Congress on Intelligent Systems . Volume 2 : proceedings of CIS 2021 / / Mukesh Saraswat [and four others], editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (914 pages) |
Disciplina | 006.3 |
Collana | Lecture notes on data engineering and communications technologies |
Soggetto topico |
Artificial intelligence
Internet of things |
ISBN | 981-16-9113-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- About the Editors -- A Comprehensive Survey on Machine Reading Comprehension: Models, Benchmarked Datasets, Evaluation Metrics, and Trends -- 1 Introduction -- 2 Materials and Methods -- 2.1 Machine Reading Comprehension Tasks -- 2.2 Types of Machine Reading Comprehension Questions -- 2.3 Latest Trends on Machine Reading Comprehension -- 3 MRC Architecture, Modules, and Baseline Models -- 3.1 Word Embedding -- 3.2 Feature Extraction -- 3.3 Context-Question Interaction -- 3.4 Answer Prediction -- 4 Performance Evaluation Metrics -- 4.1 Accuracy -- 4.2 Exact Match -- 4.3 Precision and Recall -- 4.4 F1 Score (F Score or F Measure) -- 4.5 Recall-Oriented Understudy for Gisting Evaluation (ROUGE) -- 4.6 Bilingual Evaluation Understudy (BLEU) -- 4.7 Metric for Evaluation of Translation with Explicit Ordering (METEOR) -- 4.8 Human Equivalence Score (HEQ) -- 5 Summary and Conclusion -- References -- A Novel Feature Descriptor: Color Texture Description with Diagonal Local Binary Patterns Using New Distance Metric for Image Retrieval -- 1 Introduction -- 2 Proposed Method -- 2.1 Diagonal Local Binary Pattern for Color Image -- 3 Similarity Measures -- 3.1 Proposed New Distance Metric -- 4 Analysis and Result -- 4.1 Performance and Measures -- 4.2 Datasets -- 4.3 Obtained Results -- 5 Conclusion -- References -- OntoINT: A Framework for Ontology Integration Based on Entity Linking from Heterogeneous Knowledge Sources -- 1 Introduction -- 2 Related Works -- 3 Proposed System Architecture -- 4 Implementation and Performance Evaluation -- 5 Conclusions -- References -- KnowCommerce: A Semantic Web Compliant Knowledge-driven Paradigm for Product Recommendation in E-commerce -- 1 Introduction -- 2 Related Works -- 3 Proposed System Architecture -- 4 Implementation -- 5 Performance Evaluation and Results -- 6 Conclusion.
References -- Removal of Occlusion in Face Images Using PIX2PIX Technique for Face Recognition -- 1 Introduction -- 2 Related Works -- 3 Proposed Research Methodology -- 3.1 GAN and Pix2pix -- 3.2 Proposed Architecture -- 4 Experiments -- 4.1 Case 1: Training with Occluded Images in the Dataset -- 4.2 Case 2: Training with Images by Creating an Occlusion -- 4.3 Case 3: Training With Images by Creating an Occlusion with Discriminative Receptive Field of 64 × 64 -- 5 Conclusion -- References -- Age, Gender and Emotion Estimation Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Image or Data-Set Collection -- 3.2 Function to Encode the Labels -- 3.3 Resizing and Preprocessing the Data -- 3.4 Extracting and Integrating the Features -- 3.5 Training and Testing -- 3.6 Output -- 4 Experiment and Results -- 5 Conclusions and Future Work -- References -- Qualitative Classification of Wheat Grains Using Supervised Learning -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Segmentation -- 3.2 Feature Extraction -- 3.3 Classification Using Multilayer Perceptron (MLP) -- 4 Results -- 4.1 Dataset Description -- 4.2 Experimental Results -- 4.3 Performance Analysis -- 4.4 Comparative Analysis -- 5 Conclusion -- References -- Pandemic Simulation and Contact Tracing: Identifying Super Spreaders -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Method: Pandemic Simulation and Contact Tracing: Identifying Super Spreaders -- 3.1 Initial Dataset Generation -- 3.2 Simulation -- 3.3 Visualising Data -- 3.4 Identification of Super Spreaders -- 4 Experimental Results -- 5 Experimental Results and Analysis -- 6 Future Scope -- 7 Conclusion -- References -- Assessment of Attribution in Cyber Deterrence: A Fuzzy Entropy Approach -- 1 Introduction -- 2 Literature Review -- 2.1 Cyber Deterrence. 2.2 Cyber Attribution -- 3 A Mathematical Model -- 3.1 Numerical Example -- 4 Conclusion -- References -- Predictive Maintenance of Bearing Machinery Using MATLAB -- 1 Introduction -- 1.1 Importance -- 1.2 Motivation and Significant Statistics -- 1.3 Research Challenges/Gaps -- 1.4 Proposed Solution -- 1.5 Terms and Terminologies -- 1.6 Paper Structure -- 2 Related Work -- 2.1 Background -- 2.2 Current State of Art -- 2.3 Literature Review -- 3 Dataset -- 3.1 Data Collection -- 3.2 Data Organization -- 3.3 Exploratory Data Analysis -- 3.4 Data Features [21] -- 3.5 Data Pre-processing -- 4 Proposed Methodology -- 4.1 Architecture -- 4.2 Technical Details -- 4.3 Algorithms and Equations -- 4.4 Pseudocode -- 4.5 Methodology Steps -- 5 Results and Analysis -- 5.1 Results Organization -- 5.2 Figures -- 5.3 Graphs -- 5.4 Performance Metrics Evaluations -- 6 Challenges -- 7 Conclusion -- 7.1 Future Work -- References -- Fuzzy Keyword Search Over Encrypted Data in Cloud Computing: An Extensive Analysis -- 1 Introduction -- 1.1 Contribution of the Work -- 1.2 Organization of the Work -- 2 Background -- 2.1 Literature Survey -- 3 Industry Case Study -- 3.1 Technical Reports -- 3.2 Real-Time Scenarios -- 4 Fuzzy-Based Modified Keyword Search Model -- 4.1 Detailed Architecture -- 5 Conclusion and Future Work -- 5.1 Conclusion -- 5.2 Future Work -- References -- Application of Data Mining and Temporal Data Mining Techniques: A Case Study of Medicine Classification -- 1 Introduction -- 2 K‐Means Clustering -- 3 Experimental Results and Discussion -- 4 Conclusion -- References -- A Deep Learning Approach for Plagiarism Detection System Using BERT -- 1 Introduction -- 1.1 NLP and Machine Learning -- 1.2 Machine Learning and Word Embedding -- 1.3 NLP and Plagiarism -- 1.4 Organization of Paper -- 2 Related Work -- 3 Approaches to Plagiarism Detection. 4 Plagiarism Detection Methods -- 5 Word Embeddings and Plagiarism Detection -- 6 Experimental Results -- 6.1 Experimental Setup -- 6.2 Data Pre-processing -- 6.3 Dataset Preparation -- 6.4 Methodology -- 6.5 Experimental Results and Discussion -- 7 Conclusion and Future Scope -- References -- A Multi-attribute Decision Approach in Triangular Fuzzy Environment Under TOPSIS Method for All-rounder Cricket Player Selection -- 1 Introduction -- 2 Basic Definitions -- 3 Proposed Fuzzy TOPSIS Algorithm -- 3.1 A Case Study -- 3.2 Sensitivity Analysis -- 4 Conclusion -- References -- Machine Learning Techniques on Disease Detection and Prediction Using the Hepatic and Lipid Profile Panel Data -- 1 Introduction -- 1.1 Liver-related Diseases and Conditions -- 1.2 Lipid Metabolism Disorders and Conditions -- 1.3 Derangement of Enzyme Levels in Diabetes -- 2 Related Works -- 2.1 Analysis of State-of-the-art Techniques in Liver Disease Detection and Prediction Using LFT Data -- 2.2 Existing Machine Learning Techniques in Lipid Metabolism Disorders Detection and Prediction Using LPP Data as a Risk Factor -- 2.3 Literature Review for Occurrence of Abnormal Liver Function Tests in Diabetes Mellitus -- 2.4 Literature Review for Incidence of Abnormal Lipid Levels in Diabetes Mellitus -- 3 Comparative Review of Various Machine Learning Algorithms Using LFT and LPP for Diagnosing and Predicting Diseases -- 3.1 Discussion -- 4 Research Gaps -- 5 Pragmatic Implications and Recommendations -- 6 Contribution -- 7 Conclusion and Future Work -- References -- Performance Analysis of Machine Learning Algorithms for Website Anti-phishing -- 1 Introduction -- 2 Supervised Machine Learning Methods for Anti-phishing -- 3 Decision Tree Algorithm for Anti-phishing -- 4 Random Forest for Anti-phishing -- 5 Support Vector Machine Algorithm for Anti-phishing. 6 Logistic Regression for Anti-phishing -- 7 Results and Discussion -- 8 Conclusion -- References -- Analytical Analysis of Two-Warehouse Inventory Model Using Particle Swarm Optimization -- 1 Introduction -- 2 Literature Reviews -- 3 Presumption and Documentations -- 3.1 Assumption -- 4 Mathematical Formulation of Model and Analysis -- 5 Particle Swarm Optimization -- 6 Numerical Analysis -- 7 Conclusions -- References -- Towards an Enhanced Framework to Facilitate Data Security in Cloud Computing -- 1 Introduction -- 2 Cloud Computing Overview -- 2.1 Cloud Service Models -- 2.2 Cloud Deployment Models -- 3 Data Security Overview -- 3.1 Cloud Computing Security Model -- 3.2 The CIA Triad of Information Security -- 3.3 Cloud Security Alliance -- 4 Cloud Security Frameworks -- 4.1 Service-Collaboration Orientated Security Framework -- 4.2 Personal Cloud Computing Framework -- 4.3 Secure G-Cloud-Based Framework for Government Healthcare Services -- 5 Proposed Cloud Security Framework -- 6 Conclusions and Future Work -- References -- Kinematics and Control of a 3-DOF Industrial Manipulator Robot -- 1 Introduction -- 1.1 Method Description -- References -- Enhanced Energy Efficiency in Wireless Sensor Networks -- 1 Introduction -- 1.1 Wireless Sensor Network -- 1.2 Energy Consumption in WSNs -- 2 Related Works -- 3 Methodology -- 3.1 Improving Energy Efficiency of WSNs -- 3.2 Experimental Setup -- 4 Simulation and Analysis of Results -- 5 Discussion and Conclusion -- 5.1 Conclusion -- References -- Social Structure to Artificial Implementation: Honeybees -- 1 Introduction -- 1.1 Honeybees to Artificial Bees -- 1.2 Standard Artificial Bee Colony Optimization -- 1.3 Standard ABC and Its Different Variants -- 2 Research: Usage of Basic and Improve-ABC -- 2.1 Clustering, Routing, and Deployment in Wireless Ad Hoc Networks -- 2.2 Internet of Things (IoT). 2.3 Task Scheduling in Cloud Computing. |
Record Nr. | UNINA-9910580152703321 |
Singapore : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Congress on Intelligent Systems . Volume 1 : proceedings of CIS 2021 / / Mukesh Saraswat [and four others], editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (933 pages) |
Disciplina | 006.3 |
Collana | Lecture notes on data engineering and communications technologies |
Soggetto topico |
Artificial intelligence
Internet of things |
ISBN | 981-16-9416-8 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- About the Editors -- The Extraction of Automated Vehicles Traffic Accident Factors and Scenarios Using Real-World Data -- 1 Introduction -- 2 Data Collecting and Preprocessing -- 2.1 Collecting AVs Accident Data -- 2.2 Preprocessing AVs Accident Data -- 3 Learning Method and Result -- 3.1 Random Forest -- 3.2 Extraction of AVs Collision Factor Importance -- 4 AVs Traffic Accident Scenarios -- 4.1 Scenario Combinations Based on Collision Situations -- 4.2 AVs Ahead Situation -- 4.3 AVs Rear Situation -- 4.4 Comparison with HVs Traffic Accidents -- 4.5 Summary -- 5 Conclusion and Future Research -- References -- Leaf Disease Identification in Rice Plants Using CNN Model -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Dataset -- 3.2 Pre-processing -- 3.3 Data Normalization -- 3.4 Create a Model -- 3.5 Training and Validation -- 3.6 Test the Model -- 3.7 Convert the Model to .tflite Format -- 3.8 Develop and Deploy Using Mobile App -- 3.9 Test the Mobile App -- 4 Experimental Results -- 5 Experimental Set-Up -- 6 Discussion -- 7 Conclusions -- References -- Twitter Sentiment Analysis Based on Neural Network Techniques -- 1 Introduction -- 2 Literature Survey -- 2.1 Related Work -- 2.2 Opinion Mining -- 2.3 Twitter -- 2.4 Twitter Sentiment Analysis -- 3 Data Description -- 4 Proposed Methodology -- 4.1 Pre-processing -- 4.2 Feature Extraction -- 4.3 Feature Representation -- 4.4 Handling Memory Issues -- 4.5 Implementation -- 5 Classification Techniques Compared -- 5.1 Naïve Bayes -- 5.2 Decision Tree -- 5.3 Support Vector Machine (SVM) -- 5.4 Multilayer Perceptron (MLP) -- 5.5 Recurrent Neural Network (RNN) -- 5.6 Convolutional Neural Network (CNN) -- 6 Results -- 7 Conclusion -- References -- Enhanced Stock Market Prediction Using Hybrid LSTM Ensemble -- 1 Introduction -- 2 Literature Survey.
