top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Proceedings of 4th International Conference on Frontiers in Computing and Systems : COMSYS 2023, Volume 1
Proceedings of 4th International Conference on Frontiers in Computing and Systems : COMSYS 2023, Volume 1
Autore Kole Dipak Kumar
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2024
Descrizione fisica 1 online resource (728 pages)
Altri autori (Persone) Roy ChowdhuryShubhajit
BasuSubhadip
PlewczynskiDariusz
BhattacharjeeDebotosh
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819726110
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Artificial Intelligence, Machine Learning and Data Science -- AI Based Criminal Detection and Recognition System for Public Safety and Security using novel CriminalNet-228 -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Anomaly Detection Module -- 3.2 Face Detection Module -- 3.3 Face Recognition Module -- 4 Evaluation Results -- 4.1 Data Collection -- 4.2 Data Preprocessing -- 4.3 Performance Analysis of Anomaly Detection Model -- 4.4 Performance Analysis of Face Detection Model (mAP Versus Epoch) -- 4.5 Comparative Analysis of Proposed CrimeNet-228 Against State-of-the-Art Techniques -- 5 Conclusion -- References -- A Multilayer Framework for Data-Driven Student Modeling -- 1 Introduction -- 2 Background -- 3 Methodology and Implementation -- 3.1 Proposed Framework -- 3.2 Data Description -- 3.3 Data Collection and Pre-processing -- 3.4 Data Visualization -- 3.5 Proposed Approach -- 3.6 Feature Selection -- 3.7 Regression for student performance analysis -- 3.8 Model Evaluation -- 4 Discussion -- 5 Conclusion and Future Work -- References -- Machine Learning-Based Early Epilepsy Diagnosis with Secure EEG Data Sharing Using Blockchain -- 1 Introduction -- 1.1 Electroencephalogram (EEG) -- 1.2 Event-Related Potentials (ERPs) -- 1.3 InterPlanetary File System (IPFS) -- 2 Literature Review -- 2.1 EEG Data Analysis in Epilepsy Diagnosis -- 2.2 Challenges in EEG Data Usage and Privacy Concerns -- 2.3 Blockchain Technology in Healthcare -- 2.4 Blockchain for Secure EEG Data Sharing -- 2.5 Gaps in the Literature -- 3 Methodology -- 3.1 Data Recording -- 3.2 Data Preprocessing -- 3.3 Exploratory Data Analysis -- 3.4 Train Test Split -- 3.5 Feature Scaling -- 3.6 Model Selection and Training -- 4 Blockchain Integration -- 4.1 IPFS usage -- 4.2 Solidity and Smart Contracts.
5 Discussion -- 5.1 Implications for Early Epilepsy Diagnosis and Treatment -- 5.2 Limitations of the Study -- 6 Future Work -- 6.1 Exploring Private Blockchain Networks -- 6.2 Validation and Clinical Trials -- 6.3 Scalability and Integration -- References -- Application of Different Decision Tree Classifier for Diabetes Prediction: A Machine Learning Approach -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Experiment Implementation -- 4.1 ID3 -- 4.2 C4.5 -- 4.3 CART -- 4.4 CHAID -- 4.5 MARS -- 5 Result and Analysis -- 6 Conclusion -- References -- Exploring Electric Vehicle Adoption Research Through Bibliometric Analysis and Visualization -- 1 Introduction -- 2 Methodology -- 2.1 Data Collection and Source -- 2.2 Analysis Techniques Deployed -- 3 EVA Publications' Topography -- 3.1 Trends in Electric Vehicle Adoption Publications -- 3.2 Publication of the EVA Research Year by Year -- 3.3 Subject-Specific EVA Publications -- 3.4 Top 10 EVA Authors -- 3.5 Co-citation Analysis -- 3.6 Bibliographic Coupling -- 3.7 Emerging Research Frontiers in EVA -- 4 Conclusion, Constraints, and Future Research -- References -- Optimizing Solar Power Distribution in Microgrids to Reduce Energy Waste -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Optimization Based on Forecasting -- 3.2 Solar Power Optimal Distribution -- 4 Experimental Setup -- 4.1 Data Generation -- 4.2 Experimental Procedure -- 4.3 Evaluation Metrics -- 5 Simulation Results -- 5.1 Simulation 1 -- 5.2 Simulation 2 -- 6 Discussion -- 6.1 Impact of Optimization-Based Distribution -- 6.2 Effect of Accuracy of Forecasting Model -- 7 Conclusion and Future Work -- References -- GPA: Uni-directional GRU-Based Traffic Prediction Model for Minimizing Air Pollution -- 1 Introduction -- 2 Related Works -- 3 Problem Statement and System Model.
