Proceedings of 4th International Conference on Frontiers in Computing and Systems : COMSYS 2023, Volume 1 |
Autore | Kole Dipak Kumar |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2024 |
Descrizione fisica | 1 online resource (728 pages) |
Altri autori (Persone) |
Roy ChowdhuryShubhajit
BasuSubhadip PlewczynskiDariusz BhattacharjeeDebotosh |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 9789819726110 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Artificial Intelligence, Machine Learning and Data Science -- AI Based Criminal Detection and Recognition System for Public Safety and Security using novel CriminalNet-228 -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Anomaly Detection Module -- 3.2 Face Detection Module -- 3.3 Face Recognition Module -- 4 Evaluation Results -- 4.1 Data Collection -- 4.2 Data Preprocessing -- 4.3 Performance Analysis of Anomaly Detection Model -- 4.4 Performance Analysis of Face Detection Model (mAP Versus Epoch) -- 4.5 Comparative Analysis of Proposed CrimeNet-228 Against State-of-the-Art Techniques -- 5 Conclusion -- References -- A Multilayer Framework for Data-Driven Student Modeling -- 1 Introduction -- 2 Background -- 3 Methodology and Implementation -- 3.1 Proposed Framework -- 3.2 Data Description -- 3.3 Data Collection and Pre-processing -- 3.4 Data Visualization -- 3.5 Proposed Approach -- 3.6 Feature Selection -- 3.7 Regression for student performance analysis -- 3.8 Model Evaluation -- 4 Discussion -- 5 Conclusion and Future Work -- References -- Machine Learning-Based Early Epilepsy Diagnosis with Secure EEG Data Sharing Using Blockchain -- 1 Introduction -- 1.1 Electroencephalogram (EEG) -- 1.2 Event-Related Potentials (ERPs) -- 1.3 InterPlanetary File System (IPFS) -- 2 Literature Review -- 2.1 EEG Data Analysis in Epilepsy Diagnosis -- 2.2 Challenges in EEG Data Usage and Privacy Concerns -- 2.3 Blockchain Technology in Healthcare -- 2.4 Blockchain for Secure EEG Data Sharing -- 2.5 Gaps in the Literature -- 3 Methodology -- 3.1 Data Recording -- 3.2 Data Preprocessing -- 3.3 Exploratory Data Analysis -- 3.4 Train Test Split -- 3.5 Feature Scaling -- 3.6 Model Selection and Training -- 4 Blockchain Integration -- 4.1 IPFS usage -- 4.2 Solidity and Smart Contracts.
5 Discussion -- 5.1 Implications for Early Epilepsy Diagnosis and Treatment -- 5.2 Limitations of the Study -- 6 Future Work -- 6.1 Exploring Private Blockchain Networks -- 6.2 Validation and Clinical Trials -- 6.3 Scalability and Integration -- References -- Application of Different Decision Tree Classifier for Diabetes Prediction: A Machine Learning Approach -- 1 Introduction -- 2 Related Work -- 3 Dataset Description -- 4 Experiment Implementation -- 4.1 ID3 -- 4.2 C4.5 -- 4.3 CART -- 4.4 CHAID -- 4.5 MARS -- 5 Result and Analysis -- 6 Conclusion -- References -- Exploring Electric Vehicle Adoption Research Through Bibliometric Analysis and Visualization -- 1 Introduction -- 2 Methodology -- 2.1 Data Collection and Source -- 2.2 Analysis Techniques Deployed -- 3 EVA Publications' Topography -- 3.1 Trends in Electric Vehicle Adoption Publications -- 3.2 Publication of the EVA Research Year by Year -- 3.3 Subject-Specific EVA Publications -- 3.4 Top 10 EVA Authors -- 3.5 Co-citation Analysis -- 3.6 Bibliographic Coupling -- 3.7 Emerging Research Frontiers in EVA -- 4 Conclusion, Constraints, and Future Research -- References -- Optimizing Solar Power Distribution in Microgrids to Reduce Energy Waste -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Optimization Based on Forecasting -- 3.2 Solar Power Optimal Distribution -- 4 Experimental Setup -- 4.1 Data Generation -- 4.2 Experimental Procedure -- 4.3 Evaluation Metrics -- 5 Simulation Results -- 5.1 Simulation 1 -- 5.2 Simulation 2 -- 6 Discussion -- 6.1 Impact of Optimization-Based Distribution -- 6.2 Effect of Accuracy of Forecasting Model -- 7 Conclusion and Future Work -- References -- GPA: Uni-directional GRU-Based Traffic Prediction Model for Minimizing Air Pollution -- 1 Introduction -- 2 Related Works -- 3 Problem Statement and System Model. 3.1 Problem Statement -- 3.2 System Model -- 4 Time-Series Big Dataset and DL-Based GRU Methodology -- 4.1 Formation of the Time-Series Big Dataset -- 4.2 Gated Recurrent Unit (GRU) Model -- 5 Proposed Methodology -- 5.1 GPA Model -- 6 Experimental Results -- 6.1 Model Evaluation Metric -- 6.2 Model Evaluation and Discussion -- 6.3 Comparison Result of Our the Proposed Model -- 7 Conclusion and Future Work -- References -- A Real-Time Framework for Automatic Sarcasm Detection Using Proposed Tensor-DNN-50 Algorithm -- 1 Introduction -- 1.1 Contribution -- 2 Related Works -- 3 Automatic Sarcasm Detection Using Deep Learning -- 3.1 Data Acquisition -- 3.2 Data Processing -- 3.3 Data Analytics-Prediction -- 3.4 Data Visualization -- 4 Evaluation Results -- 4.1 Two Class Accuracy -- 4.2 Four Class Accuracy -- 4.3 Seven Class Accuracy -- 4.4 Comparative Analysis of TDNN with att-RNN, EANN, and SVM -- 4.5 Overhead/Penalty -- 5 Conclusion -- References -- Unveiling the Art of Music Generation with LSTM -- 1 Introduction -- 2 Background -- 2.1 Elements of Music -- 2.2 Visualizing Music Data -- 3 Related Work -- 4 Implementation Details -- 4.1 Dataset -- 4.2 Data Pre-processing -- 4.3 Music Generation Using LSTM Network -- 5 Simulation Results and Comparison -- 6 Conclusion -- References -- Few-Shot Learning with Fine-Tuned Language Model for Suicidal Text Detection -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology -- 3.1 Data -- 4 Results and Discussion -- 4.1 Exploring the Dataset -- 4.2 Classification of Suicidal Text -- 5 Conclusions -- References -- A Comparative Analysis of Feature Selection Approaches for Sensor-Based Human Activity Recognition -- 1 Introduction -- 2 Machine Learning Framework for HAR -- 3 Feature Selection Taxonomy from HAR Perspectives -- 4 Survey of Feature Selection Approaches for HAR. 5 Experimental Results and Discussions -- 5.1 Experiments on WISDM Dataset -- 5.2 Experiments on UCIHAR Dataset -- 6 Conclusion -- References -- GuideBP: Guided Backpropagation in Multi-output Neural Networks by Channeling Gradients Through Weaker Logits -- 1 Introduction -- 2 Multi-objective Optimizations in CNNs -- 2.1 Ensemble of Multiple Instances of a CNN -- 2.2 Using Auxiliary Classifiers to Facilitate Gradient Propagation -- 2.3 Multi-scale Region Extraction from Feature Space -- 2.4 Multi-column Networks Operating on Different Regions of the Input -- 3 Guiding Backpropagation Through Weaker Pathways -- 3.1 Computing Weakness of Predictions -- 3.2 Building Logits with Most Uncertain Pathways -- 3.3 Inference -- 3.4 Understanding the Intuition -- 4 Applications -- 4.1 Logits from Multiple Instances of a Model (M1) -- 4.2 Logits from Different Layers of a Model (M2) -- 4.3 Logits from Feature Subspace (M3) -- 4.4 Logits from Input Subspace (M4) -- 5 Results and Discussions -- 5.1 Dataset Descriptions -- 5.2 Experimental Results -- 5.3 Observations -- 6 Conclusion -- References -- A Study on Users Sentiment from Twitter Data and Stock Market During Russia-Ukraine War -- 1 Introduction -- 2 Literature Review -- 3 Datasets -- 4 Methodology -- 4.1 Data Preprocessing -- 4.2 Feature Extraction -- 5 Experimental Evaluation -- 5.1 Result and Analysis -- 5.2 #Sensex -- 5.3 #Nifty_50 -- 6 Conclusion and Future Work -- References -- Illegitimate Comment Filtration Method for Social Media Applications Using Logistic Regression -- 1 Introduction -- 2 Literature Survey -- 2.1 NLP and Machine Learning Techniques for Detecting Insulting Comments on Social Networking Platforms -- 2.2 Offensive Language Detection in Social Media -- 2.3 Detection of Cyber-Aggressive Comments on Social Media Networks: A Machine Learning and Text Mining Approach. 2.4 Detecting Offensiveness in Social Network Comments -- 2.5 Analysis of Foul Language Usage in Social Media Text Conversation -- 2.6 Filtering Relevant Comments in Social Media Using Deep Learning -- 2.7 Analysis of Common YouTube Comment Spam Filtering Techniques -- 2.8 Online Hate Classifier for Multiple Social Media Platforms -- 2.9 Detection and Moderation of Detrimental Content on Social Media Platforms -- 2.10 Bi-normal Separation Feature Scaling: An Improved Representation Over TF-IDF for SVM Text Classification -- 2.11 Text Classification Based on Improved TF-IDF Algorithm -- 2.12 Use of TF-IDF to Examine the Relevance of Words to Documents -- 2.13 Comparative Analysis of Logistic Regression, Random Forest and KNN Models for the Text Classification -- 2.14 A Scikit-Based Python Environment for Performing Multi-label Classification -- 2.15 Performance Analysis of Machine Learning and Deep Learning Models for Text Classification -- 3 Methodology -- 3.1 Data Pre-processing -- 3.2 TF-IDF Vectoriser -- 3.3 Logistic Regression Model -- 3.4 One Versus Rest Classifier -- 3.5 Saving the Model -- 3.6 Model Performance and Evaluation -- 3.7 Comment Classification -- 4 Implementation -- 5 Results and Discussion -- 6 Conclusion -- 7 Future Scope and Improvements -- References -- Unsupervised MTS Anomaly Detection with Variational Autoencoders -- 1 Introduction -- 2 Background -- 2.1 Autoencoder -- 3 Related Works -- 4 Methodology -- 4.1 Datasets -- 4.2 Evaluation Metrics -- 4.3 InnoVAE -- 5 Results and Discussion -- 6 Conclusions -- References -- SHAPRFs: SHapley Additive eXplanation-Based Random Forests Algorithm for Classification Problems -- 1 Introduction -- 2 Literature Review -- 3 Proposed Algorithm -- 3.1 Finding Feature Significance Using SHAP Value -- 3.2 Construction of DTs -- 4 Experimental Findings -- 4.1 Findings Validation -- 5 Conclusion. References. |
Record Nr. | UNINA-9910869171503321 |
Kole Dipak Kumar | ||
Singapore : , : Springer Singapore Pte. Limited, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of 4th International Conference on Frontiers in Computing and Systems : COMSYS 2023, Volume 2 |
Autore | Kole Dipak Kumar |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2024 |
Descrizione fisica | 1 online resource (694 pages) |
Altri autori (Persone) |
Roy ChowdhuryShubhajit
BasuSubhadip PlewczynskiDariusz BhattacharjeeDebotosh |
Collana | Lecture Notes in Networks and Systems Series |
ISBN |
9789819726141
9789819726134 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Communication Networks, Security, Cloud Computing and IoT -- An Optimal Edge Server Placement Algorithm Based on Glowworm Swarm Optimization Technique -- 1 Introduction -- 2 GSO-Based Edge Server Placement -- 2.1 System Model -- 2.2 Edge Server Placement Algorithm -- 3 Performance Analysis -- 4 Conclusion -- References -- A 6G-Enabled Edge-Assisted Internet of Drone Things Ecosystem for Fire Detection -- 1 Introduction -- 2 Related Research -- 3 Proposed Methodology -- 3.1 The Layered Architecture -- 3.2 Intelligent Detection Modeling -- 4 Results Analysis -- 4.1 Performance Analysis of the IoDT Network -- 4.2 Prediction Results -- 5 Conclusions -- References -- An Automated Secure Smart-Contract Driven KYC Solution -- 1 Introduction -- 1.1 Know-Your-Customer (KYC) -- 1.2 Hyperledger Fabric -- 1.3 Text Extraction Using Machine Learning Technique -- 1.4 Motivation and Contribution -- 2 Related Work -- 3 System Model -- 3.1 Hyperledger Fabric Network -- 3.2 Machine Learning-Based Text Extraction Model -- 4 Flow of a KYC Use Case -- 4.1 Inside the Machine Learning Model -- 4.2 Inside the HLF Network -- 5 KYC Chaincode Methods -- 5.1 OnboardKYC -- 5.2 UpdateKYC -- 5.3 GetKYCData -- 5.4 ExistsKYC -- 6 Implementation -- 6.1 Software Specifications -- 6.2 Hardware Specifications -- 6.3 Experiment Configuration -- 7 Results -- 7.1 Text Extraction Using CRAFT -- 7.2 Onboarding KYC of a New Customer into Blockchain -- 7.3 Updating Record of an Existing Customer -- 7.4 Get/Query KYC Record of a Customer -- 7.5 Operational Cost -- 7.6 Resistant to Impersonation Attacks -- 8 Conclusion and Future Work -- References -- Enhancing popSAD: A New Approach to Shilling Attack Detection in Collaborative Recommenders -- 1 Introduction -- 2 Preliminaries -- 2.1 Attack Model -- 2.2 Attack Types.
3 Related Work -- 4 Proposed Approach -- 5 Experimental Evaluation -- 5.1 Dataset and Experimental Setup -- 5.2 Performance Metrics -- 5.3 Results and Discussion -- 6 Conclusion and Future Work -- References -- Coverless Steganography: A Comprehensive Study on Concealing Data Without a Cover Medium -- 1 Introduction -- 2 Literature Review -- 2.1 Comparisons of Existing Methodology -- 3 Conclusion -- References -- IRS-Assisted Wireless Systems: Phase Setting and BER Analysis -- 1 Introduction -- 1.1 Related Work -- 1.2 Contributions -- 2 System Model -- 3 Proposed Phase Optimization Methods -- 3.1 Maximum Energy-Path (MEP) Method -- 3.2 Mean Phase Shift (MPS) Method -- 3.3 Weighted Phase Shift (WPS) Method -- 4 Results and Discussion -- 5 Conclusion -- References -- Secured Authentication Scheme for E-Healthcare in SIoT Using ECC and Improved Hash Function -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions -- 1.3 Organization -- 2 Related Works -- 3 Problem Statement -- 4 Proposed System -- 4.1 Initialization Step -- 4.2 Registration Step -- 4.3 Login Step and Authentication Step -- 4.4 Password Change Phase -- 5 Results -- 6 Conclusion and Future Work -- References -- Securing Social Internet of Things: Intrusion Detection Models in Collaborative Edge Computing -- 1 Introduction -- 1.1 Motivation -- 1.2 Problem Statement -- 1.3 Objectives of the Study -- 2 Related Work -- 2.1 Collaborative Edge Computing in SIoT -- 2.2 Intrusion Detection Techniques in SIoT -- 2.3 Limitations of Existing Approaches -- 3 Methodology -- 3.1 Feature Extraction and Intrusion Detection Models -- 3.2 Dataset Description -- 4 Experimental Evaluation -- 4.1 Model Experimental Setup -- 4.2 Performance Metrics -- 4.3 Results and Analysis -- 4.4 Comparative Analysis of Model Performance -- 5 Conclusion and Future Work -- References. Anomaly Detection-Based Resource Autoscaling Mechanism for Fog Computing -- 1 Introduction -- 1.1 Motivation -- 1.2 Contributions -- 1.3 Paper Organization -- 2 Related Works -- 3 Problem Statement -- 4 Proposed System -- 5 Experimental Results -- 6 Conclusion -- References -- On Coverage and Connectivity with Reduced Sensing Redundancy Based on Genetic Algorithm -- 1 Introduction -- 2 Related Works -- 3 System Model and Assumption -- 3.1 Coverage Model -- 3.2 Communication Model -- 3.3 Energy Model -- 4 Mathematical Formulation of the Problem -- 5 Proposed Algorithm -- 5.1 Chromosome Representation -- 5.2 Fitness Function -- 6 Experimentation -- 6.1 Experimental Setup -- 6.2 Results and Analysis -- 7 Conclusions and Future Works -- References -- Trust Management Model for Service Delegation in SIoT -- 1 Introduction -- 1.1 Contribution -- 1.2 Paper Organization -- 2 Related Works -- 3 Proposed System -- 3.1 Problem Statement and Objectives -- 3.2 Assumptions and Notations -- 3.3 Trust Management Model -- 3.4 Delegation of Service to More Reliable SP -- 4 Experimental Results and Discussion -- 5 Motivation and Future Directions -- 6 Conclusion -- References -- A Survey on Wireless Sensor Network Routing Performance Optimizing and Security Techniques -- 1 Introduction -- 1.1 WSN -- 2 Literature Review -- 3 Comparative Analysis of Routing Protocol in WSN -- 4 Comparative Analysis of Routing Protocol in WSN Methods Used -- 4.1 Location-Based Routing Protocols (LBRP) -- 4.2 Hierarchical-Based Routing Protocols -- 5 Conclusion -- References -- Parallel Communicating One-Way Reversible Finite Automata System -- 1 Introduction -- 2 Basic Terminology -- 2.1 One-Way Reversible Finite Automata -- 2.2 Parallel Communicating One-Way Reversible Finite Automata System -- 3 Computational Complexity of Parallel Communicating One-Way Reversible Finite Automata System. 4 Conclusion -- References -- Honeypot Deception: A Clever Approach of Web Intrusion Detection and Prevention -- 1 Introduction -- 2 Preliminaries -- 2.1 Honeypot -- 2.2 Web Attack -- 3 Literature Survey -- 4 Proposed Method of Web Intrusion Detection and Prevention Using Honeypot -- 4.1 Honeypot 1.0 -- 4.2 Honeypot 2.0 -- 4.3 Honeypot 3.0 -- 5 Experimental Results and Analysis of the Proposed Honeypot Systems -- 5.1 Honeypot 1.0 -- 5.2 Honeypot 2.0 -- 5.3 Honeypot 3.0 -- 6 Conclusion -- References -- Designing an Optimal Objective Function for Performance Optimization of Mobile Ad-Hoc Networks -- 1 Introduction -- 2 Objective Function Design Strategy -- 3 Challenges of Designing Objective Function -- 4 Methodology -- 5 Results and Discussion -- 6 Conclusion -- References -- A Service Discovery Approach for IoT-Based Application -- 1 Introduction -- 2 Related Work -- 3 Scope of the Work -- 4 Problem Formulation -- 5 Solution Approach -- 5.1 Algorithm I -- 5.2 Algorithm II -- 6 Implementation -- 7 Result -- 7.1 Result: Scenario I -- 7.2 Result: Scenario II -- 7.3 Result: Scenario III -- 8 Conclusion -- References -- Maatran: Revolutionizing Maternal Care Through Remote Monitoring and Risk Prediction -- 1 Introduction -- 2 Literature Review -- 3 Hardware Modules -- 4 Methodology -- 4.1 Hardware -- 4.2 Software -- 4.3 Machine Learning Model -- 5 Results and Discussion -- 5.1 Performance Evaluation of ML Models -- 5.2 Software and Hardware Performance -- 6 Conclusion -- References -- Enhancing the Cryptography Security of Message Communication by Modified Secure IDEA Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Generating an nnth-Order Quasi-Group -- 3.2 Generating the Master Key -- 3.3 Generating the Keys -- 3.4 Regenerating the Keys -- 3.5 Encryption and Decryption -- 4 Results -- 5 Discussion -- 6 Conclusion. References -- Attackers Have Prior Beliefs: Comprehending Cognitive Aspects of Confirmation Bias on Adversarial Decisions -- 1 Introduction -- 2 Deception Game -- 3 Methods -- 3.1 Experiment Design -- 3.2 Stimuli -- 3.3 Participants -- 3.4 Procedure -- 3.5 Results -- 4 IBL Model -- 4.1 Calibration of Model Parameters -- 4.2 Model Results -- 5 Discussion and Conclusion -- References -- Privacy Preservation of Insurance Data Sharing Across Permissioned Blockchains -- 1 Introduction -- 1.1 Motivation -- 1.2 Paper Organization -- 2 Preliminaries -- 2.1 Hyperledger Fabric -- 2.2 Zero-Knowledge Proof -- 3 Current Issue in Isomorphic HLF Platform -- 3.1 Workflow of Insurance Claim -- 3.2 Fake Claim Scenario -- 4 System Model -- 4.1 User Registration -- 4.2 Insurance Claim -- 5 Experimental Results and Analysis -- 5.1 Implementation -- 5.2 Security Analysis -- 6 Conclusion and Future Scope -- References -- Survey on Cyber-Security for Healthcare System -- 1 Introduction -- 2 Background (Common Terms and Concept) -- 2.1 Implantable Medical Devices (IMD) -- 2.2 Active Implantable Device -- 2.3 Body Area Network (BAN) -- 3 Literature Survey -- 3.1 Methods -- 3.2 Analysis of Existing Work and Framing of the Problem -- 4 Solution Space -- 5 Conclusion -- References -- Image, Video and Signal Processing Track -- Enhancing Driver Safety and Experience: Real-Time Facial Expression Detection in Smart Vehicles with Vision Systems -- 1 Introduction -- 2 Literature Survey -- 2.1 Eye Aspect Ratio (EAR) -- 2.2 Physical Approach -- 2.3 Physiological Approach -- 2.4 Steering Wheel Data -- 2.5 Support Vector Machines (SVM) -- 2.6 Artificial Neural Networks (ANN) -- 3 Proposed System -- 3.1 The Dataset -- 3.2 System Architecture -- 3.3 Face Detection -- 3.4 Convolutional Neural Networks Classification Model -- 3.5 Predicting the Photos Generated by the Camera -- 4 Results. 5 Conclusion. |
Record Nr. | UNINA-9910872192703321 |
Kole Dipak Kumar | ||
Singapore : , : Springer Singapore Pte. Limited, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of International Conference on Frontiers in Computing and Systems : COMSYS 2022 / / edited by Ram Sarkar, Sujata Pal, Subhadip Basu, Dariusz Plewczynski, Debotosh Bhattacharjee |
Autore | Sarkar Ram |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (558 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
PalSujata
BasuSubhadip PlewczynskiDariusz BhattacharjeeDebotosh |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Telecommunication Bioinformatics Data protection Computational Intelligence Communications Engineering, Networks Computational and Systems Biology Data and Information Security |
ISBN | 981-9926-80-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Section 1: Machine Learning and Applications -- Chapter 1. AVENet:Attention based VGG 16 with ELM for obscene image classification -- Chapter 2. Analyzing Market Dynamics of Agricultural Commodities: A Case Study based on Cotton -- Chapter 3. Feature Selection for Nepali Part-Of-Speech Tagging in a Conditional Random Fields based System -- Chapter 4. Design and Development of a ML-based Safety-Critical Fire Detection System -- Chapter 5. Compressed Image Super-Resolution using Pre-trained Model Assistance -- Chapter 6. Optimization of Character Classes in Devanagari Ancient Manuscripts and Dataset Generation -- Chapter 7. Deep Learning based Classification of Rice Varieties from Seed Coat Images -- Chapter 8. Leaf Based Plant Disease Detection Using Intelligent Techniques – A Comprehensive Survey -- Chapter 9. Bengali Document Retrieval Using Model Combination -- Chapter 10. Deep Neural Networks Fused with Textures for Image Classification -- Chapter 11. Real Time Prediction of In-Hospital Outcomes using a Multilayer Perceptron deployed in a Web-based Application -- Chapter 12. Automated analysis of Connections in Model Diagrams -- Chapter 13. No-reference Image Quality Assessment using Meta-Learning -- Section 2: Security -- Chapter 14. Cryptanalysis of Markle Hellman Knapsack Cipher using Cuckoo Search Algorithm.-Chapter 15. Generating a Suitable Hash Function using Sudoku for Blockchain Network. etc. |
Record Nr. | UNINA-9910736021503321 |
Sarkar Ram | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|