3 Dataset -- 4 Proposed Methodology -- 4.1 Ensemble -- 4.2 Bagging -- 4.3 Optimizer -- 4.4 Experimental Settings -- 5 Result -- 6 Conclusion -- References -- Classifying Microarray Gene Expression Cancer Data Using Statistical Feature Selection and Machine Learning Methods -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Dataset -- 3.2 Feature Selection -- 3.3 Classifiers -- 4 Results and Discussion -- 5 Conclusion -- References -- Pythagorean Fuzzy Information Measure with Application to Multicriteria Decision Making -- 1 Introduction -- 2 Literature Review -- 3 New Pythagorean Fuzzy Information Measure -- 3.1 Properties of θαβ ( A ) -- 3.2 Monotonicity of Proposed Pythagorean Fuzzy Information Measure -- 3.3 Multicriteria Decision Making Based on New Pythagorean Fuzzy Information Measure -- 4 Conclusion -- References -- Developing an Improved Software Architecture Framework for Smart Manufacturing -- 1 Introduction -- 2 Literature Review -- 2.1 Industry 4.0 -- 2.2 Software Architecture 4.0 -- 3 Review of Software Architectures -- 3.1 Requirements of Smart Manufacturing -- 4 Results -- 4.1 Centralized Communication -- 4.2 Decentralised Communication -- 4.3 Combined Communication -- 4.4 Assessment of Software Architectures -- 5 Conclusion and Proposal of Software Architecture -- 5.1 Proposed Segments of the Software Architecture -- 5.2 Divisions of Machine Communication in Software Architecture -- 5.3 Proposed Software Architecture Implementation Mock-Up -- 5.4 Predicted Impact of Software Architecture -- 6 Future Work -- References -- Intelligent Water Drops Algorithm Hand Calculation Using a Mathematical Function -- 1 Introduction to Intelligent Water Drops Algorithm -- 2 Working of Intelligent Water Drops Algorithm -- 2.1 The Pseudo-Code of an IWD-Based Algorithm -- 2.2 Case Study. 3 Convergence of Intelligence Water Drops Optimization Algorithm -- 4 Conclusion -- References -- A Study of Decision Tree Classifier to Predict Learner's Progression -- 1 Introduction -- 2 Related Study -- 3 Material and Method -- 3.1 Data Collection -- 3.2 ID3 Decision Tree Classifier Algorithm Steps -- 3.3 Experimental Work -- 4 Results and Discussion -- 4.1 Example -- 5 Conclusion -- References -- An Overview of Blockchain and IoT in e-Healthcare System -- 1 Introduction -- 2 Blockchain -- 2.1 Blockchain Technology [12] -- 2.2 Blockchain Implementation -- 2.3 Smart Contracts -- 2.4 Consensus -- 3 Combination of Blockchain and Internet of Things -- 3.1 Internet of Things (IoT) -- 4 Applications Internet of Things for Blockchain in e-Healthcare -- 5 Literature Review -- 6 Existing Research on Internet of Things for Blockchain -- 7 Conclusion -- References -- Energy-Efficient ACO-DA Routing Protocol Based on IoEABC-PSO Clustering in WSN -- 1 Introduction -- 2 Related Work -- 2.1 Proposed Approach -- 2.2 Energy Consumption Model -- 2.3 Network Model -- 2.4 Proposed IoEABC-PSO Clustering Algorithm -- 2.5 PSO Algorithm -- 2.6 Algorithm for Proposed IoEABC-PSO Approach -- 2.7 Cluster Head Selection -- 2.8 ACO Algorithm -- 3 Result and Discussion -- 3.1 Network Lifetime -- 3.2 Energy Consumption -- 3.3 Distance Between Node and Base Station -- 3.4 Residual Energy of Nodes -- 4 Conclusion -- References -- Modelling Critical Success Factors for Smart Grid Development in India -- 1 Introduction -- 2 Review of Literature -- 2.1 Smart Grid at a Glance -- 2.2 Overview of Smart Grid Development in India -- 3 Methodology -- 3.1 Identification of Critical Success Factors -- 3.2 Exploratory Factor Analysis (EFA) -- 3.3 Questionnaire Development -- 3.4 Analysis of EFA Result -- 3.5 TISM -- 3.6 TISM Model -- 3.7 Analysis of TISM-Based Model -- 4 Discussion. 5 Conclusions -- Appendix -- References -- Stability Analysis of Emerged Seaside Perforated Quarter Circle Breakwater Using Soft Computing Techniques -- 1 Introduction -- 1.1 General -- 1.2 Quarter Circle Breakwater -- 1.3 ANN -- 1.4 SVM -- 1.5 AdaBoost -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Separation of Data -- 3.3 Development of Prediction Models -- 3.4 Evaluation of Model Performance and Selection of the Best Model -- 4 Prediction Models -- 4.1 ANN -- 4.2 SVM -- 4.3 AdaBoost -- 5 Results and Discussion -- 5.1 Artificial Neural Network -- 5.2 Support Vector Machine -- 5.3 AdaBoost -- 6 Conclusions -- References -- A Risk-Budgeted Portfolio Selection Strategy Using Novel Metaheuristic Optimization Approach -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Proposed Strategy -- 4.1 Gradient Search Rule -- 4.2 Local Escaping Operator -- 5 Experimental Results -- 6 Conclusions and Future Scope -- References -- An Optimization Reconfiguration Reactive Power Distribution Network Based on Improved Bat Algorithm -- 1 Introduction -- 2 A Model of Reactive Power Optimization of Distribution Network -- 3 Improving Bat Algorithm -- 3.1 Bats Algorithm -- 3.2 Improving Bat Algorithm -- 3.3 The IBA for the RPODN Problem -- 4 Experimental Results -- 5 Conclusion -- References -- Analyzing a Raga-Based Bollywood Song: A Statistical Approach -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experimental Results and Discussion -- 4.1 Note Duration -- 4.2 IOI (Interonset Interval) -- 4.3 Unconditional Probability -- 4.4 Chi Square Goodness-of-Fit Test -- 4.5 Conditional Probability -- 4.6 Andrews Plot for Statistical Parameters of Music Phrase -- 5 Conclusion -- References -- Security Prioritized Heterogeneous Earliest Finish Time Workflow Allocation Algorithm for Cloud Computing -- 1 Introduction. 2 Related Work -- 3 Workflow Allocation Problem -- 4 SPHEFT -- 5 Experimental Results -- 6 Conclusions and Future Scope -- References -- Dropout-VGG Based Convolutional Neural Network for Traffic Sign Categorization -- 1 Introduction -- 2 Background and Related Work -- 2.1 Background -- 2.2 Deep Learning in Image Classification -- 3 Experiment -- 3.1 Dataset Description -- 4 Data Preprocessing -- 5 Network Architectures -- 5.1 VGG-16 Model -- 5.2 dVGG Model -- 6 Results and Comparison -- 7 Conclusion -- References -- Internet-Based Healthcare Things Driven Deep Learning Algorithm for Detection and Classification of Cervical Cells -- 1 Introduction -- 2 Literature Survey -- 3 Classification of Cervical Cancer -- 4 Cervical Cancer Screening Methods and Their Characterization -- 4.1 PAP Tests -- 4.2 Visual Inspection -- 4.3 Fluid-Based Cytology -- 4.4 HPV DNA Testing -- 4.5 Antibody -- 5 Approaches Used for Cervical Cytology -- 6 Channel Estimation Parameters -- 6.1 High Resolution Algorithm -- 7 Role of Machine Learning and Internet of Things in Diagnose the Cervical Disorder -- 8 Proposed Solution Strategies for Cervical Cancer Based on Internet of Things and Machine Learning -- 9 Conclusion and Future Scope -- References -- Load Balancing Algorithms in Cloud Computing Environment-An Effective Survey -- 1 Introduction -- 2 Load Balancing in Cloud Computing -- 2.1 Load Balancing -- 2.2 Challenges in Cloud Load Balancing -- 2.3 Types of Load Balancing -- 3 Existing Load Balancing Algorithms: A Review -- 3.1 Examining Static Load Balancing Algorithms -- 3.2 Examining Dynamic Load Balancing Algorithms -- 3.3 Review of Static and Dynamic Load Balancing Algorithms -- 4 Comparative Study of Static and Dynamic Load Balancing Algorithms -- 5 Conclusion -- References. Assessment of the Spatial Variability of Air Pollutant Concentrations at Industrial Background Stations in Malaysia Using Self-organizing Map (SOM). |
Record Nr. | UNINA-9910580161903321 |
Singapore : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Science and Applications : Proceedings of ICDSA 2023, Volume 3 |
Autore | Nanda Satyasai Jagannath |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (596 pages) |
Altri autori (Persone) |
YadavRajendra Prasad
GandomiAmir H SaraswatMukesh |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9978-17-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- PV Array System Stimulation Affected by Variability in Temperature and Location -- 1 Introduction -- 2 Phtotvoltaic Systems -- 3 System Description -- 3.1 Boost Converter -- 3.2 Inverter -- 3.3 Boost Converter Control Scheme -- 3.4 Inverter Control Scheme -- 4 Conclusion -- References -- A Real-Time Cataract Detection and Diagnosis Through Web-Based Imaging Analysis -- 1 Introduction -- 2 Literature Survey -- 3 Existing System -- 4 Proposed System -- 5 Dataset Details -- 6 Experimental Setup -- 7 Methodology -- 8 Algorithms Used -- 9 Results and Discussions -- 10 Performance Metrics -- 11 Comparative Analysis -- 12 Conclusion -- References -- A Survey of Decentralized Digital Voting System Using Blockchain Technology -- 1 Introduction -- 2 Elements of Voting Systems -- 3 Centralized Voting Technologies -- 3.1 SMS-Based Smartphone Application -- 3.2 Secure Voting Using Biometrics -- 3.3 Authenticated Web-Based Voting -- 3.4 Technologies Used in Constructing E-Voting System -- 4 Blockchain -- 4.1 Smart Contracts -- 4.2 Transactions -- 4.3 Role of Ethereum -- 5 Decentralized E-Voting Systems Overview -- 5.1 Quantum Blockchain -- 5.2 E-Voting with Blockchain -- 5.3 Verify-Your-Vote -- 5.4 E-voting Based on Blockchain and Blind Signature -- 5.5 Privacy Preserving Protocol -- 5.6 Large Scale Election Using Blockchain and Ring Signature -- 5.7 Existing Working Organizations -- 6 Challenges -- 6.1 Challenges of Blockchain -- 6.2 Scalability -- 6.3 Immatureness -- 6.4 Acceptance -- 6.5 Coercion -- 6.6 Energy Efficiency -- 6.7 Governmental Authority Opposition -- 6.8 Security Requirements -- 6.9 Open Issues -- 7 Conclusions -- References -- Multiple Infectious Disease Diagnosis and Detection Using Advanced CNN Models -- 1 Introduction -- 1.1 Paper Structure -- 2 Literature Survey -- 3 Methodology.
3.1 Dataset -- 3.2 Preprocessing -- 3.3 Applied Models -- 3.4 Performance Metrics -- 4 Results -- 5 Conclusion -- References -- Development of Indoor Autonomous Mobile BOT for Static Obstacle Avoidance -- 1 Introduction -- 2 AutoBOT Hardware -- 2.1 NodeMCU ESP12E Module -- 2.2 Ultrasonic Sensor -- 2.3 Infrared Sensor -- 2.4 L298N Driver Module -- 3 AutoBOT Software -- 4 Environment -- 5 Control Interface -- 6 Data Collection and Hardware Results -- 7 Conclusion -- References -- Forest Fire Detection and Prediction Using HSV and MLP -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 4 Technology -- 5 Dataset, Testing and Experiments -- 6 Results and Future Work -- 7 Conclusion -- References -- An Insight into Recent Advances in the Intelligent Controller Methods -- 1 Introduction -- 1.1 Fractional-Order PID Controller (FOPIDC) -- 2 Intelligent Control -- 2.1 Characteristics, Challenges, and Application of Intelligent Control System -- 3 Evolution in Intelligent Controller -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Some Observations on Social Media Mining tools for Health Applications -- 1 Introduction -- 2 Social Media Mining for Health Applications (SMM4HA) -- 3 Issues and Challenges -- 4 Observations of Various Methods Used for SMM4HA -- 5 Conclusion -- References -- Smart Contact Lenses for Monitoring Patient's Vision: A Generic Review -- 1 Introduction -- 2 Why Do Cataracts Occur? And Its Surgery -- 3 How the Eyes Function -- 4 Human Eye Lens -- 5 Related Work -- 5.1 Screen Reader -- 5.2 Braille Displays -- 5.3 Text-to-Speech (TTS) Software -- 5.4 Navigation Aids -- 5.5 Optical Character Recognition (OCR) Software -- 5.6 Voice Assistants -- 6 Recommendation -- 7 Conclusion -- References -- Liver Lesion Detection from MR T1 In-Phase and Out-Phase Fused Images and CT Images Using YOLOv8. 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Experimental Setup and Results -- 4.1 Experimental Environment -- 4.2 Dataset -- 4.3 Performance Metrics -- 4.4 Experimental Setup -- 4.5 Results -- 5 Conclusion -- References -- Analyzing Blockchain Data to Detect Bitcoin Addresses Involved in Illicit Activities Using Anomaly Detection -- 1 Introduction -- 2 Literature Review -- 3 Experimental Set up and Algorithm Used -- 3.1 HPCC Systems Architecture -- 3.2 R and R Studio -- 3.3 Algorithm Used: K-Means Clustering -- 4 Methodology -- 4.1 Parser -- 4.2 Feature Extraction -- 4.3 Clustering and Analysis -- 5 Discussion of Results -- 6 Conclusion and Future Scope -- References -- Comparing Spring Boot and ReactJS with Other Web Development Frameworks: A Study -- 1 Introduction -- 1.1 History -- 1.2 Need of Study -- 1.3 Overview -- 2 Review of Literature -- 3 Methodology -- 4 Result -- 5 Discussion -- 6 Conclusion -- References -- Performance Analysis of InceptionV3, VGG16, and Resnet50 Models for Crevices Recognition on Surfaces -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Understanding the Dataset -- 3.2 Data Preprocessing -- 3.3 Designing Model for Crack Detection Using Resnet50, VGG16, and InceptionV3 -- 3.4 Training of Models -- 3.5 Testing of Models -- 4 Results and Discussion -- 5 Conclusion -- References -- A Machine Learning Approach for Moderating Toxic Hinglish Comments of YouTube Videos -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Collection and Visualization -- 3.2 Text Preprocessing -- 3.3 Model Creation -- 4 Results and Discussion -- 5 Open Challenges -- 5.1 Collecting a Larger Dataset of Hinglish Toxic Comments -- 5.2 Capturing the Contextual and Cultural Nuances of Hinglish Text -- 5.3 Utilizing More Advanced NLP and Machine Learning Techniques. 5.4 Mitigating Human Biases in the Manual Annotation -- 6 Conclusion -- References -- Instant Accident Detection and Emergency Alert System -- 1 Introduction -- 2 Related Work -- 3 Existing System -- 4 Proposed System -- 5 Methodology -- 5.1 Authentication Module -- 5.2 Detection Module -- 5.3 Alert Module -- 6 Results and Discussion -- 7 Conclusion -- References -- A Novel Approach to Video Summarization Using AI-GPT and Speech Recognition -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 4 Result -- 5 Discussion/Future Works -- 6 Conclusion -- References -- Classification of Underwater Fish Species Using Custom-Built Deep Learning Architectures -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Feature Extraction -- 3.2 Classification -- 3.3 Data Set -- 3.4 Data Pre-processing -- 3.5 Splitting the Data Set -- 3.6 Training the Model -- 3.7 Testing the Model -- 4 Architecture -- 4.1 Vgg16 -- 4.2 MobileNetV2 -- 4.3 ResNet50 -- 5 Results -- 5.1 Predictions -- 5.2 Graphs -- 5.3 Confusion Matrix -- 6 Conclusion -- 7 Future Enhancements -- References -- Deep Learning-Based Approach for Plant Disease Classification -- 1 Introduction -- 2 Literature Survey -- 3 Working Flow of the Model -- 4 Proposed Architecture for Neural Network -- 5 Implementation and Result Analysis -- 6 Conclusions -- References -- Prediction of Liver Disease Using Machine Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Dataset Description -- 4 Proposed Methodology -- 4.1 Data Preprocessing -- 4.2 Label Encoding -- 4.3 Pearson Correlation Coefficient-Based Feature Selection (PCC-FS) -- 4.4 Oversampling -- 4.5 Feature Scaling -- 4.6 Classification -- 4.7 Evaluation Measures -- 5 Results -- 6 Conclusion -- References -- Analysis of Detection of Glioma by Segmentation of Brain Tumor MRI Images Using Deep Learning -- 1 Introduction. 2 Techniques for Segmenting Brain Tumor Images -- 2.1 Manual Segmentation Methods -- 2.2 Semi-Automatic Segmentation Methods -- 2.3 Fully Automatic Segmentation Methods -- 3 Challenges in Fully Automatic Segmentation Methods -- 4 Dataset -- 5 Deep Learning Methods -- 6 Conclusions -- References -- CloneAI: A Deep Learning-Based Approach for Cloned Voice Detection -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Employed -- 3.2 Pre-processing and Feature Extraction -- 3.3 Model Implementation -- 4 Results and Discussion -- 5 Conclusion -- References -- Analyzing the Performance and Wireless Network Capacity of NOMA: Study of the Impact of OMA and NOMA on 5G Network -- 1 Introduction -- 2 System Model -- 3 Literature Survey -- 4 Compared Analysis -- 5 Conclusion -- References -- Malaria Parasite Detection Using Deep Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Dataset -- 3.2 Data Preprocessing -- 3.3 Model Training and Classification -- 4 Experimental Results and Analysis -- 5 Conclusion -- References -- IoT-Based Agriculture: Identification and Classification of Apple Quality Using Deep Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Problem Statement -- 3.2 Proposed Methodology -- 4 Results Analysis -- 5 Conclusion -- References -- Plant Disease Detection on Edge Devices -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 4 Deep Learning Models -- 4.1 Comparison Between Model Sizes -- 4.2 Framework -- 5 Raspberry Pi Implementation -- 5.1 Integrated Gradients -- 6 Results -- 6.1 Raspberry Pi's Performance -- 7 Conclusion -- References -- Analyze the Quality of Wine Based on Machine Learning Approach -- 1 Introduction -- 2 Literature Survey -- 3 Quality Prediction Model -- 4 Results and Analysis -- 5 Conclusion -- References. Safeguarding Financial Transaction with Cryptocurrency. |
Record Nr. | UNINA-9910805579003321 |
Nanda Satyasai Jagannath
![]() |
||
Singapore : , : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Science and Applications : Proceedings of ICDSA 2023, Volume 1 |
Autore | Nanda Satyasai Jagannath |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (569 pages) |
Disciplina | 005.7 |
Altri autori (Persone) |
YadavRajendra Prasad
GandomiAmir H SaraswatMukesh |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9978-62-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Climate Change Parameter Dataset (CCPD): A Benchmark Dataset for Climate Change Parameters in Jammu and Kashmir -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology -- 3.1 Overview -- 3.2 Forest Cover -- 3.3 Water Bodies -- 3.4 Agriculture and Vegetation -- 3.5 Population -- 3.6 Temperature -- 3.7 Construction -- 3.8 Air Index -- 4 Dataset Results -- 5 Conclusion -- References -- Brain Tumor Classification Using Deep Learning Techniques -- 1 Introduction -- 2 Review of Previous Work -- 3 Information About the Data and Environmental Setup -- 3.1 Data Preparation and Exploration -- 4 Convolutional Neural Networks and Techniques Implemented -- 4.1 AlexNetV2 -- 4.2 VGG-16 -- 4.3 ResNet-50 -- 4.4 Inception-ResNet -- 4.5 MobileNetv2 -- 5 Experimental Approaches -- 5.1 Novel CNN Architecture -- 5.2 Parallel Networks Model -- 5.3 Machine Learning Assisted -- 6 Optimisation Using Nature-Inspired Algorithms -- 6.1 Particle Swarm Optimization -- 6.2 Genetic Algorithm -- 7 Conclusion -- References -- Machine Learning-Based Hardware Trojans Detection in Integrated Circuits: A Systematic Review -- 1 Introduction -- 2 Machine Learning and Models -- 3 A Review of Machine Learning Methods for Hardware Trojan Detection -- 3.1 Reverse Engineering -- 3.2 Circuit Feature Analysis -- 3.3 Side-Channel Analysis -- 3.4 Golden Model Free Analysis -- 3.5 Classification Approaches -- 3.6 Final Result of Hardware Trojan Detection Approaches -- 4 Discussion and Future Work -- 5 Conclusion -- References -- Impact of Technostress on Employee Retention and Employee Turnover -- 1 Introduction -- 2 Literature Review -- 3 Theoretical Background and Hypothesis -- 4 Methodology -- 5 Data Analysis and Discussion -- 6 Limitations and Future Scope -- 7 Conclusion -- References.
Single Image Dehazing Using DCP with Varying Scattering Constant -- 1 Introduction -- 2 Haze Formation Model -- 3 Solution Approach -- 3.1 Estimation of Atmospheric Light Using DCP -- 3.2 Estimating Omega -- 4 Results and Discussion -- 5 Conclusion -- References -- Detecting IoT Malware Using Federated Learning -- 1 Introduction -- 2 Related Works -- 2.1 Signature-Based Detection -- 2.2 Behavior-Based Detection -- 2.3 Machine Learning-Based Detection -- 2.4 Deep Learning-Based Detection -- 2.5 Motivation for Federated Learning -- 3 Federated Learning -- 3.1 Overview of Federated Learning -- 3.2 Mathematical Formulation -- 3.3 Challenges and Considerations in Federated Learning -- 4 Federated Learning Strategy for IoT Malware Recognition -- 4.1 Obstacles and Rationale -- 4.2 Model Design -- 4.3 Procedure of Federated Learning -- 5 Experimental Results and Evaluation -- 6 Conclusion -- References -- A Deep Learning Approach for BGP Security Improvement -- 1 Introduction -- 2 Related Work -- 3 Deep Learning Models -- 3.1 Convolutional Neural Network (CNN) -- 4 Dataset -- 5 Proposed Technique -- 6 Evaluation Metrics -- 7 Experimental Results -- 8 Conclusion -- References -- Wireless Sensor Network Protocols in Underwater Communication -- 1 Introduction -- 1.1 Underwater Wireless Sensor Network Architecture -- 2 Challenges Regarding UWSNs -- 2.1 Propagation Delay -- 2.2 Bandwidth -- 2.3 Energy Consumption -- 2.4 Communication Coverage -- 2.5 Attenuation -- 2.6 Cost -- 2.7 Sophisticated Techniques -- 3 Routing Protocols -- 3.1 Localization-Based Protocols -- 3.2 Localization-Free Protocols -- 3.3 Cooperation Routing -- 4 Conclusion -- References -- A Genetic Algorithm Approach for Portfolio Optimization -- 1 Introduction -- 1.1 Techniques for Portfolio Optimization -- 2 Genetic Algorithm -- 3 Scope of Genetic Algorithm -- 4 Fitness Function. 5 Genetic Algorithm-Based Portfolio Optimization -- 6 Result and Analysis -- 7 Advantages -- 8 Conclusion -- References -- Security Issues and Solutions in Post Quantum Authenticated Key Exchange for Mobile Devices -- 1 Introduction -- 2 Contribution -- 3 Description of Signal Leakage Attack -- 4 Preliminaries -- 5 Dabra et al. ``Lattice-Based Key Exchange for Mobile Devices ch10dabra2020lba'' -- 6 Statement of Problem -- 6.1 Registration Issues -- 6.2 Password Change Issues -- 6.3 Insider Attack -- 6.4 Signal Leakage Attack -- 7 Changes Required in Dabra et al.'s Registration Phase -- 8 Conclusion/Future Directions -- References -- Towards Decentralized Fog Computing: A Comprehensive Review of Models, Architectures, and Services -- 1 Introduction -- 1.1 Fog Computing, an Extension of Cloud Computing -- 1.2 Fog Over Cloud -- 1.3 Transition from Cloud to Fog -- 2 Motivation -- 3 Literature Survey -- 4 Architectural Model -- 4.1 Architectural Styles -- 4.2 Views -- 4.3 Dimensions -- 4.4 Related Work -- 5 Discussion -- 6 Research Contributions -- 7 Conclusion -- References -- Analysis of Various Mac Protocols in 802.11 AX -- 1 Introduction -- 1.1 OFDMA Multi-user Transmissions in 802.11ax -- 2 Literature Review -- 2.1 Comparison Table -- 3 Conclusion -- References -- Monkeypox Disease Classification Using HOG-SVM Model -- 1 Introduction -- 1.1 Transmission -- 1.2 Symptoms of Monkeypox Disease -- 1.3 Traditional Detection -- 1.4 Traditional Treatments of Monkeypox -- 1.5 AI-Based Detection -- 2 Literature Survey -- 3 Materials and Methods -- 3.1 Dataset -- 3.2 Feature Extraction -- 3.3 Classification -- 3.4 Support Vector Machine (SVM) -- 4 Implementation -- 5 Evaluation Matrices -- 6 Result -- 7 Conclusion -- References -- A Deep Learning Model for Automatic Recognition of Facial Expressions Using Haar Cascade Images -- 1 Introduction. 2 Literature Review -- 3 The Presented Approach -- 3.1 Dataset -- 3.2 Pre-processing -- 3.3 Presented Deep Learning Model -- 3.4 Testing -- 4 Result -- 5 Conclusion and Future Work -- References -- Sensing Performance Analysis Using Choatic Signal-Based SCMA Codebook for Secure Cognitive Communication System in 5G -- 1 Introduction -- 1.1 Related Work -- 2 SCMA with Chaotic Sequence-Based System Analysis -- 2.1 Dynamic Characteristic of Chaotic Sequence -- 2.2 SCMA Modeling -- 3 System Model -- 3.1 SCMA Encoding -- 3.2 SCMA Decoding -- 4 Proposed Detection Method -- 4.1 Binary Hypothesis Testing -- 4.2 Wald Hypothesis Test -- 4.3 Weight Assignment Method -- 4.4 Experimental Setup -- 5 Detection Performance Analysis -- 6 Conclusion -- References -- Identification of Severity Level for Diabetic Retinopathy Detection Using Neural Networks -- 1 Introduction -- 2 Review of Literature -- 3 Motivation of Proposed Research Work -- 4 Existing Datasets -- 4.1 Dataset from Zenodo -- 4.2 EyePACS Dataset from Kaggle -- 4.3 APTOS Dataset from Kaggle -- 5 Proposed Methodology -- 5.1 Flow of the Proposed Work -- 5.2 Preprocessing on the Dataset -- 5.3 Architecture Used for the Proposed Work -- 5.4 Implementation Platform and Performance Matrix -- 6 Results -- 7 Conclusion -- 8 Future Work -- References -- Metaheuristic Optimized BiLSTM Univariate Time Series Forecasting of Gold Prices -- 1 Introduction -- 2 Related Works -- 2.1 BiLSTM Overview -- 2.2 Variation Mode Decomposition -- 2.3 Metaheuristics Optimization -- 3 Methods -- 3.1 Overview of Basic Moth Flame Optimizer Algorithm -- 3.2 Modified MFO -- 4 Experiments and Discussion -- 4.1 Dataset -- 4.2 Experimental Setup -- 4.3 Results and Discussion -- 5 Conclusion -- References -- Improvised Neural Machine Translation Model for Hinglish to English -- 1 Introduction -- 2 Literature Review. 2.1 Sequence-to-Sequence (STS) -- 2.2 Attention (ATT) Model -- 3 Methodology -- 3.1 Dataset -- 3.2 Processing Data -- 3.3 Proposed System -- 4 Results -- 5 Discussion -- 5.1 No Smoothing -- 5.2 Laplace Smoothing -- 5.3 Additive Smoothing -- 5.4 Exponential Smoothing -- 5.5 Chen and Cherry Smoothing -- 6 Conclusion -- References -- Recording of Class Attendance Using DL-Based Face Recognition Method -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Dataset Creation -- 3.2 Preprocessing -- 3.3 Face Detection and Recognition -- 3.4 Attendance Marking and Report Generation -- 3.5 Implementation -- 4 Result Analysis -- 5 Conclusions -- References -- Machine Learning Enabled Hairstyle Recommender System Using Multilayer Perceptron -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Description -- 3.2 Data Preprocessing -- 3.3 Facial Landmark Detection -- 3.4 Face Shape Classification -- 3.5 Model Comparison -- 3.6 Recommendation -- 4 Results and Discussion -- 5 Conclusion -- References -- Automated Health Insurance Management Framework with Intelligent Fraud Detection, Premium Prediction, and Risk Prediction -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Dataset Specifics -- 3.2 Exploratory Data Analysis -- 3.3 Feature Engineering and Selection -- 3.4 Machine Learning Models -- 4 Experimental Results and Discussion -- 5 Conclusion and Future Work -- References -- Responsible Artificial Intelligence for Music Recommendation -- 1 Introduction -- 2 Background and Motivation -- 3 Literature Review -- 3.1 Identifying Research Gaps in the Literature -- 3.2 Contributions of This Paper -- 4 Methodology -- 4.1 Data Acquiring and EDA -- 4.2 Model Development and Evaluation -- 4.3 Feature Importance and Model Retrain -- 4.4 Explainable AI -- 5 Results -- 6 Conclusion -- 7 Future Work -- References. A Robot Mapping Technique for Indoor Environments. |
Record Nr. | UNINA-9910838288103321 |
Nanda Satyasai Jagannath
![]() |
||
Singapore : , : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Science and Applications : Proceedings of ICDSA 2023, Volume 2 |
Autore | Nanda Satyasai Jagannath |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (533 pages) |
Disciplina | 005.7 |
Altri autori (Persone) |
YadavRajendra Prasad
GandomiAmir H SaraswatMukesh |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9978-20-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Comparative Analysis of Various SRAM Bit Cells for 32 nm Technology Node -- 1 Introduction -- 2 Review of Pre-existing Cells -- 3 Stability Analysis -- 3.1 Hold Static Noise Margin (HSNM) -- 3.2 Read Static Noise Margin (RSNM) -- 3.3 Write Margin (WM) -- 4 Half Select Disturbance -- 5 Conclusion -- References -- Uncovering the Threat: Exploring Covert Channel Attacks Via Audio Files in Android Applications -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Conclusion -- References -- Emotion Recognition Through Facial Expressions from Images Using Deep Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Model -- 3.1 Face Detection -- 3.2 Image Preprocessing -- 3.3 Feature Extraction -- 3.4 Emotion Classification -- 4 Experimental Results -- 4.1 Dataset -- 4.2 Experimental Results -- 5 Conclusion -- References -- Optimization of Process Parameters in the Abrasive Waterjet Machining Using Bees Algorithm -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Solution Development -- 4.1 Model or Prototype Solution -- 5 The Mathematical Model -- 5.1 Solution Development -- 5.2 Data Processing -- 6 Validation and Result Analysis -- 6.1 Experimental Design -- 6.2 Result Illustration and Explanation -- 6.3 Validation of the BA Result -- 6.4 Result Analysis -- 7 Conclusion -- References -- Advancement on Steganography: A Review -- 1 Introduction -- 2 Background -- 3 Understanding Various Techniques and Methodologies -- 3.1 Spatial Domain Techniques -- 3.2 Frequency Domain Techniques -- 4 Literature Review -- 5 Possible Problems Faced -- 6 Conclusion -- References -- Ethereum Blockchain for Private Equity Crowdfunding: Enabling Seamless USDC and Share Token Transactions -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Methodology -- 5 Results.
6 Conclusion -- References -- Graph Convolutional Neural Network for IC50 Prediction Model Using Amyotrophic Lateral Sclerosis Targets -- 1 Introduction -- 2 Dataset Formulation -- 3 Model Building -- 4 Results and Discussion -- 5 Conclusion -- References -- Cardiovascular Disease Prediction Using Deep Learning Models -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Data Pre-processing and Cleaning Method -- 3.2 Regularization Technique -- 4 Results -- 5 Conclusions -- 6 Future Scope -- References -- Classification of Skin Cancer Using Integrated Methodology -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Data Set -- 3.2 Model Implementation and Training -- 4 Results and Analysis -- 5 Conclusion -- References -- Identification of Mycobacterium Tuberculosis Employing VGG-16 Feature Extraction and Classification Using Prominent Machine Learning Classifiers on X-rays -- 1 Introduction -- 2 Literature Review -- 3 Material and Methods -- 3.1 Dataset and Preprocessing -- 3.2 Feature Extraction -- 3.3 ML Classifiers -- 3.4 Performance Metrics -- 4 Results and Discussion -- 5 Conclusion -- References -- Cybercrime Analysis of India Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Dataset Description -- 3.1 Cybercrimes -- 3.2 Cybercrimes Types -- 3.3 Cybercrimes Motives -- 4 Methodology -- 4.1 Data Preprocessing -- 4.2 Approach -- 4.3 System Architecture -- 5 Results and Analysis -- 5.1 Cybercrimes -- 5.2 Cybercrime Types -- 5.3 Cybercrimes Motives -- 6 Conclusion -- References -- Mapping a Conceptual Model of Colour Forecasting: A Review of Machine Learning Algorithms for Enhanced Prediction Accuracy and Efficiency -- 1 Background -- 1.1 The Era of Digital Colour Forecasting -- 2 Significance of Colour Trend Forecasting -- 2.1 The Colour Cycle -- 2.2 Process of Colour Forecasting. 3 Science Meets Intuition -- 3.1 Big Data for Colour Forecasting -- 3.2 Artificial Intelligence Techniques for Colour Trend Forecasting -- 3.3 Databases -- 3.4 Applications of Machine Learning in Colour Identification Process -- 4 Colour System and Colour Spaces -- 4.1 Pantone Colour System -- 5 Discussion -- 6 Conclusion -- References -- Estimation of Net Primary Productivity Using CASA Biosphere Model in Hyderabad and Roorkee Region of India -- 1 Introduction -- 2 Literature Review -- 3 Study Area -- 4 Dataset Used for Analysis -- 4.1 Soil Data -- 4.2 Vegetation Data -- 4.3 Land Use Data -- 5 Model Structure -- 6 Results -- 6.1 NPP Variation within a Year -- 6.2 NPP Variation Over the Years -- 7 Conclusion -- References -- Machine Learning Models for Chronic Renal Disease Prediction -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Preprocessing: Handling Missing Value -- 3.2 Data Preprocessing: Feature Selection -- 3.3 Model Training -- 3.4 Model Evaluation and Selection -- 4 Discussion -- 5 Conclusion and Future Work -- References -- ARTHRO-Knee Osteoarthritis Detection Using Deep Learning -- 1 Introduction -- 2 Related Survey -- 3 Material and Methods -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Convolutional Neural Networks -- 4 Proposed Method -- 5 Results and Discussion -- 6 Conclusion -- References -- Improvised Real-Time Tweet Analysis for Brand Recognition -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Method -- 4 Result and Discussion -- 5 Conclusion -- References -- AI-Based Facial Emotion Recognition -- 1 Introduction -- 2 Related Work -- 3 Simulation Setup -- 3.1 Background -- 3.2 Dataset, Preprocessing, and Augmentation -- 3.3 Improved VGG16 Architecture -- 3.4 Tuning -- 4 Results -- 5 Observations -- 6 Conclusion -- References. Improved Genetic Algorithm in a Static Environment for the Robotic Path Planning Problem -- 1 Introduction -- 2 Description of the Optimization Problem -- 2.1 Robotic Path Planning Problem -- 2.2 Genetic Algorithm -- 2.3 Genetic Algorithm in Path Planning -- 2.4 Problem Model -- 2.5 Optimization Method -- 3 Optimization Framework and Test Cases -- 4 Results -- 5 Conclusion and Outlook -- References -- Development of An Event-Based Dataset For Abnormal Activity Detection -- 1 Introduction -- 2 Related Works -- 2.1 Machine Learning Using Event Camera Datasets -- 2.2 Methodology -- 3 Experiments -- 3.1 Event Dataset for Abnormal Activity Detection -- 3.2 Clustering on Event Dataset -- 4 Future Work and Conclusion -- References -- Media Text Analysis Based on One-Dimensional Hashtag Embeddings -- 1 Introduction -- 2 Notation and Problem Definition -- 3 Methodology -- 4 Empirical Results -- 4.1 Dataset Description -- 4.2 One-Dimensional Embedding -- 5 Conclusion -- References -- Occluded Face Recognition Using Non-Global Features Extraction and K-Means Clustering Algorithm -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Image Preprocessing -- 3.2 Features Extraction -- 3.3 Classifiers -- 4 Experimental Setup -- 4.1 Datasets -- 4.2 Results -- 5 Conclusion -- References -- Brain Tumor Segmentation Using Gaussian-Based U-Net Architecture -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 BraTS Dataset -- 3.2 Pre-processing -- 3.3 U-Net Architecture -- 3.4 Model Training -- 3.5 Model Evaluation Metrics -- 3.6 Numerical Result and Discussion -- 3.7 Merits and Contrast -- 4 Conclusion and Future Work -- References -- Utility of Smoothing Techniques in Yield Curve Modeling for Non-Steady State Data of Sri Lanka Capital Market -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Experiment -- 5 Results -- 6 Discussion. 7 Conclusion -- References -- WSN-Based Secure and Energy-Efficient Smart Parking Management System (SPMS) Using FFA-ANN -- 1 Introduction -- 2 Motivation of Research -- 3 Related Work -- 4 Problem Definition -- 5 Proposed Work -- 6 Result and Discussions -- 6.1 Network Throughput -- 6.2 Number of Alive Nodes -- 7 Conclusion -- References -- Multilingual Approach to Decode Shree Rama Prashanavali Using Character Recognition and String Matching -- 1 Introduction -- 2 Literature and Survey -- 3 Methodology -- 3.1 Algorithm for the Proposed Work -- 4 Results and Discussions -- 5 Conclusion -- References -- An Enhanced Approach for Automatic Sound Event Detection Using Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Data Set -- 3.2 Feature Extraction -- 3.3 Model Implementation -- 4 Experimental Results and Analysis -- 5 Conclusion -- References -- Detecting Issues Related to Environmental, Social, and Corporate Governance Using SEC-BERT -- 1 Introduction -- 2 Related Works -- 3 Problem Statement -- 4 Dataset -- 5 Methodology -- 6 Experiments and Results -- 7 ESG Issue Detector (EID) Tool -- 8 Conclusion -- References -- Comprehensive Analysis of Deep Learning Models for Brain Tumor Detection from Medical Imaging -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 AlexNet -- 3.2 VGG-16 [12] -- 3.3 ResNet50 -- 3.4 DenseNet-121 -- 3.5 GoogleNet -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 Experiments and Result Analysis -- 5 Conclusion -- References -- Face Counting Based on Pre-trained Machine Learning Models: A Brief Systematic Review -- 1 Introduction -- 2 Background Study -- 3 Face Detection Algorithms -- 3.1 Haar Cascade Classifier -- 3.2 Multi-task Cascaded Convolutional Networks (MTCNN) Architecture -- 3.3 RetinaFace Architecture -- 4 Results -- 5 Discussion -- 6 Conclusion -- References. A Machine Learning-Driven Soil Nutrient and Crop Yield Recommendation Platform with Pesticide Suggestions. |
Record Nr. | UNINA-9910841863303321 |
Nanda Satyasai Jagannath
![]() |
||
Singapore : , : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Data Science and Applications : Proceedings of ICDSA 2023, Volume 4 |
Autore | Nanda Satyasai Jagannath |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (546 pages) |
Disciplina | 005.7 |
Altri autori (Persone) |
YadavRajendra Prasad
GandomiAmir H SaraswatMukesh |
Collana | Lecture Notes in Networks and Systems Series |
ISBN |
9789819978144
9789819978137 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910841854503321 |
Nanda Satyasai Jagannath
![]() |
||
Singapore : , : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Intelligent vision in healthcare / / edited by Mukesh Saraswat, Harish Sharma, Karm Veer Arya |
Pubbl/distr/stampa | Singapore : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (161 pages) |
Disciplina | 610.285 |
Collana | Studies in autonomic, data-driven and industrial computing |
Soggetto topico |
Artificial intelligence - Medical applications
Computer vision in medicine |
ISBN |
981-16-7770-0
981-16-7771-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910743357903321 |
Singapore : , : Springer, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of International Conference on Computational Intelligence [[electronic resource] ] : ICCI 2022 / / edited by Ritu Tiwari, Mario F. Pavone, Mukesh Saraswat |
Autore | Tiwari Ritu |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (400 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
PavoneMario F
SaraswatMukesh |
Collana | Algorithms for Intelligent Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Machine learning Big data Computer networks Computational Intelligence Artificial Intelligence Machine Learning Big Data Computer Communication Networks |
ISBN | 981-9928-54-0 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Entropy measure for the linguistic intuitionistic fuzzy set -- Principal component analysis and correlation coefficient-based decision-making approach for stock portfolio selection -- Determination of Thickness and Refractive Indices of Thin-Films from Reflectivity Spectrum using Rao-1 Optimization Algorithm -- Deep Sea Debris Detection using YOLOIncep Network -- Precipitation Forecasting: LSTM Modelling in Visual Analytic Frame work -- Cyclone Forecasting Before Eye Formation Using Deep-Learning -- Efficient Approach for Malware Detection Using Machine Learning Classifier -- Distances from Fuzzy Implications -- Real Time quick Fog removal Technique for supporting vehicles on hilly routes amid dense fog -- Deep learning based approach for outlier detection in wireless sensor network -- Predicting Kidney Tumor Using Convolutional Neural Network (CNN) -- Comparative Analysis of Cognitive Services in popular cloud platforms -- A Survey on Efficient Neural Network Compression Techniques -- Implementation of Reliable Post-Disaster Relief -- Communication Network Using Hybrid Secure Routing Protocol -- Compact Metamaterial Octagonal Antenna for Wireless Body Area Network -- A survey on different techniques for Anomaly detection -- A Scholastic Comprehensive study on 6G Wireless Communication System -- A Modified LSB Steganography Algorithm to Store Images of Large Size. |
Record Nr. | UNINA-9910734876503321 |
Tiwari Ritu
![]() |
||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of International Conference on Data Science and Applications . Volume 2 : ICDSA 2022 / / edited by Mukesh Saraswat [and three others] |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (908 pages) |
Disciplina | 016.403 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Artificial intelligence
Big data |
ISBN | 981-19-6634-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Improving River Streamflow Forecasting utilizing Multi-layer Perceptron-based Butterfly Optimization Algorithm -- Covid-19 Contact Tracing Using Low Calibrated Transmission Power from BLE – Approach & Algorithm Experimentation -- Monitoring loud commercials in television broadcast -- Potential Customers Prediction in Bank Telemarketing -- Analysis and implementation of normalization techniques on KDD'99 Dataset for Detect and Prevent Intrusion on Network -- Deep Neural Networks Predicting Student Performance -- An Efficient Group Signature Scheme based on ECDLP -- Sentiment Analysis of COVID-19 tweets using TextBlob and Machine Learning classifiers - An evaluation to show how COVID -19 opinions is influencing psychological reactions of people‘s behaviour in social media. |
Record Nr. | UNINA-9910647785903321 |
Singapore : , : Springer, , [2023] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of International Conference on Data Science and Applications . Volume 1 : ICDSA 2022 / / Mukesh Saraswat [and three others] |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (946 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Artificial intelligence
Data mining |
ISBN | 981-19-6631-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cancer Prognosis by Using Machine Learning and Data Science: A systematic review -- Understanding Agriculture Scenario of Punjab: A Qualitative Research of Crop parameter in relation to fertilizer usage -- Face Detection Based Border Security System Using Haar-Cascade and LBPH Algorithm -- Proposed Experimental Design of a Portable COVID-19 Screening Device Using Cough Audio Samples -- Big Data Framework for Analytics Business Intelligence -- Technological Impacts of AI on Hospitality and Tourism Industry -- Improvement of Real-Time Kinematic Positioning Using Kalman Filter-Based Singular Spectrum Analysis during Geomagnetic Storm for Thailand sector. |
Record Nr. | UNINA-9910672439203321 |
Singapore : , : Springer, , [2023] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|