top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology : NICEDT-2024, Volume 2 / / edited by Palaiahnakote Shivakumara, Saurov Mahanta, Yumnam Jayanta Singh
Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology : NICEDT-2024, Volume 2 / / edited by Palaiahnakote Shivakumara, Saurov Mahanta, Yumnam Jayanta Singh
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (610 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Statistics
Cooperating objects (Computer systems)
Internet of things
Computer networks - Security measures
Computational Intelligence
Artificial Intelligence
Cyber-Physical Systems
Internet of Things
Mobile and Network Security
ISBN 9789819736041
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- VLSI and Semiconductors, Electronics System, IoT, Robotics and Automations -- Classification of Bearing Faults by Approximation of Peak-To-Peak Amplitudes Distribution -- 1 Introduction -- 2 Materials and Methods -- 3 Numerical Study -- 4 Conclusions -- References -- Ensemble of Visual Transformer and Deep Neural Networks for Recognizing Sunflower Diseases from Photographs -- 1 Introduction -- 2 Materials and Methods -- 3 Experiment -- 4 Conclusions -- References -- Design and Development of Parallel Beamformer Model for RTL Verification -- 1 Introduction -- 2 Background -- 3 Development of Parallel Beamformer Model -- 3.1 Specifications -- 3.2 MATLAB® Modelling -- 3.3 Defining Ultrasound Transducer Using K-Wave -- 4 Verification of RTL Model -- 5 Results and Discussions -- 6 Conclusion -- References -- Early Detection of Oral Cancer Using Image Processing and Computational Techniques -- 1 Introduction -- 2 Background -- 3 Materials and Methods -- 3.1 Study Design -- 3.2 System Requirements and Training Parameters -- 3.3 Dataset Description -- 3.4 Feature Selection and Segmentation -- 3.5 Model Evaluation Metrics -- 3.6 Reviewing the Models Performance Individually -- 3.7 Performance Analysis -- 4 Graphic User Interface -- 5 Conclusion -- References -- LoRa Enabled IoT Sensor Framework for Monitoring Urban Flood in Guwahati City -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Study Area -- 3.2 Materials Used -- 3.3 Architecture -- 3.4 Prototype Development -- 3.5 Novelty -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Study and Implementation of Smart Positioner Prototype for Industrial Applications -- 1 Introduction -- 2 Related Work -- 3 Methodology and Project Development Stages -- 4 Results and Conclusion -- References.
Tactile Internet: A Next Gen IoT Technology -- 1 Introduction -- 1.1 Literature Survey on Tactile Internet -- 2 Haptic Communication -- 2.1 Haptic Capture -- 2.2 Haptic Encoding -- 2.3 Haptic Delivery -- 3 Requirements -- 4 Architecture -- 4.1 Master Domain -- 4.2 Controlled Domain -- 4.3 Network Domain -- 5 Communication Technology for TI -- 6 Comparison -- 7 Application -- 7.1 Telepresence with Tactile Feedback -- 7.2 Industrial Automation -- 7.3 Healthcare -- 7.4 Autonomous Driving -- 8 Research Issues -- 8.1 Latency Reduction in TI Application -- 8.2 Architectural Issues -- 8.3 Resource Allocation in TI -- 8.4 Haptic Communication -- 8.5 Augmented/Virtual Reality Issues -- 9 Network Simulations -- 10 Conclusion -- References -- A Deep Learning Approach for Hardware Trojan Detection in Netlist of Integrated Circuits with Graph Neural Networks -- 1 Introduction -- 2 Methodology -- 2.1 Parsing the Hardware -- 2.2 Generation of Hardware Schematics -- 2.3 Transformation of Graphviz Graphs -- 2.4 Management of Hardware Configuration -- 2.5 GNN Model -- 3 Dataset and Model -- 4 Experimental Results -- 5 Conclusion -- References -- A Comparative Study of Jpeg and Similar Compression Standards for Wireless Communication -- 1 Introduction -- 1.1 JPEG -- 1.2 JPEG 2000 -- 1.3 Modified Jpeg Based on DCT -- 1.4 Modified Jpeg Based on DST -- 2 Discrete Wavelet Transform (DWT) -- 3 Performance Evaluation Parameter Metrics -- 3.1 MSE -- 3.2 PSNR -- 3.3 Quantization in JPEG -- 4 Results and Discussion -- 5 Conclusion -- References -- Iot-Based Transport Monitoring System for Pharmaceutical Industry -- 1 Introduction -- 2 Proposed System -- 2.1 Implementation -- 3 Results and Discussions -- 4 Conclusion and Future Scope -- 4.1 Conclusion -- 4.2 Future Scope -- References -- Non-intrusive Remote Apiculture Monitoring System -- 1 Introduction -- 2 Project Design.
2.1 Using Arduino Uno Microcontroller -- 2.2 Using ARM Cortex Microcontroller -- 2.3 Implementation -- 2.4 Implementation Using Arduino Uno Microcontroller -- 2.5 Implementation Using ARM Cortex Microcontroller -- 3 Results and Discussions -- 4 Conclusion and Future Scope -- 4.1 Conclusion -- 4.2 Future Scope -- References -- Design and Analysis of Enhanced Bandwidth Slotted Logarithmic Spiral Patch Antenna for 5G Communication -- 1 Introduction -- 2 Antenna Design and Methodology -- 3 Result and Analysis -- 3.1 Bandwidth -- 3.2 VSWR -- 3.3 Gain -- 3.4 E-Field Distribution -- 3.5 Radiation Pattern -- 4 Conclusion -- References -- IoT Based Real-Time Automatic Number Plate Detection Using OpenCV -- 1 Introduction -- 2 Objective -- 3 Related Work -- 4 Proposed System -- 5 Module -- 6 Flow Diagram -- 7 Block Diagram -- 8 Implementation -- 8.1 Image Acquisition -- 8.2 Loading Model Using OpenCV DNN -- 8.3 Detection of Plate -- 8.4 Cropping ROI -- 8.5 Image Processing and Extraction of Characters Using OCR -- 8.6 Data Uploading -- 8.7 Uploading Resultant Images -- 8.8 Dashboard -- 9 Hardware Implementation -- 9.1 Hardware Component Used -- 9.2 Hardware Setup -- 10 Result -- 11 Conclusion -- 12 Future Scope -- References -- Prompt Engineering for the Automated Generation of Weaving Pattern -- 1 Introduction -- 2 Literature Review -- 3 Weave Pattern Representation -- 3.1 Draft Notation -- 3.2 Point Paper Drafting -- 3.3 Weaving Information Format -- 3.4 Threaded Diagrams -- 3.5 Code Representation -- 4 Prompt Engineering -- 5 Proposed Method -- 6 Experimental Result -- 7 Conclusion -- References -- Blood Disease Detection System Based on Haemogram Report Using Decision Tree Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 Machine Learning -- 3.1 Supervised Learning -- 3.2 Unsupervised Learning -- 3.3 Reinforcement Learning -- 4 Blood Diseases.
4.1 Anemia -- 4.2 Thrombocytopenia -- 4.3 Hemochromatosis -- 4.4 Leukocytosis -- 5 Proposed Methodology -- 5.1 Data Set -- 5.2 Techniques Used by Disease Detection System -- 5.3 Disease Detection System Using Haemogram Report Dataset -- 6 Experiment Results -- 7 Conclusion and Future Work -- References -- Development of SPR Sensor-Based System for Copper Ion Detection in Water -- 1 Introduction -- 2 Experimental Setting -- 2.1 Synthesis of Gold Nanoparticles -- 2.2 Preparation of Copper Univar Solution -- 2.3 Observation of SPR Peak Shift in UV Spectroscopy -- 2.4 Design of Optoelectronic Setup -- 3 Results and Discussions -- 3.1 Study of Plasmonic Shifts Using UV Spectroscopy -- 3.2 Electronic Outcome of SPR Variation -- 4 Conclusion -- References -- Digital Technologies for Future -- Generation of YuBraj Twist and YuBrajTwest Weaves -- 1 Introduction -- 2 YumnamBrajarani (YuBraj) TwistWeaves -- 3 Generation of YuBrajTwest Weaves -- 4 Experimental Results -- 5 Conclusions -- References -- Maintenance and Performance of Solar Water Pump in a Rural Agricultural Community: A Case Study -- 1 Introduction -- 2 Significance of Solar Water Pumps in Addressing Water Scarcity Challenges, Promoting Sustainable Irrigation Practices in Rural Areas -- 3 Methodology -- 4 Result and Discussion -- 5 Conclusion -- References -- Integrative Analysis of Cancer Gene Expression Using Bio-Inspired Algorithms and Machine Learning: Identification of Key Genes -- 1 Introduction -- 2 Literature Survey -- 3 Materials and Methods -- 3.1 Dataset Description -- 3.2 Proposed Methodology -- 3.3 Proposed Algorithm for Gene Selection -- 4 Results and Discussion -- 4.1 Occurrences in NB Classifier -- 4.2 Occurrences in NC Classifier -- 4.3 Occurrences in kNN Classifier -- 4.4 Occurrences in SVM Classifier -- 4.5 Occurrences in RF Classifier -- 5 Conclusion -- References.
Potential of AI in Pharma: Bridge the Gap Between Data and Therapeutics -- 1 Historical Perspective -- 1.1 Drug Designing -- 1.2 Artificial Intelligence in Drug Designing -- 2 Artificial Intelligence and Machine Learning -- 2.1 Supervised Learning -- 2.2 Unsupervised Learning -- 2.3 Reinforcement Learning -- 2.4 Semi-supervised Learning -- 2.5 Deep Learning -- 3 AI in Drug Discovery -- 3.1 Target Identification and Validation -- 3.2 Molecule Design and Optimization -- 3.3 Clinical Trials and Personalized Medicine -- 4 AI and ML in Predicting Drug Properties -- 4.1 Harnessing Big Data for Drug Discovery -- 4.2 Accelerating Drug Screening and Optimization -- 4.3 Predicting Drug Safety and Side Effects -- 4.4 Personalized Medicine and Targeted Therapies -- 5 Proposed AI and ML Algorithm's -- 5.1 Data Preprocessing -- 5.2 Target Screening Prediction -- 5.3 3D Structure Prediction -- 5.4 Simulated Structure Prediction -- 6 Challenges of AI and ML in Pharmaceuticals -- 6.1 Data Quality and Accessibility -- 6.2 Model Interpretability and Explainability -- 6.3 Regulatory and Ethical Considerations -- 6.4 Overcoming the Validation Gap -- 6.5 Integration with Existing Workflows -- References -- A PC-Based Ultrasound Color Doppler Performance Improvement Using Intel® IPPs -- 1 Introduction -- 2 Simulation of Flow Phantom Using FIELD-II -- 3 Imaging of Simulated Flow Phantom Using MATLAB -- 4 US Imaging Implementation in QT Using Conventional C++ and Intel IPPs -- 5 Results -- 6 Conclusion -- References -- Deep Reach Centrality: An Innovative Network Centrality Metric Grounded in Distance and Degree, with Its Performance Analysis Applied to the SARS-CoV-2 Protein-protein Interaction Network -- 1 Introduction -- 2 Basic Definition -- 3 Proposed Work -- 3.1 Deep Reach Centrality and Its Significance -- 3.2 Deep Reach Centrality Matrix.
3.3 Similarity and Dissimilarity Analysis of the Proposed Centrality Measure 'Deep Reach Centrality' with 13 Existing Degree-Based and Distance-Based Centrality Measures.
Record Nr. UNINA-9910874687103321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology : NICEDT-2024, Volume 1 / / edited by Isaac Woungang, Sanjay Kumar Dhurandher, Yumnam Jayanta Singh
Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology : NICEDT-2024, Volume 1 / / edited by Isaac Woungang, Sanjay Kumar Dhurandher, Yumnam Jayanta Singh
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (556 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Statistics
Cooperating objects (Computer systems)
Internet of things
Computer networks - Security measures
Computational Intelligence
Artificial Intelligence
Cyber-Physical Systems
Internet of Things
Mobile and Network Security
ISBN 981-9736-01-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Artificial Intelligence, Machine Learning, Big Data, Data Analytics -- Optimization in Ensemble Model for Weather Prediction -- 1 Introduction -- 2 Materials and Methods -- 2.1 The Dataset -- 2.2 Extreme Gradient Boosting (XGBoost) -- 2.3 Optimization Techniques Used in XGBoost -- 3 Results and Discussion -- 4 Conclusion -- References -- Spectrum Efficient Resource Allocation Using Deep Neural Network in Underlay Cognitive Radios -- 1 Introduction -- 2 Related Work -- 3 System Design -- 3.1 System Model -- 3.2 Problem Formulation -- 4 Proposed Scheme -- 4.1 Motivation -- 4.2 Assumptions -- 4.3 Proposed SERA Model -- 4.4 SERA Functioning -- 5 Performance Evaluation -- 5.1 System Model Configurations -- 5.2 Results -- 6 Conclusion -- References -- Fruit and Vegetable Recognition System Using Deep Transfer Learning Approach -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset Preparation -- 4 Experimental Results and Discussion -- 4.1 Experimental Setup and Data in Used -- 4.2 Comparison and Analysis of Results -- 5 Conclusion -- References -- A Comprehensive Investigation on the Performance of Traditional Machine Learning in Comparison to Deep Learning for Early Cardiovascular Disease Diagnosis -- 1 Introduction -- 2 Related Work -- 3 Approaches Used for the Study -- 4 Discussions and Analysis -- 5 Conclusion and Future Work -- References -- Hybrid-Multi-channel Deep Neural Network for Fake News Detection -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Datasets -- 3.2 Proposed Multi Channel Deep Neural Network Model -- 4 Hyper Tuning the Parameters of the Model -- 5 Results and Discussion -- 6 Conclusion and Future Scope -- References.
Integrated Gaussian-GLCM Butterfly Optimization with CNN (IGGBOCNN): A Hybrid Approach for Ovarian Cancer Classification in Medical Image Analysis -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- Enhancing Brain Tumor Detection Through Deep Learning: A Comparative Study of CNN and Pre-trained VGG-16 Models -- 1 Introduction -- 2 Background and Motivation -- 3 Related Work -- 4 Standard Methodology Used -- 4.1 Dataset Description -- 4.2 Classification Model -- 4.3 Performance Evaluation Matrices -- 5 Results and Discussions -- 6 Conclusion and Future Work -- References -- Towards Development of Machine Learning Models for Fake News Detection and Sentiment Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Empirical Results and Analysis -- 4.1 Setting up Experiments -- 4.2 Comparison and Analysis of Results -- 5 Conclusion -- References -- A Study on Measures Based on Overlapping Area for Interval Data -- 1 Introduction -- 2 Preliminaries on Interval Data -- 2.1 Interval -- 2.2 Representations of Intervals -- 2.3 Arithmetic of Intervals -- 3 Materials and Methods -- 3.1 Measures Used for Interval Data -- 3.2 Analysis of Desirable Properties of Different Measures Used for Interval Data -- 4 Results and Discussion -- 5 Conclusion -- References -- Application of Secure Data Transmission by Integrating QR Code with Visual Cryptography -- 1 Introduction -- 1.1 QR Code -- 1.2 Motivation -- 2 Literature Review -- 3 Proposed Methodology -- 4 Experimental Result and Performance Analysis -- 4.1 Merits of Proposed Methodology -- 5 Conclusion -- References -- Event Uncertainty for Twitter Data Using Thematic Context Vector -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 4 Experimentation -- 5 Results -- 6 Conclusion -- References.
A Brief Study of Prompting Techniques for Reasoning Tasks -- 1 Introduction -- 2 Related Work -- 2.1 LLM -- 2.2 Dataset -- 2.3 Basics of Prompt Principles -- 3 Prompting Techniques -- 3.1 Standard Few-Shot -- 3.2 Chain of Thought (CoT) -- 3.3 Zero Shot -- 3.4 Zero Shot CoT -- 3.5 Self-consistency -- 3.6 Least to Most -- 3.7 Active Prompt -- 3.8 Program of Thought (PoT) -- 3.9 Progressive Hint Prompting (PHP) -- 3.10 Plan and Solve (PS) -- 3.11 Tree of Thought (ToT) -- 3.12 Self-verification -- 4 Prompt- Example {Question-Solution} Task -- 5 Conclusion -- References -- Comparative Analysis of Negative Customer Review of Payment Apps: A Data Mining Approach -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Pre-processing -- 3.2 Exploratory Data Analysis -- 3.3 Word Cloud Analysis -- 4 Data Analysis -- 4.1 Data Pre-processing -- 4.2 Exploratory Data Analysis (EDA) -- 4.3 Word Cloud Analysis (WCA) -- 5 Results and Discussion -- 5.1 Word Cloud Analysis Results for GPay -- 5.2 Word Cloud Analysis Results for Paytm -- 5.3 Word Cloud Analysis Results for PhonePe -- 6 Conclusion -- 6.1 Annexure -- References -- A Transformer-Based Approach for Fruit Spoilage Identification -- 1 Introduction -- 2 Literature Survey -- 3 Materials and Methods -- 3.1 Dataset Preparation -- 3.2 Proposed Transformer-Based Spoilage Diagnosis System -- 4 Results and Discussions -- 4.1 Results of ViT for 10 Epochs -- 4.2 Results of ViT for 20 Epochs -- 4.3 Comparison with Reported Work -- 5 Conclusion -- References -- A Study on Performance of Mathematics, Programming, and Practical Courses Among Female Students from Technical Education Using a Deep-Learning-Based Interpretability Framework -- 1 Introduction -- 2 Related Works -- 3 Proposed Works -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References.
Efficient Handwritten English Word Detection with Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Problem Definition -- 4 Methodology -- 4.1 Data Collection -- 4.2 Preprocessing -- 4.3 Model Design -- 4.4 Training, Testing, and Validation -- 4.5 Post-Processing -- 4.6 Evaluation Metrics -- 5 Future Work -- 6 Conclusion -- References -- MuBDA: Multimodal Biometric Data Analysis for Gender Classification Using Deep Learning Techniques -- 1 Introduction -- 2 Related Works -- 2.1 Motivation -- 2.2 Significance of the Work -- 3 Proposed Methodology -- 3.1 Transfer-Learning Architectures -- 4 Experimental Results -- 4.1 Dataset Description -- 4.2 Implementation Details -- 4.3 Results and Discussion -- 4.4 Performance Evaluation Methods -- 4.5 Evaluation Results -- 4.6 Comparative Analysis -- 5 Conclusion -- References -- Audio Data Feature Extraction for Speaker Diarization -- 1 Introduction -- 2 Results -- 3 Implementation Process -- 3.1 Implementation of MFCC -- 3.2 Implementation of Male Spectrogram -- 3.3 Implementation of Spectral Contrast -- 3.4 Implementation of Chroma Feature -- 3.5 Implementation Steps for Tonnetz Feature -- 3.6 Implementation Steps for Zero-Crossing Feature -- 3.7 Implementation of Rhythm Feature -- 4 Methodology -- 4.1 Mel-Frequency Cepstral Coefficients (MFCCs) -- 4.2 Mel-Spectrogram -- 4.3 Spectral Contrast -- 4.4 Chroma Features -- 4.5 Tonnetz -- 4.6 Zero-Crossing Rate -- 4.7 Rhythm Features -- 5 Conclusion -- References -- Cyber Security and Forensic, Network and Mobile Security -- Anomalous Network Packet Detection: A Review of Attacks, Datasets and Techniques -- 1 Introduction -- 2 Review Paper Framework -- 3 Intrusion Detection: Background Analysis -- 3.1 Categories -- 3.2 Implementation -- 3.3 Challenges -- 4 Performance Metrics -- 4.1 Detection Mechanisms -- 5 Review of Attacks -- 6 Comprehensive Review.
6.1 Period 1: Before 2000 -- 6.2 Period 2: 2001-2010 -- 6.3 Period 3: 2011-2015 -- 6.4 Period 4: 2016-2019 -- 6.5 Period 5: 2020-2023 -- 7 Review of Standard Datasets -- 8 Conclusion -- References -- Energy-Efficient Encounter, Buffer and Contact Duration-Based Routing Protocol in Opportunistic Networks -- 1 Introduction -- 2 Related Works -- 3 Proposed Energy-Efficient-EBC (E-EBC) Model -- 4 Simulation Results -- 5 Conclusion -- References -- IoT Under Attack: Designing Techniques for Mitigating Energy-Oriented DDOS Attacks on Smart Home Networks -- 1 Introduction -- 1.1 Motivation -- 1.2 Problem Statement -- 1.3 Research Objective -- 2 Background -- 2.1 Internet of Things (IoT) Network -- 2.2 Distributed Denial of Services (DDOS) Attack -- 2.3 Energy-Oriented DDoS (E-DDoS) Attack -- 3 Related Work -- 3.1 Defenses for Traditional DDoS Attacks -- 3.2 Existing Approaches for E-DDoS Attacks -- 3.3 Limitations of Current Solutions -- 3.4 Research Gaps -- 4 Proposed Smart Power Management System -- 4.1 System Design and Architecture -- 4.2 Key Components -- 4.3 Detection and Mitigation Process -- 5 Implementation and Evaluation -- 5.1 Simulation Setup -- 5.2 Attack Modeling -- 5.3 Defense Mechanism -- 5.4 Analyzing Reasons of Proposed System -- 5.5 Quantitative Results -- 6 Summary of Work -- 7 Future Directions -- 8 Conclusion -- References -- SEPA-CRT: SDN Enabled Direction Based Privacy-Preserving Authentication Scheme Using Chinese Remainder Theorem (CRT) for VANET -- 1 Introduction -- 2 Related Works -- 3 Proposed Scheme -- 3.1 System Initialization -- 3.2 Authentication -- 4 Security Analysis -- 4.1 Informal Security Analysis -- 4.2 Formal Security Analysis -- 5 Performance Analysis -- 6 Conclusion -- References -- IoT Network Intrusion Detection Using Federated Learning -- 1 Introduction -- 1.1 Motivation -- 1.2 Problem Definition.
2 Related Work.
Record Nr. UNINA-9910878058703321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology : NICE-DT 2023 / / edited by Sri Niwas Singh, Saurov Mahanta, Yumnam Jayanta Singh
Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology : NICE-DT 2023 / / edited by Sri Niwas Singh, Saurov Mahanta, Yumnam Jayanta Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (724 pages)
Disciplina 060
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Quantitative research
Internet of things
Computer networks - Security measures
Computational Intelligence
Artificial Intelligence
Data Analysis and Big Data
Internet of Things
Mobile and Network Security
ISBN 981-9916-99-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Quality of Service (QoS)-driven Edge Computing and Smart Hospitals: A Vision, Architectural Elements and Future Directions -- Real Time Face Mask Detector with Multi-class Classification using Deep Neural Networks -- Data Correlation Analysis to Curb Road Accidents -- Speech Recognition via Machine Learning in Recording Studio -- Clustering-Based Filter Pruning Approach for Efficient ConvNets -- SMS and E-mail Spam Classification using Natural Language Processing and Machine Learning -- Detecting Malware in Windows Environment Using Machine Learning -- Fake News Detection using LSTM Based Deep Learning Approach and Word Embedding Feature Extraction -- Safe Distance Monitoring for COVID-19 Using YOLOv3 Object Recognition Paradigm -- Machine Learning Based Depth of Anesthesia Estimation using Spectral and Statistical Features of EEG.
Record Nr. UNINA-9910734861403321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui