top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Emerging Trends in Expert Applications and Security : Proceedings of ICE-TEAS 2024, Volume 2 / / edited by Vijay Singh Rathore, Vincenzo Piuri, Rosalina Babo, Vivek Tiwari
Emerging Trends in Expert Applications and Security : Proceedings of ICE-TEAS 2024, Volume 2 / / edited by Vijay Singh Rathore, Vincenzo Piuri, Rosalina Babo, Vivek Tiwari
Autore Rathore Vijay Singh
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (473 pages)
Disciplina 005.8
Altri autori (Persone) PiuriVincenzo
BaboRosalina
TiwariVivek
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Data protection
Artificial intelligence
Computational Intelligence
Data and Information Security
Artificial Intelligence
ISBN 981-9739-91-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910887877803321
Rathore Vijay Singh  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging Trends in Expert Applications and Security : Proceedings of ICE-TEAS 2024, Volume 1
Emerging Trends in Expert Applications and Security : Proceedings of ICE-TEAS 2024, Volume 1
Autore Rathore Vijay Singh
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (421 pages)
Disciplina 005.8
Altri autori (Persone) Manuel R. S. TavaresJoão
TubaEva
DevedzicVladan
Collana Lecture Notes in Networks and Systems Series
Soggetto topico Expert systems (Computer science)
Computer security
ISBN 9789819737451
9819737451
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors -- Applications and Challenges of Machine Learning (ML) in Cyber Security -- 1 Introduction -- 2 Application of ML in Cybersecurity -- 2.1 Cyberthreat Identification and Security -- 2.2 AI-Based Software for Virus Detection -- 2.3 Behavior Modeling -- 2.4 Fighting AI-Based Threats -- 2.5 Network Intrusion Detection -- 2.6 Monitoring of Emails -- 2.7 Malware Detection and Classification -- 2.8 Watering Hole -- 2.9 Remote Exploitation -- 3 Challenges -- 4 Conclusion -- References -- Detection of Sleep Apnea Using Vital Parameters and Continuous Monitoring Using Cloud Storage -- 1 Introduction -- 1.1 Characteristics of Embedded Systems -- 1.2 Application Specific Systems -- 1.3 Reactive Systems -- 2 Related Works -- 2.1 Public M-Health Service Realization in the License-Free Spectrum -- 2.2 A Decentralized Plan for the Control of the Interactions Between Base-Based Health Monitoring UAVS -- 2.3 How Well a Multi-Tier Wireless Network Monitors Health Care -- 2.4 In Regard to the Levy-Walk Nature of Human Mobility, in the IEEE/ACM TORN
Record Nr. UNINA-9910890189203321
Rathore Vijay Singh  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Universal Threats in Expert Applications and Solutions : Proceedings of 3rd UNI-TEAS 2024, Volume 1 / / edited by Vijay Singh Rathore, Joao Manuel R. S. Tavares, B. Surendiran, Anil Yadav
Universal Threats in Expert Applications and Solutions : Proceedings of 3rd UNI-TEAS 2024, Volume 1 / / edited by Vijay Singh Rathore, Joao Manuel R. S. Tavares, B. Surendiran, Anil Yadav
Autore Rathore Vijay Singh
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (509 pages)
Disciplina 006.3
Altri autori (Persone) TavaresJoao Manuel R. S
SurendiranB
YadavAnil
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Data protection
Artificial intelligence
Computational Intelligence
Data and Information Security
Artificial Intelligence
ISBN 9789819738106
9789819738090
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgements -- About This Book -- Contents -- Editors and Contributors -- An Advanced Algorithm and Utility for Identifying Critical Web Vulnerabilities with Exceptional Performance -- 1 Introduction -- 1.1 Automated Testing Mechanisms -- 1.2 Use of Machine Learning Techniques -- 1.3 Techniques for Reducing Input Data Space -- 1.4 Scanning Tool Development -- 2 Considered Website Vulnerability -- 2.1 SQL Injection -- 2.2 Cross-Site Scripting -- 3 Related Study -- 4 Proposed and Improved Algorithms -- 5 Algorithm for Detecting XSS -- 6 Enhancing Vulnerability Detection through the Application of Machine Learning -- 7 Scanning Tool -- 8 Systematic Flow of GKD Website Scanner -- 9 Conclusion -- References -- Potential Impacts of Online-Based Learning 2.0 and Certification on Employability -- 1 Introduction -- 1.1 Background -- 1.2 Statement of the Problem -- 1.3 Study Rationale -- 1.4 Purpose of This Work -- 1.5 Limitations and Scope of the Work -- 1.6 Research Hypothesis -- 2 Research Methodology -- 2.1 The Sample Size of the Work -- 2.2 Data Collection -- 3 Data Analysis, Results, and Discussions -- 3.1 Average Age -- 3.2 Education Background -- 3.3 Employment -- 3.4 Online Certification -- 3.5 Online-Based Certification Availability -- 3.6 Online-Based Certification Acceptance -- 3.7 Online Certification Improves Skill Development -- 3.8 Online-Based Certification Increases Employability -- 3.9 Online Learning Fosters the Development of Reflective and Critical Thinking -- 3.10 Online Education is Useful for a Wide Range of Professions in Many Industries -- 3.11 Online-Based Learning Provides Knowledge as Required -- 3.12 Online Learning is Advantageous for Career Development and Ongoing Education -- 4 Conclusion -- References.
An Intelligent Self-Driving Car's Design and Development, Including Lane Detection Using ROS and Machine Vision Algorithms -- 1 Existing Work -- 2 Proposed System -- 2.1 Mechanical -- 2.2 Electrical -- 2.3 Algorithm and Machine Vision -- 3 Implementation -- 3.1 Canny Edge Detection -- 3.2 Region of Interest -- 3.3 Hough Transform -- 3.4 Average Slope Intercept -- 3.5 Curvature Calculation -- 3.6 Sliding Window Approach -- 4 Results and Discussion -- 5 Conclusion -- References -- Text Summarization for Kannada Text Documents: A Review -- 1 Introduction -- 2 Review of Literature -- 3 Datasets -- 3.1 Kannada Treebank -- 3.2 Kannada-MNIST: A New Handwritten Digit Dataset for the Kannada Language -- 3.3 Samanantar: Parallel Corpora Collection for 11 Indic Languages -- 3.4 MLe2e -- 3.5 IndicCorp -- 4 Evaluation Measures -- 5 Conclusion and Future Works -- References -- Solar Panel Tracking with Battery-Assisted and Battery Charging Modes -- 1 Introduction -- 2 Literature Review -- 3 Methods and Materials -- 3.1 Implementation Using MATLAB -- 3.2 Charging Mode -- 3.3 Discharging Mode -- 4 Results and Discussion -- 4.1 Hardware Implementation -- 5 Conclusion -- References -- Elevator-Based Earth Tremor Sentinel Technique with MQTT Protocol -- 1 Introduction -- 2 Related Work -- 2.1 Perseverance of Artificial Neural Networks (ANN) in Elevators -- 2.2 Purpose of Accelerometer in Elevators -- 2.3 Precedence of MQTT -- 3 Methodology -- 3.1 The Layout of the Proposed Model -- 3.2 Machine Learning Models for Earthquake Detection -- 3.3 Programming an AI Neural Network -- 4 Discussion -- 5 Conclusion -- References -- An Efficient System Model for Identification of Drug Addiction -- 1 Introduction -- 2 Related Work -- 3 Prpopsed Methodology -- 3.1 Attribute Selection -- 3.2 ID3 Algorithm -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References.
Design and Analysis of a Multipath Routing Protocol to Enhance QoS in MANET -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 3.1 Proposed Algorithm -- 4 Results Analysis -- 4.1 Simulation Parameters -- 4.2 Packet Sents -- 4.3 Packet Receives -- 4.4 Percentage of Data Receives (PDR) -- 4.5 Normal Routing Load (NRL) -- 5 Conclusion -- References -- Tagging of Uterine Cervix Cases at Cell and Slide Level Through Transfer Learning -- 1 Introduction -- 1.1 Deep Neural Network -- 1.2 Transfer Learning -- 1.3 ResNet50 -- 1.4 Cervical Cancer -- 2 Literature Review -- 3 Material and Method -- 3.1 Data -- 3.2 Methodology -- 4 Result and Analysis -- References -- Estimation of Medical Expenses Using Machine Learning -- 1 Introduction -- 2 Methodology Applied -- 2.1 Dataset -- 2.2 Feature Engineering -- 2.3 Feature Importance Analysis -- 3 Used Models and Algorithms -- 4 Experiment Results -- 5 Conclusion -- Challenges in Making OCR of Gujarati Newspaper -- 1 Introduction -- 2 Review of Literature -- 2.1 Review on Segmentation -- 2.2 Review on Recognition Text -- 3 Problem in Gujrati Language Newspaper -- 3.1 Scanner Image Quality -- 3.2 Background Noise -- 3.3 Font and Style Variation -- 3.4 Text Size Variation -- 3.5 Complex Ligatures in the Script -- 3.6 Limited Trained Data -- 4 Observation -- 5 Conclusion -- References -- A Hybrid Methodology for Software Development and IT Team Analysis in Manufacturing -- 1 Introduction -- 2 Methods -- 2.1 A Comparison of Project Durations Before and After Model Release -- 2.2 Before and After the Model's Release on DRE -- 2.3 A Comparison of the Costs of Development and Maintenance -- 2.4 Criticality-Based Development to Maintenance Ratio of a Project -- 2.5 A Maintenance Ratio Determined by the Number of Lines of Code -- 3 Conclusion -- References.
AI Enabled Convolutional Neural Networks to Detect Brain Tumors -- 1 Introduction -- 2 Literature Review -- 3 Problem Statement -- 4 Proposed Methodology -- 4.1 Image Database -- 4.2 Data Augmentation with Pre-Processing -- 4.3 Data Split -- 5 Results -- 6 Analysis -- 7 Conclusion -- References -- Increasing Productivity in Software Development Through the Use of Docker Technology -- 1 Introduction of Dockers -- 1.1 Docker -- 1.2 Docker File -- 1.3 Docker Image -- 2 Experiment -- 2.1 Docker Java Image File -- 2.2 Python-Enabled Docker Image File -- 2.3 Comparative Results -- 3 Conclusion -- 4 Future Scope -- References -- Multimodal Fusion-Based Hybrid CRNN Model for Emotion Prediction in Music -- 1 Introduction -- 1.1 Key Contribution -- 2 Article Organization -- 3 Related Work -- 4 Methodology -- 4.1 Data Description -- 4.2 Pre-Processing -- 4.3 Feature Extraction -- 5 Proposed Model -- 5.1 Multimodel Fusion -- 6 Result and Discussion -- 6.1 Experimental Setup for the Proposed System -- 6.2 Implementation Details -- 7 Conclusion -- References -- Multimodal Analysis of Induction Motor Signals for Power Quality Abnormality Detection Using Wavelet-RBF Approach -- 1 Introduction -- 2 Research Contribution -- 3 Proposed Methodology -- 3.1 Wavelet Transform -- 3.2 RBF Neural Networks -- 4 Result Analysis and Discussion -- 4.1 Vibration Analysis Using Sensor and Current Transformer -- 5 Conclusion -- References -- Smart Electronic Speaking Glove for Physically Challenged Person -- 1 Introduction -- 1.1 Research Contribution -- 2 Proposed Methodology -- 3 Implementation and Execution -- 3.1 Hardware Description -- 3.2 Implemented in Proteus Simulation -- 4 Result and Discussion -- 5 Conclusion -- References -- COVID-19 Detection Using Fourier-Bessel Series Expansion-Based Dyadic Decomposition and Custom CNN -- 1 Introduction -- 1.1 Author Contribution.
2 Article Organisation -- 3 Related Work -- 4 Methodology -- 4.1 Data Description -- 4.2 Image Preprocessing -- 4.3 FBD Methodology -- 5 Proposed Model -- 5.1 SMOTETomek -- 5.2 Keras Tunner -- 6 Result and Discussion -- 6.1 Experimental Configuration for the Suggested System -- 7 Conclusion -- References -- Instantaneous Interpretation into Sign Language for the Hearing Impaired -- 1 Introduction -- 1.1 Feature Extraction -- 1.2 NLP -- 1.3 CNN -- 2 Literature Survey -- 2.1 Improvement of Speech -- 2.2 Translation from Speech to Sign Language -- 2.3 Converter from Speech to Sign Language -- 3 Proposed Methodology -- 3.1 Deaf People's Model -- 3.2 Mute People Model -- 4 Analysis by Comparison to the Current Model -- 5 Conclusion -- 6 Future Scope -- References -- A Review of Anomaly Based Multiple Intrusion Detection Methods Using a Feature Based Deep Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussions -- 5 Conclusion -- References -- Correlation of Traditional Technique and ML-Based Technique for Efficient Effort Estimation: In Agile Frameworks -- 1 Introduction -- 2 Related Work -- 2.1 Non-Algorithmic Technique-Based Effort Estimation in Agile -- 2.2 Algorithmic Technique-Based Effort Estimation in Agile -- 2.3 Machine Learning-Based Effort Estimation in Agile -- 3 Research Objective -- 3.1 Research Question -- 3.2 Question Objective -- 4 Research Methodology -- 4.1 (RQ1) What Are the Various Traditional Techniques for Effort Estimation in an Agile Context? -- 4.2 (RQ2) What Are the Different ML Techniques for Effort Estimation in an Agile Context? -- 4.3 (RQ3) Which ML Algorithm Outperformed Among Themselves and What Are the Different Metrics Used to Determine the Accuracy of ML Techniques? -- 5 Results -- 6 Conclusion and Discussion -- References.
NLP-Based Processing of Gujarati Compound Word Sandhi's Generation and Segmentation.
Record Nr. UNINA-9910878978003321
Rathore Vijay Singh  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Universal Threats in Expert Applications and Solutions : Proceedings of 3rd UNI-TEAS 2024, Volume 2
Universal Threats in Expert Applications and Solutions : Proceedings of 3rd UNI-TEAS 2024, Volume 2
Autore Rathore Vijay Singh
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (481 pages)
Altri autori (Persone) PiuriVincenzo
BaboRosalina
SKarthik
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819751464
9819751462
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910911287403321
Rathore Vijay Singh  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui