Advances in Computational Intelligence and Informatics : Proceedings of ICACII 2023 |
Autore | Chillarige Raghavendra Rao |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (430 pages) |
Altri autori (Persone) |
DistefanoSalvatore
RawatSandeep Singh |
Collana | Lecture Notes in Networks and Systems Series |
ISBN |
9789819747276
9789819747269 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- ICACII2023 Committee -- Foreword -- Preface -- Contents -- Editors and Contributors -- Optimizing Complex Challenges: Harnessing the Power of Genetic Algorithms and the Nelder-Mead Simplex Algorithm for Effective Problem Solving -- 1 Introduction -- 2 Overview of GA and NMA -- 2.1 Genetic Algorithm -- 2.2 Nelder-Mead Algorithm -- 3 Hybrid Genetic Algorithm with Nelder-Mead Simplex Algorithm (HGANM) -- 4 Benchmark Functions -- 4.1 Experimental Configuration -- 4.2 Result and Analysis -- 5 Real-Life Problems -- 5.1 Experimental Setup -- 5.2 Analysis and Outcome -- 6 Conclusion -- References -- State-of-the-Art Techniques and Evaluation Criteria for Mobile Application Offloading in Heterogeneous Networks: A Comprehensive Survey of Computation, Data, and Energy Offloading Approaches -- 1 Introduction -- 2 Background -- 2.1 Offloading Techniques -- 2.2 Literature Survey -- 2.3 Current Gaps in Research and Opportunities for Future Work -- 3 Conclusion -- References -- IDSSA: An Intrusion Detection System with Self-adaptive Capabilities for Strengthening the IoT Network Security -- 1 Introduction -- 1.1 Objectives of the Research -- 2 Related Works -- 3 Proposed System -- 3.1 NSL-KDD Dataset -- 3.2 Preprocessing -- 3.3 DNS and EAT -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Privacy and Security Aspects of Indian Population While Using Online Social Network: An Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Analysis -- 5 Conclusion -- References -- Digital HR Strategy in the Modern Business Environment of Ukraine in Conditions of Uncertainty -- 1 Introduction -- 2 Literature Review -- 3 Methodological Approach -- 4 Conducting the Research and the Results -- 5 Conclusion and Discussion -- References.
A Model for Quality Management in Industrial Products Based on Machine Learning and Image Processing Techniques -- 1 Introduction -- 2 Related Work -- 3 Our Work -- 3.1 Proposed Algorithm -- 3.2 Working Process -- 4 Conclusion -- References -- An Extensive Study on Financial Fraud Detection Using Artificial Intelligence-Based Models -- 1 Introduction -- 1.1 Overview to Big Data -- 1.2 Digital Banking -- 2 Data -- 2.1 Data Collection -- 2.2 Data Organization -- 2.3 Data Modality -- 3 Types of Financial Fraud -- 4 Financial Crime Compliance Risk -- 4.1 Identity Theft -- 4.2 Financial Declaration Fraud and Insurance Fraud -- 4.3 Anti-Money Laundering -- 4.4 Trafficking and Sanctions -- 5 Financial Fraud Finding Challenges and Future Instructions -- 5.1 Futures of Digital Banking -- 6 Conclusion -- References -- Exploring the State of the Art in Mobile Agent Computing: A Comparative Study of Adaptive Fault Tolerance, Security, Transaction, and Multicore Support -- 1 Introduction -- 2 Recent Techniques of Mobile Agent Computing -- 2.1 Lightweight Agent Platforms -- 2.2 Agent Migration Strategies -- 2.3 Context-Awareness -- 2.4 Security and Trust Management -- 2.5 Fault Tolerance and Resilience -- 2.6 Energy Efficiency -- 2.7 Machine Learning Integration -- 3 Comparative Table for Adaptive Fault Tolerant in the State of Art of Mobile Agent Computing: Security, Fault Tolerance, Transaction, and Multicore Support -- 4 Development of Mobile Agent Computing -- 4.1 Early Research -- 4.2 Platform Development -- 4.3 Agent Migration Strategies -- 4.4 Security and Trust Management -- 4.5 Application Development -- 4.6 Standardization Efforts -- 4.7 Performance Optimization -- 4.8 Context-Awareness and Intelligence -- 4.9 Mobile Agent Middleware -- 5 Conclusion -- References. Leveraging Bidirectional Encoder Representations from Transformers (BERT) for Enhanced Sentiment Analysis -- 1 Introduction -- 2 Problem Statement -- 2.1 Exploring BERT-Driven Models Across Various Domains -- 3 BERT Architecture -- 4 Applications of BERT Techniques -- 5 Significance of BERT for Sentiment Analysis -- 6 Methodology for BERT in Sentiment Analysis -- 7 Conclusion -- References -- Securing the Future of Connected Cars: Investigating Vulnerabilities and Preventing Cyberattacks -- 1 Introduction -- 2 Literature Review -- 3 Types of Attacks -- 3.1 Malware Attacks -- 3.2 Wireless Attacks -- 4 Methods of Detecting and Preventing Attacks -- 5 Future Directions in Connected Car Security -- 6 Conclusion -- References -- Smart Surveillance Using OpenCV -- 1 Introduction -- 1.1 Objective -- 2 Related Work -- 2.1 A Hybrid Algorithm for Tracking and Counting Many Persons in Smart Surveillance -- 2.2 Performance Evaluation of the Intelligent Traffic Surveillance System's Object Detection Algorithm -- 2.3 Crowd Counting and Detection of Normal/Abnormal Events Using Multi-Person Tracking in a Smart Surveillance System -- 2.4 Raspberry Pi-Based IoT-Based Smart Surveillance and Security System -- 2.5 Intelligent Video Security Surveillance with Mobile Remote Control -- 3 Proposed Method -- 3.1 Structural Similarity Index Metric (SSIM) -- 3.2 Detecting Faces in the Frames -- 3.3 Look for Background Noise -- 3.4 Local Binary Pattern Histogram (LBPH) -- 4 Experimental Results -- 4.1 Feature 1-Monitor -- 4.2 Feature 2-Action Detection -- 4.3 Feature 3-Rectangle -- 4.4 Feature 4-Record -- 4.5 Feature 5-Identify -- 4.6 Feature 6-In and Out -- 5 Conclusion -- References -- Hyperspectral Band Selection Considering Spectral and Spatial Information -- 1 Introduction -- 2 Problem Statement -- 3 Scope and Objectives -- 4 Literature Survey -- 5 Proposed System. 5.1 System Specifications -- 5.2 Block Diagram -- 5.3 Methodology -- 6 Experimental Setup and Results -- 6.1 Results -- 7 Summary and Future Scope -- References -- Water Pumping Requirement Prediction in Irrigation System Using Internet of Things-Assisted Machine Intelligence-Based Approach -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Hybrid Method for Discovering DDOS Attack -- 1 Introduction -- 2 Objectives -- 3 Scope -- 4 Methodology -- 5 System Architecture -- 5.1 Algorithms -- 5.2 Data Set -- 5.3 Data Preprocessing -- 5.4 Results -- 6 Conclusions -- References -- A Novel Chaotic Map-Based Noise-Resistant Image Encryption Scheme for Medical Images -- 1 Introduction -- 2 Proposed Method -- 2.1 Encryption -- 3 Simulation Results -- 3.1 Encryption Efficiency Analysis -- 4 Conclusion -- References -- Survey of Attacks, Detection Techniques, and Evaluation Metrics in Wireless Sensor Networks -- 1 Introduction -- 1.1 Overview of Wireless Sensor Networks -- 2 Key Characteristics and Challenges -- 3 The Importance of Security in WSN -- 4 Different Protocols Used in WSN -- 5 Literature Review of Layerwise Attacks in WSN -- 6 Detection and Evaluation Metrics -- 7 Conclusion -- References -- Big Data's Ethical Frontier: Addressing Concerns in Data Acquisition and Analysis -- 1 Introduction -- 2 Ethical Challenges in Big Data -- 3 Cambridge Analytica Scandal -- 4 Aadhaar Data Leak -- 4.1 Ethical Concerns in Data Analysis and Regulatory Framework -- 5 Conclusion -- References -- Evaluating Security Risks and Protecting Conversational AI: An in-Depth Vulnerability Assessment and Security Testing of the ChatGPT Android Application -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Conclusion -- References -- Neural Networks and GPU-Based Weed Detection Under Varying Light Illumination -- 1 Introduction. 2 Proposed System -- 2.1 Dataset and Process Flow -- 2.2 Feature Extraction -- 2.3 Feature Selection -- 2.4 Methodology Used -- 2.5 Faster RCNN Algorithm -- 2.6 CNN Implementation Algorithm -- 3 Conclusion -- References -- Intelligent ECG-Based COVID-19 Diagnose Device Using CNN Deep Learning Approaches -- 1 Introduction -- 2 Literature Review -- 3 Techniques -- 3.1 Document Search -- 3.2 Search Methods -- 3.3 Restrictions -- 3.4 Presence in the Review Publication -- 4 Deep Convolution Transfer Learning via Neural Networks -- 4.1 Methodology -- 4.2 Different Abnormalities in ECG Images -- 5 Implementation -- 6 Conclusion -- References -- Analyzing Twitter Data Using Apache Hive-A Big Data Technology Exploration -- 1 Introduction -- 2 Big Data and Twitter Data Analysis -- 3 Experimental Setup -- 4 Conclusion -- References -- Detection of Phishing Websites Using Link Guard Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 Problem Statement -- 4 Objectives -- 5 Existing Work -- 6 Proposed Work -- 6.1 Program Code -- 7 Methodology -- 8 Result -- 9 Conclusion -- References -- Forecasting Financial Commodities Using an Evolutionary Optimized Higher-Order Artificial Neural Network -- 1 Introduction -- 2 Method and Materials -- 2.1 Firefly Algorithm -- 2.2 Nelder-Mead Simplex Algorithm -- 2.3 Improved FFA -- 2.4 Pi-Sigma Neural Network -- 2.5 IFFA-PSNN Forecasting Model Training -- 3 Experimental Setup and Datasets -- 4 Results and Discussion -- 5 Conclusions -- References -- Plant Leaf Disease Classification Using GAN -- 1 Introduction -- 2 Problem Statement -- 3 Scope and Objectives -- 4 Literature Survey -- 4.1 Generative Adversarial Networks -- 4.2 VGG16 -- 4.3 Data Augmentation -- 4.4 Deep Learning -- 4.5 Data Preprocessing -- 5 Proposed System -- 5.1 System Specifications -- 5.2 Methodology -- 6 Functional Modules -- 7 Pseudocode. 8 Experimental Setup and Results. |
Record Nr. | UNINA-9910882898403321 |
Chillarige Raghavendra Rao | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Computational Intelligence and Informatics : Proceedings of ICACII 2019 / / edited by Raghavendra Rao Chillarige, Salvatore Distefano, Sandeep Singh Rawat |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (414 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Machine learning Bioinformatics Big data Electrical engineering Computational Intelligence Machine Learning Computational Biology/Bioinformatics Big Data Communications Engineering, Networks |
ISBN | 981-15-3338-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Extraction of Tumor Chunk Using Image Segmentation – Thresholding and HSV Color Space -- Predictive & Interactive IOT Diagnosis System with AI and ML Tools: Review -- Multi Agent Data Mining using Asymmetric AES Algorithm in Cloud Computing -- A Novel Architecture for a Two-Pass Opinion Mining Classifier -- QoS based Routing Algorithm for Software Defined Network using Ant Colony optimization -- An Integrated AdaBoost Algorithm for Down Syndrome Disease Recognition -- A Comprehensive Healthcare Model for a Smart Left Ventricle Assisting Device -- Moving Hand Segmentation from H.264 Compressed Sign Language Videos -- CNN-Based Real-time Indian Sign Language Recognition System -- Sarcasm Detection using Multiple Occurrences of Emojis and Hashtagged Words -- Multiclass Multiple Object Tracking -- Dimensionality Reduction in Hyperspectral Images using Auto-encoders -- Improved Registration of Infrared Images using EOH Descriptor -- Fine Grained Analysis of Bridging Social Capital with Triadic Analysis in a Co-Author Network -- Accumulation of Methodologies for Intensifying the Lifetime of the Wireless Sensor Networks -- A Multifactor Biometric Based User Authentication Protocol for IOT Networks -- Leveraging Topic Models with Novel Word Embeddings for Effective Document Clustering -- Survey on Access Control Mechanisms in Cloud Environments -- Sales Analysis and Performance of Super Store using Qlik Geo Analytics -- Assessment of Crop Rotation Using Multi Polarized Sentinel-1 Temporal SAR Data Over Parts of Kumaun Region of Uttarakhand -- Spatiotemporal and Delay Dynamics on a Prey Predator Fishery Model -- An Efficient Intrusion Detection System with Convolutional Neural Network -- Supervised Machine Learning Approach for Identification of Malicious URLs -- A Unified Framework for Stress Forecasting Using Machine Learning Algorithms -- Investigation and Analysis of Crop Maintenance Using IoT & KNN Techniques -- Enhancement of Anisotropic Diffusion Filtered Cardiac MR Images using Contrast based Fuzzy Approach -- Social Media Ecosystem: Review on Social Media Profile’s Security and Introduce a New Approach -- An Investigation on Managing Patient Flow at Hospital Emergency Care Unit using Tree-Based Data Mining Techniques -- A Path Based Model for Link Prediction in Location Based Social Networks -- Predicting the Cost of Pre-owned Cars using Linear Regression Mechanisms in Machine Learning -- Bio-Inspired High Utility Item Framework based Particle Swarm Optimization Tree Algorithms for Mining High Utility Itemset -- On Atom-Bond Connectivity Invariant of Graphs -- Theoretical Design and Experimental Study for Urban Data Management using Energy-Saved IoT Big Data -- An Effective Approach for Security Attacks Based on Machine Learning Algorithms -- Class Based Associative Classification using Super Subset to Predict the By-Diseases in Thyroid Disorders -- Recommendation of Diet using Hybrid Collaborative Filtering Learning Methods -- Classification of Natural Images Using Machine Learning Classifiers on Graph Based Approaches -- Convolutional Neural Network Based Diagnosis of Alzheimer’s Disease using Time Frequency features -- Humanly Evolving Robotics with Angular Sensor Control (HERASC) -- Post-occupancy Evaluation of Building Facilities in a University Community using an Electronic Platform -- Internet of Things: Demystifying Smart Cities & Communities -- Comparative Analysis of Optimizations of Antecedents and Consequents of Fuzzy Inference System Rules Lists using Genetic Algorithm Operations -- Uses and Impact of Social Media on Work Performance of Low Literate People -- A Comparative Analysis on Rumor Microblogs Detection from Social Network Sites -- Smart Sprint Methodology for Financial Management System Development -- A Novel Infrared Image Segmentation Method for Identifying the Faults in the Systems. |
Record Nr. | UNINA-9910484607303321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Innovations in Computer Science and Engineering : Proceedings of the Fourth ICICSE 2016 / / edited by H. S. Saini, Rishi Sayal, Sandeep Singh Rawat |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVII, 378 p. 181 illus.) |
Disciplina | 004 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Electrical engineering
Computer security Computational intelligence Communications Engineering, Networks Systems and Data Security Computational Intelligence |
ISBN | 981-10-3818-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Preface -- A Note From the Organising Committee -- Organising Committee -- About the editors -- Table of Contents -- Chapters -- Subject Index -- Author Index. |
Record Nr. | UNINA-9910254317803321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|