3.1 Problem Statement -- 3.2 System Model -- 4 Time-Series Big Dataset and DL-Based GRU Methodology -- 4.1 Formation of the Time-Series Big Dataset -- 4.2 Gated Recurrent Unit (GRU) Model -- 5 Proposed Methodology -- 5.1 GPA Model -- 6 Experimental Results -- 6.1 Model Evaluation Metric -- 6.2 Model Evaluation and Discussion -- 6.3 Comparison Result of Our the Proposed Model -- 7 Conclusion and Future Work -- References -- A Real-Time Framework for Automatic Sarcasm Detection Using Proposed Tensor-DNN-50 Algorithm -- 1 Introduction -- 1.1 Contribution -- 2 Related Works -- 3 Automatic Sarcasm Detection Using Deep Learning -- 3.1 Data Acquisition -- 3.2 Data Processing -- 3.3 Data Analytics-Prediction -- 3.4 Data Visualization -- 4 Evaluation Results -- 4.1 Two Class Accuracy -- 4.2 Four Class Accuracy -- 4.3 Seven Class Accuracy -- 4.4 Comparative Analysis of TDNN with att-RNN, EANN, and SVM -- 4.5 Overhead/Penalty -- 5 Conclusion -- References -- Unveiling the Art of Music Generation with LSTM -- 1 Introduction -- 2 Background -- 2.1 Elements of Music -- 2.2 Visualizing Music Data -- 3 Related Work -- 4 Implementation Details -- 4.1 Dataset -- 4.2 Data Pre-processing -- 4.3 Music Generation Using LSTM Network -- 5 Simulation Results and Comparison -- 6 Conclusion -- References -- Few-Shot Learning with Fine-Tuned Language Model for Suicidal Text Detection -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology -- 3.1 Data -- 4 Results and Discussion -- 4.1 Exploring the Dataset -- 4.2 Classification of Suicidal Text -- 5 Conclusions -- References -- A Comparative Analysis of Feature Selection Approaches for Sensor-Based Human Activity Recognition -- 1 Introduction -- 2 Machine Learning Framework for HAR -- 3 Feature Selection Taxonomy from HAR Perspectives -- 4 Survey of Feature Selection Approaches for HAR.
5 Experimental Results and Discussions -- 5.1 Experiments on WISDM Dataset -- 5.2 Experiments on UCIHAR Dataset -- 6 Conclusion -- References -- GuideBP: Guided Backpropagation in Multi-output Neural Networks by Channeling Gradients Through Weaker Logits -- 1 Introduction -- 2 Multi-objective Optimizations in CNNs -- 2.1 Ensemble of Multiple Instances of a CNN -- 2.2 Using Auxiliary Classifiers to Facilitate Gradient Propagation -- 2.3 Multi-scale Region Extraction from Feature Space -- 2.4 Multi-column Networks Operating on Different Regions of the Input -- 3 Guiding Backpropagation Through Weaker Pathways -- 3.1 Computing Weakness of Predictions -- 3.2 Building Logits with Most Uncertain Pathways -- 3.3 Inference -- 3.4 Understanding the Intuition -- 4 Applications -- 4.1 Logits from Multiple Instances of a Model (M1) -- 4.2 Logits from Different Layers of a Model (M2) -- 4.3 Logits from Feature Subspace (M3) -- 4.4 Logits from Input Subspace (M4) -- 5 Results and Discussions -- 5.1 Dataset Descriptions -- 5.2 Experimental Results -- 5.3 Observations -- 6 Conclusion -- References -- A Study on Users Sentiment from Twitter Data and Stock Market During Russia-Ukraine War -- 1 Introduction -- 2 Literature Review -- 3 Datasets -- 4 Methodology -- 4.1 Data Preprocessing -- 4.2 Feature Extraction -- 5 Experimental Evaluation -- 5.1 Result and Analysis -- 5.2 #Sensex -- 5.3 #Nifty_50 -- 6 Conclusion and Future Work -- References -- Illegitimate Comment Filtration Method for Social Media Applications Using Logistic Regression -- 1 Introduction -- 2 Literature Survey -- 2.1 NLP and Machine Learning Techniques for Detecting Insulting Comments on Social Networking Platforms -- 2.2 Offensive Language Detection in Social Media -- 2.3 Detection of Cyber-Aggressive Comments on Social Media Networks: A Machine Learning and Text Mining Approach.
