top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Intelligent Systems Design and Applications : Information and Network Security, Volume 3
Intelligent Systems Design and Applications : Information and Network Security, Volume 3
Autore Abraham Ajith
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (497 pages)
Altri autori (Persone) PllanaSabri
HanneThomas
SiarryPatrick
Collana Lecture Notes in Networks and Systems Series
ISBN 9783031646508
9783031646492
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Misdirection Attack in Wireless Sensor Network Using Threshold Method -- 1 Introduction -- 1.1 Generic Security Requirements in a WSN -- 1.2 Types of Attacks in WSN -- 1.3 Misdirection Attack -- 2 Literature Review -- 3 Research Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Blockchain for Data Traceability in the Agricultural Sector -- 1 Introduction -- 2 Related Work -- 3 Blockchain Overview -- 3.1 Blockchain -- 3.2 Ethereum -- 4 Methodology -- 4.1 Choice of the Blockchain -- 4.2 Adaptability to Low Consumption Systems -- 5 Results -- 5.1 Application Development -- 5.2 Implementation -- 6 Disccusion and Future Work -- 6.1 Advantages and Qualities of the Approach -- 6.2 Deficiencies and Future Work -- 7 Conclusion -- References -- Detection of Fake URLs Using Deep LSTM Architecture over Social Media -- 1 Introduction -- 1.1 Structure of URL -- 2 Background and Related Work -- 3 Data Collection -- 4 Fake URL Detection System -- 4.1 Ensemble Methods -- 4.2 Long-Short Term Memory (LSTM) -- 5 Experimental Evaluation -- 5.1 Results -- 6 Conclusion and Future Scope -- References -- Leveraging Blockchain for Secure Water Meter Reading -- 1 Introduction -- 2 Related Works -- 2.1 Blockchain -- 2.2 Blockchain Applications -- 2.3 Blockchain for Water Monitoring -- 3 Method -- 3.1 Application Architecture -- 3.2 Watermeter Reading Application -- 3.3 Blockchain Integration -- 4 Results -- 4.1 Water Meter Reading Process -- 4.2 Application Realization -- 5 Discussion -- 6 Conclusion -- References -- A Hybrid Differential-Evolution-Based Approach to the Sensor Network Localisation Problem -- 1 Introduction -- 2 Related Work -- 3 The Sensor Network Localisation Problem -- 3.1 Formulation as a Least Squares Problem -- 4 Methods -- 5 Numerical Experiments -- 6 Conclusion -- References.
A Review on Physical Abuse Detection Techniques Using Video Surveillance Systems -- 1 Introduction -- 2 Literature Review -- 3 Conclusion -- References -- Detection of Suspicious Activities at Hypervisor in Cloud Computing: A Brief Study -- 1 Introduction -- 2 Literature Survey -- 2.1 Hypervisor Attacks and Defenses -- 2.2 Security Analysis -- 3 Conclusion -- References -- A Simple Genetic Algorithm for the Maximum Min-Sum Dispersion Problem (Max-MinSum DP) and New Node Similarity-Based Variants -- 1 Introduction -- 2 Problem Formulation and Related Work -- 3 DP-sGA - The Proposed Genetic Algorithm -- 4 Numerical Experiments -- 4.1 Benchmarks -- 4.2 Parameter Tuning -- 4.3 Comparisons with Other Methods -- 4.4 Node Similarity-Based Dispersion Problem -- 5 Conclusion -- References -- Towards Analysis of Threat Modeling of Software Systems According to Key Criteria -- 1 Introduction -- 2 Threat Modeling -- 2.1 Threat Modeling Process -- 2.2 Threat Models - STRIDE, PASTA and DREAD -- 3 Analysis of Threat Modeling According to Key Criteria -- 4 Conclusion and Future Work -- References -- Deepfake Detection System for Facial Evidence Verification in Criminal Justice and Its Legal and Ethical Implications -- 1 Introduction -- 2 Related Work -- 2.1 Threat of Deepfake to Facial Evidence Verification Techniques -- 2.2 Previous Studies on Deepfake Detection Techniques -- 2.3 Existing Methods for Facial Evidence Verification in Criminal Justice -- 2.4 Comparison of Existing Methods with the Proposed System -- 3 Implementation Method -- 3.1 Dataset Creation, Feature Extraction, and Representation -- 3.2 System Prototype -- 4 Experiment -- 5 Discussion -- 5.1 Important Findings on the Proposed System's Method -- 5.2 Legal Challenges and Implications of the Proposed System -- 5.3 Ethical Considerations in the Usage of the Proposed System -- 6 Conclusions.
References -- A Methodology to Evaluate the Security of Block Ciphers Against Neurocryptanalytic Attacks -- 1 Introduction -- 2 Cryptography and Cryptanalysis -- 3 Block Ciphers -- 4 Methodology -- 4.1 Data: Source and Handling -- 4.2 Neural Network Settings -- 4.3 Evaluation Metrics -- 5 Experiments and Analysis -- 5.1 Comparison Among Database Sizes -- 5.2 Comparison Among Key Sizes -- 6 Conclusions -- References -- Enhancing Positivity on Social Media: A Review of Offensive Comment Classification -- 1 Introduction -- 2 Offensive Language Review -- 2.1 Forms of Offensive Language -- 2.2 Data Collection -- 2.3 Data Sources -- 2.4 Text Normalization -- 3 Related Work -- 3.1 Features Extraction Technique -- 3.2 Machine Learning-Based Approaches -- 3.3 Deep Learning-Based Approaches -- 3.4 Transformer Model-Based Approaches -- 4 Discussion -- 5 Conclusion -- References -- Object Recognition and Tracking for Enhanced Security Using Computer Vision -- 1 Introduction -- 2 Background Details and Related Work -- 3 Proposed Approach -- 4 Implementation of the System -- 5 Conclusions -- References -- Improving the Cryptocurrency Price Prediction Using Deep Learning -- 1 Introduction -- 2 Related Works -- 3 Exploring Cryptocurrencies -- 4 Proposed Methodology -- 4.1 Data Collection -- 4.2 Data Preprocessing -- 4.3 Feature Selection -- 4.4 Data Splitting -- 4.5 Model Architecture -- 5 Metric Analysis -- 6 Result Analysis -- 7 Conclusion -- 8 Future Works -- References -- Analysis of Privacy Preservation on Mobile Ad-Hoc Networks -- 1 Introduction -- 2 Literature Survey -- 3 Attack Strategies to Affect Privacy in MANET -- 3.1 Breaching of Confidentiality -- 3.2 Breaching of Integrity -- 3.3 Breaching of Availability -- 3.4 Breaching of Authentication -- 4 Applied Privacy-Preservation Techniques on MANET -- 5 Conclusion -- References.
Multi Face Detection Based Attendance System -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Arabic Hate Speech Detection on Social Media Using Machine Learning -- 1 Introduction -- 2 Related Work -- 2.1 Machine Learning -- 2.2 Deep Learning -- 3 Proposed Approach -- 3.1 Data Preprocessing -- 3.2 Features Extraction -- 4 Models -- 4.1 Logistic Regression -- 4.2 Linear Support Vector Classification -- 4.3 The Bidirectional Long-Short-Term Memory -- 5 Result and Discussions -- 5.1 Dataset Description -- 5.2 Machine Learning Models Results -- 5.3 Deep Learning Model Result: BI-LSTM -- 5.4 Comparison with State of the Art Approaches for Arabic Languages -- 6 Conclusion -- References -- Secure Ranked Search over Encrypted Cloud Data -- 1 Introduction -- 2 Literature Review -- 3 Problem Formulation -- 4 Proposed Methodology -- 5 Efficiency -- 6 Conclusions and Future Work -- References -- Web Application Exploitation and Account Takeover: A Comprehensive Study of Techniques and Mitigation Strategies -- 1 Introduction -- 2 Background -- 2.1 Web Vulnerabilities -- 2.2 Account Takeover -- 3 Techniques and Scenarios -- 3.1 Exploring the Impact of Unicode Mapping Collision on Account Takeover Attacks -- 3.2 Addressing Pre-account Takeover Threats in OAuth-Enabled Applications -- 3.3 Exploiting Host Headers for Account Takeover Attacks -- 3.4 Hijacking the Response: Understanding and Mitigating Response Manipulation Attacks -- 3.5 Broken Authentication Vulnerabilities in Reset Password and Email Change Features -- 4 Conclusion -- References -- Secured Encryption Technique in S-Box Using Fermat Encoding -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Illustration -- 5 Performance Analysis -- 6 Conclusion -- References.
Enhanced Gaining-Sharing Knowledge Optimization Algorithm for 3D Compression of Intrusion Detection Dataset -- 1 Introduction -- 2 Gaining-Sharing Knowledge Optimization Algorithm -- 3 EGSK-CIDD Model -- 3.1 Description of the KDDCup99 Dataset -- 3.2 Preprocessing the Datasets -- 3.3 Modularity of GSK -- 3.4 Records Filtering Process -- 3.5 Multilayer Perceptron Implementation -- 4 Implementation of the EGSK-CIDD Model -- 5 Conclusion -- References -- Uses of Blockchain in Internet of Medical Things: A Systematic Review -- 1 Introduction -- 2 Literature Review -- 2.1 Authentication Topic Utilize Blockchain -- 2.2 Intrusion Detection in Blockchain -- 2.3 Federate and Deep Learning Issue -- 2.4 Task Scheduling -- 3 Challenges and Solution by Using Blockchain in IoMT -- 4 Discussion -- 5 Conclusions -- References -- Secured Banking System Using Decentralized Approach - Block Chain -- 1 Introduction -- 1.1 Consensus Mechanism -- 1.2 Block Validation -- 1.3 Transactions -- 1.4 Block Creation -- 1.5 Proof of Work -- 2 Related Work -- 3 Proposed Work -- 3.1  Functional Modules Design and Analysis -- 4 Results and Discussion -- 5 Conclusion -- References -- A Multi-batch Differential Binary Motion Image and Deep Hashing Network for Human Action Recognition -- 1 Introduction -- 2 Methodology -- 2.1 Multiple Batches of Differential Binary Motion History -- 2.2 Description and Encoding of Features -- 2.3 Handcrafted Features: DBMH/HOG -- 2.4 Spatio-Temporal Deep AE Pattern (STDAEP) -- 3 Evaluation and Results -- 4 Conclusion -- References -- Intelligent Traffic Sign Detection and Recognition Using Computer Vision -- 1 Introduction -- 2 Related Work -- 3 Proposed System Architecture -- 4 Implementation and Results -- 5 Conclusion -- References -- Digital Guardians: Enhancing Women's Security with Artificial Intelligence and IoT -- 1 Introduction.
2 Related Work.
Record Nr. UNINA-9910874680603321
Abraham Ajith  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent Systems Design and Applications : 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022 - Volume 2 / / edited by Ajith Abraham, Sabri Pllana, Gabriella Casalino, Kun Ma, Anu Bajaj
Intelligent Systems Design and Applications : 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022 - Volume 2 / / edited by Ajith Abraham, Sabri Pllana, Gabriella Casalino, Kun Ma, Anu Bajaj
Autore Abraham Ajith
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (614 pages)
Disciplina 006.3
Altri autori (Persone) PllanaSabri
CasalinoGabriella
MaKun
BajajAnu
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
Soggetto non controllato Science
ISBN 3-031-35507-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910728934703321
Abraham Ajith  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent Systems Design and Applications : 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022 - Volume 4 / / edited by Ajith Abraham, Sabri Pllana, Gabriella Casalino, Kun Ma, Anu Bajaj
Intelligent Systems Design and Applications : 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022 - Volume 4 / / edited by Ajith Abraham, Sabri Pllana, Gabriella Casalino, Kun Ma, Anu Bajaj
Autore Abraham Ajith
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (631 pages)
Disciplina 006.3
Altri autori (Persone) PllanaSabri
CasalinoGabriella
MaKun
BajajAnu
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
Soggetto non controllato Science
ISBN 3-031-35510-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- ISDA 2022-Organization -- Contents -- Machine Learning Approach for Detection of Mental Health -- 1 Introduction -- 2 Literature Review -- 3 Dataset Description -- 4 Proposed Model -- 5 Results and Discussion -- 6 Conclusion and Future Scope -- References -- U-Net as a Tool for Adjusting the Velocity Distributions of Rheomagnetic Fluids -- 1 Introduction -- 2 Theoretical Basics -- 2.1 Physics-Based Loss -- 2.2 Rheomagnetic Fluids -- 3 Simulation Modeling -- 4 Results and Discussion -- 5 Conclusions -- References -- Detection of Similarity Between Business Process Models with the Integration of Semantics in Similarity Measures -- 1 Introduction -- 2 Similarity Measures -- 2.1 Syntactic Measures -- 2.2 Semantic Measures -- 2.3 Structural Measures -- 2.4 Behavioral Measures -- 3 Problem Illustration -- 3.1 Similarity Measures -- 3.2 Dimensions of Semantic Similarity -- 3.3 Cardinality Problem -- 3.4 Genetic Algorithm -- 4 Related Work -- 5 Our Approach -- 5.1 Steps of Genetic Algorithm -- 6 Conclusion -- References -- Efficient Twitter Sentiment Analysis System Using Deep Learning Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Proposed Method -- 3.1 Pre-processing -- 3.2 User-Mention -- 3.3 EMOJ Positive and Negative -- 3.4 Feature Selection -- 3.5 Classification -- 4 Experimental Results and Discussion -- 5 Conclusion -- References -- An Efficient Deep Learning-Based Breast Cancer Detection Scheme with Small Datasets -- 1 Introduction -- 1.1 Contributions -- 2 Proposed Method -- 2.1 Preprocessing -- 2.2 CNN Architecture -- 3 Datasets -- 4 Results and Discussion -- 5 Conclusion -- References -- Comparative Analysis of Machine Learning Models for Customer Segmentation -- 1 Introduction -- 2 Problem Statement -- 3 Literature Review -- 4 Algorithms for Customer Segmentation -- 4.1 Customer Segmentation Using K-Means.
4.2 Customer Segmentation Using DBSCAN -- 4.3 Agglomerative Clustering (Using PCA) -- 4.4 K-Means Using PCA -- 5 Results and Discussion -- 5.1 K-Means Model -- 5.2 DBSCAN -- 5.3 Agglomerative Clustering with PCA -- 5.4 Kmeans with PCA -- 6 Conclusion -- References -- An Intelligent Approach to Identify the Eggs of the Insect Bemisia Tabaci -- 1 Introduction -- 2 Overview of Proposed Approach -- 2.1 Deep Learning Algorithm -- 2.2 Auto-encoder -- 2.3 Stacked Auto-encoder for Egg Classification -- 3 Results and Discussion -- 3.1 Databases Used -- 3.2 Result -- 3.3 Test Phase -- 4 Conclusion -- References -- Overview of Blockchain-Based Seafood Supply Chain Management -- 1 Introduction -- 2 Blockchain Technology: Overview and Adoption in Supply Chains Management -- 3 An Overview of Blockchain Based Seafood Supply Chain Management Systems -- 4 Discussion and Research Challenges -- 5 Conclusion -- References -- Synthesis of a DQN-Based Controller for Improving Performance of Rotor System with Tribotronic Magnetorheological Bearing -- 1 Introduction -- 2 System Description and Modeling -- 2.1 Rotor Model -- 2.2 Bearing Model -- 3 Model Verification -- 4 Designing a DQN Controller -- 5 Results and Discussion -- 6 Conclusion -- References -- Card-Not-Present Fraud Detection: Merchant Category Code Prediction of the Next Purchase -- 1 Introduction -- 2 State of the Art -- 2.1 What is a Card-Not-Present Transaction? -- 2.2 Card not Present Fraud Scenario -- 2.3 What is the Merchant Category Code? -- 2.4 Prediction of Merchant Category Code for the Next Buy -- 3 Related Works -- 3.1 Online Payment Fraud Detection AI Proposals -- 4 Conclusion -- References -- Fast Stroke Lesions Segmentation Based on Parzen Estimation and Non-uniform Bit Allocation in Skull CT Images -- 1 Introduction -- 2 Related Works: classical and Deep Learning Approaches.
3 Materials and Methods -- 3.1 Level Set -- 3.2 Parzen Window -- 3.3 Non-uniform Bit Allocation: -law and A-law Algorithms -- 3.4 Datasets and Evaluation Metrics -- 4 LSBRD: An Approach Based on Parzen Estimation and Non-uniform Bit Allocation via -law and A-law -- 5 Results and Discussions -- 5.1 Algorithm Performance Analysis -- 6 Conclusion and Future Works -- References -- Methods for Improving the Fault Diagnosis Accuracy of Rotating Machines -- 1 Introduction -- 2 Intellectual Diagnostic Methods -- 2.1 Fully Connected Neural Networks -- 2.2 Generative Adversarial Network -- 3 Results and Discussion -- 3.1 Data Collection -- 3.2 Fully Connected Neural Networks to Rotor Diagnostic Defects -- 3.3 Generative Adversarial Network to Increasing the Volume and Variety of Training Data -- 4 Conclusion -- References -- Heuristics Assisted by Machine Learning for the Integrated Production Planning and Distribution Problem -- 1 Introduction -- 2 Problem Definition -- 3 Proposed Algorithms -- 3.1 Decoding Algorithms -- 3.2 Initial Solution -- 3.3 Neighborhood Search Heuristics -- 3.4 Framework -- 4 Computational Experiments -- 4.1 Computational Results -- 5 Conclusions -- References -- LSTM-Based Congestion Detection in Named Data Networks -- 1 Introduction -- 2 Background and Related Works -- 2.1 Long Short Term Memory Background -- 2.2 Related Works -- 3 LSTM-Based Congestion Detection -- 4 Performance Evaluation -- 5 Conclusion -- References -- Detection of COVID-19 in Computed Tomography Images Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 Image Acquisition -- 3.2 Pre-processing -- 3.3 Data Augmentation -- 3.4 Evaluated Architectures -- 3.5 Proposed Method -- 4 Experimental Results -- 4.1 Transfer Learning Results -- 4.2 Fine-Tuning Results -- 5 Discussion -- 6 Conclusion -- References.
Abnormal Event Detection Method Based on Spatiotemporal CNN Hashing Model -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Spatiotemporal Stream -- 3.2 Network Architecture -- 4 Experiments Results -- 4.1 Network Architecture -- 4.2 Datasets -- 4.3 Evaluation -- 5 Conclusion -- References -- A Multi-objective Iterated Local Search Heuristic for Energy-Efficient No-Wait Permutation Flowshop Scheduling Problem -- 1 Introduction -- 2 Problem Description -- 3 Multi-objective Iterated Local Search Heuristic -- 3.1 Multi-objective Local Search and Perturbation -- 4 Computational Experiments -- 4.1 Obtained Results -- 5 Conclusions -- References -- An Elastic Model for Virtual Computing Labs Using Timed Petri Nets -- 1 Introduction -- 2 Cloud Computing -- 2.1 Cloud Service Models -- 2.2 Cloud Deployement Models -- 2.3 Benefits and Challenges of Cloud Computing -- 3 Related Works -- 4 Background -- 4.1 Timed and Colored Petri Nets -- 4.2 Cloud Elasticity -- 5 Proposed Approach -- 5.1 The Challenge for Moving to VCL -- 5.2 Model Description -- 5.3 Vertical Elasticity Algorithm -- 5.4 Proposed Solution -- 5.5 Support Tools -- 6 Conclusion -- References -- A Decision Support System Based Vehicle Ontology for Solving VRPs -- 1 Introduction -- 2 Literature Review -- 2.1 Classification of Vehicle Routing Problems -- 2.2 Ontologies for Vehicle Domain -- 3 Decision Support System -- 4 Proposed VRP-Vehicle Ontology -- 5 Conclusion -- References -- Web API Service to RDF Mapping Method for Querying Distributed Data Sources -- 1 Introduction -- 2 Related Work -- 2.1 Smart City Platforms -- 2.2 Relational Databases -- 3 Accident Card Analysis System -- 3.1 R2RML Mapping -- 3.2 Data Quality -- 4 Web API Service to RDF Mapping Method Description -- 4.1 Weather Data Sources Specific -- 4.2 W2RML Scheme -- 5 Conclusion -- References.
Risk Management in the Clinical Pathology Laboratory: A Bayesian Network Approach -- 1 Introduction -- 2 Research Design -- 3 Results -- 3.1 Literature Review -- 3.2 Risk Model -- 4 Conclusions -- References -- Leveraging Sequence Mining for Robot Process Automation -- 1 Introduction -- 2 Related Works -- 3 The Proposed Approach -- 3.1 FEM-M: Frequent Episode Miner -- 3.2 TEF-M: Target Episode Finder -- 4 Experimental Results -- 5 A Case Study -- 6 Conclusions -- References -- Intelligent Agents System for Intention Mining Using HMM-LSTM Model -- 1 Introduction and Motivation -- 2 Related Works -- 3 Architecture of Multi Intelligent Agents System Approach -- 3.1 Description of Agents -- 3.2 Hybrid Model -- 4 Experimentation and Validation -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Result -- 5 Conclusion -- References -- Unsupervised Manipulation Detection Scheme for Insider Trading -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Feature Characterisation -- 3.2 Kernel Principal Component Analysis (KPCA) -- 4 Results and Discussion -- 5 Conclusion -- References -- A Comparative Study for Modeling IoT Security Systems -- 1 Introduction -- 1.1 Originality and Objectives -- 1.2 Outline -- 2 IoT and Modeling Languages -- 2.1 IoT Background -- 2.2 Overview of UML -- 2.3 Overview of SysML -- 3 Related Works -- 4 Proposed New IoT Security Modeling -- 4.1 IoT Architecture and Security Requirements -- 4.2 Modeling the Security of the Physical Layer and the Network Layer of IoT Systems with UML Language: Use Case Diagram -- 4.3 Modeling IoT Security Systems Using SysML Language: Requirement Diagram -- 5 Analysis and Discussion -- 6 Conclusion -- References -- Improving the Routing Process in SDN Using a Combination of the Evidence Theory and ML -- 1 Introduction -- 2 Related Work -- 3 Overview of the Trust-Based Routing Scheme.
4 Global Trust (GT) Vector Computation.
Record Nr. UNINA-9910728932903321
Abraham Ajith  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent Systems Design and Applications : 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022 - Volume 3 / / edited by Ajith Abraham, Sabri Pllana, Gabriella Casalino, Kun Ma, Anu Bajaj
Intelligent Systems Design and Applications : 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022 - Volume 3 / / edited by Ajith Abraham, Sabri Pllana, Gabriella Casalino, Kun Ma, Anu Bajaj
Autore Abraham Ajith
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (602 pages)
Disciplina 006.3
Altri autori (Persone) PllanaSabri
CasalinoGabriella
MaKun
BajajAnu
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
Soggetto non controllato Science
ISBN 3-031-35501-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910728946403321
Abraham Ajith  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent Systems Design and Applications : 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022 - Volume 1 / / edited by Ajith Abraham, Sabri Pllana, Gabriella Casalino, Kun Ma, Anu Bajaj
Intelligent Systems Design and Applications : 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022 - Volume 1 / / edited by Ajith Abraham, Sabri Pllana, Gabriella Casalino, Kun Ma, Anu Bajaj
Autore Abraham Ajith
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (592 pages)
Disciplina 006.3
Altri autori (Persone) PllanaSabri
CasalinoGabriella
MaKun
BajajAnu
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Computational Intelligence
Artificial Intelligence
Soggetto non controllato Artificial Intelligence
Engineering
Computers
Technology & Engineering
ISBN 3-031-27440-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- ISDA 2022-Organization -- Contents -- KMetaTagger: A Knowledge Centric Metadata Driven Hybrid Tag Recommendation Model Encompassing Machine Intelligence -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results and Performance Evaluation -- 5 Conclusion -- References -- KCReqRec: A Knowledge Centric Approach for Semantically Inclined Requirement Recommendation with Micro Requirement Mapping Using Hybrid Learning Models -- 1 Introduction -- 2 Related Works -- 3 Proposed System Architecture -- 4 Implementation and Performance Evaluation and Results -- 5 Conclusion -- References -- Object Classification Using ECOC Multi-class SVM and HOG Characteristics -- 1 Introduction -- 1.1 Background -- 1.2 Research Objectives -- 1.3 Paper Organization -- 2 Proposed Scheme for Object Classification -- 3 System Description -- 3.1 Image Datasets -- 3.2 ECOC Based Multi-class SVM -- 3.3 Appropriate Cell Size Selection for HOG Feature -- 4 Results and Discussions -- 5 Conclusion -- References -- GA Evolved Configuration Data for Embryonic Architecture with Built-in Self-test -- 1 Introduction -- 2 Embryonic Digital Circuit Architecture Using CGP Data -- 3 Novel Parallel GA Design for CGP Configuration Data Generation -- 3.1 Optimum Individual Monogenetic GA-OIMGA -- 3.2 Parallel HsClone GA -- 4 Embryonic Cells with Built-in Self-Test Design -- 5 Embryonic Adder and Comparator Cell Fault Detection -- 6 Conclusion and Scope for Future Work -- References -- A Multi-layer Deep Learning Model for ECG-Based Arrhythmia Classification -- 1 Introduction -- 2 Related Work -- 3 Material and Method -- 3.1 Dataset -- 3.2 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Analyzing Electoral Data Using Partitional and Hierarchical Clustering Algorithms -- 1 Introduction -- 2 The Municipal Human Development Index (MHDI).
3 Data Used in the Experiments -- 4 Methodology and Experiments -- 5 Conclusions -- References -- Medical Decision Making Based 5D Cardiac MRI Segmentation Tools -- 1 Introduction -- 2 Methods and Materials -- 3 Theory -- 3.1 Concept of the 5D Segmentation and Medical Issue -- 3.2 Goals and Contributions -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- India Post Service Facility Layout Design Selection and Evaluation Using MCDM Approach -- 1 Introduction -- 2 Literature Support -- 3 Research Methodology -- 4 Application - NSH Mangalore -- 5 Results -- 5.1 Finding the Weightage Criteria -- 5.2 Calculation Method -- 6 Conclusions -- References -- Weighted Pathfinding in the Paparazzi Problem with Dynamic Obstacles -- 1 Introduction -- 2 Problem Statement -- 3 Background Information -- 3.1 A* Algorithm -- 3.2 Extended A* Algorithm -- 3.3 Heuristics -- 3.4 Dynamic Obstacles -- 4 Implementation and Testing -- 4.1 Code Structure -- 4.2 Pathfinding -- 5 Results and Discussion -- 5.1 Data Distribution -- 5.2 Pathfinding -- 5.3 Diagonal Movement -- 5.4 Overall Heuristic Performance -- 6 Conclusions -- References -- A Rapid Review on Ensemble Algorithms for COVID-19 Classification Using Image-Based Exams -- 1 Introduction -- 2 Ensemble Algorithms -- 3 Methodology -- 3.1 Inclusion Criteria -- 3.2 Exclusion Criteria -- 4 Results and Discussion -- 4.1 Q1 - Ensemble Technique -- 4.2 Q2 - Number of Classes -- 4.3 Q3 - Machine Learning Algorithms and Models -- 4.4 Q4 - Datasets -- 5 Conclusions -- References -- Indian Postal Service Quality Assessment Using Graph Theoretic Approach - A Quantitative Decision-Making Tool -- 1 Introduction -- 1.1 Importance of the Study -- 2 Literature Review -- 2.1 Graph Theoretical (GT) Model -- 3 Research Methodology -- 3.1 Graph-Theoretic Model Approach -- 4 Analysis and Results -- 4.1 Graph Theory Calculation.
5 Conclusions -- References -- Analyzing the Critical Success Factors of Lean System Implementation in India Post Using DEMATEL Method -- 1 Introduction -- 1.1 Rationale of the Study -- 2 Literature Support -- 3 Research Methodology -- 3.1 Steps for DEMATEL Method -- 4 Case Application: Indian Postal NSH Mangalore, India -- 5 Conclusions -- References -- Application of Artificial Intelligence in Mental Health -- 1 Introduction to Artificial Intelligence in Healthcare -- 2 Mental Health -- 2.1 AI in Healthcare -- 2.2 Ethics and AI Mental Health Research -- 2.3 AI Research on the Involvement of Patient and Public Mental Health -- 2.4 Well-Being and Educational Performance -- 2.5 Internet-Based Mental Health Care -- 2.6 Mental Healthcare Chatbots -- 3 Literature Survey -- 4 Constraints of AI and Mental Health Care Research -- 5 Statistics Scenario in the Area of AI in Mental Health Care Research -- 6 Conclusion -- References -- Cold Rolling Mill Energy Consumption Prediction Using Machine Learning -- 1 Introduction -- 2 Cold Rolling Mill and Energy Consumption -- 3 Proposed Approach -- 4 Results and Analysis: Model Training and Energy Prediction -- 5 Conclusions and Future Work -- References -- Virtual Reconstruction of Adaptive Spectral and Spatial Features Based on CNN for HSI Classification -- 1 Introduction -- 2 Proposed Approach -- 2.1 Extraction of Spectral Data Vectors and Fusions of Pixels to Obtain a Single Spatial-Spectral Band -- 2.2 Apply Five Algorithms to Create Five Virtual Layers -- 2.3 3D Image Reconstruction -- 2.4 Edge-Adaptive Spatial Data Extraction -- 2.5 Convolution and Processing of Each Block Until Recognition of the pixel -- 2.6 Placing Pixels in Their Positions, Merging the Five Spectral Bands and Labeling -- 3 Experiences and Results -- 3.1 Tests -- 3.2 Results and Discussions -- 4 Conclusion -- References.
Enhancing Rental Bike Count and Availability Prediction Using Regression Modelling -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Multiple Linear Regression -- 3.2 Polynomial Regression -- 4 Results -- 5 Conclusion and Fututre Enhancement -- References -- Application of WASPAS Method for the Evaluation of Tamil Nadu Private Travels -- 1 Introduction -- 2 Literature Support -- 3 Research Methods -- 4 Case Study - Chennai, Tamilnadu, Southern India -- 4.1 Application of WASPAS Method -- 5 Comparative Study -- 6 Conclusion -- References -- Time Series Forecast Applied to Electricity Consumption -- 1 Introduction -- 2 Related Work -- 3 BackGround of Study -- 3.1 Definitions -- 3.2 Machine Learnings Models -- 4 Material and Methods -- 4.1 Dataset Description -- 4.2 Performance Indices -- 5 Simulation Results -- 5.1 Regression Models - Data with Daily Periodicity -- 5.2 Regression Models - Data with Daily Periodicity (Outlier Removal) -- 5.3 Regression Models - Data with Monthly Periodicity -- 5.4 Regression Models - Data with Daily Periodicity (Outlier Removal) - Moving Average -- 5.5 Multi Layer Perceptron (MLP) - Data with Monthly Periodicity -- 5.6 Recurrent Neural Network (RNR) - Data with Monthly Periodicity -- 6 Conclusions -- References -- A Survey on Text Processing Using Deep Learning Techniques -- 1 Introduction -- 2 Sentiment Analysis is Divided into Numerous Categories -- 2.1 Sentiment with a Finer Granularity -- 2.2 Sentiment Analysis for Emotion Identification -- 2.3 Analyses Based on Aspects -- 2.4 Sentiment Analysis Based on Intent -- 3 Approaches to Sentiment Analysis -- 3.1 Rule-Based Approach -- 3.2 Machine Learning Approach -- 3.3 Lexicon Based Approach -- 4 All Approaches Advantages and Limitations -- 5 Text-Based Emotion Detection (TBED) -- 5.1 Datasets for Text-Based ED (Emotion Detection) Research -- 6 Feature Set.
6.1 Extraction of Feature -- 6.2 Feature Selection -- 7 Comparison Analysis -- 7.1 Lexicon Based Approach -- 7.2 Dictionary-Based Classification -- 7.3 Corpus-Based Classification -- 7.4 Machine Learning Based Classification -- 7.5 Support Vector Machine -- 7.6 Comparative Table for Different Classification Algorithm -- 7.7 Naïve Bayes -- 7.8 K-Nearest Neighbor -- 7.9 Maximum Entropy -- 7.10 Decision Tree Learning -- 7.11 Semantic Orientation Approach -- 7.12 Keyword-Based Classification -- 7.13 Emotions Based Classifications -- 8 Issues in Text Sentiment Analysis -- 9 Conclusion -- References -- RePI: Research Paper Impact Analysis -- 1 Introduction -- 2 Literature Survey -- 2.1 Previous Works -- 2.2 Impact Metrics -- 2.3 Keyword Extraction -- 3 Dataset Creation -- 4 Methodology and Architecture -- 5 Design and API Integration -- 5.1 RAKE -- 5.2 Implementation -- 6 Impact Metric Calculation -- 7 Results -- 7.1 Visualizations -- 7.2 Impact Metric Ratio -- 8 Conclusion -- References -- Human-Centred Artificial Intelligence in Sound Perception and Music Composition -- 1 Introduction -- 2 Melody and Musical Grammar -- 3 Formalization of Musical Grammar Rules -- 4 Obtained Results -- 5 Discussion and Conclusions -- References -- Multi-objective Optimization for Sensor Networks Based Smart Parking Systems -- 1 Introduction -- 2 Related Works -- 3 Real Time Smart Parking System Description -- 4 Mathematical Formulation -- 4.1 Poisson Process -- 4.2 Linear Programming Formulation -- 5 Performance Evaluation -- 6 Open Research Issue: Sensor Networks and Artificial Neural Networks (ANN) -- 7 Conclusion -- References -- Process Automation with Digital Robots Under Smart University Concept -- 1 Introduction -- 2 Literature Review -- 3 Digital Transformation of Processes -- 3.1 Digital Transformation -- 3.2 Process Automation -- 3.3 Human Path and Robot Path.
4 Case Study.
Record Nr. UNINA-9910728933403321
Abraham Ajith  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Programming multicore and many-core computing systems / / edited by Sabri Pllana, Fatos Xhafa
Programming multicore and many-core computing systems / / edited by Sabri Pllana, Fatos Xhafa
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2017
Descrizione fisica 1 online resource (521 pages) : illustrations, tables
Disciplina 005.2/75
Collana Wiley Series on Parallel and Distributed Computing
THEi Wiley ebooks.
Soggetto topico Parallel programming (Computer science)
Coprocessors - Programming
ISBN 1-119-33200-1
1-119-33201-X
1-119-33199-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multi- and many-cores, architectural overview for programmers -- Programming models for multicore and many-core computing systems -- Lock-free concurrent data structures -- Software transactional memory -- Hybrid/heterogeneous programming with OmpSs and its software/hardware implications -- Skeleton programming for portable many-core computing -- DSL stream programming on multicore architectures -- Programming with transactional memory -- Object-oriented stream programming -- Software-based speculative parallelization -- Autonomic distribution and adaptation -- PEPPHER: performance portability and programmability for heterogeneous many-core architectures -- Fastflow: high-level and efficient streaming on multicore -- Parallel programming framework for H.264/AVC video encoding in multicore systems -- Parallelizing evolutionary algorithms on GPGPU cards with the EASEA platform -- Smart interleavings for testing parallel programs -- Parallel performance evaluation and optimization -- A methodology for optimizing multithreaded system scalability on multicores -- Improving multicore system performance through data compression -- Programming and managing resources on accelerator-enabled clusters -- An approach for efficient execution of SPMD applications on multicore clusters -- Operating system and scheduling for future multicore and many-core platforms.
Record Nr. UNINA-9910162722603321
Hoboken, New Jersey : , : Wiley, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Programming multicore and many-core computing systems / / edited by Sabri Pllana, Fatos Xhafa
Programming multicore and many-core computing systems / / edited by Sabri Pllana, Fatos Xhafa
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , 2017
Descrizione fisica 1 online resource (521 pages) : illustrations, tables
Disciplina 005.2/75
Collana Wiley Series on Parallel and Distributed Computing
THEi Wiley ebooks.
Soggetto topico Parallel programming (Computer science)
Coprocessors - Programming
ISBN 1-119-33200-1
1-119-33201-X
1-119-33199-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Multi- and many-cores, architectural overview for programmers -- Programming models for multicore and many-core computing systems -- Lock-free concurrent data structures -- Software transactional memory -- Hybrid/heterogeneous programming with OmpSs and its software/hardware implications -- Skeleton programming for portable many-core computing -- DSL stream programming on multicore architectures -- Programming with transactional memory -- Object-oriented stream programming -- Software-based speculative parallelization -- Autonomic distribution and adaptation -- PEPPHER: performance portability and programmability for heterogeneous many-core architectures -- Fastflow: high-level and efficient streaming on multicore -- Parallel programming framework for H.264/AVC video encoding in multicore systems -- Parallelizing evolutionary algorithms on GPGPU cards with the EASEA platform -- Smart interleavings for testing parallel programs -- Parallel performance evaluation and optimization -- A methodology for optimizing multithreaded system scalability on multicores -- Improving multicore system performance through data compression -- Programming and managing resources on accelerator-enabled clusters -- An approach for efficient execution of SPMD applications on multicore clusters -- Operating system and scheduling for future multicore and many-core platforms.
Record Nr. UNINA-9910812753303321
Hoboken, New Jersey : , : Wiley, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui