -- Intelligent Data Mining & Data Warehousing -- Computational Forensics (Privacy and Security). . |
| Record Nr. | UNINA-9910350218003321 |
| Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part I / / edited by J. K. Mandal, Paramartha Dutta, Somnath Mukhopadhyay
| Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part I / / edited by J. K. Mandal, Paramartha Dutta, Somnath Mukhopadhyay |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XXXI, 595 p. 295 illus.) |
| Disciplina | 004 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data structures (Computer science)
Computer security Computers Data Structures and Information Theory Systems and Data Security Information Systems and Communication Service |
| ISBN | 981-10-6427-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Data science and advanced data analytics -- Signal processing and communications -- Microelectronics, sensors, intelligent networks -- Computational forensics (privacy and security) -- Computational intelligence in bio-computing -- Computational intelligence in mobile and quantum computing -- Intelligent data mining and data warehousing -- Computational intelligence. |
| Record Nr. | UNINA-9910254843003321 |
| Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part II / / edited by J. K. Mandal, Paramartha Dutta, Somnath Mukhopadhyay
| Computational Intelligence, Communications, and Business Analytics : First International Conference, CICBA 2017, Kolkata, India, March 24 – 25, 2017, Revised Selected Papers, Part II / / edited by J. K. Mandal, Paramartha Dutta, Somnath Mukhopadhyay |
| Edizione | [1st ed. 2017.] |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 |
| Descrizione fisica | 1 online resource (XXXI, 631 p. 307 illus.) |
| Disciplina | 004 |
| Collana | Communications in Computer and Information Science |
| Soggetto topico |
Data structures (Computer science)
Computer security Computers Data Structures and Information Theory Systems and Data Security Information Systems and Communication Service |
| ISBN | 981-10-6430-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Data science and advanced data analytics -- Signal processing and communications -- Microelectronics, sensors, intelligent networks -- Computational forensics (privacy and security) -- Computational intelligence in bio-computing -- Computational intelligence in mobile and quantum computing -- Intelligent data mining and data warehousing -- Computational intelligence. |
| Record Nr. | UNINA-9910254847603321 |
| Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||