ICT for Intelligent Systems [[electronic resource] ] : Proceedings of ICTIS 2023 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
Autore | Choudrie Jyoti |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (524 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Smart Innovation, Systems and Technologies |
Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
ISBN | 981-9939-82-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Intrusion Detection Model for IoT Networks using Graph Convolution Networks(GCN) -- Drowsiness Detection System -- A Deep Learning Technique to Recommend Music based on Facial and Speech Emotions -- Smart Chair Posture Detection and Correction Using IOT -- The Opinions Imparted On Singular’s Face. |
Record Nr. | UNINA-9910746086103321 |
Choudrie Jyoti | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT with Intelligent Applications [[electronic resource] ] : ICTIS 2023, Volume 1 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
Autore | Choudrie Jyoti |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (647 pages) |
Disciplina | 004.6 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
ISBN | 981-9937-58-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Monitoring Algorithm for Datafication and Information Control for Data Optimization -- 1 Introduction -- 1.1 Datafication -- 1.2 Information Control -- 2 Literature Review -- 3 Datafication and Information Control -- 4 Algorithm for Datafication and Information Control -- 5 Conclusion -- References -- Understanding Customer Perception Regarding Branded Fuel 'XP-95' in IOCL Retail Outlets Using Business Intelligence (BI) by the Help of NVIVO and SPSS Software -- 1 Introduction -- 2 Research Methodology -- 3 Data Analysis and Results -- 3.1 Qualitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 3.2 Quantitative Analysis for Customer Perception (Regarding XP-95) Measurement -- 4 Discussion and Findings -- 5 Conclusion -- References -- Investigation of Aadhaar Card Enrolment in Government Schools Using R -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Steps Involved in the Data Analysis -- 3.2 Data Preprocessing -- 4 Results and Discussion -- 4.1 Data Collection -- 4.2 Data Analysis -- 4.3 Correlation and Regression Line -- 4.4 Line Graph -- 4.5 Comparison of Aadhaar Enrolment -- 5 Conclusion -- References -- Automated Spurious Product Review Auditing System -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Signed Interface Algorithm Working -- 4 Result and Analysis -- 5 Conclusion -- References -- A Comparison of the Key Size and Security Level of the ECC and RSA Algorithms with a Focus on Cloud/Fog Computing -- 1 Introduction -- 1.1 Cloud Computing -- 1.2 Fog Computing -- 1.3 Internet of Things (IoT) -- 2 Background -- 2.1 Rivest-Shamir-Adleman Algorithm (RSA) -- 2.2 Elliptical Curve Cryptography Algorithm (ECC) -- 2.3 ECC Standardization Process -- 3 Comparison of ECC and RSA Algorithm -- 4 Conclusion -- References.
Data Prevention Protocol for Cloud Computing Security Using Blockchain Technology -- 1 Introduction -- 2 Block-Chain Technology -- 3 Structure of Block-Chain -- 4 Features of Block-Chain System -- 5 Challenges -- 6 Secure Solution for Cloud -- 7 Requirements of Cloud -- 8 Solutions for Cloud Data Security Based on Block-Chain Technology -- 9 Examples of Cloud Data Security Based Block-Chain Technology -- 9.1 Secure Cloud Data Privacy -- 9.2 Cloud Data Unity -- 9.3 Cloud Data Detectability -- 10 Review Outcomes and Research Gap -- 11 Conclusions -- References -- Intelligence Monitoring of Home Security -- 1 Introduction -- 2 Proposed Device -- 3 Components Specifications -- 4 Future Scope -- References -- TB Bacteria and WBC Detection from ZN-Stained Sputum Smear Images Using Object Detection Model -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 TB Bacteria Detection Using RetinaNet Object Detection Model -- 2.3 Implementation Details -- 2.4 Comparison with Other Object Detection Model -- 2.5 Performance Metrics -- 3 Result and Discussion -- 4 Conclusion -- References -- AuraCodes: Barcodes in the Aural Band -- 1 Introduction -- 2 Technical Analysis -- 2.1 Components of the EAN13 Barcode -- 2.2 Components of the QR Code -- 3 Proposition -- 4 Implementation -- 5 Experimental Results -- 6 Future Work -- 7 Conclusion -- References -- A Scrutiny and Investigation on Student Response System to Assess the Rating on Profuse Dataset-An Aerial View -- 1 Introduction -- 2 Literature Survey -- 3 Motivation and Background Study -- 3.1 Data Collection -- 3.2 Pre-processing -- 3.3 Tokenization -- 3.4 Stemming -- 3.5 Future Selection -- 3.6 Classification -- 3.7 Evaluation -- 3.8 Visualization -- 4 Dataset -- 5 Observations and Analysis -- 6 Results and Discussions -- 7 Conclusions -- References. Analysis of Hospital Patient Data Using Computational Models -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Creation -- 3.2 Data Preprocessing -- 3.3 Model Building -- 3.4 Evaluation -- 3.5 Clustering -- 4 Results -- 4.1 Elbow Method -- 4.2 Silhouette Analysis -- 5 Conclusion -- References -- A Research on the Impact of Big Data Analytics on the Telecommunications Sector -- 1 Introduction -- 2 Trends in the Implementation of Big Data Analytics in the Telecom Industry -- 3 Regional Insight -- 4 Challenges of the Telecommunication Industry -- 4.1 Operation-Related Costs -- 4.2 Needs for Consumers -- 4.3 Information Security and Breaches -- 4.4 Collaboration -- 4.5 High-Speed Data-in-Motion -- 4.6 Support for Application and Network Intelligence -- 4.7 Real-Time Actionable Insights -- 5 Telecommunication Industry, Big Data Analytics, and Customer Services -- 6 Conclusion -- References -- Face Mask Isolation Canister Design for Healthcare Sector Towards Preventive Approach -- 1 Introduction -- 2 Motivation -- 3 Related Work -- 4 Gap Analysis -- 5 Proposed Design -- 6 Working -- 7 Applications -- 8 Future Scope -- 9 Conclusion -- References -- Modeling the Impact of Access to Finance on MSMEs' Contribution Towards Exports of the Economy -- 1 Introduction -- 2 Reviews of Related Literatures -- 3 Objectives of the Research -- 4 Methodology of the Study -- 5 Linear Regression Model -- 6 Analysis of Data and Discussion -- 6.1 Export Contribution of Indian MSME Sector -- 6.2 Regression Analysis and Their Interpretation -- 7 Scope for Future Research -- 8 Conclusion and Recommendations -- References -- Privacy Challenges and Solutions in Implementing Searchable Encryption for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 2.1 Proxy Re-encryption with and without Keyword Search -- 3 Conclusion -- References. Multi-objective Optimization with Practical Constraints Using AALOA -- 1 Introduction -- 2 Problem Formulation -- 2.1 Objective Functions -- 2.2 Constraints -- 3 Proposed Algorithm -- 4 Multi-objective Optimization Strategies -- 4.1 Non-dominated Sorting -- 4.2 Archive Selection -- 4.3 Fuzzy Approach -- 5 Results and Analysis -- 5.1 Example-1: Benchmark Test Functions -- 5.2 Example-2: Electrical Test System -- 6 Conclusion -- References -- An Implementation of Lightweight Cryptographic Algorithm for IOT Healthcare System -- 1 Introduction -- 2 Methodology -- 2.1 Materials -- 2.2 Proposed Architecture -- 3 Experimental Setup and Results -- 3.1 Performance Evaluation -- 4 Discussions -- 5 Conclusions and Future Work -- References -- Home Appliances Automation Using IPv6 Transmission Over BLE -- 1 Introduction -- 2 Work Flow -- 3 Proposed Algorithm -- 4 Initial Setup and Plateform -- 5 Experimental Setup for Connect Raspberry BLE with Mobile nRF Connect App -- 6 Experimental Results -- 7 Conclusion -- References -- IoT Based Collision Avoidance System with the Case Study Using IR Sensor for Vehicles -- 1 Introduction -- 1.1 Types of Collision Avoidance Assist Systems -- 2 Literature Review -- 3 Motivation -- 4 Methodology -- 4.1 Arduino Uno -- 4.2 Ultrasonic Sensors -- 4.3 Motor Driver -- 5 Result and Discussion -- 6 Conclusion and Future Work -- References -- Airline Ticket Price Forecasting Using Time Series Model -- 1 Introduction -- 2 Related Work -- 3 Background of the Work -- 4 Proposed Work -- 4.1 Important Packages -- 4.2 Dataset Collection -- 4.3 Building Model -- 5 Flask Python Web Framework -- 6 Experimental Results -- 6.1 Accuracy -- 7 Conclusion -- References -- AI Powered Authentication for Smart Home Security-A Survey -- 1 Introduction -- 2 Related Work -- 3 Face Recognition Technologies -- 3.1 Appearance-Based Methods. 3.2 Single-Shot Methods -- 3.3 Multi-shot Methods -- 3.4 Rgbd-Based Approaches -- 4 Proposed Methodologies -- 4.1 Grassman Algorithm -- 4.2 Convolutional Neural Network Algorithm -- 4.3 Limitations -- 4.4 Future Works -- 5 Conclusion -- References -- WSRR: Weighted Rank-Relevance Sampling for Dense Text Retrieval -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Experiments and Results -- 5 Conclusions -- References -- Tweet Based Sentiment Analysis for Stock Price Prediction -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 System Architecture -- 3.2 Module Descrption -- 3.3 Data Processing: Data Training -- 3.4 Model Training -- 4 Implementation -- 4.1 CEA Algorithm -- 5 Result and Analysis -- 6 Conclusion and Future Work -- References -- A Study on the Stock Market Trend Predictions -- 1 Introduction -- 2 Background -- 2.1 Research Mainly Based on Technical Analysis -- 2.2 Research Mainly Based on Sentiment Analysis -- 3 Conclusion -- References -- Optimization of Partial Products in Modified Booth Multiplier -- 1 Introduction -- 2 Booth's Algorithm -- 3 Modified Booth's Algorithm -- 4 Optimized Booth's Multiplier (OBM) -- 4.1 Proposed Algorithm to Reduce Partial Products -- 4.2 16 × 16 Multiplication Using OBM -- 5 Results and Discussion -- 5.1 FPGA Device Utilization -- 5.2 Simulation Results -- 6 Conclusion -- References -- Comparative Study on Text-to-Image Synthesis Using GANs -- 1 Introduction -- 2 Literature Review -- 2.1 Cycle-Consistent Inverse GAN for Text-to-Image Synthesis -- 2.2 Dynamic Aspect-Aware GAN for Text-to-Image Synthesis -- 2.3 Cycle Text-to-Image GAN with BERT -- 3 Conclusion -- References -- Online Hate Speech Identification Using Fine-tuned ALBERT -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Experiment -- 4.1 Training Details of ALBERT Base Version 2. 4.2 Fine-Tuned ALBERT. |
Record Nr. | UNINA-9910746286703321 |
Choudrie Jyoti | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
ICT with Intelligent Applications : Proceedings of ICTIS 2021, Volume 1 |
Autore | Senjyu Tomonobu |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2022 |
Descrizione fisica | 1 online resource (802 pages) |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Smart Innovation, Systems and Technologies Ser. |
Soggetto genere / forma | Electronic books. |
ISBN |
9789811641770
9789811641763 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910512167403321 |
Senjyu Tomonobu | ||
Singapore : , : Springer Singapore Pte. Limited, , 2022 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Innovations in Computational Intelligence and Computer Vision : Proceedings of ICICV 2022 |
Autore | Roy Satyabrata |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2023 |
Descrizione fisica | 1 online resource (764 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
SinwarDeepak
DeyNilanjan PerumalThinagaran TavaresJoão Manuel R. S |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 9789819926022 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Organizing Committee -- Preface -- Contents -- Editors and Contributors -- Empirical Study of Multi-class Weed Classification Using Deep Learning Network Through Transfer Learning -- 1 Introduction -- 2 Related Work -- 3 Data Preparation and Methodology -- 3.1 Dataset Used -- 3.2 Preprocessing -- 4 Materials and Methods -- 4.1 Convolutional Neural Network (CNN) -- 4.2 Transfer Learning -- 5 Experimental Results -- 6 Conclusion and Future Work -- References -- Secured Face Recognition System Based on Blockchain with Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Pixel to Blocks -- 3.2 Face Recognition -- 4 Experiments -- 5 Conclusion -- References -- Classifying Paintings/Artworks Using Deep Learning Techniques -- 1 Introduction -- 2 Literature Review -- 2.1 Motivation -- 3 Methodologies -- 3.1 Dataset -- 3.2 Model Building -- 3.3 Model Testing -- 4 Results -- 5 Conclusion -- References -- Hybrid Deep Face Music Recommendation Using Emotions -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Data Collection -- 3.2 Methodology -- 3.3 Algorithm -- 4 Experimental Results and Analysis -- 4.1 Results -- 4.2 Conclusion -- 4.3 Future Scope -- References -- Integrating ResNet18 and YOLOv4 for Pedestrian Detection -- 1 Introductıon -- 2 Related Works -- 3 Proposed System -- 3.1 Input -- 3.2 Backbone (ResNet18) -- 3.3 Neck -- 4 Experiments and Discussion -- 5 Conclusions -- References -- Image Restoration from Weather Degraded Images Using Markov Random Field -- 1 Introduction -- 2 Literature Survey -- 3 Background -- 4 Proposed Methodology -- 5 Experimental Results -- 6 Conclusion and Future Work -- References -- A Feature Representation Technique for Angular Margin Loss -- 1 Introduction -- 2 Background -- 3 Proposed Technique -- 3.1 Feature Representation as a Signal.
3.2 Feature Similarity Functions -- 4 Experiment and Result -- 4.1 Experiment Setup -- 4.2 Result -- 5 Conclusion -- References -- LeafViT: Vision Transformers-Based Leaf Disease Detection -- 1 Introduction -- 2 Related Work -- 2.1 Shape and Texture-Based Leaf Disease Identification -- 2.2 Deep Learning-Based Leaf Disease Detection -- 2.3 Fine-Grained Visual Categorization (FGVC) -- 2.4 Transformers Models in Computer Vision -- 3 Proposed Method -- 3.1 Model Architecture -- 3.2 Loss Function -- 3.3 Class Imbalance -- 4 Implementation -- 4.1 Dataset -- 4.2 Hyperparameters -- 5 Experiments -- 5.1 Ablation Studies -- 5.2 Evaluation Metrics -- 6 Conclusion -- References -- Conversion of Satellite Images to Google Maps Using GAN -- 1 Introduction -- 2 Related Work -- 2.1 Problem Definition -- 2.2 Dataset -- 3 Methodology -- 3.1 U-Net -- 3.2 CycleGAN U-Net -- 3.3 W-Net -- 3.4 CycleGAN W-Net -- 3.5 Experiments -- 3.6 Metrics -- 4 Analysis -- 4.1 Two Sample Z-Test and Objectives of Results -- 4.2 Road, Water, and Forest Dataset -- 5 Results -- 6 Conclusion + Future Scope -- References -- Investigation of Widely Used Implicit and Explicit Communication in Crossing-Decision of Pedestrian in UAE -- 1 Introduction -- 2 Literature Review -- 3 Method -- 4 Result -- 4.1 At Unsignalized Pedestrian Crossing -- 4.2 Signalized Crossing or Pelican Crossing -- 4.3 Mid-road Crossing -- 4.4 Unsignalized T-Junctions Crossing -- 4.5 Residential Area Crossing -- 5 Discussion -- 6 Conclusion -- References -- Attention Deficit Hyperactivity Disorder Prediction Using Resting-State Networks -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Gathering and Cleaning -- 3.2 Data Preprocessing and Feature Extraction -- 3.3 Model Selection and Planning -- 4 Results -- 4.1 Testing Hypotheses -- 4.2 ROC Curve -- 5 Conclusion -- References. Neuroinformatics Deep Learning Synthesizer Based on Impulse Control Disorder Using LSTM Cells -- 1 Introduction -- 2 Using Deep Learning Capabilities for Diagnosis of the Disease -- 3 Methodology and System Description -- 4 Data Preparation and Results-Based Orientation -- 5 Data-Set Description -- 6 Baseline Models -- 7 Results -- 8 Conclusion -- References -- Wasserstein GANs-Enabled Spectral Normalization on Credit Card Fraud Detection -- 1 Introduction -- 2 Background -- 3 Proposed Method -- 3.1 Undersampling -- 3.2 Oversampling -- 3.3 Generative Adversarial Nets/Conditional -- 3.4 Wasserstein GANs -- 3.5 Batch Normalization -- 3.6 Spectral Normalization -- 3.7 L1 Loss -- 3.8 Metrics -- 4 Experiments -- 4.1 Data -- 4.2 Classification Model -- 4.3 Model Parameters -- 5 Observation -- 6 Conclusion -- References -- Classification of Bipolar Disorder Using Deep Learning Models on fMRI Data -- 1 Introduction -- 2 Methodology -- 2.1 Preprocessing (FuNP) -- 2.2 Feature Extraction (ICA) -- 2.3 Feature Selection (T-Score Approach) -- 2.4 Model Training (ANN and LSTM) -- 3 Results -- 4 Conclusion -- References -- Predicting Schizophrenia from fMRI Using Deep Learning -- 1 Introduction -- 2 Methodology -- 2.1 Data Preprocessing and Analysis -- 2.2 Model Training -- 3 Results -- 4 Conclusions -- References -- Patrolling Robot with Facial Detection -- 1 Introduction -- 2 Literature Review -- 3 Related Work -- 3.1 Haar Cascade Classifier -- 3.2 MediaPipe by Google -- 4 Methodology -- 4.1 Hardware -- 4.2 Software -- 5 Results and Discussion -- 6 Conclusion -- References -- A Graph-Based Relook Beyond Metadata for Music Recommendation -- 1 Introduction -- 2 Related Work -- 2.1 Representation Learning for Users -- 2.2 Representation Learning for Music -- 2.3 Recommendation Models -- 3 Dataset -- 4 Recommendation Models -- 5 Proposed Methodology. 6 Results and Analysis -- 6.1 Analysis of Results -- 7 Conclusion and Future Work -- References -- An Interpretability Assisted Empirical Study of Affective Traits in Visual Content of Disinformation -- 1 Introduction -- 2 Related Work -- 2.1 Visual Emotion in Disinformation Campaigns -- 2.2 Detection of Visual Emotion in Contexts -- 2.3 Interpretability Techniques for Visual Emotion Detection Models -- 3 Methodology -- 4 Dataset -- 5 Results and Discussions -- 5.1 RQ1: Do Visual Emotions Enhance the Message in a Disinformation Campaign? -- 5.2 RQ2: Do the Predominant Emotions Differ in Different Types of Disinformation Campaigns? -- 5.3 RQ3: To What Extent, the Emotional Theme Is Consistent or Event Specific Across Events of a Specific Disinformation Type? -- 6 Summary and Future Work -- References -- Multi-scale Fusion-Based Object Detection Network for Advance Driver Assistance Systems -- 1 Introduction -- 2 Related Work -- 2.1 Stage-1 Detectors -- 2.2 Stage 2-Detectors -- 3 Proposed Work-Multi-scale Fusion-Based Detection Architecture -- 3.1 Multi-scale Fusion-Based Object Detection Architecture -- 3.2 Dimensional Scaling -- 3.3 Multi-scaling -- 4 BiFPN -- 4.1 Inter-scale Links -- 4.2 Feature Fusion with Weights -- 5 System for Box/Class Estimation -- 6 Hyperparameters -- 7 Salient Features of Proposed Methodology -- 8 Experimental Results -- 9 Conclusion -- References -- Vectorization of Python Programs Using Recursive LSTM Autoencoders -- 1 Introduction -- 2 Literature Survey -- 2.1 Existing Systems -- 2.2 Background -- 3 Autoencoder Architecture -- 3.1 Encoder Architecture -- 3.2 Decoder Architecture -- 4 Dataset -- 5 Methodology -- 6 Results and Discussion -- 7 Conclusion -- References -- Phenology Detection for Croplands Using Sentinel-2 and Computer Vision Techniques -- 1 Introduction -- 2 Implementation and Experiments. 2.1 Autodetection of Farms from Geosatellite Images Using Computer Vision and Deep Learning -- 2.2 Fetching Image Data of Farms from Sentinel-2 and Processing It to Obtain the Time-Series NDVI Values -- 2.3 Denoising Raw NDVI Data -- 2.4 Interpolation of Mean NDVI Data -- 3 The Phenology Algorithm -- 3.1 The Start of Season (SOS) -- 3.2 The Peak of Season (POS) -- 3.3 The End of Season (EOS) -- 3.4 The Valley of Season (VOS) -- 3.5 Length of Season (LOS) -- 3.6 The Computation of Phenology Phases -- 4 Results and Discussion -- 5 Conclusion -- References -- Deep Learning-Based Safety Assurance of Construction Workers: Real-Time Safety Kit Detection -- 1 Introduction -- 2 Related Work -- 2.1 Based on Sensors -- 2.2 Based on Vision -- 3 Methodology -- 3.1 YOLO Detector -- 3.2 YOLO v5 and YOLO v6 -- 4 Dataset Preparation-HVM Dataset -- 4.1 Data Augmentation and Preprocessing Techniques -- 5 Validation Metrics -- 6 Results and Discussion -- 7 Conclusion -- References -- Automatic Detection and Classification of Melanoma Using the Combination of CNN and SVM -- 1 Introduction -- 2 Materials and Method -- 2.1 Images Used -- 2.2 Pre-processing -- 2.3 Feature Extraction -- 2.4 Classification -- 3 Results and Discussion -- 4 Conclusions -- References -- CyINSAT: Cyclone Dataset from Indian National Satellite for Forecasting -- 1 Introduction -- 2 Cyclone Dataset from Indian National Satellite -- 2.1 Properties -- 2.2 Construction -- 2.3 Related Datasets -- 3 Applications -- 3.1 Forecasting Parameters -- 3.2 Cyclone Track Forecasting -- 4 Conclusion -- References -- Classification of Ocular Diseases: A Vision Transformer-Based Approach -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Data -- 3.2 Vision Transformer -- 3.3 Training Phase -- 3.4 Optimizer -- 3.5 Regularization -- 4 Results -- 4.1 Learning Curves -- 4.2 Performance Metrics. 5 Conclusion. |
Record Nr. | UNINA-9910751394403321 |
Roy Satyabrata | ||
Singapore : , : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
IOT with Smart Systems [[electronic resource] ] : ICTIS 2023, Volume 2 / / edited by Jyoti Choudrie, Parikshit N. Mahalle, Thinagaran Perumal, Amit Joshi |
Autore | Choudrie Jyoti |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (660 pages) |
Disciplina | 004 |
Altri autori (Persone) |
MahalleParikshit N
PerumalThinagaran JoshiAmit |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Cooperating objects (Computer systems) Internet of things Computational Intelligence Artificial Intelligence Communications Engineering, Networks Cyber-Physical Systems Internet of Things |
ISBN | 981-9937-61-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface ICTIS 2023 -- Contents -- Editors and Contributors -- The Current State of Art-Indian Unleavened Flat Bread Cooking -- 1 Introduction -- 2 Survey of Existing Methods of Chapati and Other Foods Cooking with New Techniques -- 3 Material and Methods of Dough Preparation, Chapati Making -- 4 Challenges and Future Scope -- 5 Database and Software/hardware Tools -- 6 Conclusion -- References -- An Efficient Abstractive Summarization of Research Articles Using Pegasus Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 5 Conclusions and Future Enhancements -- References -- Performance Analysis of Classification Techniques in Heart Disease Prediction -- 1 Introduction -- 2 Related Work -- 3 Implementation Details -- 3.1 Dataset Information -- 3.2 Classification Methods -- 4 Experimental Results -- 4.1 Correlation Results -- 4.2 Performance Analysis -- 5 Conclusion -- References -- Early Phase Identification and Detection for Plant Poor Growth in Rural Areas: A Survey of the State of the Art -- 1 Introduction -- 2 Related Work -- 3 Issues and Challenges -- 4 Proposed Work -- 4.1 Parametric Evaluation of Related Work -- 5 Methodology Enriching Datasets -- 5.1 RoCoLe Dataset -- 5.2 BRACOL Dataset -- 5.3 Rice Leaf Blight Dataset Rice Leaf Blight Dataset -- 5.4 Plant Pathology Dataset Plant Pathology Dataset -- 5.5 Citrus Dataset -- 6 Conclusion -- 7 Discussion -- References -- Pothole Detection and Road Condition Updation on Google Maps -- 1 Introduction -- 2 System Design -- 2.1 Pothole Detection -- 2.2 Vehicle Tracking -- 2.3 Updating the Database -- 2.4 Rendering Database on Google Maps -- 3 Implementation -- 3.1 Training Phase -- 3.2 Server-Side -- 3.3 Client-Side -- 3.4 Algorithm -- 3.5 Flowchart -- 4 Result and Analysis -- 5 Conclusion -- References.
Fetal Cardiac Detection Using Deep Learning from Echocardiographic Image-A Survey -- 1 Introduction -- 2 Related Work -- 3 Machine Learning Methods for Cardiographic Image Analysis -- 4 Deep Learning Framework for Disease Prediction -- 5 Experimental Results -- 6 Conclusion -- References -- Analysing the Factor Influencing Post COVID-19 Experience Through User-Generated Content: Luxury Hotel in India -- 1 Introduction -- 2 Literature Review -- 3 System Description -- 3.1 Data Pre-processing -- 3.2 Sentiment Analysis -- 3.3 Theme Identification -- 4 Methodology -- 5 Analysing the Theme -- 6 Result -- 6.1 Positive Sentiments -- 6.2 Negative Sentiments -- 7 Conclusion -- References -- Text Detection and Recognition from the Scene Images Using RCNN and EasyOCR -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 3.1 Text Detection -- 3.2 Text Recognition -- 4 Experimentation and Results -- 4.1 Datasets -- 4.2 Implementation Details -- 4.3 Result Analysis -- 5 Conclusion -- References -- The Important Role of Industry Data Connectivity Using M2M and IoT Applications for Processing and Analysis -- 1 Introduction -- 2 Devices to Networks and Platforms -- 2.1 Data Collection -- 2.2 Data Communication -- 3 Strengthen the Data Management Platform -- 3.1 Centralized Device Management -- 3.2 High-Performance Data Management -- 3.3 Enhanced Administration and Security -- 3.4 Flexible Application Development -- 4 Data Transfer with MQTT -- 4.1 Topic and Quality of Service (QoS) -- 4.2 Results -- 5 Discussion -- 6 Conclusion -- 7 Future Study -- References -- Classification of Non-proliferative Diabetic Retinopathy in Terms of Dark and Bright Lesions Using Multi-layered Perceptron (MLP) -- 1 Introduction -- 2 Methodology -- 2.1 Separation of Mask from Fundus -- 2.2 Removal of Optic Disc -- 2.3 Extraction of Retinal Blood Vessels -- 2.4 Microaneurysms. 2.5 Hemorrhages -- 2.6 Exudates -- 2.7 Cotton Wool Spots -- 3 Result -- 4 Conclusion -- References -- An Efficient Saliency Detection Using Wavelet Fusion -- 1 Introduction -- 1.1 Related Work -- 2 Proposed Methodology -- 2.1 Haar Wavelet Transform for Edge Enhancement and Noise Removal -- 2.2 Edge (Curve) Detection -- 2.3 Convolutional Neural Networks CNN -- 3 Experimental Results -- 4 Conclusion -- References -- Segmentation of Brain Tumor Images Using Morphological Reconstruction -- 1 Introduction -- 2 Literature Review -- 3 Existing System -- 3.1 Pre-processing -- 3.2 Skull Stripping -- 3.3 Segmentation -- 4 Proposed Model -- 4.1 Input -- 4.2 Gray Scaling of Images Using OpenCV -- 4.3 Thresholding -- 4.4 Watershed Algorithm for Image Segmentation -- 4.5 Compute Morphological Operations -- 5 Implementation and Results -- 6 Conclusion -- 7 Future Scope -- References -- Navigation Planning for Efficient Area Covering for Surface Cleaning -- 1 Introduction -- 2 Proposed Method -- 2.1 Deadlock Detection and Escaping -- 2.2 Task of Environment Modeling -- 3 Empirical Analysis -- 3.1 Performance Parameter -- 3.2 Implementation -- 3.3 Tested in an Unknown Environment -- 4 Results -- 5 Conclusion -- References -- Pathfinding Visualizer: A Survey of the State-of-Art -- 1 Introduction -- 1.1 Pathfinding Algorithms and Visualizer Overview -- 2 Literature Review -- 2.1 Overview of Existing Pathfinding Visualizers -- 2.2 Visualizing Pathfinding Algorithms: Importance of Visual AI& -- DS in Learning -- 3 Pathfinding Visualizer -- 3.1 Understanding the Pathfinding Visualizer -- 3.2 Design of the Pathfinding Visualizer -- 3.3 Implementation Details, Including Programming Languages and Tools Used -- 4 Results -- 4.1 Details on the Implementation and Functionality of Algorithms in the Pathfinding Visualizer -- 5 Discussion. 5.1 Discussion on How the Visualizer Contributes to a Better Understanding of Pathfinding Algorithms -- 6 Conclusion -- 7 Future Work -- Bibliography -- A Study on Cyber Security and its Challenges in India -- 1 Introduction -- 2 Literature Review -- 3 Background -- 4 Proposing Guidelines for Cyber Safe India -- 4.1 Need for a Correct Legal Framework in Order to Remove Ambiguities from Data Protection Laws -- 4.2 Changes in Current 2013 Cyber Security Policy -- 5 Need for Cyber Security Education in School -- 6 Current Scenario of Cyber Security in India -- 7 Conclusion -- References -- Implementation of AES Algorithm -- 1 Introduction -- 2 Block Diagram -- 2.1 Encryption Process -- 2.2 FPGA Implementation -- 3 Methodology -- 3.1 Byte Substitution -- 3.2 Shiftrows -- 3.3 MixColumns -- 3.4 Add Round Keys -- 3.5 Inverse Subbytes -- 4 Implementation of AES on FPGA -- 5 Results -- 5.1 AES Encryption and Decryption Xilinx Simulated Results -- 5.2 AES Encryption Results on FPGA -- 6 Conclusion -- References -- Feature Extractor Techniques for Alzheimer's Predictive Model in Brain Imaging -- 1 Introduction -- 2 Related Work -- 3 Experimental Framework -- 4 Observations and Results -- 5 Conclusions and Future Research -- References -- User Preference Recommendation System and Analytics for News Articles -- 1 Introduction -- 2 Overview -- 2.1 Problem Statement -- 2.2 Objectives -- 3 Literature Survey -- 4 Recommendation Systems -- 4.1 Content-Based Filtering -- 4.2 Collaborative Filtering -- 4.3 Hybrid Approach -- 5 Proposed Design -- 5.1 Introduction -- 5.2 Flow of the System -- 6 System Implementation -- 6.1 Data Generation -- 6.2 Model Formation -- 6.3 Visualisation -- 7 Result -- 8 Conclusion and Future Work -- References -- Design and Development of Focus Controller for the 50/80 cm ARIES Schmidt Telescope -- 1 Introduction -- 2 Focus Mechanism. 3 Embedded Controller -- 3.1 Motion Control -- 3.2 Telemetry -- 3.3 Firmware -- 3.4 Operation -- 4 GUI Software -- 4.1 Software Architecture -- 4.2 Setup Dialog Box -- 4.3 Focus Dialog Box -- 5 System Performance -- 6 Conclusion -- References -- Predicting Fishing Effort: Data Collection for Machine Learning Model Using Scientific and Indigenous Method -- 1 Introduction -- 2 Methods -- 2.1 Azure Machine Learning -- 3 Datasets -- 3.1 Area -- 3.2 Types of Data -- 4 Data Pre-processing -- 5 Model Selection and Parameter Tuning -- 6 Result -- 7 Conclusions -- References -- A Secure Data Dynamics and Public Auditing Scheme for Cloud Storage -- 1 Introduction -- 2 Literature Review -- 3 Existing Method -- 4 Proposed Method -- 4.1 Algorithm -- 5 Testing Results -- 6 Conclusion -- References -- Model Design to Analyse Coronary Artery Disease Using Machine Learning Techniques (MDACADMLT) -- 1 Introduction -- 2 Literature Review -- 3 System Model -- 3.1 Logistic Regression -- 3.2 K-Nearest Neighbor -- 3.3 Support Vector Machine -- 3.4 Naïve Bayes -- 3.5 Decision Tree -- 3.6 Random Forest -- 4 Experimental Results -- 5 Conclusion -- References -- Impact of Geo-positioning Information in Limiting Forest Fire Damage -- 1 Overview of the Forest Fire Damage Around the World -- 2 A Rapidly Expanding Area of Research -- 3 Early Detection Forest Fire Systems Design -- 4 Simulation and Results -- 5 Conclusion -- References -- Automatic Music Melody Generation Using LSTM and Markov Chain Model -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Long Short-Term Memory (LSTM) -- 3.2 Markov Chain Model -- 4 Mathematical Model -- 4.1 Long Short-Term Memory (LSTM) -- 4.2 Markov Chain Model -- 5 Results and Discussion -- 5.1 Long Short-Term Memory (LSTM) -- 5.2 Markov Chain Model -- 6 Limitations -- 7 Future Scope -- 8 Conclusion -- References. Federated Learning Approaches to Diverse Machine Learning Model: A Review. |
Record Nr. | UNINA-9910743689003321 |
Choudrie Jyoti | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Nature-inspired computing for smart application design / / edited by Santosh Kumar Das, Thanh-Phong Dao, and Thinagaran Perumal |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (295 pages) : illustrations |
Disciplina | 621.382 |
Collana | Springer Tracts in Nature-Inspired Computing |
Soggetto topico |
Artificial intelligence
Natural computation |
ISBN | 981-336-195-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- List of Reviewers -- Contents -- Editors and Contributors -- Smart Design and Its Applications: Challenges and Techniques -- 1 Introduction -- 2 Some Applications for Smart Design -- 2.1 City and Environment -- 2.2 Intelligent Networking -- 2.3 Security and Management -- 3 Some Techniques for Smart Design -- 4 Conclusions -- References -- City and Environment -- Automatic Generation Control Scheme for Power Quality Improvement of Multi-source Power Generating System with Secondary Controller Optimization Using Parameter-Setting-Free Harmony Search -- 1 Introduction -- 2 Single-Area Multi-source Power System Modeling -- 3 Controller Design -- 4 Proposed Parameter-Setting-Free Harmony Search Algorithm-Tuned PID Controller -- 5 Simulation Results and Discussions -- 6 Conclusion -- References -- Environmental Sound Classification Using Neural Network and Deep Learning -- 1 Introduction -- 1.1 Scope -- 2 Related Work -- 3 Problem Formulation -- 3.1 Segmenting an Audio Signal Into Windows -- 4 Feature Extraction -- 4.1 Features Used for Training the Neural Network -- 5 Designing the Cost Function for Bayesian Regularised Neural Network -- 5.1 Over-Fitting and Regularization of Neural Networks -- 5.2 Bayesian Regularization -- 6 Bayesian Regularised Neural Networks for Urban Sound Noise Classification: A Deep Learning Approach -- 6.1 Deep Neural Network Design -- 6.2 Novel Design: Two Input-Output Neural Network Model -- 6.3 Classification of Multiple Sound Source -- 6.4 Novel Approach: Multi-label Classification Using Bayesian Regularized Fitnet Model and Deep Lerning Approach -- 7 Conclusion and Future Work -- 8 Problems -- 8.1 Feature Extraction -- 8.2 Designing of Optimal Neural Network -- 8.3 Single Label Detection -- 8.4 Multi Label Detection -- References -- Feature Selection Method Using CFO and Rough Sets for Medical Dataset.
1 Introduction -- 2 Preliminaries -- 2.1 Central Force Optimization -- 2.2 Rough Set Theory -- 3 Proposed Algorithm -- 3.1 Preprocessing of Gene Expression Data -- 3.2 Fitness Function -- 4 Experimental Result -- 4.1 Parameter Setting and Datasets -- 4.2 Results and Discussion -- 5 Conclusion -- References -- Fuzzy-Based Optimal Solution for Minimization of Loss of Company Based on Uncertain Environment -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Simulation and Analysis -- 5 Conclusions -- References -- Intelligent Networking -- Impacts of Computational Techniques for Wireless Sensor Networks -- 1 Introduction -- 1.1 WSN: Basic Introduction -- 1.2 WSN: Basic Application Area -- 2 Need of Optimization -- 3 Description of Applied Algorithm -- 3.1 Dragonfly Algorithm -- 3.2 Quasi-opposition Atom Search Optimization (QOASO) Algorithm -- 3.3 Pathfinder Algorithm (PA) -- 3.4 Salp Swarm Algorithm -- 4 Optimization Techniques Applied in WSN -- 4.1 Modeling of Consumption of Energy -- 4.2 Path Loss Model -- 4.3 System Lifetime Model -- 4.4 Coverage Model -- 4.5 Multi-objective Optimization Problem -- 5 Performance Evaluation -- 6 Conclusion -- References -- Efficient Node Deployment Based on Immune-Inspired Computing Algorithm for Wireless Sensor Networks -- 1 Introduction -- 2 Multi-objective Immune Algorithm -- 3 Optimal Deployment -- 3.1 Adjacent Distance -- 3.2 Number of Sensor Nodes -- 4 First Algorithm: Immune-Based Node Deployment Algorithm -- 4.1 Problem Formulation -- 4.2 Immune-Based Node Deployment Algorithm -- 5 Second Algorithm: Centralized Voronoi-Based Immune Deployment Algorithm -- 5.1 Problem Formulation -- 5.2 Centralized Voronoi-Based Immune Deployment Algorithm -- 6 Experimental Results -- 6.1 Binary Model-Based Simulations -- 6.2 Probabilistic Model-Based Experiment -- 7 Conclusion -- References. An Efficient Routing in Wireless Sensor Network: An Application of Grey Wolf Optimization -- 1 Introduction -- 1.1 Motivation for the Study -- 1.2 Contribution of This Study -- 2 Literature Review -- 2.1 Application of Evolutionary Algorithms & -- Swarm Intelligence -- 2.2 Grey Wolf Optimizer-Swarm Intelligence Technique with Hierarchy -- 3 Research Problem -- 3.1 Problem Statement -- 3.2 Model Formulation -- 4 Results -- 4.1 Experimental Design -- 4.2 Computational Results: -- 5 Solution Approach -- 5.1 Grey Wolf Optimization -- 5.2 Aspects of Grey Wolf Optimization -- 5.3 Modified Grey Wolf Optimization -- 5.4 Results Obtained -- 6 Conclusion -- References -- Coverage Optimization using Nature-Inspired Algorithm for Directional Sensor Networks -- 1 Introduction -- 2 Directional Sensor Network -- 2.1 Directional Detecting Model -- 2.2 Coverage Rate for Sensing Adjustment -- 3 Coverage Issues in DSN -- 3.1 Area Coverage -- 3.2 Target Coverage -- 3.3 Barrier Coverage -- 4 Coverage Optimization -- 4.1 Particle Swarm Optimization (PSO) Algorithm for Area Coverage Issue -- 4.2 Memetic Algorithm for Target Coverage Issue -- 5 Conclusion -- References -- Security and Management -- Flower Pollination Optimization-Based Security Enhancement Technique for Wireless Sensor Network -- 1 Introduction -- 2 Related Work -- 3 Cryptography in WSNs -- 4 Selection of Algorithms -- 5 Key Management Schemes -- 6 Node Deployment in WSN -- 7 Flower Pollination Algorithm -- 8 Result Analysis -- 9 Conclusion -- References -- Fuzzy Quadratic Programming Based Conflicting Strategy Management Technique for Company -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 4 Simulation and Analysis -- 5 Conclusions -- References -- A Novel Multilevel Classifier Hybrid Model for Intrusion Detection Using Machine Learning -- 1 Introduction -- 2 Related Work. 3 Theoretic Aspects of Techniques -- 3.1 Particle Swarm Optimization Techniques -- 3.2 Instance-Based Learning on K (IBK) -- 3.3 Random Tree -- 3.4 KDD Cup'99 Dataset -- 4 Proposed Single-Level Hybrid Intrusion Detection Model -- 4.1 A Multilevel Hybrid Classifier IDS Model -- 5 Experimental Results and Discussion -- 6 Conclusions -- References -- Maintaining Manpower in Technical College Using Fusion of Quadratic Programming and Fuzzy Logic -- 1 Introduction -- 2 Literature Review -- 3 Preliminaries -- 3.1 Quadratic Programming -- 3.2 Fuzzy Logic -- 4 Proposed Method -- 4.1 Preliminary Assumption -- 4.2 Mathematical Modelling -- 5 Simulation and Analysis -- 6 Conclusions -- References. |
Record Nr. | UNINA-9910768478703321 |
Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|