ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 6
| ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 6 |
| Autore | Choudrie Jyoti |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Singapore : , : Springer, , 2025 |
| Descrizione fisica | 1 online resource (0 pages) |
| Disciplina | 004.6 |
| Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
| Collana | Lecture Notes in Networks and Systems Series |
| ISBN |
9789819766840
9819766842 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910919817003321 |
Choudrie Jyoti
|
||
| Singapore : , : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 3 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
| ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 3 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
| Autore | Choudrie Jyoti |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (623 pages) |
| Disciplina | 004.6 |
| Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
| ISBN |
9789819766758
9819766753 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Risk Analysis for Fall Detection: Exploiting Using GAIT, Part Affinity Field and Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Gait Analysis Using Image Processing -- 2.2 OpenPose: Realtime Multi-person 2D Pose Estimation Using Part Affinity Fields -- 2.3 Fall Detection Based on Key Points of Human-Skelet Using Open Pose -- 3 Methodology -- 3.1 Open Pose -- 3.2 Confidence Maps -- 3.3 Part Affinity Field -- 3.4 Fall Detection -- 4 Conclusion -- References -- Optimizing Content-Based Image Retrieval System Using Convolutional Neural Network Models -- 1 Introduction -- 2 Related Word -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Deep Features Extraction Using ResNet Pre-trained CNN -- 4 Results and Discussion -- 5 Conclusion -- References -- Advancements in Convolutional Neural Networks for Accurate and Efficient Skin Cancer Classification: A Comprehensive Survey -- 1 Introduction -- 2 Related Word -- 3 Why Does Skin Cancer Develop? -- 3.1 Other Types of Skin Cancers -- 4 Input Data -- 5 Proposed Methodology -- 5.1 ML Approaches Used in Skin Cancer Detection -- 5.2 CNN with Deep Learning Methods in Skin Cancer -- 5.3 Transfer Learning (TL) with CNN Architectures -- 5.4 Managerial Implications of the Methodologies -- 6 Conclusions -- References -- DestinAI: Your Personalized Travel Itinerary Planner and Chat Catalyst Using Generative AI -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Results and Discussion -- 5 Conclusion -- References -- Technical and Economic Sustainability of Alternative Livelihood Strategies at the Grassroots: A Case Study in Byse, Karnataka, India -- 1 Introduction -- 1.1 Study Area -- 2 Methodology -- 2.1 Phase 1: Participatory Community and Challenge Understanding -- 2.2 Phase 2: Looking for Solutions.
3 Results -- 3.1 Technical Sustainability Assessment: A User-Centred Approach -- 3.2 Business Sustainability Assessment -- 4 Discussion -- 5 Conclusion -- References -- Comprehensive Certificate Validation and Verification System for Educational Institutes Using Blockchain -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Architecture -- 3.2 Workflow -- 4 Result and Discussion -- 5 Conclusion and Future Scope -- References -- An IOT and Machine Learning-Based System for Detecting Driver Drowsiness -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Design -- 3.2 Dataset -- 3.3 Preprocessing -- 3.4 Feature Extraction -- 3.5 Model Selection -- 3.6 IOT Technology -- 3.7 Jetson Nano -- 4 Result and Feature Work -- 4.1 Result -- 4.2 Feature Work -- 5 Conclusion -- References -- A Survey on Data Preprocessing Techniques in Stream Mining -- 1 Introduction -- 2 Challenges During Preprocessing Stream of Data -- 3 Data Reduction Techniques -- 3.1 Dimensionality Reduction -- 3.2 Instance Reduction Techniques -- 4 Data Cleaning -- 4.1 Imputing Missing Values -- 4.2 Noisy Data Removal -- 5 Data Integration -- 5.1 Extract -- 5.2 Transform -- 5.3 Load -- 6 Data Transformation -- 7 Conclusion -- References -- Data Privacy Attacks on Federated Learning -- 1 Introduction -- 2 Security Vulnerabilities in FL -- 2.1 Model Inversion Attacks -- 2.2 Poisoning Attacks -- 2.3 Data Reconstruction Attacks -- 2.4 Sybil Attacks -- 2.5 Generative Adversarial Network-Based Attacks -- 2.6 Model Stealing Attacks -- 3 Possible Solutions -- 3.1 Differential Privacy -- 3.2 Homomorphic Encryption -- 3.3 Secure Aggregation -- 3.4 Secure Multiparty Computation (SMC) -- 3.5 Attack Detection -- 3.6 Participant Authentication -- 3.7 Regular Auditing -- 4 Analysis of Existing Approach -- 5 Conclusion -- References. Augmented Generalized Quadrature Spatial Modulation (AGQSM): Performance Evaluation in Spatially Correlated Channels for Next-Generation Wireless Communications -- 1 Introduction -- 2 System Model -- 3 Detection Methods -- 4 Findings and Analysis -- 5 Conclusion -- References -- Enhancing Security in a University Network Using Snort and Wireshark -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Proposed Work -- 5 Implementation and Result Analysis -- 6 Conclusion and Future Work -- References -- Social Responsibility of Business Entities in Achieving Sustainability: A CSR Review -- 1 Introduction -- 2 Defining Sustainability -- 3 Noteworthiness of Sustainable Development as a CSR Activity -- 4 Modus Operandi -- 5 Cases Used for the Study -- 5.1 Cummins India Ltd. -- 5.2 DB Corporation Ltd. -- 5.3 Karnataka Bank Ltd. -- 5.4 Century Plyboard India Ltd. -- 5.5 Tata Sponge Iron -- 5.6 Power Finance Corp Ltd. -- 5.7 Bharat Heavy Electrical Ltd. -- 5.8 Amrutanjan Healthcare -- 5.9 Atul Ltd. -- 6 Futuristics Research and Conclusion -- References -- Factors Affecting Digital Shifting of Food Industries Through Food Apps for Business Sustainability: an Empirical Study -- 1 Introduction -- 2 Conceptual Background and Hypothesis Development -- 2.1 TAM Facets -- 2.2 Relation Between ATT and INTFA -- 2.3 TPB Facets -- 2.4 Affordance as Moderator -- 3 Methodology and Results -- 3.1 Data Collection -- 3.2 Common Method Bias -- 3.3 Measurement Model: Reliability and Validity Testing -- 3.4 Structural Model: Hypothesis Testing -- 3.5 Moderation Analysis -- 4 Discussion -- 5 Conclusion -- 6 Theoretical and Managerial Implications -- 7 Study Limitations and Future Scope -- References -- Blockchain Organ Transplant Network with Fitness Check -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Architecture -- 3.2 Smart Contract -- 4 Result -- 5 Conclusion. References -- An Implementation of Monte Carlo Tree Search Algorithm: Comparison with Random Samples -- 1 Introduction -- 2 Monte Carlo Tree Search -- 3 An Overview of Advanced Tic-Tac-Toe -- 4 Implementation -- 5 Results -- 6 Conclusion -- References -- Ur's Corporator-Innovating Citizen Corporator Interaction Through ML-Enabled Comprehensive Framework -- 1 Introduction -- 2 Problem Statement -- 3 Methodology -- 4 Applications -- 5 Literature Review -- 6 System Architecture -- 6.1 Explanation of System Architecture -- 7 Result and Discussion -- 8 Conclusion -- 9 Future Scope -- References -- Research Trends in Technology for Achieving Sustainable Development Goals -- 1 Introduction -- 2 Related Work -- 3 Methods -- 4 Results -- 4.1 Publication and Citation Trends -- 4.2 Impact of Open Access -- 4.3 Fields of Research -- 4.4 Prolific Institutions -- 4.5 Top Funders -- 5 Conclusion -- References -- A Comparative Evaluation of Different Distance Measures for Determining Initial Seeds in the K-means Algorithm -- 1 Introduction -- 2 The QuIK Algorithm -- 3 Some Popular Distance Measures for Numerical Data -- 4 The Novel Distance Function in the QuIK Seeding -- 5 Literature Review -- 6 Methodology -- 7 Experiments and Results -- 8 Conclusion -- References -- Etherdocs: Student Document Management Using Ethereum Blockchain and IPFS -- 1 Introduction -- 2 Problem Statement -- 3 Literature Review -- 3.1 Assumptions -- 3.2 Limitations of Existing Systems -- 4 Methodology -- 4.1 Issuer -- 4.2 Verifier -- 5 Implementation -- 6 Results -- 7 Conclusion -- References -- Beyond Ledgers: Exploring the Impact of Blockchain on Global Supply Chain Networks -- 1 Introduction -- 1.1 Background -- 1.2 Scope and Objectives -- 2 Fundamentals of Blockchain in Supply Chain -- 2.1 Blockchain Architecture -- 2.2 Blockchain in Supply Chain Management. 3 Current Trends and Challenges -- 3.1 Challenges in Traditional Supply Chains -- 3.2 Previous Studies -- 3.3 The Promise of Blockchain Technology -- 3.4 Applications of Blockchain in Supply Chain -- 4 Challenges in Adopting Blockchain in SCM and Preferable Solution -- 5 Future Directions and Research Gaps -- 6 Conclusion -- References -- Farmer-Based Smart Vegetable Vending Machine for the Modern Era -- 1 Introduction -- 2 Background and Related Work -- 3 Research Gap -- 4 Proposed Solution -- References -- Automated Question Generation System Using NLP -- 1 Introduction -- 2 Literature Review -- 2.1 TF-IDF and N-Grammode -- 2.2 RNN Encoder-Decoder -- 2.3 BART -- 2.4 BERT -- 2.5 T-5 -- 3 Implementation -- 3.1 Data Preparation -- 3.2 WorkFlow -- 3.3 Training -- 4 Results -- 5 Conclusion -- References -- Transforming Workspaces: The Convergence of Li-Fi, FTTO, and PoE -- 1 Introduction -- 2 Literature Review -- 2.1 Building Energy Management System: A Review -- 2.2 Seamless Interfacing with Thunderbolt™ 4.0 -- 3 Methodology -- 3.1 Assessment -- 3.2 Technology Selection -- 3.3 System Design -- 3.4 Implementation -- 3.5 Evaluation and Optimization -- 4 Hardware Components -- 4.1 BMS Device with ARM Processor -- 4.2 CCTV -- 4.3 Ethernet Cable (802.3bt) -- 4.4 PoE Switches -- 4.5 Wi-Fi Router -- 4.6 USB Type-C Port -- 4.7 Li-Fi Technology -- 4.8 Split AC -- 4.9 Polycarbonate Sheets -- 4.10 Batteries -- 5 Hardware and Software Architecture -- 5.1 Block Diagram -- 5.2 AutoCAD and REVIT Design -- 6 Conclusion -- References -- Precise AI-Driven Cattle Identification and Classification System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data Collection and Preparation -- 3.2 Image Validation -- 3.3 Muzzle Point Detection and Extraction -- 3.4 Pattern Extraction and Matching -- 4 Results and Discussions -- 5 Conclusions -- References. Instagram Reels Bites: Factors Influencing Food Customer Engagement and Intention to Purchase Food Through Instagram Reels. |
| Record Nr. | UNINA-9910900178903321 |
Choudrie Jyoti
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 4 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
| ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 4 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
| Autore | Choudrie Jyoti |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (611 pages) |
| Disciplina | 004.6 |
| Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
| ISBN |
9789819766789
9819766788 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Preface -- Contents -- Editors and Contributors -- Guarding the Future: Anomaly Detection in IoT-Enabled Smart Cities -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Preprocessing -- 3.3 Feature Extraction Using IPCA Algorithm -- 3.4 Feature Extraction Using Genetic Algorithm -- 3.5 Training -- 3.6 Classification -- 4 Result and Discussion -- 4.1 Limitation and Challenges -- 5 Conclusion -- References -- A Comprehensive Analysis of Cyberbullying Detection Using Various Machine Learning Approaches -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Evaluation Framework -- 5 Results and Discussions -- 6 Future Scope -- 7 Conclusion -- References -- AI in UI/UX Design: A Paradigm Shift -- 1 Introduction -- 1.1 Artificial Intelligence (AI) -- 1.2 Neural Networks |
| Record Nr. | UNINA-9910903799503321 |
Choudrie Jyoti
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 5 / / edited by Jyoti Choudrie, Parikshit N Mahalle, Thinagaran Perumal, Amit Joshi
| ICT for Intelligent Systems : Proceedings of ICTIS 2024, Volume 5 / / edited by Jyoti Choudrie, Parikshit N Mahalle, Thinagaran Perumal, Amit Joshi |
| Autore | Choudrie Jyoti |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (599 pages) |
| Disciplina | 004.6 |
| Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
| ISBN |
9789819766819
9819766818 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910908366403321 |
Choudrie Jyoti
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
ICT for Intelligent Systems : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
| ICT for Intelligent Systems : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
| Autore | Choudrie Jyoti |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (524 pages) |
| Disciplina | 004.6 |
| Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
| Collana | Smart Innovation, Systems and Technologies |
| Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
| ISBN |
9789819939824
9819939828 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Intrusion Detection Model for IoT Networks using Graph Convolution Networks(GCN) -- Drowsiness Detection System -- A Deep Learning Technique to Recommend Music based on Facial and Speech Emotions -- Smart Chair Posture Detection and Correction Using IOT -- The Opinions Imparted On Singular’s Face. |
| Record Nr. | UNINA-9910746086103321 |
Choudrie Jyoti
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
ICT with Intelligent Applications : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi
| ICT with Intelligent Applications : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
| Autore | Choudrie Jyoti |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (647 pages) |
| Disciplina | 004.6 |
| Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
| ISBN | 981-9937-58-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Monitoring Algorithm for Datafication and Information Control for Data Optimization -- 1 Introduction -- 1.1 Datafication -- 1.2 Information Control -- 2 Literature Review -- 3 Datafication and Information Control -- 4 Algorithm for Datafication and Information Control -- 5 Conclusion -- References -- Understanding Customer Perception Regarding Branded Fuel 'XP-95' in IOCL Retail Outlets Using Business Intelligence (BI) by the Help of NVIVO and SPSS Software -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 3.1 Qualitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 3.2 Quantitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 4 Discussion and Findings -- 5 Conclusion -- References -- Investigation of Aadhaar Card Enrolment in Government Schools Using R -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Steps Involved in the Data Analysis -- 3.2 Data Preprocessing -- 4 Results and Discussion -- 4.1 Data Collection -- 4.2 Data Analysis -- 4.3 Correlation and Regression Line -- 4.4 Line Graph -- 4.5 Comparison of Aadhaar Enrolment -- 5 Conclusion -- References -- Automated Spurious Product Review Auditing System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Signed Interface Algorithm Working -- 4 Result and Analysis -- 5 Conclusion -- References -- A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloud/Fog Computing -- 1 Introduction -- 1.1 Cloud Computing -- 1.2 Fog Computing -- 1.3 Internet of Things (IoT) -- 2 Background -- 2.1 Rivest-Shamir-Adleman Algorithm (RSA) -- 2.2 Elliptical Curve Cryptography Algorithm (ECC) -- 2.3 ECC Standardization Process -- 3 Comparison of ECC and RSA Algorithm -- 4 Conclusion -- References.
Data Prevention Protocol for Cloud Computing Security Using Blockchain Technology -- 1 Introduction -- 2 Block-Chain Technology -- 3 Structure of Block-Chain -- 4 Features of Block-Chain System -- 5 Challenges -- 6 Secure Solution for Cloud -- 7 Requirements of Cloud -- 8 Solutions for Cloud Data Security Based on Block-Chain Technology -- 9 Examples of Cloud Data Security Based Block-Chain Technology -- 9.1 Secure Cloud Data Privacy -- 9.2 Cloud Data Unity -- 9.3 Cloud Data Detectability -- 10 Review Outcomes and Research Gap -- 11 Conclusions -- References -- Intelligence Monitoring of Home Security -- 1 Introduction -- 2 Proposed Device -- 3 Components Specifications -- 4 Future Scope -- References -- TB Bacteria and WBC Detection from ZN-Stained Sputum Smear Images Using Object Detection Model -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 TB Bacteria Detection Using RetinaNet Object Detection Model -- 2.3 Implementation Details -- 2.4 Comparison with Other Object Detection Model -- 2.5 Performance Metrics -- 3 Result and Discussion -- 4 Conclusion -- References -- AuraCodes: Barcodes in the Aural Band -- 1 Introduction -- 2 Technical Analysis -- 2.1 Components of the EAN13 Barcode -- 2.2 Components of the QR Code -- 3 Proposition -- 4 Implementation -- 5 Experimental Results -- 6 Future Work -- 7 Conclusion -- References -- A Scrutiny and Investigation on Student Response System to Assess the Rating on Profuse Dataset-An Aerial View -- 1 Introduction -- 2 Literature Survey -- 3 Motivation and Background Study -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization -- 3.4 Stemming -- 3.5 Future Selection -- 3.6 Classification -- 3.7 Evaluation -- 3.8 Visualization -- 4 Dataset -- 5 Observations and Analysis -- 6 Results and Discussions -- 7 Conclusions -- References. Analysis of Hospital Patient Data Using Computational Models -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Creation -- 3.2 Data Preprocessing -- 3.3 Model Building -- 3.4 Evaluation -- 3.5 Clustering -- 4 Results -- 4.1 Elbow Method -- 4.2 Silhouette Analysis -- 5 Conclusion -- References -- A Research on the Impact of Big Data Analytics on the Telecommunications Sector -- 1 Introduction -- 2 Trends in the Implementation of Big Data Analytics in the Telecom Industry -- 3 Regional Insight -- 4 Challenges of the Telecommunication Industry -- 4.1 Operation-Related Costs -- 4.2 Needs for Consumers -- 4.3 Information Security and Breaches -- 4.4 Collaboration -- 4.5 High-Speed Data-in-Motion -- 4.6 Support for Application and Network Intelligence -- 4.7 Real-Time Actionable Insights -- 5 Telecommunication Industry, Big Data Analytics, and Customer Services -- 6 Conclusion -- References -- Face Mask Isolation Canister Design for Healthcare Sector Towards Preventive Approach -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Gap Analysis -- 5 Proposed Design -- 6 Working -- 7 Applications -- 8 Future Scope -- 9 Conclusion -- References -- Modeling the Impact of Access to Finance on MSMEs' Contribution Towards Exports of the Economy -- 1 Introduction -- 2 Reviews of Related Literatures -- 3 Objectives of the Research -- 4 Methodology of the Study -- 5 Linear Regression Model -- 6 Analysis of Data and Discussion -- 6.1 Export Contribution of Indian MSME Sector -- 6.2 Regression Analysis and Their Interpretation -- 7 Scope for Future Research -- 8 Conclusion and Recommendations -- References -- Privacy Challenges and Solutions in Implementing Searchable Encryption for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 2.1 Proxy Re-encryption with and without Keyword Search -- 3 Conclusion -- References. Multi-objective Optimization with Practical Constraints Using AALOA -- 1 Introduction -- 2 Problem Formulation -- 2.1 Objective Functions -- 2.2 Constraints -- 3 Proposed Algorithm -- 4 Multi-objective Optimization Strategies -- 4.1 Non-dominated Sorting -- 4.2 Archive Selection -- 4.3 Fuzzy Approach -- 5 Results and Analysis -- 5.1 Example-1: Benchmark Test Functions -- 5.2 Example-2: Electrical Test System -- 6 Conclusion -- References -- An Implementation of Lightweight Cryptographic Algorithm for IOT Healthcare System -- 1 Introduction -- 2 Methodology -- 2.1 Materials -- 2.2 Proposed Architecture -- 3 Experimental Setup and Results -- 3.1 Performance Evaluation -- 4 Discussions -- 5 Conclusions and Future Work -- References -- Home Appliances Automation Using IPv6 Transmission Over BLE -- 1 Introduction -- 2 Work Flow -- 3 Proposed Algorithm -- 4 Initial Setup and Plateform -- 5 Experimental Setup for Connect Raspberry BLE with Mobile nRF Connect App -- 6 Experimental Results -- 7 Conclusion -- References -- IoT Based Collision Avoidance System with the Case Study Using IR Sensor for Vehicles -- 1 Introduction -- 1.1 Types of Collision Avoidance Assist Systems -- 2 Literature Review -- 3 Motivation -- 4 Methodology -- 4.1 Arduino Uno -- 4.2 Ultrasonic Sensors -- 4.3 Motor Driver -- 5 Result and Discussion -- 6 Conclusion and Future Work -- References -- Airline Ticket Price Forecasting Using Time Series Model -- 1 Introduction -- 2 Related Work -- 3 Background of the Work -- 4 Proposed Work -- 4.1 Important Packages -- 4.2 Dataset Collection -- 4.3 Building Model -- 5 Flask Python Web Framework -- 6 Experimental Results -- 6.1 Accuracy -- 7 Conclusion -- References -- AI Powered Authentication for Smart Home Security-A Survey -- 1 Introduction -- 2 Related Work -- 3 Face Recognition Technologies -- 3.1 Appearance-Based Methods. 3.2 Single-Shot Methods -- 3.3 Multi-shot Methods -- 3.4 Rgbd-Based Approaches -- 4 Proposed Methodologies -- 4.1 Grassman Algorithm -- 4.2 Convolutional Neural Network Algorithm -- 4.3 Limitations -- 4.4 Future Works -- 5 Conclusion -- References -- WSRR: Weighted Rank-Relevance Sampling for Dense Text Retrieval -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Experiments and Results -- 5 Conclusions -- References -- Tweet Based Sentiment Analysis for Stock Price Prediction -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 System Architecture -- 3.2 Module Descrption -- 3.3 Data Processing: Data Training -- 3.4 Model Training -- 4 Implementation -- 4.1 CEA Algorithm -- 5 Result and Analysis -- 6 Conclusion and Future Work -- References -- A Study on the Stock Market Trend Predictions -- 1 Introduction -- 2 Background -- 2.1 Research Mainly Based on Technical Analysis -- 2.2 Research Mainly Based on Sentiment Analysis -- 3 Conclusion -- References -- Optimization of Partial Products in Modified Booth Multiplier -- 1 Introduction -- 2 Booth's Algorithm -- 3 Modified Booth's Algorithm -- 4 Optimized Booth's Multiplier (OBM) -- 4.1 Proposed Algorithm to Reduce Partial Products -- 4.2 16 × 16 Multiplication Using OBM -- 5 Results and Discussion -- 5.1 FPGA Device Utilization -- 5.2 Simulation Results -- 6 Conclusion -- References -- Comparative Study on Text-to-Image Synthesis Using GANs -- 1 Introduction -- 2 Literature Review -- 2.1 Cycle-Consistent Inverse GAN for Text-to-Image Synthesis -- 2.2 Dynamic Aspect-Aware GAN for Text-to-Image Synthesis -- 2.3 Cycle Text-to-Image GAN with BERT -- 3 Conclusion -- References -- Online Hate Speech Identification Using Fine-tuned ALBERT -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Experiment -- 4.1 Training Details of ALBERT Base Version 2. 4.2 Fine-Tuned ALBERT. |
| Record Nr. | UNINA-9910746286703321 |
Choudrie Jyoti
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
ICT with Intelligent Applications : Proceedings of ICTIS 2021, Volume 1
| ICT with Intelligent Applications : Proceedings of ICTIS 2021, Volume 1 |
| Autore | Senjyu Tomonobu |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2022 |
| Descrizione fisica | 1 online resource (802 pages) |
| Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
| Collana | Smart Innovation, Systems and Technologies Ser. |
| Soggetto genere / forma | Electronic books. |
| ISBN |
9789811641770
9789811641763 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910512167403321 |
Senjyu Tomonobu
|
||
| Singapore : , : Springer Singapore Pte. Limited, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2024, Volume 1
| Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2024, Volume 1 |
| Autore | Roy Satyabrata |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Singapore : , : Springer, , 2025 |
| Descrizione fisica | 1 online resource (563 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
SinwarDeepak
DeyNilanjan PerumalThinagaran R. S. TavaresJoão Manuel |
| Collana | Lecture Notes in Networks and Systems Series |
| ISBN |
9789819769957
9819769957 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910921007703321 |
Roy Satyabrata
|
||
| Singapore : , : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2024, Volume 2
| Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2024, Volume 2 |
| Autore | Roy Satyabrata |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Singapore : , : Springer, , 2025 |
| Descrizione fisica | 1 online resource (564 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
SinwarDeepak
DeyNilanjan PerumalThinagaran R. S. TavaresJoão Manuel |
| Collana | Lecture Notes in Networks and Systems Series |
| ISBN |
9789819769926
9789819769919 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910917192503321 |
Roy Satyabrata
|
||
| Singapore : , : Springer, , 2025 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2022
| Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2022 |
| Autore | Roy Satyabrata |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
| Descrizione fisica | 1 online resource (764 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
SinwarDeepak
DeyNilanjan PerumalThinagaran TavaresJoão Manuel R. S |
| Collana | Lecture Notes in Networks and Systems Series |
| Soggetto topico |
Computational intelligence
Computer vision |
| ISBN | 9789819926022 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Organizing Committee -- Preface -- Contents -- Editors and Contributors -- Empirical Study of Multi-class Weed Classification Using Deep Learning Network Through Transfer Learning -- 1 Introduction -- 2 Related Work -- 3 Data Preparation and Methodology -- 3.1 Dataset Used -- 3.2 Preprocessing -- 4 Materials and Methods -- 4.1 Convolutional Neural Network (CNN) -- 4.2 Transfer Learning -- 5 Experimental Results -- 6 Conclusion and Future Work -- References -- Secured Face Recognition System Based on Blockchain with Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Pixel to Blocks -- 3.2 Face Recognition -- 4 Experiments -- 5 Conclusion -- References -- Classifying Paintings/Artworks Using Deep Learning Techniques -- 1 Introduction -- 2 Literature Review -- 2.1 Motivation -- 3 Methodologies -- 3.1 Dataset -- 3.2 Model Building -- 3.3 Model Testing -- 4 Results -- 5 Conclusion -- References -- Hybrid Deep Face Music Recommendation Using Emotions -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Collection -- 3.2 Methodology -- 3.3 Algorithm -- 4 Experimental Results and Analysis -- 4.1 Results -- 4.2 Conclusion -- 4.3 Future Scope -- References -- Integrating ResNet18 and YOLOv4 for Pedestrian Detection -- 1 Introductıon -- 2 Related Works -- 3 Proposed System -- 3.1 Input -- 3.2 Backbone (ResNet18) -- 3.3 Neck -- 4 Experiments and Discussion -- 5 Conclusions -- References -- Image Restoration from Weather Degraded Images Using Markov Random Field -- 1 Introduction -- 2 Literature Survey -- 3 Background -- 4 Proposed Methodology -- 5 Experimental Results -- 6 Conclusion and Future Work -- References -- A Feature Representation Technique for Angular Margin Loss -- 1 Introduction -- 2 Background -- 3 Proposed Technique -- 3.1 Feature Representation as a Signal.
3.2 Feature Similarity Functions -- 4 Experiment and Result -- 4.1 Experiment Setup -- 4.2 Result -- 5 Conclusion -- References -- LeafViT: Vision Transformers-Based Leaf Disease Detection -- 1 Introduction -- 2 Related Work -- 2.1 Shape and Texture-Based Leaf Disease Identification -- 2.2 Deep Learning-Based Leaf Disease Detection -- 2.3 Fine-Grained Visual Categorization (FGVC) -- 2.4 Transformers Models in Computer Vision -- 3 Proposed Method -- 3.1 Model Architecture -- 3.2 Loss Function -- 3.3 Class Imbalance -- 4 Implementation -- 4.1 Dataset -- 4.2 Hyperparameters -- 5 Experiments -- 5.1 Ablation Studies -- 5.2 Evaluation Metrics -- 6 Conclusion -- References -- Conversion of Satellite Images to Google Maps Using GAN -- 1 Introduction -- 2 Related Work -- 2.1 Problem Definition -- 2.2 Dataset -- 3 Methodology -- 3.1 U-Net -- 3.2 CycleGAN U-Net -- 3.3 W-Net -- 3.4 CycleGAN W-Net -- 3.5 Experiments -- 3.6 Metrics -- 4 Analysis -- 4.1 Two Sample Z-Test and Objectives of Results -- 4.2 Road, Water, and Forest Dataset -- 5 Results -- 6 Conclusion + Future Scope -- References -- Investigation of Widely Used Implicit and Explicit Communication in Crossing-Decision of Pedestrian in UAE -- 1 Introduction -- 2 Literature Review -- 3 Method -- 4 Result -- 4.1 At Unsignalized Pedestrian Crossing -- 4.2 Signalized Crossing or Pelican Crossing -- 4.3 Mid-road Crossing -- 4.4 Unsignalized T-Junctions Crossing -- 4.5 Residential Area Crossing -- 5 Discussion -- 6 Conclusion -- References -- Attention Deficit Hyperactivity Disorder Prediction Using Resting-State Networks -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Gathering and Cleaning -- 3.2 Data Preprocessing and Feature Extraction -- 3.3 Model Selection and Planning -- 4 Results -- 4.1 Testing Hypotheses -- 4.2 ROC Curve -- 5 Conclusion -- References. Neuroinformatics Deep Learning Synthesizer Based on Impulse Control Disorder Using LSTM Cells -- 1 Introduction -- 2 Using Deep Learning Capabilities for Diagnosis of the Disease -- 3 Methodology and System Description -- 4 Data Preparation and Results-Based Orientation -- 5 Data-Set Description -- 6 Baseline Models -- 7 Results -- 8 Conclusion -- References -- Wasserstein GANs-Enabled Spectral Normalization on Credit Card Fraud Detection -- 1 Introduction -- 2 Background -- 3 Proposed Method -- 3.1 Undersampling -- 3.2 Oversampling -- 3.3 Generative Adversarial Nets/Conditional -- 3.4 Wasserstein GANs -- 3.5 Batch Normalization -- 3.6 Spectral Normalization -- 3.7 L1 Loss -- 3.8 Metrics -- 4 Experiments -- 4.1 Data -- 4.2 Classification Model -- 4.3 Model Parameters -- 5 Observation -- 6 Conclusion -- References -- Classification of Bipolar Disorder Using Deep Learning Models on fMRI Data -- 1 Introduction -- 2 Methodology -- 2.1 Preprocessing (FuNP) -- 2.2 Feature Extraction (ICA) -- 2.3 Feature Selection (T-Score Approach) -- 2.4 Model Training (ANN and LSTM) -- 3 Results -- 4 Conclusion -- References -- Predicting Schizophrenia from fMRI Using Deep Learning -- 1 Introduction -- 2 Methodology -- 2.1 Data Preprocessing and Analysis -- 2.2 Model Training -- 3 Results -- 4 Conclusions -- References -- Patrolling Robot with Facial Detection -- 1 Introduction -- 2 Literature Review -- 3 Related Work -- 3.1 Haar Cascade Classifier -- 3.2 MediaPipe by Google -- 4 Methodology -- 4.1 Hardware -- 4.2 Software -- 5 Results and Discussion -- 6 Conclusion -- References -- A Graph-Based Relook Beyond Metadata for Music Recommendation -- 1 Introduction -- 2 Related Work -- 2.1 Representation Learning for Users -- 2.2 Representation Learning for Music -- 2.3 Recommendation Models -- 3 Dataset -- 4 Recommendation Models -- 5 Proposed Methodology. 6 Results and Analysis -- 6.1 Analysis of Results -- 7 Conclusion and Future Work -- References -- An Interpretability Assisted Empirical Study of Affective Traits in Visual Content of Disinformation -- 1 Introduction -- 2 Related Work -- 2.1 Visual Emotion in Disinformation Campaigns -- 2.2 Detection of Visual Emotion in Contexts -- 2.3 Interpretability Techniques for Visual Emotion Detection Models -- 3 Methodology -- 4 Dataset -- 5 Results and Discussions -- 5.1 RQ1: Do Visual Emotions Enhance the Message in a Disinformation Campaign? -- 5.2 RQ2: Do the Predominant Emotions Differ in Different Types of Disinformation Campaigns? -- 5.3 RQ3: To What Extent, the Emotional Theme Is Consistent or Event Specific Across Events of a Specific Disinformation Type? -- 6 Summary and Future Work -- References -- Multi-scale Fusion-Based Object Detection Network for Advance Driver Assistance Systems -- 1 Introduction -- 2 Related Work -- 2.1 Stage-1 Detectors -- 2.2 Stage 2-Detectors -- 3 Proposed Work-Multi-scale Fusion-Based Detection Architecture -- 3.1 Multi-scale Fusion-Based Object Detection Architecture -- 3.2 Dimensional Scaling -- 3.3 Multi-scaling -- 4 BiFPN -- 4.1 Inter-scale Links -- 4.2 Feature Fusion with Weights -- 5 System for Box/Class Estimation -- 6 Hyperparameters -- 7 Salient Features of Proposed Methodology -- 8 Experimental Results -- 9 Conclusion -- References -- Vectorization of Python Programs Using Recursive LSTM Autoencoders -- 1 Introduction -- 2 Literature Survey -- 2.1 Existing Systems -- 2.2 Background -- 3 Autoencoder Architecture -- 3.1 Encoder Architecture -- 3.2 Decoder Architecture -- 4 Dataset -- 5 Methodology -- 6 Results and Discussion -- 7 Conclusion -- References -- Phenology Detection for Croplands Using Sentinel-2 and Computer Vision Techniques -- 1 Introduction -- 2 Implementation and Experiments. 2.1 Autodetection of Farms from Geosatellite Images Using Computer Vision and Deep Learning -- 2.2 Fetching Image Data of Farms from Sentinel-2 and Processing It to Obtain the Time-Series NDVI Values -- 2.3 Denoising Raw NDVI Data -- 2.4 Interpolation of Mean NDVI Data -- 3 The Phenology Algorithm -- 3.1 The Start of Season (SOS) -- 3.2 The Peak of Season (POS) -- 3.3 The End of Season (EOS) -- 3.4 The Valley of Season (VOS) -- 3.5 Length of Season (LOS) -- 3.6 The Computation of Phenology Phases -- 4 Results and Discussion -- 5 Conclusion -- References -- Deep Learning-Based Safety Assurance of Construction Workers: Real-Time Safety Kit Detection -- 1 Introduction -- 2 Related Work -- 2.1 Based on Sensors -- 2.2 Based on Vision -- 3 Methodology -- 3.1 YOLO Detector -- 3.2 YOLO v5 and YOLO v6 -- 4 Dataset Preparation-HVM Dataset -- 4.1 Data Augmentation and Preprocessing Techniques -- 5 Validation Metrics -- 6 Results and Discussion -- 7 Conclusion -- References -- Automatic Detection and Classification of Melanoma Using the Combination of CNN and SVM -- 1 Introduction -- 2 Materials and Method -- 2.1 Images Used -- 2.2 Pre-processing -- 2.3 Feature Extraction -- 2.4 Classification -- 3 Results and Discussion -- 4 Conclusions -- References -- CyINSAT: Cyclone Dataset from Indian National Satellite for Forecasting -- 1 Introduction -- 2 Cyclone Dataset from Indian National Satellite -- 2.1 Properties -- 2.2 Construction -- 2.3 Related Datasets -- 3 Applications -- 3.1 Forecasting Parameters -- 3.2 Cyclone Track Forecasting -- 4 Conclusion -- References -- Classification of Ocular Diseases: A Vision Transformer-Based Approach -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data -- 3.2 Vision Transformer -- 3.3 Training Phase -- 3.4 Optimizer -- 3.5 Regularization -- 4 Results -- 4.1 Learning Curves -- 4.2 Performance Metrics. 5 Conclusion. |
| Record Nr. | UNINA-9910751394403321 |
Roy Satyabrata
|
||
| Singapore : , : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||