Inventive Communication and Computational Technologies : Proceedings of ICICCT 2023 / / edited by G. Ranganathan, George A. Papakostas, and Álvaro Rocha |
Edizione | [First edition.] |
Pubbl/distr/stampa | Singapore : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (1127 pages) |
Disciplina | 929.605 |
Collana | Lecture Notes in Networks and Systems Series |
Soggetto topico | Communication - Technological innovations |
ISBN | 981-9951-66-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Mitigating Vanishing Gradient in SGD Optimization in Neural Networks -- 1 Introduction -- 2 Gradient Descent Optimization -- 2.1 Scope Identified -- 3 Vanishing Gradient Problem -- 4 Activation Functions -- 4.1 Saturated Activation Function -- 4.2 Unsaturated Activation Function -- 5 Adaptive Optimization Methods -- 6 Other Solutions for VGP -- 6.1 Batch Normalization -- 6.2 Gradient Clipping -- 6.3 Weight Initialization -- 7 Conclusion -- References -- A Comparative Analysis of Heart Disease Diagnosis with Machine Learning Models -- 1 Introduction -- 2 Related Works -- 3 Materials and Methods -- 3.1 Heart Disease Dataset -- 3.2 Machine Learning Models -- 3.3 Proposed Framework -- 4 Experimental Results -- 4.1 Settings -- 4.2 Evaluation Metrics -- 4.3 Results and Discussion -- 4.4 Examples of Heart Disease Diagnosis -- 5 Conclusions -- References -- The Impact of Information System and Technology of Courier Service During Pandemic -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Types of Research -- 3.2 Variable -- 3.3 Population -- 3.4 Sample -- 3.5 Types of Data -- 3.6 Data Collection Technique -- 3.7 Data Analysis Technique -- 4 Research Result and Discussion -- 5 Conclusion -- References -- Event Detection in Social Media Analysis: A Survey -- 1 Introduction -- 2 Literature Review -- 3 Localized Burst Detection -- 4 Global Burst Detection -- 5 Conclusion -- References -- Artificial Intelligence Mechanism to Predict the Effect of Bone Mineral Densıty in Endocrıne Diseases-A Review -- 1 Introduction -- 2 Bone Fracture -- 2.1 Faster R-CNN -- 2.2 Fivefold Cross-Validation -- 2.3 Deep Learning-Based Object Detection Model -- 3 Bone Metabolısm -- 3.1 Bone Tissue Growth -- 4 BMD and Osteoporosis -- 5 Bone Mass in Endocrine Disease -- 5.1 Diabetes Mellitus.
5.2 Thyroid and Diabetes Mellitus -- 6 Summary and Conclusion -- References -- Evaluation of Deep Learning CNN Models with 24 Metrics Using Soybean Crop and Broad-Leaf Weed Classification -- 1 Introduction -- 2 Related Works -- 2.1 Weed Detection in the Maize Field -- 2.2 Estimating Weed Growth -- 2.3 Multi-classification of Weeds Using HSI Images -- 2.4 Weed Density Estimation -- 2.5 Detecting Cotton Weeds Using Yolo Object Detector -- 2.6 Weed Detection at an Early Stage -- 3 Materials and Methods -- 3.1 Module 1-Data Pre-processing -- 3.2 Module 2-Classification of Crop and Weed -- 3.3 Module 3-Performance Evaluation -- 4 Experimental Results -- 4.1 Results and Discussions -- 4.2 Graphs-Confusion Matrix and ROC Curve -- 5 Conclusion and Future Enhancements -- 5.1 Conclusion -- 5.2 Future Enhancements -- References -- Bluetooth Controlled Integrated Robotic Arm with Temperature and Moisture Sensor Modules -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Implementation Strategy -- 3.2 Block Diagram -- 4 Discussion -- 5 Results -- 6 Conclusion -- References -- Image Dehazing Using Generic Model Agnostic Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Results and Discussions -- 4.1 Running Time Comparison -- 4.2 PSNR Value Comparison -- 5 Conclusion -- References -- A Novel Approach to Build Privacy and Trust in Vehicle Sales Using DID -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Creation of User DID -- 3.2 Creation of Vehicle DID and ERC-721 Token -- 3.3 Credential Issuance by the Issuer -- 3.4 Vehicle Transfer to Buyer -- 3.5 Pollution Certificate Issuance -- 4 Results and Discussions -- 5 Conclusion -- References -- Bipolar Disease Data Prediction Using Adaptive Structure Convolutional Neuron Classifier Using Deep Learning -- 1 Introduction -- 2 Literature Survey. 3 Proposed Method -- 3.1 Bipolar Data Preprocessing Using ISF2 -- 3.2 Scaled Features Chi-Square Testing (SFCsT) -- 3.3 Softmax Neural Activation Function -- 3.4 Classification Based on Adaptive Structure Convolutional Neuron Classifier (ASCNC) -- 4 Result and Discussion -- 5 Conclusion -- References -- Oceanographic and Hydrological Study of the Moroccan Atlantic Coast: Focus on the Upwelling -- 1 Introduction -- 2 Study Area -- 3 Methodology of Study -- 4 Results and Discussion -- 4.1 Hydrology and Variation of the Surface Water Masses' Temperature -- 4.2 Salinity of Atlantic Surface Water Bodies -- 4.3 Dissolved Oxygen -- 4.4 Description of the Upwelling Process on the Moroccan Atlantic Coast by Remote Sensing -- 5 Conclusion -- References -- The Acceptance of Artificial Intelligence in the Commercial Use of Crypto-Currency and Blockchain Systems -- 1 Introduction -- 2 Literature Review and Hypotheses Development -- 2.1 Blockchain and the Use of Crypto-currencies in Supply Chain Supply Chain Operations? -- 2.2 Links Between the Theory of Reasoned Action and the Theory of Planned Behavior -- 2.3 The Theory of Reasoned Action and Technological Acceptance -- 2.4 Technology Acceptance Model -- 2.5 Acceptance and Use of Technology: Unified Theory -- 2.6 Planned Behavior Theory -- 2.7 Behavioral Reasoning Theory (BRT) -- 2.8 Decision Theories -- 2.9 Theory of Flow -- 3 How to Use ICT in Guiding? -- 4 Establishing Constructive Collaboration Through Technology Channels -- 5 The Empirical Model -- 6 Results and Discussions -- 7 Conclusion -- References -- Deep Hybrid Model with Trained Weights for Multimodal Sarcasm Detection -- 1 Introduction -- 2 Literature Survey -- 3 Preprocessing, Feature Extraction and Feature Level Fusion Process -- 3.1 Preprocessing -- 3.2 Feature Extraction. 4 Hybrid RNN and Optimized LSTM for Multimodal Sarcasm Detection (Hromsd) -- 4.1 RNN -- 4.2 Optimized LSTM -- 4.3 Improved Bald Eagle Search Optimization for Training LSTM -- 5 Final Outcome and Discussions of HROMSD -- 5.1 Simulation Procedure -- 5.2 Dataset Description -- 5.3 Validate the Performance of the HROMSD Regarding Positive Measure -- 6 Conclusion -- References -- InsuraChain: A Blockchain-Based Parametric Health Insurance Platform -- 1 Introduction -- 1.1 Research Contribution -- 2 Related Works -- 3 Systems in Place -- 3.1 Traditional Insurance -- 3.2 Cashless Insurance -- 4 Proposed System -- 4.1 Comparison with Systems in Place -- 5 Architecture -- 6 Implementation -- 6.1 IPFS -- 6.2 Smart Contracts -- 6.3 Web Interface -- 6.4 Flow of Events -- 7 Results and Discussion -- 8 Future Works -- 8.1 Digital Currency -- 8.2 Image Recognition -- 9 Conclusion -- References -- Automating Audio Attack Vectors -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Circuit Design -- 3.2 PoC Tool -- 3.3 Laser Attack -- 3.4 Psychoacoustic Attack -- 4 Results and Discussion -- 4.1 PoC Tool -- 4.2 Laser Attack -- 4.3 Psychoacoustic Attack -- 5 Conclusion -- 5.1 PoC Tool -- 5.2 Laser Attack -- 5.3 Psychoacoustic Attack -- 6 Future Work -- References -- Child Detection by Utilizing Touchscreen Behavioral Biometrics on Mobile -- 1 Introduction -- 2 Literature Survey -- 2.1 Background -- 2.2 Related Work Implications -- 3 Experimental Setup -- 4 Models Used and Their Results -- 4.1 LightGBM -- 4.2 XGBOOST -- 4.3 ANN (Artificial Neural Network) -- 4.4 Support Vector Machine (SVM) -- 4.5 K-Nearest Neighbors (KNN) -- 5 Evaluation Metrics -- 5.1 Final Accuracies -- 5.2 ROC Curves -- 6 Conclusions -- 6.1 Limitations -- 6.2 Future Scope -- References -- Hand Gesture-Controlled Wheelchair -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Working. 4.1 Circuit Diagram of Transmitter -- 4.2 Circuit Diagram of Receiver -- 4.3 Functional Table -- 4.4 Merits and Demerits Table -- 4.5 Flowcharts -- 4.6 Need of Project -- 5 Summary and Conclusion -- References -- Decentralized Evidence Storage System Using Blockchain and IPFS -- 1 Introduction -- 2 Problems in Current System -- 3 Solution Using Blockchain and IPFS -- 4 Working of the System -- 5 Implementation -- 6 Security and Privacy Considerations -- 6.1 Consensus Mechanism -- 6.2 Encryption -- 6.3 Network Security -- 6.4 Privacy -- 6.5 Auditability -- 6.6 Legal Compliance -- 7 Comparison with Centralized Storage Solutions -- 7.1 Security -- 7.2 Privacy -- 7.3 Decentralization -- 7.4 Speed -- 7.5 Cost -- 8 Advantages of Proposed System -- 8.1 Improvement in Transparency -- 8.2 Evidence Remains Immutable -- 8.3 Restore Trust of People in Courts -- 8.4 Improve Courts' Efficiency -- 8.5 Higher Performance -- 8.6 Minimized Storage Costs -- 8.7 Reliable -- 9 Use Cases and Applications of the System -- 9.1 Legal and Regulatory Compliance -- 9.2 Supply Chain Management -- 9.3 Intellectual Property Protection -- 9.4 Digital Identity Verification -- 9.5 Evidence Collection and Preservation -- 9.6 Decentralized File Sharing -- 10 Limitations and Future Scope -- 11 Conclusion -- References -- Investigation of DCF Length and Input Power Selection for Optical Transmission Systems -- 1 Introduction -- 2 Simulative Setup -- 3 Results and Discussion -- 4 Conclusion -- References -- Resource Optimization with Digital Twins Using Intelligent Techniques for Smart Healthcare Management -- 1 Introduction -- 2 Digital Twin -- 3 Digital Twin Technologies -- 4 Literature Review -- 4.1 Related Work -- 5 Reflection Model Based on Digital Twin -- 6 Machine Learning and Optimization -- 6.1 Logistic Regression ML Model -- 7 Proposed Optimization Model Based on Digital Twin. 8 Results. |
Record Nr. | UNINA-9910746961303321 |
Singapore : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Inventive communication and computational technologies : proceedings of ICICCT 2021 / / G. Ranganathan, Xavier Fernando, Fuqian Shi, editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (1016 pages) |
Disciplina | 004.6 |
Collana | Lecture notes in networks and systems |
Soggetto topico |
Telecommunication systems
Computer networks |
ISBN |
981-16-5528-6
981-16-5529-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | ICICCT 2021 |
Record Nr. | UNINA-9910743388603321 |
Singapore : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Inventive communication and computational technologies : proceedings of ICICCT 2020 ; 28-29 May 2020, Gnanamani College of Technology, Tamil Nadu, India / / editors, G. Ranganathan, Joy Chen, Álvaro Rocha |
Edizione | [1st edition 2021.] |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XXXIV, 1000 p. 612 illus., 424 illus. in color.) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico | Computer networks |
ISBN | 981-15-7345-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Mathematical Modeling of the Data Processing Problems of Heat Experiments based on Multi- Processor Computing Complexes -- Analysis of Image Processing Techniques to Segment the Target Animal in Non-Uniformly Illuminated and Occluded Images -- Enhanced Speeded Up Robust Feature with Bag of Grapheme (Esurf-Bog) for Tamil Palm Leaf Character Recognition -- Traffic Sign Recognition System (TSRS): SVM and Convolutional Neural Network -- Agro Advisory System Using Big Data Analytics -- Automatic Face Recognition and Finding Occurrence of Actors in Movies -- Recurrent Neural Network based Character Recognition System for Tamil Palm Leaf Manuscript Using Stroke Zoning. |
Record Nr. | UNINA-9910484347103321 |
Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Inventive Communication and Computational Technologies : Proceedings of ICICCT 2019 / / edited by G. Ranganathan, Joy Chen, Álvaro Rocha |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XLVI, 1415 p. 708 illus., 520 illus. in color.) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Electrical engineering
Wireless communication systems Mobile communication systems Mobile computing Big data Artificial intelligence Communications Engineering, Networks Wireless and Mobile Communication Mobile Computing Big Data/Analytics Artificial Intelligence |
ISBN | 981-15-0146-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Enhanced Security Mechanism in Cloud based on DNA Excess 3 Codes -- Tensorflow Based Semantic Techniques For Multi-Cloud Applications Portability And Interoperability -- Enhancing High Availability for NoSQL Database Systems using Failover Techniques -- Implementation of Automated Bottle Filling System using PLC -- An Integrated Approach to Network Intrusion Detection and Prevention. |
Record Nr. | UNINA-9910373904103321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Pervasive computing and social networking : proceedings of ICPCSN 2022 / / G. Ranganathan, Robert Bestak and Xavier Fernando, editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (799 pages) |
Disciplina | 302.30285 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico | Online social networks |
ISBN | 981-19-2840-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910627269803321 |
Singapore : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Pervasive computing and social networking : proceedings of ICPCSN 2021 / / G. Ranganathan [and three others] editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (767 pages) |
Disciplina | 006.31 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico | Machine learning |
ISBN |
981-16-5640-1
981-16-5639-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910743372203321 |
Singapore : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Soft computing for security applications : proceedings of ICSCS 2022 / / edited by G. Ranganathan, Xavier Fernando and Selwyn Piramuthu |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (754 pages) |
Disciplina | 005.8 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Computer security
Soft computing |
ISBN | 981-19-3590-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- About the Editors -- Smart Question Paper Evaluation: Automated Approach Using the Jaccard Similarity -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 4 Results -- 5 Conclusion -- References -- Smart Patterns: Searching a Pattern in the Unknown Environment Using Hybrid Framework -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 4 Results -- 5 Conclusion -- References -- Image Processing Techniques for PCB Board Fault Analysis with Object Extraction and Measurements -- 1 Introduction -- 2 Related Works -- 2.1 Image Processing Application for "E-Waste" Handling -- 3 Imaging Analysis -- 3.1 Missing Holes Detection Using Imaging -- 3.2 Open-Circuit Detection Using Imaging -- 3.3 Short-Circuit Detection Using Imaging -- 4 Result and Discussion -- 5 Conclusion -- References -- Gamification of Knowledge Management System: A Framework to Incentivize Knowledge Sharing for the Software Industry -- 1 Introduction -- 2 Literature Review -- 2.1 Knowledge Management -- 2.2 Gamification -- 2.3 Gamification and Incentives in KMS -- 2.4 Existing Frameworks of Applying Gamification in Knowledge Management Systems. -- 3 Methodology -- 3.1 Research Method -- 3.2 Data Collection Technique -- 3.3 Sample Size -- 4 Results and Interpretation -- 4.1 Outcome for Research Questions -- 4.2 Proposed Framework for the Gamification of a KMS -- 4.3 Evaluation of Proposed Framework -- 5 Conclusion -- References -- Privacy Attributes Aware Framework in Information Disclosure Models for Public During Pandemic -- 1 Introduction -- 2 Related Work -- 3 Privacy Attributes Aware (PAA) Information Disclosure Model -- 4 Experimental Results -- 5 Conclusion -- References -- Role of Resource Description Framework in Knowledge Discovery in World Wide Web -- 1 Introduction -- 1.1 Role of RDF in Semantic Web.
2 State of Current Research in Semantic Web -- 3 Conceptual Model -- 3.1 Application Architecture -- 4 Experimental Results and Discussions -- 5 Conclusion and Scope for Future Work -- References -- A Comparative Analysis of Deep Learning-Based Frameworks for Face Vitality Detection -- 1 Introduction -- 2 Deep Learning in Face PAD Mechanism -- 2.1 Deep Features-Based Face PAD Models -- 3 Analysis -- 4 Research Observations and Discussions -- 5 Conclusions -- References -- Prediction of Students Programming Performance Using Naïve Bayesian and Decision Tree -- 1 Introduction -- 2 Related Works -- 3 Background -- 3.1 Naïve Bayes -- 3.2 Decision Tree -- 4 Experiment and Result -- 4.1 Data Collection -- 4.2 Preprocessing -- 4.3 Classification -- 4.4 Post-processing -- 5 Conclusion and Future Work -- References -- The Investigation of Network Security, Including Penetrating Threats and Potential Security Measures -- 1 Introduction -- 2 Attack Forms -- 3 Network Security Technologies -- 4 Advanced Security Policies for Networks -- 5 Conclusion -- References -- A Review on Rice Quality Analysis -- 1 Introduction -- 2 Methodologies for Rice Quality Analysis -- 2.1 Spectroscopic Techniques -- 2.2 Hyperspectral Imaging -- 2.3 Physio-chemical Properties -- 2.4 Polarimetric Method -- 2.5 Discussion -- 3 Conclusion -- References -- Hybrid MPPT-Based Efficiency Improvement of Renewable Energy System Using Step-Up Converter -- 1 Introduction -- 2 Modeling of PV Cell -- 3 Need for MPP Tracking -- 4 Proposed Hybrid MPP Algorithm -- 5 Simulation Results and Discussion -- 6 Conclusion -- References -- A Review to Enhance Operations in an Airport with a Deep Learning and Computer Vision Approach -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodologies -- 3.1 Face Recognition -- 3.2 Paperless Boarding -- 3.3 Correlating Luggage With Passenger -- 4 Conclusion. References -- Comparative Analysis of Diabetes Prediction Using Machine Learning -- 1 Introduction -- 2 Related Works -- 2.1 Support Vector Machine (SVM) -- 2.2 Artificial Neural Network (ANN) -- 2.3 Deep Neural Network (DNN) -- 2.4 Convolutional Neural Network (CNN) -- 3 Result and Discussion -- 4 Conclusion -- References -- A Review on Multiparameter Sensor Design for Biomedical SoC Applications -- 1 Introduction -- 1.1 Cardiovascular Disease Diagnosis Methods -- 1.2 Present Wearable Devices for Cardiovascular Disease Monitoring -- 1.3 Wearable Devices Comparative Analysis -- 2 Biomedical Signal Processing Perspective -- 2.1 Photoplethysmograph (PPG) Signal -- 2.2 PPG Signal Characteristics -- 3 Conclusion -- References -- Towards Design of a Novel Android Malware Detection Framework Using Hybrid Deep Learning Techniques -- 1 Introduction -- 2 Related Works -- 3 Proposed Android Malware Detection Framework Using Hybrid Deep Learning Technique -- 3.1 Description of the Pre-processing Stage -- 3.2 Hybrid of the Bidirectional Long Short-Term Memory (BiLSTM) and Merged Sparse Auto-Encoder (MSAE) Deep Learning Models -- 4 Performance Analysis and Discussion -- 4.1 Dataset Description -- 4.2 Results and Discussion -- 5 Conclusion -- References -- A Survey: Secure Cloud Data Storage and Access Control System Using Blockchain -- 1 Introduction -- 2 Literature Review -- 3 Blockchain Technology: Layered Architecture and Types of Network -- 3.1 Blockchain Layered Architecture -- 3.2 Types of Networks -- 4 Access Control Mechanism for Blockchain Technology -- 4.1 Role-Based Access Control -- 4.2 Attribute-Based Encryption -- 4.3 Ciphertext-Policy Attribute-Based Encryption -- 4.4 Multi-level Security Access Control Model -- 4.5 Dynamic Access Control with Cryptography Enforced -- 5 Conclusion and Future Scope -- References. A Rule-Based Adaptive Mobile Application to Learn Android in a Personalized Learning Environment -- 1 Introduction -- 2 Literature Review -- 2.1 Personalized Learning -- 2.2 Inference Engine and Rete Algorithm -- 2.3 Critical Appraisal of Existing Systems -- 3 Proposed System -- 3.1 Detailed System Architecture -- 3.2 Algorithm and Logic Used -- 4 Results and Interpretation -- 5 Conclusion -- References -- Missing Data Imputation Using Ensemble Learning Technique: A Review -- 1 Introduction -- 2 Imputation Techniques -- 2.1 Single Variable Imputation -- 2.2 Multivariable Imputation -- 3 Ensemble Learning -- 4 Ensemble Learning in Bioinformatics -- 5 Evaluation Metrics -- 6 Conclusion -- References -- Forensic Analysis of Images on Online Social Network: A Survey -- 1 Introduction -- 2 Literature Survey -- 3 Digital Image Forgery Detection Method -- 3.1 Active Forensics -- 3.2 Passive forensics -- 4 Different Datasets that are Associated with Forgery Detection -- 5 Limitations -- 6 Conclusion and Discussion -- References -- Survey on Heart Disease Prediction Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Review -- 2.1 Related Works -- 3 Review on Proposed HD Prediction Using ML Models, Performance Metrics, and the Highest Achievements -- 3.1 Review on Proposed Models -- 3.2 Analysis on Performance Metrics -- 3.3 Analysis on Highest Performance Achievements -- 4 Evaluation on Adopted HD Prediction Using ML Models Along with Chronological Review -- 4.1 Review on Datasets Used for Prediction -- 4.2 Chronological Review -- 5 Features Defined in HD Prediction via ML Models Along with Review of Simulation Tool -- 5.1 Analysis on Extracted Features -- 5.2 Review on Simulation Tool -- 6 Research Gaps and Challenges -- 7 Conclusion -- References -- Machine Learning-Based Forecasting Technique for Crop Yield: A Study -- 1 Introduction. 2 Machine Learning Algorithms: An Overview -- 2.1 Single Learning Models -- 2.2 Hybrid Learning Models -- 2.3 Ensemble Learning Models -- 3 Relevant Literature -- 4 Observations -- 5 Conclusion -- References -- E-commerce Application with Analytics for Pharmaceutical Industry -- 1 Introduction -- 2 Related Work/Literature Survey -- 2.1 Purpose -- 2.2 Methodology -- 2.3 Unsupervised Learning -- 2.4 Pattern Forecast Process -- 3 Conclusion -- References -- Enhanced Crime and Threat Intelligence Hunter with Named Entity Recognition and Sentiment Analysis -- 1 Introduction -- 2 Survey of Existing Cyber Intelligence Tools -- 3 Architectural Design -- 3.1 Crime Type Searching -- 3.2 Domain/IP Searching -- 3.3 Social Media Username Searching -- 3.4 Free Text Searching -- 3.5 Web Crawling and Scraping -- 3.6 Named Entity Recognition -- 3.7 Sentiment Analysis -- 3.8 Knowledge Graph Generation -- 4 System Analysis and Potential Innovations -- 4.1 Interfacing with Multiple Data Sources -- 4.2 Scraping the Deep Web -- 4.3 Training the NER Model -- 5 Limitations and Further Work -- 5.1 Lack of Substantial Training Dataset -- 5.2 Volatility of Deep Web Links -- 5.3 No Mobile Platform and Network Data Stream Support -- 6 Conclusion -- References -- Image Steganography for Confidential Communication and Secured Data Storing -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Text in Image Steganography -- 5 Lift Haar Wavelet Transform -- 6 AES Encryption -- 7 Decryption -- 8 Results and Discussion -- 9 Conclusion -- References -- Real Time Analysis of Artificial Neural Network-Based Fault Detection and Fault Location in the AC Microgrid -- 1 Introduction -- 2 Artificial Neural Network (ANN) -- 2.1 Back Propagation Neural Network (BPNN) -- 3 AC Microgrid -- 3.1 Faults -- 4 Methodology of Fault Analysis -- 5 Real Time Analysis of Results Using OP4510 RT-LAB. 6 Simulation Results. |
Record Nr. | UNINA-9910627244003321 |
Gateway East, Singapore : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|