top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 6
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 6
Autore Choudrie Jyoti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2025
Descrizione fisica 1 online resource (0 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819766840
9819766842
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910919817003321
Choudrie Jyoti  
Singapore : , : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 2
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 2
Autore Choudrie Jyoti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (382 pages)
Altri autori (Persone) TubaEva
PerumalThinagaran
JoshiAmit
Collana Smart Innovation, Systems and Technologies Series
ISBN 981-9758-10-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910890169803321
Choudrie Jyoti  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 1
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 1
Autore Choudrie Jyoti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (407 pages)
Altri autori (Persone) TubaEva
PerumalThinagaran
JoshiAmit
Collana Smart Innovation, Systems and Technologies Series
ISBN 981-9757-99-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910890171303321
Choudrie Jyoti  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 3
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 3
Autore Choudrie Jyoti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (623 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9766-75-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Risk Analysis for Fall Detection: Exploiting Using GAIT, Part Affinity Field and Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Gait Analysis Using Image Processing -- 2.2 OpenPose: Realtime Multi-person 2D Pose Estimation Using Part Affinity Fields -- 2.3 Fall Detection Based on Key Points of Human-Skelet Using Open Pose -- 3 Methodology -- 3.1 Open Pose -- 3.2 Confidence Maps -- 3.3 Part Affinity Field -- 3.4 Fall Detection -- 4 Conclusion -- References -- Optimizing Content-Based Image Retrieval System Using Convolutional Neural Network Models -- 1 Introduction -- 2 Related Word -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Deep Features Extraction Using ResNet Pre-trained CNN -- 4 Results and Discussion -- 5 Conclusion -- References -- Advancements in Convolutional Neural Networks for Accurate and Efficient Skin Cancer Classification: A Comprehensive Survey -- 1 Introduction -- 2 Related Word -- 3 Why Does Skin Cancer Develop? -- 3.1 Other Types of Skin Cancers -- 4 Input Data -- 5 Proposed Methodology -- 5.1 ML Approaches Used in Skin Cancer Detection -- 5.2 CNN with Deep Learning Methods in Skin Cancer -- 5.3 Transfer Learning (TL) with CNN Architectures -- 5.4 Managerial Implications of the Methodologies -- 6 Conclusions -- References -- DestinAI: Your Personalized Travel Itinerary Planner and Chat Catalyst Using Generative AI -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- Technical and Economic Sustainability of Alternative Livelihood Strategies at the Grassroots: A Case Study in Byse, Karnataka, India -- 1 Introduction -- 1.1 Study Area -- 2 Methodology -- 2.1 Phase 1: Participatory Community and Challenge Understanding -- 2.2 Phase 2: Looking for Solutions.
3 Results -- 3.1 Technical Sustainability Assessment: A User-Centred Approach -- 3.2 Business Sustainability Assessment -- 4 Discussion -- 5 Conclusion -- References -- Comprehensive Certificate Validation and Verification System for Educational Institutes Using Blockchain -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Architecture -- 3.2 Workflow -- 4 Result and Discussion -- 5 Conclusion and Future Scope -- References -- An IOT and Machine Learning-Based System for Detecting Driver Drowsiness -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Design -- 3.2 Dataset -- 3.3 Preprocessing -- 3.4 Feature Extraction -- 3.5 Model Selection -- 3.6 IOT Technology -- 3.7 Jetson Nano -- 4 Result and Feature Work -- 4.1 Result -- 4.2 Feature Work -- 5 Conclusion -- References -- A Survey on Data Preprocessing Techniques in Stream Mining -- 1 Introduction -- 2 Challenges During Preprocessing Stream of Data -- 3 Data Reduction Techniques -- 3.1 Dimensionality Reduction -- 3.2 Instance Reduction Techniques -- 4 Data Cleaning -- 4.1 Imputing Missing Values -- 4.2 Noisy Data Removal -- 5 Data Integration -- 5.1 Extract -- 5.2 Transform -- 5.3 Load -- 6 Data Transformation -- 7 Conclusion -- References -- Data Privacy Attacks on Federated Learning -- 1 Introduction -- 2 Security Vulnerabilities in FL -- 2.1 Model Inversion Attacks -- 2.2 Poisoning Attacks -- 2.3 Data Reconstruction Attacks -- 2.4 Sybil Attacks -- 2.5 Generative Adversarial Network-Based Attacks -- 2.6 Model Stealing Attacks -- 3 Possible Solutions -- 3.1 Differential Privacy -- 3.2 Homomorphic Encryption -- 3.3 Secure Aggregation -- 3.4 Secure Multiparty Computation (SMC) -- 3.5 Attack Detection -- 3.6 Participant Authentication -- 3.7 Regular Auditing -- 4 Analysis of Existing Approach -- 5 Conclusion -- References.
Augmented Generalized Quadrature Spatial Modulation (AGQSM): Performance Evaluation in Spatially Correlated Channels for Next-Generation Wireless Communications -- 1 Introduction -- 2 System Model -- 3 Detection Methods -- 4 Findings and Analysis -- 5 Conclusion -- References -- Enhancing Security in a University Network Using Snort and Wireshark -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Proposed Work -- 5 Implementation and Result Analysis -- 6 Conclusion and Future Work -- References -- Social Responsibility of Business Entities in Achieving Sustainability: A CSR Review -- 1 Introduction -- 2 Defining Sustainability -- 3 Noteworthiness of Sustainable Development as a CSR Activity -- 4 Modus Operandi -- 5 Cases Used for the Study -- 5.1 Cummins India Ltd. -- 5.2 DB Corporation Ltd. -- 5.3 Karnataka Bank Ltd. -- 5.4 Century Plyboard India Ltd. -- 5.5 Tata Sponge Iron -- 5.6 Power Finance Corp Ltd. -- 5.7 Bharat Heavy Electrical Ltd. -- 5.8 Amrutanjan Healthcare -- 5.9 Atul Ltd. -- 6 Futuristics Research and Conclusion -- References -- Factors Affecting Digital Shifting of Food Industries Through Food Apps for Business Sustainability: an Empirical Study -- 1 Introduction -- 2 Conceptual Background and Hypothesis Development -- 2.1 TAM Facets -- 2.2 Relation Between ATT and INTFA -- 2.3 TPB Facets -- 2.4 Affordance as Moderator -- 3 Methodology and Results -- 3.1 Data Collection -- 3.2 Common Method Bias -- 3.3 Measurement Model: Reliability and Validity Testing -- 3.4 Structural Model: Hypothesis Testing -- 3.5 Moderation Analysis -- 4 Discussion -- 5 Conclusion -- 6 Theoretical and Managerial Implications -- 7 Study Limitations and Future Scope -- References -- Blockchain Organ Transplant Network with Fitness Check -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Architecture -- 3.2 Smart Contract -- 4 Result -- 5 Conclusion.
References -- An Implementation of Monte Carlo Tree Search Algorithm: Comparison with Random Samples -- 1 Introduction -- 2 Monte Carlo Tree Search -- 3 An Overview of Advanced Tic-Tac-Toe -- 4 Implementation -- 5 Results -- 6 Conclusion -- References -- Ur's Corporator-Innovating Citizen Corporator Interaction Through ML-Enabled Comprehensive Framework -- 1 Introduction -- 2 Problem Statement -- 3 Methodology -- 4 Applications -- 5 Literature Review -- 6 System Architecture -- 6.1 Explanation of System Architecture -- 7 Result and Discussion -- 8 Conclusion -- 9 Future Scope -- References -- Research Trends in Technology for Achieving Sustainable Development Goals -- 1 Introduction -- 2 Related Work -- 3 Methods -- 4 Results -- 4.1 Publication and Citation Trends -- 4.2 Impact of Open Access -- 4.3 Fields of Research -- 4.4 Prolific Institutions -- 4.5 Top Funders -- 5 Conclusion -- References -- A Comparative Evaluation of Different Distance Measures for Determining Initial Seeds in the K-means Algorithm -- 1 Introduction -- 2 The QuIK Algorithm -- 3 Some Popular Distance Measures for Numerical Data -- 4 The Novel Distance Function in the QuIK Seeding -- 5 Literature Review -- 6 Methodology -- 7 Experiments and Results -- 8 Conclusion -- References -- Etherdocs: Student Document Management Using Ethereum Blockchain and IPFS -- 1 Introduction -- 2 Problem Statement -- 3 Literature Review -- 3.1 Assumptions -- 3.2 Limitations of Existing Systems -- 4 Methodology -- 4.1 Issuer -- 4.2 Verifier -- 5 Implementation -- 6 Results -- 7 Conclusion -- References -- Beyond Ledgers: Exploring the Impact of Blockchain on Global Supply Chain Networks -- 1 Introduction -- 1.1 Background -- 1.2 Scope and Objectives -- 2 Fundamentals of Blockchain in Supply Chain -- 2.1 Blockchain Architecture -- 2.2 Blockchain in Supply Chain Management.
3 Current Trends and Challenges -- 3.1 Challenges in Traditional Supply Chains -- 3.2 Previous Studies -- 3.3 The Promise of Blockchain Technology -- 3.4 Applications of Blockchain in Supply Chain -- 4 Challenges in Adopting Blockchain in SCM and Preferable Solution -- 5 Future Directions and Research Gaps -- 6 Conclusion -- References -- Farmer-Based Smart Vegetable Vending Machine for the Modern Era -- 1 Introduction -- 2 Background and Related Work -- 3 Research Gap -- 4 Proposed Solution -- References -- Automated Question Generation System Using NLP -- 1 Introduction -- 2 Literature Review -- 2.1 TF-IDF and N-Grammode -- 2.2 RNN Encoder-Decoder -- 2.3 BART -- 2.4 BERT -- 2.5 T-5 -- 3 Implementation -- 3.1 Data Preparation -- 3.2 WorkFlow -- 3.3 Training -- 4 Results -- 5 Conclusion -- References -- Transforming Workspaces: The Convergence of Li-Fi, FTTO, and PoE -- 1 Introduction -- 2 Literature Review -- 2.1 Building Energy Management System: A Review -- 2.2 Seamless Interfacing with Thunderbolt™ 4.0 -- 3 Methodology -- 3.1 Assessment -- 3.2 Technology Selection -- 3.3 System Design -- 3.4 Implementation -- 3.5 Evaluation and Optimization -- 4 Hardware Components -- 4.1 BMS Device with ARM Processor -- 4.2 CCTV -- 4.3 Ethernet Cable (802.3bt) -- 4.4 PoE Switches -- 4.5 Wi-Fi Router -- 4.6 USB Type-C Port -- 4.7 Li-Fi Technology -- 4.8 Split AC -- 4.9 Polycarbonate Sheets -- 4.10 Batteries -- 5 Hardware and Software Architecture -- 5.1 Block Diagram -- 5.2 AutoCAD and REVIT Design -- 6 Conclusion -- References -- Precise AI-Driven Cattle Identification and Classification System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Preparation -- 3.2 Image Validation -- 3.3 Muzzle Point Detection and Extraction -- 3.4 Pattern Extraction and Matching -- 4 Results and Discussions -- 5 Conclusions -- References.
Instagram Reels Bites: Factors Influencing Food Customer Engagement and Intention to Purchase Food Through Instagram Reels.
Record Nr. UNINA-9910900178903321
Choudrie Jyoti  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 5
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 5
Autore Choudrie Jyoti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (599 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9766-81-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910908366403321
Choudrie Jyoti  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 4
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 4
Autore Choudrie Jyoti
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (611 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
Soggetto topico Information technology
Artificial intelligence
ISBN 981-9766-78-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- Contents -- Editors and Contributors -- Guarding the Future: Anomaly Detection in IoT-Enabled Smart Cities -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Preprocessing -- 3.3 Feature Extraction Using IPCA Algorithm -- 3.4 Feature Extraction Using Genetic Algorithm -- 3.5 Training -- 3.6 Classification -- 4 Result and Discussion -- 4.1 Limitation and Challenges -- 5 Conclusion -- References -- A Comprehensive Analysis of Cyberbullying Detection Using Various Machine Learning Approaches -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Evaluation Framework -- 5 Results and Discussions -- 6 Future Scope -- 7 Conclusion -- References -- AI in UI/UX Design: A Paradigm Shift -- 1 Introduction -- 1.1 Artificial Intelligence (AI) -- 1.2 Neural Networks
Record Nr. UNINA-9910903799503321
Choudrie Jyoti  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT for Intelligent Systems : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
ICT for Intelligent Systems : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (524 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Smart Innovation, Systems and Technologies
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 981-9939-82-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intrusion Detection Model for IoT Networks using Graph Convolution Networks(GCN) -- Drowsiness Detection System -- A Deep Learning Technique to Recommend Music based on Facial and Speech Emotions -- Smart Chair Posture Detection and Correction Using IOT -- The Opinions Imparted On Singular’s Face.
Record Nr. UNINA-9910746086103321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT with Intelligent Applications : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
ICT with Intelligent Applications : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
Autore Choudrie Jyoti
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (647 pages)
Disciplina 004.6
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Cooperating objects (Computer systems)
Internet of things
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Cyber-Physical Systems
Internet of Things
ISBN 981-9937-58-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Monitoring Algorithm for Datafication and Information Control for Data Optimization -- 1 Introduction -- 1.1 Datafication -- 1.2 Information Control -- 2 Literature Review -- 3 Datafication and Information Control -- 4 Algorithm for Datafication and Information Control -- 5 Conclusion -- References -- Understanding Customer Perception Regarding Branded Fuel 'XP-95' in IOCL Retail Outlets Using Business Intelligence (BI) by the Help of NVIVO and SPSS Software -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 3.1 Qualitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 3.2 Quantitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 4 Discussion and Findings -- 5 Conclusion -- References -- Investigation of Aadhaar Card Enrolment in Government Schools Using R -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Steps Involved in the Data Analysis -- 3.2 Data Preprocessing -- 4 Results and Discussion -- 4.1 Data Collection -- 4.2 Data Analysis -- 4.3 Correlation and Regression Line -- 4.4 Line Graph -- 4.5 Comparison of Aadhaar Enrolment -- 5 Conclusion -- References -- Automated Spurious Product Review Auditing System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Signed Interface Algorithm Working -- 4 Result and Analysis -- 5 Conclusion -- References -- A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloud/Fog Computing -- 1 Introduction -- 1.1 Cloud Computing -- 1.2 Fog Computing -- 1.3 Internet of Things (IoT) -- 2 Background -- 2.1 Rivest-Shamir-Adleman Algorithm (RSA) -- 2.2 Elliptical Curve Cryptography Algorithm (ECC) -- 2.3 ECC Standardization Process -- 3 Comparison of ECC and RSA Algorithm -- 4 Conclusion -- References.
Data Prevention Protocol for Cloud Computing Security Using Blockchain Technology -- 1 Introduction -- 2 Block-Chain Technology -- 3 Structure of Block-Chain -- 4 Features of Block-Chain System -- 5 Challenges -- 6 Secure Solution for Cloud -- 7 Requirements of Cloud -- 8 Solutions for Cloud Data Security Based on Block-Chain Technology -- 9 Examples of Cloud Data Security Based Block-Chain Technology -- 9.1 Secure Cloud Data Privacy -- 9.2 Cloud Data Unity -- 9.3 Cloud Data Detectability -- 10 Review Outcomes and Research Gap -- 11 Conclusions -- References -- Intelligence Monitoring of Home Security -- 1 Introduction -- 2 Proposed Device -- 3 Components Specifications -- 4 Future Scope -- References -- TB Bacteria and WBC Detection from ZN-Stained Sputum Smear Images Using Object Detection Model -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 TB Bacteria Detection Using RetinaNet Object Detection Model -- 2.3 Implementation Details -- 2.4 Comparison with Other Object Detection Model -- 2.5 Performance Metrics -- 3 Result and Discussion -- 4 Conclusion -- References -- AuraCodes: Barcodes in the Aural Band -- 1 Introduction -- 2 Technical Analysis -- 2.1 Components of the EAN13 Barcode -- 2.2 Components of the QR Code -- 3 Proposition -- 4 Implementation -- 5 Experimental Results -- 6 Future Work -- 7 Conclusion -- References -- A Scrutiny and Investigation on Student Response System to Assess the Rating on Profuse Dataset-An Aerial View -- 1 Introduction -- 2 Literature Survey -- 3 Motivation and Background Study -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization -- 3.4 Stemming -- 3.5 Future Selection -- 3.6 Classification -- 3.7 Evaluation -- 3.8 Visualization -- 4 Dataset -- 5 Observations and Analysis -- 6 Results and Discussions -- 7 Conclusions -- References.
Analysis of Hospital Patient Data Using Computational Models -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Creation -- 3.2 Data Preprocessing -- 3.3 Model Building -- 3.4 Evaluation -- 3.5 Clustering -- 4 Results -- 4.1 Elbow Method -- 4.2 Silhouette Analysis -- 5 Conclusion -- References -- A Research on the Impact of Big Data Analytics on the Telecommunications Sector -- 1 Introduction -- 2 Trends in the Implementation of Big Data Analytics in the Telecom Industry -- 3 Regional Insight -- 4 Challenges of the Telecommunication Industry -- 4.1 Operation-Related Costs -- 4.2 Needs for Consumers -- 4.3 Information Security and Breaches -- 4.4 Collaboration -- 4.5 High-Speed Data-in-Motion -- 4.6 Support for Application and Network Intelligence -- 4.7 Real-Time Actionable Insights -- 5 Telecommunication Industry, Big Data Analytics, and Customer Services -- 6 Conclusion -- References -- Face Mask Isolation Canister Design for Healthcare Sector Towards Preventive Approach -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Gap Analysis -- 5 Proposed Design -- 6 Working -- 7 Applications -- 8 Future Scope -- 9 Conclusion -- References -- Modeling the Impact of Access to Finance on MSMEs' Contribution Towards Exports of the Economy -- 1 Introduction -- 2 Reviews of Related Literatures -- 3 Objectives of the Research -- 4 Methodology of the Study -- 5 Linear Regression Model -- 6 Analysis of Data and Discussion -- 6.1 Export Contribution of Indian MSME Sector -- 6.2 Regression Analysis and Their Interpretation -- 7 Scope for Future Research -- 8 Conclusion and Recommendations -- References -- Privacy Challenges and Solutions in Implementing Searchable Encryption for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 2.1 Proxy Re-encryption with and without Keyword Search -- 3 Conclusion -- References.
Multi-objective Optimization with Practical Constraints Using AALOA -- 1 Introduction -- 2 Problem Formulation -- 2.1 Objective Functions -- 2.2 Constraints -- 3 Proposed Algorithm -- 4 Multi-objective Optimization Strategies -- 4.1 Non-dominated Sorting -- 4.2 Archive Selection -- 4.3 Fuzzy Approach -- 5 Results and Analysis -- 5.1 Example-1: Benchmark Test Functions -- 5.2 Example-2: Electrical Test System -- 6 Conclusion -- References -- An Implementation of Lightweight Cryptographic Algorithm for IOT Healthcare System -- 1 Introduction -- 2 Methodology -- 2.1 Materials -- 2.2 Proposed Architecture -- 3 Experimental Setup and Results -- 3.1 Performance Evaluation -- 4 Discussions -- 5 Conclusions and Future Work -- References -- Home Appliances Automation Using IPv6 Transmission Over BLE -- 1 Introduction -- 2 Work Flow -- 3 Proposed Algorithm -- 4 Initial Setup and Plateform -- 5 Experimental Setup for Connect Raspberry BLE with Mobile nRF Connect App -- 6 Experimental Results -- 7 Conclusion -- References -- IoT Based Collision Avoidance System with the Case Study Using IR Sensor for Vehicles -- 1 Introduction -- 1.1 Types of Collision Avoidance Assist Systems -- 2 Literature Review -- 3 Motivation -- 4 Methodology -- 4.1 Arduino Uno -- 4.2 Ultrasonic Sensors -- 4.3 Motor Driver -- 5 Result and Discussion -- 6 Conclusion and Future Work -- References -- Airline Ticket Price Forecasting Using Time Series Model -- 1 Introduction -- 2 Related Work -- 3 Background of the Work -- 4 Proposed Work -- 4.1 Important Packages -- 4.2 Dataset Collection -- 4.3 Building Model -- 5 Flask Python Web Framework -- 6 Experimental Results -- 6.1 Accuracy -- 7 Conclusion -- References -- AI Powered Authentication for Smart Home Security-A Survey -- 1 Introduction -- 2 Related Work -- 3 Face Recognition Technologies -- 3.1 Appearance-Based Methods.
3.2 Single-Shot Methods -- 3.3 Multi-shot Methods -- 3.4 Rgbd-Based Approaches -- 4 Proposed Methodologies -- 4.1 Grassman Algorithm -- 4.2 Convolutional Neural Network Algorithm -- 4.3 Limitations -- 4.4 Future Works -- 5 Conclusion -- References -- WSRR: Weighted Rank-Relevance Sampling for Dense Text Retrieval -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Experiments and Results -- 5 Conclusions -- References -- Tweet Based Sentiment Analysis for Stock Price Prediction -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 System Architecture -- 3.2 Module Descrption -- 3.3 Data Processing: Data Training -- 3.4 Model Training -- 4 Implementation -- 4.1 CEA Algorithm -- 5 Result and Analysis -- 6 Conclusion and Future Work -- References -- A Study on the Stock Market Trend Predictions -- 1 Introduction -- 2 Background -- 2.1 Research Mainly Based on Technical Analysis -- 2.2 Research Mainly Based on Sentiment Analysis -- 3 Conclusion -- References -- Optimization of Partial Products in Modified Booth Multiplier -- 1 Introduction -- 2 Booth's Algorithm -- 3 Modified Booth's Algorithm -- 4 Optimized Booth's Multiplier (OBM) -- 4.1 Proposed Algorithm to Reduce Partial Products -- 4.2 16 × 16 Multiplication Using OBM -- 5 Results and Discussion -- 5.1 FPGA Device Utilization -- 5.2 Simulation Results -- 6 Conclusion -- References -- Comparative Study on Text-to-Image Synthesis Using GANs -- 1 Introduction -- 2 Literature Review -- 2.1 Cycle-Consistent Inverse GAN for Text-to-Image Synthesis -- 2.2 Dynamic Aspect-Aware GAN for Text-to-Image Synthesis -- 2.3 Cycle Text-to-Image GAN with BERT -- 3 Conclusion -- References -- Online Hate Speech Identification Using Fine-tuned ALBERT -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Experiment -- 4.1 Training Details of ALBERT Base Version 2.
4.2 Fine-Tuned ALBERT.
Record Nr. UNINA-9910746286703321
Choudrie Jyoti  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
ICT with Intelligent Applications : Proceedings of ICTIS 2021, Volume 1
ICT with Intelligent Applications : Proceedings of ICTIS 2021, Volume 1
Autore Senjyu Tomonobu
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2022
Descrizione fisica 1 online resource (802 pages)
Altri autori (Persone) MahalleParikshit N
PerumalThinagaran
JoshiAmit
Collana Smart Innovation, Systems and Technologies Ser.
Soggetto genere / forma Electronic books.
ISBN 9789811641770
9789811641763
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910512167403321
Senjyu Tomonobu  
Singapore : , : Springer Singapore Pte. Limited, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2024, Volume 2
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2024, Volume 2
Autore Roy Satyabrata
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2025
Descrizione fisica 1 online resource (564 pages)
Altri autori (Persone) SinwarDeepak
DeyNilanjan
PerumalThinagaran
R. S. TavaresJoão Manuel
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819769926
9789819769919
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910917192503321
Roy Satyabrata  
Singapore : , : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui