top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Computational Intelligence and Informatics : Proceedings of ICACII 2023
Advances in Computational Intelligence and Informatics : Proceedings of ICACII 2023
Autore Chillarige Raghavendra Rao
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (430 pages)
Altri autori (Persone) DistefanoSalvatore
RawatSandeep Singh
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819747276
9789819747269
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- ICACII2023 Committee -- Foreword -- Preface -- Contents -- Editors and Contributors -- Optimizing Complex Challenges: Harnessing the Power of Genetic Algorithms and the Nelder-Mead Simplex Algorithm for Effective Problem Solving -- 1 Introduction -- 2 Overview of GA and NMA -- 2.1 Genetic Algorithm -- 2.2 Nelder-Mead Algorithm -- 3 Hybrid Genetic Algorithm with Nelder-Mead Simplex Algorithm (HGANM) -- 4 Benchmark Functions -- 4.1 Experimental Configuration -- 4.2 Result and Analysis -- 5 Real-Life Problems -- 5.1 Experimental Setup -- 5.2 Analysis and Outcome -- 6 Conclusion -- References -- State-of-the-Art Techniques and Evaluation Criteria for Mobile Application Offloading in Heterogeneous Networks: A Comprehensive Survey of Computation, Data, and Energy Offloading Approaches -- 1 Introduction -- 2 Background -- 2.1 Offloading Techniques -- 2.2 Literature Survey -- 2.3 Current Gaps in Research and Opportunities for Future Work -- 3 Conclusion -- References -- IDSSA: An Intrusion Detection System with Self-adaptive Capabilities for Strengthening the IoT Network Security -- 1 Introduction -- 1.1 Objectives of the Research -- 2 Related Works -- 3 Proposed System -- 3.1 NSL-KDD Dataset -- 3.2 Preprocessing -- 3.3 DNS and EAT -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Privacy and Security Aspects of Indian Population While Using Online Social Network: An Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Analysis -- 5 Conclusion -- References -- Digital HR Strategy in the Modern Business Environment of Ukraine in Conditions of Uncertainty -- 1 Introduction -- 2 Literature Review -- 3 Methodological Approach -- 4 Conducting the Research and the Results -- 5 Conclusion and Discussion -- References.
A Model for Quality Management in Industrial Products Based on Machine Learning and Image Processing Techniques -- 1 Introduction -- 2 Related Work -- 3 Our Work -- 3.1 Proposed Algorithm -- 3.2 Working Process -- 4 Conclusion -- References -- An Extensive Study on Financial Fraud Detection Using Artificial Intelligence-Based Models -- 1 Introduction -- 1.1 Overview to Big Data -- 1.2 Digital Banking -- 2 Data -- 2.1 Data Collection -- 2.2 Data Organization -- 2.3 Data Modality -- 3 Types of Financial Fraud -- 4 Financial Crime Compliance Risk -- 4.1 Identity Theft -- 4.2 Financial Declaration Fraud and Insurance Fraud -- 4.3 Anti-Money Laundering -- 4.4 Trafficking and Sanctions -- 5 Financial Fraud Finding Challenges and Future Instructions -- 5.1 Futures of Digital Banking -- 6 Conclusion -- References -- Exploring the State of the Art in Mobile Agent Computing: A Comparative Study of Adaptive Fault Tolerance, Security, Transaction, and Multicore Support -- 1 Introduction -- 2 Recent Techniques of Mobile Agent Computing -- 2.1 Lightweight Agent Platforms -- 2.2 Agent Migration Strategies -- 2.3 Context-Awareness -- 2.4 Security and Trust Management -- 2.5 Fault Tolerance and Resilience -- 2.6 Energy Efficiency -- 2.7 Machine Learning Integration -- 3 Comparative Table for Adaptive Fault Tolerant in the State of Art of Mobile Agent Computing: Security, Fault Tolerance, Transaction, and Multicore Support -- 4 Development of Mobile Agent Computing -- 4.1 Early Research -- 4.2 Platform Development -- 4.3 Agent Migration Strategies -- 4.4 Security and Trust Management -- 4.5 Application Development -- 4.6 Standardization Efforts -- 4.7 Performance Optimization -- 4.8 Context-Awareness and Intelligence -- 4.9 Mobile Agent Middleware -- 5 Conclusion -- References.
Leveraging Bidirectional Encoder Representations from Transformers (BERT) for Enhanced Sentiment Analysis -- 1 Introduction -- 2 Problem Statement -- 2.1 Exploring BERT-Driven Models Across Various Domains -- 3 BERT Architecture -- 4 Applications of BERT Techniques -- 5 Significance of BERT for Sentiment Analysis -- 6 Methodology for BERT in Sentiment Analysis -- 7 Conclusion -- References -- Securing the Future of Connected Cars: Investigating Vulnerabilities and Preventing Cyberattacks -- 1 Introduction -- 2 Literature Review -- 3 Types of Attacks -- 3.1 Malware Attacks -- 3.2 Wireless Attacks -- 4 Methods of Detecting and Preventing Attacks -- 5 Future Directions in Connected Car Security -- 6 Conclusion -- References -- Smart Surveillance Using OpenCV -- 1 Introduction -- 1.1 Objective -- 2 Related Work -- 2.1 A Hybrid Algorithm for Tracking and Counting Many Persons in Smart Surveillance -- 2.2 Performance Evaluation of the Intelligent Traffic Surveillance System's Object Detection Algorithm -- 2.3 Crowd Counting and Detection of Normal/Abnormal Events Using Multi-Person Tracking in a Smart Surveillance System -- 2.4 Raspberry Pi-Based IoT-Based Smart Surveillance and Security System -- 2.5 Intelligent Video Security Surveillance with Mobile Remote Control -- 3 Proposed Method -- 3.1 Structural Similarity Index Metric (SSIM) -- 3.2 Detecting Faces in the Frames -- 3.3 Look for Background Noise -- 3.4 Local Binary Pattern Histogram (LBPH) -- 4 Experimental Results -- 4.1 Feature 1-Monitor -- 4.2 Feature 2-Action Detection -- 4.3 Feature 3-Rectangle -- 4.4 Feature 4-Record -- 4.5 Feature 5-Identify -- 4.6 Feature 6-In and Out -- 5 Conclusion -- References -- Hyperspectral Band Selection Considering Spectral and Spatial Information -- 1 Introduction -- 2 Problem Statement -- 3 Scope and Objectives -- 4 Literature Survey -- 5 Proposed System.
5.1 System Specifications -- 5.2 Block Diagram -- 5.3 Methodology -- 6 Experimental Setup and Results -- 6.1 Results -- 7 Summary and Future Scope -- References -- Water Pumping Requirement Prediction in Irrigation System Using Internet of Things-Assisted Machine Intelligence-Based Approach -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Hybrid Method for Discovering DDOS Attack -- 1 Introduction -- 2 Objectives -- 3 Scope -- 4 Methodology -- 5 System Architecture -- 5.1 Algorithms -- 5.2 Data Set -- 5.3 Data Preprocessing -- 5.4 Results -- 6 Conclusions -- References -- A Novel Chaotic Map-Based Noise-Resistant Image Encryption Scheme for Medical Images -- 1 Introduction -- 2 Proposed Method -- 2.1 Encryption -- 3 Simulation Results -- 3.1 Encryption Efficiency Analysis -- 4 Conclusion -- References -- Survey of Attacks, Detection Techniques, and Evaluation Metrics in Wireless Sensor Networks -- 1 Introduction -- 1.1 Overview of Wireless Sensor Networks -- 2 Key Characteristics and Challenges -- 3 The Importance of Security in WSN -- 4 Different Protocols Used in WSN -- 5 Literature Review of Layerwise Attacks in WSN -- 6 Detection and Evaluation Metrics -- 7 Conclusion -- References -- Big Data's Ethical Frontier: Addressing Concerns in Data Acquisition and Analysis -- 1 Introduction -- 2 Ethical Challenges in Big Data -- 3 Cambridge Analytica Scandal -- 4 Aadhaar Data Leak -- 4.1 Ethical Concerns in Data Analysis and Regulatory Framework -- 5 Conclusion -- References -- Evaluating Security Risks and Protecting Conversational AI: An in-Depth Vulnerability Assessment and Security Testing of the ChatGPT Android Application -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Conclusion -- References -- Neural Networks and GPU-Based Weed Detection Under Varying Light Illumination -- 1 Introduction.
2 Proposed System -- 2.1 Dataset and Process Flow -- 2.2 Feature Extraction -- 2.3 Feature Selection -- 2.4 Methodology Used -- 2.5 Faster RCNN Algorithm -- 2.6 CNN Implementation Algorithm -- 3 Conclusion -- References -- Intelligent ECG-Based COVID-19 Diagnose Device Using CNN Deep Learning Approaches -- 1 Introduction -- 2 Literature Review -- 3 Techniques -- 3.1 Document Search -- 3.2 Search Methods -- 3.3 Restrictions -- 3.4 Presence in the Review Publication -- 4 Deep Convolution Transfer Learning via Neural Networks -- 4.1 Methodology -- 4.2 Different Abnormalities in ECG Images -- 5 Implementation -- 6 Conclusion -- References -- Analyzing Twitter Data Using Apache Hive-A Big Data Technology Exploration -- 1 Introduction -- 2 Big Data and Twitter Data Analysis -- 3 Experimental Setup -- 4 Conclusion -- References -- Detection of Phishing Websites Using Link Guard Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 Problem Statement -- 4 Objectives -- 5 Existing Work -- 6 Proposed Work -- 6.1 Program Code -- 7 Methodology -- 8 Result -- 9 Conclusion -- References -- Forecasting Financial Commodities Using an Evolutionary Optimized Higher-Order Artificial Neural Network -- 1 Introduction -- 2 Method and Materials -- 2.1 Firefly Algorithm -- 2.2 Nelder-Mead Simplex Algorithm -- 2.3 Improved FFA -- 2.4 Pi-Sigma Neural Network -- 2.5 IFFA-PSNN Forecasting Model Training -- 3 Experimental Setup and Datasets -- 4 Results and Discussion -- 5 Conclusions -- References -- Plant Leaf Disease Classification Using GAN -- 1 Introduction -- 2 Problem Statement -- 3 Scope and Objectives -- 4 Literature Survey -- 4.1 Generative Adversarial Networks -- 4.2 VGG16 -- 4.3 Data Augmentation -- 4.4 Deep Learning -- 4.5 Data Preprocessing -- 5 Proposed System -- 5.1 System Specifications -- 5.2 Methodology -- 6 Functional Modules -- 7 Pseudocode.
8 Experimental Setup and Results.
Record Nr. UNINA-9910882898403321
Chillarige Raghavendra Rao  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Computational Intelligence and Informatics : Proceedings of ICACII 2019 / / edited by Raghavendra Rao Chillarige, Salvatore Distefano, Sandeep Singh Rawat
Advances in Computational Intelligence and Informatics : Proceedings of ICACII 2019 / / edited by Raghavendra Rao Chillarige, Salvatore Distefano, Sandeep Singh Rawat
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (414 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Machine learning
Bioinformatics
Big data
Electrical engineering
Computational Intelligence
Machine Learning
Computational Biology/Bioinformatics
Big Data
Communications Engineering, Networks
ISBN 981-15-3338-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Extraction of Tumor Chunk Using Image Segmentation – Thresholding and HSV Color Space -- Predictive & Interactive IOT Diagnosis System with AI and ML Tools: Review -- Multi Agent Data Mining using Asymmetric AES Algorithm in Cloud Computing -- A Novel Architecture for a Two-Pass Opinion Mining Classifier -- QoS based Routing Algorithm for Software Defined Network using Ant Colony optimization -- An Integrated AdaBoost Algorithm for Down Syndrome Disease Recognition -- A Comprehensive Healthcare Model for a Smart Left Ventricle Assisting Device -- Moving Hand Segmentation from H.264 Compressed Sign Language Videos -- CNN-Based Real-time Indian Sign Language Recognition System -- Sarcasm Detection using Multiple Occurrences of Emojis and Hashtagged Words -- Multiclass Multiple Object Tracking -- Dimensionality Reduction in Hyperspectral Images using Auto-encoders -- Improved Registration of Infrared Images using EOH Descriptor -- Fine Grained Analysis of Bridging Social Capital with Triadic Analysis in a Co-Author Network -- Accumulation of Methodologies for Intensifying the Lifetime of the Wireless Sensor Networks -- A Multifactor Biometric Based User Authentication Protocol for IOT Networks -- Leveraging Topic Models with Novel Word Embeddings for Effective Document Clustering -- Survey on Access Control Mechanisms in Cloud Environments -- Sales Analysis and Performance of Super Store using Qlik Geo Analytics -- Assessment of Crop Rotation Using Multi Polarized Sentinel-1 Temporal SAR Data Over Parts of Kumaun Region of Uttarakhand -- Spatiotemporal and Delay Dynamics on a Prey Predator Fishery Model -- An Efficient Intrusion Detection System with Convolutional Neural Network -- Supervised Machine Learning Approach for Identification of Malicious URLs -- A Unified Framework for Stress Forecasting Using Machine Learning Algorithms -- Investigation and Analysis of Crop Maintenance Using IoT & KNN Techniques -- Enhancement of Anisotropic Diffusion Filtered Cardiac MR Images using Contrast based Fuzzy Approach -- Social Media Ecosystem: Review on Social Media Profile’s Security and Introduce a New Approach -- An Investigation on Managing Patient Flow at Hospital Emergency Care Unit using Tree-Based Data Mining Techniques -- A Path Based Model for Link Prediction in Location Based Social Networks -- Predicting the Cost of Pre-owned Cars using Linear Regression Mechanisms in Machine Learning -- Bio-Inspired High Utility Item Framework based Particle Swarm Optimization Tree Algorithms for Mining High Utility Itemset -- On Atom-Bond Connectivity Invariant of Graphs -- Theoretical Design and Experimental Study for Urban Data Management using Energy-Saved IoT Big Data -- An Effective Approach for Security Attacks Based on Machine Learning Algorithms -- Class Based Associative Classification using Super Subset to Predict the By-Diseases in Thyroid Disorders -- Recommendation of Diet using Hybrid Collaborative Filtering Learning Methods -- Classification of Natural Images Using Machine Learning Classifiers on Graph Based Approaches -- Convolutional Neural Network Based Diagnosis of Alzheimer’s Disease using Time Frequency features -- Humanly Evolving Robotics with Angular Sensor Control (HERASC) -- Post-occupancy Evaluation of Building Facilities in a University Community using an Electronic Platform -- Internet of Things: Demystifying Smart Cities & Communities -- Comparative Analysis of Optimizations of Antecedents and Consequents of Fuzzy Inference System Rules Lists using Genetic Algorithm Operations -- Uses and Impact of Social Media on Work Performance of Low Literate People -- A Comparative Analysis on Rumor Microblogs Detection from Social Network Sites -- Smart Sprint Methodology for Financial Management System Development -- A Novel Infrared Image Segmentation Method for Identifying the Faults in the Systems.
Record Nr. UNINA-9910484607303321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Innovations in Computer Science and Engineering : Proceedings of the Fourth ICICSE 2016 / / edited by H. S. Saini, Rishi Sayal, Sandeep Singh Rawat
Innovations in Computer Science and Engineering : Proceedings of the Fourth ICICSE 2016 / / edited by H. S. Saini, Rishi Sayal, Sandeep Singh Rawat
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVII, 378 p. 181 illus.)
Disciplina 004
Collana Lecture Notes in Networks and Systems
Soggetto topico Electrical engineering
Computer security
Computational intelligence
Communications Engineering, Networks
Systems and Data Security
Computational Intelligence
ISBN 981-10-3818-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Preface -- A Note From the Organising Committee -- Organising Committee -- About the editors -- Table of Contents -- Chapters -- Subject Index -- Author Index.
Record Nr. UNINA-9910254317803321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui