Fourth International Conference on Image Processing and Capsule Networks : ICIPCN 2023 / / edited by Subarna Shakya, João Manuel R. S. Tavares, Antonio Fernández-Caballero, George Papakostas
| Fourth International Conference on Image Processing and Capsule Networks : ICIPCN 2023 / / edited by Subarna Shakya, João Manuel R. S. Tavares, Antonio Fernández-Caballero, George Papakostas |
| Autore | Shakya Subarna |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (741 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
TavaresJoão Manuel R. S
Fernández-CaballeroAntonio PapakostasGeorge |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Computer vision Signal processing Algorithms Computational Intelligence Computer Vision Signal, Speech and Image Processing |
| ISBN |
9789819970933
9819970938 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Modern Challenges & Limitations in Medical Science using Capsule Networks: A Comprehensive Review -- Studies on movie soundtracks over the last five years -- Blind Source Separation of EEG Signals using Wavelet and EMD Decomposition -- Image Extraction Approaches for Density Count Measurement in Obstruction Renography Using Radiotracer 99mTc-DTPA -- Deep Short-Term Long Memory Technique For Respiratory Lung Disease Prediction -- Utilizing Satellite Imagery For Flood Monitoring In Urban Regions -- Optimizing Permutations in Biclustering Algorithms -- Extracting Graphs from Plant Leaf Venations using Image Processing -- Multispectral fusion of multi-sensor image data using PCNN for performance evaluation in sensor networks -- U-Net based segmentation of coronary arteries in invasive coronary angiography -- Change Detection for Multispectral Remote Sensing Images Using Deep Learning -- Explainable AI for Black Sigatoka Detection -- ModifiedU-Net and CRF for image segmentation of crop images -- Securing Data in the Cloud: The Application of Fuzzy Identity Biometric Encryption for Enhanced Privacy and Authentication -- Quantum Convolutional Neural Network for Agricultural Mechanization and Plant Disease Detection -- Innovative Method for Alzheimer's Disease Detection Using Convolutional Neural Networks -- Segmentation of White Matter Lesions in MRI Images using Optimization-based Deep Neural Network -- A New Multi-Level Hazy Image and Video Dataset for Benchmark of Dehazing Methods -- Creative AI using DeepDream -- Tuberculosis Bacteria Detection Using Deep Learning Techniques -- An enhanced real-time system for wrong-way and over speed violation detection using deep learning -- U-Net based Denoising Autoencoder Network for de-speckling in fetal ultrasound images -- Galo Lexical Tone Recognition Using Machine Learning Approach. |
| Record Nr. | UNINA-9910765485303321 |
Shakya Subarna
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Mobile Computing and Sustainable Informatics : Proceedings of ICMCSI 2023 / / edited by Subarna Shakya, George Papakostas, Khaled A. Kamel
| Mobile Computing and Sustainable Informatics : Proceedings of ICMCSI 2023 / / edited by Subarna Shakya, George Papakostas, Khaled A. Kamel |
| Autore | Shakya Subarna |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (792 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
PapakostasGeorge
KamelKhaled A |
| Collana | Lecture Notes on Data Engineering and Communications Technologies |
| Soggetto topico |
Computational intelligence
Mobile computing Computer networks - Security measures Artificial intelligence Computational Intelligence Mobile Computing Mobile and Network Security Artificial Intelligence |
| ISBN | 981-9908-35-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Measuring the technical efficiency of Thai rubber export using the spatial stochastic frontier model under the BCG concept -- Analysis of Digital data Consumption of video streaming platforms during COVID-19 -- A Prototype of Wireless Power Transmission System Based on Arduino -- Short review on blockchain technology for smart city security -- Efficient Analysis of Sequences of Security Problems in Access Control Systems -- Artificial Intelligence in Agriculture: Machine Learning based Early Detection of Insects and Diseases with Environment and Substance Monitoring us-ing IoT -- Design Concepts for Mobile Computing Direction Finding Systems -- A Hybrid Machine Learning Model for Urban Mid- and Long-term Electricity Load Forecasting -- Optimizing Long Short-Term Memory by Improved Teacher Learning Based Optimization for Ethereum Price Forecasting -- A Sophisticated review on Open Verifiable Health Care system in Cloud -- Fuzzy Metadata Augmentation for Multimodal Data Classification -- Development of information accuracy control system -- MODELLING AN EFFICIENT APPROACH TO ANALYZE CLONE PHISHING AND PREDICT CYBER-CRIMES -- The Application of Mobile Phones to Enable Traffic Flow Optimisation. |
| Record Nr. | UNINA-9910728384503321 |
Shakya Subarna
|
||
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Mobile Computing and Sustainable Informatics : Proceedings of ICMCSI 2021
| Mobile Computing and Sustainable Informatics : Proceedings of ICMCSI 2021 |
| Autore | Shakya Subarna |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
| Descrizione fisica | 1 online resource (864 pages) |
| Altri autori (Persone) |
BestakRobert
PalanisamyRam KamelKhaled A |
| Collana | Lecture Notes on Data Engineering and Communications Technologies Ser. |
| Soggetto genere / forma | Electronic books. |
| ISBN | 981-16-1866-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Mitigating the Latency Induced Delay in IP Telephony Through an Enhanced De-Jitter Buffer -- 1 Introduction -- 1.1 Problem Formulation -- 2 Relevant Works -- 3 VOIP Technique and Network Structure -- 3.1 Media Gateways and Call Managers -- 3.2 Topologies -- 3.3 Session Initiation Protocol (SIP) -- 3.4 SIP Elements -- 4 Limitations -- 5 The Proposed Solution -- 5.1 Modification in De-Jitter Buffer -- 6 Results and Analysis -- 7 Conclusion -- References -- A Cyber-Safety IoT-Enabled Wearable Microstrip Antenna for X-Band Applications -- 1 Introduction -- 2 Existing Approach -- 3 Antenna Design -- 3.1 Antenna Configuration -- 3.2 Antenna Performance -- 3.3 Simulated Results -- 3.4 Measured Results -- 4 Conclusion and Future Work -- References -- Keyword Recognition from EEG Signals on Smart Devices a Novel Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Overview -- 2.2 Data Acquisition -- 2.3 Data Preprocessing -- 3 Feature Extraction -- 3.1 DWT Feature Extraction -- 3.2 FFT Feature Extraction -- 3.3 Feature Fusion -- 3.4 Dimensionality Reduction -- 3.5 Command Map Table and Task Observer Thread -- 3.6 Tools and Software -- 4 Classifiers Used -- 4.1 SVM Classifier -- 4.2 KNN Classification -- 4.3 CNN Classifier -- 4.4 Random Forest -- 4.5 Performance Measure -- 5 Results and Discussion -- 6 Conclusion -- References -- Security Analysis for Sybil Attack in Sensor Network Using Compare and Match-Position Verification Method -- 1 Introduction -- 2 Sybil Attach and Security -- 2.1 WSN on Security Attacks -- 2.2 Sybil the Attack -- 3 Compare with Match-Position and Verification of Method -- 4 Message Authentication and Passing (MAP) -- 5 Result and Discussion -- 6 Conclusion -- References -- Certain Strategic Study on Machine Learning-Based Graph Anomaly Detection.
1 Introduction -- 2 Generalized Machine Learning Approaches Towards Outlier Detection -- 2.1 Key Challenges Identified in ML Techniques -- 3 Graph-Based Anomaly Detection Methods -- 3.1 Moving Towards Graph Representation -- 3.2 Existing Graph Basis Anomaly Detection Methods (GBAD) -- 3.3 Baseline Link Analysis Ranking Algorithms -- 3.4 Structure-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.5 Community-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.6 Graph Compression Strategies -- 4 Open Challenges in GBAD -- 5 Concluding Remarks -- References -- Machine Learning Perspective in VLSI Computer-Aided Design at Different Abstraction Levels -- 1 Introduction to Machine Learning and VLSI CAD -- 2 The Basic Paradigm of Machine Learning -- 3 Areas of Machine Learning -- 4 Machine Learning Algorithms -- 5 Drawbacks of Machine Learning -- 6 Application of Machine Learning in VLSI CAD Abtraction Levels -- 6.1 Machine Learning in Automatic Generation of Assertion in RTL Design -- 6.2 Machine Learning in Chip Testing -- 6.3 Machine Learning for Physical Design Routing -- 6.4 Machine Learning in Physical Design Floor Planning -- 6.5 Machine Learning in Static Timimg Analysis (STA) -- 6.6 Machine Learning in Gate-Level Netlist -- 6.7 Machine Learning in EDA and IC Design -- 7 Conclusion and Future Scope -- References -- A Practical Approach to Measure Data Centre Efficiency Usage Effectiveness -- 1 Introduction -- 2 Energy Versus Power -- 2.1 IT Load -- 2.2 Effect of Outdoor Condition -- 2.3 User Configuration -- 2.4 Product Review Analysis -- 3 Related Work -- 4 Proposed Work -- 5 Result Analysis -- 6 Conclusion -- References -- Advancing e-Government Using Internet of Things -- 1 Introduction -- 2 Social Networks and Machine Learning -- 3 Health Care -- 4 Agriculture -- 4.1 Six-Layer IoT-Based Model [4-6] (Shown in Fig. 3). 4.2 Role of Unmanned Aerial Vehicles (UAVs) -- 5 Voting -- 5.1 IoT-Based Voting Framework -- 5.2 Fingerprint Matching Algorithm -- 5.3 Security -- 6 "Smart" Government? -- 7 Future Prospects -- References -- A New Network Forensic Investigation Process Model -- 1 Introduction -- 1.1 Forensic Science -- 1.2 Network Forensics -- 1.3 Need of Network Forensics -- 2 Literature Survey -- 3 Proposed Network Forensic Investigation Process Model -- 3.1 Network Forensic Readiness Module -- 3.2 Security Incident Alert Module -- 3.3 Data Acquisition Module -- 3.4 Forensic Investigation Module -- 3.5 Presentation Module -- 4 Conclusion -- References -- MDTA: A New Approach of Supervised Machine Learning for Android Malware Detection and Threat Attribution Using Behavioral Reports -- 1 Introduction -- 2 Literature Survey -- 3 System Methodology -- 4 System Design -- 5 System Algorithm -- 5.1 Build Model Algorithm -- 5.2 Feature Extraction Algorithm -- 5.3 Prediction Algorithm -- 6 System Implementation -- 6.1 Data Flow Diagram -- 6.2 Sequence Diagram -- 7 Result Analysis -- 7.1 Accuracy of Malware Detection -- 7.2 Accuracy of Threat Attribution -- 8 Experimentation -- 9 Discussion -- 10 Conclusion -- References -- Investigating the Role of User Experience and Design in Recommender Systems: A Pragmatic Review -- 1 Introduction -- 2 Related Work -- 3 Overview of Usability Engineering -- 4 Experimental Set-Up -- 5 Findings -- 6 Proposed Model -- 7 Conclusion -- 8 Future Scope -- References -- A Review on Intrusion Detection Approaches in Resource-Constrained IoT Environment -- 1 Introduction -- 2 Review of Intrusion Detection Frameworks for IoT -- 3 Open Issues -- 4 Discussion on Open Issues and Future Research Direction -- 5 Conclusion -- References -- Future 5G Mobile Network Performance in Webservices with NDN Technology -- 1 Introduction -- 2 Literature Review. 3 Network Testing Considered in Signal Error Detection and Correction Format -- 4 System Analysis -- 5 Enhanced System Design -- 5.1 Steps for Performance Improvements and Existing Analysis -- 5.2 Steps for Overcoming the Issues -- 5.3 Algorithm Equations and Operational Methods -- 6 Conclusion -- References -- Survey for Electroencephalography EEG Signal Classification Approaches -- 1 Introduction -- 1.1 Motivation -- 1.2 Survey Strategy and Evaluation -- 1.3 Paper Organization -- 2 Support Vector Machine for EEG Classification -- 3 Artificial Neural Network (ANN) for EEG Classification -- 4 Convolution Neural Network (CNN) for EEG Classification -- 5 K-Nearest Neighbor (K-NN) for EEG Classification -- 6 Linear Discriminant Analysis (LDA) for EEG Classification -- 7 Multi-classifier Approaches for EEG Classification -- 8 Other Models for EEG Classification -- 9 Analysis and Evaluation -- 10 Conclusion -- References -- Analysis of Road Accidents Using Data Mining Paradigm -- 1 Introduction -- 2 Data and Methods -- 2.1 Data Description -- 2.2 Apriori Algorithm -- 3 Results and Discussion -- 3.1 Road Type -- 3.2 Intoxication -- 4 Conclusions -- References -- Hybrid Approach to Cross-Platform Mobile Interface Development for IAAS -- 1 Introduction -- 2 State of the Art on IAAS -- 2.1 General Mechanism of IAAS -- 2.2 Implementation of IAAS -- 3 State of the Art on Mobile Development Approaches -- 3.1 Native Approach -- 3.2 Web Approach -- 3.3 Hybrid Approach -- 4 Comparative Study and Mobile Solution Proposition for IAAS -- 4.1 Description of the Interface to Be Developed -- 4.2 Proposed Development Approach -- 5 Implementation and Evaluation -- 5.1 Functional Needs Model and Analysis -- 5.2 Realization of the Proposition -- 5.3 Display Tests and Evaluation of the Solution -- 6 Conclusion -- References. Self-organizing Data Processing for Time Series Using SPARK -- 1 Introduction -- 2 Problem Definition -- 3 Related Work -- 4 Proposed Work -- 5 Results and Evaluation -- 5.1 Data and Preprocessing -- 5.2 Experimental Setup -- 5.3 Results -- 6 Conclusion -- References -- An Experimental Investigation of PCA-Based Intrusion Detection Approach Utilizing Machine Learning Algorithms -- 1 Introduction -- 1.1 Kinds of IDS -- 2 Related Work -- 3 Methodology -- 3.1 Machine Learning Techniques -- 3.2 Principal Component Analysis (PCA) -- 4 Experimental Evaluation -- 4.1 Result and Discussion -- 5 Conclusion -- References -- OpenFlow-Based Dynamic Traffic Distribution in Software-Defined Networks -- 1 Introduction -- 2 Background and Related Studies -- 2.1 Software-Defined Network (SDN) and Openflow -- 2.2 Related Works -- 3 System Design and Implementation -- 3.1 System Architecture -- 3.2 Load Balancing Algorithm -- 4 Performance Evaluation and Results -- 4.1 Performance Parameters -- 4.2 Experimental Environment -- 4.3 Experimental Design -- 4.4 Experimental Results -- 5 Conclusions and Future Works -- References -- A Comparative Study of Classification Algorithms Over Images Using Machine Learning and TensorFlow -- 1 Introduction -- 1.1 Convolutional Neural Networks -- 2 Methodology -- 3 Experimental Results -- 3.1 Model Development -- 3.2 Packages Required -- 4 Conclusion -- References -- Intelligent Routing to Enhance Energy Consumption in Wireless Sensor Network: A Survey -- 1 Introduction -- 2 Wireless Sensor Networks Structure -- 3 The Approaches to Energy Consumption Managment -- 3.1 Intelligent Routing Protocols -- 3.2 Duty Cycle -- 3.3 Data Manipulation -- 3.4 Based on Mobility -- 4 Disscusions -- 5 Conclusions -- References -- Deep Residual Learning for Facial Emotion Recognition -- 1 Introduction -- 1.1 Background -- 2 Related Works. 3 Proposed Methodology. |
| Altri titoli varianti | Mobile Computing and Sustainable Informatics |
| Record Nr. | UNINA-9910497103403321 |
Shakya Subarna
|
||
| Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Sentimental Analysis and Deep Learning : Proceedings of ICSADL 2021
| Sentimental Analysis and Deep Learning : Proceedings of ICSADL 2021 |
| Autore | Shakya Subarna |
| Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
| Descrizione fisica | 1 online resource (1023 pages) |
| Altri autori (Persone) |
BalasValentina Emilia
KamolphiwongSinchai DuKe-Lin |
| Collana | Advances in Intelligent Systems and Computing Ser. |
| Soggetto genere / forma | Electronic books. |
| ISBN | 981-16-5157-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- 508480_1_En_BookFrontmatter_OnlinePDF -- Preface -- Acknowledgments -- Contents -- Editors and Contributors -- Analysis of Healthcare Industry Using Machine Learning Approach: A Case Study in Bengaluru Region -- 1 Introduction -- 2 Literature Survey -- 3 Challenges Faced During Data Acquisition -- 4 Methodology -- 4.1 Web Scraping -- 4.2 Statistical Analysis -- 4.3 Natural Language Processing -- 4.4 Sentimental Analysis -- 5 Results and Discussion -- 6 Conclusion -- References -- Dynamic Document Localization for Efficient Mining -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Probabilistic Model for Query-Workload -- 3.2 Probabilistic Model for Content-Workload -- 3.3 Bernoulli Model for Rank Calculation -- 4 Fuzzy Threshold Algorithms -- 5 Experimental Analysis -- 5.1 Effect of Attribute Suggestion to Determine Precision and Recall -- 5.2 Effect of Biasing Coefficient for Determining Attribute Matches -- 5.3 Effect of Database Size for Determining Precision -- 6 Conclusion -- References -- SentiSeries: A Trilogy of Customer Reviews, Sentiment Analysis and Time Series -- 1 Introduction -- 2 Literature Review -- 3 Theory of Dynamic Sentiment Tracking -- 3.1 Natural Language Processing-Sentiment Analysis -- 3.2 Time Series Characteristics -- 4 Dataset -- 5 Results and Discussions -- 6 Conclusions and Future Work -- References -- Video Summarization Using Fully Convolutional Residual Dense Network -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Problem Description -- 3.2 Fully Convolutional Residual Dense Network -- 4 Results -- 4.1 Datasets -- 4.2 Result -- 5 Conclusion -- References -- An Efficient Deep Learning Approach for Detecting Pneumonia Using the Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Material and Methods -- 3.1 Dataset -- 3.2 Preprocessing and Data Augmentation.
3.3 Proposed Model -- 4 Result Analysis -- 5 Discussion -- 6 Conclusion -- References -- QMCDS: Quantum Memory for Cloud Data Storage -- 1 Introduction -- 2 Literature Survey -- 2.1 Related Work -- 2.2 Contributions -- 3 Preliminaries -- 3.1 Qubit -- 3.2 Representation of Quantum Gates -- 3.3 Bloch Sphere -- 4 Proposed Solution -- 5 Experiments and Observation -- 6 Conclusion and Future Scope -- References -- A Study Towards Bangla Fake News Detection Using Machine Learning and Deep Learning -- 1 Introduction -- 2 Related Works -- 3 Proposed Research Methodology (PRM) -- 3.1 Experimental Setup -- 3.2 Data Preparation Pipeline (DPP) -- 3.3 Features Extraction Methods (FEM) -- 3.4 Algorithm Selection Procedure (ASP) -- 4 Result and Analysis -- 4.1 Performance Analysis (PA) -- 4.2 Comparative Analysis (CA) -- 5 Conclusions and Future Work -- References -- A Deep Learning Approach to Analyze the Propagation of Pandemic in America -- 1 Introduction -- 1.1 The Goal of the Paper and Its Contributions -- 1.2 Organization -- 2 The Architecture of the Framework -- 3 Proposed SIR Model -- 4 Proposed Algorithm -- 5 Performance Evaluation -- 5.1 Results -- 6 Discussion -- 7 Conclusion and Future Research -- References -- Graph Convolution-Based Joint Learning of Rumor with Content, User Credibility, Propagation Context, and Cognitive as Well as Emotion Signals -- 1 Introduction -- 2 Existing Work -- 2.1 Rumor Detection and Veracity Classification -- 2.2 Emotion Research and Application of Emotion in Fake News and Rumor Research -- 2.3 Cognitive Signals in Disinformation Research -- 3 Dataset -- 4 Analysis of Cognitive and Emotion Patterns in Rumor and Non-rumor -- 5 Methodology -- 6 Results and Analysis -- 7 Conclusion and Future Work -- References -- Deep Learning-Based Real-Time Object Classification and Recognition Using Supervised Learning Approach. 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results and Analysis -- 4.1 Performance Analysis [15-19] -- 5 Conclusion and Future Work -- References -- Single-Channel Speech Enhancement in Modulation Domain Using Particle Swarm Optimization -- 1 Introduction -- 2 Spectral Subtraction -- 2.1 Modulation Domain Spectral Subtraction -- 3 Standard Particle Swarm Optimization -- 4 Proposed Noise Estimation Using PSO -- 5 Results -- 6 Conclusion -- References -- Pneumonia and Diabetic Retinopathy Detection Using Deep Learning Algorithm -- 1 Introduction -- 2 Related Work -- 3 Research Gap -- 4 Problem Definition -- 5 Methodology -- 5.1 Algorithm Used- Convolutional Neural Networks -- 5.2 Data Pre-processing -- 5.3 Model Information -- 5.4 Datasets Used -- 6 Results -- 6.1 Screenshots of Results -- 7 Conclusion -- 8 Future Scope -- References -- Design of IoT-Based Improved Multimodal Ant Colony Optimızation (MM-ACO) Algorithm for Real-Time Applications -- 1 Introduction -- 2 Existing System -- 3 Proposed Algorithm -- 4 Conclusion -- References -- An Interview Transcriber Using Natural Language Processing -- 1 Introduction -- 2 Literature Review -- 3 Proposed System Methodology -- 4 Information Extraction -- 4.1 Approaches to Extract Information -- 5 Textual Similarity -- 5.1 Approaches for Text Pre-processing -- 6 Observed Results -- 6.1 Extracting Information Using Keywords -- 6.2 Extracting Information Based on Similar Pool of Words -- 7 Work Embeddings for Future Deeper Approaches Like Word2Vec -- 7.1 Word2Vec -- 8 Conclusion and Future Scope -- References -- Plagiarism Detection for Source Codes and Texts -- 1 Introduction -- 2 Objectives -- 3 Literature Review -- 4 Proposed Work -- 5 Experimental Analysis -- 6 Result and Discussion -- 7 Conclusion -- References. Investigation of Kinetic Energy Harvesting from Human Body Motion Activities Using Free/Impact Electromagnetic Generator -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Storage of Harvested Energy -- 3.2 The Designed Structure of Biomechanical Hip Energy Harvester -- 4 Results and Discussion -- 4.1 Hip Joint Gait Cycle -- 4.2 Positioning the Angle of Harvester -- 4.3 Hip Joint Gait Harvesting at Walking Speed 80 M/Min -- 5 Conclusion -- References -- Automated Determination of Critical Temperature -- 1 Introduction -- 1.1 Critical Temperature -- 1.2 Machine Learning Algorithms -- 1.3 Dataset -- 2 Literature Survey -- 3 Methodology -- 3.1 Algorithm Followed for Developing the Models -- 3.2 Data Preprocessing -- 3.3 Working of the Models -- 3.4 Model Training -- 3.5 Model Testing -- 3.6 Model Performance Determination -- 4 Results and Discussion -- 5 Conclusion -- References -- ANN-based Hybridization Approach for Detection of Cardiac Disease -- 1 Introduction -- 1.1 Feedforward Networks (FFN) -- 1.2 Feedback Networks -- 1.3 ANN Learning -- 2 Literature Review -- 3 Problem Formulation -- 4 Proposed System -- 5 Algorithms -- 5.1 Artificial Neural Network (ANN) -- 5.2 Gradient Descent Algorithm -- 5.3 Genetic Algorithm -- 6 Error Back Propagation (EBP) -- 7 Machine Learning Network -- 8 Benefits of Genetic Algorithm in Neural Network -- 9 Tests and Results -- 10 Conclusion and Future Scope -- References -- The Implementation of Enhanced K-Strange Points Clustering Method in Classifying Undergraduate Thesis Titles -- 1 Introduction -- 1.1 Motivation -- 2 Illustration of Enhanced K-Strange Points Clustering Algorithm -- 3 Research Method -- 3.1 Research Data -- 3.2 Text Mining -- 3.3 Enhanced K-Strange Points Clustering Algorithm -- 3.4 Silhouette Coefficient Testing -- 4 Mathematical Illustration. 4.1 Step I: Finding the Minimum of the Dataset (Kmin) -- 4.2 Step II: Finding the Maximum of the Dataset (Kmax) -- 4.3 Step III: Finding the Third Strange Point -- 4.4 Step IV: Correcting the K-Strange Point -- 4.5 Step V: Assigning Points to Respective Clusters -- 5 Result and Discussion -- 5.1 Collect Data -- 5.2 Text Parsing -- 5.3 The Process of Document Clustering -- 5.4 Testing -- 6 Conclusion -- References -- Spam Email Detection Using Machine Learning and Neural Networks -- 1 Introduction -- 2 Literature Review -- 2.1 Existing System -- 3 Proposed Methodology -- 3.1 Data Set Reading and Inspection -- 3.2 Text Preprocessing -- 3.3 Feature Sets and Vectorization -- 3.4 Pipeline and Modeling -- 4 Results -- 5 Conclusion -- References -- Online Appointment Management System in Hospitals Using Distributed Resource Allocation Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Module Description -- 3.2 Distributed Resource Allocation Algorithm -- 3.3 Data Flow -- 4 Experimental Result -- 5 Conclusion -- References -- BeFit-A Real-Time Workout Analyzer -- 1 Introduction -- 2 Related Work -- 3 Methodology Adopted -- 3.1 Working of PoseNet Model -- 3.2 Comparison Analysis -- 3.3 Detecting User's Pose -- 3.4 Getting Pose from Yoga/Gym Workout Selected -- 3.5 Comparing the Skeletons -- 3.6 Data Stream Handling -- 4 Final Implementation -- 5 Advantages -- 6 Future Scope -- 7 Results -- 8 Conclusion -- References -- Analysis of Car Damage for Personal Auto Claim Using CNN -- 1 Introduction -- 2 Literature Survey -- 3 Design -- 4 Proposed Method -- 5 Results and Simulation -- 6 Conclusion -- References -- On the Analysis Problem of the Attribute-Based Access Control Model HGABAC -- 1 Introduction -- 2 HGABAC: An ABAC Model and Its Administrative Model GRUAG -- 3 Automated Analysis Technique for GURAG System -- 4 Evaluation. 5 Conclusions. |
| Record Nr. | UNINA-9910506400703321 |
Shakya Subarna
|
||
| Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||