Computer Networks and Inventive Communication Technologies : Proceedings of Fourth ICCNCT 2021 |
Autore | Smys S |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (889 pages) |
Altri autori (Persone) |
BestakRobert
PalanisamyRam KotuliakIvan |
Collana | Lecture Notes on Data Engineering and Communications Technologies Ser. |
Soggetto genere / forma | Electronic books. |
ISBN | 981-16-3728-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Computer Networks and Inventive Communication Technologies |
Record Nr. | UNINA-9910502635103321 |
Smys S | ||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent Computing, Information and Control Systems : ICICCS 2019 / / edited by A. Pasumpon Pandian, Klimis Ntalianis, Ram Palanisamy |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xix, 732 pages) : illustrations |
Disciplina | 006.3 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computational intelligence
Artificial intelligence System theory Big data Control engineering Neural networks (Computer science) Computational Intelligence Artificial Intelligence Systems Theory, Control Big Data/Analytics Control and Systems Theory Mathematical Models of Cognitive Processes and Neural Networks |
ISBN | 3-030-30465-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483226703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent Sustainable Systems : Proceedings of ICISS 2021 |
Autore | Raj Jennifer S |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (844 pages) |
Altri autori (Persone) |
PalanisamyRam
PerikosIsidoros ShiYong |
Collana | Lecture Notes in Networks and Systems Ser. |
Soggetto genere / forma | Electronic books. |
ISBN | 981-16-2422-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Foreword -- Preface -- Acknowledgments -- Contents -- Editors and Contributors -- Deep Learning-Based Approach for Parkinson's Disease Detection Using Region of Interest -- 1 Introduction -- 1.1 Subject-Level Classification -- 1.2 Region of Interest -- 1.3 Model Generalizability -- 1.4 Data Leakage -- 2 Literature Survey -- 3 Dataset Description -- 4 Methodology -- 4.1 Data Preprocessing -- 4.2 Architecture -- 4.3 Evaluation Metrics -- 5 Experiments and Results -- 5.1 Subject-Level Classification -- 5.2 Region of Interest -- 5.3 Model Generalizability -- 5.4 Effect of Data Leakage -- 6 Conclusion -- References -- Classification of Class-Imbalanced Diabetic Retinopathy Images Using the Synthetic Data Creation by Generative Models -- 1 Introduction -- 2 Methodology -- 2.1 Dataset Description -- 2.2 Retinal Synthetic Image Generation -- 2.3 CNN Classifier -- 3 Experimental Results and Discussions -- 4 Conclusion -- References -- A Novel Leaf Fragment Dataset and ResNet for Small-Scale Image Analysis -- 1 Introduction -- 2 Dataset Preparation -- 2.1 Data Collection -- 2.2 Image Pre-processing -- 2.3 Post-processing -- 2.4 Filename-Format -- 3 Residual Neural Network for Cotyledon-Type Identification and Plant Species Classification -- 3.1 Dataset Formulation and Feature Description -- 3.2 Residual Block -- 3.3 Methodology -- 4 Results -- 4.1 Cotyledon-Type Identification -- 4.2 Plant Species Classification -- 5 Discussion -- 6 Comparison Between Applied ResNet and ResNet-152 V2 -- 7 Conclusion and Possible Future Contributions -- References -- Prediction of Covid 19 Cases Based on Weather Parameters -- 1 Introduction -- 2 Review of Related Literature Paper -- 3 Methodology Used -- 3.1 Dataset Used -- 3.2 Correlation Study of the Factors -- 3.3 Mean Squared Error -- 3.4 Models Used for Study -- 3.5 Analysis Performed -- 4 Experiment Results.
4.1 Linear Regression -- 4.2 Decision Tree Regression -- 4.3 Random Forest Regression -- 5 Conclusion -- References -- CloudML: Privacy-Assured Healthcare Machine Learning Model for Cloud Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Approaches -- 3.1 Unsupervised K-Means Clustering Algorithm -- 3.2 Secured Multi-party Addition Algorithm -- 3.3 Pailier Homomorphic Encryption -- 4 Work Done -- 5 Experimental Results and Discussion -- 5.1 Communication Overhead -- 5.2 Storage Overhead -- 5.3 Scalability -- 5.4 Encryption Cost -- 5.5 Runtime Analysis on Data Points -- 5.6 Runtime Analysis on Data Dimensionality -- 6 Limitations and Future Work -- 7 Concluding Remarks -- References -- Performance Evaluation of Hierarchical Clustering Protocols in WSN Using MATLAB -- 1 Introduction -- 2 Radio Model -- 3 Overview of Clustering Protocols -- 3.1 LEACH (Low-Energy Adaptive Clustering Hierarchy) -- 3.2 LEACH in Heterogeneous Environment -- 3.3 LEACH-C -- 3.4 SEP -- 3.5 DEEC -- 3.6 DDEEC -- 4 Simulation Scenario and Performance Metrics -- 5 Simulation Results -- 5.1 Scenario 1 -- 5.2 Scenario 2 -- 5.3 Scenario 3 -- 6 Conclusion -- References -- Speech Recognition Using Artificial Neural Network -- 1 Introduction -- 2 Theory -- 2.1 Artificial Neural Networks from the Viewpoint of Speech Recognition -- 2.2 Training -- 2.3 Proposed Model -- 3 Methodology -- 3.1 Different Approaches for Reducing the Error -- 3.2 Changing the Combination and Number of Inputs -- 3.3 Increasing the Number of Hidden Neurons -- 3.4 ANFIS (Adaptive Neuro-Fuzzy Inference System) -- 4 Simulation Results -- 5 Conclusion -- References -- Multi-objective Optimization for Dimension Reduction for Large Datasets -- 1 Introduction -- 2 Literature Review -- 3 Research Challenges -- 4 Feature Selection and Extraction -- 4.1 Principle Component Analysis (PCA). 4.2 Linear Discriminant Analysis (LDA) -- 4.3 Correlation Analysis (CA) -- 4.4 Autoencoders (AE) -- 4.5 Swarm Intelligence -- 5 Proposed Methodology -- 6 Discussion -- 7 Conclusion -- References -- Modified Leader Algorithm for Under-Sampling the Imbalanced Dataset for Classification -- 1 Introduction -- 2 Proposed Work -- 2.1 Algorithm -- 3 Experimental Results -- 4 Conclusion -- References -- Weather Divergence of Season Through Regression Analytics -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Importing All the Packages -- 3.2 Importing Dataset -- 3.3 Multilinear Regression -- 3.4 Quantile Regression -- 3.5 Covariance and Correlation -- 3.6 Algorithm -- 4 Flowchart -- 5 Results -- 6 Conclusion -- 7 Future Scope -- References -- A Case Study of Energy Audit in Hospital -- 1 Introduction -- 2 Methodology -- 3 Data Analysis -- 3.1 Data Cleaning -- 3.2 Connected Load and Electricity Bill Analysis -- 3.3 Maximum Contract Demand Calculations -- 3.4 Transformer Analysis -- 3.5 Illumination Load Analysis -- 3.6 Cooling Load Analysis -- 3.7 PQ Analyzer -- 4 Discussion -- 5 Conclusion -- References -- The Comparison Analysis of Cluster and Non-cluster Based Routing Protocols for WAPMS (Wireless Air Pollution Monitoring System) -- 1 Introduction -- 2 Main Significance of Air Pollution Monitoring System in WSN -- 3 Literature Review -- 4 Category of the Routing Protocols Used in Air Pollution Monitoring System in WSN -- 4.1 Cluster-Based Routing Protocols in WAPMS -- 4.2 Non-cluster Based Protocols in WAPMS -- 5 Conclusion and Future Scope -- References -- Frequent Itemset Mining Algorithms-A Literature Survey -- 1 Introduction -- 2 Frequent Itemset Mining Algorithms-A Literature Survey -- 2.1 Building of LP-Tree -- 2.2 Construction of k-FIU-Tree is as Described as Below -- 3 Problems and Defınıtıons -- 4 Conclusion -- References. Impact of Segmentation Techniques for Conditıon Monitorıng of Electrical Equipments from Thermal Images -- 1 Introduction -- 2 Literature Survey -- 3 Research Database -- 4 Image Segmentation Techniques for Thermographs -- 5 Conclusion and Future Work -- References -- A Detailed Survey Study on Various Issues and Techniques for Security and Privacy of Healthcare Records -- 1 Introduction -- 2 Related Works -- 3 Big Data Applications-An Analysis -- 4 A Secured Big Data and ML-Based Framework -- 5 Classification on Privacy Preserving -- 6 Big Data Life Cycle -- 7 Cloud-Based Framework with Image Processing -- 8 Conclusion -- References -- Performance Analysıs of Different Classıfıcatıon Algorıthms for Bank Loan Sectors -- 1 Introduction -- 2 Build Data Model -- 3 Classıfıcatıon Algorıthms -- 3.1 Implementation of K-Nearest Neighbor (KNN) -- 3.2 Implementation of Decision Tree -- 3.3 Implementation of Support Vector Machine (SVM) -- 3.4 Implementation of Logistic Regression -- 4 Performance Metrics -- 4.1 Jaccard Similarity Score -- 4.2 F1 Score -- 4.3 Log Loss -- 5 Result Analysis -- 6 Conclusion -- References -- Universal Shift Register Designed at Low Supply Voltages in 20 nm FinFET Using Multiplexer -- 1 Introduction -- 2 Structural Design and Aspects in FinFETs -- 3 Design and Realization of 4-Bit Universal Shift Register -- 4 Simulation Results of 4-Bit Universal Shift Register -- 5 Conclusion -- References -- Predicting Graphical User Personality by Facebook Data Mining -- 1 Introduction -- 2 Related Work -- 3 Exam Dataset -- 4 My Personality Information -- 5 Results -- 6 Classification Models Assessment -- 7 Conclusion -- References -- Deep Learning in Precision Medicine -- 1 Introduction -- 2 Deep Learning in Medical Imaging -- 3 Deep Learning in Disease Detection -- 4 Deep Learning in Drug Discovery and Design. 5 Deep Learning in Personalized Healthcare -- 6 Summary -- References -- Improved Stress Prediction Using Differential Boosting Particle Swarm Optimization-Based Support Vector Machine Classifier -- 1 Introduction -- 2 Related Works -- 3 Differential Boosting Particle Swarm Optimization-Based Support Vector Machine (DBPSO-SVM) -- 4 Results and Discussion -- 4.1 Dataset Description -- 4.2 Validation Technique -- 4.3 Performance Metrics -- 4.4 Result Analysis -- 5 Conclusion -- References -- Closed-Loop Control of Solar Fed High Gain Converter Using Optimized Algorithm for BLDC Drive Application -- 1 Introduction -- 2 Overview of DC-DC Converter Fed BLDC Drive with PSO-PID Controller -- 3 Designing and Modelling of High Gain DC-DC Converter -- 4 Control of BLDC Drive-by Electronic Commutation -- 5 Control Algorithm -- 5.1 PSO Algorithm -- 6 Simulation Validation and Discussion of Proposed System -- 7 Conclusion -- References -- Internet of Things-Based Design of Smart Speed Control System for Highway Transportation Vehicles -- 1 Introduction -- 2 Proposed System Description -- 2.1 Cloud Server -- 2.2 Arduino Uno -- 2.3 WiFi Module -- 2.4 GSM Module -- 2.5 Motor Driver -- 2.6 GPS Module -- 2.7 LCD Display -- 3 Proposed System Implementation -- 3.1 Hardware Implementation -- 3.2 Software Implementation -- 4 Results and Discussions -- 5 Conclusion -- References -- Effective Ensemble Dimensionality Reduction Approach Using Denoising Autoencoder for Intrusion Detection System -- 1 Introduction -- 2 Related Works -- 3 Methodologies Adopted -- 3.1 Spearman's Cross-Correlation -- 3.2 Autoencoder -- 4 Proposed Work -- 4.1 Feature Encoding -- 4.2 Feature Scaling -- 4.3 Feature Selection -- 4.4 Feature Projection and Classification -- 5 Experiments and Results -- 5.1 Dataset -- 5.2 Data Preprocessing -- 5.3 Test Bed -- 5.4 Evaluation Metrics and Result Analysis. 6 Conclusion. |
Altri titoli varianti | Intelligent Sustainable Systems |
Record Nr. | UNINA-9910497102003321 |
Raj Jennifer S | ||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Inventive computation and information technologies : proceedings of ICICIT 2022 / / S. Smys, Khaled A. Kamel, and Ram Palanisamy, editors |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore Pte Ltd., , [2023] |
Descrizione fisica | 1 online resource (971 pages) |
Disciplina | 004 |
Collana | Lecture Notes in Networks and Systems Series |
Soggetto topico |
Computer science
Information technology |
ISBN | 981-19-7402-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Detecting Wildlife Trapped Images using Automatically Shared Nearest Neighboring Pixels (ASNNP) -- A Meta-Classifier Link Prediction Model for False Profile Identification in Facebook -- Comparison of Various CNN Models For Image Classification -- Enhancing Customer Prediction using Machine Learning with Feature Selection Approaches -- Domain Name System Resolution System with Hyperledger Fabric Blockchain -- Parametric Analysis of Resource Constrained Devices for Internet of Things using FreeRTOS -- A Text Analytics Approach of Exploratory Visualization of Legal Parameters of Dowry Death Cases -- Okra Cultivation Using IoT and Disease Detection -- Identifying Pitfalls and Solutions in parallelizing Long Short Term Memory Network on Graphical Processing Unit by comparing with Tensor Processing Unit Parallelism -- Supply Chain Management In Blockchain Using Hyperledger -- JYOTI: An Intelligent App for Women Security -- Performance Analysis of Machine Learning Algorithms in the Systematic Prediction of Chronic Kidney Disease on an Imbalanced Dataset -- Robotic Process Automation Powered Admission Management System. |
Record Nr. | UNINA-9910678265003321 |
Singapore : , : Springer Nature Singapore Pte Ltd., , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Inventive computation and information technologies : proceedings of ICICIT 2021 / / S. Smys, Valentina Emilia Balas, Ram Palanisamy, editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (911 pages) |
Disciplina | 004 |
Collana | Lecture notes in networks and systems |
Soggetto topico | Information technology |
ISBN |
981-16-6723-3
981-16-6722-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910743244103321 |
Singapore : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IoT based control networks and intelligent systems : proceedings of 3rd ICICNIS 2022 / / P. P. Joby, Valentina E. Balas, and Ram Palanisamy |
Autore | Joby P. P. |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (892 pages) |
Disciplina | 629.8 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Intelligent control systems
Internet of things |
ISBN | 981-19-5845-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- About the Editors -- LabVIEW Based Anomaly Detection for Screening Diabetic Retinopathy -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Data Pre-processing -- 5 EfficientNet Model Based DR Classification -- 5.1 Architecture of EfficientNet Model -- 6 Real Time DR Diagnosis -- 7 Conclusion -- References -- Early Stage Parkinson's Disease Diagnosis and Detection Using K-Nearest Neighbors Algorithm -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Data Pre-processing -- 5 Data Exploration -- 6 Model Building -- 6.1 Training and Testing -- 6.2 Classification -- 7 Conclusion -- References -- IoT Crypto Security Communication System -- 1 Introduction -- 2 Implementation Details -- 2.1 Protocol Stack -- 2.2 IoT-Crypto Device Software -- 2.3 IoT-Crypto Cloud Server Software -- 2.4 IoT-Crypto Gateway Software -- 3 Experiments and Tests -- 3.1 Protocol Overhead Related to the Cryptographic Techniques -- 3.2 Comparison of Encoding -- 3.3 Suitability of the Wireless Standard -- 4 Conclusion and Future Work -- References -- CNN and XGBoost Based Hybrid Model in Classification of Fetal Ultrasound Scan Planes Images in Detection of Congenital Heart Defects -- 1 Introduction -- 2 Related Works -- 3 Proposed Hybrid Model -- 3.1 CNN + XGBoost Hybrid Model -- 4 Result Analysis -- 4.1 Accuracy -- 4.2 Precision -- 4.3 Recall -- 4.4 F1-Score -- 4.5 Loss -- 4.6 Time -- 4.7 ROC Curve -- 4.8 Sensitivity and Specificity -- 5 Conclusion -- References -- Review on Web Application Based Infant Health Management -- 1 Introduction -- 2 Types of Web Applications -- 2.1 Internet of Things -- 2.2 Embedded Systems -- 2.3 Image Processing -- 2.4 Smart Incubator -- 2.5 E-Health -- 2.6 Temperature and Real-Time Monitoring -- 3 Conclusion -- References -- IEEE 802.11g Wireless Protocol Standard: Performance Analysis.
1 Introduction -- 1.1 WLAN- Physical Architecture -- 2 References -- 3 Selection of Access Point -- 3.1 Delay Analysis -- 3.2 Media Access Delay -- 3.3 Queue Size -- 3.4 Throughput -- 4 Software Requirement -- 5 Network Design -- 6 Simulation Results -- 6.1 Delay Study -- 6.2 Media Access Delay Study -- 6.3 Queue Size Study -- 6.4 Throughput Study -- 7 Analysis of Access Point Using HTTP -- 8 Analysis of Voice Application Based on Different Parameters -- 9 Conclusion -- References -- Optimal Cluster Head Selection Using Vortex Search Algorithm with Deep Learning-Based Multipath Routing in MANET -- 1 Introduction -- 2 Literature Review -- 2.1 Objectives Identified and Proposed -- 3 Proposed Methodology -- 3.1 Network Ideal and Energy Ideal -- 3.2 Energy Model -- 3.3 Cluster Formation -- 3.4 CH Selection -- 3.5 Multipath Routing -- 4 Results and Discussion -- 5 Conclusion -- References -- Secure Wireless Smart Car Door Unlocking System -- 1 Introduction -- 1.1 Organization of the Paper -- 2 Related Work -- 2.1 Pseudorandom Numbers -- 2.2 Rolling Code -- 2.3 Hashing -- 3 Methodology -- 3.1 Objective -- 3.2 Modules -- 4 Performance Evaluation -- 4.1 Type -- 4.2 Function Analysis -- 4.3 Key Size -- 4.4 Rounds -- 4.5 Time complexity -- 4.6 Space Complexity -- 4.7 Common attacks -- 4.8 Comparison with DSA Algorithm Standard -- 4.9 Usage of SHA vs MD5 in Our Proposed Method -- 5 Conclusion -- References -- A Comprehending Deep Learning Approach for Disease Classification -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Restaurant Automation Through IoT and NLP Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Results -- 5 Conclusion and Future Work -- References -- Comprehensive Assessment of Big Data in Recommendation Systems -- 1 Introduction. 2 Big Data Based Recommendation Systems -- 2.1 Data Collection Used in Recommendation Systems Approaches -- 2.2 Methods Used in Recommendation Systems -- 2.3 Contextual Suggestions -- 2.4 Neighbourhood-Based Approaches for Big Data Scaling -- 2.5 Evaluation Score Estimation -- 2.6 Evaluation of Recommendation Systems Metrics Used -- 3 Conclusion -- References -- Review on Application of Wireless Technology Using IoT -- 1 Introduction -- 2 Application of Wireless Technology -- 2.1 Structural Health Monitoring -- 2.2 Structural Damage Detection -- 2.3 Detection of Bridge Damage -- 3 Conclusion -- References -- Comparative Study of Conditional Generative Models for ISL Generation -- 1 Introduction -- 2 Literature Review -- 3 CGAN Preliminaries and ISL Dataset -- 3.1 Conditional GAN -- 3.2 ISL Dataset -- 4 Training Configuration of Models -- 5 Results of Conditional GANs on ISL Dataset -- 5.1 Results of ContraGAN on ISL Dataset -- 5.2 Results of ACGAN on ISL Dataset -- 5.3 Results of ReACGAN on ISL Dataset -- 5.4 Results of MHGAN on ISL Dataset -- 5.5 Results of BigGAN on ISL Dataset -- 5.6 Results of StyleGAN2-ADA on ISL Dataset -- 5.7 Results of StyleGAN2-DiffAug on ISL Dataset -- 5.8 Results of StyleGAN3 on ISL Dataset -- 5.9 FID Score and IS of CGANs on ISL Dataset -- 6 Conclusion -- References -- A Novel Approach for Segmenting Coronary Artery from Angiogram Videos -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 4 Proposed Research Method -- 4.1 Extracting the Frames from the Angiogram Video -- 4.2 Frame Pre-processing -- 4.3 Segmenting the Region of Interest -- 4.4 Detecting the Keyframe -- 5 Experimental Results and Analysis -- 6 Conclusion -- References -- Analysis of Different Cryptographic Algorithms in Cloud-Based Multi-robot Systems -- 1 Introduction -- 1.1 Cryptography Security Services -- 2 Literature Review -- 3 Background. 3.1 Symmetric Key Cryptography -- 3.2 Asymmetric Key Cryptography -- 4 Elliptic Curve Integrated Encryption Scheme (ECIES) -- 4.1 Encryption Algorithm For ECIES -- 4.2 Decryption Algorithm for ECIES -- 4.3 Notations -- 5 Result and Discussion -- 5.1 Encryption and Decryption Time -- 6 Conclusion and Future Scope -- References -- An IoT Based Environment Monitoring & -- Controlling System for Food Grain Warehouse -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Architecture -- 3.2 System Components -- 4 Results and Discussions -- 5 Conclusion -- References -- Numerical Analysis and ANN Modeling of the Intercooled, Reheat and Regenerative Gas Turbine Cycle -- 1 Introduction -- 2 Cycle Description and Thermal Model -- 2.1 Thermodynamic Cycle -- 2.2 Thermal Model -- 3 Results and Discussion -- 3.1 Effect of Pressure Ratio and Turbine Inlet Temperature (TIT) -- 3.2 Effect of Pressure Ratio and Compressor Inlet Temperature (CIT) -- 3.3 Effect of Effectiveness of the Heat Exchanger -- 3.4 Development of ANN Prediction Model -- 3.5 Results of the ANN Prediction Model -- 4 Conclusion -- References -- Implementation of IoT Enabled Home Automation System -- 1 Introduction -- 2 Functional Requirements -- 2.1 Internet of Things -- 2.2 System Architecture -- 3 Proposed Model -- 4 Implementation Design -- 4.1 Arduino Nano Board -- 4.2 Bluetooth HC05 Module -- 4.3 Relay Board Module -- 5 Proposed IOT Architecture -- 6 User Interaction -- 7 Implementation Details -- 8 Conclusion and Future Work -- References -- Scheduled Line of Symmetry Solar Tracker with MPT and IoT -- 1 Introduction -- 2 Existing System -- 2.1 Optimized Single-Axis Schedule Solar Tracker in Different Weather Conditions -- 2.2 Coordinated Power Management and Control of Renewable Energy Sources Based Smart Grid -- 3 Proposed System -- 3.1 Calculation of Azimuthal Angle. 3.2 Circuit Diagram -- 3.3 Flow Chart -- 4 Results and Discussion -- 5 Conclusion -- References -- A New Method for Secure Transmission of Medical Images Using Wavelet Transform and Steganography -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Materials -- 4.1 Discrete Wavelet Transform (DWT) -- 4.2 Least Significant Bits (LSB) Steganography -- 4.3 Bit-Plane Reversal -- 5 Results and Conclusion -- References -- Deep Learning Based Hand Sign Recognition in the Context of Indian Greetings and Gestures -- 1 Introduction -- 1.1 Sign Language Translation -- 1.2 Deep Learning -- 1.3 Convolutional Neural Networks -- 1.4 Object Detection -- 1.5 Neural Network Approaches -- 1.6 You Only Look Once -- 2 Related Work -- 3 Technologies -- 3.1 Python -- 4 Methodology -- 4.1 Algorithm -- 4.2 Dataset -- 4.3 Architecture -- 5 Result -- 6 Conclusion -- 7 Future Scope -- References -- Pedestrian Detection Using MobileNetV2 Based Mask R-CNN -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 MobileNetV2 -- 3.2 Proposed Mask R-CNN -- 4 Result and Experimentation -- 5 Conclusion -- References -- Localization of Calcifications in Mammograms Using CNN with GAP Layer -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Pre-processing of Data -- 3.3 Localization -- 3.4 Model -- 4 Results and Analysis -- 5 Conclusion -- 6 Future Work -- References -- Comparative Analysis of Machine Learning and Deep Learning Algorithms for Real-Time Posture Detection to Prevent Sciatica, Kyphosis, Lordosis -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Data Visualization -- 3.4 Model Training -- 3.5 Evaluating the Model -- 3.6 Model Selection -- 3.7 Integrating with OpenCV -- 4 Results Analysis -- 5 Conclusions -- References. Lightweight Block Cipher for Resource Constrained IoT Environment-An Survey, Performance, Cryptanalysis and Research Challenges. |
Record Nr. | UNINA-9910627258503321 |
Joby P. P. | ||
Singapore : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mobile Computing and Sustainable Informatics : Proceedings of ICMCSI 2021 |
Autore | Shakya Subarna |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (864 pages) |
Altri autori (Persone) |
BestakRobert
PalanisamyRam KamelKhaled A |
Collana | Lecture Notes on Data Engineering and Communications Technologies Ser. |
Soggetto genere / forma | Electronic books. |
ISBN | 981-16-1866-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Mitigating the Latency Induced Delay in IP Telephony Through an Enhanced De-Jitter Buffer -- 1 Introduction -- 1.1 Problem Formulation -- 2 Relevant Works -- 3 VOIP Technique and Network Structure -- 3.1 Media Gateways and Call Managers -- 3.2 Topologies -- 3.3 Session Initiation Protocol (SIP) -- 3.4 SIP Elements -- 4 Limitations -- 5 The Proposed Solution -- 5.1 Modification in De-Jitter Buffer -- 6 Results and Analysis -- 7 Conclusion -- References -- A Cyber-Safety IoT-Enabled Wearable Microstrip Antenna for X-Band Applications -- 1 Introduction -- 2 Existing Approach -- 3 Antenna Design -- 3.1 Antenna Configuration -- 3.2 Antenna Performance -- 3.3 Simulated Results -- 3.4 Measured Results -- 4 Conclusion and Future Work -- References -- Keyword Recognition from EEG Signals on Smart Devices a Novel Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Overview -- 2.2 Data Acquisition -- 2.3 Data Preprocessing -- 3 Feature Extraction -- 3.1 DWT Feature Extraction -- 3.2 FFT Feature Extraction -- 3.3 Feature Fusion -- 3.4 Dimensionality Reduction -- 3.5 Command Map Table and Task Observer Thread -- 3.6 Tools and Software -- 4 Classifiers Used -- 4.1 SVM Classifier -- 4.2 KNN Classification -- 4.3 CNN Classifier -- 4.4 Random Forest -- 4.5 Performance Measure -- 5 Results and Discussion -- 6 Conclusion -- References -- Security Analysis for Sybil Attack in Sensor Network Using Compare and Match-Position Verification Method -- 1 Introduction -- 2 Sybil Attach and Security -- 2.1 WSN on Security Attacks -- 2.2 Sybil the Attack -- 3 Compare with Match-Position and Verification of Method -- 4 Message Authentication and Passing (MAP) -- 5 Result and Discussion -- 6 Conclusion -- References -- Certain Strategic Study on Machine Learning-Based Graph Anomaly Detection.
1 Introduction -- 2 Generalized Machine Learning Approaches Towards Outlier Detection -- 2.1 Key Challenges Identified in ML Techniques -- 3 Graph-Based Anomaly Detection Methods -- 3.1 Moving Towards Graph Representation -- 3.2 Existing Graph Basis Anomaly Detection Methods (GBAD) -- 3.3 Baseline Link Analysis Ranking Algorithms -- 3.4 Structure-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.5 Community-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.6 Graph Compression Strategies -- 4 Open Challenges in GBAD -- 5 Concluding Remarks -- References -- Machine Learning Perspective in VLSI Computer-Aided Design at Different Abstraction Levels -- 1 Introduction to Machine Learning and VLSI CAD -- 2 The Basic Paradigm of Machine Learning -- 3 Areas of Machine Learning -- 4 Machine Learning Algorithms -- 5 Drawbacks of Machine Learning -- 6 Application of Machine Learning in VLSI CAD Abtraction Levels -- 6.1 Machine Learning in Automatic Generation of Assertion in RTL Design -- 6.2 Machine Learning in Chip Testing -- 6.3 Machine Learning for Physical Design Routing -- 6.4 Machine Learning in Physical Design Floor Planning -- 6.5 Machine Learning in Static Timimg Analysis (STA) -- 6.6 Machine Learning in Gate-Level Netlist -- 6.7 Machine Learning in EDA and IC Design -- 7 Conclusion and Future Scope -- References -- A Practical Approach to Measure Data Centre Efficiency Usage Effectiveness -- 1 Introduction -- 2 Energy Versus Power -- 2.1 IT Load -- 2.2 Effect of Outdoor Condition -- 2.3 User Configuration -- 2.4 Product Review Analysis -- 3 Related Work -- 4 Proposed Work -- 5 Result Analysis -- 6 Conclusion -- References -- Advancing e-Government Using Internet of Things -- 1 Introduction -- 2 Social Networks and Machine Learning -- 3 Health Care -- 4 Agriculture -- 4.1 Six-Layer IoT-Based Model [4-6] (Shown in Fig. 3). 4.2 Role of Unmanned Aerial Vehicles (UAVs) -- 5 Voting -- 5.1 IoT-Based Voting Framework -- 5.2 Fingerprint Matching Algorithm -- 5.3 Security -- 6 "Smart" Government? -- 7 Future Prospects -- References -- A New Network Forensic Investigation Process Model -- 1 Introduction -- 1.1 Forensic Science -- 1.2 Network Forensics -- 1.3 Need of Network Forensics -- 2 Literature Survey -- 3 Proposed Network Forensic Investigation Process Model -- 3.1 Network Forensic Readiness Module -- 3.2 Security Incident Alert Module -- 3.3 Data Acquisition Module -- 3.4 Forensic Investigation Module -- 3.5 Presentation Module -- 4 Conclusion -- References -- MDTA: A New Approach of Supervised Machine Learning for Android Malware Detection and Threat Attribution Using Behavioral Reports -- 1 Introduction -- 2 Literature Survey -- 3 System Methodology -- 4 System Design -- 5 System Algorithm -- 5.1 Build Model Algorithm -- 5.2 Feature Extraction Algorithm -- 5.3 Prediction Algorithm -- 6 System Implementation -- 6.1 Data Flow Diagram -- 6.2 Sequence Diagram -- 7 Result Analysis -- 7.1 Accuracy of Malware Detection -- 7.2 Accuracy of Threat Attribution -- 8 Experimentation -- 9 Discussion -- 10 Conclusion -- References -- Investigating the Role of User Experience and Design in Recommender Systems: A Pragmatic Review -- 1 Introduction -- 2 Related Work -- 3 Overview of Usability Engineering -- 4 Experimental Set-Up -- 5 Findings -- 6 Proposed Model -- 7 Conclusion -- 8 Future Scope -- References -- A Review on Intrusion Detection Approaches in Resource-Constrained IoT Environment -- 1 Introduction -- 2 Review of Intrusion Detection Frameworks for IoT -- 3 Open Issues -- 4 Discussion on Open Issues and Future Research Direction -- 5 Conclusion -- References -- Future 5G Mobile Network Performance in Webservices with NDN Technology -- 1 Introduction -- 2 Literature Review. 3 Network Testing Considered in Signal Error Detection and Correction Format -- 4 System Analysis -- 5 Enhanced System Design -- 5.1 Steps for Performance Improvements and Existing Analysis -- 5.2 Steps for Overcoming the Issues -- 5.3 Algorithm Equations and Operational Methods -- 6 Conclusion -- References -- Survey for Electroencephalography EEG Signal Classification Approaches -- 1 Introduction -- 1.1 Motivation -- 1.2 Survey Strategy and Evaluation -- 1.3 Paper Organization -- 2 Support Vector Machine for EEG Classification -- 3 Artificial Neural Network (ANN) for EEG Classification -- 4 Convolution Neural Network (CNN) for EEG Classification -- 5 K-Nearest Neighbor (K-NN) for EEG Classification -- 6 Linear Discriminant Analysis (LDA) for EEG Classification -- 7 Multi-classifier Approaches for EEG Classification -- 8 Other Models for EEG Classification -- 9 Analysis and Evaluation -- 10 Conclusion -- References -- Analysis of Road Accidents Using Data Mining Paradigm -- 1 Introduction -- 2 Data and Methods -- 2.1 Data Description -- 2.2 Apriori Algorithm -- 3 Results and Discussion -- 3.1 Road Type -- 3.2 Intoxication -- 4 Conclusions -- References -- Hybrid Approach to Cross-Platform Mobile Interface Development for IAAS -- 1 Introduction -- 2 State of the Art on IAAS -- 2.1 General Mechanism of IAAS -- 2.2 Implementation of IAAS -- 3 State of the Art on Mobile Development Approaches -- 3.1 Native Approach -- 3.2 Web Approach -- 3.3 Hybrid Approach -- 4 Comparative Study and Mobile Solution Proposition for IAAS -- 4.1 Description of the Interface to Be Developed -- 4.2 Proposed Development Approach -- 5 Implementation and Evaluation -- 5.1 Functional Needs Model and Analysis -- 5.2 Realization of the Proposition -- 5.3 Display Tests and Evaluation of the Solution -- 6 Conclusion -- References. Self-organizing Data Processing for Time Series Using SPARK -- 1 Introduction -- 2 Problem Definition -- 3 Related Work -- 4 Proposed Work -- 5 Results and Evaluation -- 5.1 Data and Preprocessing -- 5.2 Experimental Setup -- 5.3 Results -- 6 Conclusion -- References -- An Experimental Investigation of PCA-Based Intrusion Detection Approach Utilizing Machine Learning Algorithms -- 1 Introduction -- 1.1 Kinds of IDS -- 2 Related Work -- 3 Methodology -- 3.1 Machine Learning Techniques -- 3.2 Principal Component Analysis (PCA) -- 4 Experimental Evaluation -- 4.1 Result and Discussion -- 5 Conclusion -- References -- OpenFlow-Based Dynamic Traffic Distribution in Software-Defined Networks -- 1 Introduction -- 2 Background and Related Studies -- 2.1 Software-Defined Network (SDN) and Openflow -- 2.2 Related Works -- 3 System Design and Implementation -- 3.1 System Architecture -- 3.2 Load Balancing Algorithm -- 4 Performance Evaluation and Results -- 4.1 Performance Parameters -- 4.2 Experimental Environment -- 4.3 Experimental Design -- 4.4 Experimental Results -- 5 Conclusions and Future Works -- References -- A Comparative Study of Classification Algorithms Over Images Using Machine Learning and TensorFlow -- 1 Introduction -- 1.1 Convolutional Neural Networks -- 2 Methodology -- 3 Experimental Results -- 3.1 Model Development -- 3.2 Packages Required -- 4 Conclusion -- References -- Intelligent Routing to Enhance Energy Consumption in Wireless Sensor Network: A Survey -- 1 Introduction -- 2 Wireless Sensor Networks Structure -- 3 The Approaches to Energy Consumption Managment -- 3.1 Intelligent Routing Protocols -- 3.2 Duty Cycle -- 3.3 Data Manipulation -- 3.4 Based on Mobility -- 4 Disscusions -- 5 Conclusions -- References -- Deep Residual Learning for Facial Emotion Recognition -- 1 Introduction -- 1.1 Background -- 2 Related Works. 3 Proposed Methodology. |
Altri titoli varianti | Mobile Computing and Sustainable Informatics |
Record Nr. | UNINA-9910497103403321 |
Shakya Subarna | ||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2019) / / edited by A. Pasumpon Pandian, Ram Palanisamy, Klimis Ntalianis |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (1,019 pages) |
Disciplina | 004 |
Collana | Lecture Notes on Data Engineering and Communications Technologies |
Soggetto topico |
Engineering—Data processing
Computational intelligence Computer engineering Internet of things Embedded computer systems Artificial intelligence Data Engineering Computational Intelligence Cyber-physical systems, IoT Artificial Intelligence |
ISBN | 3-030-43192-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Wireless Sensor Networks Security Issues, Attacks and Challenges: A Survey -- Users’ Attitude on Perceived Security of Enterprise Systems Mobility: A Conceptual Model -- Cloud Based Heterogeneous Big Data Integration and Data Analysis for Business Intelligence -- Search Engine Optimization Challenges and Solutions -- A Comparison Between Robust Image Encryption and Watermarking Methods for Digital Image Protection -- Algorithms used for Scene Perception in Driverless Cars -- Data Storage Security Issues in Cloud Computing -- Review of Machine Learning in Geosciences and Remote Sensing -- An Effective Kapur's Segmentation based Detection and Classification Model for Citrus Diseases Diagnosis System -- Analysis of MRI Images using Image Processing Technique -- Comparative Analysis of Contrast Enhancement Techniques for MRI Images -- Review on Dimensionality Reduction Techniques -- Security Challenges In NoSQL and their Control Methods -- Waste Management Techniques for Smart Cities. . |
Record Nr. | UNINA-9910483263703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of international conference on intelligent computing, information and control systems : ICICCS 2020 / / A. Pasumpon Pandian, Ram Palanisamy and Klimis Ntalianis (Editors) |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XXII, 992 p. 550 illus., 402 illus. in color.) |
Disciplina | 006.31 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Artificial intelligence
Machine learning Big data |
ISBN | 981-15-8443-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Neural Networks Applied to Irrigation Control using Instrumentation and Image Analysis for a Micro-Greenhouse -- Proactive Handoff of Secondary User in Cognitive Radio Network using Machine Learning Techniques -- Inter - Device Language Translation Application for Smartphones -- Real-time Numerical Gesture Recognition using MPU9250 Motion Sensor -- Extraction and Classification of Forest Fire Image Characteristics -- Development of DWT-SVD based Digital Image Watermarking for Multi-Level Decomposition -- Stability of Model that makes Automated Comparison between Market Demands and University Curricula Offer -- Economic Load Dispatch Using Intelligent Particle Swarm Optimization -- Companion: Detection of Social Isolation in Elderly -- Machine Learning Techniques to Determine the Polarity of Messages on Social Networks. |
Record Nr. | UNINA-9910484582403321 |
Gateway East, Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|