top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Intelligent Computing Techniques and Applications : Intelligent Systems, Intelligent Health Informatics, Intelligent Big Data Analytics and Smart Computing, Volume 2
Advances in Intelligent Computing Techniques and Applications : Intelligent Systems, Intelligent Health Informatics, Intelligent Big Data Analytics and Smart Computing, Volume 2
Autore Saeed Faisal
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer International Publishing AG, , 2024
Descrizione fisica 1 online resource (332 pages)
Altri autori (Persone) MohammedFathey
FazeaYousef
Collana Lecture Notes on Data Engineering and Communications Technologies Series
ISBN 3-031-59707-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents -- Software Bug Severity Prediction Using Convolutional Neural Network and BiLSTM Models -- 1 Introduction -- 2 Related Studies -- 3 Research Methodology -- 3.1 Data Set -- 3.2 Preprocessing of Summary Features -- 3.3 Word Tokenization -- 3.4 Stop Words Removal -- 3.5 Stemming -- 4 Proposed Models -- 4.1 Convolutional Neural Network (CNN) -- 4.2 A Bidirectional Long Short-Term Memory (BiLSTM) -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- Facial Wash Products Recommendation System: Profile User-Based Using Fuzzy Analytical Hierarchy Process Approach -- 1 Introduction -- 2 Materials and Methods -- 3 Results -- 4 Recommendation System Design and Development -- 5 Conclusion -- References -- Securing Data in IoT-RFID-Based Systems Using Lightweight Cryptography Algorithm -- 1 Introduction -- 2 RFID Technology -- 2.1 RFID-Based System Components -- 3 RFID Security -- 3.1 Security Requirements for IoT-Based RFID System -- 4 Works Related to Securing RFID-Based Systems -- 5 The Proposed IoT-RFID Lightweight Security Framework(I-RFLSF) -- 5.1 Two-Level Registration Phase -- 5.2 Two-Level Authentication Phase -- 5.3 Secure Data Transmission Phase -- 6 Analysis -- 7 Conclusion -- References -- Employee Mental Workload Classification in Industrial Workplaces: A Machine Learning Approach -- 1 Introduction -- 2 Related Works -- 3 Research Methodology -- 3.1 Dataset Description -- 3.2 Data Preparation -- 3.3 Data Exploration -- 3.4 Modelling Using Supervised Machine Learning -- 3.5 Evaluation -- 4 Results and Analysis -- 5 Discussion and Conclusion -- References -- A Conceptual Framework for Malay-English Code-Switched Neural Machine Translation -- 1 Introduction -- 2 Literature Review -- 2.1 Code-Switching -- 2.2 Neural Machine Translation -- 2.3 Code-Switching in NMT: Challenges.
3 Theoretical Framework -- 3.1 Data Preparation -- 3.2 Model Development -- 3.3 Performance Evaluation -- 4 Conclusion -- References -- Mobile Device Influence on SDN Controller Performance in IoT-Managed Software-Defined Wireless Networks -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Network Model -- 3.2 Analyses of SDN Controller Overhead -- 4 Performance Evaluation and Simulation Setup -- 4.1 Simulation Setup -- 4.2 Experimental Results and Discussion -- 5 Conclusion -- References -- Matrix Profile Unleashed: A Solution to IoT Data Redundancy Challenges -- 1 Introduction -- 2 Matrix Profile Overview -- 3 Methodology -- 4 Result and Discussion -- 5 Conclusion -- References -- Plants Monitoring API to Detect Tomato Leaf Diseases Using Deep-Learning Algorithms -- 1 Introduction -- 2 Related Works -- 3 CNN Model Development -- 3.1 Data Collection -- 3.2 Model Architecture Selection -- 3.3 Model Evaluation and Visualization -- 4 Deployment Strategy -- 5 Evaluation and Testing -- 6 Results Discussion -- 7 Limitations and Challenges -- 8 Conclusion -- References -- Sentiment Analysis and Innovative Recommender System: Enhancing Goodreads Book Discovery Using Hybrid Collaborative and Content Based Filtering -- 1 Introduction -- 2 Literature Review -- 2.1 Sentiment Analysis -- 2.2 Recommender Systems -- 3 Materials and Methods -- 3.1 Business Understanding -- 3.2 Data Understanding -- 3.3 Data Preparation -- 3.4 Sentiment Analysis Visualization -- 4 Modelling -- 5 Evaluation -- 6 Results and Analysis -- 7 Discussion -- 8 Conclusion -- References -- Comparative Analysis of Topic Modeling Algorithms Based on Arabic News Documents -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 TF-IDF -- 3.2 Latent Semantic Indexing -- 3.3 Latent Dirichlet Allocation -- 3.4 Non-negative Matrix Factorization -- 3.5 BERTopic.
4 Methodologies and Experiment -- 4.1 DataSet Description -- 4.2 Data Preprocessing -- 4.3 Comparative Analysis -- 5 Results and Discussion -- 6 Conclusion -- References -- Air Pollution Prediction Using Long Short-Term Memory Variants -- 1 Introduction -- 2 Related Works -- 3 Research Method -- 3.1 Data Collection -- 3.2 Data Preparation -- 3.3 Sliding Window -- 3.4 Hold-Out Validation -- 3.5 Long Short-Term Memory -- 3.6 Bidirectional Long Short-Term Memory -- 3.7 Stacked Long Short-Term Memory -- 3.8 Model Evaluation -- 3.9 Prediction -- 4 Results and Discussion -- 5 Conclusion -- References -- Comparative Analysis to Develop a Dimensionality Reduction Model for Classifying Intrusion Detection Systems -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Classification Algorithms -- 4 Results -- 5 Conclusion -- References -- Revolutionizing Airline Customer Satisfaction Analysis with Machine Learning Techniques -- 1 Introduction -- 2 Methodology -- 2.1 Data Retrieval -- 2.2 Exploratory Data Analysis (EDA) -- 2.3 Data Preprocessing -- 2.4 Data Performance Measurement -- 2.5 Proposed Machine Learning Models -- 2.6 Model Training and Evaluation -- 3 Results and Discussion -- 3.1 Experimental Environment -- 3.2 Exploratory Data Analysis (EDA) -- 3.3 Performance Metrics of All Models -- 3.4 Discussion -- 4 Conclusion -- References -- Android Malware Detection Using Machine Learning Technique -- 1 Introduction -- 2 Methodology -- 2.1 Feature Engineering -- 3 Implementation -- 3.1 Back-end Output and Code Snippets -- 3.2 Screenshot the Interface -- 4 Conclusions -- References -- An Ensemble Machine Learning Approach for Predicting Flood Based on Meteorological and Topographical Features: A Comparative Study in Kalu Ganga River Basin, Sri Lanka -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussion.
4.1 Outlier Detection -- 4.2 Feature Selection -- 4.3 Machine Learning Models -- 5 Conclusion -- References -- A Review of IoT Applications in Smart Environments: From Smart Cities to Military Integration -- 1 Introduction -- 2 Smart City Applications -- 2.1 Smart Homes -- 2.2 Smart Parking Lots -- 2.3 Vehicular Traffic -- 2.4 Surveillance Systems -- 3 Smart Environmental applications -- 3.1 Weather and Water Systems -- 3.2 Smart Energy and Smart Grids -- 3.3 Environmental Pollution -- 3.4 Health Applications -- 4 Procurement Applications -- 5 Livestock Applications -- 5.1 Chickens -- 5.2 Cattle -- 6 Military Applications -- 7 Conclusion -- References -- Utilizing Deep Learning Technique for Arabic Image Captioning -- 1 Introduction -- 2 Arabic Image Captioning (AIC) Model -- 3 Results and Discussion -- 3.1 Experimental Settings -- 3.2 Obtained Results -- 4 Conclusion -- References -- Performance Analysis of Textured Contact Lens IRIS Detection Based on Manual Feature Engineering -- 1 Introduction -- 2 Existing Publicly Databases -- 3 Performance Evaluation Metrics -- 4 Existing CLIDs Based Hand-Crafted Feature Extraction -- 4.1 CLIDs-Based Spatial Domain -- 4.2 CLIDs-Based Transform Domain -- 5 Comparison of CLIDs Techniques -- 6 Conclusion -- References -- Proposed Model for QCNN-Based Sentimental Short Sentences Classification -- 1 Introduction -- 2 Background and Related Work -- 2.1 Quantum Computing -- 2.2 Quantum Machine Learning -- 2.3 Quantum Convolutional Neural Network -- 2.4 Related Work -- 3 Proposed Model -- 4 Conclusion and Future Work -- References -- An Anomaly Intrusion Detection Systems in IoT Based on Autoencoder: A Review -- 1 Introduction -- 2 Background of Autoencoder -- 3 Studies Characteristic and Discussion -- 3.1 Deep Autoencoder -- 3.2 Sparse Autoencoder -- 3.3 Variational Autoencoder -- 3.4 Combining Approaches.
3.5 Technique Used -- 3.6 Datasets Used -- 4 Recommendations and Future Direction -- 5 Conclusion -- References -- Comparative Analysis of ResNet50, and VGG16 Architectures for Counterfeit Logo Identification -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Data Preprocessing -- 3.3 Addressing Data Imbalance -- 3.4 Feature Selection -- 3.5 Applied Models -- 4 Results and Discussion -- 4.1 Performance of the ResNet50 -- 4.2 Performance of the VGG16 -- 4.3 Comparative Analysis -- 5 Conclusion -- References -- Assessing the Prioritization of Key Influencing Factors for Industrial IoT Readiness in SMEs -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 Possible Influencing Factors for Industrial IoT Readiness in SMEs -- 5 Findings from Data Analysis -- 6 Conclusion -- References -- A Real-Time Hand Gesture Recognition Based on Media-Pipe and Support Vector Machine -- 1 Introduction -- 2 Methodology -- 2.1 Hand Model -- 2.2 Hand Gesture Recognition -- 2.3 Dataset -- 2.4 Image Processing -- 2.5 Feature Extraction -- 2.6 Support Vector Machine (SVM) -- 2.7 Visual Processing Algorithm -- 3 Results and Discussion -- 4 Conclusion -- References -- The Era of Industry 5.0: An Overview of Technologies, Applications, and Challenges -- 1 Introduction -- 2 Enabling Industry 5.0 Technologies -- 3 Applications of Industry 5.0 -- 4 Challenges in Industry 5.0 and Future Directions -- 5 Conclusion -- References -- Overview of Cybersecurity Trends in Jordan's Financial Sector -- 1 Introduction -- 2 Background -- 2.1 The Digital Transformation of the Financial Sector in Jordan -- 2.2 Cybersecurity in the Financial Sector of Jordan -- 2.3 Regulatory Compliance in Jordan -- 2.4 Mobile and Fintech Applications in Jordan -- 3 Conclusion and Future Works -- Appendix -- References.
Hybrid Filter Feature Selection for Improving Cancer Classification in High-Dimensional Microarray Data.
Record Nr. UNINA-9910857789103321
Saeed Faisal  
Cham : , : Springer International Publishing AG, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Intelligent Computing Techniques and Applications : Intelligent Systems, Intelligent Health Informatics, Intelligent Big Data Analytics and Smart Computing, Volume 1
Advances in Intelligent Computing Techniques and Applications : Intelligent Systems, Intelligent Health Informatics, Intelligent Big Data Analytics and Smart Computing, Volume 1
Autore Saeed Faisal
Edizione [1st ed.]
Pubbl/distr/stampa Cham : , : Springer, , 2024
Descrizione fisica 1 online resource (355 pages)
Altri autori (Persone) MohammedFathey
FazeaYousef
Collana Lecture Notes on Data Engineering and Communications Technologies Series
ISBN 3-031-59711-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910869166603321
Saeed Faisal  
Cham : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances on intelligent informatics and computing : health informatics, intelligent systems, data science and smart computing / / Faisal Saeed, Fathey Mohammed, and Fuad Ghaleb
Advances on intelligent informatics and computing : health informatics, intelligent systems, data science and smart computing / / Faisal Saeed, Fathey Mohammed, and Fuad Ghaleb
Autore Saeed Faisal
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (793 pages)
Disciplina 006.312
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Data mining
Data mining - Data processing
ISBN 3-030-98741-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- IRICT 2021 Organizing Committee -- International Advisory Board -- Conference General Chair -- Program Committee Chair -- General Secretary -- Technical Committee Chair -- Publications Committee -- Publicity Committee -- IT & -- Multimedia Committee -- Treasure Registration Committee Chair -- International Technical Committee -- Contents -- Artificial Intelligence -- Automatic Saudi Arabian License Plate Detection and Recognition Using Deep Convolutional Neural Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 3.1 License Plate Detection Phase -- 3.2 Image Pre-processing Phase -- 3.3 Character Segmentation and Recognition Phase -- 4 Implementation and Experiments -- 4.1 Dataset Collection and Labeling -- 4.2 Faster-RCNN-Based LP Detection -- 4.3 Image Preprocessing -- 4.4 LP Segmentation and Recognition -- 5 Conclusion and Future Work -- References -- Ship Detection Approach Using Machine Learning Algorithms -- 1 Introduction -- 2 Background and Related Work -- 3 Proposed Methodology -- 4 Results and Discussion -- 4.1 Dataset -- 4.2 Results -- 5 Conclusions -- References -- A New Deep Learning System for Wild Plants Classification and Species Identification: Using Leaves and Fruits -- 1 Introduction -- 2 Review of Related Literatures -- 3 Description of the Implemented Techniques -- 4 Empirical Studies -- 4.1 Description of Dataset -- 4.2 Dataset Analysis -- 4.3 Feature's Extraction -- 5 Proposed Models and Results -- 5.1 Families Classification (Binary Classification) -- 5.2 Species Identification (Categorical Classification) -- 6 Conclusion and Recommendation for the Future Work -- References -- A Novel Weighted Fractional TDGM Model and Quantum Particle Swarm Optimization Algorithm for Carbon Dioxide Emissions Forecasting -- 1 Introduction -- 2 Materials and Methods.
2.1 The Weighted Fractional Accumulation Generating Operator and Their Inverse -- 2.2 The Weighted of Fractional-Order of TDGM Model -- 2.3 Quantum Particle Swarm Optimization Algorithm Weighted of Fractional-Order of WFGM Model -- 3 Experiment Results -- 4 Conclusions -- References -- Text Detergent: The Systematic Combination of Text Pre-processing Techniques for Social Media Sentiment Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Phase 1 -- 3.2 Phase 2 -- 3.3 Phase 3 -- 4 Results -- 4.1 Phase 4 -- 5 Discussion -- 6 Conclusion -- References -- Improve Short-term Electricity Consumption Forecasting Using a GA-Based Weighted Fractional Grey Model -- 1 Introduction -- 2 The Weighted Fractional Accumulated Generating Matrices and Their Inverse Matrices -- 3 The Weighted of Fractional-Order Grey Model -- 4 Genetic Algorithm for Determining the Optimal Value of Fractional Order of WFGM Model -- 5 Experiment Results -- 5.1 Performance Measures -- 5.2 Obtained Results and Comparison -- 6 Conclusion -- References -- Efficient Human Activity Recognition System Using Long Short-Term Memory -- 1 Introduction -- 2 Related Work -- 3 Data Acquisition -- 4 Pre-processing -- 5 Architecture -- 6 Results -- 7 Conclusions -- References -- Job Training Recommendation System: Integrated Fuzzy AHP and TOPSIS Approach -- 1 Introduction -- 2 Research Method -- 3 Results and Discussion -- 3.1 Criteria and Sub-criteria Analysis -- 3.2 Criteria and Sub-criteria Analysis -- 3.3 Criteria and Sub-criteria Analysis -- 4 Conclusion -- References -- Improvement of Population Diversity of Meta-heuristics Algorithm Using Chaotic Map -- 1 Introduction -- 2 Review of Literature -- 2.1 Particle Swarm Optimization (PSO) -- 2.2 Inertia Weight -- 2.3 Chaotic Logistic Map -- 3 Methodology -- 4 Result and Discussion.
4.1 Comparison of NFE, Mean Fitness Value and Standard Deviation for Proposed CHPSO and Other Algorithms -- 5 Conclusion -- References -- Adaptive and Global Approaches Based Feature Selection for Large-Scale Hierarchical Text Classification -- 1 Introduction -- 2 Literature Review -- 2.1 Hierarchical Classification (HC) -- 2.2 Dimensional Reduction (DR) -- 2.3 Feature Selection Approaches -- 3 Material and Methods -- 3.1 Hierarchical Classification Method -- 3.2 Information Gain Method -- 3.3 Chi-square Method -- 3.4 Adaptive and Global Approaches -- 4 Dataset and Experiment Settings -- 5 Results Analysis -- 6 Conclusion -- References -- Ensemble Method for Online Sentiment Classification Using Drift Detection-Based Adaptive Window Method -- 1 Introduction -- 2 Related Works -- 3 Proposed Ensemble Method for Sentiment Classification Using DDAW -- 3.1 Drift Detection Component -- 3.2 Ensemble Method for Sentiment Classification Using DDAW -- 4 Experimental Results and Discussions -- 4.1 Performance of the Different DDAW Versions -- 4.2 Performance Comparison with Existing Methods -- 5 Conclusion -- References -- Rainfall Forecasting Using the Group Method of Data Handling Model: A Case Study of Sarawak, Malaysia -- 1 Introduction -- 2 The Group Method of Data Handling Model -- 3 Methods -- 3.1 Dataset -- 3.2 Experimental Results -- 4 Conclusion -- References -- Detecting Public Outlook Towards Vaccination Using Machine Learning Approaches: A Systematic Review -- 1 Introduction -- 2 Theoretical Background -- 3 Systematic Review -- 3.1 Machine Learning Models -- 3.2 Deep Learning Models -- 3.3 Ensemble Learning Models -- 4 Systematic Review Results -- 5 Conclusion -- References -- Forecasting Carbon Dioxide Emission for Malaysia Using Fractional Order Multivariable Grey Model -- 1 Introduction -- 2 Methodology.
2.1 Fractional Order Multivariable Grey, FAGM (1,N) Model -- 2.2 Forecast Accuracy Measurement -- 2.3 Conceptual Framework -- 3 Result and Discussion -- 4 Conclusion -- References -- A Hybrid Algorithm for Pattern Matching: An Integration of Berry-Ravindran and Raita Algorithms -- 1 Introduction -- 1.1 Problem Statement -- 2 Related Studies -- 3 Materials and Methods -- 3.1 Hybrid Algorithm Pre-processing Phase -- 3.2 Hybrid Algorithm Searching Phase -- 4 Analysis -- 4.1 Lemma 1: The Worst-Case Scenario with Respect to Time Complexity is Defined as O(Mn). -- 4.2 Lemma 2: The Best-Case Scenario with Respect to Time Complexity is O(N/(M + 2)). -- 4.3 Evaluation -- 5 Results -- 6 Discussion -- 7 Conclusion -- References -- A Survey of the Hybrid Exact String Matching Algorithms -- 1 Introduction -- 2 String Matching Algorithms -- 2.1 Exact String Matching Algorithm -- 2.2 Approximate String Matching Algorithm -- 3 Evaluation Approaches -- 4 Review on Hybrid Algorithms -- 4.1 Berry-Ravindran Hybrid Algorithm -- 4.2 SSABS Hybrid Algorithm -- 4.3 FJS Hybrid Algorithm -- 4.4 TVSBS Hybrid Algorithm -- 4.5 BMBR Hybrid Algorithm -- 4.6 ZTBMH Hybrid Algorithm -- 4.7 BRFS Hybrid Algorithm -- 4.8 BRBMH Hybrid Algorithm -- 4.9 BRQS Hybrid Algorithm -- 4.10 ZTFS Hybrid Algorithm -- 4.11 RSMA-BR Hybrid Algorithm -- 4.12 ShiftAndBMS Hybrid Algorithm -- 4.13 BRSS Hybrid Algorithm -- 4.14 BHAC Hybrid Algorithm -- 4.15 KMPBS Hybrid Algorithm -- 5 Discussion -- 6 Conclusion -- References -- Data Science -- C-SAR: Class-Specific and Adaptive Recognition for Arabic Handwritten Cheques -- 1 Introduction -- 2 Related Work -- 3 Adaptive Recognition for Arabic Handwritten Cheques -- 3.1 Angular Feature Extraction Method -- 3.2 Arabic Numbers -- 3.3 Class-Specific Taxonomy of Arabic Cheque Words -- 3.4 Machine Learning Models -- 4 Experiment Results -- 5 Conclusion.
Appendix A -- Appendix B -- Appendix C -- References -- Extraction of Spatiotemporal Association Rules for Forest Fires Prediction -- 1 Introduction -- 2 Spatiotemporal Association Rule -- 3 Extraction of Spatiotemporal Association Rules Process -- 3.1 Pretreatment -- 3.2 Algorithm and Interest Measures Used -- 3.3 Post-treatment -- 4 Experimental Design -- 5 Association Rules Obtained and Interpretation -- 6 Conclusion -- References -- Opinion Mining Using Topic Modeling: A Case Study of Firoozeh Dumas's Funny in Farsiin Goodreads -- 1 Introduction -- 2 Literature Review -- 2.1 Social Media Mining -- 2.2 Topic Modelling -- 3 Methodology and Materials -- 4 Results -- 4.1 Text Normalization -- 4.2 Text Visualization -- 4.3 Topic Modeling -- 5 Discussion and Conclusion -- References -- Opinion Mining Using Sentiment Analysis: A Case Study of Readers' Response on Long Litt Woon's The Way Through the Woodsin Goodreads -- 1 Introduction -- 2 Literature Review -- 2.1 Social Media and Opinion Mining -- 2.2 Sentiment Analysis -- 3 Methodology and Materials -- 4 Analysis and Results -- 4.1 Text Exploration and Visualization -- 4.2 Sentiment Analysis Results Using VADER and TextBlob -- 5 Discussion -- 6 Conclusion -- References -- Opinion Mining of Readers' Responses to Literary Prize Nominees on Twitter: A Case Study of Public Reaction to the Booker Prize (2018-2020) -- 1 Introduction -- 2 Literature Review -- 2.1 Topic Modelling -- 2.2 Sentiment Analysis -- 2.3 Clustering -- 3 Materials and Methodology -- 4 Results and Discussion -- 4.1 Topic Modelling -- 4.2 Sentiment Analysis -- 4.3 Clustering -- 5 Conclusion -- References -- Dictionary-Based DGAs Variants Detection -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Dictionary-Based DGAs -- 3.2 Extracted Features -- 3.3 Data Sets and Classifiers -- 3.4 Feature Selection.
4 Results and Discussion.
Record Nr. UNINA-9910556881203321
Saeed Faisal  
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances on Smart and Soft Computing : Proceedings of ICACIn 2021
Advances on Smart and Soft Computing : Proceedings of ICACIn 2021
Autore Saeed Faisal
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2022
Descrizione fisica 1 online resource (526 pages)
Altri autori (Persone) Al-HadhramiTawfik
MohammedErrais
Al-SaremMohammed
Collana Advances in Intelligent Systems and Computing Ser.
Soggetto genere / forma Electronic books.
ISBN 9789811655593
9789811655586
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- ICACIN'21 Organizing Committee -- Preface -- Contents -- About the Editors -- Artificial Intelligence I -- Adaptive Learning Content Based on Learning Styles in Learning Management System -- 1 Introduction -- 2 Literature Review -- 2.1 Adaptive Content -- 2.2 Learning Style -- 2.3 Existing Personalization Taxonomy -- 2.4 Personalization Learning -- 3 Research Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- A Model-Based Approach for COVID-19 Propagation -- 1 Introduction -- 1.1 The Time-Dependent SIR Model -- 1.2 Differential Equation of Time-Dependent SIR Model -- 1.3 Estimation of β(t) and γ(t) Using L2 Regularization -- 1.4 Estimating the Model Parameters, (t) and (t) -- 1.5 The Basic Reproduction Number -- 2 Dataset -- 3 COVID-19 Exploratory Analysis -- 3.1 COVID-19 Cases in Morocco -- 4 Time Evolution of the Time-Dependent SIR Model -- 5 Conclusion and Future Work -- References -- Numerical Modeling of the Mechanical Behavior of Recycled Flexible PVC Loaded with Different Percentages of Chicken Feathers -- 1 Introduction -- 2 Numerical Study -- 2.1 Mesh and Geometry -- 3 Rho and Gamma Indicators -- 3.1 Mechanical Characteristics -- 4 Results and Discussion -- 5 Conclusion -- References -- Covid-19 Detection from Pneumonia Image Classification Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methods -- 3.1 Covid-19 Dataset -- 3.2 Image Data Augmentation with Keras ImageDataGenerator -- 3.3 The Architectures Used for Transfer Learning: DenseNet121 and VGG16 -- 4 Experimental Results -- 5 Conclusion -- References -- Toward the Prediction of the Elasticity of Bio Loaded Polypropylene Using Artificial Neural Networks -- 1 Introduction -- 2 Materials and Methods -- 2.1 Materials -- 2.2 Methods -- 2.3 Smart Methods -- 3 Results and Discussion -- 4 Conclusion -- References.
Post-COVID-19: Deep Image Processing AI to Analyze Social Distancing in a Human Community -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 3.1 Human Detection Step -- 4 Faster R-CNN Design -- 5 Results and Discussion -- 5.1 Phase I-Person Detection Step -- 5.2 Phase II-Distance Computation Step -- 6 Conclusion -- References -- Design and Implementation of ImALeG Serious Game: Behavior of Non-playable Characters (NPC) -- 1 Introduction -- 2 Related Works -- 3 Design and Implementation -- 3.1 ImALeG Virtual Reality Game -- 3.2 Fuzzy Finite-state Machine Design -- 4 Emotional Impact -- 5 Conclusion -- References -- Detection of Personality Traits Through Handwriting Analysis Using Machine Learning Approach -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Scanning -- 3.2 Preprocessing -- 3.3 Line Segmentation -- 3.4 Feature Extraction -- 3.5 Classification and Analysis -- 4 Results and Discussion -- 4.1 Preprocessing -- 4.2 Line Segmentation -- 4.3 Feature Extraction -- 4.4 Classification and Analysis -- 4.5 Handwriting Analysis Application -- 5 Conclusion and Future Work -- References -- Data Science -- Hybrid Students' Academic Performance and Dropout Prediction Models Using Recursive Feature Elimination Technique -- 1 Introduction -- 2 Related Works -- 2.1 Naïve Bayes -- 2.2 Support Vector Machine -- 2.3 Recursive Feature Elimination (RFE) Technique -- 3 Methodology -- 4 Results and Discussion -- 4.1 Results of the Autoclassifier Detection Stage -- 4.2 Results of the Feature Selection Layer -- 4.3 Results of the Classification Layer -- 4.4 Results of the Model Evaluation Layer -- 5 Conclusion -- References -- Stage Classification of Alzheimer's Disease Using Transfer Learning -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Set -- 3.2 Proposed Models -- 4 Results and Discussion.
4.1 Evaluation -- 4.2 Results -- 5 Conclusion -- References -- Predicting the e-Signing Likelihood of Loan Using Machine Learning Models Combining Clustering with Supervised Learning -- 1 Introduction -- 2 Related Work -- 3 Background -- 4 Approach Methodology -- 4.1 Dataset Description -- 4.2 Proposed Pipeline -- 5 Results and Discussion -- 5.1 Classical Approach-Logistic Regression -- 5.2 Machine Learning Approach -- 5.3 A Hybrid Approach Using a Pre-clustering Step to Enhance Performance Using Self-organizing Map Clustering -- 6 Conclusion and Future Work -- References -- Designing an Arabic Google Play Store User Review Dataset for Detecting App Requirement Issues -- 1 Introduction -- 2 Related Works -- 3 Dataset Design -- 3.1 Data Collection Phase -- 3.2 Feature Engineering Phase -- 4 Enabling Research -- 4.1 Sentiment Analysis -- 4.2 Dialect Identification -- 4.3 App Review -- 4.4 Gender Detection -- 4.5 Software Issue Detection -- 5 Conclusion and Future Work -- References -- A Survey of Machine Learning and Deep Learning Applications in Genome Editing -- 1 Introduction -- 2 Genomics -- 3 Genome Editing -- 3.1 Application of Machine Learning in Genome Editing -- 4 Summary and Discussion -- 5 Conclusion -- References -- Educational Data Mining Techniques for Detecting Undesirable Students' Behaviors and Predicting Students' Performance: A Comparative Study -- 1 Introduction -- 2 Educational Data Mining Tasks -- 2.1 Detecting Undesirable Students' Behaviors -- 2.2 Detecting Students' Performance -- 3 Discussion and Future work -- References -- COVID-19: Analysis and Measurement of the Influence of the Tweets to Help the Public Health Sector to Fight Coronavirus -- 1 Introduction -- 2 Coronaviruses (COVID-19) -- 3 Twitter -- 4 Influence: An Overview for Our Case -- 5 Related Work -- 5.1 TunkRank Algorithm.
5.2 Twitter Ratio (Followers and Following) -- 6 Method and Algorithm -- 6.1 Our Method -- 6.2 Influence Score Algorithm Inf(X, TempD) -- 7 Experiments Results and Discussion -- 7.1 The Influential Tweeted not About COVID-19 (Other Tweets) -- 7.2 The Influential Tweeted About COVID-19 -- 8 Conclusion -- References -- Data Analytics Model for Home Improvement Store -- 1 Introduction -- 2 Related Work -- 2.1 Introduction to a Home Improvement Store -- 2.2 Importance of Applying Data Analytics Model to Retail Business -- 2.3 Study on Existing Data Analytics Model -- 2.4 Research Methodology -- 3 Data Quality of Dataset -- 3.1 Issues in Current Dataset -- 3.2 Handling Data Quality Issues -- 3.3 Missing Data -- 3.4 Noisy Data -- 3.5 Output of Descriptive Analytics Model -- 3.6 Output of Predictive Analytics Model -- 4 Techniques and Tools Used -- 5 Result -- 6 Conclusion -- References -- Intelligent Models for Mining Social Media Data -- 1 Introduction -- 2 Research Methods -- 2.1 Dataset -- 2.2 Pre-processing Approach -- 2.3 Learning Algorithms -- 2.4 Evaluation Metrics -- 3 Model Implementation and Results -- 4 Related Work -- 5 Conclusion -- References -- Cloud Computing and Networking -- Routing and Charging of Electric Vehicles: Survey -- 1 Introduction -- 2 Electric Vehicles Routing Problems -- 2.1 Related Works -- 3 Charging of Electric Vehicles -- 4 Conclusion and Future Work -- References -- A Parallel Genetic Algorithm for Solving the Vehicle Routing Problem with Drone Medication Delivery -- 1 Introduction -- 2 Related Literature -- 3 Problem Formulation -- 4 Proposed Approach -- 5 Experiments and Results -- 6 Conclusion and Perspectives -- References -- Review on Blockchain and Access Control Systems -- 1 Introduction -- 2 Methodology -- 3 Preliminaries -- 3.1 Blockchain -- 3.2 Blockchain Layers -- 3.3 Access Control Systems (ACS).
4 Related Works -- 5 Discussion -- 6 Conclusion -- References -- Adoption of Docker Containers as an Infrastructure for Deploying Software Applications: A Review -- 1 Introduction -- 2 Motivation -- 2.1 Usage of Docker in the Practitioner -- 3 Research Method -- 3.1 Different Solutions/Observations and Studies for Docker -- 4 Docker Containers -- 4.1 Introduction to Docker Containers -- 4.2 Docker Container Architecture -- 4.3 Advantages of Docker Containers -- 4.4 Limitations of Docker Containers -- 4.5 Strategic Approaches to Overcome Docker Limitations -- 5 Docker and Other Corresponding Approaches -- 6 Docker Integration with Container Orchestration -- 7 Conclusion -- References -- Study of the Impact of the Profoundness of Tunnel in the Context of Transition from IPv4 to IPv6 at the Local, Regional, and National Levels -- 1 Introduction -- 2 Overview of Transition Methods -- 3 Related Works -- 4 Context of Study -- 5 Results and Analysis -- 5.1 End-to-End Delay -- 5.2 Variation in Delay -- 5.3 HTTP Response Time -- 6 Conclusion and Future Work -- References -- Artificial Intelligence II -- A Face-Mask Detection System Based on Deep Learning Convolutional Neural Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 3.1 Face Detection and Localization Step -- 3.2 Applying Face-Mask Classifier -- 4 Experimental Setup -- 4.1 Dataset -- 4.2 Architectural Details -- 5 Results and Discussion -- 5.1 Results for the "Uni-FaceMask" Model -- 5.2 Results for the "Multi-FaceMask" Model -- 6 Conclusion -- References -- Deep Learning for COVID-19 Cases-Based XCR and Chest CT Images -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Research Questions -- 3.2 Dataset -- 3.3 Classification -- 4 Computational Results and Discussion -- 4.1 Experimental Settings -- 4.2 Experimental Datasets -- 4.3 Experimental Results.
4.4 Results and Discussions.
Record Nr. UNINA-9910512182403321
Saeed Faisal  
Singapore : , : Springer Singapore Pte. Limited, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui