top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Networks and Inventive Communication Technologies : Proceedings of Fourth ICCNCT 2021
Computer Networks and Inventive Communication Technologies : Proceedings of Fourth ICCNCT 2021
Autore Smys S
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (889 pages)
Altri autori (Persone) BestakRobert
PalanisamyRam
KotuliakIvan
Collana Lecture Notes on Data Engineering and Communications Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-3728-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Computer Networks and Inventive Communication Technologies
Record Nr. UNINA-9910502635103321
Smys S  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent Computing, Information and Control Systems : ICICCS 2019 / / edited by A. Pasumpon Pandian, Klimis Ntalianis, Ram Palanisamy
Intelligent Computing, Information and Control Systems : ICICCS 2019 / / edited by A. Pasumpon Pandian, Klimis Ntalianis, Ram Palanisamy
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xix, 732 pages) : illustrations
Disciplina 006.3
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Artificial intelligence
System theory
Big data
Control engineering
Neural networks (Computer science) 
Computational Intelligence
Artificial Intelligence
Systems Theory, Control
Big Data/Analytics
Control and Systems Theory
Mathematical Models of Cognitive Processes and Neural Networks
ISBN 3-030-30465-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483226703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent Sustainable Systems : Proceedings of ICISS 2021
Intelligent Sustainable Systems : Proceedings of ICISS 2021
Autore Raj Jennifer S
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (844 pages)
Altri autori (Persone) PalanisamyRam
PerikosIsidoros
ShiYong
Collana Lecture Notes in Networks and Systems Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-2422-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword -- Preface -- Acknowledgments -- Contents -- Editors and Contributors -- Deep Learning-Based Approach for Parkinson's Disease Detection Using Region of Interest -- 1 Introduction -- 1.1 Subject-Level Classification -- 1.2 Region of Interest -- 1.3 Model Generalizability -- 1.4 Data Leakage -- 2 Literature Survey -- 3 Dataset Description -- 4 Methodology -- 4.1 Data Preprocessing -- 4.2 Architecture -- 4.3 Evaluation Metrics -- 5 Experiments and Results -- 5.1 Subject-Level Classification -- 5.2 Region of Interest -- 5.3 Model Generalizability -- 5.4 Effect of Data Leakage -- 6 Conclusion -- References -- Classification of Class-Imbalanced Diabetic Retinopathy Images Using the Synthetic Data Creation by Generative Models -- 1 Introduction -- 2 Methodology -- 2.1 Dataset Description -- 2.2 Retinal Synthetic Image Generation -- 2.3 CNN Classifier -- 3 Experimental Results and Discussions -- 4 Conclusion -- References -- A Novel Leaf Fragment Dataset and ResNet for Small-Scale Image Analysis -- 1 Introduction -- 2 Dataset Preparation -- 2.1 Data Collection -- 2.2 Image Pre-processing -- 2.3 Post-processing -- 2.4 Filename-Format -- 3 Residual Neural Network for Cotyledon-Type Identification and Plant Species Classification -- 3.1 Dataset Formulation and Feature Description -- 3.2 Residual Block -- 3.3 Methodology -- 4 Results -- 4.1 Cotyledon-Type Identification -- 4.2 Plant Species Classification -- 5 Discussion -- 6 Comparison Between Applied ResNet and ResNet-152 V2 -- 7 Conclusion and Possible Future Contributions -- References -- Prediction of Covid 19 Cases Based on Weather Parameters -- 1 Introduction -- 2 Review of Related Literature Paper -- 3 Methodology Used -- 3.1 Dataset Used -- 3.2 Correlation Study of the Factors -- 3.3 Mean Squared Error -- 3.4 Models Used for Study -- 3.5 Analysis Performed -- 4 Experiment Results.
4.1 Linear Regression -- 4.2 Decision Tree Regression -- 4.3 Random Forest Regression -- 5 Conclusion -- References -- CloudML: Privacy-Assured Healthcare Machine Learning Model for Cloud Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Approaches -- 3.1 Unsupervised K-Means Clustering Algorithm -- 3.2 Secured Multi-party Addition Algorithm -- 3.3 Pailier Homomorphic Encryption -- 4 Work Done -- 5 Experimental Results and Discussion -- 5.1 Communication Overhead -- 5.2 Storage Overhead -- 5.3 Scalability -- 5.4 Encryption Cost -- 5.5 Runtime Analysis on Data Points -- 5.6 Runtime Analysis on Data Dimensionality -- 6 Limitations and Future Work -- 7 Concluding Remarks -- References -- Performance Evaluation of Hierarchical Clustering Protocols in WSN Using MATLAB -- 1 Introduction -- 2 Radio Model -- 3 Overview of Clustering Protocols -- 3.1 LEACH (Low-Energy Adaptive Clustering Hierarchy) -- 3.2 LEACH in Heterogeneous Environment -- 3.3 LEACH-C -- 3.4 SEP -- 3.5 DEEC -- 3.6 DDEEC -- 4 Simulation Scenario and Performance Metrics -- 5 Simulation Results -- 5.1 Scenario 1 -- 5.2 Scenario 2 -- 5.3 Scenario 3 -- 6 Conclusion -- References -- Speech Recognition Using Artificial Neural Network -- 1 Introduction -- 2 Theory -- 2.1 Artificial Neural Networks from the Viewpoint of Speech Recognition -- 2.2 Training -- 2.3 Proposed Model -- 3 Methodology -- 3.1 Different Approaches for Reducing the Error -- 3.2 Changing the Combination and Number of Inputs -- 3.3 Increasing the Number of Hidden Neurons -- 3.4 ANFIS (Adaptive Neuro-Fuzzy Inference System) -- 4 Simulation Results -- 5 Conclusion -- References -- Multi-objective Optimization for Dimension Reduction for Large Datasets -- 1 Introduction -- 2 Literature Review -- 3 Research Challenges -- 4 Feature Selection and Extraction -- 4.1 Principle Component Analysis (PCA).
4.2 Linear Discriminant Analysis (LDA) -- 4.3 Correlation Analysis (CA) -- 4.4 Autoencoders (AE) -- 4.5 Swarm Intelligence -- 5 Proposed Methodology -- 6 Discussion -- 7 Conclusion -- References -- Modified Leader Algorithm for Under-Sampling the Imbalanced Dataset for Classification -- 1 Introduction -- 2 Proposed Work -- 2.1 Algorithm -- 3 Experimental Results -- 4 Conclusion -- References -- Weather Divergence of Season Through Regression Analytics -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Importing All the Packages -- 3.2 Importing Dataset -- 3.3 Multilinear Regression -- 3.4 Quantile Regression -- 3.5 Covariance and Correlation -- 3.6 Algorithm -- 4 Flowchart -- 5 Results -- 6 Conclusion -- 7 Future Scope -- References -- A Case Study of Energy Audit in Hospital -- 1 Introduction -- 2 Methodology -- 3 Data Analysis -- 3.1 Data Cleaning -- 3.2 Connected Load and Electricity Bill Analysis -- 3.3 Maximum Contract Demand Calculations -- 3.4 Transformer Analysis -- 3.5 Illumination Load Analysis -- 3.6 Cooling Load Analysis -- 3.7 PQ Analyzer -- 4 Discussion -- 5 Conclusion -- References -- The Comparison Analysis of Cluster and Non-cluster Based Routing Protocols for WAPMS (Wireless Air Pollution Monitoring System) -- 1 Introduction -- 2 Main Significance of Air Pollution Monitoring System in WSN -- 3 Literature Review -- 4 Category of the Routing Protocols Used in Air Pollution Monitoring System in WSN -- 4.1 Cluster-Based Routing Protocols in WAPMS -- 4.2 Non-cluster Based Protocols in WAPMS -- 5 Conclusion and Future Scope -- References -- Frequent Itemset Mining Algorithms-A Literature Survey -- 1 Introduction -- 2 Frequent Itemset Mining Algorithms-A Literature Survey -- 2.1 Building of LP-Tree -- 2.2 Construction of k-FIU-Tree is as Described as Below -- 3 Problems and Defınıtıons -- 4 Conclusion -- References.
Impact of Segmentation Techniques for Conditıon Monitorıng of Electrical Equipments from Thermal Images -- 1 Introduction -- 2 Literature Survey -- 3 Research Database -- 4 Image Segmentation Techniques for Thermographs -- 5 Conclusion and Future Work -- References -- A Detailed Survey Study on Various Issues and Techniques for Security and Privacy of Healthcare Records -- 1 Introduction -- 2 Related Works -- 3 Big Data Applications-An Analysis -- 4 A Secured Big Data and ML-Based Framework -- 5 Classification on Privacy Preserving -- 6 Big Data Life Cycle -- 7 Cloud-Based Framework with Image Processing -- 8 Conclusion -- References -- Performance Analysıs of Different Classıfıcatıon Algorıthms for Bank Loan Sectors -- 1 Introduction -- 2 Build Data Model -- 3 Classıfıcatıon Algorıthms -- 3.1 Implementation of K-Nearest Neighbor (KNN) -- 3.2 Implementation of Decision Tree -- 3.3 Implementation of Support Vector Machine (SVM) -- 3.4 Implementation of Logistic Regression -- 4 Performance Metrics -- 4.1 Jaccard Similarity Score -- 4.2 F1 Score -- 4.3 Log Loss -- 5 Result Analysis -- 6 Conclusion -- References -- Universal Shift Register Designed at Low Supply Voltages in 20 nm FinFET Using Multiplexer -- 1 Introduction -- 2 Structural Design and Aspects in FinFETs -- 3 Design and Realization of 4-Bit Universal Shift Register -- 4 Simulation Results of 4-Bit Universal Shift Register -- 5 Conclusion -- References -- Predicting Graphical User Personality by Facebook Data Mining -- 1 Introduction -- 2 Related Work -- 3 Exam Dataset -- 4 My Personality Information -- 5 Results -- 6 Classification Models Assessment -- 7 Conclusion -- References -- Deep Learning in Precision Medicine -- 1 Introduction -- 2 Deep Learning in Medical Imaging -- 3 Deep Learning in Disease Detection -- 4 Deep Learning in Drug Discovery and Design.
5 Deep Learning in Personalized Healthcare -- 6 Summary -- References -- Improved Stress Prediction Using Differential Boosting Particle Swarm Optimization-Based Support Vector Machine Classifier -- 1 Introduction -- 2 Related Works -- 3 Differential Boosting Particle Swarm Optimization-Based Support Vector Machine (DBPSO-SVM) -- 4 Results and Discussion -- 4.1 Dataset Description -- 4.2 Validation Technique -- 4.3 Performance Metrics -- 4.4 Result Analysis -- 5 Conclusion -- References -- Closed-Loop Control of Solar Fed High Gain Converter Using Optimized Algorithm for BLDC Drive Application -- 1 Introduction -- 2 Overview of DC-DC Converter Fed BLDC Drive with PSO-PID Controller -- 3 Designing and Modelling of High Gain DC-DC Converter -- 4 Control of BLDC Drive-by Electronic Commutation -- 5 Control Algorithm -- 5.1 PSO Algorithm -- 6 Simulation Validation and Discussion of Proposed System -- 7 Conclusion -- References -- Internet of Things-Based Design of Smart Speed Control System for Highway Transportation Vehicles -- 1 Introduction -- 2 Proposed System Description -- 2.1 Cloud Server -- 2.2 Arduino Uno -- 2.3 WiFi Module -- 2.4 GSM Module -- 2.5 Motor Driver -- 2.6 GPS Module -- 2.7 LCD Display -- 3 Proposed System Implementation -- 3.1 Hardware Implementation -- 3.2 Software Implementation -- 4 Results and Discussions -- 5 Conclusion -- References -- Effective Ensemble Dimensionality Reduction Approach Using Denoising Autoencoder for Intrusion Detection System -- 1 Introduction -- 2 Related Works -- 3 Methodologies Adopted -- 3.1 Spearman's Cross-Correlation -- 3.2 Autoencoder -- 4 Proposed Work -- 4.1 Feature Encoding -- 4.2 Feature Scaling -- 4.3 Feature Selection -- 4.4 Feature Projection and Classification -- 5 Experiments and Results -- 5.1 Dataset -- 5.2 Data Preprocessing -- 5.3 Test Bed -- 5.4 Evaluation Metrics and Result Analysis.
6 Conclusion.
Altri titoli varianti Intelligent Sustainable Systems
Record Nr. UNINA-9910497102003321
Raj Jennifer S  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Inventive computation and information technologies : proceedings of ICICIT 2022 / / S. Smys, Khaled A. Kamel, and Ram Palanisamy, editors
Inventive computation and information technologies : proceedings of ICICIT 2022 / / S. Smys, Khaled A. Kamel, and Ram Palanisamy, editors
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore Pte Ltd., , [2023]
Descrizione fisica 1 online resource (971 pages)
Disciplina 004
Collana Lecture Notes in Networks and Systems Series
Soggetto topico Computer science
Information technology
ISBN 981-19-7402-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Detecting Wildlife Trapped Images using Automatically Shared Nearest Neighboring Pixels (ASNNP) -- A Meta-Classifier Link Prediction Model for False Profile Identification in Facebook -- Comparison of Various CNN Models For Image Classification -- Enhancing Customer Prediction using Machine Learning with Feature Selection Approaches -- Domain Name System Resolution System with Hyperledger Fabric Blockchain -- Parametric Analysis of Resource Constrained Devices for Internet of Things using FreeRTOS -- A Text Analytics Approach of Exploratory Visualization of Legal Parameters of Dowry Death Cases -- Okra Cultivation Using IoT and Disease Detection -- Identifying Pitfalls and Solutions in parallelizing Long Short Term Memory Network on Graphical Processing Unit by comparing with Tensor Processing Unit Parallelism -- Supply Chain Management In Blockchain Using Hyperledger -- JYOTI: An Intelligent App for Women Security -- Performance Analysis of Machine Learning Algorithms in the Systematic Prediction of Chronic Kidney Disease on an Imbalanced Dataset -- Robotic Process Automation Powered Admission Management System.
Record Nr. UNINA-9910678265003321
Singapore : , : Springer Nature Singapore Pte Ltd., , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Inventive computation and information technologies : proceedings of ICICIT 2021 / / S. Smys, Valentina Emilia Balas, Ram Palanisamy, editors
Inventive computation and information technologies : proceedings of ICICIT 2021 / / S. Smys, Valentina Emilia Balas, Ram Palanisamy, editors
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (911 pages)
Disciplina 004
Collana Lecture notes in networks and systems
Soggetto topico Information technology
ISBN 981-16-6723-3
981-16-6722-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910743244103321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IoT based control networks and intelligent systems : proceedings of 3rd ICICNIS 2022 / / P. P. Joby, Valentina E. Balas, and Ram Palanisamy
IoT based control networks and intelligent systems : proceedings of 3rd ICICNIS 2022 / / P. P. Joby, Valentina E. Balas, and Ram Palanisamy
Autore Joby P. P.
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (892 pages)
Disciplina 629.8
Collana Lecture Notes in Networks and Systems
Soggetto topico Intelligent control systems
Internet of things
ISBN 981-19-5845-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- LabVIEW Based Anomaly Detection for Screening Diabetic Retinopathy -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Data Pre-processing -- 5 EfficientNet Model Based DR Classification -- 5.1 Architecture of EfficientNet Model -- 6 Real Time DR Diagnosis -- 7 Conclusion -- References -- Early Stage Parkinson's Disease Diagnosis and Detection Using K-Nearest Neighbors Algorithm -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Data Pre-processing -- 5 Data Exploration -- 6 Model Building -- 6.1 Training and Testing -- 6.2 Classification -- 7 Conclusion -- References -- IoT Crypto Security Communication System -- 1 Introduction -- 2 Implementation Details -- 2.1 Protocol Stack -- 2.2 IoT-Crypto Device Software -- 2.3 IoT-Crypto Cloud Server Software -- 2.4 IoT-Crypto Gateway Software -- 3 Experiments and Tests -- 3.1 Protocol Overhead Related to the Cryptographic Techniques -- 3.2 Comparison of Encoding -- 3.3 Suitability of the Wireless Standard -- 4 Conclusion and Future Work -- References -- CNN and XGBoost Based Hybrid Model in Classification of Fetal Ultrasound Scan Planes Images in Detection of Congenital Heart Defects -- 1 Introduction -- 2 Related Works -- 3 Proposed Hybrid Model -- 3.1 CNN + XGBoost Hybrid Model -- 4 Result Analysis -- 4.1 Accuracy -- 4.2 Precision -- 4.3 Recall -- 4.4 F1-Score -- 4.5 Loss -- 4.6 Time -- 4.7 ROC Curve -- 4.8 Sensitivity and Specificity -- 5 Conclusion -- References -- Review on Web Application Based Infant Health Management -- 1 Introduction -- 2 Types of Web Applications -- 2.1 Internet of Things -- 2.2 Embedded Systems -- 2.3 Image Processing -- 2.4 Smart Incubator -- 2.5 E-Health -- 2.6 Temperature and Real-Time Monitoring -- 3 Conclusion -- References -- IEEE 802.11g Wireless Protocol Standard: Performance Analysis.
1 Introduction -- 1.1 WLAN- Physical Architecture -- 2 References -- 3 Selection of Access Point -- 3.1 Delay Analysis -- 3.2 Media Access Delay -- 3.3 Queue Size -- 3.4 Throughput -- 4 Software Requirement -- 5 Network Design -- 6 Simulation Results -- 6.1 Delay Study -- 6.2 Media Access Delay Study -- 6.3 Queue Size Study -- 6.4 Throughput Study -- 7 Analysis of Access Point Using HTTP -- 8 Analysis of Voice Application Based on Different Parameters -- 9 Conclusion -- References -- Optimal Cluster Head Selection Using Vortex Search Algorithm with Deep Learning-Based Multipath Routing in MANET -- 1 Introduction -- 2 Literature Review -- 2.1 Objectives Identified and Proposed -- 3 Proposed Methodology -- 3.1 Network Ideal and Energy Ideal -- 3.2 Energy Model -- 3.3 Cluster Formation -- 3.4 CH Selection -- 3.5 Multipath Routing -- 4 Results and Discussion -- 5 Conclusion -- References -- Secure Wireless Smart Car Door Unlocking System -- 1 Introduction -- 1.1 Organization of the Paper -- 2 Related Work -- 2.1 Pseudorandom Numbers -- 2.2 Rolling Code -- 2.3 Hashing -- 3 Methodology -- 3.1 Objective -- 3.2 Modules -- 4 Performance Evaluation -- 4.1 Type -- 4.2 Function Analysis -- 4.3 Key Size -- 4.4 Rounds -- 4.5 Time complexity -- 4.6 Space Complexity -- 4.7 Common attacks -- 4.8 Comparison with DSA Algorithm Standard -- 4.9 Usage of SHA vs MD5 in Our Proposed Method -- 5 Conclusion -- References -- A Comprehending Deep Learning Approach for Disease Classification -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Restaurant Automation Through IoT and NLP Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Results -- 5 Conclusion and Future Work -- References -- Comprehensive Assessment of Big Data in Recommendation Systems -- 1 Introduction.
2 Big Data Based Recommendation Systems -- 2.1 Data Collection Used in Recommendation Systems Approaches -- 2.2 Methods Used in Recommendation Systems -- 2.3 Contextual Suggestions -- 2.4 Neighbourhood-Based Approaches for Big Data Scaling -- 2.5 Evaluation Score Estimation -- 2.6 Evaluation of Recommendation Systems Metrics Used -- 3 Conclusion -- References -- Review on Application of Wireless Technology Using IoT -- 1 Introduction -- 2 Application of Wireless Technology -- 2.1 Structural Health Monitoring -- 2.2 Structural Damage Detection -- 2.3 Detection of Bridge Damage -- 3 Conclusion -- References -- Comparative Study of Conditional Generative Models for ISL Generation -- 1 Introduction -- 2 Literature Review -- 3 CGAN Preliminaries and ISL Dataset -- 3.1 Conditional GAN -- 3.2 ISL Dataset -- 4 Training Configuration of Models -- 5 Results of Conditional GANs on ISL Dataset -- 5.1 Results of ContraGAN on ISL Dataset -- 5.2 Results of ACGAN on ISL Dataset -- 5.3 Results of ReACGAN on ISL Dataset -- 5.4 Results of MHGAN on ISL Dataset -- 5.5 Results of BigGAN on ISL Dataset -- 5.6 Results of StyleGAN2-ADA on ISL Dataset -- 5.7 Results of StyleGAN2-DiffAug on ISL Dataset -- 5.8 Results of StyleGAN3 on ISL Dataset -- 5.9 FID Score and IS of CGANs on ISL Dataset -- 6 Conclusion -- References -- A Novel Approach for Segmenting Coronary Artery from Angiogram Videos -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 4 Proposed Research Method -- 4.1 Extracting the Frames from the Angiogram Video -- 4.2 Frame Pre-processing -- 4.3 Segmenting the Region of Interest -- 4.4 Detecting the Keyframe -- 5 Experimental Results and Analysis -- 6 Conclusion -- References -- Analysis of Different Cryptographic Algorithms in Cloud-Based Multi-robot Systems -- 1 Introduction -- 1.1 Cryptography Security Services -- 2 Literature Review -- 3 Background.
3.1 Symmetric Key Cryptography -- 3.2 Asymmetric Key Cryptography -- 4 Elliptic Curve Integrated Encryption Scheme (ECIES) -- 4.1 Encryption Algorithm For ECIES -- 4.2 Decryption Algorithm for ECIES -- 4.3 Notations -- 5 Result and Discussion -- 5.1 Encryption and Decryption Time -- 6 Conclusion and Future Scope -- References -- An IoT Based Environment Monitoring & -- Controlling System for Food Grain Warehouse -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Architecture -- 3.2 System Components -- 4 Results and Discussions -- 5 Conclusion -- References -- Numerical Analysis and ANN Modeling of the Intercooled, Reheat and Regenerative Gas Turbine Cycle -- 1 Introduction -- 2 Cycle Description and Thermal Model -- 2.1 Thermodynamic Cycle -- 2.2 Thermal Model -- 3 Results and Discussion -- 3.1 Effect of Pressure Ratio and Turbine Inlet Temperature (TIT) -- 3.2 Effect of Pressure Ratio and Compressor Inlet Temperature (CIT) -- 3.3 Effect of Effectiveness of the Heat Exchanger -- 3.4 Development of ANN Prediction Model -- 3.5 Results of the ANN Prediction Model -- 4 Conclusion -- References -- Implementation of IoT Enabled Home Automation System -- 1 Introduction -- 2 Functional Requirements -- 2.1 Internet of Things -- 2.2 System Architecture -- 3 Proposed Model -- 4 Implementation Design -- 4.1 Arduino Nano Board -- 4.2 Bluetooth HC05 Module -- 4.3 Relay Board Module -- 5 Proposed IOT Architecture -- 6 User Interaction -- 7 Implementation Details -- 8 Conclusion and Future Work -- References -- Scheduled Line of Symmetry Solar Tracker with MPT and IoT -- 1 Introduction -- 2 Existing System -- 2.1 Optimized Single-Axis Schedule Solar Tracker in Different Weather Conditions -- 2.2 Coordinated Power Management and Control of Renewable Energy Sources Based Smart Grid -- 3 Proposed System -- 3.1 Calculation of Azimuthal Angle.
3.2 Circuit Diagram -- 3.3 Flow Chart -- 4 Results and Discussion -- 5 Conclusion -- References -- A New Method for Secure Transmission of Medical Images Using Wavelet Transform and Steganography -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Materials -- 4.1 Discrete Wavelet Transform (DWT) -- 4.2 Least Significant Bits (LSB) Steganography -- 4.3 Bit-Plane Reversal -- 5 Results and Conclusion -- References -- Deep Learning Based Hand Sign Recognition in the Context of Indian Greetings and Gestures -- 1 Introduction -- 1.1 Sign Language Translation -- 1.2 Deep Learning -- 1.3 Convolutional Neural Networks -- 1.4 Object Detection -- 1.5 Neural Network Approaches -- 1.6 You Only Look Once -- 2 Related Work -- 3 Technologies -- 3.1 Python -- 4 Methodology -- 4.1 Algorithm -- 4.2 Dataset -- 4.3 Architecture -- 5 Result -- 6 Conclusion -- 7 Future Scope -- References -- Pedestrian Detection Using MobileNetV2 Based Mask R-CNN -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 MobileNetV2 -- 3.2 Proposed Mask R-CNN -- 4 Result and Experimentation -- 5 Conclusion -- References -- Localization of Calcifications in Mammograms Using CNN with GAP Layer -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Pre-processing of Data -- 3.3 Localization -- 3.4 Model -- 4 Results and Analysis -- 5 Conclusion -- 6 Future Work -- References -- Comparative Analysis of Machine Learning and Deep Learning Algorithms for Real-Time Posture Detection to Prevent Sciatica, Kyphosis, Lordosis -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Data Visualization -- 3.4 Model Training -- 3.5 Evaluating the Model -- 3.6 Model Selection -- 3.7 Integrating with OpenCV -- 4 Results Analysis -- 5 Conclusions -- References.
Lightweight Block Cipher for Resource Constrained IoT Environment-An Survey, Performance, Cryptanalysis and Research Challenges.
Record Nr. UNINA-9910627258503321
Joby P. P.  
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile Computing and Sustainable Informatics : Proceedings of ICMCSI 2021
Mobile Computing and Sustainable Informatics : Proceedings of ICMCSI 2021
Autore Shakya Subarna
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (864 pages)
Altri autori (Persone) BestakRobert
PalanisamyRam
KamelKhaled A
Collana Lecture Notes on Data Engineering and Communications Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-1866-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Mitigating the Latency Induced Delay in IP Telephony Through an Enhanced De-Jitter Buffer -- 1 Introduction -- 1.1 Problem Formulation -- 2 Relevant Works -- 3 VOIP Technique and Network Structure -- 3.1 Media Gateways and Call Managers -- 3.2 Topologies -- 3.3 Session Initiation Protocol (SIP) -- 3.4 SIP Elements -- 4 Limitations -- 5 The Proposed Solution -- 5.1 Modification in De-Jitter Buffer -- 6 Results and Analysis -- 7 Conclusion -- References -- A Cyber-Safety IoT-Enabled Wearable Microstrip Antenna for X-Band Applications -- 1 Introduction -- 2 Existing Approach -- 3 Antenna Design -- 3.1 Antenna Configuration -- 3.2 Antenna Performance -- 3.3 Simulated Results -- 3.4 Measured Results -- 4 Conclusion and Future Work -- References -- Keyword Recognition from EEG Signals on Smart Devices a Novel Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Overview -- 2.2 Data Acquisition -- 2.3 Data Preprocessing -- 3 Feature Extraction -- 3.1 DWT Feature Extraction -- 3.2 FFT Feature Extraction -- 3.3 Feature Fusion -- 3.4 Dimensionality Reduction -- 3.5 Command Map Table and Task Observer Thread -- 3.6 Tools and Software -- 4 Classifiers Used -- 4.1 SVM Classifier -- 4.2 KNN Classification -- 4.3 CNN Classifier -- 4.4 Random Forest -- 4.5 Performance Measure -- 5 Results and Discussion -- 6 Conclusion -- References -- Security Analysis for Sybil Attack in Sensor Network Using Compare and Match-Position Verification Method -- 1 Introduction -- 2 Sybil Attach and Security -- 2.1 WSN on Security Attacks -- 2.2 Sybil the Attack -- 3 Compare with Match-Position and Verification of Method -- 4 Message Authentication and Passing (MAP) -- 5 Result and Discussion -- 6 Conclusion -- References -- Certain Strategic Study on Machine Learning-Based Graph Anomaly Detection.
1 Introduction -- 2 Generalized Machine Learning Approaches Towards Outlier Detection -- 2.1 Key Challenges Identified in ML Techniques -- 3 Graph-Based Anomaly Detection Methods -- 3.1 Moving Towards Graph Representation -- 3.2 Existing Graph Basis Anomaly Detection Methods (GBAD) -- 3.3 Baseline Link Analysis Ranking Algorithms -- 3.4 Structure-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.5 Community-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.6 Graph Compression Strategies -- 4 Open Challenges in GBAD -- 5 Concluding Remarks -- References -- Machine Learning Perspective in VLSI Computer-Aided Design at Different Abstraction Levels -- 1 Introduction to Machine Learning and VLSI CAD -- 2 The Basic Paradigm of Machine Learning -- 3 Areas of Machine Learning -- 4 Machine Learning Algorithms -- 5 Drawbacks of Machine Learning -- 6 Application of Machine Learning in VLSI CAD Abtraction Levels -- 6.1 Machine Learning in Automatic Generation of Assertion in RTL Design -- 6.2 Machine Learning in Chip Testing -- 6.3 Machine Learning for Physical Design Routing -- 6.4 Machine Learning in Physical Design Floor Planning -- 6.5 Machine Learning in Static Timimg Analysis (STA) -- 6.6 Machine Learning in Gate-Level Netlist -- 6.7 Machine Learning in EDA and IC Design -- 7 Conclusion and Future Scope -- References -- A Practical Approach to Measure Data Centre Efficiency Usage Effectiveness -- 1 Introduction -- 2 Energy Versus Power -- 2.1 IT Load -- 2.2 Effect of Outdoor Condition -- 2.3 User Configuration -- 2.4 Product Review Analysis -- 3 Related Work -- 4 Proposed Work -- 5 Result Analysis -- 6 Conclusion -- References -- Advancing e-Government Using Internet of Things -- 1 Introduction -- 2 Social Networks and Machine Learning -- 3 Health Care -- 4 Agriculture -- 4.1 Six-Layer IoT-Based Model [4-6] (Shown in Fig. 3).
4.2 Role of Unmanned Aerial Vehicles (UAVs) -- 5 Voting -- 5.1 IoT-Based Voting Framework -- 5.2 Fingerprint Matching Algorithm -- 5.3 Security -- 6 "Smart" Government? -- 7 Future Prospects -- References -- A New Network Forensic Investigation Process Model -- 1 Introduction -- 1.1 Forensic Science -- 1.2 Network Forensics -- 1.3 Need of Network Forensics -- 2 Literature Survey -- 3 Proposed Network Forensic Investigation Process Model -- 3.1 Network Forensic Readiness Module -- 3.2 Security Incident Alert Module -- 3.3 Data Acquisition Module -- 3.4 Forensic Investigation Module -- 3.5 Presentation Module -- 4 Conclusion -- References -- MDTA: A New Approach of Supervised Machine Learning for Android Malware Detection and Threat Attribution Using Behavioral Reports -- 1 Introduction -- 2 Literature Survey -- 3 System Methodology -- 4 System Design -- 5 System Algorithm -- 5.1 Build Model Algorithm -- 5.2 Feature Extraction Algorithm -- 5.3 Prediction Algorithm -- 6 System Implementation -- 6.1 Data Flow Diagram -- 6.2 Sequence Diagram -- 7 Result Analysis -- 7.1 Accuracy of Malware Detection -- 7.2 Accuracy of Threat Attribution -- 8 Experimentation -- 9 Discussion -- 10 Conclusion -- References -- Investigating the Role of User Experience and Design in Recommender Systems: A Pragmatic Review -- 1 Introduction -- 2 Related Work -- 3 Overview of Usability Engineering -- 4 Experimental Set-Up -- 5 Findings -- 6 Proposed Model -- 7 Conclusion -- 8 Future Scope -- References -- A Review on Intrusion Detection Approaches in Resource-Constrained IoT Environment -- 1 Introduction -- 2 Review of Intrusion Detection Frameworks for IoT -- 3 Open Issues -- 4 Discussion on Open Issues and Future Research Direction -- 5 Conclusion -- References -- Future 5G Mobile Network Performance in Webservices with NDN Technology -- 1 Introduction -- 2 Literature Review.
3 Network Testing Considered in Signal Error Detection and Correction Format -- 4 System Analysis -- 5 Enhanced System Design -- 5.1 Steps for Performance Improvements and Existing Analysis -- 5.2 Steps for Overcoming the Issues -- 5.3 Algorithm Equations and Operational Methods -- 6 Conclusion -- References -- Survey for Electroencephalography EEG Signal Classification Approaches -- 1 Introduction -- 1.1 Motivation -- 1.2 Survey Strategy and Evaluation -- 1.3 Paper Organization -- 2 Support Vector Machine for EEG Classification -- 3 Artificial Neural Network (ANN) for EEG Classification -- 4 Convolution Neural Network (CNN) for EEG Classification -- 5 K-Nearest Neighbor (K-NN) for EEG Classification -- 6 Linear Discriminant Analysis (LDA) for EEG Classification -- 7 Multi-classifier Approaches for EEG Classification -- 8 Other Models for EEG Classification -- 9 Analysis and Evaluation -- 10 Conclusion -- References -- Analysis of Road Accidents Using Data Mining Paradigm -- 1 Introduction -- 2 Data and Methods -- 2.1 Data Description -- 2.2 Apriori Algorithm -- 3 Results and Discussion -- 3.1 Road Type -- 3.2 Intoxication -- 4 Conclusions -- References -- Hybrid Approach to Cross-Platform Mobile Interface Development for IAAS -- 1 Introduction -- 2 State of the Art on IAAS -- 2.1 General Mechanism of IAAS -- 2.2 Implementation of IAAS -- 3 State of the Art on Mobile Development Approaches -- 3.1 Native Approach -- 3.2 Web Approach -- 3.3 Hybrid Approach -- 4 Comparative Study and Mobile Solution Proposition for IAAS -- 4.1 Description of the Interface to Be Developed -- 4.2 Proposed Development Approach -- 5 Implementation and Evaluation -- 5.1 Functional Needs Model and Analysis -- 5.2 Realization of the Proposition -- 5.3 Display Tests and Evaluation of the Solution -- 6 Conclusion -- References.
Self-organizing Data Processing for Time Series Using SPARK -- 1 Introduction -- 2 Problem Definition -- 3 Related Work -- 4 Proposed Work -- 5 Results and Evaluation -- 5.1 Data and Preprocessing -- 5.2 Experimental Setup -- 5.3 Results -- 6 Conclusion -- References -- An Experimental Investigation of PCA-Based Intrusion Detection Approach Utilizing Machine Learning Algorithms -- 1 Introduction -- 1.1 Kinds of IDS -- 2 Related Work -- 3 Methodology -- 3.1 Machine Learning Techniques -- 3.2 Principal Component Analysis (PCA) -- 4 Experimental Evaluation -- 4.1 Result and Discussion -- 5 Conclusion -- References -- OpenFlow-Based Dynamic Traffic Distribution in Software-Defined Networks -- 1 Introduction -- 2 Background and Related Studies -- 2.1 Software-Defined Network (SDN) and Openflow -- 2.2 Related Works -- 3 System Design and Implementation -- 3.1 System Architecture -- 3.2 Load Balancing Algorithm -- 4 Performance Evaluation and Results -- 4.1 Performance Parameters -- 4.2 Experimental Environment -- 4.3 Experimental Design -- 4.4 Experimental Results -- 5 Conclusions and Future Works -- References -- A Comparative Study of Classification Algorithms Over Images Using Machine Learning and TensorFlow -- 1 Introduction -- 1.1 Convolutional Neural Networks -- 2 Methodology -- 3 Experimental Results -- 3.1 Model Development -- 3.2 Packages Required -- 4 Conclusion -- References -- Intelligent Routing to Enhance Energy Consumption in Wireless Sensor Network: A Survey -- 1 Introduction -- 2 Wireless Sensor Networks Structure -- 3 The Approaches to Energy Consumption Managment -- 3.1 Intelligent Routing Protocols -- 3.2 Duty Cycle -- 3.3 Data Manipulation -- 3.4 Based on Mobility -- 4 Disscusions -- 5 Conclusions -- References -- Deep Residual Learning for Facial Emotion Recognition -- 1 Introduction -- 1.1 Background -- 2 Related Works.
3 Proposed Methodology.
Altri titoli varianti Mobile Computing and Sustainable Informatics
Record Nr. UNINA-9910497103403321
Shakya Subarna  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019) / / edited by A. Pasumpon Pandian, Ram Palanisamy, Klimis Ntalianis
Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019) / / edited by A. Pasumpon Pandian, Ram Palanisamy, Klimis Ntalianis
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (1,019 pages)
Disciplina 004
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Engineering—Data processing
Computational intelligence
Computer engineering
Internet of things
Embedded computer systems
Artificial intelligence
Data Engineering
Computational Intelligence
Cyber-physical systems, IoT
Artificial Intelligence
ISBN 3-030-43192-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wireless Sensor Networks Security Issues, Attacks and Challenges: A Survey -- Users’ Attitude on Perceived Security of Enterprise Systems Mobility: A Conceptual Model -- Cloud Based Heterogeneous Big Data Integration and Data Analysis for Business Intelligence -- Search Engine Optimization Challenges and Solutions -- A Comparison Between Robust Image Encryption and Watermarking Methods for Digital Image Protection -- Algorithms used for Scene Perception in Driverless Cars -- Data Storage Security Issues in Cloud Computing -- Review of Machine Learning in Geosciences and Remote Sensing -- An Effective Kapur's Segmentation based Detection and Classification Model for Citrus Diseases Diagnosis System -- Analysis of MRI Images using Image Processing Technique -- Comparative Analysis of Contrast Enhancement Techniques for MRI Images -- Review on Dimensionality Reduction Techniques -- Security Challenges In NoSQL and their Control Methods -- Waste Management Techniques for Smart Cities. .
Record Nr. UNINA-9910483263703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of international conference on intelligent computing, information and control systems : ICICCS 2020 / / A. Pasumpon Pandian, Ram Palanisamy and Klimis Ntalianis (Editors)
Proceedings of international conference on intelligent computing, information and control systems : ICICCS 2020 / / A. Pasumpon Pandian, Ram Palanisamy and Klimis Ntalianis (Editors)
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (XXII, 992 p. 550 illus., 402 illus. in color.)
Disciplina 006.31
Collana Advances in Intelligent Systems and Computing
Soggetto topico Artificial intelligence
Machine learning
Big data
ISBN 981-15-8443-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Neural Networks Applied to Irrigation Control using Instrumentation and Image Analysis for a Micro-Greenhouse -- Proactive Handoff of Secondary User in Cognitive Radio Network using Machine Learning Techniques -- Inter - Device Language Translation Application for Smartphones -- Real-time Numerical Gesture Recognition using MPU9250 Motion Sensor -- Extraction and Classification of Forest Fire Image Characteristics -- Development of DWT-SVD based Digital Image Watermarking for Multi-Level Decomposition -- Stability of Model that makes Automated Comparison between Market Demands and University Curricula Offer -- Economic Load Dispatch Using Intelligent Particle Swarm Optimization -- Companion: Detection of Social Isolation in Elderly -- Machine Learning Techniques to Determine the Polarity of Messages on Social Networks.
Record Nr. UNINA-9910484582403321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui