top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Computing and Intelligent Systems : Proceedings of ICACM 2019 / / edited by Harish Sharma, Kannan Govindan, Ramesh C. Poonia, Sandeep Kumar, Wael M. El-Medany
Advances in Computing and Intelligent Systems : Proceedings of ICACM 2019 / / edited by Harish Sharma, Kannan Govindan, Ramesh C. Poonia, Sandeep Kumar, Wael M. El-Medany
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (xiv, 637 pages) : illustrations
Disciplina 006.3
Collana Algorithms for Intelligent Systems
Soggetto topico Computational intelligence
Artificial intelligence
Algorithms
Pattern recognition
Computational Intelligence
Artificial Intelligence
Algorithm Analysis and Problem Complexity
Pattern Recognition
ISBN 981-15-0222-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Intuitionistic Fuzzy Shannon Entropy Weight Based Multi Criteria Decision Model with TOPSIS to Analyse Security Risks and Select Online Transaction Method -- Chapter 2. Fermat Spiral Based Moth-Flame Optimization Algorithm for Object-Oriented Testing -- Chapter 3. A Comparative Study of Information Retrieval Using Machine Learning -- Chapter 4. Adaptive Background Subtraction Using Manual Approach for Static Images -- Chapter 5. Tweets Daily: Categorised News from Twitter -- Chapter 6. Compressing Meta Class Files through String Optimization -- Chapter 7. An Algorithm to Generate Largest Prime Number -- Chapter 8. Development of a Discretization Methodology for 2.5D Milling Toolpath optimization Using Genetic Algorithm -- Chapter 9. Machine Learning Based Prediction of PM 2.5 Pollution Level in Delhi -- Chapter 10. A Comparative Study of Load Balancing Algorithms in a Cloud Environment -- Chapter 11. Information Retrieval from Search Engine Using Particle Swarm Optimization -- Chapter 12. Genetic Algorithm Based Multi Objective Optimization Framework to Solve Travelling Salesman Problem -- Chapter 13. Design of Optimal PID Controller for Varied System Using Teaching-Learning-Based Optimization -- Chapter 14. Innovative Review on Artificial Bee Colony Algorithm and it’s Variants -- Chapter 15. Multi Linear Regression Model to Predict Correlation between IT Graduate Attributes for Employability using R. .
Record Nr. UNINA-9910484185503321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence: Theory and Applications : Proceedings of AITA 2023, Volume 2 / / edited by Harish Sharma, Antorweep Chakravorty, Shahid Hussain, Rajani Kumari
Artificial Intelligence: Theory and Applications : Proceedings of AITA 2023, Volume 2 / / edited by Harish Sharma, Antorweep Chakravorty, Shahid Hussain, Rajani Kumari
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (531 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Big data
Computational Intelligence
Artificial Intelligence
Big Data
ISBN 981-9984-79-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Spam Email Image Detection Using Convolution Neural Network and Convolutional Block Attention Module -- 1 Introduction -- 2 Related Works -- 3 Convolution Neural Network -- 4 Convolutional Block Attention Model -- 5 Experimental Result -- 5.1 Dataset -- 5.2 Evaluation Metrics -- 5.3 Discussion -- 6 Conclusion -- References -- Identifying Fake Twitter Trends with Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 PolitiFact Dataset -- 2.2 PHEME Dataset -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Modeling -- 3.4 Experiments -- 4 Results and Analysis -- 5 Conclusion and Future Work -- References -- An Intelligent Agent Framework for Resilient Deployment in the Internet of Things Environment -- 1 Introduction -- 2 Intelligent Agent Framework -- 3 Proposed Deployment Algorithm -- 4 Results and Discussion -- 5 Conclusions -- References -- The Impact of Financial Ratios and Pandemic on Firm Performance: An Indian Economic Study -- 1 Introduction -- 2 Literature Review and Hypotheses Development -- 2.1 Debt and Firm Performance -- 2.2 Working Capital and Firm Performance -- 2.3 Financial Autonomy and Firm Performance -- 2.4 Quick Ratio and Firm Performance -- 3 Sample -- 4 Research Methodology -- 5 Results -- 5.1 Trend Analysis -- 5.2 Regression Results -- 6 Conclusion -- References -- An Enhanced BERT Model for Depression Detection on Social Media Posts -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Enhanced BERT Classical -- 4 Results and Discussion -- 4.1 Dataset -- 4.2 Comparison with the Existing System -- 5 Conclusion -- References -- Quality Prediction of a Stack Overflow Question Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Techniques -- 3.1 Naïve Bayes (NB) -- 3.2 Support Vector Classifier (SVC).
3.3 Decision Tree (DT) -- 3.4 Logistic Regression (LR) -- 3.5 K-Nearest Neighbors (KNN) -- 3.6 Random Forest (RF) -- 3.7 Natural Language Processing (NLP) -- 3.8 Bag of Words (BoW) -- 3.9 Word Cloud Analysis -- 4 Proposed Methodology and Implementation -- 4.1 Importing Libraries -- 4.2 Description of Dataset -- 4.3 Cleaning Textual Data -- 4.4 Tokenization, Lemmatization, and PoS Tagging -- 4.5 Lexicon-Based Sentiment Analysis -- 4.6 Word Embedding -- 4.7 Splitting the Dataset -- 4.8 Model Building and Performance Evaluation -- 5 Experimental Results and Analysis -- 6 Conclusion -- References -- Decision-Making Framework for Supplier Selection Using an Integrated Approach of Dempster-Shafer Theory and Maximum Entropy Principle -- 1 Introduction -- 2 Preliminaries -- 2.1 Dempster-Shafer Evidence Theory -- 2.2 Cobb-Douglas Utility Function -- 2.3 Maximum Entropy Method -- 3 Proposed Methodology -- 3.1 Evaluate Criteria Weights -- 3.2 Evaluate Alternative Ranking -- 4 Numerical Example -- 4.1 Problem Description -- 4.2 Evaluation of Criteria Weights -- 4.3 Ranking of Alternatives -- 5 Comparative Analysis and Discussions -- 5.1 Comparative Analysis of Weight Determination Method -- 5.2 Comparative Analysis of Ranking Method -- 6 Sensitivity Analysis -- 7 Conclusions -- References -- Improved Accuracy of Robotic Arm Using Virtual Environment -- 1 Introduction -- 2 Literature Review and Related Work -- 3 Proposed Method, Tools, and Techniques Used -- 3.1 Forward Kinematics -- 3.2 Inverse Kinematics -- 3.3 Technique -- 4 Methodology -- 4.1 Design of the Robotic Arm -- 4.2 Addition of Revolute Joints -- 4.3 Importing the Model to MATLAB -- 4.4 Defining the Robot Environment -- 4.5 Defining the Desired Trajectory -- 4.6 Working of Inverse Kinematic Block -- 4.7 Working of Forward Kinematic Block -- 4.8 Data Collection and Analysis -- 5 Result -- 6 Conclusion.
References -- Human Activity Recognition a Comparison Between Residual Neural Network and Recurrent Neural Network -- 1 Introduction -- 2 HAR Using ResNet50 -- 3 HAR Using RNN -- 4 Conclusion -- References -- Using AI Planning to Automate Cloud Infrastructure -- 1 Introduction -- 2 Related Work -- 2.1 Cloud Infrastructure -- 2.2 Prototype Model -- 3 Problem Formulation -- 4 Proposed Solution -- 5 Testing and Result Evaluations -- 5.1 Test Case 1: Empty Environment -- 5.2 Test Case 2: No Application Module -- 5.3 Test Case 3: Neither the Database nor the Application Module -- 5.4 Test Case 4: Inconsistent Database -- 5.5 Test Case 5: Application Module in Unhealthy Status -- 5.6 Test Case 6: Application Out of Capacity -- 6 Conclusions and Future Scope -- References -- Using Historical Trip Information to Determine the Waiting Time Required for Taxi Services -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Proposed Solution: Design and Implementation -- 5 Results' Evaluation -- 6 Conclusions and Future Scope -- References -- The Impact of Cesarean Section Trends and Associated Complications in the Current World: A Comprehensive Analysis Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Decision Tree (DT) -- 3.2 Random Forest (RF) -- 3.3 K-Nearest Neighbour (KNN) -- 3.4 Support Vector Machine (SVM) -- 3.5 AdaBoost (AB) -- 4 Results -- 4.1 Decision Tree -- 4.2 Random Forest -- 4.3 K-Nearest Neighbour -- 4.4 Support Vector Machine -- 4.5 AdaBoost -- 5 Conclusion -- References -- Novel Hybrid Methods for Journal Article Summarization Combining Graph Method and Rough Set TFIDF Method with Pegasus Model -- 1 Introduction -- 2 Related Works and Summarization Datasets -- 3 Motivation and Challenges in Article Summarization -- 4 Methodology -- 4.1 Extractive Summarization Methods.
4.2 Abstractive Summarization Methods -- 4.3 Hybrid Summarization Methods -- 5 Results and Discussion -- 5.1 Rouge Score for Word Overlap over Annotated Summary -- 5.2 BERT Score for Similarity Score -- 6 Conclusion and Future Scope -- References -- Differential Evolution Wrapper-Based Feature Selection Method for Stroke Prediction -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Dataset -- 3.2 Proposed System -- 4 Result Analysis -- 5 Discussion -- 6 Conclusion -- References -- Parkinson's Disease Identification from Speech Signals Using Machine Learning Models -- 1 Introduction -- 2 Literature Review -- 2.1 Machine Learning and Neural Network Techniques for PD Classification -- 2.2 Hybrid Models with Machine Learning Techniques and Neural Network -- 3 System Architecture -- 3.1 Dataset Details -- 3.2 Proposed Approach -- 4 Results and Discussions -- 4.1 Performance Matrices -- 4.2 Experimental Analysis -- 5 Conclusion -- References -- Performance Analysis of Deep CNN, YOLO, and LeNet for Handwritten Digit Classification -- 1 Introduction -- 2 Literature Review -- 3 Objective, Motivation and Challenges -- 4 Methodology -- 4.1 Dataset Description -- 5 Implementation -- 5.1 Convolution Neural Network -- 5.2 Convolutional Layer -- 5.3 Pooling Layer -- 5.4 Fully Connected Layer -- 5.5 Creating a CNN Model -- 5.6 You Only Look Once (YOLO) -- 5.7 LeNet -- 6 Result and Discussion -- 7 Conclusions -- References -- Data-Driven Decision Support Systems in E-Governance: Leveraging AI for Policymaking -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Research Objectives -- 3.2 Research Methodology -- 3.3 Proposed Contributions -- 4 Experimental Results -- 4.1 Accuracy -- 4.2 Precision -- 4.3 Recall (Sensitivity) -- 4.4 F1 Score -- 4.5 Mean Absolute Error (MAE) -- 4.6 Root Mean Square Error (RMSE) -- 5 Conclusions.
References -- The Infrastructure Development of Contemporary Medical Devices Based on Internet of Things Technology -- 1 Introduction -- 2 IoT Infrastructure in Health Care -- 3 IoT Wireless Standards -- 4 IoT Network Architecture -- 4.1 Availability -- 4.2 Scalability -- 4.3 Network Performance -- 4.4 Manageability -- 4.5 Affordability -- 4.6 Adaptability -- 4.7 Usability -- 5 Cloud Computing in IoT -- 6 Contemporary Applications of IoT -- 6.1 Smart IoT Sensors -- 6.2 Smart Pill Containers -- 6.3 Smart Hospital Beds -- 6.4 Temperature Sensors -- 6.5 Wearable Devices -- 6.6 Future of IoT Medical Instruments -- 7 Conclusions -- References -- Business Intelligence System Adoption Project in the Area of Investments in Financial Assets -- 1 Introduction -- 2 Understanding the Significance and Functionality of Business Intelligence Systems -- 3 Review of Business Intelligence Literature -- 4 Traditional Information Systems on Investments in Financial Assets -- 5 Business Intelligence for Investments in Financial Assets-The Case of an IT Industry Organization -- 5.1 Preliminary Information -- 5.2 Original Business Intelligence System Employed in the Organization -- 6 Conclusions -- References -- Feature Selection Techniques to Enhance Prediction of Clinical Appointment No-Shows Using Neural Network -- 1 Introduction -- 2 Related Studies -- 3 Model Development -- 4 Analysis of Performance Measures -- 5 Conclusion -- References -- A Simple Recommendation Model Using the Item's Global Popularity and Frequency-Based User Preference -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Formalizations -- 3.2 Model -- 4 Experimental Results -- 5 Conclusion -- References -- An Early Detection of Autism Spectrum Disorder Using PDNN and ABIDE I& -- II Dataset -- 1 Introduction.
2 The Next Step in Comprehending the Brain and Psychiatric Diseases is Machine Learning, Deep Learning, and Predicting Disease States.
Record Nr. UNINA-9910799221503321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Artificial Intelligence: Theory and Applications : Proceedings of AITA 2023, Volume 1 / / edited by Harish Sharma, Antorweep Chakravorty, Shahid Hussain, Rajani Kumari
Artificial Intelligence: Theory and Applications : Proceedings of AITA 2023, Volume 1 / / edited by Harish Sharma, Antorweep Chakravorty, Shahid Hussain, Rajani Kumari
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (495 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Big data
Computational Intelligence
Artificial Intelligence
Big Data
ISBN 981-9984-76-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Control Techniques for Vision-Based Autonomous Vehicles for Agricultural Applications: A Meta-analytic Review -- 1 Introduction -- 2 State-of-The Art Studies -- 2.1 Target Detection in Autonomous Vehicle System -- 2.2 Vision-Based System -- 3 Mathematical Modeling of Autonomous System -- 4 Conclusion -- References -- Co-GA: A Bio-inspired Semi-supervised Framework for Fake News Detection on Scarcely Labeled Data -- 1 Introduction -- 2 Related Work -- 2.1 Supervised Fake News Detection Using Linguistic Content -- 2.2 Semi-supervised Fake News Detection Using Linguistic Content -- 2.3 Metaheuristics-Based Approaches for Feature Selection -- 2.4 Metaheuristics-Based Fake News Detection -- 3 Data -- 4 Proposed Methodology -- 4.1 Pre-processing -- 4.2 Feature Extraction -- 4.3 Bio-inspired Feature Selection -- 4.4 Multi-view Co-training Model -- 5 Results and Analysis -- 6 Future Research Directions -- 7 Conclusion -- References -- Kernel Methods for Conformal Prediction to Detect Botnets -- 1 Introduction -- 2 Related Works -- 2.1 Signature-Based and Heuristic-Based Botnet Detection -- 2.2 Machine Learning for Botnet Detection -- 2.3 Kernel Methods -- 2.4 Conformal Prediction -- 2.5 Deep Learning and Graph-Based Approaches -- 2.6 Challenges and Limitations -- 2.7 Motivation for the Proposed Approach -- 2.8 Emerging Trends and Research Directions -- 3 Methodology -- 3.1 Kernel Methods -- 3.2 Conformal Prediction -- 3.3 Proposed Approach: Kernel Methods for Conformal Prediction -- 3.4 Evaluation Metrics -- 3.5 Experimental Setup -- 4 Results -- 4.1 Dataset Description -- 4.2 Experimental Setup -- 4.3 Experimental Results -- 4.4 Analysis of Results -- 5 Conclusion -- References -- Biogas Generation from Animal Waste: A Case Study of Village Wazirpur -- 1 Introduction.
2 Biogas Production from Animal Waste -- 2.1 Factors Affecting Biogas Production -- 2.2 Sensors for Determining the Parameters Affecting Biogas Production -- 3 Area Under Study -- 4 Cost Analysis and Electricity Production -- 5 Conclusion -- References -- Volume of Imbalance Container Prediction using Kalman Filter and Long Short-Term Memory -- 1 Introduction -- 2 Problem Statement -- 3 Research Questions -- 4 KALSTM: A Hybrid Model -- 5 Results and Limitations -- 6 Conclusion -- References -- Modelling Stock Prices Prediction with Long Short-Term Memory (LSTM): A Black Box Approach -- 1 Introduction -- 2 Methodology Based on LSTM -- 3 Description of Datasets -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Agricultural Crop Yield Prediction for Indian Farmers Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset -- 3.2 Methodology -- 4 Architecture -- 5 Result Analysis -- 6 Conclusion -- References -- Application of Artificial Intelligence on Camera-Based Human Pose Prediction for Yoga: A Methodological Study -- 1 Introduction -- 1.1 Scope -- 1.2 Challenges -- 1.3 Impact of Yoga [1] -- 2 Literature Review -- 3 Methodology -- 3.1 Research Process -- 3.2 Key Point Detection Methods -- 3.3 Implementation Methodology [12, 13] -- 4 Datasets and Metrics -- 5 Results -- 6 Conclusion -- 7 Future Potential Development -- References -- Predicting of Credit Risk Using Machine Learning Algorithms -- 1 Introduction -- 2 Review of Literature -- 2.1 Machine Learning Algorithms -- 2.2 Development of Credit Risk Model -- 3 Data and Methodology -- 3.1 Data -- 3.2 Variables -- 3.3 Machine Learning Models and Evaluation Parameters -- 3.4 Evaluation Parameters -- 3.5 Methodology -- 4 Empirical Findings -- 5 Conclusions and Implications -- References -- Study of Various Text Summarization Methods.
1 Introduction -- 2 Literature Review -- 3 Overview of Proposed Model -- 3.1 Proposed Methodology -- 3.2 Design of Model Architecture -- 3.3 Model Evaluation -- 4 Results -- 5 Conclusion -- References -- Investigations on Deep Learning Pre-trained Model VGG-19 Using Transfer Learning for Remote Sensing Image Classification on Benchmark Datasets -- 1 Introduction -- 2 Literature Review -- 3 Comparison of Performance Metrics of Machine Learning Methods on the PatterNet Dataset -- 4 Utilizing Pre-trained Models for Transfer Learning -- 5 Transfer Learning with Pre-trained Models Based on the Baseline ImageNet Dataset -- 6 Overview of VGG-19 -- 7 Enabling Efficient Feature Reuse and Information Flow in Deep Neural Networks for Superior Performance -- 8 Deep Learning Surpassing Traditional Machine Learning Techniques -- 9 Setting Up Experiments: Feature Extraction and Classification for Remote Sensing Images with a Pre-trained VGG-19 Model -- 9.1 Dataset Description -- 9.2 Assessment Metrics Utilized for Model Evaluation in Image Classification and Retrieval -- 9.3 Research Findings: Investigating Test Accuracy and Test Loss Scores on Benchmark Datasets Using VGG-19 Pre-trained Model -- 10 Summarizing the Feature Extraction with Transfer Learning Approach in Deep Learning -- References -- Complexity Analysis of Legal Documents -- 1 Introduction -- 2 Related Works -- 2.1 NER for Indian Legal Documents -- 2.2 Information Extraction -- 2.3 Summarising in Legal Domain -- 2.4 Complexity of Legal Documents -- 3 Methodology -- 3.1 Proposed Model -- 3.2 Analysis of Complexity -- 4 Result Analysis -- 5 Conclusion and Future Works -- References -- Predicting Virality of Tweets Using ML Algorithms and Analyzing Key Determinants of Viral Tweets -- 1 Introduction -- 2 Theoretical Background and Related Work -- 3 Methodology -- 4 Results and Discussion.
5 Conclusion, Limitations, and Future Scope -- References -- Review of Classification and Detection for Insects/Pests Using Machine Learning and Deep Learning Approach -- 1 Introduction -- 1.1 Pictorial Representation of Classification and Detection of Pests and Comparison Between ML and DL -- 2 Material -- 2.1 Dataset Collection -- 3 Literature Work -- 3.1 Review of Different Machine Learning and Deep Learning Techniques for the Classification of Pests -- 4 Conclusion -- References -- Sentiment Analysis of Product Reviews Using Deep Learning and Transformer Models: A Comparative Study -- 1 Introduction -- 2 Literature Review -- 3 Sentiment Analysis -- 3.1 Sentiment Analysis Based on Machine Learning -- 3.2 Sentiment Analysis Based on Deep Learning -- 3.3 Sentiment Analysis Based on Transformer-Based Models -- 4 Implementation -- 4.1 Dataset -- 4.2 Data Pre-processing -- 4.3 Classification Models -- 5 Results and Discussions -- 5.1 Hyper Parameters Used -- 5.2 Performance Evaluation -- 6 Conclusion -- References -- Effect of Variation in Pause Times Over MANET Routing Protocols -- 1 Introduction -- 2 MANET Routing Protocols and Literature Review -- 3 Environment Setup -- 4 Performance Metrics -- 5 Conclusions and Future Scope -- References -- DDCMR2: A Deep Detection and Classification Model with Resizing and Rescaling for Plant Disease -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology and Implementation -- 3.1 Data Collection -- 3.2 Data Cleaning, Preprocessing, and Visualization -- 3.3 Cache, Shuffle, and Prefetch -- 3.4 Model Building -- 3.5 Hyperparameters Choice -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- References -- Leveraging Natural Language Queries for Effective Video Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology and Models -- 3.1 Uni-Modal Encoder -- 3.2 Cross-Modal Encoder.
3.3 Query Generator -- 3.4 Query Decoder -- 4 Experimental Analysis and Outcomes -- 5 Conclusion -- References -- An Experimental Study to Perform Bioinformatics Based on Heart Disease Case Study Using Supervised Machine Learning -- 1 Introduction -- 2 Preliminaries -- 2.1 Machine Learning -- 2.2 Logistic Regression -- 2.3 Decision Tree -- 2.4 Support Vector Machine -- 3 Experimentation -- 3.1 Data Provenance -- 3.2 Flow Diagram of This Study -- 3.3 Correlation Matrix -- 3.4 Logistic Regression -- 3.5 Support Vector Machine (SVM) -- 3.6 Decision Tree -- 4 Results and Analysis -- 5 Conclusion -- References -- Empirical Analysis of Denoising Algorithms for CCTV Face Images -- 1 Introduction -- 2 Related Work -- 3 BM3D (Block-Matching and 3D Filtering) -- 3.1 Collaborative Filtering: It Takes Four Steps -- 3.2 Aggregation -- 3.3 Wiener Filtering Step -- 4 KSVD (k-Singular Value Decomposition) -- 5 WNNM (Weighted Nuclear Norm Minimization) -- 6 Results and Discussion -- 7 Conclusion -- References -- Content-Based Tagging and Recommendation System for Tamil Songs Based on Text and Audio Input -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Music Segmentation -- 3.2 Instrument Recognition -- 3.3 Lyric Collection and Translation -- 3.4 Lyric Tagging -- 3.5 Audio Prompt -- 3.6 Similarity-Based Retrieval -- 4 Datasets -- 4.1 MUSDB18 Dataset -- 4.2 Tamil Songs -- 4.3 AudioSet -- 5 Outcomes -- 5.1 Metrics for Evaluation -- 5.2 Summary of Metrics -- 6 Conclusions and Future Work -- References -- Multimodal Face and Ear Recognition Using Feature Level and Score Level Fusion Approach -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Preprocessing -- 3.2 Feature Extraction (BSIF) -- 3.3 Feature Level Fusion -- 3.4 Score Level Fusion -- 4 Experimental Results and Discussion -- 4.1 GTAV Dataset.
4.2 FEI Face Database.
Record Nr. UNINA-9910841868303321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication and Intelligent Systems : Proceedings of ICCIS 2021 / / edited by Harish Sharma, Vivek Shrivastava, Kusum Kumari Bharti, Lipo Wang
Communication and Intelligent Systems : Proceedings of ICCIS 2021 / / edited by Harish Sharma, Vivek Shrivastava, Kusum Kumari Bharti, Lipo Wang
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022
Descrizione fisica 1 online resource (1212 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Image processing - Digital techniques
Computer vision
Machine learning
Computational Intelligence
Artificial Intelligence
Computer Imaging, Vision, Pattern Recognition and Graphics
Machine Learning
ISBN 981-19-2130-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Design of Frequency Encoded Dibit-Based Inhibitor Logic Using Reflective Semiconductor Optical Amplifier with Simulative Verification -- Ocean Surface Pollution Detection: Applicability Analysis of V-Net with Data Augmentation for Oil Spill and Other Related Ocean Surface Feature Monitoring -- Simulation and Investigations of I-shaped Patch Antenna with Induced SIW and Slit for S and C Bands Radar Applications -- Road Network Extraction from Satellite Images Using Deep Learning -- An Evolutionary Online Motion Planning of Car-Like Mobile Robots with Velocity Obstacles.
Record Nr. UNINA-9910588599003321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2022
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication and intelligent systems : proceedings of ICCIS 2020 / / Harish Sharma [and three others] editors
Communication and intelligent systems : proceedings of ICCIS 2020 / / Harish Sharma [and three others] editors
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (1036 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Artificial intelligence
Machine learning
Telecommunication systems
ISBN 981-16-1089-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Neural Network Imitation Model of Realization of the Business Analysis Process -- 1 Introduction -- 2 Analysis of Recent Research and Publications -- 3 Setting the Objective -- 4 The Case Study -- 5 Research Method -- 6 Conclusions -- References -- Thermal Modeling of the GaN HEMT Device Using Decision Tree Machine Learning Technique -- 1 Introduction -- 2 Experimental Setup -- 3 Device Modeling Using Machine Learning -- 4 Results -- 5 Conclusion -- References -- Low-Cost FPGA-Based On-board Computer -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Results and Simulations -- 5 Conclusion -- References -- A Survey on Solution of Imbalanced Data Classification Problem Using SMOTE and Extreme Learning Machine -- 1 Introduction -- 2 Imbalanced Data -- 2.1 Approaches to Overcome Class Imbalance -- 2.2 Advantages and Disadvantages of the Approaches -- 3 Synthetic Minority Over-sampling Technique -- 4 Extreme Learning Machine (ELM) -- 4.1 Variants of ELM -- 5 Machine Learning -- 5.1 ML Techniques -- 6 Convolutional Neural Network (CNN) -- 7 Related Work -- 8 Conclusion -- References -- Thermal Imaging-Assisted Infection Classification (BoF) for Brinjal Crop -- 1 Introduction -- 2 Motivation -- 3 Material and Methods -- 3.1 Experimental Setup -- 3.2 Proposed Methodology -- 3.3 Classification: BoF -- 4 Result and Discussion -- 5 Conclusion -- References -- Preterm Delivery Prediction Using Gradient Boosting Algorithms -- 1 Introduction -- 2 Related Work -- 3 Backgrounds -- 4 Result and Discussion -- 5 Conclusions -- References -- Analysis Urban Traffic Vehicle Routing Based on Dijkstra Algorithm Optimization -- 1 Introduction -- 2 Related Work -- 2.1 Dijkstra Algorithm -- 2.2 Algorithm Optimization -- 3 Model Construction -- 4 Results and Discussion -- 5 Conclusion -- References.
A Comprehensive Overview of Quality Enhancement Approach-Based Biometric Fusion System Using Artificial Intelligence Techniques -- 1 Introduction -- 2 Background Survey -- 3 Biometric Quality Enhancement -- 4 Analysis of Existing Work -- 5 Conclusion and Future Work -- References -- Rainfall Prediction Using Deep Neural Network -- 1 Introduction -- 2 Methodology -- 3 Data and Data Pre-processing -- 3.1 Data Set -- 3.2 Data Pre-processing -- 3.3 Data Insight -- 3.4 Train-Test Split -- 3.5 Feature Scaling -- 4 Deep Neural Network Model -- 5 Result and Conclusion -- 5.1 Weights and Bias -- 5.2 Training and Validation: Loss and Accuracy -- 5.3 Test Loss and Test Accuracy -- 5.4 Comparative Analysis -- 6 Conclusion -- References -- A Comparative Analysis of Supervised Word Sense Disambiguation in Information Retrieval -- 1 Introduction -- 2 WSD Approaches -- 3 Supervised WSD for IR -- 3.1 Naïve Bayes Algorithm -- 3.2 Support Vector Machine (SVM) Algorithm -- 3.3 Decision Tree Algorithm -- 3.4 K-Nearest Neighbor (KNN) Algorithm -- 4 Comparison of Algorithms -- 5 Discussion -- 6 Conclusion -- References -- Real-Time Deep Learning Face Mask Detection Model During COVID-19 -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Algorithm -- 3.2 Dataset -- 4 Implementation -- 5 Conclusion -- References -- Prediction of California Bearing Ratio of Subgrade Soils Using Artificial Neural Network Principles -- 1 Introduction -- 2 Materials -- 2.1 Particle Sizes -- 2.2 Plasticity Characteristics -- 2.3 Compaction Characteristics -- 2.4 California Bearing Ratio (CBR) -- 3 Artificial Neuron Network -- 4 Results and Discussion -- 5 Conclusions -- References -- Real-Time Bangladeshi Currency Recognition Using Faster R-CNN Approach for Visually Impaired People -- 1 Introduction -- 2 Related Works -- 3 System Design -- 4 Dataset Developing and Training.
5 Currency Recognition via Faster R-CNN -- 6 Results and Discussions -- 7 Conclusions -- References -- Bearing Fault Detection Using Comparative Analysis of Random Forest, ANN, and Autoencoder Methods -- 1 Introduction -- 2 Related Work -- 3 Algorithms -- 3.1 Random Forest Classification -- 3.2 Artificial Neural Network -- 3.3 Autoencoder -- 4 Proposed Methodology -- 4.1 Dataset Description -- 4.2 Methodology -- 5 Results and Discussion -- 5.1 Random Forest Classification -- 5.2 Artificial Neural Network -- 5.3 Autoencoder -- 5.4 Comparing the Various Models -- 6 Conclusion -- References -- Selection of a Mesh Network Routing Protocol for Underground Mines -- 1 Introduction -- 2 Literature Review -- 2.1 Current Networking Methods Used in Mines -- 2.2 Similar Work on Selecting WMN Routing Protocols for Underground Mines -- 2.3 Wireless Mesh Network Routing Protocols -- 3 Setup and Procedure -- 3.1 Setup -- 3.2 Procedure -- 3.3 Equipment and Software -- 3.4 Requirements -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- An Energy-Efficient Communication Scheme for Multi-robot Coordination Deployed for Search and Rescue Operations -- 1 Introduction -- 2 Related Works -- 3 Proposed System -- 3.1 Publisher Robots -- 3.2 Subscriber Robots -- 3.3 Coordinator Robot -- 4 Implementation -- 5 Results and Discussion -- 6 Conclusion -- References -- Butterfly Optimization Algorithm-Based Optimal Sizing and Integration of Photovoltaic System in Multi-lateral Distribution Network for Interoperability -- 1 Introduction -- 2 Literature Review -- 3 Problem Formulation -- 4 Overview of Butterfly Optimization Algorithm -- 4.1 Modelling of Food Foraging Behaviour of Butterflies -- 4.2 Proposed Methodology for Optimal I-PV Configuration -- 5 Results and Discussion -- 6 Conclusion -- References.
Document Classification in Robotic Process Automation Using Artificial Intelligence-A Preliminary Literature Review -- 1 Introduction -- 2 Robotic Process Automation -- 3 Document Classification Process -- 3.1 Conversion of Files with Various Formats to Text and Conversion of PDF Files to a Structured Format -- 3.2 Alternative Approach to Converting PDFs to a Structured Format -- 3.3 Preprocessing of the Inference Process for Classifying Documents -- 3.4 Execution of the Inference Process in the Classification of Documents -- 3.5 Artificial Intelligence Application -- 4 Discussion -- 5 Conclusions -- References -- Artificial Intelligence Optimization Strategies for Invoice Management: A Preliminary Study -- 1 Introduction -- 2 AI Techniques -- 2.1 Computer Vision -- 2.2 Optical Character Recognition -- 2.3 Natural Language Processing -- 2.4 Machine Learning -- 3 Invoice Improvement Strategies -- 3.1 Robotic Process Automation Tools -- 3.2 Recently Researched Optimization Strategies -- 4 Analysis -- 5 Conclusion -- References -- A Comparative Study Between Data-Based Approaches Under Earlier Failure Detection -- 1 Introduction -- 2 Data Set and System Description -- 3 Experimental Results and Discussion -- 4 Conclusion -- References -- Survey Analysis for Medical Image Compression Techniques -- 1 Introduction -- 1.1 Motivation -- 1.2 Existing Solutions -- 1.3 Evaluation and Analysis -- 1.4 Paper Organization -- 2 Lossy Compression for Medical Images -- 2.1 Fractal-Based Compression Technique -- 2.2 Wavelet Transform-Based Compression Technique -- 2.3 Lossy Approaches Based on ROI and Non-ROI -- 2.4 Other Lossy Approaches -- 3 Lossless Compression for Medical Images -- 3.1 Adaptive Block Size-Based Compression Technique -- 3.2 Least Square-Based Compression Technique -- 3.3 Other Lossless Approaches -- 4 Analysis and Evaluation -- 5 Conclusion.
References -- Performance Evaluation of SEIG Under Unbalanced Load Operations Using Genetic Algorithm -- 1 Introduction -- 2 Machine Modeling -- 3 Genetic Algorithm as an Optimization Tool -- 4 Performance Equations -- 5 Results and Discussion -- 5.1 Effect on SEIG Under Variation in Load Power Factor of One Phase -- 5.2 Effect on SEIG Under Variation in Load Power Factor of Two Phases -- 6 Conclusion -- References -- Suppliers Selection Using Fuzzy AHP and Fuzzy TOPSIS Method-A Case Study of a Bearing Manufacturing Company -- 1 Introduction -- 2 Methodology: Fuzzy Logic Approach -- 2.1 Fuzzy Set-Theory -- 2.2 Definitions of Fuzzy Sets -- 3 Case Study -- 3.1 Introduction of the Company -- 3.2 Current Supplier Selection Method -- 3.3 Supplier Selection Criteria Description -- 3.4 Solution of Supplier Selection Problem Using FUZZY AHP and FUZZY TOPSIS Method -- 4 Conclusion -- References -- A New Approach to Classify the Boolean Functions Based on Heuristic Technique -- 1 Introduction -- 2 Related Definitions -- 2.1 Boolean Function -- 2.2 Hamming Distance -- 2.3 Walsh-Hadamard Transform -- 2.4 Nonlinearity of Boolean Function (f) -- 3 Our Approach for Classification -- 4 Results and Discussion -- 5 Conclusion -- References -- Influence of Object-Oriented Software Design Measures on Reliability: Fuzzy Inference System Perspective -- 1 Introduction -- 2 Related Work -- 3 Object-Oriented Design Measures -- 3.1 Inheritance Metrics (IMc) -- 3.2 Encapsulation Metric (EM) -- 3.3 Cohesion Metric (CoMc) -- 4 Analysis Phase -- 4.1 Sensitivity Analysis -- 4.2 Design Metrics Analysis -- 5 Conclusion -- References -- Test Case Prioritization Based on Requirement -- 1 Introduction -- 2 Test Case Prioritization -- 3 Proposed Methodology -- 4 Results and Validation -- 5 Conclusion -- References.
Mining and Predicting No-Show Medical Appointments: Using Hybrid Sampling Technique.
Record Nr. UNINA-9910488716503321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication and Intelligent Systems : Proceedings of ICCIS 2019 / / edited by Jagdish Chand Bansal, Mukesh Kumar Gupta, Harish Sharma, Basant Agarwal
Communication and Intelligent Systems : Proceedings of ICCIS 2019 / / edited by Jagdish Chand Bansal, Mukesh Kumar Gupta, Harish Sharma, Basant Agarwal
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (517 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Electrical engineering
Wireless communication systems
Mobile communication systems
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Wireless and Mobile Communication
ISBN 981-15-3325-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Extremely High Capacity, Secure, Image Steganography based on composite Edge Detection, with message Integrity -- A Distributed Fault Analysis (DFA) Method for Fault Tolerance in High-Performance Computing Systems -- Software Cost Estimation For Python Projects Using Genetic Algorithm -- Performance Evaluation of Queue with Negative Arrivals, Second Optional Service and Unreliable Server in Communication Networks -- An Empirical Analysis on Retrieval of Math Information from the Scientific Documents -- One shot Digit classification based on Human concept learning -- Appropriateness of Machine Learning Techniques for TCP with MANETs.
Record Nr. UNINA-9910484226803321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Congress on intelligent systems . Volume 1 : proceedings of CIS 2020 / / Harish Sharma [and four others] editors
Congress on intelligent systems . Volume 1 : proceedings of CIS 2020 / / Harish Sharma [and four others] editors
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (789 pages)
Disciplina 006.3
Collana Advances in Intelligent Systems and Computing
Soggetto topico Artificial intelligence
Intel·ligència artificial
Internet de les coses
Seguretat informàtica
Computació en núvol
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-336-981-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- About the Editors -- Modelling Subjective Happiness with a Survey Poisson Model and XGBoost Using an Economic Security Approach -- 1 Introduction -- 2 Data and Descriptive Statistics -- 3 Methodology -- 3.1 Survey Poisson Model -- 3.2 XGBoost -- 3.3 Missing Data -- 4 Results -- 4.1 Results of the Sensitivity Analysis of Missing Data -- 4.2 Predicted Subjective Happiness -- 4.3 Regression Analysis -- 5 Conclusions -- References -- Monitoring Web-Based Evaluation of Online Reputation in Barcelona -- 1 Introduction -- 2 Methodology Description -- 2.1 Principal Component Analysis -- 2.2 Robust Compositional Regression Model -- 3 Data Description -- 4 Discussion of Results -- 5 Conclusions and Managerial Implications -- Appendix 1: Abbreviation and Corresponding Meaning of Fig. 1 -- Appendix 2: Abbreviation and Corresponding Meaning of Fig. 2 -- References -- Information Technology for the Synthesis of Optimal Spatial Configurations with Visualization of the Decision-Making Process -- 1 Introduction -- 2 Basic Concepts and Definitions -- 3 Configuration Space of Geometric Objects Based on Geometric Information -- 4 Information Technology Model for the Synthesis of Spatial Configurations -- 5 The Software Package Description -- 6 An Example of Implementing the Results -- 7 Conclusion -- References -- Hybrid Approach to Combinatorial and Logic Graph Problems -- 1 Introduction -- 2 The Problem Description -- 3 The Hybrid Approach -- 4 Hybrid Three-Level Algorithm -- 5 Objective Function -- 6 Experiments -- 7 Conclusion -- References -- Energy-Efficient Algorithms Used in Datacenters: A Survey -- 1 Introduction -- 2 Techniques Used in Datacenters to Maintain Energy Efficiency -- 3 Energy Efficiency Metrics Used in Datacenters -- 4 Different Types of Algorithms Used in Datacenters -- 5 Related Work -- 6 Conclusion.
References -- Software Log Anomaly Detection Method Using HTM Algorithm -- 1 Introduction -- 2 Background -- 3 Proposed Method -- 3.1 Log Parser -- 3.2 Method Overview -- 4 Evaluation -- 4.1 Experiment Setting -- 4.2 Input Format -- 4.3 Results -- 5 Conclusion -- References -- Logical Inference in Predicate Calculus with the Definition of Previous Statements -- 1 Introduction -- 2 Definition of the Problem -- 2.1 Meaningful Definition of the Problem -- 2.2 Formal Definition of the Problem -- 3 Basic Processing Procedures -- 3.1 Partial "Disjuncts Division" -- 3.2 Complete "Disjunct Division" -- 4 Procedure of Inference -- 5 Method of Inference -- 6 Conclusion -- References -- Congestion Management Considering Demand Response Programs Using Multi-objective Grasshopper Optimization Algorithm -- 1 Introduction -- 2 Materials and Methods -- 2.1 Demand Response Programs Cost -- 3 Multi-objective Grasshopper Optimization Algorithm -- 4 Results and Discussions -- 5 Conclusion -- Appendix: Parameters of MOGOA -- References -- A Hardware Accelerator Implementation of Multilayer Perceptron -- 1 Introduction -- 2 Literature Review -- 3 FFNN Computation Algorithm -- 4 Hardware Architecture -- 4.1 Neural Processing Element -- 4.2 Activation Function Block (AFB) -- 4.3 Network Control Sequences -- 4.4 Number of Clock Cycles of Execution -- 5 Results and Discussion -- 5.1 Hardware Blocks -- 5.2 Hardware Architecture of 3times3times2 MLP -- 5.3 Resource Utilization and Performance Evaluation -- 6 Application -- 7 Conclusion -- References -- Building a Classifier of Behavior Patterns for Semantic Search Based on Cuckoo Search Meta-heuristics -- 1 Introduction -- 2 Formulation of the Problem -- 3 Method for Building the Classifier of Behavior Pattern -- 4 Bio-inspired Algorithm Based on Cuckoo Search -- 5 Experimental Research -- 6 Conclusion -- References.
TETRA Enhancement Based on Adaptive Modulation -- 1 Introduction -- 2 The Proposed TETRA Modules Layers -- 3 The Proposed TETRA System Structure -- 4 Proposal Frame of Adaptive TETRA System -- 5 Simulation and Results -- 6 Conclusion -- References -- Dynamic Stability Enhancement of Grid Connected Wind System Using Grey Wolf Optimization Technique -- 1 Introduction -- 2 Grid Connected Wind Turbine System -- 3 Modeling of SMEs System -- 3.1 Modeling of VSC -- 3.2 Modeling of Chopper -- 4 Grey Wolf Optimization (GWO) Technique -- 5 Control Strategy of Wind System Using GWO -- 6 Simulation Results -- 7 Conclusion -- References -- A Comparative Analysis on Wide-Area Power System Control with Mitigation the Effects of an Imperfect Medium -- 1 Introduction -- 2 Modelling of the Test Power System -- 2.1 Kundur's Two-Area Four-Machine Test System -- 2.2 Selection of Control Location and Wide-Area Remote Signal -- 3 Control Techniques -- 3.1 Conventional PSS (CPSS) -- 3.2 Multi-band-based PSS (MB-PSS4B) -- 3.3 Linear Quadratic Gaussian (LQG) Controller -- 4 Noise in System -- 5 Results and Discussions -- 6 Conclusions -- References -- Adware Attack Detection on IoT Devices Using Deep Logistic Regression SVM (DL-SVM-IoT) -- 1 Introduction -- 2 Related Work -- 3 Theoretical Background -- 3.1 Delineation of IoT Adware Attacks Classification and Identification Using (DL-SVM-IoT) -- 4 Experimental Results and Comparison -- 5 Conclusion and Future Work -- References -- Intrusion Detection System for Securing Computer Networks Using Machine Learning: A Literature Review -- 1 Introduction -- 1.1 Machine Learning for IDS -- 1.2 Types of IDS -- 2 Review Questions -- 3 Papers in Review -- 4 Discussions -- 5 Conclusion -- References -- An Exploration of Entropy Techniques for Envisioning Announcement Period of Open Source Software -- 1 Introduction.
1.1 Information Measures -- 2 Predicting Bugs and Estimating Release Time of Software -- 3 Conclusion -- References -- Occurrence Prediction of Pests and Diseases in Rice of Weather Factors Using Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Modeling of Data for Testing and Training Purpose -- 3.4 Machine Learning -- 4 Results -- 5 Conclusion -- 6 Future Scope -- References -- A Literature Review on Generative Adversarial Networks with Its Applications in Healthcare -- 1 Introduction -- 2 What are Generative Adversarial Networks or GANs -- 2.1 Generative Model -- 2.2 Discriminative Model -- 3 Applications of GANs or Generative Adversarial Networks in Healthcare -- 3.1 Electronic Health Record -- 3.2 Retinal Image Synthesis -- 3.3 Skin Lesion Analysis -- 3.4 Medical Image Segmentation -- 4 Discussion -- 4.1 Advantages -- 4.2 Disadvantages -- 4.3 Future Scope -- 5 Conclusion -- References -- A Federated Search System for Online Property Listings Based on SIFT Algorithm -- 1 Introduction -- 2 Online Federated Search System -- 2.1 Source Crawling -- 2.2 Collection Creation -- 2.3 User Interface -- 3 Implementing the Property Federated Search System -- 4 Evaluation and Discussions -- 5 Conclusions -- References -- Digital Brain Building a Key to Improve Cognitive Functions by an EEG-Controlled Videogames as Interactive Learning Platform -- 1 Introduction -- 1.1 User State Monitoring -- 1.2 Neurogaming Using NeuroSky -- 1.3 EEG Acquisition -- 1.4 Neuroergonomics Application -- 2 Methodology -- 2.1 Mathematical Model -- 2.2 Neurogame and Educational Concept -- 2.3 Brain Runner -- 2.4 Hybrid BCI -- 2.5 Interactive Session -- 3 Results -- 4 Conclusion -- References -- Intelligent Car Cabin Safety System Through IoT Application -- 1 Introduction -- 2 IoT (Internet of Things).
3 System Description and Principal -- 4 Methodology -- 5 Results and Discussions -- 6 Conclusions -- References -- Utilization of Delmia Software for Saving Cycle Time in Robotics Spot Welding -- 1 Introduction -- 2 Problem Statement -- 3 Evolutionary Approach -- 4 Simulation Experiments -- 5 Conclusion -- References -- Data Protection Techniques Over Multi-cloud Environment-A Review -- 1 Introduction -- 2 Literature Survey -- 3 Comparative Analysis or Research Scope -- 4 Visibility of Comparative Study -- 4.1 Description of Different Cloud Framework Used -- 4.2 Issued Addressed -- 4.3 Benefits -- 5 Identified Gaps in Literature Survey -- 6 Mathematical Model -- 7 Proposed Methodology or Related Work -- 8 Conclusion -- References -- Hierarchical Ontology Based on Word Sense Disambiguation of English to Hindi Language -- 1 Introduction -- 2 Proposed Methodology -- 3 Preprocessing of English/Hindi Questions File and Dictionary -- 3.1 Preprocessing -- 3.2 Dictionary Preprocessing -- 4 Ontology Development Module -- 4.1 Collection of Senses -- 4.2 Calculation of Weight TF -- 4.3 Hierarchical Ontology -- 5 Proposed Hierarchical Ontology Algorithm -- 5.1 Proposed Algorithm -- 6 Experiment and Results -- 7 Conclusion -- References -- Review Paper: Error Detection and Correction Onboard Nanosatellites -- 1 Introduction -- 2 Methodology -- 2.1 Space Radiation -- 2.2 Glitches and Upsets -- 2.3 Geomagnetism -- 2.4 EDAC Schemes -- 2.5 Implementing EDAC Systems -- 3 Discussion -- 4 Conclusion -- References -- Kerala Floods: Twitter Analysis Using Deep Learning Techniques -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Collection -- 3.2 Data Cleaning -- 3.3 Data Labeling -- 3.4 Data Division and Separation -- 4 Implementation and Results -- 5 Conclusion -- References -- An Improved DVFS Circuit & -- Error Correction Technique -- 1 Introduction.
2 Charge Pump Circuit.
Record Nr. UNINA-9910483511903321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Congress on intelligent systems : proceedings of CIS 2020 / / editors, Harish Sharma [and four others]
Congress on intelligent systems : proceedings of CIS 2020 / / editors, Harish Sharma [and four others]
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (785 pages)
Disciplina 006.3
Collana Advances in Intelligent Systems and Computing
Soggetto topico Artificial intelligence
Computational intelligence
Automatic control
Intel·ligència artificial
Internet de les coses
Seguretat informàtica
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-336-984-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484352603321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Congress on Smart Computing Technologies : Proceedings of CSCT 2023, Volume 2
Congress on Smart Computing Technologies : Proceedings of CSCT 2023, Volume 2
Autore Bansal Jagdish Chand
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2025
Descrizione fisica 1 online resource (676 pages)
Altri autori (Persone) SharmaHarish
ChakravortyAntorweep
Collana Smart Innovation, Systems and Technologies Series
ISBN 9789819780969
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910983491703321
Bansal Jagdish Chand  
Singapore : , : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Congress on Smart Computing Technologies : Proceedings of CSCT 2023, Volume 1
Congress on Smart Computing Technologies : Proceedings of CSCT 2023, Volume 1
Autore Bansal Jagdish Chand
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (525 pages)
Disciplina 004
Altri autori (Persone) SharmaHarish
ChakravortyAntorweep
Collana Smart Innovation, Systems and Technologies Series
ISBN 981-9750-81-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910903794803321
Bansal Jagdish Chand  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui