Advances in Computing and Intelligent Systems : Proceedings of ICACM 2019 / / edited by Harish Sharma, Kannan Govindan, Ramesh C. Poonia, Sandeep Kumar, Wael M. El-Medany |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (xiv, 637 pages) : illustrations |
Disciplina | 006.3 |
Collana | Algorithms for Intelligent Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Algorithms Pattern recognition Computational Intelligence Artificial Intelligence Algorithm Analysis and Problem Complexity Pattern Recognition |
ISBN | 981-15-0222-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Intuitionistic Fuzzy Shannon Entropy Weight Based Multi Criteria Decision Model with TOPSIS to Analyse Security Risks and Select Online Transaction Method -- Chapter 2. Fermat Spiral Based Moth-Flame Optimization Algorithm for Object-Oriented Testing -- Chapter 3. A Comparative Study of Information Retrieval Using Machine Learning -- Chapter 4. Adaptive Background Subtraction Using Manual Approach for Static Images -- Chapter 5. Tweets Daily: Categorised News from Twitter -- Chapter 6. Compressing Meta Class Files through String Optimization -- Chapter 7. An Algorithm to Generate Largest Prime Number -- Chapter 8. Development of a Discretization Methodology for 2.5D Milling Toolpath optimization Using Genetic Algorithm -- Chapter 9. Machine Learning Based Prediction of PM 2.5 Pollution Level in Delhi -- Chapter 10. A Comparative Study of Load Balancing Algorithms in a Cloud Environment -- Chapter 11. Information Retrieval from Search Engine Using Particle Swarm Optimization -- Chapter 12. Genetic Algorithm Based Multi Objective Optimization Framework to Solve Travelling Salesman Problem -- Chapter 13. Design of Optimal PID Controller for Varied System Using Teaching-Learning-Based Optimization -- Chapter 14. Innovative Review on Artificial Bee Colony Algorithm and it’s Variants -- Chapter 15. Multi Linear Regression Model to Predict Correlation between IT Graduate Attributes for Employability using R. . |
Record Nr. | UNINA-9910484185503321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Artificial Intelligence: Theory and Applications : Proceedings of AITA 2023, Volume 2 / / edited by Harish Sharma, Antorweep Chakravorty, Shahid Hussain, Rajani Kumari |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (531 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Big data Computational Intelligence Artificial Intelligence Big Data |
ISBN | 981-9984-79-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Spam Email Image Detection Using Convolution Neural Network and Convolutional Block Attention Module -- 1 Introduction -- 2 Related Works -- 3 Convolution Neural Network -- 4 Convolutional Block Attention Model -- 5 Experimental Result -- 5.1 Dataset -- 5.2 Evaluation Metrics -- 5.3 Discussion -- 6 Conclusion -- References -- Identifying Fake Twitter Trends with Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 PolitiFact Dataset -- 2.2 PHEME Dataset -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Modeling -- 3.4 Experiments -- 4 Results and Analysis -- 5 Conclusion and Future Work -- References -- An Intelligent Agent Framework for Resilient Deployment in the Internet of Things Environment -- 1 Introduction -- 2 Intelligent Agent Framework -- 3 Proposed Deployment Algorithm -- 4 Results and Discussion -- 5 Conclusions -- References -- The Impact of Financial Ratios and Pandemic on Firm Performance: An Indian Economic Study -- 1 Introduction -- 2 Literature Review and Hypotheses Development -- 2.1 Debt and Firm Performance -- 2.2 Working Capital and Firm Performance -- 2.3 Financial Autonomy and Firm Performance -- 2.4 Quick Ratio and Firm Performance -- 3 Sample -- 4 Research Methodology -- 5 Results -- 5.1 Trend Analysis -- 5.2 Regression Results -- 6 Conclusion -- References -- An Enhanced BERT Model for Depression Detection on Social Media Posts -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Enhanced BERT Classical -- 4 Results and Discussion -- 4.1 Dataset -- 4.2 Comparison with the Existing System -- 5 Conclusion -- References -- Quality Prediction of a Stack Overflow Question Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Techniques -- 3.1 Naïve Bayes (NB) -- 3.2 Support Vector Classifier (SVC).
3.3 Decision Tree (DT) -- 3.4 Logistic Regression (LR) -- 3.5 K-Nearest Neighbors (KNN) -- 3.6 Random Forest (RF) -- 3.7 Natural Language Processing (NLP) -- 3.8 Bag of Words (BoW) -- 3.9 Word Cloud Analysis -- 4 Proposed Methodology and Implementation -- 4.1 Importing Libraries -- 4.2 Description of Dataset -- 4.3 Cleaning Textual Data -- 4.4 Tokenization, Lemmatization, and PoS Tagging -- 4.5 Lexicon-Based Sentiment Analysis -- 4.6 Word Embedding -- 4.7 Splitting the Dataset -- 4.8 Model Building and Performance Evaluation -- 5 Experimental Results and Analysis -- 6 Conclusion -- References -- Decision-Making Framework for Supplier Selection Using an Integrated Approach of Dempster-Shafer Theory and Maximum Entropy Principle -- 1 Introduction -- 2 Preliminaries -- 2.1 Dempster-Shafer Evidence Theory -- 2.2 Cobb-Douglas Utility Function -- 2.3 Maximum Entropy Method -- 3 Proposed Methodology -- 3.1 Evaluate Criteria Weights -- 3.2 Evaluate Alternative Ranking -- 4 Numerical Example -- 4.1 Problem Description -- 4.2 Evaluation of Criteria Weights -- 4.3 Ranking of Alternatives -- 5 Comparative Analysis and Discussions -- 5.1 Comparative Analysis of Weight Determination Method -- 5.2 Comparative Analysis of Ranking Method -- 6 Sensitivity Analysis -- 7 Conclusions -- References -- Improved Accuracy of Robotic Arm Using Virtual Environment -- 1 Introduction -- 2 Literature Review and Related Work -- 3 Proposed Method, Tools, and Techniques Used -- 3.1 Forward Kinematics -- 3.2 Inverse Kinematics -- 3.3 Technique -- 4 Methodology -- 4.1 Design of the Robotic Arm -- 4.2 Addition of Revolute Joints -- 4.3 Importing the Model to MATLAB -- 4.4 Defining the Robot Environment -- 4.5 Defining the Desired Trajectory -- 4.6 Working of Inverse Kinematic Block -- 4.7 Working of Forward Kinematic Block -- 4.8 Data Collection and Analysis -- 5 Result -- 6 Conclusion. References -- Human Activity Recognition a Comparison Between Residual Neural Network and Recurrent Neural Network -- 1 Introduction -- 2 HAR Using ResNet50 -- 3 HAR Using RNN -- 4 Conclusion -- References -- Using AI Planning to Automate Cloud Infrastructure -- 1 Introduction -- 2 Related Work -- 2.1 Cloud Infrastructure -- 2.2 Prototype Model -- 3 Problem Formulation -- 4 Proposed Solution -- 5 Testing and Result Evaluations -- 5.1 Test Case 1: Empty Environment -- 5.2 Test Case 2: No Application Module -- 5.3 Test Case 3: Neither the Database nor the Application Module -- 5.4 Test Case 4: Inconsistent Database -- 5.5 Test Case 5: Application Module in Unhealthy Status -- 5.6 Test Case 6: Application Out of Capacity -- 6 Conclusions and Future Scope -- References -- Using Historical Trip Information to Determine the Waiting Time Required for Taxi Services -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Proposed Solution: Design and Implementation -- 5 Results' Evaluation -- 6 Conclusions and Future Scope -- References -- The Impact of Cesarean Section Trends and Associated Complications in the Current World: A Comprehensive Analysis Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Decision Tree (DT) -- 3.2 Random Forest (RF) -- 3.3 K-Nearest Neighbour (KNN) -- 3.4 Support Vector Machine (SVM) -- 3.5 AdaBoost (AB) -- 4 Results -- 4.1 Decision Tree -- 4.2 Random Forest -- 4.3 K-Nearest Neighbour -- 4.4 Support Vector Machine -- 4.5 AdaBoost -- 5 Conclusion -- References -- Novel Hybrid Methods for Journal Article Summarization Combining Graph Method and Rough Set TFIDF Method with Pegasus Model -- 1 Introduction -- 2 Related Works and Summarization Datasets -- 3 Motivation and Challenges in Article Summarization -- 4 Methodology -- 4.1 Extractive Summarization Methods. 4.2 Abstractive Summarization Methods -- 4.3 Hybrid Summarization Methods -- 5 Results and Discussion -- 5.1 Rouge Score for Word Overlap over Annotated Summary -- 5.2 BERT Score for Similarity Score -- 6 Conclusion and Future Scope -- References -- Differential Evolution Wrapper-Based Feature Selection Method for Stroke Prediction -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Dataset -- 3.2 Proposed System -- 4 Result Analysis -- 5 Discussion -- 6 Conclusion -- References -- Parkinson's Disease Identification from Speech Signals Using Machine Learning Models -- 1 Introduction -- 2 Literature Review -- 2.1 Machine Learning and Neural Network Techniques for PD Classification -- 2.2 Hybrid Models with Machine Learning Techniques and Neural Network -- 3 System Architecture -- 3.1 Dataset Details -- 3.2 Proposed Approach -- 4 Results and Discussions -- 4.1 Performance Matrices -- 4.2 Experimental Analysis -- 5 Conclusion -- References -- Performance Analysis of Deep CNN, YOLO, and LeNet for Handwritten Digit Classification -- 1 Introduction -- 2 Literature Review -- 3 Objective, Motivation and Challenges -- 4 Methodology -- 4.1 Dataset Description -- 5 Implementation -- 5.1 Convolution Neural Network -- 5.2 Convolutional Layer -- 5.3 Pooling Layer -- 5.4 Fully Connected Layer -- 5.5 Creating a CNN Model -- 5.6 You Only Look Once (YOLO) -- 5.7 LeNet -- 6 Result and Discussion -- 7 Conclusions -- References -- Data-Driven Decision Support Systems in E-Governance: Leveraging AI for Policymaking -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Research Objectives -- 3.2 Research Methodology -- 3.3 Proposed Contributions -- 4 Experimental Results -- 4.1 Accuracy -- 4.2 Precision -- 4.3 Recall (Sensitivity) -- 4.4 F1 Score -- 4.5 Mean Absolute Error (MAE) -- 4.6 Root Mean Square Error (RMSE) -- 5 Conclusions. References -- The Infrastructure Development of Contemporary Medical Devices Based on Internet of Things Technology -- 1 Introduction -- 2 IoT Infrastructure in Health Care -- 3 IoT Wireless Standards -- 4 IoT Network Architecture -- 4.1 Availability -- 4.2 Scalability -- 4.3 Network Performance -- 4.4 Manageability -- 4.5 Affordability -- 4.6 Adaptability -- 4.7 Usability -- 5 Cloud Computing in IoT -- 6 Contemporary Applications of IoT -- 6.1 Smart IoT Sensors -- 6.2 Smart Pill Containers -- 6.3 Smart Hospital Beds -- 6.4 Temperature Sensors -- 6.5 Wearable Devices -- 6.6 Future of IoT Medical Instruments -- 7 Conclusions -- References -- Business Intelligence System Adoption Project in the Area of Investments in Financial Assets -- 1 Introduction -- 2 Understanding the Significance and Functionality of Business Intelligence Systems -- 3 Review of Business Intelligence Literature -- 4 Traditional Information Systems on Investments in Financial Assets -- 5 Business Intelligence for Investments in Financial Assets-The Case of an IT Industry Organization -- 5.1 Preliminary Information -- 5.2 Original Business Intelligence System Employed in the Organization -- 6 Conclusions -- References -- Feature Selection Techniques to Enhance Prediction of Clinical Appointment No-Shows Using Neural Network -- 1 Introduction -- 2 Related Studies -- 3 Model Development -- 4 Analysis of Performance Measures -- 5 Conclusion -- References -- A Simple Recommendation Model Using the Item's Global Popularity and Frequency-Based User Preference -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Formalizations -- 3.2 Model -- 4 Experimental Results -- 5 Conclusion -- References -- An Early Detection of Autism Spectrum Disorder Using PDNN and ABIDE I& -- II Dataset -- 1 Introduction. 2 The Next Step in Comprehending the Brain and Psychiatric Diseases is Machine Learning, Deep Learning, and Predicting Disease States. |
Record Nr. | UNINA-9910799221503321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Artificial Intelligence: Theory and Applications : Proceedings of AITA 2023, Volume 1 / / edited by Harish Sharma, Antorweep Chakravorty, Shahid Hussain, Rajani Kumari |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (495 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Big data Computational Intelligence Artificial Intelligence Big Data |
ISBN | 981-9984-76-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Control Techniques for Vision-Based Autonomous Vehicles for Agricultural Applications: A Meta-analytic Review -- 1 Introduction -- 2 State-of-The Art Studies -- 2.1 Target Detection in Autonomous Vehicle System -- 2.2 Vision-Based System -- 3 Mathematical Modeling of Autonomous System -- 4 Conclusion -- References -- Co-GA: A Bio-inspired Semi-supervised Framework for Fake News Detection on Scarcely Labeled Data -- 1 Introduction -- 2 Related Work -- 2.1 Supervised Fake News Detection Using Linguistic Content -- 2.2 Semi-supervised Fake News Detection Using Linguistic Content -- 2.3 Metaheuristics-Based Approaches for Feature Selection -- 2.4 Metaheuristics-Based Fake News Detection -- 3 Data -- 4 Proposed Methodology -- 4.1 Pre-processing -- 4.2 Feature Extraction -- 4.3 Bio-inspired Feature Selection -- 4.4 Multi-view Co-training Model -- 5 Results and Analysis -- 6 Future Research Directions -- 7 Conclusion -- References -- Kernel Methods for Conformal Prediction to Detect Botnets -- 1 Introduction -- 2 Related Works -- 2.1 Signature-Based and Heuristic-Based Botnet Detection -- 2.2 Machine Learning for Botnet Detection -- 2.3 Kernel Methods -- 2.4 Conformal Prediction -- 2.5 Deep Learning and Graph-Based Approaches -- 2.6 Challenges and Limitations -- 2.7 Motivation for the Proposed Approach -- 2.8 Emerging Trends and Research Directions -- 3 Methodology -- 3.1 Kernel Methods -- 3.2 Conformal Prediction -- 3.3 Proposed Approach: Kernel Methods for Conformal Prediction -- 3.4 Evaluation Metrics -- 3.5 Experimental Setup -- 4 Results -- 4.1 Dataset Description -- 4.2 Experimental Setup -- 4.3 Experimental Results -- 4.4 Analysis of Results -- 5 Conclusion -- References -- Biogas Generation from Animal Waste: A Case Study of Village Wazirpur -- 1 Introduction.
2 Biogas Production from Animal Waste -- 2.1 Factors Affecting Biogas Production -- 2.2 Sensors for Determining the Parameters Affecting Biogas Production -- 3 Area Under Study -- 4 Cost Analysis and Electricity Production -- 5 Conclusion -- References -- Volume of Imbalance Container Prediction using Kalman Filter and Long Short-Term Memory -- 1 Introduction -- 2 Problem Statement -- 3 Research Questions -- 4 KALSTM: A Hybrid Model -- 5 Results and Limitations -- 6 Conclusion -- References -- Modelling Stock Prices Prediction with Long Short-Term Memory (LSTM): A Black Box Approach -- 1 Introduction -- 2 Methodology Based on LSTM -- 3 Description of Datasets -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Agricultural Crop Yield Prediction for Indian Farmers Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset -- 3.2 Methodology -- 4 Architecture -- 5 Result Analysis -- 6 Conclusion -- References -- Application of Artificial Intelligence on Camera-Based Human Pose Prediction for Yoga: A Methodological Study -- 1 Introduction -- 1.1 Scope -- 1.2 Challenges -- 1.3 Impact of Yoga [1] -- 2 Literature Review -- 3 Methodology -- 3.1 Research Process -- 3.2 Key Point Detection Methods -- 3.3 Implementation Methodology [12, 13] -- 4 Datasets and Metrics -- 5 Results -- 6 Conclusion -- 7 Future Potential Development -- References -- Predicting of Credit Risk Using Machine Learning Algorithms -- 1 Introduction -- 2 Review of Literature -- 2.1 Machine Learning Algorithms -- 2.2 Development of Credit Risk Model -- 3 Data and Methodology -- 3.1 Data -- 3.2 Variables -- 3.3 Machine Learning Models and Evaluation Parameters -- 3.4 Evaluation Parameters -- 3.5 Methodology -- 4 Empirical Findings -- 5 Conclusions and Implications -- References -- Study of Various Text Summarization Methods. 1 Introduction -- 2 Literature Review -- 3 Overview of Proposed Model -- 3.1 Proposed Methodology -- 3.2 Design of Model Architecture -- 3.3 Model Evaluation -- 4 Results -- 5 Conclusion -- References -- Investigations on Deep Learning Pre-trained Model VGG-19 Using Transfer Learning for Remote Sensing Image Classification on Benchmark Datasets -- 1 Introduction -- 2 Literature Review -- 3 Comparison of Performance Metrics of Machine Learning Methods on the PatterNet Dataset -- 4 Utilizing Pre-trained Models for Transfer Learning -- 5 Transfer Learning with Pre-trained Models Based on the Baseline ImageNet Dataset -- 6 Overview of VGG-19 -- 7 Enabling Efficient Feature Reuse and Information Flow in Deep Neural Networks for Superior Performance -- 8 Deep Learning Surpassing Traditional Machine Learning Techniques -- 9 Setting Up Experiments: Feature Extraction and Classification for Remote Sensing Images with a Pre-trained VGG-19 Model -- 9.1 Dataset Description -- 9.2 Assessment Metrics Utilized for Model Evaluation in Image Classification and Retrieval -- 9.3 Research Findings: Investigating Test Accuracy and Test Loss Scores on Benchmark Datasets Using VGG-19 Pre-trained Model -- 10 Summarizing the Feature Extraction with Transfer Learning Approach in Deep Learning -- References -- Complexity Analysis of Legal Documents -- 1 Introduction -- 2 Related Works -- 2.1 NER for Indian Legal Documents -- 2.2 Information Extraction -- 2.3 Summarising in Legal Domain -- 2.4 Complexity of Legal Documents -- 3 Methodology -- 3.1 Proposed Model -- 3.2 Analysis of Complexity -- 4 Result Analysis -- 5 Conclusion and Future Works -- References -- Predicting Virality of Tweets Using ML Algorithms and Analyzing Key Determinants of Viral Tweets -- 1 Introduction -- 2 Theoretical Background and Related Work -- 3 Methodology -- 4 Results and Discussion. 5 Conclusion, Limitations, and Future Scope -- References -- Review of Classification and Detection for Insects/Pests Using Machine Learning and Deep Learning Approach -- 1 Introduction -- 1.1 Pictorial Representation of Classification and Detection of Pests and Comparison Between ML and DL -- 2 Material -- 2.1 Dataset Collection -- 3 Literature Work -- 3.1 Review of Different Machine Learning and Deep Learning Techniques for the Classification of Pests -- 4 Conclusion -- References -- Sentiment Analysis of Product Reviews Using Deep Learning and Transformer Models: A Comparative Study -- 1 Introduction -- 2 Literature Review -- 3 Sentiment Analysis -- 3.1 Sentiment Analysis Based on Machine Learning -- 3.2 Sentiment Analysis Based on Deep Learning -- 3.3 Sentiment Analysis Based on Transformer-Based Models -- 4 Implementation -- 4.1 Dataset -- 4.2 Data Pre-processing -- 4.3 Classification Models -- 5 Results and Discussions -- 5.1 Hyper Parameters Used -- 5.2 Performance Evaluation -- 6 Conclusion -- References -- Effect of Variation in Pause Times Over MANET Routing Protocols -- 1 Introduction -- 2 MANET Routing Protocols and Literature Review -- 3 Environment Setup -- 4 Performance Metrics -- 5 Conclusions and Future Scope -- References -- DDCMR2: A Deep Detection and Classification Model with Resizing and Rescaling for Plant Disease -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology and Implementation -- 3.1 Data Collection -- 3.2 Data Cleaning, Preprocessing, and Visualization -- 3.3 Cache, Shuffle, and Prefetch -- 3.4 Model Building -- 3.5 Hyperparameters Choice -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Leveraging Natural Language Queries for Effective Video Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology and Models -- 3.1 Uni-Modal Encoder -- 3.2 Cross-Modal Encoder. 3.3 Query Generator -- 3.4 Query Decoder -- 4 Experimental Analysis and Outcomes -- 5 Conclusion -- References -- An Experimental Study to Perform Bioinformatics Based on Heart Disease Case Study Using Supervised Machine Learning -- 1 Introduction -- 2 Preliminaries -- 2.1 Machine Learning -- 2.2 Logistic Regression -- 2.3 Decision Tree -- 2.4 Support Vector Machine -- 3 Experimentation -- 3.1 Data Provenance -- 3.2 Flow Diagram of This Study -- 3.3 Correlation Matrix -- 3.4 Logistic Regression -- 3.5 Support Vector Machine (SVM) -- 3.6 Decision Tree -- 4 Results and Analysis -- 5 Conclusion -- References -- Empirical Analysis of Denoising Algorithms for CCTV Face Images -- 1 Introduction -- 2 Related Work -- 3 BM3D (Block-Matching and 3D Filtering) -- 3.1 Collaborative Filtering: It Takes Four Steps -- 3.2 Aggregation -- 3.3 Wiener Filtering Step -- 4 KSVD (k-Singular Value Decomposition) -- 5 WNNM (Weighted Nuclear Norm Minimization) -- 6 Results and Discussion -- 7 Conclusion -- References -- Content-Based Tagging and Recommendation System for Tamil Songs Based on Text and Audio Input -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Music Segmentation -- 3.2 Instrument Recognition -- 3.3 Lyric Collection and Translation -- 3.4 Lyric Tagging -- 3.5 Audio Prompt -- 3.6 Similarity-Based Retrieval -- 4 Datasets -- 4.1 MUSDB18 Dataset -- 4.2 Tamil Songs -- 4.3 AudioSet -- 5 Outcomes -- 5.1 Metrics for Evaluation -- 5.2 Summary of Metrics -- 6 Conclusions and Future Work -- References -- Multimodal Face and Ear Recognition Using Feature Level and Score Level Fusion Approach -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Preprocessing -- 3.2 Feature Extraction (BSIF) -- 3.3 Feature Level Fusion -- 3.4 Score Level Fusion -- 4 Experimental Results and Discussion -- 4.1 GTAV Dataset. 4.2 FEI Face Database. |
Record Nr. | UNINA-9910841868303321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Communication and Intelligent Systems : Proceedings of ICCIS 2021 / / edited by Harish Sharma, Vivek Shrivastava, Kusum Kumari Bharti, Lipo Wang |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 |
Descrizione fisica | 1 online resource (1212 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Image processing - Digital techniques Computer vision Machine learning Computational Intelligence Artificial Intelligence Computer Imaging, Vision, Pattern Recognition and Graphics Machine Learning |
ISBN | 981-19-2130-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A Design of Frequency Encoded Dibit-Based Inhibitor Logic Using Reflective Semiconductor Optical Amplifier with Simulative Verification -- Ocean Surface Pollution Detection: Applicability Analysis of V-Net with Data Augmentation for Oil Spill and Other Related Ocean Surface Feature Monitoring -- Simulation and Investigations of I-shaped Patch Antenna with Induced SIW and Slit for S and C Bands Radar Applications -- Road Network Extraction from Satellite Images Using Deep Learning -- An Evolutionary Online Motion Planning of Car-Like Mobile Robots with Velocity Obstacles. |
Record Nr. | UNINA-9910588599003321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Communication and intelligent systems : proceedings of ICCIS 2020 / / Harish Sharma [and three others] editors |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (1036 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Artificial intelligence
Machine learning Telecommunication systems |
ISBN | 981-16-1089-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Neural Network Imitation Model of Realization of the Business Analysis Process -- 1 Introduction -- 2 Analysis of Recent Research and Publications -- 3 Setting the Objective -- 4 The Case Study -- 5 Research Method -- 6 Conclusions -- References -- Thermal Modeling of the GaN HEMT Device Using Decision Tree Machine Learning Technique -- 1 Introduction -- 2 Experimental Setup -- 3 Device Modeling Using Machine Learning -- 4 Results -- 5 Conclusion -- References -- Low-Cost FPGA-Based On-board Computer -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results and Simulations -- 5 Conclusion -- References -- A Survey on Solution of Imbalanced Data Classification Problem Using SMOTE and Extreme Learning Machine -- 1 Introduction -- 2 Imbalanced Data -- 2.1 Approaches to Overcome Class Imbalance -- 2.2 Advantages and Disadvantages of the Approaches -- 3 Synthetic Minority Over-sampling Technique -- 4 Extreme Learning Machine (ELM) -- 4.1 Variants of ELM -- 5 Machine Learning -- 5.1 ML Techniques -- 6 Convolutional Neural Network (CNN) -- 7 Related Work -- 8 Conclusion -- References -- Thermal Imaging-Assisted Infection Classification (BoF) for Brinjal Crop -- 1 Introduction -- 2 Motivation -- 3 Material and Methods -- 3.1 Experimental Setup -- 3.2 Proposed Methodology -- 3.3 Classification: BoF -- 4 Result and Discussion -- 5 Conclusion -- References -- Preterm Delivery Prediction Using Gradient Boosting Algorithms -- 1 Introduction -- 2 Related Work -- 3 Backgrounds -- 4 Result and Discussion -- 5 Conclusions -- References -- Analysis Urban Traffic Vehicle Routing Based on Dijkstra Algorithm Optimization -- 1 Introduction -- 2 Related Work -- 2.1 Dijkstra Algorithm -- 2.2 Algorithm Optimization -- 3 Model Construction -- 4 Results and Discussion -- 5 Conclusion -- References.
A Comprehensive Overview of Quality Enhancement Approach-Based Biometric Fusion System Using Artificial Intelligence Techniques -- 1 Introduction -- 2 Background Survey -- 3 Biometric Quality Enhancement -- 4 Analysis of Existing Work -- 5 Conclusion and Future Work -- References -- Rainfall Prediction Using Deep Neural Network -- 1 Introduction -- 2 Methodology -- 3 Data and Data Pre-processing -- 3.1 Data Set -- 3.2 Data Pre-processing -- 3.3 Data Insight -- 3.4 Train-Test Split -- 3.5 Feature Scaling -- 4 Deep Neural Network Model -- 5 Result and Conclusion -- 5.1 Weights and Bias -- 5.2 Training and Validation: Loss and Accuracy -- 5.3 Test Loss and Test Accuracy -- 5.4 Comparative Analysis -- 6 Conclusion -- References -- A Comparative Analysis of Supervised Word Sense Disambiguation in Information Retrieval -- 1 Introduction -- 2 WSD Approaches -- 3 Supervised WSD for IR -- 3.1 Naïve Bayes Algorithm -- 3.2 Support Vector Machine (SVM) Algorithm -- 3.3 Decision Tree Algorithm -- 3.4 K-Nearest Neighbor (KNN) Algorithm -- 4 Comparison of Algorithms -- 5 Discussion -- 6 Conclusion -- References -- Real-Time Deep Learning Face Mask Detection Model During COVID-19 -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Algorithm -- 3.2 Dataset -- 4 Implementation -- 5 Conclusion -- References -- Prediction of California Bearing Ratio of Subgrade Soils Using Artificial Neural Network Principles -- 1 Introduction -- 2 Materials -- 2.1 Particle Sizes -- 2.2 Plasticity Characteristics -- 2.3 Compaction Characteristics -- 2.4 California Bearing Ratio (CBR) -- 3 Artificial Neuron Network -- 4 Results and Discussion -- 5 Conclusions -- References -- Real-Time Bangladeshi Currency Recognition Using Faster R-CNN Approach for Visually Impaired People -- 1 Introduction -- 2 Related Works -- 3 System Design -- 4 Dataset Developing and Training. 5 Currency Recognition via Faster R-CNN -- 6 Results and Discussions -- 7 Conclusions -- References -- Bearing Fault Detection Using Comparative Analysis of Random Forest, ANN, and Autoencoder Methods -- 1 Introduction -- 2 Related Work -- 3 Algorithms -- 3.1 Random Forest Classification -- 3.2 Artificial Neural Network -- 3.3 Autoencoder -- 4 Proposed Methodology -- 4.1 Dataset Description -- 4.2 Methodology -- 5 Results and Discussion -- 5.1 Random Forest Classification -- 5.2 Artificial Neural Network -- 5.3 Autoencoder -- 5.4 Comparing the Various Models -- 6 Conclusion -- References -- Selection of a Mesh Network Routing Protocol for Underground Mines -- 1 Introduction -- 2 Literature Review -- 2.1 Current Networking Methods Used in Mines -- 2.2 Similar Work on Selecting WMN Routing Protocols for Underground Mines -- 2.3 Wireless Mesh Network Routing Protocols -- 3 Setup and Procedure -- 3.1 Setup -- 3.2 Procedure -- 3.3 Equipment and Software -- 3.4 Requirements -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- An Energy-Efficient Communication Scheme for Multi-robot Coordination Deployed for Search and Rescue Operations -- 1 Introduction -- 2 Related Works -- 3 Proposed System -- 3.1 Publisher Robots -- 3.2 Subscriber Robots -- 3.3 Coordinator Robot -- 4 Implementation -- 5 Results and Discussion -- 6 Conclusion -- References -- Butterfly Optimization Algorithm-Based Optimal Sizing and Integration of Photovoltaic System in Multi-lateral Distribution Network for Interoperability -- 1 Introduction -- 2 Literature Review -- 3 Problem Formulation -- 4 Overview of Butterfly Optimization Algorithm -- 4.1 Modelling of Food Foraging Behaviour of Butterflies -- 4.2 Proposed Methodology for Optimal I-PV Configuration -- 5 Results and Discussion -- 6 Conclusion -- References. Document Classification in Robotic Process Automation Using Artificial Intelligence-A Preliminary Literature Review -- 1 Introduction -- 2 Robotic Process Automation -- 3 Document Classification Process -- 3.1 Conversion of Files with Various Formats to Text and Conversion of PDF Files to a Structured Format -- 3.2 Alternative Approach to Converting PDFs to a Structured Format -- 3.3 Preprocessing of the Inference Process for Classifying Documents -- 3.4 Execution of the Inference Process in the Classification of Documents -- 3.5 Artificial Intelligence Application -- 4 Discussion -- 5 Conclusions -- References -- Artificial Intelligence Optimization Strategies for Invoice Management: A Preliminary Study -- 1 Introduction -- 2 AI Techniques -- 2.1 Computer Vision -- 2.2 Optical Character Recognition -- 2.3 Natural Language Processing -- 2.4 Machine Learning -- 3 Invoice Improvement Strategies -- 3.1 Robotic Process Automation Tools -- 3.2 Recently Researched Optimization Strategies -- 4 Analysis -- 5 Conclusion -- References -- A Comparative Study Between Data-Based Approaches Under Earlier Failure Detection -- 1 Introduction -- 2 Data Set and System Description -- 3 Experimental Results and Discussion -- 4 Conclusion -- References -- Survey Analysis for Medical Image Compression Techniques -- 1 Introduction -- 1.1 Motivation -- 1.2 Existing Solutions -- 1.3 Evaluation and Analysis -- 1.4 Paper Organization -- 2 Lossy Compression for Medical Images -- 2.1 Fractal-Based Compression Technique -- 2.2 Wavelet Transform-Based Compression Technique -- 2.3 Lossy Approaches Based on ROI and Non-ROI -- 2.4 Other Lossy Approaches -- 3 Lossless Compression for Medical Images -- 3.1 Adaptive Block Size-Based Compression Technique -- 3.2 Least Square-Based Compression Technique -- 3.3 Other Lossless Approaches -- 4 Analysis and Evaluation -- 5 Conclusion. References -- Performance Evaluation of SEIG Under Unbalanced Load Operations Using Genetic Algorithm -- 1 Introduction -- 2 Machine Modeling -- 3 Genetic Algorithm as an Optimization Tool -- 4 Performance Equations -- 5 Results and Discussion -- 5.1 Effect on SEIG Under Variation in Load Power Factor of One Phase -- 5.2 Effect on SEIG Under Variation in Load Power Factor of Two Phases -- 6 Conclusion -- References -- Suppliers Selection Using Fuzzy AHP and Fuzzy TOPSIS Method-A Case Study of a Bearing Manufacturing Company -- 1 Introduction -- 2 Methodology: Fuzzy Logic Approach -- 2.1 Fuzzy Set-Theory -- 2.2 Definitions of Fuzzy Sets -- 3 Case Study -- 3.1 Introduction of the Company -- 3.2 Current Supplier Selection Method -- 3.3 Supplier Selection Criteria Description -- 3.4 Solution of Supplier Selection Problem Using FUZZY AHP and FUZZY TOPSIS Method -- 4 Conclusion -- References -- A New Approach to Classify the Boolean Functions Based on Heuristic Technique -- 1 Introduction -- 2 Related Definitions -- 2.1 Boolean Function -- 2.2 Hamming Distance -- 2.3 Walsh-Hadamard Transform -- 2.4 Nonlinearity of Boolean Function (f) -- 3 Our Approach for Classification -- 4 Results and Discussion -- 5 Conclusion -- References -- Influence of Object-Oriented Software Design Measures on Reliability: Fuzzy Inference System Perspective -- 1 Introduction -- 2 Related Work -- 3 Object-Oriented Design Measures -- 3.1 Inheritance Metrics (IMc) -- 3.2 Encapsulation Metric (EM) -- 3.3 Cohesion Metric (CoMc) -- 4 Analysis Phase -- 4.1 Sensitivity Analysis -- 4.2 Design Metrics Analysis -- 5 Conclusion -- References -- Test Case Prioritization Based on Requirement -- 1 Introduction -- 2 Test Case Prioritization -- 3 Proposed Methodology -- 4 Results and Validation -- 5 Conclusion -- References. Mining and Predicting No-Show Medical Appointments: Using Hybrid Sampling Technique. |
Record Nr. | UNINA-9910488716503321 |
Singapore : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Communication and Intelligent Systems : Proceedings of ICCIS 2019 / / edited by Jagdish Chand Bansal, Mukesh Kumar Gupta, Harish Sharma, Basant Agarwal |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (517 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Electrical engineering Wireless communication systems Mobile communication systems Computational Intelligence Artificial Intelligence Communications Engineering, Networks Wireless and Mobile Communication |
ISBN | 981-15-3325-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Extremely High Capacity, Secure, Image Steganography based on composite Edge Detection, with message Integrity -- A Distributed Fault Analysis (DFA) Method for Fault Tolerance in High-Performance Computing Systems -- Software Cost Estimation For Python Projects Using Genetic Algorithm -- Performance Evaluation of Queue with Negative Arrivals, Second Optional Service and Unreliable Server in Communication Networks -- An Empirical Analysis on Retrieval of Math Information from the Scientific Documents -- One shot Digit classification based on Human concept learning -- Appropriateness of Machine Learning Techniques for TCP with MANETs. |
Record Nr. | UNINA-9910484226803321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Congress on intelligent systems . Volume 1 : proceedings of CIS 2020 / / Harish Sharma [and four others] editors |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (789 pages) |
Disciplina | 006.3 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Artificial intelligence
Intel·ligència artificial Internet de les coses Seguretat informàtica Computació en núvol |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 981-336-981-7 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- About the Editors -- Modelling Subjective Happiness with a Survey Poisson Model and XGBoost Using an Economic Security Approach -- 1 Introduction -- 2 Data and Descriptive Statistics -- 3 Methodology -- 3.1 Survey Poisson Model -- 3.2 XGBoost -- 3.3 Missing Data -- 4 Results -- 4.1 Results of the Sensitivity Analysis of Missing Data -- 4.2 Predicted Subjective Happiness -- 4.3 Regression Analysis -- 5 Conclusions -- References -- Monitoring Web-Based Evaluation of Online Reputation in Barcelona -- 1 Introduction -- 2 Methodology Description -- 2.1 Principal Component Analysis -- 2.2 Robust Compositional Regression Model -- 3 Data Description -- 4 Discussion of Results -- 5 Conclusions and Managerial Implications -- Appendix 1: Abbreviation and Corresponding Meaning of Fig. 1 -- Appendix 2: Abbreviation and Corresponding Meaning of Fig. 2 -- References -- Information Technology for the Synthesis of Optimal Spatial Configurations with Visualization of the Decision-Making Process -- 1 Introduction -- 2 Basic Concepts and Definitions -- 3 Configuration Space of Geometric Objects Based on Geometric Information -- 4 Information Technology Model for the Synthesis of Spatial Configurations -- 5 The Software Package Description -- 6 An Example of Implementing the Results -- 7 Conclusion -- References -- Hybrid Approach to Combinatorial and Logic Graph Problems -- 1 Introduction -- 2 The Problem Description -- 3 The Hybrid Approach -- 4 Hybrid Three-Level Algorithm -- 5 Objective Function -- 6 Experiments -- 7 Conclusion -- References -- Energy-Efficient Algorithms Used in Datacenters: A Survey -- 1 Introduction -- 2 Techniques Used in Datacenters to Maintain Energy Efficiency -- 3 Energy Efficiency Metrics Used in Datacenters -- 4 Different Types of Algorithms Used in Datacenters -- 5 Related Work -- 6 Conclusion.
References -- Software Log Anomaly Detection Method Using HTM Algorithm -- 1 Introduction -- 2 Background -- 3 Proposed Method -- 3.1 Log Parser -- 3.2 Method Overview -- 4 Evaluation -- 4.1 Experiment Setting -- 4.2 Input Format -- 4.3 Results -- 5 Conclusion -- References -- Logical Inference in Predicate Calculus with the Definition of Previous Statements -- 1 Introduction -- 2 Definition of the Problem -- 2.1 Meaningful Definition of the Problem -- 2.2 Formal Definition of the Problem -- 3 Basic Processing Procedures -- 3.1 Partial "Disjuncts Division" -- 3.2 Complete "Disjunct Division" -- 4 Procedure of Inference -- 5 Method of Inference -- 6 Conclusion -- References -- Congestion Management Considering Demand Response Programs Using Multi-objective Grasshopper Optimization Algorithm -- 1 Introduction -- 2 Materials and Methods -- 2.1 Demand Response Programs Cost -- 3 Multi-objective Grasshopper Optimization Algorithm -- 4 Results and Discussions -- 5 Conclusion -- Appendix: Parameters of MOGOA -- References -- A Hardware Accelerator Implementation of Multilayer Perceptron -- 1 Introduction -- 2 Literature Review -- 3 FFNN Computation Algorithm -- 4 Hardware Architecture -- 4.1 Neural Processing Element -- 4.2 Activation Function Block (AFB) -- 4.3 Network Control Sequences -- 4.4 Number of Clock Cycles of Execution -- 5 Results and Discussion -- 5.1 Hardware Blocks -- 5.2 Hardware Architecture of 3times3times2 MLP -- 5.3 Resource Utilization and Performance Evaluation -- 6 Application -- 7 Conclusion -- References -- Building a Classifier of Behavior Patterns for Semantic Search Based on Cuckoo Search Meta-heuristics -- 1 Introduction -- 2 Formulation of the Problem -- 3 Method for Building the Classifier of Behavior Pattern -- 4 Bio-inspired Algorithm Based on Cuckoo Search -- 5 Experimental Research -- 6 Conclusion -- References. TETRA Enhancement Based on Adaptive Modulation -- 1 Introduction -- 2 The Proposed TETRA Modules Layers -- 3 The Proposed TETRA System Structure -- 4 Proposal Frame of Adaptive TETRA System -- 5 Simulation and Results -- 6 Conclusion -- References -- Dynamic Stability Enhancement of Grid Connected Wind System Using Grey Wolf Optimization Technique -- 1 Introduction -- 2 Grid Connected Wind Turbine System -- 3 Modeling of SMEs System -- 3.1 Modeling of VSC -- 3.2 Modeling of Chopper -- 4 Grey Wolf Optimization (GWO) Technique -- 5 Control Strategy of Wind System Using GWO -- 6 Simulation Results -- 7 Conclusion -- References -- A Comparative Analysis on Wide-Area Power System Control with Mitigation the Effects of an Imperfect Medium -- 1 Introduction -- 2 Modelling of the Test Power System -- 2.1 Kundur's Two-Area Four-Machine Test System -- 2.2 Selection of Control Location and Wide-Area Remote Signal -- 3 Control Techniques -- 3.1 Conventional PSS (CPSS) -- 3.2 Multi-band-based PSS (MB-PSS4B) -- 3.3 Linear Quadratic Gaussian (LQG) Controller -- 4 Noise in System -- 5 Results and Discussions -- 6 Conclusions -- References -- Adware Attack Detection on IoT Devices Using Deep Logistic Regression SVM (DL-SVM-IoT) -- 1 Introduction -- 2 Related Work -- 3 Theoretical Background -- 3.1 Delineation of IoT Adware Attacks Classification and Identification Using (DL-SVM-IoT) -- 4 Experimental Results and Comparison -- 5 Conclusion and Future Work -- References -- Intrusion Detection System for Securing Computer Networks Using Machine Learning: A Literature Review -- 1 Introduction -- 1.1 Machine Learning for IDS -- 1.2 Types of IDS -- 2 Review Questions -- 3 Papers in Review -- 4 Discussions -- 5 Conclusion -- References -- An Exploration of Entropy Techniques for Envisioning Announcement Period of Open Source Software -- 1 Introduction. 1.1 Information Measures -- 2 Predicting Bugs and Estimating Release Time of Software -- 3 Conclusion -- References -- Occurrence Prediction of Pests and Diseases in Rice of Weather Factors Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Modeling of Data for Testing and Training Purpose -- 3.4 Machine Learning -- 4 Results -- 5 Conclusion -- 6 Future Scope -- References -- A Literature Review on Generative Adversarial Networks with Its Applications in Healthcare -- 1 Introduction -- 2 What are Generative Adversarial Networks or GANs -- 2.1 Generative Model -- 2.2 Discriminative Model -- 3 Applications of GANs or Generative Adversarial Networks in Healthcare -- 3.1 Electronic Health Record -- 3.2 Retinal Image Synthesis -- 3.3 Skin Lesion Analysis -- 3.4 Medical Image Segmentation -- 4 Discussion -- 4.1 Advantages -- 4.2 Disadvantages -- 4.3 Future Scope -- 5 Conclusion -- References -- A Federated Search System for Online Property Listings Based on SIFT Algorithm -- 1 Introduction -- 2 Online Federated Search System -- 2.1 Source Crawling -- 2.2 Collection Creation -- 2.3 User Interface -- 3 Implementing the Property Federated Search System -- 4 Evaluation and Discussions -- 5 Conclusions -- References -- Digital Brain Building a Key to Improve Cognitive Functions by an EEG-Controlled Videogames as Interactive Learning Platform -- 1 Introduction -- 1.1 User State Monitoring -- 1.2 Neurogaming Using NeuroSky -- 1.3 EEG Acquisition -- 1.4 Neuroergonomics Application -- 2 Methodology -- 2.1 Mathematical Model -- 2.2 Neurogame and Educational Concept -- 2.3 Brain Runner -- 2.4 Hybrid BCI -- 2.5 Interactive Session -- 3 Results -- 4 Conclusion -- References -- Intelligent Car Cabin Safety System Through IoT Application -- 1 Introduction -- 2 IoT (Internet of Things). 3 System Description and Principal -- 4 Methodology -- 5 Results and Discussions -- 6 Conclusions -- References -- Utilization of Delmia Software for Saving Cycle Time in Robotics Spot Welding -- 1 Introduction -- 2 Problem Statement -- 3 Evolutionary Approach -- 4 Simulation Experiments -- 5 Conclusion -- References -- Data Protection Techniques Over Multi-cloud Environment-A Review -- 1 Introduction -- 2 Literature Survey -- 3 Comparative Analysis or Research Scope -- 4 Visibility of Comparative Study -- 4.1 Description of Different Cloud Framework Used -- 4.2 Issued Addressed -- 4.3 Benefits -- 5 Identified Gaps in Literature Survey -- 6 Mathematical Model -- 7 Proposed Methodology or Related Work -- 8 Conclusion -- References -- Hierarchical Ontology Based on Word Sense Disambiguation of English to Hindi Language -- 1 Introduction -- 2 Proposed Methodology -- 3 Preprocessing of English/Hindi Questions File and Dictionary -- 3.1 Preprocessing -- 3.2 Dictionary Preprocessing -- 4 Ontology Development Module -- 4.1 Collection of Senses -- 4.2 Calculation of Weight TF -- 4.3 Hierarchical Ontology -- 5 Proposed Hierarchical Ontology Algorithm -- 5.1 Proposed Algorithm -- 6 Experiment and Results -- 7 Conclusion -- References -- Review Paper: Error Detection and Correction Onboard Nanosatellites -- 1 Introduction -- 2 Methodology -- 2.1 Space Radiation -- 2.2 Glitches and Upsets -- 2.3 Geomagnetism -- 2.4 EDAC Schemes -- 2.5 Implementing EDAC Systems -- 3 Discussion -- 4 Conclusion -- References -- Kerala Floods: Twitter Analysis Using Deep Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Cleaning -- 3.3 Data Labeling -- 3.4 Data Division and Separation -- 4 Implementation and Results -- 5 Conclusion -- References -- An Improved DVFS Circuit & -- Error Correction Technique -- 1 Introduction. 2 Charge Pump Circuit. |
Record Nr. | UNINA-9910483511903321 |
Gateway East, Singapore : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Congress on intelligent systems : proceedings of CIS 2020 / / editors, Harish Sharma [and four others] |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (785 pages) |
Disciplina | 006.3 |
Collana | Advances in Intelligent Systems and Computing |
Soggetto topico |
Artificial intelligence
Computational intelligence Automatic control Intel·ligència artificial Internet de les coses Seguretat informàtica |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 981-336-984-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484352603321 |
Gateway East, Singapore : , : Springer, , [2021] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Congress on Smart Computing Technologies : Proceedings of CSCT 2023, Volume 2 |
Autore | Bansal Jagdish Chand |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2025 |
Descrizione fisica | 1 online resource (676 pages) |
Altri autori (Persone) |
SharmaHarish
ChakravortyAntorweep |
Collana | Smart Innovation, Systems and Technologies Series |
ISBN | 9789819780969 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910983491703321 |
Bansal Jagdish Chand
![]() |
||
Singapore : , : Springer, , 2025 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Congress on Smart Computing Technologies : Proceedings of CSCT 2023, Volume 1 |
Autore | Bansal Jagdish Chand |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (525 pages) |
Disciplina | 004 |
Altri autori (Persone) |
SharmaHarish
ChakravortyAntorweep |
Collana | Smart Innovation, Systems and Technologies Series |
ISBN | 981-9750-81-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910903794803321 |
Bansal Jagdish Chand
![]() |
||
Singapore : , : Springer, , 2024 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|