top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
ICT for Intelligent Systems [[electronic resource] ] : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
ICT for Intelligent Systems [[electronic resource] ] : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (524 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Smart Innovation, Systems and Technologies
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 981-9939-82-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Detection Model for IoT Networks using Graph Convolution Networks(GCN) -- Drowsiness Detection System -- A Deep Learning Technique to Recommend Music based on Facial and Speech Emotions -- Smart Chair Posture Detection and Correction Using IOT -- The Opinions Imparted On Singular’s Face.
Record Nr. UNINA-9910746086103321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT with Intelligent Applications [[electronic resource] ] : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
ICT with Intelligent Applications [[electronic resource] ] : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (647 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 981-9937-58-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Monitoring Algorithm for Datafication and Information Control for Data Optimization -- 1 Introduction -- 1.1 Datafication -- 1.2 Information Control -- 2 Literature Review -- 3 Datafication and Information Control -- 4 Algorithm for Datafication and Information Control -- 5 Conclusion -- References -- Understanding Customer Perception Regarding Branded Fuel 'XP-95' in IOCL Retail Outlets Using Business Intelligence (BI) by the Help of NVIVO and SPSS Software -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 3.1 Qualitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 3.2 Quantitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 4 Discussion and Findings -- 5 Conclusion -- References -- Investigation of Aadhaar Card Enrolment in Government Schools Using R -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Steps Involved in the Data Analysis -- 3.2 Data Preprocessing -- 4 Results and Discussion -- 4.1 Data Collection -- 4.2 Data Analysis -- 4.3 Correlation and Regression Line -- 4.4 Line Graph -- 4.5 Comparison of Aadhaar Enrolment -- 5 Conclusion -- References -- Automated Spurious Product Review Auditing System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Signed Interface Algorithm Working -- 4 Result and Analysis -- 5 Conclusion -- References -- A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloud/Fog Computing -- 1 Introduction -- 1.1 Cloud Computing -- 1.2 Fog Computing -- 1.3 Internet of Things (IoT) -- 2 Background -- 2.1 Rivest-Shamir-Adleman Algorithm (RSA) -- 2.2 Elliptical Curve Cryptography Algorithm (ECC) -- 2.3 ECC Standardization Process -- 3 Comparison of ECC and RSA Algorithm -- 4 Conclusion -- References.
Data Prevention Protocol for Cloud Computing Security Using Blockchain Technology -- 1 Introduction -- 2 Block-Chain Technology -- 3 Structure of Block-Chain -- 4 Features of Block-Chain System -- 5 Challenges -- 6 Secure Solution for Cloud -- 7 Requirements of Cloud -- 8 Solutions for Cloud Data Security Based on Block-Chain Technology -- 9 Examples of Cloud Data Security Based Block-Chain Technology -- 9.1 Secure Cloud Data Privacy -- 9.2 Cloud Data Unity -- 9.3 Cloud Data Detectability -- 10 Review Outcomes and Research Gap -- 11 Conclusions -- References -- Intelligence Monitoring of Home Security -- 1 Introduction -- 2 Proposed Device -- 3 Components Specifications -- 4 Future Scope -- References -- TB Bacteria and WBC Detection from ZN-Stained Sputum Smear Images Using Object Detection Model -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 TB Bacteria Detection Using RetinaNet Object Detection Model -- 2.3 Implementation Details -- 2.4 Comparison with Other Object Detection Model -- 2.5 Performance Metrics -- 3 Result and Discussion -- 4 Conclusion -- References -- AuraCodes: Barcodes in the Aural Band -- 1 Introduction -- 2 Technical Analysis -- 2.1 Components of the EAN13 Barcode -- 2.2 Components of the QR Code -- 3 Proposition -- 4 Implementation -- 5 Experimental Results -- 6 Future Work -- 7 Conclusion -- References -- A Scrutiny and Investigation on Student Response System to Assess the Rating on Profuse Dataset-An Aerial View -- 1 Introduction -- 2 Literature Survey -- 3 Motivation and Background Study -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization -- 3.4 Stemming -- 3.5 Future Selection -- 3.6 Classification -- 3.7 Evaluation -- 3.8 Visualization -- 4 Dataset -- 5 Observations and Analysis -- 6 Results and Discussions -- 7 Conclusions -- References.
Analysis of Hospital Patient Data Using Computational Models -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Creation -- 3.2 Data Preprocessing -- 3.3 Model Building -- 3.4 Evaluation -- 3.5 Clustering -- 4 Results -- 4.1 Elbow Method -- 4.2 Silhouette Analysis -- 5 Conclusion -- References -- A Research on the Impact of Big Data Analytics on the Telecommunications Sector -- 1 Introduction -- 2 Trends in the Implementation of Big Data Analytics in the Telecom Industry -- 3 Regional Insight -- 4 Challenges of the Telecommunication Industry -- 4.1 Operation-Related Costs -- 4.2 Needs for Consumers -- 4.3 Information Security and Breaches -- 4.4 Collaboration -- 4.5 High-Speed Data-in-Motion -- 4.6 Support for Application and Network Intelligence -- 4.7 Real-Time Actionable Insights -- 5 Telecommunication Industry, Big Data Analytics, and Customer Services -- 6 Conclusion -- References -- Face Mask Isolation Canister Design for Healthcare Sector Towards Preventive Approach -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Gap Analysis -- 5 Proposed Design -- 6 Working -- 7 Applications -- 8 Future Scope -- 9 Conclusion -- References -- Modeling the Impact of Access to Finance on MSMEs' Contribution Towards Exports of the Economy -- 1 Introduction -- 2 Reviews of Related Literatures -- 3 Objectives of the Research -- 4 Methodology of the Study -- 5 Linear Regression Model -- 6 Analysis of Data and Discussion -- 6.1 Export Contribution of Indian MSME Sector -- 6.2 Regression Analysis and Their Interpretation -- 7 Scope for Future Research -- 8 Conclusion and Recommendations -- References -- Privacy Challenges and Solutions in Implementing Searchable Encryption for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 2.1 Proxy Re-encryption with and without Keyword Search -- 3 Conclusion -- References.
Multi-objective Optimization with Practical Constraints Using AALOA -- 1 Introduction -- 2 Problem Formulation -- 2.1 Objective Functions -- 2.2 Constraints -- 3 Proposed Algorithm -- 4 Multi-objective Optimization Strategies -- 4.1 Non-dominated Sorting -- 4.2 Archive Selection -- 4.3 Fuzzy Approach -- 5 Results and Analysis -- 5.1 Example-1: Benchmark Test Functions -- 5.2 Example-2: Electrical Test System -- 6 Conclusion -- References -- An Implementation of Lightweight Cryptographic Algorithm for IOT Healthcare System -- 1 Introduction -- 2 Methodology -- 2.1 Materials -- 2.2 Proposed Architecture -- 3 Experimental Setup and Results -- 3.1 Performance Evaluation -- 4 Discussions -- 5 Conclusions and Future Work -- References -- Home Appliances Automation Using IPv6 Transmission Over BLE -- 1 Introduction -- 2 Work Flow -- 3 Proposed Algorithm -- 4 Initial Setup and Plateform -- 5 Experimental Setup for Connect Raspberry BLE with Mobile nRF Connect App -- 6 Experimental Results -- 7 Conclusion -- References -- IoT Based Collision Avoidance System with the Case Study Using IR Sensor for Vehicles -- 1 Introduction -- 1.1 Types of Collision Avoidance Assist Systems -- 2 Literature Review -- 3 Motivation -- 4 Methodology -- 4.1 Arduino Uno -- 4.2 Ultrasonic Sensors -- 4.3 Motor Driver -- 5 Result and Discussion -- 6 Conclusion and Future Work -- References -- Airline Ticket Price Forecasting Using Time Series Model -- 1 Introduction -- 2 Related Work -- 3 Background of the Work -- 4 Proposed Work -- 4.1 Important Packages -- 4.2 Dataset Collection -- 4.3 Building Model -- 5 Flask Python Web Framework -- 6 Experimental Results -- 6.1 Accuracy -- 7 Conclusion -- References -- AI Powered Authentication for Smart Home Security-A Survey -- 1 Introduction -- 2 Related Work -- 3 Face Recognition Technologies -- 3.1 Appearance-Based Methods.
3.2 Single-Shot Methods -- 3.3 Multi-shot Methods -- 3.4 Rgbd-Based Approaches -- 4 Proposed Methodologies -- 4.1 Grassman Algorithm -- 4.2 Convolutional Neural Network Algorithm -- 4.3 Limitations -- 4.4 Future Works -- 5 Conclusion -- References -- WSRR: Weighted Rank-Relevance Sampling for Dense Text Retrieval -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Experiments and Results -- 5 Conclusions -- References -- Tweet Based Sentiment Analysis for Stock Price Prediction -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 System Architecture -- 3.2 Module Descrption -- 3.3 Data Processing: Data Training -- 3.4 Model Training -- 4 Implementation -- 4.1 CEA Algorithm -- 5 Result and Analysis -- 6 Conclusion and Future Work -- References -- A Study on the Stock Market Trend Predictions -- 1 Introduction -- 2 Background -- 2.1 Research Mainly Based on Technical Analysis -- 2.2 Research Mainly Based on Sentiment Analysis -- 3 Conclusion -- References -- Optimization of Partial Products in Modified Booth Multiplier -- 1 Introduction -- 2 Booth's Algorithm -- 3 Modified Booth's Algorithm -- 4 Optimized Booth's Multiplier (OBM) -- 4.1 Proposed Algorithm to Reduce Partial Products -- 4.2 16 × 16 Multiplication Using OBM -- 5 Results and Discussion -- 5.1 FPGA Device Utilization -- 5.2 Simulation Results -- 6 Conclusion -- References -- Comparative Study on Text-to-Image Synthesis Using GANs -- 1 Introduction -- 2 Literature Review -- 2.1 Cycle-Consistent Inverse GAN for Text-to-Image Synthesis -- 2.2 Dynamic Aspect-Aware GAN for Text-to-Image Synthesis -- 2.3 Cycle Text-to-Image GAN with BERT -- 3 Conclusion -- References -- Online Hate Speech Identification Using Fine-tuned ALBERT -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Experiment -- 4.1 Training Details of ALBERT Base Version 2.
4.2 Fine-Tuned ALBERT.
Record Nr. UNINA-9910746286703321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT with Intelligent Applications : Proceedings of ICTIS 2021, Volume 1
ICT with Intelligent Applications : Proceedings of ICTIS 2021, Volume 1
Autore Senjyu Tomonobu
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2022
Descrizione fisica 1 online resource (802 pages)
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Smart Innovation, Systems and Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 9789811641770
9789811641763
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910512167403321
Senjyu Tomonobu  
Singapore : , : Springer Singapore Pte. Limited, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2022
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2022
Autore Roy Satyabrata
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2023
Descrizione fisica 1 online resource (764 pages)
Disciplina 006.3
Altri autori (Persone) SinwarDeepak
DeyNilanjan
PerumalThinagaran
TavaresJoão Manuel R. S
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819926022
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Organizing Committee -- Preface -- Contents -- Editors and Contributors -- Empirical Study of Multi-class Weed Classification Using Deep Learning Network Through Transfer Learning -- 1 Introduction -- 2 Related Work -- 3 Data Preparation and Methodology -- 3.1 Dataset Used -- 3.2 Preprocessing -- 4 Materials and Methods -- 4.1 Convolutional Neural Network (CNN) -- 4.2 Transfer Learning -- 5 Experimental Results -- 6 Conclusion and Future Work -- References -- Secured Face Recognition System Based on Blockchain with Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Pixel to Blocks -- 3.2 Face Recognition -- 4 Experiments -- 5 Conclusion -- References -- Classifying Paintings/Artworks Using Deep Learning Techniques -- 1 Introduction -- 2 Literature Review -- 2.1 Motivation -- 3 Methodologies -- 3.1 Dataset -- 3.2 Model Building -- 3.3 Model Testing -- 4 Results -- 5 Conclusion -- References -- Hybrid Deep Face Music Recommendation Using Emotions -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Collection -- 3.2 Methodology -- 3.3 Algorithm -- 4 Experimental Results and Analysis -- 4.1 Results -- 4.2 Conclusion -- 4.3 Future Scope -- References -- Integrating ResNet18 and YOLOv4 for Pedestrian Detection -- 1 Introductıon -- 2 Related Works -- 3 Proposed System -- 3.1 Input -- 3.2 Backbone (ResNet18) -- 3.3 Neck -- 4 Experiments and Discussion -- 5 Conclusions -- References -- Image Restoration from Weather Degraded Images Using Markov Random Field -- 1 Introduction -- 2 Literature Survey -- 3 Background -- 4 Proposed Methodology -- 5 Experimental Results -- 6 Conclusion and Future Work -- References -- A Feature Representation Technique for Angular Margin Loss -- 1 Introduction -- 2 Background -- 3 Proposed Technique -- 3.1 Feature Representation as a Signal.
3.2 Feature Similarity Functions -- 4 Experiment and Result -- 4.1 Experiment Setup -- 4.2 Result -- 5 Conclusion -- References -- LeafViT: Vision Transformers-Based Leaf Disease Detection -- 1 Introduction -- 2 Related Work -- 2.1 Shape and Texture-Based Leaf Disease Identification -- 2.2 Deep Learning-Based Leaf Disease Detection -- 2.3 Fine-Grained Visual Categorization (FGVC) -- 2.4 Transformers Models in Computer Vision -- 3 Proposed Method -- 3.1 Model Architecture -- 3.2 Loss Function -- 3.3 Class Imbalance -- 4 Implementation -- 4.1 Dataset -- 4.2 Hyperparameters -- 5 Experiments -- 5.1 Ablation Studies -- 5.2 Evaluation Metrics -- 6 Conclusion -- References -- Conversion of Satellite Images to Google Maps Using GAN -- 1 Introduction -- 2 Related Work -- 2.1 Problem Definition -- 2.2 Dataset -- 3 Methodology -- 3.1 U-Net -- 3.2 CycleGAN U-Net -- 3.3 W-Net -- 3.4 CycleGAN W-Net -- 3.5 Experiments -- 3.6 Metrics -- 4 Analysis -- 4.1 Two Sample Z-Test and Objectives of Results -- 4.2 Road, Water, and Forest Dataset -- 5 Results -- 6 Conclusion + Future Scope -- References -- Investigation of Widely Used Implicit and Explicit Communication in Crossing-Decision of Pedestrian in UAE -- 1 Introduction -- 2 Literature Review -- 3 Method -- 4 Result -- 4.1 At Unsignalized Pedestrian Crossing -- 4.2 Signalized Crossing or Pelican Crossing -- 4.3 Mid-road Crossing -- 4.4 Unsignalized T-Junctions Crossing -- 4.5 Residential Area Crossing -- 5 Discussion -- 6 Conclusion -- References -- Attention Deficit Hyperactivity Disorder Prediction Using Resting-State Networks -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Gathering and Cleaning -- 3.2 Data Preprocessing and Feature Extraction -- 3.3 Model Selection and Planning -- 4 Results -- 4.1 Testing Hypotheses -- 4.2 ROC Curve -- 5 Conclusion -- References.
Neuroinformatics Deep Learning Synthesizer Based on Impulse Control Disorder Using LSTM Cells -- 1 Introduction -- 2 Using Deep Learning Capabilities for Diagnosis of the Disease -- 3 Methodology and System Description -- 4 Data Preparation and Results-Based Orientation -- 5 Data-Set Description -- 6 Baseline Models -- 7 Results -- 8 Conclusion -- References -- Wasserstein GANs-Enabled Spectral Normalization on Credit Card Fraud Detection -- 1 Introduction -- 2 Background -- 3 Proposed Method -- 3.1 Undersampling -- 3.2 Oversampling -- 3.3 Generative Adversarial Nets/Conditional -- 3.4 Wasserstein GANs -- 3.5 Batch Normalization -- 3.6 Spectral Normalization -- 3.7 L1 Loss -- 3.8 Metrics -- 4 Experiments -- 4.1 Data -- 4.2 Classification Model -- 4.3 Model Parameters -- 5 Observation -- 6 Conclusion -- References -- Classification of Bipolar Disorder Using Deep Learning Models on fMRI Data -- 1 Introduction -- 2 Methodology -- 2.1 Preprocessing (FuNP) -- 2.2 Feature Extraction (ICA) -- 2.3 Feature Selection (T-Score Approach) -- 2.4 Model Training (ANN and LSTM) -- 3 Results -- 4 Conclusion -- References -- Predicting Schizophrenia from fMRI Using Deep Learning -- 1 Introduction -- 2 Methodology -- 2.1 Data Preprocessing and Analysis -- 2.2 Model Training -- 3 Results -- 4 Conclusions -- References -- Patrolling Robot with Facial Detection -- 1 Introduction -- 2 Literature Review -- 3 Related Work -- 3.1 Haar Cascade Classifier -- 3.2 MediaPipe by Google -- 4 Methodology -- 4.1 Hardware -- 4.2 Software -- 5 Results and Discussion -- 6 Conclusion -- References -- A Graph-Based Relook Beyond Metadata for Music Recommendation -- 1 Introduction -- 2 Related Work -- 2.1 Representation Learning for Users -- 2.2 Representation Learning for Music -- 2.3 Recommendation Models -- 3 Dataset -- 4 Recommendation Models -- 5 Proposed Methodology.
6 Results and Analysis -- 6.1 Analysis of Results -- 7 Conclusion and Future Work -- References -- An Interpretability Assisted Empirical Study of Affective Traits in Visual Content of Disinformation -- 1 Introduction -- 2 Related Work -- 2.1 Visual Emotion in Disinformation Campaigns -- 2.2 Detection of Visual Emotion in Contexts -- 2.3 Interpretability Techniques for Visual Emotion Detection Models -- 3 Methodology -- 4 Dataset -- 5 Results and Discussions -- 5.1 RQ1: Do Visual Emotions Enhance the Message in a Disinformation Campaign? -- 5.2 RQ2: Do the Predominant Emotions Differ in Different Types of Disinformation Campaigns? -- 5.3 RQ3: To What Extent, the Emotional Theme Is Consistent or Event Specific Across Events of a Specific Disinformation Type? -- 6 Summary and Future Work -- References -- Multi-scale Fusion-Based Object Detection Network for Advance Driver Assistance Systems -- 1 Introduction -- 2 Related Work -- 2.1 Stage-1 Detectors -- 2.2 Stage 2-Detectors -- 3 Proposed Work-Multi-scale Fusion-Based Detection Architecture -- 3.1 Multi-scale Fusion-Based Object Detection Architecture -- 3.2 Dimensional Scaling -- 3.3 Multi-scaling -- 4 BiFPN -- 4.1 Inter-scale Links -- 4.2 Feature Fusion with Weights -- 5 System for Box/Class Estimation -- 6 Hyperparameters -- 7 Salient Features of Proposed Methodology -- 8 Experimental Results -- 9 Conclusion -- References -- Vectorization of Python Programs Using Recursive LSTM Autoencoders -- 1 Introduction -- 2 Literature Survey -- 2.1 Existing Systems -- 2.2 Background -- 3 Autoencoder Architecture -- 3.1 Encoder Architecture -- 3.2 Decoder Architecture -- 4 Dataset -- 5 Methodology -- 6 Results and Discussion -- 7 Conclusion -- References -- Phenology Detection for Croplands Using Sentinel-2 and Computer Vision Techniques -- 1 Introduction -- 2 Implementation and Experiments.
2.1 Autodetection of Farms from Geosatellite Images Using Computer Vision and Deep Learning -- 2.2 Fetching Image Data of Farms from Sentinel-2 and Processing It to Obtain the Time-Series NDVI Values -- 2.3 Denoising Raw NDVI Data -- 2.4 Interpolation of Mean NDVI Data -- 3 The Phenology Algorithm -- 3.1 The Start of Season (SOS) -- 3.2 The Peak of Season (POS) -- 3.3 The End of Season (EOS) -- 3.4 The Valley of Season (VOS) -- 3.5 Length of Season (LOS) -- 3.6 The Computation of Phenology Phases -- 4 Results and Discussion -- 5 Conclusion -- References -- Deep Learning-Based Safety Assurance of Construction Workers: Real-Time Safety Kit Detection -- 1 Introduction -- 2 Related Work -- 2.1 Based on Sensors -- 2.2 Based on Vision -- 3 Methodology -- 3.1 YOLO Detector -- 3.2 YOLO v5 and YOLO v6 -- 4 Dataset Preparation-HVM Dataset -- 4.1 Data Augmentation and Preprocessing Techniques -- 5 Validation Metrics -- 6 Results and Discussion -- 7 Conclusion -- References -- Automatic Detection and Classification of Melanoma Using the Combination of CNN and SVM -- 1 Introduction -- 2 Materials and Method -- 2.1 Images Used -- 2.2 Pre-processing -- 2.3 Feature Extraction -- 2.4 Classification -- 3 Results and Discussion -- 4 Conclusions -- References -- CyINSAT: Cyclone Dataset from Indian National Satellite for Forecasting -- 1 Introduction -- 2 Cyclone Dataset from Indian National Satellite -- 2.1 Properties -- 2.2 Construction -- 2.3 Related Datasets -- 3 Applications -- 3.1 Forecasting Parameters -- 3.2 Cyclone Track Forecasting -- 4 Conclusion -- References -- Classification of Ocular Diseases: A Vision Transformer-Based Approach -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data -- 3.2 Vision Transformer -- 3.3 Training Phase -- 3.4 Optimizer -- 3.5 Regularization -- 4 Results -- 4.1 Learning Curves -- 4.2 Performance Metrics.
5 Conclusion.
Record Nr. UNINA-9910751394403321
Roy Satyabrata  
Singapore : , : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
IOT with Smart Systems [[electronic resource] ] : ICTIS 2023, Volume 2 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
IOT with Smart Systems [[electronic resource] ] : ICTIS 2023, Volume 2 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (660 pages)
Disciplina 004
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 981-9937-61-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface ICTIS 2023 -- Contents -- Editors and Contributors -- The Current State of Art-Indian Unleavened Flat Bread Cooking -- 1 Introduction -- 2 Survey of Existing Methods of Chapati and Other Foods Cooking with New Techniques -- 3 Material and Methods of Dough Preparation, Chapati Making -- 4 Challenges and Future Scope -- 5 Database and Software/hardware Tools -- 6 Conclusion -- References -- An Efficient Abstractive Summarization of Research Articles Using Pegasus Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 5 Conclusions and Future Enhancements -- References -- Performance Analysis of Classification Techniques in Heart Disease Prediction -- 1 Introduction -- 2 Related Work -- 3 Implementation Details -- 3.1 Dataset Information -- 3.2 Classification Methods -- 4 Experimental Results -- 4.1 Correlation Results -- 4.2 Performance Analysis -- 5 Conclusion -- References -- Early Phase Identification and Detection for Plant Poor Growth in Rural Areas: A Survey of the State of the Art -- 1 Introduction -- 2 Related Work -- 3 Issues and Challenges -- 4 Proposed Work -- 4.1 Parametric Evaluation of Related Work -- 5 Methodology Enriching Datasets -- 5.1 RoCoLe Dataset -- 5.2 BRACOL Dataset -- 5.3 Rice Leaf Blight Dataset Rice Leaf Blight Dataset -- 5.4 Plant Pathology Dataset Plant Pathology Dataset -- 5.5 Citrus Dataset -- 6 Conclusion -- 7 Discussion -- References -- Pothole Detection and Road Condition Updation on Google Maps -- 1 Introduction -- 2 System Design -- 2.1 Pothole Detection -- 2.2 Vehicle Tracking -- 2.3 Updating the Database -- 2.4 Rendering Database on Google Maps -- 3 Implementation -- 3.1 Training Phase -- 3.2 Server-Side -- 3.3 Client-Side -- 3.4 Algorithm -- 3.5 Flowchart -- 4 Result and Analysis -- 5 Conclusion -- References.
Fetal Cardiac Detection Using Deep Learning from Echocardiographic Image-A Survey -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Methods for Cardiographic Image Analysis -- 4 Deep Learning Framework for Disease Prediction -- 5 Experimental Results -- 6 Conclusion -- References -- Analysing the Factor Influencing Post COVID-19 Experience Through User-Generated Content: Luxury Hotel in India -- 1 Introduction -- 2 Literature Review -- 3 System Description -- 3.1 Data Pre-processing -- 3.2 Sentiment Analysis -- 3.3 Theme Identification -- 4 Methodology -- 5 Analysing the Theme -- 6 Result -- 6.1 Positive Sentiments -- 6.2 Negative Sentiments -- 7 Conclusion -- References -- Text Detection and Recognition from the Scene Images Using RCNN and EasyOCR -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Text Detection -- 3.2 Text Recognition -- 4 Experimentation and Results -- 4.1 Datasets -- 4.2 Implementation Details -- 4.3 Result Analysis -- 5 Conclusion -- References -- The Important Role of Industry Data Connectivity Using M2M and IoT Applications for Processing and Analysis -- 1 Introduction -- 2 Devices to Networks and Platforms -- 2.1 Data Collection -- 2.2 Data Communication -- 3 Strengthen the Data Management Platform -- 3.1 Centralized Device Management -- 3.2 High-Performance Data Management -- 3.3 Enhanced Administration and Security -- 3.4 Flexible Application Development -- 4 Data Transfer with MQTT -- 4.1 Topic and Quality of Service (QoS) -- 4.2 Results -- 5 Discussion -- 6 Conclusion -- 7 Future Study -- References -- Classification of Non-proliferative Diabetic Retinopathy in Terms of Dark and Bright Lesions Using Multi-layered Perceptron (MLP) -- 1 Introduction -- 2 Methodology -- 2.1 Separation of Mask from Fundus -- 2.2 Removal of Optic Disc -- 2.3 Extraction of Retinal Blood Vessels -- 2.4 Microaneurysms.
2.5 Hemorrhages -- 2.6 Exudates -- 2.7 Cotton Wool Spots -- 3 Result -- 4 Conclusion -- References -- An Efficient Saliency Detection Using Wavelet Fusion -- 1 Introduction -- 1.1 Related Work -- 2 Proposed Methodology -- 2.1 Haar Wavelet Transform for Edge Enhancement and Noise Removal -- 2.2 Edge (Curve) Detection -- 2.3 Convolutional Neural Networks CNN -- 3 Experimental Results -- 4 Conclusion -- References -- Segmentation of Brain Tumor Images Using Morphological Reconstruction -- 1 Introduction -- 2 Literature Review -- 3 Existing System -- 3.1 Pre-processing -- 3.2 Skull Stripping -- 3.3 Segmentation -- 4 Proposed Model -- 4.1 Input -- 4.2 Gray Scaling of Images Using OpenCV -- 4.3 Thresholding -- 4.4 Watershed Algorithm for Image Segmentation -- 4.5 Compute Morphological Operations -- 5 Implementation and Results -- 6 Conclusion -- 7 Future Scope -- References -- Navigation Planning for Efficient Area Covering for Surface Cleaning -- 1 Introduction -- 2 Proposed Method -- 2.1 Deadlock Detection and Escaping -- 2.2 Task of Environment Modeling -- 3 Empirical Analysis -- 3.1 Performance Parameter -- 3.2 Implementation -- 3.3 Tested in an Unknown Environment -- 4 Results -- 5 Conclusion -- References -- Pathfinding Visualizer: A Survey of the State-of-Art -- 1 Introduction -- 1.1 Pathfinding Algorithms and Visualizer Overview -- 2 Literature Review -- 2.1 Overview of Existing Pathfinding Visualizers -- 2.2 Visualizing Pathfinding Algorithms: Importance of Visual AI& -- DS in Learning -- 3 Pathfinding Visualizer -- 3.1 Understanding the Pathfinding Visualizer -- 3.2 Design of the Pathfinding Visualizer -- 3.3 Implementation Details, Including Programming Languages and Tools Used -- 4 Results -- 4.1 Details on the Implementation and Functionality of Algorithms in the Pathfinding Visualizer -- 5 Discussion.
5.1 Discussion on How the Visualizer Contributes to a Better Understanding of Pathfinding Algorithms -- 6 Conclusion -- 7 Future Work -- Bibliography -- A Study on Cyber Security and its Challenges in India -- 1 Introduction -- 2 Literature Review -- 3 Background -- 4 Proposing Guidelines for Cyber Safe India -- 4.1 Need for a Correct Legal Framework in Order to Remove Ambiguities from Data Protection Laws -- 4.2 Changes in Current 2013 Cyber Security Policy -- 5 Need for Cyber Security Education in School -- 6 Current Scenario of Cyber Security in India -- 7 Conclusion -- References -- Implementation of AES Algorithm -- 1 Introduction -- 2 Block Diagram -- 2.1 Encryption Process -- 2.2 FPGA Implementation -- 3 Methodology -- 3.1 Byte Substitution -- 3.2 Shiftrows -- 3.3 MixColumns -- 3.4 Add Round Keys -- 3.5 Inverse Subbytes -- 4 Implementation of AES on FPGA -- 5 Results -- 5.1 AES Encryption and Decryption Xilinx Simulated Results -- 5.2 AES Encryption Results on FPGA -- 6 Conclusion -- References -- Feature Extractor Techniques for Alzheimer's Predictive Model in Brain Imaging -- 1 Introduction -- 2 Related Work -- 3 Experimental Framework -- 4 Observations and Results -- 5 Conclusions and Future Research -- References -- User Preference Recommendation System and Analytics for News Articles -- 1 Introduction -- 2 Overview -- 2.1 Problem Statement -- 2.2 Objectives -- 3 Literature Survey -- 4 Recommendation Systems -- 4.1 Content-Based Filtering -- 4.2 Collaborative Filtering -- 4.3 Hybrid Approach -- 5 Proposed Design -- 5.1 Introduction -- 5.2 Flow of the System -- 6 System Implementation -- 6.1 Data Generation -- 6.2 Model Formation -- 6.3 Visualisation -- 7 Result -- 8 Conclusion and Future Work -- References -- Design and Development of Focus Controller for the 50/80 cm ARIES Schmidt Telescope -- 1 Introduction -- 2 Focus Mechanism.
3 Embedded Controller -- 3.1 Motion Control -- 3.2 Telemetry -- 3.3 Firmware -- 3.4 Operation -- 4 GUI Software -- 4.1 Software Architecture -- 4.2 Setup Dialog Box -- 4.3 Focus Dialog Box -- 5 System Performance -- 6 Conclusion -- References -- Predicting Fishing Effort: Data Collection for Machine Learning Model Using Scientific and Indigenous Method -- 1 Introduction -- 2 Methods -- 2.1 Azure Machine Learning -- 3 Datasets -- 3.1 Area -- 3.2 Types of Data -- 4 Data Pre-processing -- 5 Model Selection and Parameter Tuning -- 6 Result -- 7 Conclusions -- References -- A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 3 Existing Method -- 4 Proposed Method -- 4.1 Algorithm -- 5 Testing Results -- 6 Conclusion -- References -- Model Design to Analyse Coronary Artery Disease Using Machine Learning Techniques (MDACADMLT) -- 1 Introduction -- 2 Literature Review -- 3 System Model -- 3.1 Logistic Regression -- 3.2 K-Nearest Neighbor -- 3.3 Support Vector Machine -- 3.4 Naïve Bayes -- 3.5 Decision Tree -- 3.6 Random Forest -- 4 Experimental Results -- 5 Conclusion -- References -- Impact of Geo-positioning Information in Limiting Forest Fire Damage -- 1 Overview of the Forest Fire Damage Around the World -- 2 A Rapidly Expanding Area of Research -- 3 Early Detection Forest Fire Systems Design -- 4 Simulation and Results -- 5 Conclusion -- References -- Automatic Music Melody Generation Using LSTM and Markov Chain Model -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Long Short-Term Memory (LSTM) -- 3.2 Markov Chain Model -- 4 Mathematical Model -- 4.1 Long Short-Term Memory (LSTM) -- 4.2 Markov Chain Model -- 5 Results and Discussion -- 5.1 Long Short-Term Memory (LSTM) -- 5.2 Markov Chain Model -- 6 Limitations -- 7 Future Scope -- 8 Conclusion -- References.
Federated Learning Approaches to Diverse Machine Learning Model: A Review.
Record Nr. UNINA-9910743689003321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Nature-inspired computing for smart application design / / edited by Santosh Kumar Das, Thanh-Phong Dao, and Thinagaran Perumal
Nature-inspired computing for smart application design / / edited by Santosh Kumar Das, Thanh-Phong Dao, and Thinagaran Perumal
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (295 pages) : illustrations
Disciplina 621.382
Collana Springer Tracts in Nature-Inspired Computing
Soggetto topico Artificial intelligence
Natural computation
ISBN 981-336-195-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- List of Reviewers -- Contents -- Editors and Contributors -- Smart Design and Its Applications: Challenges and Techniques -- 1 Introduction -- 2 Some Applications for Smart Design -- 2.1 City and Environment -- 2.2 Intelligent Networking -- 2.3 Security and Management -- 3 Some Techniques for Smart Design -- 4 Conclusions -- References -- City and Environment -- Automatic Generation Control Scheme for Power Quality Improvement of Multi-source Power Generating System with Secondary Controller Optimization Using Parameter-Setting-Free Harmony Search -- 1 Introduction -- 2 Single-Area Multi-source Power System Modeling -- 3 Controller Design -- 4 Proposed Parameter-Setting-Free Harmony Search Algorithm-Tuned PID Controller -- 5 Simulation Results and Discussions -- 6 Conclusion -- References -- Environmental Sound Classification Using Neural Network and Deep Learning -- 1 Introduction -- 1.1 Scope -- 2 Related Work -- 3 Problem Formulation -- 3.1 Segmenting an Audio Signal Into Windows -- 4 Feature Extraction -- 4.1 Features Used for Training the Neural Network -- 5 Designing the Cost Function for Bayesian Regularised Neural Network -- 5.1 Over-Fitting and Regularization of Neural Networks -- 5.2 Bayesian Regularization -- 6 Bayesian Regularised Neural Networks for Urban Sound Noise Classification: A Deep Learning Approach -- 6.1 Deep Neural Network Design -- 6.2 Novel Design: Two Input-Output Neural Network Model -- 6.3 Classification of Multiple Sound Source -- 6.4 Novel Approach: Multi-label Classification Using Bayesian Regularized Fitnet Model and Deep Lerning Approach -- 7 Conclusion and Future Work -- 8 Problems -- 8.1 Feature Extraction -- 8.2 Designing of Optimal Neural Network -- 8.3 Single Label Detection -- 8.4 Multi Label Detection -- References -- Feature Selection Method Using CFO and Rough Sets for Medical Dataset.
1 Introduction -- 2 Preliminaries -- 2.1 Central Force Optimization -- 2.2 Rough Set Theory -- 3 Proposed Algorithm -- 3.1 Preprocessing of Gene Expression Data -- 3.2 Fitness Function -- 4 Experimental Result -- 4.1 Parameter Setting and Datasets -- 4.2 Results and Discussion -- 5 Conclusion -- References -- Fuzzy-Based Optimal Solution for Minimization of Loss of Company Based on Uncertain Environment -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Simulation and Analysis -- 5 Conclusions -- References -- Intelligent Networking -- Impacts of Computational Techniques for Wireless Sensor Networks -- 1 Introduction -- 1.1 WSN: Basic Introduction -- 1.2 WSN: Basic Application Area -- 2 Need of Optimization -- 3 Description of Applied Algorithm -- 3.1 Dragonfly Algorithm -- 3.2 Quasi-opposition Atom Search Optimization (QOASO) Algorithm -- 3.3 Pathfinder Algorithm (PA) -- 3.4 Salp Swarm Algorithm -- 4 Optimization Techniques Applied in WSN -- 4.1 Modeling of Consumption of Energy -- 4.2 Path Loss Model -- 4.3 System Lifetime Model -- 4.4 Coverage Model -- 4.5 Multi-objective Optimization Problem -- 5 Performance Evaluation -- 6 Conclusion -- References -- Efficient Node Deployment Based on Immune-Inspired Computing Algorithm for Wireless Sensor Networks -- 1 Introduction -- 2 Multi-objective Immune Algorithm -- 3 Optimal Deployment -- 3.1 Adjacent Distance -- 3.2 Number of Sensor Nodes -- 4 First Algorithm: Immune-Based Node Deployment Algorithm -- 4.1 Problem Formulation -- 4.2 Immune-Based Node Deployment Algorithm -- 5 Second Algorithm: Centralized Voronoi-Based Immune Deployment Algorithm -- 5.1 Problem Formulation -- 5.2 Centralized Voronoi-Based Immune Deployment Algorithm -- 6 Experimental Results -- 6.1 Binary Model-Based Simulations -- 6.2 Probabilistic Model-Based Experiment -- 7 Conclusion -- References.
An Efficient Routing in Wireless Sensor Network: An Application of Grey Wolf Optimization -- 1 Introduction -- 1.1 Motivation for the Study -- 1.2 Contribution of This Study -- 2 Literature Review -- 2.1 Application of Evolutionary Algorithms & -- Swarm Intelligence -- 2.2 Grey Wolf Optimizer-Swarm Intelligence Technique with Hierarchy -- 3 Research Problem -- 3.1 Problem Statement -- 3.2 Model Formulation -- 4 Results -- 4.1 Experimental Design -- 4.2 Computational Results: -- 5 Solution Approach -- 5.1 Grey Wolf Optimization -- 5.2 Aspects of Grey Wolf Optimization -- 5.3 Modified Grey Wolf Optimization -- 5.4 Results Obtained -- 6 Conclusion -- References -- Coverage Optimization using Nature-Inspired Algorithm for Directional Sensor Networks -- 1 Introduction -- 2 Directional Sensor Network -- 2.1 Directional Detecting Model -- 2.2 Coverage Rate for Sensing Adjustment -- 3 Coverage Issues in DSN -- 3.1 Area Coverage -- 3.2 Target Coverage -- 3.3 Barrier Coverage -- 4 Coverage Optimization -- 4.1 Particle Swarm Optimization (PSO) Algorithm for Area Coverage Issue -- 4.2 Memetic Algorithm for Target Coverage Issue -- 5 Conclusion -- References -- Security and Management -- Flower Pollination Optimization-Based Security Enhancement Technique for Wireless Sensor Network -- 1 Introduction -- 2 Related Work -- 3 Cryptography in WSNs -- 4 Selection of Algorithms -- 5 Key Management Schemes -- 6 Node Deployment in WSN -- 7 Flower Pollination Algorithm -- 8 Result Analysis -- 9 Conclusion -- References -- Fuzzy Quadratic Programming Based Conflicting Strategy Management Technique for Company -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 4 Simulation and Analysis -- 5 Conclusions -- References -- A Novel Multilevel Classifier Hybrid Model for Intrusion Detection Using Machine Learning -- 1 Introduction -- 2 Related Work.
3 Theoretic Aspects of Techniques -- 3.1 Particle Swarm Optimization Techniques -- 3.2 Instance-Based Learning on K (IBK) -- 3.3 Random Tree -- 3.4 KDD Cup'99 Dataset -- 4 Proposed Single-Level Hybrid Intrusion Detection Model -- 4.1 A Multilevel Hybrid Classifier IDS Model -- 5 Experimental Results and Discussion -- 6 Conclusions -- References -- Maintaining Manpower in Technical College Using Fusion of Quadratic Programming and Fuzzy Logic -- 1 Introduction -- 2 Literature Review -- 3 Preliminaries -- 3.1 Quadratic Programming -- 3.2 Fuzzy Logic -- 4 Proposed Method -- 4.1 Preliminary Assumption -- 4.2 Mathematical Modelling -- 5 Simulation and Analysis -- 6 Conclusions -- References.
Record Nr. UNINA-9910768478703321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui