top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computational vision and bio-inspired computing : proceedings of ICCVBIC 2022 / / edited by S. Smys, João Manuel R. S. Tavares, and Fuqian Shi
Computational vision and bio-inspired computing : proceedings of ICCVBIC 2022 / / edited by S. Smys, João Manuel R. S. Tavares, and Fuqian Shi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer, , [2023]
Descrizione fisica 1 online resource (XVIII, 827 p. 434 illus., 344 illus. in color.)
Disciplina 006.37
Collana Advances in Intelligent Systems and Computing
Soggetto topico Computer vision
Natural computation
ISBN 981-19-9819-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910686481503321
Singapore : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Inventive communication and computational technologies : proceedings of ICICCT 2021 / / G. Ranganathan, Xavier Fernando, Fuqian Shi, editors
Inventive communication and computational technologies : proceedings of ICICCT 2021 / / G. Ranganathan, Xavier Fernando, Fuqian Shi, editors
Pubbl/distr/stampa Singapore : , : Springer, , [2022]
Descrizione fisica 1 online resource (1016 pages)
Disciplina 004.6
Collana Lecture notes in networks and systems
Soggetto topico Telecommunication systems
Computer networks
ISBN 981-16-5528-6
981-16-5529-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti ICICCT 2021
Record Nr. UNINA-9910743388603321
Singapore : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB) / / edited by Durai Pandian, Xavier Fernando, Zubair Baig, Fuqian Shi
Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB) / / edited by Durai Pandian, Xavier Fernando, Zubair Baig, Fuqian Shi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (1,868 pages)
Disciplina 006.37
Collana Lecture Notes in Computational Vision and Biomechanics
Soggetto topico Biomedical engineering
Image processing - Digital techniques
Computer vision
Biotechnology
Biomedical Engineering and Bioengineering
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-030-00665-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Digital Image Watermarking using Sine Transformation Technique -- Chapter 2. A Review on Protein Structure Classification -- Chapter 3. Motion Detection Algorithm for Surveillance Videos -- Chapter 4. 6D Pose Estimation of 3D Objects in Scenes with Mutual Similarities and Occlusions -- Chapter 5. A Simple and Enhanced Low-Light Image Enhancement Process Using Effective Illumination Mapping Approach -- Chapter 6. Comparison of Particle Swarm Optimization and Weighted Artificial Bee Colony Techniques in Classification of Dementia Using MRI Images -- Chapter 7. Automatic Segmentation of Malaria Affected Erythrocyte in Thin Blood Films -- Chapter 8. Enhanced Portable Customer Experience Using Community Computation in Offline Retail -- Chapter 9. Detection and Recognition Of Vehicle Using Principal Component Analysis -- Chapter 10. Convolution Neural Networks: A Case Study on Brain Tumor Segmentation in Medical Care -- Chapter 11. Vision based algorithm for fire detection in smart buildings -- Chapter 12. Comparative performance analysis of local feature descriptors for biomedical image retrieval -- Chapter 13. Emotion Analysis Through EEG & Peripheral Physiological Signals Using KNN Classifier -- Chapter 14. Detection Of Liver Tumor Using Gradient Vector Flow Algorithm -- Chapter 15. Hyperspectral Image Classification using Semisupervised Random Forest -- Chapter 16. Clustering of various parameters to catalog human bone disorders through soft computing simulation -- Chapter 17. IoT Based Embedded Smart Lock Control using Face Recognition System -- Chapter 18. MediCloud: Cloud-based solution to patient’s medical records -- Chapter 19. A Trio Approach Satisfying CIA Triad for Medical Image Security -- Chapter 20. A Novel Hybrid Method for Time Series Forecasting Using Soft Computing Approach -- Chapter 21. Medical Image Classification Using MRI: An Investigation -- Chapter 22. Tumor Detection and Analysis using Improved Fuzzy C-Means Algorithm -- Chapter 23. MediCloud: Cloud-based solution to patient’s medical records -- Chapter 24. Enhancement of Optical Coherence Tomography Images: An Iterative Approach Using Various Filters -- Chapter 25. An o -- Chapter 26. the Shelf CNN Features based approach for Vehicle Classication using Acoustics -- Chapter 27. Conjunctival Vasculature liveness detection based on DCT Features -- Chapter 28. Unusual Social Event Detection by Analyzing Call Data Records -- Chapter 29. Long Short Term Memory based Recurrent Neural Network approach for intrusion detection -- Chapter 30. Drunk Driving and Drowsiness Detection Alert System -- Chapter 31. A Survey on Intelligent Face Recognition System -- Chapter 32. Real Time Health Monitoring System Implemented on a Bicycle -- Chapter 33. A Fuzzy Rule based Diagnosis of Parkinson’s Disease -- Chapter 34. A Comprehensive Study of Retinal Vessel Classification Methods in Fundus Images for detection of Hyper-tensive Retinopathy and Cardiovascular diseases -- Chapter 35. Estimation of parameters to model a fabric in a way to identify defects -- Chapter 36. Hybrid Method For Copy-Move Forgery Detection In Digital Images -- Chapter 37. Error Detection Technique For A Median Filter Using Denoising Algorithm -- Chapter 38. Retinal Image Processing and Classification using Convolutional Neural Networks -- Chapter 39. Comparison of Thermography and 3D Mammography Screening and Classification Techniques for Breast Cancer -- Chapter 40. IEFA- A Fuzzy Framework for Image Enrichment -- Chapter 41. Hidden Markov Random Field and Gaussian Mixture Model based Hidden Markov Random Field for Contour Labelling of Exudates in Diabetic Retinopathy-A Comparative Study -- Chapter 42. AUGEN: An Ocular Support for Visually Impaired Using Deep Learning -- Chapter 43. A Novel Flight Controller Interface for Vision Guided Autonomous Drone -- Chapter 44. Sliding Discrete Fourier Transform for 2D Signal Processing -- Chapter 45. Automated Lung Nodules And Ground Glass Opacity Nodules Detection And Classification From Computed Tomography Images -- Chapter 46. Detection Of Static And Dynamic Abnormal Activities In Crowded Areas Using Hybrid Clustering -- Chapter 47. Gait Recognition using Normal Distance Map and Sparse Multilinear Laplacian Discriminant Analysis -- Chapter 48. A Review – Edge Detection Techniques in Dental Images -- Chapter 49. Detection of Exudates and Removal of Optic Disc in Fundus Images Using Genetic Algorithm -- Chapter 50. Analysis of Feature Ranking Methods on X-ray Images -- Chapter 51. Salient Object Detection for Synthetic Dataset -- Chapter 52. Atherosclerotic Plaque Detection Using Intra-Vascular Ultrasound (IVUS) Images. -- Chapter 53. Correlative Feature Selection for Multimodal Medical Image Fusion through QWT -- Chapter 54. A Two Stage Validation Approach for Early Detection of Proliferative Diabetic Retinopathy in Neovascularization at the Disc by Observing Retinal Vascular Structure -- Chapter 55. Finding Center of Optic Disc from Fundus Images for Image Characterization and Analysis -- Chapter 56. A Robust Method for Image Copy Move Passive Forgery Detection with Enhanced Speed -- Chapter 57. Detection of Objects and Evaluation with The IO Link Using Miniature Laser Sensor -A Review -- Chapter 58. Development of Medical Image Segmentation Algorithms using Deformable Models -- Chapter 59. Feature Extraction and Classification of Epileptic EEG signals using Wavelet transforms and Artificial Neural Networks -- Chapter 60. 3D Printed Surgical Guides in Orthoganthic Surgery- A Pathway to Positive Surgical Outcomes -- Chapter 61. Image-Based Method for Analysis of Root Canal Geometry -- Chapter 62. Analysis of Explicit Parallelism of Image Pre-Processing Algorithms A Case Study -- Chapter 63. A Comprehensive Study on Character Segmentation -- Chapter 64. Framework For Image Forgery Detection And Classification Using Machine Learning -- Chapter 65. EZW, SPIHT and WDR Methods for CT Scan and X-Ray Images Compression Applications -- Chapter 66. Human Identification based on Ear Image Contour and it’s Properties -- Chapter 67. Defocus Map Based Segmentation of Automotive Vehicles -- Chapter 68. Multi-Insight Monocular Vision System using a Refractive Projection Model -- Chapter 69. Comparative Study and Analysis of Pulse Rate Measurement by Vowel Speech and EVM -- Chapter 70. ONESTOP:A Tool for Performing Generic Operations With Visual Support -- Chapter 71. Performance evaluation of DCT, DWT and SPIHT techniques for Medical Image Compression -- Chapter 72. Structural Health Monitoring –An Integrated Approach for Vibration Analysis with Wireless Sensors to Steel Structure using Image Processing -- Chapter 73. An Improved image pre-processing method for concrete crack detection -- Chapter 74. Grape crop disease classification using transfer learning approach -- Chapter 75. Exploring Image Classification of Thyroid Ultrasound Images using Deep Learning -- Chapter 76. Medical Applications of Additive Manufacturing -- Chapter 77. A Study on Comparative Analysis of Automated and Semi automated Segmentation Techniques on Knee Osteoarthritis X-Ray Radiographs -- Chapter 78. Plant Disease Detection Based on Region Based Segmentation and KNN Classifier -- Chapter 79. Analyzing e-CALLISTO Images: Sunspot Number, 10.7 cm Flux and Radio Solar Bursts -- Chapter 80. Real Time Input Text Recognition System For The Aid Of Visually Impaired -- Chapter 81. A homogenous prototype design for IED detection using subsurface Ground Penetrating RADAR -- Chapter 82. A study on various Deep Learning Algorithms to diagnose Alzheimer’s disease -- Chapter 83. Performance Analysis of Image Enhancement Techniques for Mammogram Images -- Chapter 84. A Study on Preprocessing Techniques for Ultra Sound Images of Carotid Artery -- Chapter 85. Fractional Reaction Diffusion Model for Parkinson’s Disease -- Chapter 86. Analysis Of A Novel Algorithm For Steganography Using Openexr Image As Cover -- Chapter 87. Prediction-based Lossless Image Compression -- Chapter 88. Audio and Video Streaming in Telepresence application using WebRTC for Healthcare System -- Chapter 89. Review on Image Segmentation Techniques Incorporated with Machine Learning in the Scrutinization of Leukemic Microscopic Stained Blood Smear Images -- Chapter 90. Detection of Gaze Direction for Human-Computer Interaction -- Chapter 91. Compromising Cloud Security and Privacy by DOS, DDOS, Botnet Attacks and their countermeasures -- Chapter 92. Road Detection by Boundary Extraction Technique and Hough Transform -- Chapter 93. Investigating the Impact of Various Feature Selection Techniques on the Attributes used in the Diagnosis of Alzheimer’s Disease -- Chapter 94. Detection Of Sleep Apnea Based On Hrv Analysis Of Ecg Signal -- Chapter 95. Performance Comparison of SVM Classifier based on Kernel Functions in Colposcopic image Segmentation for Cervical Cancer -- Chapter 96. GPU based Denoising Filter for Knee MRI -- Chapter 97. Performance Evaluation of Audio Watermarking Algorithms using DWT and LFSR -- Chapter 98. Biometric Image Encryption Algorithm Based on Modified Rubik’s Cube Principle -- Chapter 99. A Comprehensive Study on Character Segmentation -- Chapter 100. Leaf Disease Detection Based On Machine Learning -- Chapter 101. Cross Domain Recommendation System using Ontology and Sequential Pattern Mining -- Chapter 102. A New Automated Medicine Prescription System for Plant Diseases -- Chapter 103. Identifying the risk factors for Diabetic Retinopathy using Decision Tree -- Chapter 104. Logarithmic Transform based Digital Watermarking Scheme -- Chapter 105. A comparative assessment of segmentations on skin lesion through various entropy and six sigma thresholds -- Chapter 106. Impact of Speckle Filtering on the Decomposition and Classification of Fully Polarimetric RADARSAT-2 Data -- Chapter 107. Estimation of Precipitation from the Doppler Weather Radar Images -- Chapt.
Record Nr. UNINA-9910337641403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Soft Computing for Security Applications : Proceedings of ICSCS 2021
Soft Computing for Security Applications : Proceedings of ICSCS 2021
Autore Ranganathan G
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (944 pages)
Altri autori (Persone) FernandoXavier
ShiFuqian
El AlliouiYoussouf
Collana Advances in Intelligent Systems and Computing Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-5301-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Acknowledgements -- Contents -- About the Editors -- Facial Image Denoising and Reconstruction -- 1 Introduction -- 2 Related Work -- 2.1 Image Denoising -- 2.2 Image Outpainting -- 3 Dataset -- 3.1 Description -- 3.2 Preprocessing -- 4 Methodology -- 4.1 Image Denoising -- 4.2 Image Reconstruction -- 5 Metrics -- 6 Model Architecture -- 6.1 Image Denoising -- 6.2 Image Reconstruction -- 7 Results -- 7.1 Image Denoising -- 8 Conclusion -- 9 Future Works -- References -- One Method for RC5 Algorithm's Cryptographic Strength Improving -- 1 Introduction -- 2 Priming the Modification to the RC5 Algorithm -- 2.1 Nonlinear Functions to Improve RC5 Cryptocurrency -- 2.2 Obtained Results of Improved RC5 Algorithm Operation -- 3 Cryptoresistance Evaluation of the RC5 Algorithm Improving -- 3.1 Cryptanalytic Stability Evaluation -- 3.2 Determination of Additional Bits When Encoding in a Crypto Algorithm -- 3.3 Simple Search Cryptanalysis (Brute Force) -- 4 Conclusion -- References -- Multiclass Classification of Firewall Log Files Using Shallow Neural Network for Network Security Applications -- 1 Introduction -- 2 Dataset of Internet Firewall -- 3 Action Classification System Internet Firewall -- 4 Development and Experimental Environment -- 5 Results and Discussion -- 6 Conclusions -- References -- On the Possibility of Evasion Attacks with Macro Malware -- 1 Introduction -- 2 Related Work -- 2.1 Detection with Machine Learning -- 2.2 Evasion for Machine Learning-Based Detection -- 2.3 Evasion for Natural Languages -- 3 Background -- 3.1 Bag of Words (BoW) -- 3.2 Latent Semantic Indexing (LSI) -- 4 Proposed Method -- 4.1 Outline -- 4.2 Training Process -- 4.3 Evasion Process -- 4.4 Replacing Method -- 4.5 Inserting Method -- 4.6 Implementation -- 5 Experiment -- 5.1 Dataset -- 5.2 Outline -- 5.3 The Effect of the Replacing Method.
5.4 The Effect of the Simple Inserting Method -- 5.5 The Effect of the Modified Inserting Method -- 5.6 Optimizing the Number of LSI Topics -- 6 Discussion -- 6.1 The Risk of Evasion Attacks with VBA Malware -- 6.2 Resilience to the Attacks -- 6.3 Countermeasure Against Evasion Attacks -- 6.4 Limitation of This Study -- 6.5 Ethics of This Study -- 7 Conclusion -- References -- IoT-Based Smart Crop Field Monitoring and Protection System from Heavy Rainfall Utilizing Raspberry Pi -- 1 Introduction -- 2 Literature Survey -- 3 Existing System -- 4 Proposed System -- 5 Results and Discussion -- 6 Conclusion -- References -- A Systematic Review of Adoption of Blockchain and Machine Learning Technology and Its Application -- 1 Introduction -- 2 Research Methodology -- 2.1 Definition of Research Questions -- 2.2 Descriptive Analysis -- 2.3 Result -- 3 Blockchain Application -- 3.1 Blockchain Impact on Various Sectors -- 3.2 Ongoing Projects on Blockchain Technology -- 4 Conclusion -- References -- Review of Malicious URL Detection Using Machine Learning -- 1 Introduction -- 2 Background Study -- 3 Related Works -- 4 Observed Issues -- 5 Research Challenges -- 6 Conclusion -- References -- Securing IoT Using Artificial Intelligence and Feature Engineering -- 1 Introduction -- 2 Related Work -- 3 Botnet and Types of IoT botnet -- 4 Dataset -- 5 Proposed Methodology -- 6 Results and Discussion -- 7 Conclusion -- References -- A Novel Framework for NIDS Using Stacked Ensemble Learning -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 3.1 Framework -- 3.2 Stacking Method -- 4 Experimental Setup -- 4.1 Dataset Description -- 4.2 Performance Metrics -- 5 Results and Discussion -- 6 Conclusion -- References -- Butterfly Algorithm Boosted Deep Random Vector Functional Link Network for Keystroke Dynamics -- 1 Introduction -- 2 Related Work -- 3 Background.
3.1 Keystroke Vector -- 3.2 Artificial Neural Network -- 3.3 Multilayer Perceptron -- 3.4 Deep Neural Network -- 4 Methodology: Butterfly Optimization Boosted Deep Random Vector Functional Link Network for Prediction of Continuous Keystroke Dynamic Authentication -- 4.1 Overall Architecture -- 4.2 Random Vector Functional Link Network (RVFLN) -- 4.3 Deep Random Vector Functional Link Network -- 4.4 Butterfly Optimization Algorithm (BOA) -- 5 Results and Discussions -- 6 Conclusion -- References -- Hybrid Context-Aware Recommendation System Using Deep Autoencoder -- 1 Introduction -- 2 Preliminaries -- 2.1 Collaborative Filtering -- 2.2 Deep Autoencoders -- 3 Related Works -- 4 Model -- 5 Experiments and Results -- 5.1 Dataset -- 5.2 Experimental Setup -- 5.3 Side Information -- 5.4 Impact of Contextual Information -- 5.5 Impact of Different Activation Function and Increasing the No. of Layers -- 5.6 Impact of Different Activation Type and no. Of Layers -- 6 General Results -- 7 Conclusion -- References -- Exploration and Implementation of RSA-KEM Algorithm -- 1 Introduction -- 2 RSA (Rivest, Shamir, Adleman) Algorithm -- 2.1 Algorithm -- 2.2 Primality Testing of a Number -- 3 RSA-KEM (Rivest, Shamir, Adleman-Key Encapsulation Mechanism) Algorithm -- 3.1 Algorithm -- 3.2 Password-Based Key Derivation Function (PBKDF) -- 3.3 Advanced Encryption Standard (AES) -- 4 Results -- 5 Conclusions -- References -- Botnet Attack Detection Using Machine Learning Algorithm Integrated With Ensemble Algorithm -- 1 Introduction -- 2 Review of the Literature -- 3 Proposed Botnet Attack Detectıon Method -- 3.1 Machine Learning Model -- 3.2 Ensemble Classifier Model -- 4 Result and Analysis -- 5 Conclusion -- References -- Artificial Intelligence-Based Automation System for Health Care Applications: Medbot -- 1 Introduction -- 2 Experimental Workflow Analysis.
3 Module Description -- 3.1 Data Collection -- 3.2 Preprocessing -- 3.3 Intent Identification -- 3.4 Response Selection -- 3.5 Suggestions and Dialogue Management -- 4 Implementation and Result -- 4.1 Validation Process -- 5 Conclusion -- References -- An Approach for Maintaining Safety at Work Places During the COVID-19 Pandemic Using Deep Learning and Contact Tracing Applications -- 1 Introduction -- 2 Literature Survey -- 3 System Description -- 3.1 Data Collection -- 3.2 Classification Model: YOLOv3 Algorithm -- 3.3 Web site and Contact Tracing Application Along with Multipurpose Wearable -- 4 Results and Analysis -- 5 Conclusion -- References -- Online Certificate Generation and Verification Using Blockchain Framework -- 1 Introduction -- 2 Preliminary Concept -- 2.1 Blockchain -- 2.2 Ethereum -- 2.3 SVG-Scalar Vector Graphics -- 3 Literature Survey -- 3.1 Shanmuga Priya R, Swetha N ``Online Certificate Validation Using Blockchain'' ch16b6 -- 3.2 Nitin Kumavat, Swapnil Mengade, Dishant Desai, JesalVarolia ``Certificate Verification System Using Blockchain'' ch16b7 -- 4 Proposed System Architecture -- 4.1 Methodology -- 4.2 Certificate Generation -- 4.3 Certificate Validation -- 4.4 Working of Application -- 5 Conclusion -- References -- A Survey on LiDAR-Based SLAM Technique for an Autonomous Model Using Particle Filters -- 1 Introduction -- 2 Overview of Different Slam Techniques -- 2.1 EKF-Based SLAM -- 2.2 GridMap-Based SLAM -- 2.3 Graph-Based SLAM -- 2.4 Comparison Between Different SLAM Techniques -- 3 Implementation of RBPF-Based SLAM with LiDAR -- 3.1 Hardware Used -- 3.2 Software Used -- 4 Results -- 4.1 Maps-From the Simulation -- 4.2 Maps from 2D LiDAR Scan Data -- 5 Conclusion -- 6 Limitations and Discussion -- References -- TrafficNN: CNN-Based Road Traffic Conditions Classification -- 1 Introduction -- 2 Related Works.
3 Convolutional Neural Network (CNN) -- 3.1 Convolutional Layer -- 3.2 Pooling Layer -- 3.3 Flatten Layer -- 3.4 Fully Connected Layer -- 3.5 Padding -- 3.6 Rectified Linear Units (ReLU) -- 3.7 Batch Normalization -- 3.8 Dropout -- 3.9 Softmax -- 4 Proposed Methodology -- 4.1 Data Collection -- 4.2 Data Augmentation -- 4.3 Data Preprocessing -- 4.4 TrafficNN Architecture -- 5 Performance Evaluation -- 5.1 Training the Model -- 5.2 Result Discussion -- 5.3 Comparison Using Transfer Learning -- 6 Future Work -- 7 Conclusions -- References -- Review of Malware Detection Using Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Deep Learning Over Machine Learning -- 4 Discussion -- 5 Future Work -- 6 Conclusion -- References -- ANN Based Hybrid RSSI-TDOA DOA Estimation and Beamforming -- 1 Introduction -- 2 Problem Formulation -- 3 System Model for DOA Estimation -- 3.1 ANN Optimized Hybrid RSSI-TDOA Model Based DOA Estimation -- 4 System Model for Beamforming -- 4.1 Recursive Least Squares (RLS) -- 5 Hardware Platform -- 5.1 Antenna -- 5.2 Eight Element Uniform Linear Array (ULA) -- 5.3 System Configuration -- 6 Results and Discussion -- 7 Conclusion -- References -- FPGA Implementation of Nested Binary Phase Codes Using DDS Approach for Radar Pulse Compression -- 1 Introduction -- 2 Binary Phase Coded Waveforms -- 2.1 Nested Barker Codes -- 3 Generation of a Barker and Nested Barker Codes Using FPGA -- 3.1 Direct Digital Synthesizers (DDS) -- 3.2 The Proposed Method to Generate Barker Codes Using DDS -- 3.3 Generation and Implementation of 13-Bit Barker Code Using FPGA -- 3.4 Generation and Implementation of Nested Barker Code Using FPGA -- 4 Conclusion -- References -- Cloud Computing-Based Li-Ion Battery-BMS Design for Constant DC Load Applications -- 1 Introduction -- 2 Literature Survey -- 3 Experimental Setup -- 4 Results and Discussion.
4.1 Charging Cycle.
Record Nr. UNINA-9910506400903321
Ranganathan G  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Third International Conference on Image Processing and Capsule Networks : ICIPCN 2022 / / Joy Iong-zong Chen, João Manuel R. S. Tavares, and Fuqian Shi, editors
Third International Conference on Image Processing and Capsule Networks : ICIPCN 2022 / / Joy Iong-zong Chen, João Manuel R. S. Tavares, and Fuqian Shi, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (855 pages)
Disciplina 621.367
Collana Lecture Notes in Networks and Systems
Soggetto topico Image processing - Digital techniques
ISBN 3-031-12413-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Brain-Inspired Spatiotemporal Feature Extraction Using Convolutional Legendre Memory Unit -- 1 Introduction -- 1.1 Neuromorphic Computing -- 2 Related Works -- 3 Proposed Convolutional LMU Model -- 4 Synthetic Dataset and Evaluation Measures -- 5 Results and Analysis -- 6 Conclusion -- References -- Underwater Image Enhancement Using Image Processing -- 1 Introduction -- 1.1 Problem Statement -- 2 Literature Survey -- 3 Methodology -- 4 Architecture -- 5 Conclusion -- References -- Fake News Detection on Indian Sources -- 1 Introduction -- 2 Related Works -- 3 Proposed Solution -- 3.1 Dataset -- 3.2 Data Cleaning -- 3.3 Data Analysis -- 3.4 Text Preprocessing and Text Transformation -- 3.5 Model -- 3.6 Testing -- 4 Results -- 5 Use Cases -- 6 Future Works -- 7 Conclusion -- References -- Exploring Self-supervised Capsule Networks for Improved Classification with Data Scarcity -- 1 Introduction -- 2 Related Work -- 2.1 Functionality of Capsule Networks -- 2.2 Self-supervision and Capsule Networks -- 2.3 Pretrained Capsule Networks -- 3 Methods -- 3.1 Data Set -- 3.2 Capsule Network Model -- 3.3 Self-supervision -- 4 Results and Discussion -- 4.1 Data Scarcity -- 4.2 Learning Behaviour of the Self-supervised CapsNet -- 4.3 Data Scarcity and Imbalance -- 4.4 Correlation of Pretext and Downstream Accuracy -- 5 Conclusion -- References -- A Novel Architecture for Improving Tuberculosis Detection from Microscopic Sputum Smear Images -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Preprocessing -- 3.2 Mask Generation Using SegZNet Architecture -- 3.3 Data Augmentation -- 3.4 UNet Segmentation -- 4 Result and Discussion -- 5 Conclusion -- References -- TapasQA - Question Answering on Statistical Plots Using Google TAPAS -- 1 Purpose -- 2 Previous Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Pipeline.
4 Major Research Findings -- 4.1 Questions Handled by Our Model -- 4.2 Training Details -- 4.3 Evaluation Metric -- 5 Result Implications -- 5.1 Plot Element Detection Stage -- 5.2 Table Question Answering (QA) Stage -- 6 End-To-End Example -- 7 Value and Limitations -- 8 Conclusion and Future Work -- References -- Face Sketch-Photo Synthesis and Recognition -- 1 Introduction -- 2 Related Work -- 3 Research Gap -- 4 Data -- 4.1 CUFS Dataset -- 4.2 CelebA Dataset -- 4.3 ORL Dataset -- 5 Tools and Experimental Settings -- 6 Proposed Methodology -- 6.1 Face-Sketch Synthesis -- 6.2 Face-Photo Synthesis -- 6.3 Facial Recognition -- 7 Results -- 7.1 Face-Sketch Synthesis -- 7.2 Face-Photo Synthesis -- 7.3 Facial Recognition -- 8 Evaluation -- 8.1 Face-Sketch Synthesis -- 8.2 Face-Photo Synthesis -- 8.3 Facial Recognition -- 9 Conclusion -- 10 Future Work -- References -- Toward Robust Image Pre-processing Steps for Vehicle Plate Recognition -- 1 Introduction -- 2 The Proposed Deskew Approach -- 3 Performance Evaluation -- 4 Conclusion -- References -- Multi-focus Image Fusion Using Morphological Toggle-Gradient and Guided Filter -- 1 Introduction -- 2 Preliminaries -- 2.1 Toggle Contrast Operator -- 2.2 Spatial Frequency -- 2.3 Guided Filter -- 3 Proposed Method -- 3.1 Morphological Toggle-Gradient Based Focus Measure -- 3.2 Composite Focusing Criterion (CFC) and Initial Decision Map -- 3.3 Final Decision Map and Fusion -- 4 Experimental Results and Discussion -- 4.1 Execution Setup -- 4.2 Subjective Evaluation -- 4.3 Fusion on Synthetic Source Pairs -- 5 Conclusion -- References -- Security Enhancement of Fog Nodes in IoT Networks Using the IBF Scheme -- 1 Introduction -- 2 Related Works -- 3 IBE Based Fog Computing -- 3.1 Identity Based Encryption Using BF Scheme -- 4 Results and Discussion -- 5 Conclusion -- References.
Automatic Recognition of Plant Leaf Diseases Using Deep Learning (Multilayer CNN) and Image Processing -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Flowchart of the Methodology -- 3.2 Training the Model -- 4 Result and Discussion -- 4.1 Statistical Analysis -- 4.2 Accuracy Graph -- 4.3 Confusion Matrix -- 4.4 Comparison of Result with Other Models -- 5 Conclusion -- References -- Comparative Analysis of Feature and Intensity Based Image Registration Algorithms in Variable Agricultural Scenarios -- 1 Introduction -- 2 Literature Review -- 2.1 Overview of Feature-Based Image Registration Algorithms -- 2.2 Overview of Intensity-Based Image Registration Algorithms -- 3 Experiments and Results -- 3.1 Experimental Setup -- 4 Results and Discussion -- 5 Conclusion and Future Scope -- 6 Supplementary Material -- References -- Non-invasive Diagnosis of Diabetes Using Chaotic Features and Genetic Learning -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 3.1 Extraction of Chaotic Geometry Features -- 3.2 Genetic Learning -- 4 Experimental Evaluation -- 5 Conclusion -- References -- Analytic for Cricket Match Winner Prediction Through Major Events Quantification -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Modeling Instantaneous Strength -- 3.2 Modeling Real Time Efficency (RTE) -- 3.3 Parameter Modeling (BSP) -- 3.4 Parameter Modeling (EBS) -- 4 Experimental Analysis -- 5 Conclusion -- References -- An Investigation of COVID-19 Diagnosis and Severity Detection Using Convolutional Neural Networks -- 1 Introduction -- 2 Convolutional Neural Networks - An Overview -- 3 Literature Survey -- 4 Numerical Comparison Analysis and Discussions -- 5 Conclusion -- References -- An Efficient Key Frame Extraction from Surveillance Videos for Real-World Anomaly Detection -- 1 Introduction -- 2 Related Works.
3 Proposed Work -- 4 Results and Discussion -- 5 Conclusion -- References -- The XGBoost Model for Network Intrusion Detection Boosted by Enhanced Sine Cosine Algorithm -- 1 Introduction -- 2 Preliminaries and Related Work -- 2.1 XGBoost Model -- 2.2 Swarm Intelligence -- 3 Proposed Method -- 3.1 The Original Sine-Cosine Algorithm (SCA) -- 3.2 The Enhanced Sine-Cosine Algorithm (ESCA) -- 3.3 Proposed eSCA-XGBoost Model -- 4 Experiments and Comparative Analysis -- 5 Conclusion -- References -- Developing a Tool to Classify Lethal Weapons by Analyzing Images -- 1 Introduction -- 2 Related Work -- 3 System Architecture and Design -- 3.1 Dataset Description -- 3.2 Data Preprocessing -- 3.3 VGG16 Model Implementation -- 3.4 Customized Model Implementation -- 4 Implementation and Experimental Result -- 4.1 Experimental Setup -- 4.2 Implementation -- 4.3 Performance Evaluation -- 4.4 Comparison with Other Existing Frameworks -- 5 Conclusion -- References -- Selfie2Business - An Application to Identify Objects and Recommend Relevant Service Providers -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 3.1 Data Pre-processing -- 4 Methodology -- 4.1 Selfie Detector -- 4.2 Object Detector -- 4.3 Search Query Listing -- 5 Results -- 5.1 Selfie Detection -- 5.2 Object Detection -- 6 Discussion -- 7 Conclusions and Future Work -- References -- A Systematic and Novel Ensemble Construction Method for Handling Data Stream Challenges -- 1 Introduction -- 1.1 Methods for Producing Data Streams -- 1.2 Major Issues Related to Data Streams Handling -- 1.3 Types of Data Drifts -- 2 Methods to Handle Data Stream Issues -- 2.1 Preprosessing of Data Stream -- 2.2 Dealing with Data Drifts: Drift Handling Methods -- 2.3 Ensemble Designed -- 3 Proposed Method -- 4 Result Analysis -- 4.1 Experimental Setup -- 4.2 Results Discussion -- 5 Conclusion and Future Research Work.
References -- Survey on Various Performance Metrices for Lightweight Encryption Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Performance Metrices for Lightweight Encryption Algorithms -- 3.1 Hardware Performance Metrices -- 3.2 Software Performance Metrices -- 4 Conclusion -- References -- A Hybrid Approach to Facial Recognition for Online Shopping Using PCA and Haar Cascade -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Implementation -- 4.1 Admin -- 4.2 User -- 4.3 Cart -- 4.4 Input Design -- 4.5 Output Design -- 5 Experimental Results -- 6 Conclusion -- References -- Analysis of IoT Cloud Security Computerization Technology Based on Artificial Intelligence -- 1 Introduction -- 2 Mobile Robot Path Planning Method -- 2.1 Global Strategy for Path Planning -- 2.2 Artificial Intelligence Robot's Environments -- 3 IoT-Based Systems Security Model -- 4 A Machine Learning-Based Survey on IoT Security -- 5 IoT-Cloud Security Issues -- 6 Challenges in the IoT Cloud -- 7 IoT, AI, and Software Intelligence in the Smart Home -- 8 IoT, AI, and Software Intelligence in the Smart Home -- 9 Network Protection -- 10 Network Security Stored Difficulty in Understanding Investigation System Software Installation Core Tech -- 10.1 Software Development -- 10.2 Hardware Development -- 11 Conclusion -- References -- Artificial Intelligence Based Real Time Packet Analysing to Detect DOS Attacks -- 1 Introduction -- 2 Literature Survey -- 3 Implementation -- 3.1 Experimental Setup -- 3.2 Data Pre-processing -- 3.3 Dataset -- 3.4 Feature Extraction -- 3.5 Model Creation, Training and Testing -- 4 Results and Discussion -- 5 Conclusion -- References -- Decision Trees and Gender Stereotypes in University Academic Desertion -- 1 Introduction -- 2 State of the Art -- 2.1 Gender Stereotype -- 2.2 Regarding Desertion -- 2.3 Predictive Models.
3 Methodology.
Record Nr. UNINA-9910585970903321
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui