Emerging Trends in Expert Applications and Security : Proceedings of ICE-TEAS 2024, Volume 2 / / edited by Vijay Singh Rathore, Vincenzo Piuri, Rosalina Babo, Vivek Tiwari |
Autore | Rathore Vijay Singh |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (473 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
PiuriVincenzo
BaboRosalina TiwariVivek |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Data protection Artificial intelligence Computational Intelligence Data and Information Security Artificial Intelligence |
ISBN | 981-9739-91-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910887877803321 |
Rathore Vijay Singh | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Emerging Trends in Expert Applications and Security : Proceedings of ICE-TEAS 2024, Volume 1 |
Autore | Rathore Vijay Singh |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (421 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
Manuel R. S. TavaresJoão
TubaEva DevedzicVladan |
Collana | Lecture Notes in Networks and Systems Series |
Soggetto topico |
Expert systems (Computer science)
Computer security |
ISBN |
9789819737451
9819737451 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors -- Applications and Challenges of Machine Learning (ML) in Cyber Security -- 1 Introduction -- 2 Application of ML in Cybersecurity -- 2.1 Cyberthreat Identification and Security -- 2.2 AI-Based Software for Virus Detection -- 2.3 Behavior Modeling -- 2.4 Fighting AI-Based Threats -- 2.5 Network Intrusion Detection -- 2.6 Monitoring of Emails -- 2.7 Malware Detection and Classification -- 2.8 Watering Hole -- 2.9 Remote Exploitation -- 3 Challenges -- 4 Conclusion -- References -- Detection of Sleep Apnea Using Vital Parameters and Continuous Monitoring Using Cloud Storage -- 1 Introduction -- 1.1 Characteristics of Embedded Systems -- 1.2 Application Specific Systems -- 1.3 Reactive Systems -- 2 Related Works -- 2.1 Public M-Health Service Realization in the License-Free Spectrum -- 2.2 A Decentralized Plan for the Control of the Interactions Between Base-Based Health Monitoring UAVS -- 2.3 How Well a Multi-Tier Wireless Network Monitors Health Care -- 2.4 In Regard to the Levy-Walk Nature of Human Mobility, in the IEEE/ACM TORN |
Record Nr. | UNINA-9910890189203321 |
Rathore Vijay Singh | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Universal Threats in Expert Applications and Solutions : Proceedings of 3rd UNI-TEAS 2024, Volume 1 / / edited by Vijay Singh Rathore, Joao Manuel R. S. Tavares, B. Surendiran, Anil Yadav |
Autore | Rathore Vijay Singh |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (509 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
TavaresJoao Manuel R. S
SurendiranB YadavAnil |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Data protection Artificial intelligence Computational Intelligence Data and Information Security Artificial Intelligence |
ISBN |
9789819738106
9789819738090 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors -- An Advanced Algorithm and Utility for Identifying Critical Web Vulnerabilities with Exceptional Performance -- 1 Introduction -- 1.1 Automated Testing Mechanisms -- 1.2 Use of Machine Learning Techniques -- 1.3 Techniques for Reducing Input Data Space -- 1.4 Scanning Tool Development -- 2 Considered Website Vulnerability -- 2.1 SQL Injection -- 2.2 Cross-Site Scripting -- 3 Related Study -- 4 Proposed and Improved Algorithms -- 5 Algorithm for Detecting XSS -- 6 Enhancing Vulnerability Detection through the Application of Machine Learning -- 7 Scanning Tool -- 8 Systematic Flow of GKD Website Scanner -- 9 Conclusion -- References -- Potential Impacts of Online-Based Learning 2.0 and Certification on Employability -- 1 Introduction -- 1.1 Background -- 1.2 Statement of the Problem -- 1.3 Study Rationale -- 1.4 Purpose of This Work -- 1.5 Limitations and Scope of the Work -- 1.6 Research Hypothesis -- 2 Research Methodology -- 2.1 The Sample Size of the Work -- 2.2 Data Collection -- 3 Data Analysis, Results, and Discussions -- 3.1 Average Age -- 3.2 Education Background -- 3.3 Employment -- 3.4 Online Certification -- 3.5 Online-Based Certification Availability -- 3.6 Online-Based Certification Acceptance -- 3.7 Online Certification Improves Skill Development -- 3.8 Online-Based Certification Increases Employability -- 3.9 Online Learning Fosters the Development of Reflective and Critical Thinking -- 3.10 Online Education is Useful for a Wide Range of Professions in Many Industries -- 3.11 Online-Based Learning Provides Knowledge as Required -- 3.12 Online Learning is Advantageous for Career Development and Ongoing Education -- 4 Conclusion -- References.
An Intelligent Self-Driving Car's Design and Development, Including Lane Detection Using ROS and Machine Vision Algorithms -- 1 Existing Work -- 2 Proposed System -- 2.1 Mechanical -- 2.2 Electrical -- 2.3 Algorithm and Machine Vision -- 3 Implementation -- 3.1 Canny Edge Detection -- 3.2 Region of Interest -- 3.3 Hough Transform -- 3.4 Average Slope Intercept -- 3.5 Curvature Calculation -- 3.6 Sliding Window Approach -- 4 Results and Discussion -- 5 Conclusion -- References -- Text Summarization for Kannada Text Documents: A Review -- 1 Introduction -- 2 Review of Literature -- 3 Datasets -- 3.1 Kannada Treebank -- 3.2 Kannada-MNIST: A New Handwritten Digit Dataset for the Kannada Language -- 3.3 Samanantar: Parallel Corpora Collection for 11 Indic Languages -- 3.4 MLe2e -- 3.5 IndicCorp -- 4 Evaluation Measures -- 5 Conclusion and Future Works -- References -- Solar Panel Tracking with Battery-Assisted and Battery Charging Modes -- 1 Introduction -- 2 Literature Review -- 3 Methods and Materials -- 3.1 Implementation Using MATLAB -- 3.2 Charging Mode -- 3.3 Discharging Mode -- 4 Results and Discussion -- 4.1 Hardware Implementation -- 5 Conclusion -- References -- Elevator-Based Earth Tremor Sentinel Technique with MQTT Protocol -- 1 Introduction -- 2 Related Work -- 2.1 Perseverance of Artificial Neural Networks (ANN) in Elevators -- 2.2 Purpose of Accelerometer in Elevators -- 2.3 Precedence of MQTT -- 3 Methodology -- 3.1 The Layout of the Proposed Model -- 3.2 Machine Learning Models for Earthquake Detection -- 3.3 Programming an AI Neural Network -- 4 Discussion -- 5 Conclusion -- References -- An Efficient System Model for Identification of Drug Addiction -- 1 Introduction -- 2 Related Work -- 3 Prpopsed Methodology -- 3.1 Attribute Selection -- 3.2 ID3 Algorithm -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References. Design and Analysis of a Multipath Routing Protocol to Enhance QoS in MANET -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Proposed Algorithm -- 4 Results Analysis -- 4.1 Simulation Parameters -- 4.2 Packet Sents -- 4.3 Packet Receives -- 4.4 Percentage of Data Receives (PDR) -- 4.5 Normal Routing Load (NRL) -- 5 Conclusion -- References -- Tagging of Uterine Cervix Cases at Cell and Slide Level Through Transfer Learning -- 1 Introduction -- 1.1 Deep Neural Network -- 1.2 Transfer Learning -- 1.3 ResNet50 -- 1.4 Cervical Cancer -- 2 Literature Review -- 3 Material and Method -- 3.1 Data -- 3.2 Methodology -- 4 Result and Analysis -- References -- Estimation of Medical Expenses Using Machine Learning -- 1 Introduction -- 2 Methodology Applied -- 2.1 Dataset -- 2.2 Feature Engineering -- 2.3 Feature Importance Analysis -- 3 Used Models and Algorithms -- 4 Experiment Results -- 5 Conclusion -- Challenges in Making OCR of Gujarati Newspaper -- 1 Introduction -- 2 Review of Literature -- 2.1 Review on Segmentation -- 2.2 Review on Recognition Text -- 3 Problem in Gujrati Language Newspaper -- 3.1 Scanner Image Quality -- 3.2 Background Noise -- 3.3 Font and Style Variation -- 3.4 Text Size Variation -- 3.5 Complex Ligatures in the Script -- 3.6 Limited Trained Data -- 4 Observation -- 5 Conclusion -- References -- A Hybrid Methodology for Software Development and IT Team Analysis in Manufacturing -- 1 Introduction -- 2 Methods -- 2.1 A Comparison of Project Durations Before and After Model Release -- 2.2 Before and After the Model's Release on DRE -- 2.3 A Comparison of the Costs of Development and Maintenance -- 2.4 Criticality-Based Development to Maintenance Ratio of a Project -- 2.5 A Maintenance Ratio Determined by the Number of Lines of Code -- 3 Conclusion -- References. AI Enabled Convolutional Neural Networks to Detect Brain Tumors -- 1 Introduction -- 2 Literature Review -- 3 Problem Statement -- 4 Proposed Methodology -- 4.1 Image Database -- 4.2 Data Augmentation with Pre-Processing -- 4.3 Data Split -- 5 Results -- 6 Analysis -- 7 Conclusion -- References -- Increasing Productivity in Software Development Through the Use of Docker Technology -- 1 Introduction of Dockers -- 1.1 Docker -- 1.2 Docker File -- 1.3 Docker Image -- 2 Experiment -- 2.1 Docker Java Image File -- 2.2 Python-Enabled Docker Image File -- 2.3 Comparative Results -- 3 Conclusion -- 4 Future Scope -- References -- Multimodal Fusion-Based Hybrid CRNN Model for Emotion Prediction in Music -- 1 Introduction -- 1.1 Key Contribution -- 2 Article Organization -- 3 Related Work -- 4 Methodology -- 4.1 Data Description -- 4.2 Pre-Processing -- 4.3 Feature Extraction -- 5 Proposed Model -- 5.1 Multimodel Fusion -- 6 Result and Discussion -- 6.1 Experimental Setup for the Proposed System -- 6.2 Implementation Details -- 7 Conclusion -- References -- Multimodal Analysis of Induction Motor Signals for Power Quality Abnormality Detection Using Wavelet-RBF Approach -- 1 Introduction -- 2 Research Contribution -- 3 Proposed Methodology -- 3.1 Wavelet Transform -- 3.2 RBF Neural Networks -- 4 Result Analysis and Discussion -- 4.1 Vibration Analysis Using Sensor and Current Transformer -- 5 Conclusion -- References -- Smart Electronic Speaking Glove for Physically Challenged Person -- 1 Introduction -- 1.1 Research Contribution -- 2 Proposed Methodology -- 3 Implementation and Execution -- 3.1 Hardware Description -- 3.2 Implemented in Proteus Simulation -- 4 Result and Discussion -- 5 Conclusion -- References -- COVID-19 Detection Using Fourier-Bessel Series Expansion-Based Dyadic Decomposition and Custom CNN -- 1 Introduction -- 1.1 Author Contribution. 2 Article Organisation -- 3 Related Work -- 4 Methodology -- 4.1 Data Description -- 4.2 Image Preprocessing -- 4.3 FBD Methodology -- 5 Proposed Model -- 5.1 SMOTETomek -- 5.2 Keras Tunner -- 6 Result and Discussion -- 6.1 Experimental Configuration for the Suggested System -- 7 Conclusion -- References -- Instantaneous Interpretation into Sign Language for the Hearing Impaired -- 1 Introduction -- 1.1 Feature Extraction -- 1.2 NLP -- 1.3 CNN -- 2 Literature Survey -- 2.1 Improvement of Speech -- 2.2 Translation from Speech to Sign Language -- 2.3 Converter from Speech to Sign Language -- 3 Proposed Methodology -- 3.1 Deaf People's Model -- 3.2 Mute People Model -- 4 Analysis by Comparison to the Current Model -- 5 Conclusion -- 6 Future Scope -- References -- A Review of Anomaly Based Multiple Intrusion Detection Methods Using a Feature Based Deep Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Correlation of Traditional Technique and ML-Based Technique for Efficient Effort Estimation: In Agile Frameworks -- 1 Introduction -- 2 Related Work -- 2.1 Non-Algorithmic Technique-Based Effort Estimation in Agile -- 2.2 Algorithmic Technique-Based Effort Estimation in Agile -- 2.3 Machine Learning-Based Effort Estimation in Agile -- 3 Research Objective -- 3.1 Research Question -- 3.2 Question Objective -- 4 Research Methodology -- 4.1 (RQ1) What Are the Various Traditional Techniques for Effort Estimation in an Agile Context? -- 4.2 (RQ2) What Are the Different ML Techniques for Effort Estimation in an Agile Context? -- 4.3 (RQ3) Which ML Algorithm Outperformed Among Themselves and What Are the Different Metrics Used to Determine the Accuracy of ML Techniques? -- 5 Results -- 6 Conclusion and Discussion -- References. NLP-Based Processing of Gujarati Compound Word Sandhi's Generation and Segmentation. |
Record Nr. | UNINA-9910878978003321 |
Rathore Vijay Singh | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Universal Threats in Expert Applications and Solutions : Proceedings of 3rd UNI-TEAS 2024, Volume 2 |
Autore | Rathore Vijay Singh |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (481 pages) |
Altri autori (Persone) |
PiuriVincenzo
BaboRosalina SKarthik |
Collana | Lecture Notes in Networks and Systems Series |
ISBN |
9789819751464
9819751462 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910911287403321 |
Rathore Vijay Singh | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|