2.4 Detecting Offensiveness in Social Network Comments -- 2.5 Analysis of Foul Language Usage in Social Media Text Conversation -- 2.6 Filtering Relevant Comments in Social Media Using Deep Learning -- 2.7 Analysis of Common YouTube Comment Spam Filtering Techniques -- 2.8 Online Hate Classifier for Multiple Social Media Platforms -- 2.9 Detection and Moderation of Detrimental Content on Social Media Platforms -- 2.10 Bi-normal Separation Feature Scaling: An Improved Representation Over TF-IDF for SVM Text Classification -- 2.11 Text Classification Based on Improved TF-IDF Algorithm -- 2.12 Use of TF-IDF to Examine the Relevance of Words to Documents -- 2.13 Comparative Analysis of Logistic Regression, Random Forest and KNN Models for the Text Classification -- 2.14 A Scikit-Based Python Environment for Performing Multi-label Classification -- 2.15 Performance Analysis of Machine Learning and Deep Learning Models for Text Classification -- 3 Methodology -- 3.1 Data Pre-processing -- 3.2 TF-IDF Vectoriser -- 3.3 Logistic Regression Model -- 3.4 One Versus Rest Classifier -- 3.5 Saving the Model -- 3.6 Model Performance and Evaluation -- 3.7 Comment Classification -- 4 Implementation -- 5 Results and Discussion -- 6 Conclusion -- 7 Future Scope and Improvements -- References -- Unsupervised MTS Anomaly Detection with Variational Autoencoders -- 1 Introduction -- 2 Background -- 2.1 Autoencoder -- 3 Related Works -- 4 Methodology -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 InnoVAE -- 5 Results and Discussion -- 6 Conclusions -- References -- SHAPRFs: SHapley Additive eXplanation-Based Random Forests Algorithm for Classification Problems -- 1 Introduction -- 2 Literature Review -- 3 Proposed Algorithm -- 3.1 Finding Feature Significance Using SHAP Value -- 3.2 Construction of DTs -- 4 Experimental Findings -- 4.1 Findings Validation -- 5 Conclusion.
References.
Record Nr. UNINA-9910869171503321
Kole Dipak Kumar  
Singapore : , : Springer Singapore Pte. Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of 4th International Conference on Frontiers in Computing and Systems : COMSYS 2023, Volume 2
Proceedings of 4th International Conference on Frontiers in Computing and Systems : COMSYS 2023, Volume 2
Autore Kole Dipak Kumar
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2024
Descrizione fisica 1 online resource (694 pages)
Altri autori (Persone) Roy ChowdhuryShubhajit
BasuSubhadip
PlewczynskiDariusz
BhattacharjeeDebotosh
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819726141
9789819726134
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Communication Networks, Security, Cloud Computing and IoT -- An Optimal Edge Server Placement Algorithm Based on Glowworm Swarm Optimization Technique -- 1 Introduction -- 2 GSO-Based Edge Server Placement -- 2.1 System Model -- 2.2 Edge Server Placement Algorithm -- 3 Performance Analysis -- 4 Conclusion -- References -- A 6G-Enabled Edge-Assisted Internet of Drone Things Ecosystem for Fire Detection -- 1 Introduction -- 2 Related Research -- 3 Proposed Methodology -- 3.1 The Layered Architecture -- 3.2 Intelligent Detection Modeling -- 4 Results Analysis -- 4.1 Performance Analysis of the IoDT Network -- 4.2 Prediction Results -- 5 Conclusions -- References -- An Automated Secure Smart-Contract Driven KYC Solution -- 1 Introduction -- 1.1 Know-Your-Customer (KYC) -- 1.2 Hyperledger Fabric -- 1.3 Text Extraction Using Machine Learning Technique -- 1.4 Motivation and Contribution -- 2 Related Work -- 3 System Model -- 3.1 Hyperledger Fabric Network -- 3.2 Machine Learning-Based Text Extraction Model -- 4 Flow of a KYC Use Case -- 4.1 Inside the Machine Learning Model -- 4.2 Inside the HLF Network -- 5 KYC Chaincode Methods -- 5.1 OnboardKYC -- 5.2 UpdateKYC -- 5.3 GetKYCData -- 5.4 ExistsKYC -- 6 Implementation -- 6.1 Software Specifications -- 6.2 Hardware Specifications -- 6.3 Experiment Configuration -- 7 Results -- 7.1 Text Extraction Using CRAFT -- 7.2 Onboarding KYC of a New Customer into Blockchain -- 7.3 Updating Record of an Existing Customer -- 7.4 Get/Query KYC Record of a Customer -- 7.5 Operational Cost -- 7.6 Resistant to Impersonation Attacks -- 8 Conclusion and Future Work -- References -- Enhancing popSAD: A New Approach to Shilling Attack Detection in Collaborative Recommenders -- 1 Introduction -- 2 Preliminaries -- 2.1 Attack Model -- 2.2 Attack Types.
3 Related Work -- 4 Proposed Approach -- 5 Experimental Evaluation -- 5.1 Dataset and Experimental Setup -- 5.2 Performance Metrics -- 5.3 Results and Discussion -- 6 Conclusion and Future Work -- References -- Coverless Steganography: A Comprehensive Study on Concealing Data Without a Cover Medium -- 1 Introduction -- 2 Literature Review -- 2.1 Comparisons of Existing Methodology -- 3 Conclusion -- References -- IRS-Assisted Wireless Systems: Phase Setting and BER Analysis -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 System Model -- 3 Proposed Phase Optimization Methods -- 3.1 Maximum Energy-Path (MEP) Method -- 3.2 Mean Phase Shift (MPS) Method -- 3.3 Weighted Phase Shift (WPS) Method -- 4 Results and Discussion -- 5 Conclusion -- References -- Secured Authentication Scheme for E-Healthcare in SIoT Using ECC and Improved Hash Function -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions -- 1.3 Organization -- 2 Related Works -- 3 Problem Statement -- 4 Proposed System -- 4.1 Initialization Step -- 4.2 Registration Step -- 4.3 Login Step and Authentication Step -- 4.4 Password Change Phase -- 5 Results -- 6 Conclusion and Future Work -- References -- Securing Social Internet of Things: Intrusion Detection Models in Collaborative Edge Computing -- 1 Introduction -- 1.1 Motivation -- 1.2 Problem Statement -- 1.3 Objectives of the Study -- 2 Related Work -- 2.1 Collaborative Edge Computing in SIoT -- 2.2 Intrusion Detection Techniques in SIoT -- 2.3 Limitations of Existing Approaches -- 3 Methodology -- 3.1 Feature Extraction and Intrusion Detection Models -- 3.2 Dataset Description -- 4 Experimental Evaluation -- 4.1 Model Experimental Setup -- 4.2 Performance Metrics -- 4.3 Results and Analysis -- 4.4 Comparative Analysis of Model Performance -- 5 Conclusion and Future Work -- References.
Anomaly Detection-Based Resource Autoscaling Mechanism for Fog Computing -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions -- 1.3 Paper Organization -- 2 Related Works -- 3 Problem Statement -- 4 Proposed System -- 5 Experimental Results -- 6 Conclusion -- References -- On Coverage and Connectivity with Reduced Sensing Redundancy Based on Genetic Algorithm -- 1 Introduction -- 2 Related Works -- 3 System Model and Assumption -- 3.1 Coverage Model -- 3.2 Communication Model -- 3.3 Energy Model -- 4 Mathematical Formulation of the Problem -- 5 Proposed Algorithm -- 5.1 Chromosome Representation -- 5.2 Fitness Function -- 6 Experimentation -- 6.1 Experimental Setup -- 6.2 Results and Analysis -- 7 Conclusions and Future Works -- References -- Trust Management Model for Service Delegation in SIoT -- 1 Introduction -- 1.1 Contribution -- 1.2 Paper Organization -- 2 Related Works -- 3 Proposed System -- 3.1 Problem Statement and Objectives -- 3.2 Assumptions and Notations -- 3.3 Trust Management Model -- 3.4 Delegation of Service to More Reliable SP -- 4 Experimental Results and Discussion -- 5 Motivation and Future Directions -- 6 Conclusion -- References -- A Survey on Wireless Sensor Network Routing Performance Optimizing and Security Techniques -- 1 Introduction -- 1.1 WSN -- 2 Literature Review -- 3 Comparative Analysis of Routing Protocol in WSN -- 4 Comparative Analysis of Routing Protocol in WSN Methods Used -- 4.1 Location-Based Routing Protocols (LBRP) -- 4.2 Hierarchical-Based Routing Protocols -- 5 Conclusion -- References -- Parallel Communicating One-Way Reversible Finite Automata System -- 1 Introduction -- 2 Basic Terminology -- 2.1 One-Way Reversible Finite Automata -- 2.2 Parallel Communicating One-Way Reversible Finite Automata System -- 3 Computational Complexity of Parallel Communicating One-Way Reversible Finite Automata System.
4 Conclusion -- References -- Honeypot Deception: A Clever Approach of Web Intrusion Detection and Prevention -- 1 Introduction -- 2 Preliminaries -- 2.1 Honeypot -- 2.2 Web Attack -- 3 Literature Survey -- 4 Proposed Method of Web Intrusion Detection and Prevention Using Honeypot -- 4.1 Honeypot 1.0 -- 4.2 Honeypot 2.0 -- 4.3 Honeypot 3.0 -- 5 Experimental Results and Analysis of the Proposed Honeypot Systems -- 5.1 Honeypot 1.0 -- 5.2 Honeypot 2.0 -- 5.3 Honeypot 3.0 -- 6 Conclusion -- References -- Designing an Optimal Objective Function for Performance Optimization of Mobile Ad-Hoc Networks -- 1 Introduction -- 2 Objective Function Design Strategy -- 3 Challenges of Designing Objective Function -- 4 Methodology -- 5 Results and Discussion -- 6 Conclusion -- References -- A Service Discovery Approach for IoT-Based Application -- 1 Introduction -- 2 Related Work -- 3 Scope of the Work -- 4 Problem Formulation -- 5 Solution Approach -- 5.1 Algorithm I -- 5.2 Algorithm II -- 6 Implementation -- 7 Result -- 7.1 Result: Scenario I -- 7.2 Result: Scenario II -- 7.3 Result: Scenario III -- 8 Conclusion -- References -- Maatran: Revolutionizing Maternal Care Through Remote Monitoring and Risk Prediction -- 1 Introduction -- 2 Literature Review -- 3 Hardware Modules -- 4 Methodology -- 4.1 Hardware -- 4.2 Software -- 4.3 Machine Learning Model -- 5 Results and Discussion -- 5.1 Performance Evaluation of ML Models -- 5.2 Software and Hardware Performance -- 6 Conclusion -- References -- Enhancing the Cryptography Security of Message Communication by Modified Secure IDEA Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Generating an nnth-Order Quasi-Group -- 3.2 Generating the Master Key -- 3.3 Generating the Keys -- 3.4 Regenerating the Keys -- 3.5 Encryption and Decryption -- 4 Results -- 5 Discussion -- 6 Conclusion.
References -- Attackers Have Prior Beliefs: Comprehending Cognitive Aspects of Confirmation Bias on Adversarial Decisions -- 1 Introduction -- 2 Deception Game -- 3 Methods -- 3.1 Experiment Design -- 3.2 Stimuli -- 3.3 Participants -- 3.4 Procedure -- 3.5 Results -- 4 IBL Model -- 4.1 Calibration of Model Parameters -- 4.2 Model Results -- 5 Discussion and Conclusion -- References -- Privacy Preservation of Insurance Data Sharing Across Permissioned Blockchains -- 1 Introduction -- 1.1 Motivation -- 1.2 Paper Organization -- 2 Preliminaries -- 2.1 Hyperledger Fabric -- 2.2 Zero-Knowledge Proof -- 3 Current Issue in Isomorphic HLF Platform -- 3.1 Workflow of Insurance Claim -- 3.2 Fake Claim Scenario -- 4 System Model -- 4.1 User Registration -- 4.2 Insurance Claim -- 5 Experimental Results and Analysis -- 5.1 Implementation -- 5.2 Security Analysis -- 6 Conclusion and Future Scope -- References -- Survey on Cyber-Security for Healthcare System -- 1 Introduction -- 2 Background (Common Terms and Concept) -- 2.1 Implantable Medical Devices (IMD) -- 2.2 Active Implantable Device -- 2.3 Body Area Network (BAN) -- 3 Literature Survey -- 3.1 Methods -- 3.2 Analysis of Existing Work and Framing of the Problem -- 4 Solution Space -- 5 Conclusion -- References -- Image, Video and Signal Processing Track -- Enhancing Driver Safety and Experience: Real-Time Facial Expression Detection in Smart Vehicles with Vision Systems -- 1 Introduction -- 2 Literature Survey -- 2.1 Eye Aspect Ratio (EAR) -- 2.2 Physical Approach -- 2.3 Physiological Approach -- 2.4 Steering Wheel Data -- 2.5 Support Vector Machines (SVM) -- 2.6 Artificial Neural Networks (ANN) -- 3 Proposed System -- 3.1 The Dataset -- 3.2 System Architecture -- 3.3 Face Detection -- 3.4 Convolutional Neural Networks Classification Model -- 3.5 Predicting the Photos Generated by the Camera -- 4 Results.
5 Conclusion.
Record Nr. UNINA-9910872192703321
Kole Dipak Kumar  
Singapore : , : Springer Singapore Pte. Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of International Conference on Frontiers in Computing and Systems : COMSYS 2022 / / edited by Ram Sarkar, Sujata Pal, Subhadip Basu, Dariusz Plewczynski, Debotosh Bhattacharjee
Proceedings of International Conference on Frontiers in Computing and Systems : COMSYS 2022 / / edited by Ram Sarkar, Sujata Pal, Subhadip Basu, Dariusz Plewczynski, Debotosh Bhattacharjee
Autore Sarkar Ram
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (558 pages)
Disciplina 006.3
Altri autori (Persone) PalSujata
BasuSubhadip
PlewczynskiDariusz
BhattacharjeeDebotosh
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Telecommunication
Bioinformatics
Data protection
Computational Intelligence
Communications Engineering, Networks
Computational and Systems Biology
Data and Information Security
ISBN 981-9926-80-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Section 1: Machine Learning and Applications -- Chapter 1. AVENet:Attention based VGG 16 with ELM for obscene image classification -- Chapter 2. Analyzing Market Dynamics of Agricultural Commodities: A Case Study based on Cotton -- Chapter 3. Feature Selection for Nepali Part-Of-Speech Tagging in a Conditional Random Fields based System -- Chapter 4. Design and Development of a ML-based Safety-Critical Fire Detection System -- Chapter 5. Compressed Image Super-Resolution using Pre-trained Model Assistance -- Chapter 6. Optimization of Character Classes in Devanagari Ancient Manuscripts and Dataset Generation -- Chapter 7. Deep Learning based Classification of Rice Varieties from Seed Coat Images -- Chapter 8. Leaf Based Plant Disease Detection Using Intelligent Techniques – A Comprehensive Survey -- Chapter 9. Bengali Document Retrieval Using Model Combination -- Chapter 10. Deep Neural Networks Fused with Textures for Image Classification -- Chapter 11. Real Time Prediction of In-Hospital Outcomes using a Multilayer Perceptron deployed in a Web-based Application -- Chapter 12. Automated analysis of Connections in Model Diagrams -- Chapter 13. No-reference Image Quality Assessment using Meta-Learning -- Section 2: Security -- Chapter 14. Cryptanalysis of Markle Hellman Knapsack Cipher using Cuckoo Search Algorithm.-Chapter 15. Generating a Suitable Hash Function using Sudoku for Blockchain Network. etc.
Record Nr. UNINA-9910736021503321
Sarkar Ram  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui