top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 6
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 6
Autore Choudrie Jyoti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2025
Descrizione fisica 1 online resource (0 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819766840
9819766842
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910919817003321
Choudrie Jyoti  
Singapore : , : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 3 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 3 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (623 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 9789819766758
9819766753
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Risk Analysis for Fall Detection: Exploiting Using GAIT, Part Affinity Field and Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Gait Analysis Using Image Processing -- 2.2 OpenPose: Realtime Multi-person 2D Pose Estimation Using Part Affinity Fields -- 2.3 Fall Detection Based on Key Points of Human-Skelet Using Open Pose -- 3 Methodology -- 3.1 Open Pose -- 3.2 Confidence Maps -- 3.3 Part Affinity Field -- 3.4 Fall Detection -- 4 Conclusion -- References -- Optimizing Content-Based Image Retrieval System Using Convolutional Neural Network Models -- 1 Introduction -- 2 Related Word -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Deep Features Extraction Using ResNet Pre-trained CNN -- 4 Results and Discussion -- 5 Conclusion -- References -- Advancements in Convolutional Neural Networks for Accurate and Efficient Skin Cancer Classification: A Comprehensive Survey -- 1 Introduction -- 2 Related Word -- 3 Why Does Skin Cancer Develop? -- 3.1 Other Types of Skin Cancers -- 4 Input Data -- 5 Proposed Methodology -- 5.1 ML Approaches Used in Skin Cancer Detection -- 5.2 CNN with Deep Learning Methods in Skin Cancer -- 5.3 Transfer Learning (TL) with CNN Architectures -- 5.4 Managerial Implications of the Methodologies -- 6 Conclusions -- References -- DestinAI: Your Personalized Travel Itinerary Planner and Chat Catalyst Using Generative AI -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- Technical and Economic Sustainability of Alternative Livelihood Strategies at the Grassroots: A Case Study in Byse, Karnataka, India -- 1 Introduction -- 1.1 Study Area -- 2 Methodology -- 2.1 Phase 1: Participatory Community and Challenge Understanding -- 2.2 Phase 2: Looking for Solutions.
3 Results -- 3.1 Technical Sustainability Assessment: A User-Centred Approach -- 3.2 Business Sustainability Assessment -- 4 Discussion -- 5 Conclusion -- References -- Comprehensive Certificate Validation and Verification System for Educational Institutes Using Blockchain -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Architecture -- 3.2 Workflow -- 4 Result and Discussion -- 5 Conclusion and Future Scope -- References -- An IOT and Machine Learning-Based System for Detecting Driver Drowsiness -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Design -- 3.2 Dataset -- 3.3 Preprocessing -- 3.4 Feature Extraction -- 3.5 Model Selection -- 3.6 IOT Technology -- 3.7 Jetson Nano -- 4 Result and Feature Work -- 4.1 Result -- 4.2 Feature Work -- 5 Conclusion -- References -- A Survey on Data Preprocessing Techniques in Stream Mining -- 1 Introduction -- 2 Challenges During Preprocessing Stream of Data -- 3 Data Reduction Techniques -- 3.1 Dimensionality Reduction -- 3.2 Instance Reduction Techniques -- 4 Data Cleaning -- 4.1 Imputing Missing Values -- 4.2 Noisy Data Removal -- 5 Data Integration -- 5.1 Extract -- 5.2 Transform -- 5.3 Load -- 6 Data Transformation -- 7 Conclusion -- References -- Data Privacy Attacks on Federated Learning -- 1 Introduction -- 2 Security Vulnerabilities in FL -- 2.1 Model Inversion Attacks -- 2.2 Poisoning Attacks -- 2.3 Data Reconstruction Attacks -- 2.4 Sybil Attacks -- 2.5 Generative Adversarial Network-Based Attacks -- 2.6 Model Stealing Attacks -- 3 Possible Solutions -- 3.1 Differential Privacy -- 3.2 Homomorphic Encryption -- 3.3 Secure Aggregation -- 3.4 Secure Multiparty Computation (SMC) -- 3.5 Attack Detection -- 3.6 Participant Authentication -- 3.7 Regular Auditing -- 4 Analysis of Existing Approach -- 5 Conclusion -- References.
Augmented Generalized Quadrature Spatial Modulation (AGQSM): Performance Evaluation in Spatially Correlated Channels for Next-Generation Wireless Communications -- 1 Introduction -- 2 System Model -- 3 Detection Methods -- 4 Findings and Analysis -- 5 Conclusion -- References -- Enhancing Security in a University Network Using Snort and Wireshark -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Proposed Work -- 5 Implementation and Result Analysis -- 6 Conclusion and Future Work -- References -- Social Responsibility of Business Entities in Achieving Sustainability: A CSR Review -- 1 Introduction -- 2 Defining Sustainability -- 3 Noteworthiness of Sustainable Development as a CSR Activity -- 4 Modus Operandi -- 5 Cases Used for the Study -- 5.1 Cummins India Ltd. -- 5.2 DB Corporation Ltd. -- 5.3 Karnataka Bank Ltd. -- 5.4 Century Plyboard India Ltd. -- 5.5 Tata Sponge Iron -- 5.6 Power Finance Corp Ltd. -- 5.7 Bharat Heavy Electrical Ltd. -- 5.8 Amrutanjan Healthcare -- 5.9 Atul Ltd. -- 6 Futuristics Research and Conclusion -- References -- Factors Affecting Digital Shifting of Food Industries Through Food Apps for Business Sustainability: an Empirical Study -- 1 Introduction -- 2 Conceptual Background and Hypothesis Development -- 2.1 TAM Facets -- 2.2 Relation Between ATT and INTFA -- 2.3 TPB Facets -- 2.4 Affordance as Moderator -- 3 Methodology and Results -- 3.1 Data Collection -- 3.2 Common Method Bias -- 3.3 Measurement Model: Reliability and Validity Testing -- 3.4 Structural Model: Hypothesis Testing -- 3.5 Moderation Analysis -- 4 Discussion -- 5 Conclusion -- 6 Theoretical and Managerial Implications -- 7 Study Limitations and Future Scope -- References -- Blockchain Organ Transplant Network with Fitness Check -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Architecture -- 3.2 Smart Contract -- 4 Result -- 5 Conclusion.
References -- An Implementation of Monte Carlo Tree Search Algorithm: Comparison with Random Samples -- 1 Introduction -- 2 Monte Carlo Tree Search -- 3 An Overview of Advanced Tic-Tac-Toe -- 4 Implementation -- 5 Results -- 6 Conclusion -- References -- Ur's Corporator-Innovating Citizen Corporator Interaction Through ML-Enabled Comprehensive Framework -- 1 Introduction -- 2 Problem Statement -- 3 Methodology -- 4 Applications -- 5 Literature Review -- 6 System Architecture -- 6.1 Explanation of System Architecture -- 7 Result and Discussion -- 8 Conclusion -- 9 Future Scope -- References -- Research Trends in Technology for Achieving Sustainable Development Goals -- 1 Introduction -- 2 Related Work -- 3 Methods -- 4 Results -- 4.1 Publication and Citation Trends -- 4.2 Impact of Open Access -- 4.3 Fields of Research -- 4.4 Prolific Institutions -- 4.5 Top Funders -- 5 Conclusion -- References -- A Comparative Evaluation of Different Distance Measures for Determining Initial Seeds in the K-means Algorithm -- 1 Introduction -- 2 The QuIK Algorithm -- 3 Some Popular Distance Measures for Numerical Data -- 4 The Novel Distance Function in the QuIK Seeding -- 5 Literature Review -- 6 Methodology -- 7 Experiments and Results -- 8 Conclusion -- References -- Etherdocs: Student Document Management Using Ethereum Blockchain and IPFS -- 1 Introduction -- 2 Problem Statement -- 3 Literature Review -- 3.1 Assumptions -- 3.2 Limitations of Existing Systems -- 4 Methodology -- 4.1 Issuer -- 4.2 Verifier -- 5 Implementation -- 6 Results -- 7 Conclusion -- References -- Beyond Ledgers: Exploring the Impact of Blockchain on Global Supply Chain Networks -- 1 Introduction -- 1.1 Background -- 1.2 Scope and Objectives -- 2 Fundamentals of Blockchain in Supply Chain -- 2.1 Blockchain Architecture -- 2.2 Blockchain in Supply Chain Management.
3 Current Trends and Challenges -- 3.1 Challenges in Traditional Supply Chains -- 3.2 Previous Studies -- 3.3 The Promise of Blockchain Technology -- 3.4 Applications of Blockchain in Supply Chain -- 4 Challenges in Adopting Blockchain in SCM and Preferable Solution -- 5 Future Directions and Research Gaps -- 6 Conclusion -- References -- Farmer-Based Smart Vegetable Vending Machine for the Modern Era -- 1 Introduction -- 2 Background and Related Work -- 3 Research Gap -- 4 Proposed Solution -- References -- Automated Question Generation System Using NLP -- 1 Introduction -- 2 Literature Review -- 2.1 TF-IDF and N-Grammode -- 2.2 RNN Encoder-Decoder -- 2.3 BART -- 2.4 BERT -- 2.5 T-5 -- 3 Implementation -- 3.1 Data Preparation -- 3.2 WorkFlow -- 3.3 Training -- 4 Results -- 5 Conclusion -- References -- Transforming Workspaces: The Convergence of Li-Fi, FTTO, and PoE -- 1 Introduction -- 2 Literature Review -- 2.1 Building Energy Management System: A Review -- 2.2 Seamless Interfacing with Thunderbolt™ 4.0 -- 3 Methodology -- 3.1 Assessment -- 3.2 Technology Selection -- 3.3 System Design -- 3.4 Implementation -- 3.5 Evaluation and Optimization -- 4 Hardware Components -- 4.1 BMS Device with ARM Processor -- 4.2 CCTV -- 4.3 Ethernet Cable (802.3bt) -- 4.4 PoE Switches -- 4.5 Wi-Fi Router -- 4.6 USB Type-C Port -- 4.7 Li-Fi Technology -- 4.8 Split AC -- 4.9 Polycarbonate Sheets -- 4.10 Batteries -- 5 Hardware and Software Architecture -- 5.1 Block Diagram -- 5.2 AutoCAD and REVIT Design -- 6 Conclusion -- References -- Precise AI-Driven Cattle Identification and Classification System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Preparation -- 3.2 Image Validation -- 3.3 Muzzle Point Detection and Extraction -- 3.4 Pattern Extraction and Matching -- 4 Results and Discussions -- 5 Conclusions -- References.
Instagram Reels Bites: Factors Influencing Food Customer Engagement and Intention to Purchase Food Through Instagram Reels.
Record Nr. UNINA-9910900178903321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 4 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 4 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (611 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 9789819766789
9819766788
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- Contents -- Editors and Contributors -- Guarding the Future: Anomaly Detection in IoT-Enabled Smart Cities -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Preprocessing -- 3.3 Feature Extraction Using IPCA Algorithm -- 3.4 Feature Extraction Using Genetic Algorithm -- 3.5 Training -- 3.6 Classification -- 4 Result and Discussion -- 4.1 Limitation and Challenges -- 5 Conclusion -- References -- A Comprehensive Analysis of Cyberbullying Detection Using Various Machine Learning Approaches -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Evaluation Framework -- 5 Results and Discussions -- 6 Future Scope -- 7 Conclusion -- References -- AI in UI/UX Design: A Paradigm Shift -- 1 Introduction -- 1.1 Artificial Intelligence (AI) -- 1.2 Neural Networks
Record Nr. UNINA-9910903799503321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 5 / / edited by Jyoti Choudrie, Parikshit N Mahalle, Thinagaran Perumal, Amit Joshi
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 5 / / edited by Jyoti Choudrie, Parikshit N Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (599 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 9789819766819
9819766818
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910908366403321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
ICT for Intelligent Systems : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (524 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Smart Innovation, Systems and Technologies
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 9789819939824
9819939828
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Detection Model for IoT Networks using Graph Convolution Networks(GCN) -- Drowsiness Detection System -- A Deep Learning Technique to Recommend Music based on Facial and Speech Emotions -- Smart Chair Posture Detection and Correction Using IOT -- The Opinions Imparted On Singular’s Face.
Record Nr. UNINA-9910746086103321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT with Intelligent Applications : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
ICT with Intelligent Applications : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (647 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 981-9937-58-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Monitoring Algorithm for Datafication and Information Control for Data Optimization -- 1 Introduction -- 1.1 Datafication -- 1.2 Information Control -- 2 Literature Review -- 3 Datafication and Information Control -- 4 Algorithm for Datafication and Information Control -- 5 Conclusion -- References -- Understanding Customer Perception Regarding Branded Fuel 'XP-95' in IOCL Retail Outlets Using Business Intelligence (BI) by the Help of NVIVO and SPSS Software -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 3.1 Qualitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 3.2 Quantitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 4 Discussion and Findings -- 5 Conclusion -- References -- Investigation of Aadhaar Card Enrolment in Government Schools Using R -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Steps Involved in the Data Analysis -- 3.2 Data Preprocessing -- 4 Results and Discussion -- 4.1 Data Collection -- 4.2 Data Analysis -- 4.3 Correlation and Regression Line -- 4.4 Line Graph -- 4.5 Comparison of Aadhaar Enrolment -- 5 Conclusion -- References -- Automated Spurious Product Review Auditing System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Signed Interface Algorithm Working -- 4 Result and Analysis -- 5 Conclusion -- References -- A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloud/Fog Computing -- 1 Introduction -- 1.1 Cloud Computing -- 1.2 Fog Computing -- 1.3 Internet of Things (IoT) -- 2 Background -- 2.1 Rivest-Shamir-Adleman Algorithm (RSA) -- 2.2 Elliptical Curve Cryptography Algorithm (ECC) -- 2.3 ECC Standardization Process -- 3 Comparison of ECC and RSA Algorithm -- 4 Conclusion -- References.
Data Prevention Protocol for Cloud Computing Security Using Blockchain Technology -- 1 Introduction -- 2 Block-Chain Technology -- 3 Structure of Block-Chain -- 4 Features of Block-Chain System -- 5 Challenges -- 6 Secure Solution for Cloud -- 7 Requirements of Cloud -- 8 Solutions for Cloud Data Security Based on Block-Chain Technology -- 9 Examples of Cloud Data Security Based Block-Chain Technology -- 9.1 Secure Cloud Data Privacy -- 9.2 Cloud Data Unity -- 9.3 Cloud Data Detectability -- 10 Review Outcomes and Research Gap -- 11 Conclusions -- References -- Intelligence Monitoring of Home Security -- 1 Introduction -- 2 Proposed Device -- 3 Components Specifications -- 4 Future Scope -- References -- TB Bacteria and WBC Detection from ZN-Stained Sputum Smear Images Using Object Detection Model -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 TB Bacteria Detection Using RetinaNet Object Detection Model -- 2.3 Implementation Details -- 2.4 Comparison with Other Object Detection Model -- 2.5 Performance Metrics -- 3 Result and Discussion -- 4 Conclusion -- References -- AuraCodes: Barcodes in the Aural Band -- 1 Introduction -- 2 Technical Analysis -- 2.1 Components of the EAN13 Barcode -- 2.2 Components of the QR Code -- 3 Proposition -- 4 Implementation -- 5 Experimental Results -- 6 Future Work -- 7 Conclusion -- References -- A Scrutiny and Investigation on Student Response System to Assess the Rating on Profuse Dataset-An Aerial View -- 1 Introduction -- 2 Literature Survey -- 3 Motivation and Background Study -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization -- 3.4 Stemming -- 3.5 Future Selection -- 3.6 Classification -- 3.7 Evaluation -- 3.8 Visualization -- 4 Dataset -- 5 Observations and Analysis -- 6 Results and Discussions -- 7 Conclusions -- References.
Analysis of Hospital Patient Data Using Computational Models -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Creation -- 3.2 Data Preprocessing -- 3.3 Model Building -- 3.4 Evaluation -- 3.5 Clustering -- 4 Results -- 4.1 Elbow Method -- 4.2 Silhouette Analysis -- 5 Conclusion -- References -- A Research on the Impact of Big Data Analytics on the Telecommunications Sector -- 1 Introduction -- 2 Trends in the Implementation of Big Data Analytics in the Telecom Industry -- 3 Regional Insight -- 4 Challenges of the Telecommunication Industry -- 4.1 Operation-Related Costs -- 4.2 Needs for Consumers -- 4.3 Information Security and Breaches -- 4.4 Collaboration -- 4.5 High-Speed Data-in-Motion -- 4.6 Support for Application and Network Intelligence -- 4.7 Real-Time Actionable Insights -- 5 Telecommunication Industry, Big Data Analytics, and Customer Services -- 6 Conclusion -- References -- Face Mask Isolation Canister Design for Healthcare Sector Towards Preventive Approach -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Gap Analysis -- 5 Proposed Design -- 6 Working -- 7 Applications -- 8 Future Scope -- 9 Conclusion -- References -- Modeling the Impact of Access to Finance on MSMEs' Contribution Towards Exports of the Economy -- 1 Introduction -- 2 Reviews of Related Literatures -- 3 Objectives of the Research -- 4 Methodology of the Study -- 5 Linear Regression Model -- 6 Analysis of Data and Discussion -- 6.1 Export Contribution of Indian MSME Sector -- 6.2 Regression Analysis and Their Interpretation -- 7 Scope for Future Research -- 8 Conclusion and Recommendations -- References -- Privacy Challenges and Solutions in Implementing Searchable Encryption for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 2.1 Proxy Re-encryption with and without Keyword Search -- 3 Conclusion -- References.
Multi-objective Optimization with Practical Constraints Using AALOA -- 1 Introduction -- 2 Problem Formulation -- 2.1 Objective Functions -- 2.2 Constraints -- 3 Proposed Algorithm -- 4 Multi-objective Optimization Strategies -- 4.1 Non-dominated Sorting -- 4.2 Archive Selection -- 4.3 Fuzzy Approach -- 5 Results and Analysis -- 5.1 Example-1: Benchmark Test Functions -- 5.2 Example-2: Electrical Test System -- 6 Conclusion -- References -- An Implementation of Lightweight Cryptographic Algorithm for IOT Healthcare System -- 1 Introduction -- 2 Methodology -- 2.1 Materials -- 2.2 Proposed Architecture -- 3 Experimental Setup and Results -- 3.1 Performance Evaluation -- 4 Discussions -- 5 Conclusions and Future Work -- References -- Home Appliances Automation Using IPv6 Transmission Over BLE -- 1 Introduction -- 2 Work Flow -- 3 Proposed Algorithm -- 4 Initial Setup and Plateform -- 5 Experimental Setup for Connect Raspberry BLE with Mobile nRF Connect App -- 6 Experimental Results -- 7 Conclusion -- References -- IoT Based Collision Avoidance System with the Case Study Using IR Sensor for Vehicles -- 1 Introduction -- 1.1 Types of Collision Avoidance Assist Systems -- 2 Literature Review -- 3 Motivation -- 4 Methodology -- 4.1 Arduino Uno -- 4.2 Ultrasonic Sensors -- 4.3 Motor Driver -- 5 Result and Discussion -- 6 Conclusion and Future Work -- References -- Airline Ticket Price Forecasting Using Time Series Model -- 1 Introduction -- 2 Related Work -- 3 Background of the Work -- 4 Proposed Work -- 4.1 Important Packages -- 4.2 Dataset Collection -- 4.3 Building Model -- 5 Flask Python Web Framework -- 6 Experimental Results -- 6.1 Accuracy -- 7 Conclusion -- References -- AI Powered Authentication for Smart Home Security-A Survey -- 1 Introduction -- 2 Related Work -- 3 Face Recognition Technologies -- 3.1 Appearance-Based Methods.
3.2 Single-Shot Methods -- 3.3 Multi-shot Methods -- 3.4 Rgbd-Based Approaches -- 4 Proposed Methodologies -- 4.1 Grassman Algorithm -- 4.2 Convolutional Neural Network Algorithm -- 4.3 Limitations -- 4.4 Future Works -- 5 Conclusion -- References -- WSRR: Weighted Rank-Relevance Sampling for Dense Text Retrieval -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Experiments and Results -- 5 Conclusions -- References -- Tweet Based Sentiment Analysis for Stock Price Prediction -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 System Architecture -- 3.2 Module Descrption -- 3.3 Data Processing: Data Training -- 3.4 Model Training -- 4 Implementation -- 4.1 CEA Algorithm -- 5 Result and Analysis -- 6 Conclusion and Future Work -- References -- A Study on the Stock Market Trend Predictions -- 1 Introduction -- 2 Background -- 2.1 Research Mainly Based on Technical Analysis -- 2.2 Research Mainly Based on Sentiment Analysis -- 3 Conclusion -- References -- Optimization of Partial Products in Modified Booth Multiplier -- 1 Introduction -- 2 Booth's Algorithm -- 3 Modified Booth's Algorithm -- 4 Optimized Booth's Multiplier (OBM) -- 4.1 Proposed Algorithm to Reduce Partial Products -- 4.2 16 × 16 Multiplication Using OBM -- 5 Results and Discussion -- 5.1 FPGA Device Utilization -- 5.2 Simulation Results -- 6 Conclusion -- References -- Comparative Study on Text-to-Image Synthesis Using GANs -- 1 Introduction -- 2 Literature Review -- 2.1 Cycle-Consistent Inverse GAN for Text-to-Image Synthesis -- 2.2 Dynamic Aspect-Aware GAN for Text-to-Image Synthesis -- 2.3 Cycle Text-to-Image GAN with BERT -- 3 Conclusion -- References -- Online Hate Speech Identification Using Fine-tuned ALBERT -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Experiment -- 4.1 Training Details of ALBERT Base Version 2.
4.2 Fine-Tuned ALBERT.
Record Nr. UNINA-9910746286703321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT with Intelligent Applications : Proceedings of ICTIS 2021, Volume 1
ICT with Intelligent Applications : Proceedings of ICTIS 2021, Volume 1
Autore Senjyu Tomonobu
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2022
Descrizione fisica 1 online resource (802 pages)
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Smart Innovation, Systems and Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 9789811641770
9789811641763
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910512167403321
Senjyu Tomonobu  
Singapore : , : Springer Singapore Pte. Limited, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2024, Volume 1
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2024, Volume 1
Autore Roy Satyabrata
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2025
Descrizione fisica 1 online resource (563 pages)
Disciplina 006.3
Altri autori (Persone) SinwarDeepak
DeyNilanjan
PerumalThinagaran
R. S. TavaresJoão Manuel
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819769957
9819769957
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910921007703321
Roy Satyabrata  
Singapore : , : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2024, Volume 2
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2024, Volume 2
Autore Roy Satyabrata
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2025
Descrizione fisica 1 online resource (564 pages)
Disciplina 006.3
Altri autori (Persone) SinwarDeepak
DeyNilanjan
PerumalThinagaran
R. S. TavaresJoão Manuel
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819769926
9789819769919
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910917192503321
Roy Satyabrata  
Singapore : , : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2022
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2022
Autore Roy Satyabrata
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 online resource (764 pages)
Disciplina 006.3
Altri autori (Persone) SinwarDeepak
DeyNilanjan
PerumalThinagaran
TavaresJoão Manuel R. S
Collana Lecture Notes in Networks and Systems Series
Soggetto topico Computational intelligence
Computer vision
ISBN 9789819926022
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Organizing Committee -- Preface -- Contents -- Editors and Contributors -- Empirical Study of Multi-class Weed Classification Using Deep Learning Network Through Transfer Learning -- 1 Introduction -- 2 Related Work -- 3 Data Preparation and Methodology -- 3.1 Dataset Used -- 3.2 Preprocessing -- 4 Materials and Methods -- 4.1 Convolutional Neural Network (CNN) -- 4.2 Transfer Learning -- 5 Experimental Results -- 6 Conclusion and Future Work -- References -- Secured Face Recognition System Based on Blockchain with Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Pixel to Blocks -- 3.2 Face Recognition -- 4 Experiments -- 5 Conclusion -- References -- Classifying Paintings/Artworks Using Deep Learning Techniques -- 1 Introduction -- 2 Literature Review -- 2.1 Motivation -- 3 Methodologies -- 3.1 Dataset -- 3.2 Model Building -- 3.3 Model Testing -- 4 Results -- 5 Conclusion -- References -- Hybrid Deep Face Music Recommendation Using Emotions -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Collection -- 3.2 Methodology -- 3.3 Algorithm -- 4 Experimental Results and Analysis -- 4.1 Results -- 4.2 Conclusion -- 4.3 Future Scope -- References -- Integrating ResNet18 and YOLOv4 for Pedestrian Detection -- 1 Introductıon -- 2 Related Works -- 3 Proposed System -- 3.1 Input -- 3.2 Backbone (ResNet18) -- 3.3 Neck -- 4 Experiments and Discussion -- 5 Conclusions -- References -- Image Restoration from Weather Degraded Images Using Markov Random Field -- 1 Introduction -- 2 Literature Survey -- 3 Background -- 4 Proposed Methodology -- 5 Experimental Results -- 6 Conclusion and Future Work -- References -- A Feature Representation Technique for Angular Margin Loss -- 1 Introduction -- 2 Background -- 3 Proposed Technique -- 3.1 Feature Representation as a Signal.
3.2 Feature Similarity Functions -- 4 Experiment and Result -- 4.1 Experiment Setup -- 4.2 Result -- 5 Conclusion -- References -- LeafViT: Vision Transformers-Based Leaf Disease Detection -- 1 Introduction -- 2 Related Work -- 2.1 Shape and Texture-Based Leaf Disease Identification -- 2.2 Deep Learning-Based Leaf Disease Detection -- 2.3 Fine-Grained Visual Categorization (FGVC) -- 2.4 Transformers Models in Computer Vision -- 3 Proposed Method -- 3.1 Model Architecture -- 3.2 Loss Function -- 3.3 Class Imbalance -- 4 Implementation -- 4.1 Dataset -- 4.2 Hyperparameters -- 5 Experiments -- 5.1 Ablation Studies -- 5.2 Evaluation Metrics -- 6 Conclusion -- References -- Conversion of Satellite Images to Google Maps Using GAN -- 1 Introduction -- 2 Related Work -- 2.1 Problem Definition -- 2.2 Dataset -- 3 Methodology -- 3.1 U-Net -- 3.2 CycleGAN U-Net -- 3.3 W-Net -- 3.4 CycleGAN W-Net -- 3.5 Experiments -- 3.6 Metrics -- 4 Analysis -- 4.1 Two Sample Z-Test and Objectives of Results -- 4.2 Road, Water, and Forest Dataset -- 5 Results -- 6 Conclusion + Future Scope -- References -- Investigation of Widely Used Implicit and Explicit Communication in Crossing-Decision of Pedestrian in UAE -- 1 Introduction -- 2 Literature Review -- 3 Method -- 4 Result -- 4.1 At Unsignalized Pedestrian Crossing -- 4.2 Signalized Crossing or Pelican Crossing -- 4.3 Mid-road Crossing -- 4.4 Unsignalized T-Junctions Crossing -- 4.5 Residential Area Crossing -- 5 Discussion -- 6 Conclusion -- References -- Attention Deficit Hyperactivity Disorder Prediction Using Resting-State Networks -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Gathering and Cleaning -- 3.2 Data Preprocessing and Feature Extraction -- 3.3 Model Selection and Planning -- 4 Results -- 4.1 Testing Hypotheses -- 4.2 ROC Curve -- 5 Conclusion -- References.
Neuroinformatics Deep Learning Synthesizer Based on Impulse Control Disorder Using LSTM Cells -- 1 Introduction -- 2 Using Deep Learning Capabilities for Diagnosis of the Disease -- 3 Methodology and System Description -- 4 Data Preparation and Results-Based Orientation -- 5 Data-Set Description -- 6 Baseline Models -- 7 Results -- 8 Conclusion -- References -- Wasserstein GANs-Enabled Spectral Normalization on Credit Card Fraud Detection -- 1 Introduction -- 2 Background -- 3 Proposed Method -- 3.1 Undersampling -- 3.2 Oversampling -- 3.3 Generative Adversarial Nets/Conditional -- 3.4 Wasserstein GANs -- 3.5 Batch Normalization -- 3.6 Spectral Normalization -- 3.7 L1 Loss -- 3.8 Metrics -- 4 Experiments -- 4.1 Data -- 4.2 Classification Model -- 4.3 Model Parameters -- 5 Observation -- 6 Conclusion -- References -- Classification of Bipolar Disorder Using Deep Learning Models on fMRI Data -- 1 Introduction -- 2 Methodology -- 2.1 Preprocessing (FuNP) -- 2.2 Feature Extraction (ICA) -- 2.3 Feature Selection (T-Score Approach) -- 2.4 Model Training (ANN and LSTM) -- 3 Results -- 4 Conclusion -- References -- Predicting Schizophrenia from fMRI Using Deep Learning -- 1 Introduction -- 2 Methodology -- 2.1 Data Preprocessing and Analysis -- 2.2 Model Training -- 3 Results -- 4 Conclusions -- References -- Patrolling Robot with Facial Detection -- 1 Introduction -- 2 Literature Review -- 3 Related Work -- 3.1 Haar Cascade Classifier -- 3.2 MediaPipe by Google -- 4 Methodology -- 4.1 Hardware -- 4.2 Software -- 5 Results and Discussion -- 6 Conclusion -- References -- A Graph-Based Relook Beyond Metadata for Music Recommendation -- 1 Introduction -- 2 Related Work -- 2.1 Representation Learning for Users -- 2.2 Representation Learning for Music -- 2.3 Recommendation Models -- 3 Dataset -- 4 Recommendation Models -- 5 Proposed Methodology.
6 Results and Analysis -- 6.1 Analysis of Results -- 7 Conclusion and Future Work -- References -- An Interpretability Assisted Empirical Study of Affective Traits in Visual Content of Disinformation -- 1 Introduction -- 2 Related Work -- 2.1 Visual Emotion in Disinformation Campaigns -- 2.2 Detection of Visual Emotion in Contexts -- 2.3 Interpretability Techniques for Visual Emotion Detection Models -- 3 Methodology -- 4 Dataset -- 5 Results and Discussions -- 5.1 RQ1: Do Visual Emotions Enhance the Message in a Disinformation Campaign? -- 5.2 RQ2: Do the Predominant Emotions Differ in Different Types of Disinformation Campaigns? -- 5.3 RQ3: To What Extent, the Emotional Theme Is Consistent or Event Specific Across Events of a Specific Disinformation Type? -- 6 Summary and Future Work -- References -- Multi-scale Fusion-Based Object Detection Network for Advance Driver Assistance Systems -- 1 Introduction -- 2 Related Work -- 2.1 Stage-1 Detectors -- 2.2 Stage 2-Detectors -- 3 Proposed Work-Multi-scale Fusion-Based Detection Architecture -- 3.1 Multi-scale Fusion-Based Object Detection Architecture -- 3.2 Dimensional Scaling -- 3.3 Multi-scaling -- 4 BiFPN -- 4.1 Inter-scale Links -- 4.2 Feature Fusion with Weights -- 5 System for Box/Class Estimation -- 6 Hyperparameters -- 7 Salient Features of Proposed Methodology -- 8 Experimental Results -- 9 Conclusion -- References -- Vectorization of Python Programs Using Recursive LSTM Autoencoders -- 1 Introduction -- 2 Literature Survey -- 2.1 Existing Systems -- 2.2 Background -- 3 Autoencoder Architecture -- 3.1 Encoder Architecture -- 3.2 Decoder Architecture -- 4 Dataset -- 5 Methodology -- 6 Results and Discussion -- 7 Conclusion -- References -- Phenology Detection for Croplands Using Sentinel-2 and Computer Vision Techniques -- 1 Introduction -- 2 Implementation and Experiments.
2.1 Autodetection of Farms from Geosatellite Images Using Computer Vision and Deep Learning -- 2.2 Fetching Image Data of Farms from Sentinel-2 and Processing It to Obtain the Time-Series NDVI Values -- 2.3 Denoising Raw NDVI Data -- 2.4 Interpolation of Mean NDVI Data -- 3 The Phenology Algorithm -- 3.1 The Start of Season (SOS) -- 3.2 The Peak of Season (POS) -- 3.3 The End of Season (EOS) -- 3.4 The Valley of Season (VOS) -- 3.5 Length of Season (LOS) -- 3.6 The Computation of Phenology Phases -- 4 Results and Discussion -- 5 Conclusion -- References -- Deep Learning-Based Safety Assurance of Construction Workers: Real-Time Safety Kit Detection -- 1 Introduction -- 2 Related Work -- 2.1 Based on Sensors -- 2.2 Based on Vision -- 3 Methodology -- 3.1 YOLO Detector -- 3.2 YOLO v5 and YOLO v6 -- 4 Dataset Preparation-HVM Dataset -- 4.1 Data Augmentation and Preprocessing Techniques -- 5 Validation Metrics -- 6 Results and Discussion -- 7 Conclusion -- References -- Automatic Detection and Classification of Melanoma Using the Combination of CNN and SVM -- 1 Introduction -- 2 Materials and Method -- 2.1 Images Used -- 2.2 Pre-processing -- 2.3 Feature Extraction -- 2.4 Classification -- 3 Results and Discussion -- 4 Conclusions -- References -- CyINSAT: Cyclone Dataset from Indian National Satellite for Forecasting -- 1 Introduction -- 2 Cyclone Dataset from Indian National Satellite -- 2.1 Properties -- 2.2 Construction -- 2.3 Related Datasets -- 3 Applications -- 3.1 Forecasting Parameters -- 3.2 Cyclone Track Forecasting -- 4 Conclusion -- References -- Classification of Ocular Diseases: A Vision Transformer-Based Approach -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data -- 3.2 Vision Transformer -- 3.3 Training Phase -- 3.4 Optimizer -- 3.5 Regularization -- 4 Results -- 4.1 Learning Curves -- 4.2 Performance Metrics.
5 Conclusion.
Record Nr. UNINA-9910751394403321
Roy Satyabrata  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Opere

Altro...

Lingua di pubblicazione

Altro...

Data

Data di pubblicazione

Altro...