top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Image Processing and Capsule Networks : ICIPCN 2020 ; Bangkok, Thailand, 20-21 May, 2021 / / edited by Joy Long-Zong Chen, João Manuel R. S. Tavares, Subarna Shakya, Abdullah M. Iliyasu
Image Processing and Capsule Networks : ICIPCN 2020 ; Bangkok, Thailand, 20-21 May, 2021 / / edited by Joy Long-Zong Chen, João Manuel R. S. Tavares, Subarna Shakya, Abdullah M. Iliyasu
Edizione [1st edition.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Descrizione fisica 1 online resource (827 pages)
Disciplina 621.367
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computational intelligence
Optical data processing
Computational Intelligence
Image Processing and Computer Vision
ISBN 3-030-51859-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Efficient GAN-Based Remote Sensing Image Change Detection under Noise Conditions -- Recognition of Handwritten Digits by Image Processing Methods and Classification Models -- Convolutional Neural Network with Multi-Column Characteristics Extraction for Image Classification -- Face Detection based on Image Stitching for Class Attendance Checking -- Image Processing Technique for Effective Analysis of the Cytotoxic Activity in Human Breast Cancer Cell Lines -- Development of an algorithm for Vertebrae Identification using Speeded Up Robust Features -- Comparison of Machine Learning Algorithms for Smart License Number Plate Detection System. .
Record Nr. UNINA-9910483106003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Intelligent Data Communication Technologies and Internet of Things : ICICI 2019 / / edited by D. Jude Hemanth, Subarna Shakya, Zubair Baig
Intelligent Data Communication Technologies and Internet of Things : ICICI 2019 / / edited by D. Jude Hemanth, Subarna Shakya, Zubair Baig
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xix, 781 pages) : illustrations
Disciplina 004
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Engineering—Data processing
Computer engineering
Internet of things
Embedded computer systems
Computational intelligence
Data Engineering
Cyber-physical systems, IoT
Computational Intelligence
ISBN 3-030-34080-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Summarization of Research Publications Using Automatic Extraction -- Information Diffusion: Survey to Models and Approaches, a Way to Capture Online Social Networks -- Extended Fibonacci Series for Selection of Carrier Samples in Data Hiding and Extraction -- Design and Analysis of Wideband Decagon Microstrip Antenna -- Smart Monitoring for Waste Management Using Internet of Things -- Enhanced Scrambled Prime Key Encryption Using Chaos Theory and Steganography -- Bank Vault Security System Based on Infrared Radiation and GSM Technology -- A Data Security Scheme for the Secure Transmission of Images -- Biometric Authentication in Cloud -- Design and Development of an Internet of Things Based Test And Measuring Instrument -- Comparative Analysis of Deep Neural Networks for Crack Image Classification -- Forecast Solar Energy Using Artificial Neural Networks -- Biometric Image Encryption Based on Chaotic SineMap and Information Entropy -- Internet of Things Towards Smart Solar Grid Systems for Home Appliances.
Record Nr. UNINA-9910483656403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile computing and sustainable informatics : proceedings of ICMCSI 2022 / / edited by Subarna Shakya, Klimis Ntalianis, Khaled A. Kamel
Mobile computing and sustainable informatics : proceedings of ICMCSI 2022 / / edited by Subarna Shakya, Klimis Ntalianis, Khaled A. Kamel
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (939 pages)
Disciplina 004
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Computational intelligence
ISBN 981-19-2069-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgments -- Contents -- About the Editors -- XGBoost Design by Multi-verse Optimiser: An Application for Network Intrusion Detection -- 1 Introduction -- 2 Background and Related Work -- 2.1 On the Problem of Intrusion Detection -- 2.2 Machine Learning-Supported Intrusion Detection Systems -- 2.3 Swarm Intelligence -- 3 Methodology -- 3.1 The Multi-verse Optimisation Algorithm -- 3.2 The XGBoost Optimiser -- 3.3 Proposed MVO-XGBoost Framework -- 4 Experimental Setup, Analysis, and Discussion -- 4.1 Experimental Setup -- 4.2 Comparative Analysis and Discussion -- 5 Conclusion -- References -- Gateway-Based Congestion Avoidance Using Two-Hop Node in Wireless Sensor Networks -- 1 Introduction -- 2 Related Work -- 3 Problem Statement -- 4 Proposed Work -- 4.1 Network Model -- 4.2 Gateway-Based Congestion Avoidance (GCA) Mechanism -- 4.3 Congestion Notification -- 4.4 Congestion Avoidance -- 5 Results and Discussion -- 5.1 Performance Metrics -- 6 Conclusion -- References -- Stroke Prediction System Using Machine Learning Algorithm -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Preparation -- 3.2 Data Preprocessing -- 3.3 Feature Selection and Visualization -- 3.4 Model Architecture -- 4 Experimental Results -- 5 Conclusion -- References -- A Comprehensive Survey on Multilingual Opinion Mining -- 1 Introduction -- 2 Opinion Mining of Code-Mix Languages -- 3 Opinion Mining Process -- 3.1 Data Extraction -- 3.2 Annotation -- 3.3 Pre-processing -- 3.4 Data Vectorization -- 4 Classification Techniques -- 4.1 Machine Learning Approach -- 4.2 Deep Learning-Based Approach -- 4.3 Lexicon-Based Approach -- 4.4 Hybrid Approach -- 5 Evaluation Parameters -- 6 Conclusion -- References -- Development Features and Principles of Blockchain Technologies and Real Options as the Main Components of the Digital Economy.
1 Introduction -- 2 Analysis of Recent Research and Publications -- 3 Statement of the Main Research Material -- 3.1 Main Mechanisms for the Blockchain Technology Implementation -- 4 Blockchain Technology and Problems of its Implementation -- 5 System Analysis of Blockchain Technology Contradictions -- 6 Analysis of Real Options as the Most Flexible Financial Tool of Digital Economy -- 7 Classification of Option Contracts -- 8 Option Pricing Analysis -- 9 Conclusions -- References -- Technical Efficiency Analysis of China's Telecommunication Infrastructure: A Copula-Based Meta-Stochastic Frontier Model -- 1 Introduction -- 2 The Conceptual Framework and Methodology -- 2.1 The Conceptual Framework -- 2.2 Copulas and Dependence -- 2.3 Copula-Based Meta-Stochastic Frontier Model (CMSFM) for Technical Efficiency Computational -- 3 The Empirical Study and Simulation Study -- 3.1 Descriptive Statistics for All Variables in the Copula-Based Meta-Stochastic Frontier Model (CMSFM) -- 3.2 Copula-Based Stochastic Frontier Model (CSFM) -- 3.3 Copula-Based Meta-Stochastic Frontier Model (CMSFM) -- 4 Conclusion and Recommendation -- Appendix A.1: (The Simulation Study of the Copulas Model for the Copula-Based Meta-Stochastic Frontier Model (CSFM)) -- Appendix A.2 (The Figure of Simulation Study for Uit and Vit Using in the Copula-Based Meta-Stochastic Frontier Model (CSFM))) -- References -- ATM Security Using Iris Recognition -- 1 Introduction -- 2 Related Works -- 3 Existing System -- 4 Proposed System -- 4.1 Block Diagram -- 4.2 Arduino UNO -- 4.3 LCD Display -- 4.4 Arduino Ide -- 4.5 Embedded C -- 4.6 MATLAB -- 5 Results and Discussion -- 5.1 Experimental Setup -- 6 Conclusion and Future Enhancements -- References -- Reliable Data Acquisition by Master-Slave Approach in Marine-IoT Environment for Logistics -- 1 Introduction -- 2 Literature Survey.
3 Proposed Methodology -- 3.1 Simulation Parameters-Packet Delivery Ratio -- 3.2 Automatic Identification System (AIS) -- 3.3 Dynamic Information -- 3.4 Maritime Mobile Service Identity Number (MMSI) -- 3.5 Static and Voyage-Related Information -- 3.6 K-Means Clustering -- 4 Result and Discussions -- 5 Conclusion -- References -- Mobile Technology Acceptance of University Students: A Consolidated Approach -- 1 Introduction -- 2 Theoretical and Conceptual Frameworks -- 2.1 Uses and Gratifications Theory -- 2.2 Technology Acceptance Model -- 2.3 The Study Framework -- 3 Methodology -- 4 Findings -- 4.1 Technological and Socio-Situational Factors -- 4.2 Independent and Moderator Roles of Individual Variables -- 5 Discussion -- 6 Conclusion -- References -- Multistage Intrusion Detection System using Machine Learning Algorithm -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Pre-processing -- 3.2 Feature Selection using Decision Tree Classifier -- 3.3 Hyperparameter Optimization -- 3.4 Predict GRU -- 4 Results and Analysis -- 4.1 Pre-processing -- 4.2 Feature Selection -- 4.3 Hyperparameter Optimization -- 4.4 Prediction -- 4.5 Performance Metrics -- 5 Conclusion and Future Work -- References -- Modeling Global Solar Radiation Using Machine Learning with Model Selection Approach: A Case Study in Tanzania -- 1 Introduction -- 2 Related Research -- 3 Dataset and Methods -- 3.1 Solar Radiation Data -- 3.2 Machine Learning-Assisted Prediction Model -- 3.3 Computational Framework -- 4 Computational Experiments, Analysis and Discussion -- 5 Conclusion -- References -- Plant Disease Detection Using Transfer Learning with DL Model -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Collection -- 3.3 Training Dataset -- 3.4 Applied Model -- 4 Result -- 4.1 10 Fold Cross-Validation Analysis.
4.2 Confusion Matrix Analysis -- 5 Conclusion -- References -- Tagging Fake Profiles in Twitter Using Machine Learning Approach -- 1 Introduction -- 1.1 Motivation -- 1.2 Twitter's Viewpoint on Fake Profiles -- 2 Literature Survey -- 3 Problem Formulation -- 3.1 Gaps in the Existing Literature -- 3.2 Problem Statement -- 4 Proposed Solution -- 4.1 Data Collection -- 4.2 Feature Selection -- 4.3 Classification of Twitter Users -- 5 Results and Analysis -- 5.1 Results -- 5.2 Validation of the Proposed Approach -- 6 Conclusion -- References -- A Machine Learning System to Classify Cybercrime -- 1 Introduction -- 2 Proposed System Design and Methodology -- 2.1 System Design -- 2.2 Module Description -- 3 System Implementation -- 3.1 Python -- 3.2 Django -- 4 Experimental Results and Discussion -- 5 Conclusion and Future Work -- References -- Analyses of Non-linear Effects with DCS and HOA Performance for 4 X 4 WDM/DWDM System -- 1 Introduction -- 1.1 Optical Amplifiers -- 1.2 Single-mode Fiber (SMF) -- 2 Results and Discussion -- 3 Conclusion and Further Study -- References -- User Profiling and Influence Maximization -- 1 Introduction -- 2 Influence Maximization -- 3 IM Approaches Evolution -- 4 IM Over Big Data Era -- 5 Problem Formulation -- 6 Profiling Influencers Application -- 7 Conclusion -- References -- An Efficient IoT-Based Novel Design for Home Automation Using Node MCU Controller -- 1 Introduction -- 2 Existing Systems -- 2.1 Sensor Basically Primarily House Automation and Safety System -- 2.2 I-Learning IoT -- 2.3 Java-Based Dwelling Automation System -- 2.4 Zigbee-Based Residence Automation Manner Utilizing Cell Phones -- 3 Literature Survey -- 4 Architecture Block Diagram -- 5 Software Tools -- 5.1 IFTTT (Google Assistant) -- 5.2 MQTT (AdaFruit) -- 6 Flow Chart of Proposed System -- 7 Circuit Diagram -- 8 Hardware Implementation.
9 Results and Discussions -- 10 Conclusion -- References -- A Supervised Machine Learning Approach for Analysis and Prediction of Water Quality -- 1 Introduction -- 1.1 Water Quality Index -- 2 Study Area -- 3 Related Work -- 4 Methodology -- 4.1 Data Preprocessing -- 4.2 Calculation of Water Quality Index -- 4.3 Water Quality Class (WQC) Classification -- 4.4 Machine Learning -- 5 Results and Discussions -- 5.1 Classification -- 5.2 Regression -- 6 Conclusion -- References -- Artificial Neural Network Established Hexagonal Ring- MPA Intended for Wideband Application -- 1 Introduction -- 2 Design of Presented Antenna and Data Generation -- 3 Design Procedure of ANN Modeling for HRMPA -- 4 Results and Discussions -- 5 Conclusion -- References -- EEGs Signals Artifact Rejection Algorithm by Signal Statistics and Independent Components Modification -- 1 Introduction -- 2 Related Works -- 3 Methods and Background on EEG Signals and Artifacts -- 3.1 Ocular Artifact -- 3.2 Muscle Artifacts -- 3.3 Cardiac Artifact -- 3.4 Other Artifacts and Artifact Handling -- 3.5 Independent Component Analysis (ICA) -- 4 The Proposed Algorithm -- 4.1 Using Average Reference Montage -- 4.2 EEG Signal Filtering -- 4.3 Applying ICA to EEG Signal -- 4.4 Artifact Identification and Cancelation -- 4.5 Restoring EEG Signal from ICA Components -- 5 Results -- 6 Conclusion -- References -- IoT-Based Air Quality Monitoring System Using SIM900 -- 1 Introduction -- 2 Review of Literature -- 3 Design Process -- 3.1 NodeMCU -- 3.2 DTH11 Sensor -- 3.3 MQ 135 Sensor -- 3.4 GSM SİM900A -- 3.5 Blynk Application -- 4 System Architecture and Implementation -- 5 Results and Conclusions -- References -- Predictive Modeling for Risk Identification in Share Market Trading-A Multiphase Approach -- 1 Introduction -- 1.1 Challenges in Predictive Analytics -- 2 Predictive Analytics.
2.1 Data Mining Versus Predictive Analytics.
Record Nr. UNINA-9910584482603321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Mobile computing and sustainable informatics : proceedings of ICMCSI 2021 / / edited by Subarna Shakya [and three others]
Mobile computing and sustainable informatics : proceedings of ICMCSI 2021 / / edited by Subarna Shakya [and three others]
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (864 pages)
Disciplina 006.3
Collana Lecture Notes on Data Engineering and Communications Technologies
Soggetto topico Computational intelligence
Mobile and Network Security
ISBN 981-16-1865-8
981-16-1866-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Mitigating the Latency Induced Delay in IP Telephony Through an Enhanced De-Jitter Buffer -- 1 Introduction -- 1.1 Problem Formulation -- 2 Relevant Works -- 3 VOIP Technique and Network Structure -- 3.1 Media Gateways and Call Managers -- 3.2 Topologies -- 3.3 Session Initiation Protocol (SIP) -- 3.4 SIP Elements -- 4 Limitations -- 5 The Proposed Solution -- 5.1 Modification in De-Jitter Buffer -- 6 Results and Analysis -- 7 Conclusion -- References -- A Cyber-Safety IoT-Enabled Wearable Microstrip Antenna for X-Band Applications -- 1 Introduction -- 2 Existing Approach -- 3 Antenna Design -- 3.1 Antenna Configuration -- 3.2 Antenna Performance -- 3.3 Simulated Results -- 3.4 Measured Results -- 4 Conclusion and Future Work -- References -- Keyword Recognition from EEG Signals on Smart Devices a Novel Approach -- 1 Introduction -- 2 Materials and Methods -- 2.1 Overview -- 2.2 Data Acquisition -- 2.3 Data Preprocessing -- 3 Feature Extraction -- 3.1 DWT Feature Extraction -- 3.2 FFT Feature Extraction -- 3.3 Feature Fusion -- 3.4 Dimensionality Reduction -- 3.5 Command Map Table and Task Observer Thread -- 3.6 Tools and Software -- 4 Classifiers Used -- 4.1 SVM Classifier -- 4.2 KNN Classification -- 4.3 CNN Classifier -- 4.4 Random Forest -- 4.5 Performance Measure -- 5 Results and Discussion -- 6 Conclusion -- References -- Security Analysis for Sybil Attack in Sensor Network Using Compare and Match-Position Verification Method -- 1 Introduction -- 2 Sybil Attach and Security -- 2.1 WSN on Security Attacks -- 2.2 Sybil the Attack -- 3 Compare with Match-Position and Verification of Method -- 4 Message Authentication and Passing (MAP) -- 5 Result and Discussion -- 6 Conclusion -- References -- Certain Strategic Study on Machine Learning-Based Graph Anomaly Detection.
1 Introduction -- 2 Generalized Machine Learning Approaches Towards Outlier Detection -- 2.1 Key Challenges Identified in ML Techniques -- 3 Graph-Based Anomaly Detection Methods -- 3.1 Moving Towards Graph Representation -- 3.2 Existing Graph Basis Anomaly Detection Methods (GBAD) -- 3.3 Baseline Link Analysis Ranking Algorithms -- 3.4 Structure-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.5 Community-Based Graph Anomaly Score Through Labelling/Ranking Strategy -- 3.6 Graph Compression Strategies -- 4 Open Challenges in GBAD -- 5 Concluding Remarks -- References -- Machine Learning Perspective in VLSI Computer-Aided Design at Different Abstraction Levels -- 1 Introduction to Machine Learning and VLSI CAD -- 2 The Basic Paradigm of Machine Learning -- 3 Areas of Machine Learning -- 4 Machine Learning Algorithms -- 5 Drawbacks of Machine Learning -- 6 Application of Machine Learning in VLSI CAD Abtraction Levels -- 6.1 Machine Learning in Automatic Generation of Assertion in RTL Design -- 6.2 Machine Learning in Chip Testing -- 6.3 Machine Learning for Physical Design Routing -- 6.4 Machine Learning in Physical Design Floor Planning -- 6.5 Machine Learning in Static Timimg Analysis (STA) -- 6.6 Machine Learning in Gate-Level Netlist -- 6.7 Machine Learning in EDA and IC Design -- 7 Conclusion and Future Scope -- References -- A Practical Approach to Measure Data Centre Efficiency Usage Effectiveness -- 1 Introduction -- 2 Energy Versus Power -- 2.1 IT Load -- 2.2 Effect of Outdoor Condition -- 2.3 User Configuration -- 2.4 Product Review Analysis -- 3 Related Work -- 4 Proposed Work -- 5 Result Analysis -- 6 Conclusion -- References -- Advancing e-Government Using Internet of Things -- 1 Introduction -- 2 Social Networks and Machine Learning -- 3 Health Care -- 4 Agriculture -- 4.1 Six-Layer IoT-Based Model [4-6] (Shown in Fig. 3).
4.2 Role of Unmanned Aerial Vehicles (UAVs) -- 5 Voting -- 5.1 IoT-Based Voting Framework -- 5.2 Fingerprint Matching Algorithm -- 5.3 Security -- 6 "Smart" Government? -- 7 Future Prospects -- References -- A New Network Forensic Investigation Process Model -- 1 Introduction -- 1.1 Forensic Science -- 1.2 Network Forensics -- 1.3 Need of Network Forensics -- 2 Literature Survey -- 3 Proposed Network Forensic Investigation Process Model -- 3.1 Network Forensic Readiness Module -- 3.2 Security Incident Alert Module -- 3.3 Data Acquisition Module -- 3.4 Forensic Investigation Module -- 3.5 Presentation Module -- 4 Conclusion -- References -- MDTA: A New Approach of Supervised Machine Learning for Android Malware Detection and Threat Attribution Using Behavioral Reports -- 1 Introduction -- 2 Literature Survey -- 3 System Methodology -- 4 System Design -- 5 System Algorithm -- 5.1 Build Model Algorithm -- 5.2 Feature Extraction Algorithm -- 5.3 Prediction Algorithm -- 6 System Implementation -- 6.1 Data Flow Diagram -- 6.2 Sequence Diagram -- 7 Result Analysis -- 7.1 Accuracy of Malware Detection -- 7.2 Accuracy of Threat Attribution -- 8 Experimentation -- 9 Discussion -- 10 Conclusion -- References -- Investigating the Role of User Experience and Design in Recommender Systems: A Pragmatic Review -- 1 Introduction -- 2 Related Work -- 3 Overview of Usability Engineering -- 4 Experimental Set-Up -- 5 Findings -- 6 Proposed Model -- 7 Conclusion -- 8 Future Scope -- References -- A Review on Intrusion Detection Approaches in Resource-Constrained IoT Environment -- 1 Introduction -- 2 Review of Intrusion Detection Frameworks for IoT -- 3 Open Issues -- 4 Discussion on Open Issues and Future Research Direction -- 5 Conclusion -- References -- Future 5G Mobile Network Performance in Webservices with NDN Technology -- 1 Introduction -- 2 Literature Review.
3 Network Testing Considered in Signal Error Detection and Correction Format -- 4 System Analysis -- 5 Enhanced System Design -- 5.1 Steps for Performance Improvements and Existing Analysis -- 5.2 Steps for Overcoming the Issues -- 5.3 Algorithm Equations and Operational Methods -- 6 Conclusion -- References -- Survey for Electroencephalography EEG Signal Classification Approaches -- 1 Introduction -- 1.1 Motivation -- 1.2 Survey Strategy and Evaluation -- 1.3 Paper Organization -- 2 Support Vector Machine for EEG Classification -- 3 Artificial Neural Network (ANN) for EEG Classification -- 4 Convolution Neural Network (CNN) for EEG Classification -- 5 K-Nearest Neighbor (K-NN) for EEG Classification -- 6 Linear Discriminant Analysis (LDA) for EEG Classification -- 7 Multi-classifier Approaches for EEG Classification -- 8 Other Models for EEG Classification -- 9 Analysis and Evaluation -- 10 Conclusion -- References -- Analysis of Road Accidents Using Data Mining Paradigm -- 1 Introduction -- 2 Data and Methods -- 2.1 Data Description -- 2.2 Apriori Algorithm -- 3 Results and Discussion -- 3.1 Road Type -- 3.2 Intoxication -- 4 Conclusions -- References -- Hybrid Approach to Cross-Platform Mobile Interface Development for IAAS -- 1 Introduction -- 2 State of the Art on IAAS -- 2.1 General Mechanism of IAAS -- 2.2 Implementation of IAAS -- 3 State of the Art on Mobile Development Approaches -- 3.1 Native Approach -- 3.2 Web Approach -- 3.3 Hybrid Approach -- 4 Comparative Study and Mobile Solution Proposition for IAAS -- 4.1 Description of the Interface to Be Developed -- 4.2 Proposed Development Approach -- 5 Implementation and Evaluation -- 5.1 Functional Needs Model and Analysis -- 5.2 Realization of the Proposition -- 5.3 Display Tests and Evaluation of the Solution -- 6 Conclusion -- References.
Self-organizing Data Processing for Time Series Using SPARK -- 1 Introduction -- 2 Problem Definition -- 3 Related Work -- 4 Proposed Work -- 5 Results and Evaluation -- 5.1 Data and Preprocessing -- 5.2 Experimental Setup -- 5.3 Results -- 6 Conclusion -- References -- An Experimental Investigation of PCA-Based Intrusion Detection Approach Utilizing Machine Learning Algorithms -- 1 Introduction -- 1.1 Kinds of IDS -- 2 Related Work -- 3 Methodology -- 3.1 Machine Learning Techniques -- 3.2 Principal Component Analysis (PCA) -- 4 Experimental Evaluation -- 4.1 Result and Discussion -- 5 Conclusion -- References -- OpenFlow-Based Dynamic Traffic Distribution in Software-Defined Networks -- 1 Introduction -- 2 Background and Related Studies -- 2.1 Software-Defined Network (SDN) and Openflow -- 2.2 Related Works -- 3 System Design and Implementation -- 3.1 System Architecture -- 3.2 Load Balancing Algorithm -- 4 Performance Evaluation and Results -- 4.1 Performance Parameters -- 4.2 Experimental Environment -- 4.3 Experimental Design -- 4.4 Experimental Results -- 5 Conclusions and Future Works -- References -- A Comparative Study of Classification Algorithms Over Images Using Machine Learning and TensorFlow -- 1 Introduction -- 1.1 Convolutional Neural Networks -- 2 Methodology -- 3 Experimental Results -- 3.1 Model Development -- 3.2 Packages Required -- 4 Conclusion -- References -- Intelligent Routing to Enhance Energy Consumption in Wireless Sensor Network: A Survey -- 1 Introduction -- 2 Wireless Sensor Networks Structure -- 3 The Approaches to Energy Consumption Management -- 3.1 Intelligent Routing Protocols -- 3.2 Duty Cycle -- 3.3 Data Manipulation -- 3.4 Based on Mobility -- 4 Discussions -- 5 Conclusions -- References -- Deep Residual Learning for Facial Emotion Recognition -- 1 Introduction -- 1.1 Background -- 2 Related Works.
3 Proposed Methodology.
Record Nr. UNINA-9910743263403321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of International Conference on Sustainable Expert Systems : ICSES 2020 / / Subarna Shakya [and three others] editors
Proceedings of International Conference on Sustainable Expert Systems : ICSES 2020 / / Subarna Shakya [and three others] editors
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (717 pages)
Disciplina 006.33
Collana Lecture Notes in Networks and Systems
Soggetto topico Expert systems (Computer science)
ISBN 981-334-355-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgements -- About the Conference -- Contents -- Editors and Contributors -- Captcha-Based Defense Mechanism to Prevent DoS Attacks -- 1 Introduction -- 2 Literature Survey -- 3 Working Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Prognostic of Depression Levels Due to Pandemic Using LSTM -- 1 Introduction -- 2 Procedure -- 2.1 Importing All the Packages -- 2.2 Importing Datasets -- 2.3 Preprocessing and Feature Extraction -- 2.4 Working Principle -- 3 Flowchart -- 4 Results -- 5 Conclusion -- 6 Future Scope -- References -- An Efficient Design of 8 * 8 Wallace Tree Multiplier Using 2 and 3-Bit Adders -- 1 Introduction -- 2 Related Work -- 3 Basic Multiplication Practice -- 4 Proposed Work -- 4.1 Wallace Tree Multiplier -- 4.2 Wallace Tree 4 * 4 Multiplier -- 4.3 Wallace Tree 8 * 8 Multiplier -- 4.4 2-Bit Adder -- 4.5 3-Bit Adder -- 4.6 Ripple Carry Adder (RCA) -- 4.7 Look-Ahead Carry Adder -- 5 Experimental Results -- 5.1 8 * 8 Wallace Tree Multiplier -- 5.2 Power -- 5.3 Area -- 5.4 Delay -- 5.5 RTL Schematic View -- 5.6 Technology Schematic View -- 5.7 Package View -- 5.8 Investigation of Wallace Tree 8 * 8 Multiplier -- 6 Conclusion -- References -- Application of Rules and Authorization Key for Secured Online Training-A Survey -- 1 Introduction -- 2 Machine Learning -- 2.1 Overview -- 2.2 Security in Machine Learning -- 2.3 Authorization -- 2.4 Classification -- 3 Existing Systems -- 4 Access Control -- 5 Proposed Work -- 6 Expected Outcome -- 7 Conclusion -- References -- Detecting Semantically Equivalent Questions Using Transformer-Based Encodings -- 1 Introduction -- 2 Related Work -- 3 Dataset and Preprocessing -- 4 Proposed Methodology -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References.
Detection and Monitoring of Alzheimer's Disease Using Serious Games-A Study -- 1 Introduction and Motivation -- 2 Findings and Methodology -- 3 Results and Discussions -- 4 Conclusion and Future Work -- References -- Factors Affecting the Online Travel Purchasing Decision: An Integration of Fuzzy Logic Theory -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Fuzzy Inference System -- 3.2 Sampling and Procedures -- 3.3 Measures -- 4 Results and Discussion -- 4.1 Fuzzy Inference System Results -- 4.2 Discussion -- 5 Conclusion -- References -- An Empirical Study on the Occupancy Detection Techniques Based on Context-Aware IoT System -- 1 Introduction -- 2 Categorization of Occupancy Detection Techniques -- 2.1 Occupancy Detection via Sensors -- 2.2 Occupancy Detection via Sensor Fusion -- 2.3 Occupancy Detection via Wi-Fi and LAN -- 2.4 Occupancy Detection via Radio Frequency (RF) Signals -- 2.5 Occupation Detection Using Machine Learning Techniques -- 2.6 Other Types of Occupation Detection -- 3 Research Gaps and Issues -- 4 Result and Discussion -- 4.1 Analysis Based on Publication Year -- 4.2 Analysis Based Performance Metrics -- 4.3 Analysis Based on Classification Techniques -- 5 Conclusion -- References -- Study of Holoportation: Using Network Errors for Improving Accuracy and Efficiency -- 1 Introduction -- 2 Virtual Reality and Augmented Reality -- 2.1 Virtual Reality (VR) -- 2.2 Augmented Reality (AR) -- 3 Human Bond Communication -- 4 Network Error -- 5 Existing System -- 6 Limitation of Existing Models -- 7 Proposed System -- 8 Conclusion & -- Future Scope -- References -- Sixth-Gen Wireless Tech with Optical Wireless Communication -- 1 Introduction -- 2 Discussion -- 2.1 Advantages of Optical Wireless Communication -- 2.2 Indoor Applications -- 2.3 Outdoor Applications -- 3 Challenges and Future of 6G -- 4 Conclusion.
References -- Intuitive and Impulsive Pet (IIP) Feeder System for Monitoring the Farm Using WoT -- 1 Introduction -- 2 Study of Existing Methodology -- 3 Proposed Methodology -- 3.1 Hardware Implementation -- 3.2 System Implementation -- 4 Conclusion -- References -- Machine Learning Algorithms for Prediction of Credit Card Defaulters-A Comparative Study -- 1 Introduction -- 2 Literature Review -- 2.1 Random Forest Classifier -- 2.2 Gaussian Naive Bayes Classifier -- 2.3 Multi-layer Perceptron (MLP) Classifier -- 2.4 K-Nearest Neighbors Classifier -- 2.5 AdaBoost Classifier -- 2.6 CatBoost Classifier -- 2.7 XGBoost Classifier -- 2.8 LightGBM Classifier -- 3 Experimental Setup and Results -- 3.1 Dataset Description -- 3.2 Data Visualization -- 3.3 Results Using Tables and Graphs -- 4 Conclusion and Further Extensions -- References -- Investigation of Gait and Biomechanical Motion for Developing Energy Harvesting System -- 1 Introduction -- 2 Material and Methods -- 2.1 Human Gait Analysis -- 2.2 Plantar Pressure Distribution -- 3 Results and Analysis -- 4 Conclusion -- References -- Hybrid Genetic Algorithm and Machine Learning Method for COVID-19 Cases Prediction -- 1 Introduction -- 2 Background and Related Work -- 3 Overview of Adaptive Neuro-Fuzzy Inference System -- 4 Proposed Hybrid Machine Learning Method -- 4.1 Improved GA -- 4.2 Hybrid GAAE-ANFIS Method -- 5 Experimental Setup and Simulations -- 5.1 Performance Metrics, Datasets, and GAAE-ANFIS Control Parameters' Setup -- 5.2 Results and Comparative Analysis -- 6 Conclusion -- References -- Bidirectional Battery Charger for Electric Vehicle -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 3.1 Methodology -- 3.2 Topology -- 3.3 Grid to Vehicle (G2V) -- 3.4 Vehicle to Grid (V2G) -- 4 Experimental Results -- 4.1 Charging Mode (Forward Mode) -- 4.2 Discharging Mode (Reverse Mode).
5 Experimental Setup -- 6 Conclusion -- References -- Correlative Study of Image Magnification Techniques -- 1 Introduction -- 2 Related Work -- 3 Image Interpolation -- 3.1 Nearest Neighbour Interpolation -- 3.2 Bilinear Interpolation -- 3.3 High Quality Magnification (Hqx) Interpolation -- 4 Experiment and Discussion -- 4.1 Objective Assessment -- 4.2 Visual Quality Assessment -- 5 Conclusion -- References -- Healthy Sri Lankan Meal Planner with Evolutionary Computing Approach -- 1 Introduction -- 2 Background Related Works -- 3 Genetic Algorithm -- 4 Methodology -- 5 Discussion -- References -- Fuzzy Logic-Based Approach for Back Analysis of VISA Granting Process -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 4 Results and Discussion -- 5 Conclusion -- References -- A Lucrative Model for Identifying Potential Adverse Effects from Biomedical Texts by Augmenting BERT and ELMo -- 1 Introduction -- 2 Background -- 2.1 Word Embedding -- 2.2 Bidirectional Gated Recurrent Units (BiGRUs) -- 2.3 Embeddings from Language Models (ELMo) -- 2.4 Transformer Networks -- 2.5 Bidirectional Encoder Representations from Transformers (BERT) -- 3 Methodology -- 3.1 Text Labeler for Extracting Adverse Effects from Biomedical Texts -- 3.2 Binary Classifier for Identifying Adverse Effects in Biomedical Texts -- 4 Results and Discussion -- 4.1 Performance of the Binary Classifier -- 4.2 Performance on the Text Labeler -- 5 Conclusion -- References -- An Intelligent Framework for Online Product Recommendation Using Collaborative Filtering -- 1 Introduction -- 2 Related Works -- 3 Background -- 3.1 Phases of Recommendation System -- 3.2 Types of Recommender Systems -- 4 Proposed Methodology -- 4.1 Amazon Products Review-Dataset -- 4.2 Data Preprocessing -- 4.3 User-Based Collaborative Filtering -- 4.4 Item-Based Collaborative Filtering.
5 Results and Discussion -- 6 Conclusion -- References -- Novel Method to Analyze and Forecast Social Impact on Macro- and Micro-Economies Using Social Media Data -- 1 Introduction -- 2 Related Work -- 3 Stock Markets and Social Media -- 3.1 Keyword Extraction -- 3.2 Incident Mining -- 3.3 Impact Analysis -- 3.4 Performance Isolation and Prediction -- 4 Research Methodology -- 5 Results and Experiments -- 6 Discussion -- 7 Conclusion and Further Work -- References -- Prediction of Malocclusion Pattern of the Orthodontic Patients Using a Classification Model -- 1 Introduction -- 2 Material and Methods -- 2.1 Data -- 2.2 Classification Models -- 2.3 Model Validation -- 3 Results and Discussion -- 4 Conclusion -- References -- An Ensemble Learning Approach for Automatic Emotion Classification of Sri Lankan Folk Music -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 3.1 Tools and Resources -- 3.2 Dataset -- 3.3 Audio Preprocessing and Feature Extraction -- 3.4 Classifier Training -- 3.5 Ensemble Learning -- 3.6 Feature Selection -- 4 Results and Discussion -- 4.1 Performance of Individual Classifiers -- 4.2 Performance of the Classifier Ensemble -- 4.3 Classifier Performance After Applying Feature Selection Techniques -- 5 Conclusion -- References -- Mobile Application to Identify Fish Species Using YOLO and Convolutional Neural Networks -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection and Preprocessing -- 3.2 YOLO -- 3.3 Convolutional Neural Network (CNN) -- 3.4 Implemented Architecture -- 3.5 Hardware and Software Used in the Experiment -- 4 Results -- 5 Conclusion -- References -- Pseudoscience Detection Using a Pre-trained Transformer Model with Intelligent ReLabeling -- 1 Introduction -- 1.1 Deep Learning for Pseudoscience Detection -- 2 Background -- 2.1 Indicators of Pseudoscience -- 2.2 Detecting Deception.
2.3 Natural Language Processing.
Record Nr. UNINA-9910483905103321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Second International Conference on Sustainable Expert Systems : ICSES 2021 / / edited by Subarna Shakya, Ke-Lin Du, and Wang Haoxiang
Proceedings of Second International Conference on Sustainable Expert Systems : ICSES 2021 / / edited by Subarna Shakya, Ke-Lin Du, and Wang Haoxiang
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (911 pages)
Disciplina 791.4372
Collana Lecture Notes in Networks and Systems
Soggetto topico Human-computer interaction
Artificial intelligence
ISBN 981-16-7656-9
981-16-7657-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910743348903321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of Third International Conference on Sustainable Expert Systems : ICSES 2022 / / edited by Subarna Shakya, Valentina Emilia Balas, Wang Haoxiang
Proceedings of Third International Conference on Sustainable Expert Systems : ICSES 2022 / / edited by Subarna Shakya, Valentina Emilia Balas, Wang Haoxiang
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (1025 pages)
Disciplina 006.33
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Sustainable architecture
Big data
Computational Intelligence
Artificial Intelligence
Sustainable Architecture/Green Buildings
Big Data
ISBN 981-19-7874-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Design, Development, and Implementation of Software Engineering Virtual Laboratory: A Boon to Computer Science and Engineering (CSE) Education during Covid-19 Pandemic -- Chapter 2. Political Communication and Election Result: Facebook Account Analysis Jambi Governor Candidates in the 2020 Regional Election -- Chapter 3. Estimating the intervals between Mount Etna eruptions -- Chapter 4. Sentiment Enhanced Smart Movie Recommendation System -- Chapter 5. A Machine Learning Model for Predictive Maintenance of a Stepper Motor using Digital Simulation Data -- Chapter 6. Impact of pollutants on temperature change and forecasting temperature of US cities -- Chapter 7. Hybrid Precoding schemes for mmWave massive MIMO systems - A Comprehensive survey -- Chapter 8. Optimized Web Service Composition Using Hybrid Evolutionary Algorithms -- Chapter 9. Organization Security Framework - A Defensive Mechanism -- Chapter 10. Trusty medicare: An online virtual care system -- Chapter 11. Blockchainbased Remote Construction Monitoring Using UAV in SITL Simulation -- Chapter 12. Papaya Diseases Detection using GLCM Feature Extraction and Hyperparatuning of Machine Learning Approach -- Chapter 13. Image Forgery and Image Tampering Detection Techniques: A Review -- Chapter 14. Low Voltage Ride Through for a Three phase Grid Integrated Single- Stage Inverter-Based Photo Voltaic System using Fuzzy Logic Control -- Chapter 15. Automated Detection of Malaria Parasite from Giemsa - Stained Thin Blood Smear Images. etc.
Record Nr. UNINA-9910674349903321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Sentiment Analysis and Deep Learning : Proceedings of ICSADL 2022 / / Subarna Shakya, Ke-Lin Du, and Klimis Ntalianis, editors
Sentiment Analysis and Deep Learning : Proceedings of ICSADL 2022 / / Subarna Shakya, Ke-Lin Du, and Klimis Ntalianis, editors
Pubbl/distr/stampa Singapore : , : Springer, , [2023]
Descrizione fisica 1 online resource (987 pages)
Disciplina 006.31
Collana Advances in Intelligent Systems and Computing Series
Soggetto topico Artificial intelligence
Deep learning (Machine learning)
Computational intelligence
Computer vision
Image processing - Digital techniques
ISBN 981-19-5443-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Ranking Roughly Tourist Destinations Using BERT-Based Semantic Search -- 1 Introduction -- 2 Semantic Search with SBERT -- 2.1 Semantic Search with SBERT -- 2.2 Extracting a Boundary by Applying Different Thresholds -- 3 System Architecture -- 3.1 Data -- 3.2 Text Cleaning and Pre-processing -- 3.3 Embeddings -- 3.4 Similarity Measure -- 3.5 Ranking Algorithm -- 4 Result of Ranking System -- 4.1 Result of Ranking System -- 4.2 Evaluation of Result -- 5 Discussion and Conclusion -- References -- A New Image Encryption Technique Built on a TPM-Based Secret Key Generation -- 1 Introduction -- 1.1 Neural Network and Tree Parity Machine (TPM) -- 2 Methodology -- 2.1 Traditional Method of Generating Secret Key Using Tree Parity Machine -- 2.2 Proposed Rule with Algorithm -- 3 Results and Discussion -- 3.1 Performance Parameters -- 3.2 Security Parameters -- 4 Conclusion -- References -- Application Prototypes for Human to Computer Interactions -- 1 Introduction -- 2 Related Work -- 2.1 Methodology -- 2.2 Literature Review -- 3 Conclusion -- References -- Feature Selection-Based Spam Detection System in SMS and Email Domain -- 1 Introduction -- 2 Literature Review -- 2.1 Phase 1 -- 2.2 Phase 2 -- 2.3 Phase 3 -- 3 Classification Methods Used for Spam Detection in SMS and Email Domains -- 3.1 Phase 1 -- 3.2 Phase 2 -- 3.3 Phase 3 -- 4 Experiment and Result -- 4.1 Data-sets Used -- 5 Conclusions and Future Work -- References -- Discerning the Application of Virtual Laboratory in Curriculum Transaction of Software Engineering Lab Course from the Lens of Critical Pedagogy -- 1 Introduction -- 2 Motivation for This Work -- 3 Objectives and Scope of This Research -- 3.1 Specific Objectives of the Research -- 3.2 Scope of the Research -- 4 Organization of This Research Paper -- 5 Virtual or Online Learning.
6 Traditional Versus Virtual Laboratory -- 7 Critical Pedagogy Theory -- 8 Instructional Design Delivery (IDD) -- 9 Students' Learning Outcomes (LO) -- 10 Assessments (ASS) -- 11 Students' Empowerment (EM) -- 12 Critical Thinking (CT) -- 13 Social Presence (SP) -- 14 Alignment (AL) -- 15 Approaches to Virtual Laboratories and Software Engineering Virtual Laboratory -- 16 Synthesis of Related Work and Concluding Remarks -- 17 Educational Implications -- 18 Limitations -- 19 Conclusion and Way Forward -- 19.1 Design Software Engineering Virtual Lab -- 19.2 CP-VLLM: Development of a Virtual Learning Measurement Tool -- 19.3 Evaluation of Students' Learning Performance in a Virtual Laboratory Learning Environment -- 19.4 Directions for Future Research -- References -- Chrome Extension for Text Sentiment Analysis -- 1 Introduction -- 2 Related Works -- 3 Proposed Model -- 3.1 Sentiment Analysis -- 3.2 Chrome Extension -- 4 Experimental Analysis and Results -- 4.1 Dataset Description -- 4.2 Performance Evaluation -- 5 Conclusion -- References -- Performance of RSA Algorithm Using Game Theory for Aadhaar Card -- 1 Introduction -- 2 Related Work -- 3 RSA Algorithm -- 4 Proposed GT-RSA Algorithm and Analysis -- 4.1 Game Theory -- 4.2 Games Are Classified in Several Ways -- 4.3 Pure Strategy Characteristics of a Two-Person, Zero-Sum Game -- 4.4 Pure Strategy Problems -- 4.5 GT-RSA -- 5 Experimental Results -- 5.1 Encryption Time -- 5.2 Decryption Time -- 5.3 Execution Time -- 5.4 Encryption Throughput -- 5.5 Decryption Throughput -- 5.6 Execution Throughput -- 5.7 Power Consumption -- 5.8 Avalanche Effect -- 6 Conclusion -- References -- Drought Prediction Using Recurrent Neural Networks and Long Short-Term Memory Model -- 1 Introduction -- 1.1 Literature Review -- 2 Methodology -- 2.1 Read the Data -- 2.2 Data Cleaning.
2.3 Data Preparation and Visualization -- 2.4 Applying RNN and LSTM -- 3 Results -- 3.1 Experimental Methodology -- 3.2 Results -- 4 Conclusion -- References -- Recogn-Eye: A Smart Medical Assistant for Elderly -- 1 Introduction -- 2 Literature Survey -- 3 Problem Statement -- 4 Proposed Method -- 5 Project Demonstration -- 6 Results and Discussions -- 7 Conclusion -- References -- Lossless Image Compression Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Image Representation -- 4 Problem Statement -- 5 Clustering Techniques -- 6 Image Compression Techniques -- 6.1 Generative Adversarial Networks -- 6.2 Gaussian Mixture Models -- 7 Methodology -- 8 Lossless and Lossy -- 9 Implementation -- 10 Experimental Results -- 11 Conclusion -- References -- An Energy-Efficient Approach to Transfer Data from WSN to Mobile Devices -- 1 Introduction -- 2 Related Work -- 3 Proposed Architecture -- 4 Wireless XML Stream -- 4.1 G-Node (G-N) -- 4.2 Lineage Code -- 5 Query Processing -- 5.1 Simple Query Processing -- 5.2 Twig Pattern Query Processing -- 6 Simulation Result -- 6.1 Query Processing Time with Lineage Encoding -- 6.2 Maximum Residual Energy -- 6.3 Maximum Number of Sensor Nodes with Optimum Energy -- 7 Conclusion and Future Work -- References -- Worker Safety Helmet -- 1 Introduction -- 2 Literature Review -- 3 Methodologies -- 4 Architecture Diagram -- 5 Prototype Implementation -- 6 Testing and Evaluation -- 7 Conclusion -- References -- Using IT in Descriptive Statistics and Way ANOVA Analysis to Assessment Development in Some Anthropometric Indicators of Thai Ethnic Students Born Between 2003 and 2006 in Thuan Chau District, Son La Province, Vietnam -- 1 Introduction -- 2 Methodology -- 3 Results and Discussion -- 3.1 Standing Height of Thai Ethnic Students -- 3.2 The Weight of Thai Students by Age and Sex.
3.3 BMI of Thai Students by Age and Sex -- 4 Conclusion -- References -- LSTM-Based Deep Learning Architecture for Recognition of Human Activities -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 LSTM Architecture -- 5 Methodology -- 6 Results -- 7 Conclusion and Future Work -- References -- A Deep Learning Framework for Classification of Hyperspectral Images -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Experimental Results -- 5 Conclusion -- References -- Improved Security on Mobile Payments Using IMEI Verification -- 1 Introduction -- 2 Literature Survey -- 3 Methodologies -- 4 Implementation and Result Analysis -- 5 Conclusions -- References -- Evaluating the Effectiveness of Classification Algorithms for EEG Sentiment Analysis -- 1 Introduction -- 1.1 Background -- 1.2 Motivation -- 1.3 Objective -- 2 Methods -- 2.1 Dataset -- 2.2 Preprocessing -- 2.3 Feature Extraction -- 2.4 Machine Learning Algorithms -- 2.5 Deep Learning Algorithms -- 2.6 Data Preparation -- 2.7 Evaluation Metrics -- 3 Results and Discussions -- 4 Conclusion and Future Research Direction -- 5 Data and Code Availability -- References -- Analytics and Data Computing for the Development of the Concept Digitalization in Business and Economic Structures -- 1 Introduction, Background, Motivation and Objective -- 2 Methods the Implementing Digital HR Capabilities -- 2.1 Implementation of Statistical Assessment of Functional Interactions of Users of Social and Economic Phenomena and Processes -- 2.2 Influence of Enterprise Corporate Culture Components on Individual Components of Enterprise Personnel Motivation -- 3 The Results of the Analysis the Components of Corporate Culture Motivation for Personnel -- 4 Discussions -- 5 Conclusions -- References -- The Social Hashtag Recommendation for Image and Video Using Deep Learning Approach.
1 Introduction -- 2 Literature Survey -- 2.1 Tag Recommendation for Micro-video -- 2.2 Social Tag Recommendation for Images -- 2.3 Social Tag Recommendation for Micro-video -- 2.4 Social Tag Recommendation for Image -- 3 Filtering Methods for Hashtag Recommendation -- 3.1 Collaborative Filtering -- 3.2 Content-Based Filtering -- 3.3 Filtering Based on Hybrids Approach -- 3.4 Social Popularity Prediction -- 3.5 Technique for Tag Recommendation for Images/Videos -- 4 Evaluation Parameter -- 5 Conclusion and Future Scope -- References -- Smart Door Locking System Using IoT-A Security for Railway Engine Pilots -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Implementation -- 5 Conclusion -- References -- AdaSmooth: An Adaptive Learning Rate Method Based on Effective Ratio -- 1 Introduction -- 1.1 Gradient Descent -- 2 Related Work -- 2.1 Momentum -- 2.2 AdaGrad -- 2.3 AdaDelta -- 3 AdaSmooth Method -- 3.1 Effective Ratio (ER) -- 3.2 AdaSmooth -- 3.3 AdaSmoothDelta -- 4 Experiments -- 4.1 Experiment: Multi-layer Perceptron -- 4.2 Experiment: Convolutional Neural Networks -- 4.3 Experiment: Logistic Regression -- 5 Conclusion -- References -- Designing and Implementing a Distributed Database for Microservices Cloud-Based Online Travel Portal -- 1 Introduction -- 2 Literature Review -- 3 Problem Definition -- 3.1 Why Distributed Database? -- 3.2 DDB Systems Types -- 3.3 Advantages of Distributed Database System -- 3.4 Limitations of Relational Database -- 3.5 Major Characteristics of RDBMS -- 3.6 Why Microservice Architecture? -- 4 Methodology -- 4.1 System Design -- 4.2 Data Collection Methods -- 4.3 Database Design -- 4.4 Data Analysis Tools -- 5 Results and Discussions -- 6 Conclusion -- References -- A Comparative Study of a New Customized Bert for Sentiment Analysis -- 1 Introduction -- 2 Proposed Sentiment Analysis Framework.
2.1 Proposed Model.
Record Nr. UNINA-9910637707103321
Singapore : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Sentimental analysis and deep learning : proceedings of ICSADL 2021 / / Subarna Shakya [and three others] editors
Sentimental analysis and deep learning : proceedings of ICSADL 2021 / / Subarna Shakya [and three others] editors
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (1023 pages)
Disciplina 006.31
Collana Advances in Intelligent Systems and Computing
Soggetto topico Sentiment analysis
Machine learning
ISBN 981-16-5156-6
981-16-5157-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- 508480_1_En_BookFrontmatter_OnlinePDF -- Preface -- Acknowledgments -- Contents -- Editors and Contributors -- Analysis of Healthcare Industry Using Machine Learning Approach: A Case Study in Bengaluru Region -- 1 Introduction -- 2 Literature Survey -- 3 Challenges Faced During Data Acquisition -- 4 Methodology -- 4.1 Web Scraping -- 4.2 Statistical Analysis -- 4.3 Natural Language Processing -- 4.4 Sentimental Analysis -- 5 Results and Discussion -- 6 Conclusion -- References -- Dynamic Document Localization for Efficient Mining -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Probabilistic Model for Query-Workload -- 3.2 Probabilistic Model for Content-Workload -- 3.3 Bernoulli Model for Rank Calculation -- 4 Fuzzy Threshold Algorithms -- 5 Experimental Analysis -- 5.1 Effect of Attribute Suggestion to Determine Precision and Recall -- 5.2 Effect of Biasing Coefficient for Determining Attribute Matches -- 5.3 Effect of Database Size for Determining Precision -- 6 Conclusion -- References -- SentiSeries: A Trilogy of Customer Reviews, Sentiment Analysis and Time Series -- 1 Introduction -- 2 Literature Review -- 3 Theory of Dynamic Sentiment Tracking -- 3.1 Natural Language Processing-Sentiment Analysis -- 3.2 Time Series Characteristics -- 4 Dataset -- 5 Results and Discussions -- 6 Conclusions and Future Work -- References -- Video Summarization Using Fully Convolutional Residual Dense Network -- 1 Introduction -- 2 Related Work -- 3 Our Approach -- 3.1 Problem Description -- 3.2 Fully Convolutional Residual Dense Network -- 4 Results -- 4.1 Datasets -- 4.2 Result -- 5 Conclusion -- References -- An Efficient Deep Learning Approach for Detecting Pneumonia Using the Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Material and Methods -- 3.1 Dataset -- 3.2 Preprocessing and Data Augmentation.
3.3 Proposed Model -- 4 Result Analysis -- 5 Discussion -- 6 Conclusion -- References -- QMCDS: Quantum Memory for Cloud Data Storage -- 1 Introduction -- 2 Literature Survey -- 2.1 Related Work -- 2.2 Contributions -- 3 Preliminaries -- 3.1 Qubit -- 3.2 Representation of Quantum Gates -- 3.3 Bloch Sphere -- 4 Proposed Solution -- 5 Experiments and Observation -- 6 Conclusion and Future Scope -- References -- A Study Towards Bangla Fake News Detection Using Machine Learning and Deep Learning -- 1 Introduction -- 2 Related Works -- 3 Proposed Research Methodology (PRM) -- 3.1 Experimental Setup -- 3.2 Data Preparation Pipeline (DPP) -- 3.3 Features Extraction Methods (FEM) -- 3.4 Algorithm Selection Procedure (ASP) -- 4 Result and Analysis -- 4.1 Performance Analysis (PA) -- 4.2 Comparative Analysis (CA) -- 5 Conclusions and Future Work -- References -- A Deep Learning Approach to Analyze the Propagation of Pandemic in America -- 1 Introduction -- 1.1 The Goal of the Paper and Its Contributions -- 1.2 Organization -- 2 The Architecture of the Framework -- 3 Proposed SIR Model -- 4 Proposed Algorithm -- 5 Performance Evaluation -- 5.1 Results -- 6 Discussion -- 7 Conclusion and Future Research -- References -- Graph Convolution-Based Joint Learning of Rumor with Content, User Credibility, Propagation Context, and Cognitive as Well as Emotion Signals -- 1 Introduction -- 2 Existing Work -- 2.1 Rumor Detection and Veracity Classification -- 2.2 Emotion Research and Application of Emotion in Fake News and Rumor Research -- 2.3 Cognitive Signals in Disinformation Research -- 3 Dataset -- 4 Analysis of Cognitive and Emotion Patterns in Rumor and Non-rumor -- 5 Methodology -- 6 Results and Analysis -- 7 Conclusion and Future Work -- References -- Deep Learning-Based Real-Time Object Classification and Recognition Using Supervised Learning Approach.
1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results and Analysis -- 4.1 Performance Analysis [15-19] -- 5 Conclusion and Future Work -- References -- Single-Channel Speech Enhancement in Modulation Domain Using Particle Swarm Optimization -- 1 Introduction -- 2 Spectral Subtraction -- 2.1 Modulation Domain Spectral Subtraction -- 3 Standard Particle Swarm Optimization -- 4 Proposed Noise Estimation Using PSO -- 5 Results -- 6 Conclusion -- References -- Pneumonia and Diabetic Retinopathy Detection Using Deep Learning Algorithm -- 1 Introduction -- 2 Related Work -- 3 Research Gap -- 4 Problem Definition -- 5 Methodology -- 5.1 Algorithm Used- Convolutional Neural Networks -- 5.2 Data Pre-processing -- 5.3 Model Information -- 5.4 Datasets Used -- 6 Results -- 6.1 Screenshots of Results -- 7 Conclusion -- 8 Future Scope -- References -- Design of IoT-Based Improved Multimodal Ant Colony Optimızation (MM-ACO) Algorithm for Real-Time Applications -- 1 Introduction -- 2 Existing System -- 3 Proposed Algorithm -- 4 Conclusion -- References -- An Interview Transcriber Using Natural Language Processing -- 1 Introduction -- 2 Literature Review -- 3 Proposed System Methodology -- 4 Information Extraction -- 4.1 Approaches to Extract Information -- 5 Textual Similarity -- 5.1 Approaches for Text Pre-processing -- 6 Observed Results -- 6.1 Extracting Information Using Keywords -- 6.2 Extracting Information Based on Similar Pool of Words -- 7 Work Embeddings for Future Deeper Approaches Like Word2Vec -- 7.1 Word2Vec -- 8 Conclusion and Future Scope -- References -- Plagiarism Detection for Source Codes and Texts -- 1 Introduction -- 2 Objectives -- 3 Literature Review -- 4 Proposed Work -- 5 Experimental Analysis -- 6 Result and Discussion -- 7 Conclusion -- References.
Investigation of Kinetic Energy Harvesting from Human Body Motion Activities Using Free/Impact Electromagnetic Generator -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Storage of Harvested Energy -- 3.2 The Designed Structure of Biomechanical Hip Energy Harvester -- 4 Results and Discussion -- 4.1 Hip Joint Gait Cycle -- 4.2 Positioning the Angle of Harvester -- 4.3 Hip Joint Gait Harvesting at Walking Speed 80 M/Min -- 5 Conclusion -- References -- Automated Determination of Critical Temperature -- 1 Introduction -- 1.1 Critical Temperature -- 1.2 Machine Learning Algorithms -- 1.3 Dataset -- 2 Literature Survey -- 3 Methodology -- 3.1 Algorithm Followed for Developing the Models -- 3.2 Data Preprocessing -- 3.3 Working of the Models -- 3.4 Model Training -- 3.5 Model Testing -- 3.6 Model Performance Determination -- 4 Results and Discussion -- 5 Conclusion -- References -- ANN-based Hybridization Approach for Detection of Cardiac Disease -- 1 Introduction -- 1.1 Feedforward Networks (FFN) -- 1.2 Feedback Networks -- 1.3 ANN Learning -- 2 Literature Review -- 3 Problem Formulation -- 4 Proposed System -- 5 Algorithms -- 5.1 Artificial Neural Network (ANN) -- 5.2 Gradient Descent Algorithm -- 5.3 Genetic Algorithm -- 6 Error Back Propagation (EBP) -- 7 Machine Learning Network -- 8 Benefits of Genetic Algorithm in Neural Network -- 9 Tests and Results -- 10 Conclusion and Future Scope -- References -- The Implementation of Enhanced K-Strange Points Clustering Method in Classifying Undergraduate Thesis Titles -- 1 Introduction -- 1.1 Motivation -- 2 Illustration of Enhanced K-Strange Points Clustering Algorithm -- 3 Research Method -- 3.1 Research Data -- 3.2 Text Mining -- 3.3 Enhanced K-Strange Points Clustering Algorithm -- 3.4 Silhouette Coefficient Testing -- 4 Mathematical Illustration.
4.1 Step I: Finding the Minimum of the Dataset (Kmin) -- 4.2 Step II: Finding the Maximum of the Dataset (Kmax) -- 4.3 Step III: Finding the Third Strange Point -- 4.4 Step IV: Correcting the K-Strange Point -- 4.5 Step V: Assigning Points to Respective Clusters -- 5 Result and Discussion -- 5.1 Collect Data -- 5.2 Text Parsing -- 5.3 The Process of Document Clustering -- 5.4 Testing -- 6 Conclusion -- References -- Spam Email Detection Using Machine Learning and Neural Networks -- 1 Introduction -- 2 Literature Review -- 2.1 Existing System -- 3 Proposed Methodology -- 3.1 Data Set Reading and Inspection -- 3.2 Text Preprocessing -- 3.3 Feature Sets and Vectorization -- 3.4 Pipeline and Modeling -- 4 Results -- 5 Conclusion -- References -- Online Appointment Management System in Hospitals Using Distributed Resource Allocation Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 3.1 Module Description -- 3.2 Distributed Resource Allocation Algorithm -- 3.3 Data Flow -- 4 Experimental Result -- 5 Conclusion -- References -- BeFit-A Real-Time Workout Analyzer -- 1 Introduction -- 2 Related Work -- 3 Methodology Adopted -- 3.1 Working of PoseNet Model -- 3.2 Comparison Analysis -- 3.3 Detecting User's Pose -- 3.4 Getting Pose from Yoga/Gym Workout Selected -- 3.5 Comparing the Skeletons -- 3.6 Data Stream Handling -- 4 Final Implementation -- 5 Advantages -- 6 Future Scope -- 7 Results -- 8 Conclusion -- References -- Analysis of Car Damage for Personal Auto Claim Using CNN -- 1 Introduction -- 2 Literature Survey -- 3 Design -- 4 Proposed Method -- 5 Results and Simulation -- 6 Conclusion -- References -- On the Analysis Problem of the Attribute-Based Access Control Model HGABAC -- 1 Introduction -- 2 HGABAC: An ABAC Model and Its Administrative Model GRUAG -- 3 Automated Analysis Technique for GURAG System -- 4 Evaluation.
5 Conclusions.
Record Nr. UNINA-9910743382303321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Technologies for Sustainable and Resilient Ecosystems [[electronic resource] ] : 3rd EAI International Conference, Edge-IoT 2022, and 4th EAI International Conference, SmartGov 2022, Virtual Events, November 16-18, 2022, Proceedings / / edited by Sérgio Ivan Lopes, Paula Fraga-Lamas, Tiago M. Fernándes-Camáres, Babu R. Dawadi, Danda B. Rawat, Subarna Shakya
Smart Technologies for Sustainable and Resilient Ecosystems [[electronic resource] ] : 3rd EAI International Conference, Edge-IoT 2022, and 4th EAI International Conference, SmartGov 2022, Virtual Events, November 16-18, 2022, Proceedings / / edited by Sérgio Ivan Lopes, Paula Fraga-Lamas, Tiago M. Fernándes-Camáres, Babu R. Dawadi, Danda B. Rawat, Subarna Shakya
Autore Lopes Sérgio Ivan
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (183 pages)
Disciplina 005.1
Altri autori (Persone) Fraga-LamasPaula
Fernándes-CamáresTiago M
DawadiBabu R
RawatDanda B
ShakyaSubarna
Collana Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Soggetto topico Software engineering
Operating systems (Computers)
Application software
Computer networks
Computer Networks
Software Engineering
Operating Systems
Computer and Information Systems Applications
Computer Communication Networks
ISBN 3-031-35982-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Edge-IoT Applications: A Cost-Effective Thermal Imaging Safety Sensor for Industry 5.0 and Collaborative Robotics -- Edge Computing With Low-Cost Cameras For Object Detection In Smart Farming -- Evaluating Maximum Operating Distance in COTS RFID TAGS for Smart Manufacturing -- IoT Architectures, Forecasting and Adversarial Training: Stock Direction Forecasting Utilizing Technical, Fundamental, and News Sentiment Data -- IoT Architectures for Indoor Radon Management: a Prospective Analysis -- Adversarial Training for Better Robustness -- Artificial Intelligence and Machine Learning for smart governance: Integrating Computer Vision and Crowd Sourcing to Infer Drug Use on Streets: A Case Study with 311 Data in San Francisco -- Machine learning approach to crisis management exercise analysis: A case study in SURE project -- Quantitative Evaluation of Saudi E-government Websites Using a Web Structure Mining Methodology -- Extracting Digital Biomarkers for Unobtrusive Stress State Screening from Multimodal Wearable Data -- Smart Transportation: Continuous Measurement of Air Pollutant Concentrations in a Roadway Tunnel in Southern Italy -- Rating Urban Transport Services Quality Using a Sentiment Analysis Approach.
Record Nr. UNISA-996546819503316
Lopes Sérgio Ivan  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui