top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Inventive Communication and Computational Technologies : Proceedings of ICICCT 2023 / / edited by G. Ranganathan, George A. Papakostas, and Álvaro Rocha
Inventive Communication and Computational Technologies : Proceedings of ICICCT 2023 / / edited by G. Ranganathan, George A. Papakostas, and Álvaro Rocha
Edizione [First edition.]
Pubbl/distr/stampa Singapore : , : Springer, , [2023]
Descrizione fisica 1 online resource (1127 pages)
Disciplina 929.605
Collana Lecture Notes in Networks and Systems Series
Soggetto topico Communication - Technological innovations
ISBN 981-9951-66-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Mitigating Vanishing Gradient in SGD Optimization in Neural Networks -- 1 Introduction -- 2 Gradient Descent Optimization -- 2.1 Scope Identified -- 3 Vanishing Gradient Problem -- 4 Activation Functions -- 4.1 Saturated Activation Function -- 4.2 Unsaturated Activation Function -- 5 Adaptive Optimization Methods -- 6 Other Solutions for VGP -- 6.1 Batch Normalization -- 6.2 Gradient Clipping -- 6.3 Weight Initialization -- 7 Conclusion -- References -- A Comparative Analysis of Heart Disease Diagnosis with Machine Learning Models -- 1 Introduction -- 2 Related Works -- 3 Materials and Methods -- 3.1 Heart Disease Dataset -- 3.2 Machine Learning Models -- 3.3 Proposed Framework -- 4 Experimental Results -- 4.1 Settings -- 4.2 Evaluation Metrics -- 4.3 Results and Discussion -- 4.4 Examples of Heart Disease Diagnosis -- 5 Conclusions -- References -- The Impact of Information System and Technology of Courier Service During Pandemic -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Types of Research -- 3.2 Variable -- 3.3 Population -- 3.4 Sample -- 3.5 Types of Data -- 3.6 Data Collection Technique -- 3.7 Data Analysis Technique -- 4 Research Result and Discussion -- 5 Conclusion -- References -- Event Detection in Social Media Analysis: A Survey -- 1 Introduction -- 2 Literature Review -- 3 Localized Burst Detection -- 4 Global Burst Detection -- 5 Conclusion -- References -- Artificial Intelligence Mechanism to Predict the Effect of Bone Mineral Densıty in Endocrıne Diseases-A Review -- 1 Introduction -- 2 Bone Fracture -- 2.1 Faster R-CNN -- 2.2 Fivefold Cross-Validation -- 2.3 Deep Learning-Based Object Detection Model -- 3 Bone Metabolısm -- 3.1 Bone Tissue Growth -- 4 BMD and Osteoporosis -- 5 Bone Mass in Endocrine Disease -- 5.1 Diabetes Mellitus.
5.2 Thyroid and Diabetes Mellitus -- 6 Summary and Conclusion -- References -- Evaluation of Deep Learning CNN Models with 24 Metrics Using Soybean Crop and Broad-Leaf Weed Classification -- 1 Introduction -- 2 Related Works -- 2.1 Weed Detection in the Maize Field -- 2.2 Estimating Weed Growth -- 2.3 Multi-classification of Weeds Using HSI Images -- 2.4 Weed Density Estimation -- 2.5 Detecting Cotton Weeds Using Yolo Object Detector -- 2.6 Weed Detection at an Early Stage -- 3 Materials and Methods -- 3.1 Module 1-Data Pre-processing -- 3.2 Module 2-Classification of Crop and Weed -- 3.3 Module 3-Performance Evaluation -- 4 Experimental Results -- 4.1 Results and Discussions -- 4.2 Graphs-Confusion Matrix and ROC Curve -- 5 Conclusion and Future Enhancements -- 5.1 Conclusion -- 5.2 Future Enhancements -- References -- Bluetooth Controlled Integrated Robotic Arm with Temperature and Moisture Sensor Modules -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Implementation Strategy -- 3.2 Block Diagram -- 4 Discussion -- 5 Results -- 6 Conclusion -- References -- Image Dehazing Using Generic Model Agnostic Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Results and Discussions -- 4.1 Running Time Comparison -- 4.2 PSNR Value Comparison -- 5 Conclusion -- References -- A Novel Approach to Build Privacy and Trust in Vehicle Sales Using DID -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Creation of User DID -- 3.2 Creation of Vehicle DID and ERC-721 Token -- 3.3 Credential Issuance by the Issuer -- 3.4 Vehicle Transfer to Buyer -- 3.5 Pollution Certificate Issuance -- 4 Results and Discussions -- 5 Conclusion -- References -- Bipolar Disease Data Prediction Using Adaptive Structure Convolutional Neuron Classifier Using Deep Learning -- 1 Introduction -- 2 Literature Survey.
3 Proposed Method -- 3.1 Bipolar Data Preprocessing Using ISF2 -- 3.2 Scaled Features Chi-Square Testing (SFCsT) -- 3.3 Softmax Neural Activation Function -- 3.4 Classification Based on Adaptive Structure Convolutional Neuron Classifier (ASCNC) -- 4 Result and Discussion -- 5 Conclusion -- References -- Oceanographic and Hydrological Study of the Moroccan Atlantic Coast: Focus on the Upwelling -- 1 Introduction -- 2 Study Area -- 3 Methodology of Study -- 4 Results and Discussion -- 4.1 Hydrology and Variation of the Surface Water Masses' Temperature -- 4.2 Salinity of Atlantic Surface Water Bodies -- 4.3 Dissolved Oxygen -- 4.4 Description of the Upwelling Process on the Moroccan Atlantic Coast by Remote Sensing -- 5 Conclusion -- References -- The Acceptance of Artificial Intelligence in the Commercial Use of Crypto-Currency and Blockchain Systems -- 1 Introduction -- 2 Literature Review and Hypotheses Development -- 2.1 Blockchain and the Use of Crypto-currencies in Supply Chain Supply Chain Operations? -- 2.2 Links Between the Theory of Reasoned Action and the Theory of Planned Behavior -- 2.3 The Theory of Reasoned Action and Technological Acceptance -- 2.4 Technology Acceptance Model -- 2.5 Acceptance and Use of Technology: Unified Theory -- 2.6 Planned Behavior Theory -- 2.7 Behavioral Reasoning Theory (BRT) -- 2.8 Decision Theories -- 2.9 Theory of Flow -- 3 How to Use ICT in Guiding? -- 4 Establishing Constructive Collaboration Through Technology Channels -- 5 The Empirical Model -- 6 Results and Discussions -- 7 Conclusion -- References -- Deep Hybrid Model with Trained Weights for Multimodal Sarcasm Detection -- 1 Introduction -- 2 Literature Survey -- 3 Preprocessing, Feature Extraction and Feature Level Fusion Process -- 3.1 Preprocessing -- 3.2 Feature Extraction.
4 Hybrid RNN and Optimized LSTM for Multimodal Sarcasm Detection (Hromsd) -- 4.1 RNN -- 4.2 Optimized LSTM -- 4.3 Improved Bald Eagle Search Optimization for Training LSTM -- 5 Final Outcome and Discussions of HROMSD -- 5.1 Simulation Procedure -- 5.2 Dataset Description -- 5.3 Validate the Performance of the HROMSD Regarding Positive Measure -- 6 Conclusion -- References -- InsuraChain: A Blockchain-Based Parametric Health Insurance Platform -- 1 Introduction -- 1.1 Research Contribution -- 2 Related Works -- 3 Systems in Place -- 3.1 Traditional Insurance -- 3.2 Cashless Insurance -- 4 Proposed System -- 4.1 Comparison with Systems in Place -- 5 Architecture -- 6 Implementation -- 6.1 IPFS -- 6.2 Smart Contracts -- 6.3 Web Interface -- 6.4 Flow of Events -- 7 Results and Discussion -- 8 Future Works -- 8.1 Digital Currency -- 8.2 Image Recognition -- 9 Conclusion -- References -- Automating Audio Attack Vectors -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Circuit Design -- 3.2 PoC Tool -- 3.3 Laser Attack -- 3.4 Psychoacoustic Attack -- 4 Results and Discussion -- 4.1 PoC Tool -- 4.2 Laser Attack -- 4.3 Psychoacoustic Attack -- 5 Conclusion -- 5.1 PoC Tool -- 5.2 Laser Attack -- 5.3 Psychoacoustic Attack -- 6 Future Work -- References -- Child Detection by Utilizing Touchscreen Behavioral Biometrics on Mobile -- 1 Introduction -- 2 Literature Survey -- 2.1 Background -- 2.2 Related Work Implications -- 3 Experimental Setup -- 4 Models Used and Their Results -- 4.1 LightGBM -- 4.2 XGBOOST -- 4.3 ANN (Artificial Neural Network) -- 4.4 Support Vector Machine (SVM) -- 4.5 K-Nearest Neighbors (KNN) -- 5 Evaluation Metrics -- 5.1 Final Accuracies -- 5.2 ROC Curves -- 6 Conclusions -- 6.1 Limitations -- 6.2 Future Scope -- References -- Hand Gesture-Controlled Wheelchair -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Working.
4.1 Circuit Diagram of Transmitter -- 4.2 Circuit Diagram of Receiver -- 4.3 Functional Table -- 4.4 Merits and Demerits Table -- 4.5 Flowcharts -- 4.6 Need of Project -- 5 Summary and Conclusion -- References -- Decentralized Evidence Storage System Using Blockchain and IPFS -- 1 Introduction -- 2 Problems in Current System -- 3 Solution Using Blockchain and IPFS -- 4 Working of the System -- 5 Implementation -- 6 Security and Privacy Considerations -- 6.1 Consensus Mechanism -- 6.2 Encryption -- 6.3 Network Security -- 6.4 Privacy -- 6.5 Auditability -- 6.6 Legal Compliance -- 7 Comparison with Centralized Storage Solutions -- 7.1 Security -- 7.2 Privacy -- 7.3 Decentralization -- 7.4 Speed -- 7.5 Cost -- 8 Advantages of Proposed System -- 8.1 Improvement in Transparency -- 8.2 Evidence Remains Immutable -- 8.3 Restore Trust of People in Courts -- 8.4 Improve Courts' Efficiency -- 8.5 Higher Performance -- 8.6 Minimized Storage Costs -- 8.7 Reliable -- 9 Use Cases and Applications of the System -- 9.1 Legal and Regulatory Compliance -- 9.2 Supply Chain Management -- 9.3 Intellectual Property Protection -- 9.4 Digital Identity Verification -- 9.5 Evidence Collection and Preservation -- 9.6 Decentralized File Sharing -- 10 Limitations and Future Scope -- 11 Conclusion -- References -- Investigation of DCF Length and Input Power Selection for Optical Transmission Systems -- 1 Introduction -- 2 Simulative Setup -- 3 Results and Discussion -- 4 Conclusion -- References -- Resource Optimization with Digital Twins Using Intelligent Techniques for Smart Healthcare Management -- 1 Introduction -- 2 Digital Twin -- 3 Digital Twin Technologies -- 4 Literature Review -- 4.1 Related Work -- 5 Reflection Model Based on Digital Twin -- 6 Machine Learning and Optimization -- 6.1 Logistic Regression ML Model -- 7 Proposed Optimization Model Based on Digital Twin.
8 Results.
Record Nr. UNINA-9910746961303321
Singapore : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Inventive communication and computational technologies : proceedings of ICICCT 2021 / / G. Ranganathan, Xavier Fernando, Fuqian Shi, editors
Inventive communication and computational technologies : proceedings of ICICCT 2021 / / G. Ranganathan, Xavier Fernando, Fuqian Shi, editors
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (1016 pages)
Disciplina 004.6
Collana Lecture notes in networks and systems
Soggetto topico Telecommunication systems
Computer networks
ISBN 981-16-5528-6
981-16-5529-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti ICICCT 2021
Record Nr. UNINA-9910743388603321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Inventive communication and computational technologies : proceedings of ICICCT 2020 ; 28-29 May 2020, Gnanamani College of Technology, Tamil Nadu, India / / editors, G. Ranganathan, Joy Chen, Álvaro Rocha
Inventive communication and computational technologies : proceedings of ICICCT 2020 ; 28-29 May 2020, Gnanamani College of Technology, Tamil Nadu, India / / editors, G. Ranganathan, Joy Chen, Álvaro Rocha
Edizione [1st edition 2021.]
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (XXXIV, 1000 p. 612 illus., 424 illus. in color.)
Disciplina 004.6
Collana Lecture Notes in Networks and Systems
Soggetto topico Computer networks
ISBN 981-15-7345-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Mathematical Modeling of the Data Processing Problems of Heat Experiments based on Multi- Processor Computing Complexes -- Analysis of Image Processing Techniques to Segment the Target Animal in Non-Uniformly Illuminated and Occluded Images -- Enhanced Speeded Up Robust Feature with Bag of Grapheme (Esurf-Bog) for Tamil Palm Leaf Character Recognition -- Traffic Sign Recognition System (TSRS): SVM and Convolutional Neural Network -- Agro Advisory System Using Big Data Analytics -- Automatic Face Recognition and Finding Occurrence of Actors in Movies -- Recurrent Neural Network based Character Recognition System for Tamil Palm Leaf Manuscript Using Stroke Zoning.
Record Nr. UNINA-9910484347103321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Inventive Communication and Computational Technologies : Proceedings of ICICCT 2019 / / edited by G. Ranganathan, Joy Chen, Álvaro Rocha
Inventive Communication and Computational Technologies : Proceedings of ICICCT 2019 / / edited by G. Ranganathan, Joy Chen, Álvaro Rocha
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XLVI, 1415 p. 708 illus., 520 illus. in color.)
Disciplina 004.6
Collana Lecture Notes in Networks and Systems
Soggetto topico Electrical engineering
Wireless communication systems
Mobile communication systems
Mobile computing
Big data
Artificial intelligence
Communications Engineering, Networks
Wireless and Mobile Communication
Mobile Computing
Big Data/Analytics
Artificial Intelligence
ISBN 981-15-0146-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Enhanced Security Mechanism in Cloud based on DNA Excess 3 Codes -- Tensorflow Based Semantic Techniques For Multi-Cloud Applications Portability And Interoperability -- Enhancing High Availability for NoSQL Database Systems using Failover Techniques -- Implementation of Automated Bottle Filling System using PLC -- An Integrated Approach to Network Intrusion Detection and Prevention.
Record Nr. UNINA-9910373904103321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Pervasive computing and social networking : proceedings of ICPCSN 2022 / / G. Ranganathan, Robert Bestak and Xavier Fernando, editors
Pervasive computing and social networking : proceedings of ICPCSN 2022 / / G. Ranganathan, Robert Bestak and Xavier Fernando, editors
Pubbl/distr/stampa Singapore : , : Springer, , [2023]
Descrizione fisica 1 online resource (799 pages)
Disciplina 302.30285
Collana Lecture Notes in Networks and Systems
Soggetto topico Online social networks
ISBN 981-19-2840-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910627269803321
Singapore : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Pervasive computing and social networking : proceedings of ICPCSN 2021 / / G. Ranganathan [and three others] editors
Pervasive computing and social networking : proceedings of ICPCSN 2021 / / G. Ranganathan [and three others] editors
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (767 pages)
Disciplina 006.31
Collana Lecture Notes in Networks and Systems
Soggetto topico Machine learning
ISBN 981-16-5640-1
981-16-5639-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910743372203321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Soft computing for security applications : proceedings of ICSCS 2022 / / edited by G. Ranganathan, Xavier Fernando and Selwyn Piramuthu
Soft computing for security applications : proceedings of ICSCS 2022 / / edited by G. Ranganathan, Xavier Fernando and Selwyn Piramuthu
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2023]
Descrizione fisica 1 online resource (754 pages)
Disciplina 005.8
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computer security
Soft computing
ISBN 981-19-3590-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Smart Question Paper Evaluation: Automated Approach Using the Jaccard Similarity -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 4 Results -- 5 Conclusion -- References -- Smart Patterns: Searching a Pattern in the Unknown Environment Using Hybrid Framework -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 4 Results -- 5 Conclusion -- References -- Image Processing Techniques for PCB Board Fault Analysis with Object Extraction and Measurements -- 1 Introduction -- 2 Related Works -- 2.1 Image Processing Application for "E-Waste" Handling -- 3 Imaging Analysis -- 3.1 Missing Holes Detection Using Imaging -- 3.2 Open-Circuit Detection Using Imaging -- 3.3 Short-Circuit Detection Using Imaging -- 4 Result and Discussion -- 5 Conclusion -- References -- Gamification of Knowledge Management System: A Framework to Incentivize Knowledge Sharing for the Software Industry -- 1 Introduction -- 2 Literature Review -- 2.1 Knowledge Management -- 2.2 Gamification -- 2.3 Gamification and Incentives in KMS -- 2.4 Existing Frameworks of Applying Gamification in Knowledge Management Systems. -- 3 Methodology -- 3.1 Research Method -- 3.2 Data Collection Technique -- 3.3 Sample Size -- 4 Results and Interpretation -- 4.1 Outcome for Research Questions -- 4.2 Proposed Framework for the Gamification of a KMS -- 4.3 Evaluation of Proposed Framework -- 5 Conclusion -- References -- Privacy Attributes Aware Framework in Information Disclosure Models for Public During Pandemic -- 1 Introduction -- 2 Related Work -- 3 Privacy Attributes Aware (PAA) Information Disclosure Model -- 4 Experimental Results -- 5 Conclusion -- References -- Role of Resource Description Framework in Knowledge Discovery in World Wide Web -- 1 Introduction -- 1.1 Role of RDF in Semantic Web.
2 State of Current Research in Semantic Web -- 3 Conceptual Model -- 3.1 Application Architecture -- 4 Experimental Results and Discussions -- 5 Conclusion and Scope for Future Work -- References -- A Comparative Analysis of Deep Learning-Based Frameworks for Face Vitality Detection -- 1 Introduction -- 2 Deep Learning in Face PAD Mechanism -- 2.1 Deep Features-Based Face PAD Models -- 3 Analysis -- 4 Research Observations and Discussions -- 5 Conclusions -- References -- Prediction of Students Programming Performance Using Naïve Bayesian and Decision Tree -- 1 Introduction -- 2 Related Works -- 3 Background -- 3.1 Naïve Bayes -- 3.2 Decision Tree -- 4 Experiment and Result -- 4.1 Data Collection -- 4.2 Preprocessing -- 4.3 Classification -- 4.4 Post-processing -- 5 Conclusion and Future Work -- References -- The Investigation of Network Security, Including Penetrating Threats and Potential Security Measures -- 1 Introduction -- 2 Attack Forms -- 3 Network Security Technologies -- 4 Advanced Security Policies for Networks -- 5 Conclusion -- References -- A Review on Rice Quality Analysis -- 1 Introduction -- 2 Methodologies for Rice Quality Analysis -- 2.1 Spectroscopic Techniques -- 2.2 Hyperspectral Imaging -- 2.3 Physio-chemical Properties -- 2.4 Polarimetric Method -- 2.5 Discussion -- 3 Conclusion -- References -- Hybrid MPPT-Based Efficiency Improvement of Renewable Energy System Using Step-Up Converter -- 1 Introduction -- 2 Modeling of PV Cell -- 3 Need for MPP Tracking -- 4 Proposed Hybrid MPP Algorithm -- 5 Simulation Results and Discussion -- 6 Conclusion -- References -- A Review to Enhance Operations in an Airport with a Deep Learning and Computer Vision Approach -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodologies -- 3.1 Face Recognition -- 3.2 Paperless Boarding -- 3.3 Correlating Luggage With Passenger -- 4 Conclusion.
References -- Comparative Analysis of Diabetes Prediction Using Machine Learning -- 1 Introduction -- 2 Related Works -- 2.1 Support Vector Machine (SVM) -- 2.2 Artificial Neural Network (ANN) -- 2.3 Deep Neural Network (DNN) -- 2.4 Convolutional Neural Network (CNN) -- 3 Result and Discussion -- 4 Conclusion -- References -- A Review on Multiparameter Sensor Design for Biomedical SoC Applications -- 1 Introduction -- 1.1 Cardiovascular Disease Diagnosis Methods -- 1.2 Present Wearable Devices for Cardiovascular Disease Monitoring -- 1.3 Wearable Devices Comparative Analysis -- 2 Biomedical Signal Processing Perspective -- 2.1 Photoplethysmograph (PPG) Signal -- 2.2 PPG Signal Characteristics -- 3 Conclusion -- References -- Towards Design of a Novel Android Malware Detection Framework Using Hybrid Deep Learning Techniques -- 1 Introduction -- 2 Related Works -- 3 Proposed Android Malware Detection Framework Using Hybrid Deep Learning Technique -- 3.1 Description of the Pre-processing Stage -- 3.2 Hybrid of the Bidirectional Long Short-Term Memory (BiLSTM) and Merged Sparse Auto-Encoder (MSAE) Deep Learning Models -- 4 Performance Analysis and Discussion -- 4.1 Dataset Description -- 4.2 Results and Discussion -- 5 Conclusion -- References -- A Survey: Secure Cloud Data Storage and Access Control System Using Blockchain -- 1 Introduction -- 2 Literature Review -- 3 Blockchain Technology: Layered Architecture and Types of Network -- 3.1 Blockchain Layered Architecture -- 3.2 Types of Networks -- 4 Access Control Mechanism for Blockchain Technology -- 4.1 Role-Based Access Control -- 4.2 Attribute-Based Encryption -- 4.3 Ciphertext-Policy Attribute-Based Encryption -- 4.4 Multi-level Security Access Control Model -- 4.5 Dynamic Access Control with Cryptography Enforced -- 5 Conclusion and Future Scope -- References.
A Rule-Based Adaptive Mobile Application to Learn Android in a Personalized Learning Environment -- 1 Introduction -- 2 Literature Review -- 2.1 Personalized Learning -- 2.2 Inference Engine and Rete Algorithm -- 2.3 Critical Appraisal of Existing Systems -- 3 Proposed System -- 3.1 Detailed System Architecture -- 3.2 Algorithm and Logic Used -- 4 Results and Interpretation -- 5 Conclusion -- References -- Missing Data Imputation Using Ensemble Learning Technique: A Review -- 1 Introduction -- 2 Imputation Techniques -- 2.1 Single Variable Imputation -- 2.2 Multivariable Imputation -- 3 Ensemble Learning -- 4 Ensemble Learning in Bioinformatics -- 5 Evaluation Metrics -- 6 Conclusion -- References -- Forensic Analysis of Images on Online Social Network: A Survey -- 1 Introduction -- 2 Literature Survey -- 3 Digital Image Forgery Detection Method -- 3.1 Active Forensics -- 3.2 Passive forensics -- 4 Different Datasets that are Associated with Forgery Detection -- 5 Limitations -- 6 Conclusion and Discussion -- References -- Survey on Heart Disease Prediction Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Review -- 2.1 Related Works -- 3 Review on Proposed HD Prediction Using ML Models, Performance Metrics, and the Highest Achievements -- 3.1 Review on Proposed Models -- 3.2 Analysis on Performance Metrics -- 3.3 Analysis on Highest Performance Achievements -- 4 Evaluation on Adopted HD Prediction Using ML Models Along with Chronological Review -- 4.1 Review on Datasets Used for Prediction -- 4.2 Chronological Review -- 5 Features Defined in HD Prediction via ML Models Along with Review of Simulation Tool -- 5.1 Analysis on Extracted Features -- 5.2 Review on Simulation Tool -- 6 Research Gaps and Challenges -- 7 Conclusion -- References -- Machine Learning-Based Forecasting Technique for Crop Yield: A Study -- 1 Introduction.
2 Machine Learning Algorithms: An Overview -- 2.1 Single Learning Models -- 2.2 Hybrid Learning Models -- 2.3 Ensemble Learning Models -- 3 Relevant Literature -- 4 Observations -- 5 Conclusion -- References -- E-commerce Application with Analytics for Pharmaceutical Industry -- 1 Introduction -- 2 Related Work/Literature Survey -- 2.1 Purpose -- 2.2 Methodology -- 2.3 Unsupervised Learning -- 2.4 Pattern Forecast Process -- 3 Conclusion -- References -- Enhanced Crime and Threat Intelligence Hunter with Named Entity Recognition and Sentiment Analysis -- 1 Introduction -- 2 Survey of Existing Cyber Intelligence Tools -- 3 Architectural Design -- 3.1 Crime Type Searching -- 3.2 Domain/IP Searching -- 3.3 Social Media Username Searching -- 3.4 Free Text Searching -- 3.5 Web Crawling and Scraping -- 3.6 Named Entity Recognition -- 3.7 Sentiment Analysis -- 3.8 Knowledge Graph Generation -- 4 System Analysis and Potential Innovations -- 4.1 Interfacing with Multiple Data Sources -- 4.2 Scraping the Deep Web -- 4.3 Training the NER Model -- 5 Limitations and Further Work -- 5.1 Lack of Substantial Training Dataset -- 5.2 Volatility of Deep Web Links -- 5.3 No Mobile Platform and Network Data Stream Support -- 6 Conclusion -- References -- Image Steganography for Confidential Communication and Secured Data Storing -- 1 Introduction -- 2 Related Work -- 3 Proposed Model -- 4 Text in Image Steganography -- 5 Lift Haar Wavelet Transform -- 6 AES Encryption -- 7 Decryption -- 8 Results and Discussion -- 9 Conclusion -- References -- Real Time Analysis of Artificial Neural Network-Based Fault Detection and Fault Location in the AC Microgrid -- 1 Introduction -- 2 Artificial Neural Network (ANN) -- 2.1 Back Propagation Neural Network (BPNN) -- 3 AC Microgrid -- 3.1 Faults -- 4 Methodology of Fault Analysis -- 5 Real Time Analysis of Results Using OP4510 RT-LAB.
6 Simulation Results.
Record Nr. UNINA-9910627244003321
Gateway East, Singapore : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui