top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Systems for Intelligent Systems [[electronic resource] ] : Proceedings of ISBM 2022 / / edited by Chakchai So-In, Narendra D. Londhe, Nityesh Bhatt, Meelis Kitsing
Information Systems for Intelligent Systems [[electronic resource] ] : Proceedings of ISBM 2022 / / edited by Chakchai So-In, Narendra D. Londhe, Nityesh Bhatt, Meelis Kitsing
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (649 pages)
Disciplina 006.3
Collana Smart Innovation, Systems and Technologies
Soggetto topico Engineering—Data processing
Business information services
Artificial intelligence
Data Engineering
Business Information Systems
Artificial Intelligence
IT in Business
ISBN 981-19-7447-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Social Media as Communication-Transformation Tools -- Bi directional DC-DC converter-based Energy Storage Method for Electric Vehicles -- Design of Smart Irrigation System in Sone Command Area Bihar for Paddy Crop -- A Footstep to Image Deconvolution Technique for the both Known and Unknown Blur Parameter -- Secured Monitoring of Unauthorized UAV by Surveillance Drone Using NS2.
Record Nr. UNINA-9910767584803321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 4
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 4
Autore Senjyu Tomonobu
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2024
Descrizione fisica 1 online resource (518 pages)
Altri autori (Persone) So-InChakchai
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 981-9713-29-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Analytics of Machine Learning in Healthcare Industries -- 1 Information -- 2 Machine Learning in Healthcare -- 3 Analytical Tools -- 4 Machine Learning Approaches in Healthcare -- 5 Analytics Market Size -- 6 Conclusion -- References -- Design and Implementation of First-In-First-Out (FIFO) Buffer for Distributed Load Balancing Systems -- 1 Introduction -- 2 FIFO Working and Its Architecture -- 3 Design Implementation and Simulation Results -- 4 Conclusion -- References -- Artificial Neural Network-Based Forecasting to Anticipate the Indian Stock Market -- 1 Introduction -- 2 Description -- 3 Discussion and Evaluation -- 3.1 Theory of LM -- 3.2 Theory of SCG -- 3.3 Theory of BRT -- 4 Discussion of Results -- 4.1 Performance Plots -- 4.2 Regression Plots -- 5 Error Histograms -- 6 Conclusion and Future Work -- References -- A Framework for Real-Time Crowd Behaviour Monitoring System Based on Human Activity Recognition in Surveillance Videos -- 1 Introduction -- 2 Literature Review -- 3 Research Gaps and Objective -- 4 Proposed Framework -- 5 Discussion -- 6 Integration Plans -- 7 Conclusion -- References -- STM32-Based Home Automation and Energy Monitoring System with TFT Display -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Implementation -- 5 Costing and Scalability -- 6 Conclusion -- References -- Smart Rover for Farm Pesticide Spraying -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Result -- 5 Areas of Improvement and Further Research -- 6 Conclusion -- References -- Emergency Alert and Adaptive Traffic Signal System Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Adaptive Traffic Signal Systems for Emergency Vehicle -- 3.2 Emergency Vehicle Alert Systems -- 3.3 RFID Tag and GSM Kit.
3.4 Use of ML in the Proposed System -- 4 Conclusion -- References -- Design of a Chatbot for Relieving Academic Stress in Adolescent Students -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 3.1 Interviews -- 3.2 Proposed Framework -- 3.3 Prototyping the Chatbot -- 3.4 Design of the Smartphone Application -- 3.5 Testing -- 4 Results -- 4.1 Interview Findings -- 4.2 Proposed Framework -- 4.3 Conceptualisation of a Prototype Chatbot -- 4.4 Design and Development -- 4.5 Evaluation of the Smartphone Application -- 5 Discussion -- 5.1 Learnings from Proposed Framework -- 5.2 Insights from Chatbot Development -- 5.3 Smartphone Application Development -- 5.4 Testing -- 5.5 Research Contribution -- 5.6 Limitations and Future Scope -- 6 Conclusion -- References -- Mental Health Predictive Analysis Using Machine-Learning Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Materials and Methods -- 3.1 Classification Models -- 3.2 Dataset -- 3.3 Performance Measures -- 4 Methodology -- 5 Experimental Setup and Results -- 6 Conclusion -- References -- Crime Prediction and Prevention Using Design Intervention and Artificial Intelligence -- 1 Introduction -- 1.1 Literature Review -- 2 Methodology -- 2.1 Proposed System -- 2.2 Model Application -- 2.3 Model Implementation -- 3 Results and Discussions -- 4 Conclusion -- References -- Enhancing Dysarthria Detection: Harnessing Ensemble Models and MFCC -- 1 Introduction -- 1.1 Research Objective -- 2 Literature Review -- 2.1 Research Gap and Limitations -- 3 Proposed Work -- 3.1 Dataset -- 3.2 Audio Feature Extraction -- 3.3 Data Pre-processing -- 3.4 Classification -- 4 Results and Discussion -- 4.1 Discussion and Comparative Study -- 5 Conclusion -- References -- A Deep Learning Approach for Evaluating Children's Handwriting -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology.
3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Model Architecture -- 3.4 Training -- 3.5 Evaluation -- 3.6 User Interface -- 3.7 Practical Implementation and Scalability -- 3.8 User Interface Design and User Experience -- 4 Model Implementation -- 4.1 Architecture Selection -- 4.2 Flattening Layers and SoftMax Layer -- 4.3 Training Process -- 4.4 Achieved Results -- 4.5 Rationale for Selection -- 5 Performance Analysis -- 5.1 K-Fold Cross-Validation -- 5.2 Model Performance Evaluation Metrics -- 5.3 Real-Time Model Inference -- 5.4 Results -- 6 Conclusions and Future Scope -- References -- Detection of Online Fake Review Using Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Deep Learning -- 2.2 Convolution Neural Network (CNN) -- 3 Proposed Method -- 3.1 Recurrent Neural Networks (RNN) -- 3.2 Convolutional Long Short-Term Memory (CLSTM) -- 4 Experimental Setup and Result Analysis -- 4.1 Data Balancing -- 4.2 Confusion Matrix -- 5 Conclusion -- References -- Deep Learning-Based Object Detection, Face Recognition, and Tracking Support Model for Visually Challenged -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Model -- 3.1 Object Detection -- 3.2 Face Recognition and Emotion Detection -- 3.3 GPS and GSM Module -- 4 Hardware Specifications -- 5 First Section Introduction -- 5.1 Qualitative Results -- 5.2 Quantitative Results -- 6 Conclusion and Future Work -- References -- Wi-Fi Inter-Network Simulation and Performance Analysis Using QualNet -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Simulation Environment and Tools -- 3.2 Network Topology Design -- 3.3 Simulation Scenarios and Parameters -- 4 Network Design and Setup -- 4.1 Architecture and Network Layout -- 4.2 Configuration and Interconnection -- 4.3 Traffic Models -- 5 Simulation and Data Collection -- 5.1 Scenario Setup.
5.2 Simulation Run: Simulation Control -- 5.3 Data Collection and Analysis -- 5.4 Multiple Runs and Variations -- 5.5 Post-simulation Analysis -- 5.6 Iterative Process -- 6 Results and Analysis -- 6.1 Presentation of Results -- 6.2 Analysis in Relation to Research Objectives -- 6.3 Comparison of Network Configurations and Scenarios -- 7 Conclusion -- 7.1 Key Takeaways and Contributions -- 7.2 Importance of Using QualNet -- 7.3 Future Research Directions -- References -- Location-Based QR Attendance Application -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Execution of Application -- 4.1 Faculty Module -- 4.2 Student Module -- 5 Tools and Technology -- 5.1 Visual Studio Code -- 5.2 Flutter SDK -- 5.3 Firebase -- 6 System Design -- 6.1 Login/Register -- 6.2 Faculty Module -- 6.3 Student Module -- 6.4 Student Attendance Data (Faculty) -- 7 Future Scope -- 8 Conclusion -- References -- Optimizing Endurance in Fixed Wing UAVs -- 1 Introduction -- 2 Literature Review -- 2.1 Design of a Low-Cost Fixed Wing UAV -- 2.2 Yaw, Pitch, and Roll Controller Design for Fixed Wing UAV Under Uncertainty and Perturbed Condition -- 2.3 Development of a Fixed Wing Unmanned Aerial Vehicle (UAV) for Disaster Area Monitoring and Mapping -- 2.4 Overview of Unmanned Aerial Vehicles -- 2.5 Comprehensive Analysis of Unmanned Aircraft System Technologies for Urban Operations -- 2.6 Energy-Efficient Trajectory Design for UAV-Aided Maritime Data Collection in Wind -- 2.7 Design and Fabrication of a Fixed Wing Unmanned Aerial Vehicle (UAV) -- 2.8 V-Tail Stalling at Combined Angles of Attack and Sideslip -- 2.9 Battery Package Design Optimization for Small Electric Aircraft -- 3 Methodology -- 4 Design of UAV -- 5 Conclusion -- References -- StoryWood-Story and Post Maker Application -- 1 Introduction -- 2 Literature Review -- 3 Proposed System.
4 Execution of Application -- 5 Tools and Technology -- 5.1 Android Studio and Visual Studio Code -- 5.2 Firebase -- 5.3 Flutter SDK -- 5.4 Dart SDK -- 6 System Diagram -- 7 Future Scope -- 8 Conclusion -- References -- A Survey on Imparting Education Using Augmented Reality -- 1 Introduction -- 2 Literature Survey -- 2.1 Augmented Reality Technologies in Education -- 2.2 Mobile Augmented Reality in Education -- 2.3 Augmented Reality in Education: Advantages and Applications -- 2.4 Effectiveness of Augmented Reality on Students with Special Disability in Higher Education -- 2.5 Effectiveness of Augmented Reality Environments on Individuals with Special Education Needs -- 3 Methodology -- 4 Application of Augmented Reality in Education Sector -- 5 Research Review -- 6 Conclusion -- References -- Secure Access Firearm -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Problem Statement -- 1.3 Objectives -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 4.1 Biometric Sensor Integration -- 4.2 Waterproof Camera Installation -- 4.3 Biometric Sensor Integration -- 4.4 Backend Infrastructure Setup -- 4.5 Emotional Analysis Algorithm Integration -- 5 Emotional Analysis Algorithm -- 5.1 Convolution Operation -- 5.2 Activation Function (ReLU) -- 5.3 Max-Pooling Operation -- 5.4 Fully Connected Layer -- 5.5 Categorical Cross-Entropy Loss -- 5.6 Gradient Descent Update Rule -- 6 Flowchart -- 7 Results and Discussion -- 8 Conclusion -- References -- Facial Expression Recognition Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Datasets -- 4 Proposed Method -- 5 Experiments and Results -- 6 Conclusion -- References -- Attitude Control of Satellites with Reaction Wheels and Its Formation Keeping -- 1 Introduction -- 2 Modeling -- 2.1 Mathematical Modeling -- 3 Results with PID and LQR.
4 Formation Keeping and Its Control.
Record Nr. UNINA-9910857793803321
Senjyu Tomonobu  
Singapore : , : Springer Singapore Pte. Limited, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 2
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 2
Autore Senjyu Tomonobu
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (480 pages)
Altri autori (Persone) So-InChakchai
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819713233
9789819713226
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- YOLOv8: Advancements and Innovations in Object Detection -- 1 Introduction -- 2 Objectives -- 3 Literature Survey -- 4 YOLO V8 Process -- 5 Experiments and Results -- 6 Conclusion -- References -- Anxiety and Depression Red Flag Marker in Social Media -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Data Gathering -- 3.2 Data Preprocessing -- 3.3 Creating TF-IDF Matrix -- 3.4 Choosing the Optimal Model -- 4 Result -- 5 Application Development -- 6 Conclusion -- References -- Object Detection and Tracking Approach for Traffic Monitoring -- 1 Introduction -- 2 Related Work -- 3 Inferencing on Pretrained Weights -- 3.1 YOLOv7 -- 3.2 Mask R-CNN -- 4 Retraining -- 4.1 Inferencing on Retrained Weights -- 5 Implementation of Tracking Approach -- 6 Results and Conclusion -- References -- Detection of Malnutrition in Children Using Deep Learning Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Preprocessing Images Are Preprocessed Using Operations -- 4 ResNet18 Model and Transfer Learning -- 5 Results and Discussion -- 6 Conclusion -- References -- Multilingual Indian COVID-19 Chatbot -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Data Pre-processing -- 3.2 Keyword Extraction -- 3.3 Telegram API -- 3.4 Translation Tool -- 3.5 BM25 -- 3.6 uSIF -- 3.7 BioBERT -- 3.8 Dockerization and Cloud Implementation -- 4 System Design -- 5 Results and Analysis -- 6 Conclusion -- References -- Blockchain, IoT, and Smart Grids Challenges for Energy Systems -- 1 Introduction -- 2 Materials and Methods -- 3 Conclusions -- References -- IAM Dataset-Based Author Identification via Convolutional Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Dataset -- 4 Custom Model Selection -- 4.1 Author Net V1 -- 4.2 Author Net V2.
4.3 Author Net V3 -- 5 Author Net V1 -- 5.1 Adam Optimizer -- 5.2 Adadelta Optimizer -- 5.3 Adagrad Optimizer -- 5.4 RMSprop Optimizer -- 6 Author Net V2 -- 6.1 Adam Optimizer -- 6.2 Adadelta Optimizer -- 6.3 Adagrad Optimizer -- 6.4 Rmspropoptimizer -- 7 Author Net V3 -- 7.1 Adam Optimizer -- 7.2 Adadelta Optimizer -- 7.3 Adagrad Optimizer -- 7.4 RMSprop Optimizer -- 8 Conclusion -- References -- Design of Low Power Booth Multiplier with Enhance Pre-logic Mechanism Using Verilog -- 1 Introduction -- 2 Related Works -- 3 The Proposed Design of Multiplier -- 4 Simulation Results and Analysis -- 5 Limitation and Challenges -- 6 Conclusion and Future Work -- References -- Novel Statistical Glaucoma Prediction Algorithm Based on Spectral Analysis -- 1 Background and Summary -- 2 Materials -- 3 Methods and Observation -- 3.1 Noise Reduction -- 3.2 Randomizer -- 3.3 Optic Disc Segmentation -- 3.4 Spectral Analysis -- 3.5 Application of Statistical Methods -- 3.6 Manual Analysis and Threshold Boundary Detection -- 3.7 Favourable Judgement Algorithm (FJA) -- 3.8 Out of Bound Algorithm (OOB) -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- A Comparative Study of Audio Source Separation Techniques on Indian Classical Music: Performance Evaluation and Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Median Filtering -- 3.2 Non-negative Matrix Factorization -- 3.3 Modified Lead Percussion Source Separation -- 3.4 Kernal Additive Modeling -- 4 Results and Comparison -- 4.1 Harmonic Ratio -- 4.2 Processing Time -- 5 Conclusion -- References -- A Hybrid FAST-LIO2 and SC-A-LOAM SLAM Algorithm for  Autonomous Vehicles -- 1 Introduction -- 2 Methodology -- 3 Overview of FAST-LIO2 and SC-A-LOAM Algorithms -- 3.1 Fast Direct LiDAR-Inertial Odometry (FAST-LIO2) -- 3.2 Scan Context Advanced Lidar Odometry and Mapping (SC-A-LOAM).
4 Results and Discussion -- 5 Conclusion -- References -- Real-Time ATM Booth Suspicious Behavior Monitoring System -- 1 Introduction -- 2 Literature Survey -- 3 Related Works -- 4 Methodology -- 4.1 Pose Estimation -- 4.2 Gaze Tracking -- 4.3 Multiple People Detection -- 4.4 Face Covering Detection -- 5 Overview and Workflow Integration -- 6 Experimental Modeling and Analysis -- 7 Discussion on Obtained Results -- 8 Ethical Considerations and Privacy -- 9 Conclusion -- References -- Exploring the Balance Between Automated Decision-Making and Human Judgment in Managerial Contexts -- 1 Introduction -- 2 Literature Review -- 2.1 Artificial Intelligence in the Present World -- 2.2 History of Artificial Intelligence -- 2.3 AI in  Future -- 3 Research Gap -- 4 Objectives -- 5 Methodology -- 6 Artificial Intelligence as a Tool in Managerial Decision-Making -- 6.1 Focus on Consumer Behavior -- 6.2 Decision Augmentation -- 6.3 Decision Support System -- 7 Suggestions -- 8 Conclusion -- References -- SmartCrop: An IoT-Powered Crop Health Monitoring System -- 1 Introduction -- 2 Problem Statement -- 3 Methodology -- 3.1 Data Collection -- 3.2 Sensor Integration -- 3.3 Data Analysis -- 3.4 Efficient Irrigation -- 3.5 Motion Detection -- 3.6 Remote Monitoring -- 3.7 Visualization -- 4 Results and Discussion -- 4.1 Eco System for Monitoring Crop Health -- 4.2 Detection of Insects and Animals Using Motion Sensor -- 4.3 Automatic Operation of Water Pump -- 5 Conclusion -- References -- Gaussian and Impulse Noise Identification from Image Using Frequency Domain Analysis -- 1 Introduction -- 2 Literature Review -- 3 Dataset Used in Experiment -- 4 Methodology -- 4.1 Algorithm -- 5 Result -- 6 Conclusion -- References -- Predictive Paradigm: AI-Driven Social Media Analysis for Real Estate Sales Forecasts -- 1 Introduction -- 2 Related Works -- 3 Methodology.
3.1 Machine Learning Models -- 4 Experimental Analysis and Discussion -- 4.1 Data Collection -- 4.2 Simulation Results -- 5 Conclusion -- References -- E-Governance and Digital Innovation-Indian Perspective -- 1 Overview to Digital Administration Plan -- 2 Digital Payments in India: A Step Toward Digitalization -- 2.1 Overview -- 2.2 Transitioning from Cash to Low-Cash -- 2.3 The Rise of Digital Payments -- 3 Digital Administration Substructure Setup -- 4 Challenges in Digital India -- 5 Conclusion -- References -- IoT-Based Smart Car Parking Agent Using Raspberry Pi -- 1 Introduction -- 1.1 Internet of Things -- 2 Background Work -- 2.1 Related Work -- 2.2 Component Selection -- 3 System Configuration -- 3.1 Proposed Methodology -- 3.2 System Setup -- 3.3 System Implementation -- 3.4 System Workflow -- 4 Dependability to Boost the System -- 5 Methodology -- 6 Experimental Result -- 7 Conclusion -- References -- Object Detection and Trajectory Prediction of Unmanned Aerial Vehicle Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 YOLO -- 3.2 Comparative Analysis of YOLO Versions -- 3.3 DeepSORT -- 3.4 Custom Dataset -- 3.5 Object Detection Using Deep Learning -- 4 Result -- 5 Conclusion -- References -- A Survey of Automatic Number Plate Recognition and Parking Management System -- 1 Introduction -- 2 Background -- 3 Main Body -- 3.1 Number Plate Localization -- 3.2 Character Segmentation -- 3.3 Character Recognition and Syntax Checking -- 3.4 Databases Systems -- 4 Discussions -- 5 Conclusions -- References -- Immersive Experiences and Brand Recall in the Metaverse: A Comparative Analysis of Virtual Reality and 3D Interfaces -- 1 Introduction -- 2 Theoretical Background and Literature Review -- 2.1 Immersive Technologies and Brand Placements -- 2.2 Hypotheses Development -- 3 Methodology -- 3.1 Pre-test.
3.2 Participant Selection and Recruitment -- 3.3 Experimental Design -- 3.4 Brand Presentation and Control -- 3.5 Data Collection Procedures -- 3.6 Measures -- 4 Results -- 5 Discussion -- 5.1 Theoretical Contributions -- 5.2 Implications for Marketing Firms -- 6 Limitations and Scope for Future Research -- References -- Analysis and Prediction of the Sentiments of the WhatsApp Chat Using Sentiment Analysis -- 1 Introduction -- 2 Project Description and Objectives -- 2.1 Research Objectives -- 3 Methodology -- 4 Expected Output -- 5 Significance and Applications -- 6 Output -- 7 Conclusion -- References -- Driving Factors of Mobile Payment Adoption: A Focus on Gen-Z Consumers -- 1 Introduction -- 2 Literature Review -- 2.1 Theoretical Background -- 2.2 The Evolution of Payment Methods in India -- 2.3 Mobile Payment Interface -- 2.4 Hypotheses Development -- 3 Research Methodology -- 3.1 Research Design -- 3.2 Sample Size and the Method of Sampling -- 3.3 Data Collection Instrument -- 4 Results -- 4.1 Reliability and Validity -- 4.2 SEM Analysis -- 5 Discussion -- 6 Conclusion -- References -- Review on Cybersecurity and Techniques -- 1 Introduction -- 1.1 The Real Meaning of Cybersecurity -- 1.2 History of Cyber Security -- 2 Overall Study of Cybersecurity -- 2.1 Who is a Hacker? -- 2.2 How Does Cybersecurity Work? -- 2.3 What Are the Types of Cyber Security Threats? -- 2.4 Domains of Cyber Security -- 2.5 Motives of Cybercrimes -- 2.6 Trends Changing in Cyber Security -- 2.7 Roles of Social Media Platform in Cyber Security -- 3 CIA Model -- 3.1 Confidentiality -- 3.2 Integrity -- 3.3 Availability -- 4 Advantages and Disadvantages of Cyber Security -- 4.1 Advantages of Cybersecurity -- 4.2 Disadvantages of Cyber Security -- 5 Future Scope of Cyber Security -- 6 Conclusion -- References.
An Adaptive Federated Learning Approach for Efficiency and Privacy Preservation of Dynamic Network of IoT.
Record Nr. UNINA-9910864190603321
Senjyu Tomonobu  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 5
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 5
Autore Senjyu Tomonobu
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (486 pages)
Altri autori (Persone) So-InChakchai
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819713134
9789819713127
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- A Structure for Forecasting Stomach Cancer Using Deep Learning and Advanced Tongue Characteristics -- 1 Introduction -- 2 Related Works -- 3 Methods -- 3.1 Date Sources -- 3.2 Date Preprocess -- 3.3 Tongue Image Segmentation -- 3.4 Performance Metrics -- 4 Results -- 5 Conclusion -- References -- Smart Rack System Using AI -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Extraction from Internet -- 3.2 Data Annotations -- 3.3 Model Configuration -- 3.4 Model Training and Model Evaluation -- 3.5 Output -- 4 Result and Conclusion -- References -- Enhancing Pneumonia Detection Accuracy Through ResNet-Based Deep Learning Models and Ensemble Techniques: A Study Using Chest X-Ray Images -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 Data Preprocessing -- 3 Model -- 3.1 ResNet -- 3.2 Custom CNN Model -- 4 Optuna for Hyperparameter Tuning -- 5 Ensembling -- 6 Results and Analysis -- 7 Conclusion -- 8 Future Work -- References -- POLISENTIX: Political Sentiment Analyzer -- 1 Introduction -- 1.1 Background and Motivation -- 2 Review of Literature -- 3 Design of the Platform -- 4 Working Methodology -- 4.1 Design of the Website -- 4.2 Data Collection -- 4.3 Pre-processing -- 4.4 Training Data -- 4.5 Sentiment Analyzer -- 4.6 Data Visualization -- 4.7 Output -- 5 Result Analysis -- 6 Conclusion -- References -- An Interactive Smartphone Application to Manage Youth Loneliness -- 1 Introduction -- 2 Methodology -- 2.1 Interviews and Surveys -- 2.2 Literature Review and Market Study -- 2.3 Giga Mapping -- 2.4 Framework Development -- 3 Result -- 3.1 Interview Findings -- 3.2 Survey Findings -- 3.3 Matrix Ideation and Concept Generation -- 3.4 Proposed Framework -- 3.5 Mobile App -- 3.6 AR Companion Development -- 4 Discussion -- 5 Research Contribution -- 6 Conclusion.
References -- The Integral Significance of Data Science in Startup Ecosystems -- 1 Introduction -- 2 Literature Review -- 3 Analysis -- 4 Need for Data Science -- 5 The Process of Validity -- 6 Conclusion and Discussion -- References -- Comparing Object Detection Models for Public Safety -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 YOLOv6 -- 3.3 Detectron2 -- 3.4 Model Implementation -- 4 Results -- 4.1 YOLOv6 -- 4.2 Detectron2 -- 5 Conclusion and Future Work -- References -- Evolution of ChatGPT and Different Language Models: A Review -- 1 Introduction -- 2 Background -- 3 Literature Review -- 4 Working and Method Used in ChatGPT -- 5 New Versions of Large Language Models -- 6 Different Methodologies Used -- 7 Challenges -- 8 Conclusion -- References -- Emotion Detection for the Blind Using Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 4 Results and Discussion -- References -- Impact of Feature Normalization Techniques for Recognition of Speech for Mathematical Expression -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussions -- 5 Comparative Analysis -- 6 Conclusion -- References -- Anomaly Prediction in Real-Time Water Flow Data-Machine Learning Versus Statistical Models -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology and Implementation -- 3.1 Simple Moving Average (SMA) -- 3.2 Weighted Moving Average (WMA) -- 3.3 Exponential Weighted Moving Average -- 3.4 K-Nearest Neighbors (KNNs) -- 3.5 Isolation Forest -- 3.6 Support Vector Machine (SVM) -- 4 Analysis and Results -- 5 Conclusion and Future Scope -- References -- Smart IoT Devices: An Efficient and Elegant Revolution Using Smart Switches -- 1 Introduction -- 1.1 IoT Background -- 1.2 The Sinric Pro Platform -- 1.3 Sinric and ESP8266 Integration -- 2 Problem Statement.
3 Literature Review -- 4 Methodology and Implementation -- 4.1 System Design and Prototyping -- 4.2 IoT Platform Integration -- 4.3 Real-World Testing and Iteration -- 4.4 Security and Privacy -- 4.5 User Experience and Interface Design -- 4.6 Final Deployment and Training -- 5 Block Diagram -- 6 Results -- 6.1 Efficient Energy Consumption -- 6.2 Voice Assistant Integration -- 6.3 Security Enhancements -- 6.4 Aesthetic Design and User Experience -- 6.5 Comparative Analysis -- 7 Conclusion -- References -- Malware Detection and Classification with Machine Learning Algorithms -- 1 Introduction -- 2 Related Work -- 3 Data Collection -- 4 Methodology -- 5 Results and Discussion -- 6 Conclusion -- References -- Analyzing the Customer Sentiment of Reels and Short Video Viewers of Facebook Using Social Media Analysis -- 1 Introduction -- 2 Theoretical Background and Hypothesis Development -- 2.1 SOR Theory -- 2.2 Stimulus -- 2.3 Organism -- 2.4 Response -- 3 Research Methodology -- 4 Data Analysis and Results -- 4.1 Reliability and Validity Testing -- 4.2 Path Diagram of Research Model -- 5 Discussions of the Results -- 6 Implication -- 7 Conclusion -- 8 Limitation and Future Scope -- References -- Image Forgery Detection Using Machine Learning -- 1 Introduction -- 2 Methodology -- 2.1 ELA -- 3 Results and Discussion -- 4 Future Scope -- 5 Conclusion -- References -- Text-to-Speech Conversion Using Concatenative Approach for Gujarati Language -- 1 Introduction -- 2 Gujarati Language for Speech -- 3 Literature Review -- 4 Speech Synthesis Process -- 4.1 Articulatory Synthesis -- 4.2 Formant Synthesis -- 4.3 Concatenative Synthesis -- 5 Implementation of Concatenation Technique -- 6 Conclusion -- References -- Transfer Learning for Speaker Verification with Short-Duration Audio -- 1 Introduction -- 2 Literature Review -- 3 Methodology.
3.1 Short-Duration Audio -- 3.2 Data Representation -- 3.3 Process Architecture -- 3.4 Stages of Verifying the Speaker's Identity -- 4 Implementation -- 4.1 Create a Virtual Environment -- 4.2 Enroll New Users Using an Audio File -- 4.3 Verify the User's Enrollment -- 4.4 Deploy in Streamlit -- 5 Analysis and Results -- 6 Conclusion -- References -- Demystifying Complex Algorithms: A Visual Guide Through the DSA Visualizer -- 1 Introduction -- 2 Motivation -- 3 Analysis of DSA Visualization Application -- 4 Methodology for DSA Visualization -- 5 System Application Design -- 6 Proposed Flow of Model -- 7 Visualization and Interface Designs -- 8 Result Analysis -- 9 Conclusion and Future Research -- References -- Late Leaf Spot Detection and Its Effect on Pod Quality of Groundnut Plants Using Deep Neural Networks: A Review -- 1 Introduction -- 1.1 Motivation -- 1.2 Late Leaf Spot -- 2 Literature Survey -- 2.1 Accuracy and Efficiency of Image Classification in Identifying Various Diseases in Crops -- 2.2 Plant Pod Quality and Yield Prediction -- 2.3 Advanced Methods for Assessing Disease Severity -- 2.4 Assessing Plant Disease Control: Manual Solutions Versus Machine Learning Techniques -- 3 Research Scope -- 4 Conclusion -- References -- An Inventory of Breast Cancer: A Comprehensive Approach -- 1 Introduction -- 2 Screening Modalities -- 2.1 Mammography -- 2.2 Histopathology -- 2.3 Ultrasound -- 2.4 Conclusion -- References -- An Improved Method of Phishing URL Detection Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Dataset Preparation -- 3.2 Data Preprocessing -- 3.3 Training and Evaluation -- 4 Implementation and Deployment -- 4.1 Supervised Machine Learning Algorithms Used -- 4.2 Model Deployment -- 4.3 User Interface -- 4.4 DNS Records -- 5 Analysis and Findings -- 6 Results -- 7 Conclusions.
8 Future Scope -- References -- Comparing Effectiveness of Statistical Versus Deep Learning for Time Series Forecasting -- 1 Introduction -- 2 Background -- 2.1 Time Series and Forecasting Definitions -- 2.2 Deep Learning Models for Time Series -- 2.3 Statistical Models for Time Series -- 3 Literature Review -- 4 Methodology -- 4.1 Hyperparameters -- 4.2 Datasets -- 5 Results -- 5.1 Evaluations Measures -- 5.2 Experimental Results -- 6 Conclusion -- References -- Development of Metaverse-Based Experiential Learning Platform to Enhance Shape Recognition Skills in Autistic Children -- 1 Introduction -- 2 Related Works -- 3 Framework of the Proposed Methodology -- 4 Evaluation and Outcome of Proposed Platform -- 5 Conclusion -- References -- FinTech for E-Governance and MSME: Leveraging FinTech for Inclusive Digital Payments in Governance of MSME -- 1 Introduction -- 2 Literature Review -- 2.1 Theoretical Framework -- 2.2 Hypothesis -- 3 Research Methodology -- 3.1 Application of Research Tool on Conceptual Model -- 3.2 Sample Size Calculations -- 3.3 Sample Selection -- 4 Data Analysis and Interpretation -- 5 Conclusion -- References -- Learning Module for Visually-Challenged Children in the Post-covid World -- 1 Introduction -- 2 Related Works -- 2.1 Literature Review -- 2.2 Market Study -- 3 Methods -- 3.1 Case Study -- 3.2 Interviews -- 3.3 Framework Development -- 3.4 Prototype Development -- 3.5 App Development -- 4 Results -- 4.1 Case Study Insights -- 4.2 Interview Findings -- 4.3 Proposed Framework -- 4.4 Prototype Development -- 4.5 Smartphone Application Development -- 5 Discussion -- 5.1 Research Contribution -- 5.2 Stakeholder Analysis -- 5.3 Implementation Framework -- 5.4 Limitations and Future Scope -- 6 Conclusion -- References -- Learning Rate Scheduler for Multi-criterion Movie Recommender System -- 1 Introduction.
1.1 Recommender System.
Record Nr. UNINA-9910865262703321
Senjyu Tomonobu  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 3
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 3
Autore Senjyu Tomonobu
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (515 pages)
Altri autori (Persone) So-InChakchai
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819713264
9789819713257
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- A Comprehensive Analysis of Machine Learning Models for IDS -- 1 First Section -- 1.1 Introduction -- 2 Related Work -- 3 Experimental Setup -- 3.1 Dataset -- 3.2 Machine Learning Algorithms -- 3.3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- An Overview of Artificial Intelligence Applications in Cybersecurity Domains -- 1 Introduction -- 2 Vulnerability Assessment and Penetration Testing (VAPT) -- 2.1 Information -- 2.2 Tools Used in VAPT -- 2.3 Example -- 2.4 Challenges and Drawbacks -- 2.5 Applications of AI in VAPT -- 3 Security Operations Center (SOC) -- 3.1 Information -- 3.2 Tools Used in SOC -- 3.3 Examples -- 3.4 Challenges and Drawbacks -- 3.5 Use of AI in SOC -- 4 Threat Intelligence and Malware Analysis -- 4.1 Information -- 4.2 Tools Used in Threat Intelligence and Malware Analysis -- 4.3 Example -- 4.4 Challenges and Drawbacks -- 4.5 Use of AI in Threat Intelligence and Malware Analysis -- 5 Digital Forensics -- 5.1 Information -- 5.2 Tools Used in Digital Forensics -- 5.3 Example -- 5.4 Challenges and Drawbacks -- 5.5 Use of AI in Digital Forensics -- 6 Conclusion -- References -- Enhancing Security in Wireless Communications Through Blockchain and Smart Contracts: A Comprehensive Study -- 1 Introduction -- 2 Related Work -- 3 Research Gaps Identified -- 4 Research Objectives -- 5 Research Methodology -- 6 Significance of the Research -- 7 Conclusion -- References -- Racist and Abusive Memes Classification Using Deep Learning Techniques -- 1 Introduction -- 2 Background -- 2.1 BERT -- 2.2 RoBERTa -- 2.3 CNN -- 3 Literature Survey -- 4 Racism and Memes Classification Model -- 5 Experimental Results -- 6 Conclusion and Future Works -- References -- Comparative Study of Learning Effectiveness Across NEPs on Network Fault Correlation.
1 Network Fault Correlation -- 1.1 Self-Healing Network -- 1.2 Key Capabilities -- 1.3 Key Benefits -- 1.4 Success Criteria -- 2 Solution Overview -- 2.1 Novelty of the Solution -- 2.2 Summary of the Solution -- 2.3 Advantages -- 3 Conclusion -- References -- Securing Networks: A Machine Learning Approach to Intrusion Detection Systems -- 1 Introductions -- 1.1 Overview -- 1.2 Motivation -- 1.3 Applications -- 1.4 Advantages -- 2 Related Work -- 3 Proposed Work -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- NL2Code: Harnessing Transformers for Automatic Code Generation from Natural Language Descriptions -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Understanding the Dataset for Training -- 3.2 Preprocessing -- 3.3 Model Architecture -- 3.4 Training Data -- 4 Result and Discussion -- 5 Conclusion -- References -- A Comprehensive Survey and Future Standpoints on Big Data Analytics of Mobile Data -- 1 Introduction -- 2 Mobile Analytics -- 3 Mobile Data Analytics Tools and Technologies -- 3.1 Google Analytics -- 3.2 Hadoop -- 3.3 Apple Analytics -- 3.4 Kobo Toolbox -- 4 Current Scenario Based on Past Surveys -- 5 Future Prospective of Usages Smartphone -- 6 Literature Reviews -- 7 Conclusion -- References -- An Approach to Detect Violations of Social Distancing Norms in the Public Domain -- 1 Introduction -- 2 Background Study and Related Work -- 3 Object Detection and Technologies Used -- 4 Proposed Idea -- 5 Output -- 6 Use Cases -- 7 Future Scope and Challenges -- 8 Conclusions -- References -- AI Art Authenticator: Deep Learning Image Classification -- 1 Introduction -- 2 Motivation -- 2.1 Preserving Creative Integrity -- 2.2 Copyright and Intellectual Property -- 2.3 Content Verification -- 2.4 Ethical Considerations -- 2.5 AI Development -- 3 Scope of the Project -- 3.1 Dataset Creation.
3.2 Deep Learning Model -- 3.3 Data Augmentation -- 3.4 Training and Testing -- 3.5 Confusion Matrix Analysis -- 4 Methodology -- 4.1 Data Collection and Processing -- 4.2 CNN Architecture -- 4.3 Model Training -- 4.4 Model Evaluation -- 4.5 Image Classification -- 4.6 Binary Classification -- 4.7 Confusion Matrix -- 5 Relevant Works -- 6 Results -- 7 Accuracy -- 7.1 Robustness and Generalization -- 7.2 Confusion Matrix Analysis -- 8 Conclusion -- References -- Creation and Deployment of E-Commerce Magento Website in AWS Cloud -- 1 Introduction -- 2 History of Magento -- 2.1 Magento 1 -- 2.2 Magento 2 -- 2.3 Magento Today -- 3 Features -- 4 Infrastructure Setup -- 5 Security -- 6 Performance Optimization -- 7 Key Security and Performance Optimization Measures: -- 8 Challenges for Magento Website in AWS -- 9 System Requirements -- 10 Deployment Process -- 11 Creating Replica of Instance -- 12 Taking Weekly Automated Backup -- 13 Troubleshooting Magento 2 -- 14 Conclusion -- References -- Empowering Rural Entrepreneurship in the Digital Age: A Systematic Exploration of Potential Tracks of Social Computing -- 1 Introduction -- 1.1 Research Problem and Significance -- 2 Research Objectives -- 3 Research Questions -- 4 Theoretical Background -- 5 Research Methodology -- 5.1 Search Criteria -- 6 The Transformative Potential of Social Computing, Success Factors and Best Practices -- 7 Conclusion, Implications for Policy and Practice, and Future Research Directions -- References -- Stock Market Prediction Using LSTM -- 1 Introduction -- 1.1 Navigating the Complexity -- 1.2 The Multifaceted Challenges -- 1.3 Feature Selection Dilemma -- 1.4 The Imperfect Tools of the Past -- 1.5 The Emergence of Deep Learning -- 1.6 The Rise of Recurrent Neural Networks (RNNs) -- 1.7 The Persistence of Challenges -- 1.8 Enter the Long Short-Term Memory (LSTM) Network.
1.9 Our Vision -- 1.10 The Need for Holistic Predictions -- 1.11 Our Contribution -- 1.12 Empowering Decision-Makers -- 1.13 A Fusion of Technology and Wisdom -- 2 Related Work -- 2.1 Long Short-Term Memory (LSTM): A Revolution in Sequential Data -- 2.2 LSTM in Financial Time Series Forecasting: A Pioneering Study -- 2.3 Stock Price Prediction with LSTMs: A Comprehensive Approach -- 2.4 LSTM Versus Traditional Models: A Comparative Analysis -- 2.5 Interpretable LSTM Models: Recent Developments -- 2.6 Holistic Stock Market Analysis with LSTMs -- 2.7 Sentiment Analysis Integration -- 2.8 Attention Mechanisms -- 2.9 Attention Mechanisms in Stock Price Prediction -- 3 Summary of the Table for References -- 3.1 Machine Learning Algorithms -- 3.2 Dataset -- 3.3 Evaluation Metrics -- 4 Dataset Preparation -- 4.1 Data Collection -- 4.2 Selection of Stocks -- 4.3 Data Features -- 4.4 Data Preprocessing -- 4.5 Feature Engineering -- 4.6 Target Variable -- 4.7 Data Splitting -- 4.8 Data Sequencing -- 4.9 Model Input Preparation -- 5 Dataset Preparation Approach -- 5.1 Data Collection -- 5.2 Stock Selection -- 5.3 Data Features -- 5.4 Data Preprocessing -- 5.5 Feature Engineering -- 5.6 Target Variable Definition -- 5.7 Data Splitting -- 5.8 Documentation -- 6 Limitations -- 6.1 Market Volatility -- 6.2 Complex Market Dynamics -- 6.3 Limited Historical Data -- 6.4 Model Complexity -- 6.5 Real-Time Data -- 6.6 Black Swan Events -- 6.7 Model Interpretability -- 7 Conclusion -- References -- UAV-Based Crop Health Analysis Using the Normalized Difference Vegetation Index (NDVI) Method -- 1 Introduction -- 2 Study Area and Dataset -- 3 Methodology -- 3.1 Data Acquisition Platform -- 3.2 Cotton Seed Variety Information -- 3.3 Dataset and Pre-processing Operations -- 3.4 Normalized Difference Vegetation Index (NDVI) -- 4 Result and Discussion -- 5 Conclusion.
References -- Secured Routing Approaches to Mitigate Various Attacks in DTN: A Survey -- 1 Introduction -- 2 Related Work -- 2.1 Black Hole Attack and Gray Hole Attack -- 2.2 Flooding -- 2.3 Selfish Nodes -- 2.4 Other Security Threats -- 3 Conclusion -- References -- Implementing "DevSecOps as a Culture"-The Concept, Benefits, Execution Strategies, and Challenges -- 1 Introduction -- 1.1 The Concept of "DevSecOps as a Culture" -- 1.2 A Typical DevSecOps Pipeline Involves Following Stages -- 1.3 Tools Used in DevSecOps Framework -- 2 Benefits of Implementing "DevSecOps as a Culture" -- 3 Execution Strategies and Methods for Implementing "DevSecOps as a Culture" -- 4 Challenges in Implementing "DevSecOps as a Culture" -- 5 Probable Solutions for Different DevSecOps Implementation Challenges -- 6 Conclusion -- References -- Advancements and Challenges in Fully Automated Online Proctoring Systems: A Comprehensive Survey of AI-Driven Solutions -- 1 Introduction -- 2 Overview of Fully Automated Proctoring Systems -- 2.1 Vardan AI Proctoring -- 2.2 Automated Proctoring -- 2.3 Cheating Detection -- 2.4 Attentive Net -- 2.5 Proctor Net -- 3 Research Questions and Challenges Identified -- 4 What Attributes are to be Considered for Fully AOP Systems? -- 5 What is the Literature of Various Attributes of the Fully AOP Systems? -- 6 What is the Future of the Fully AOP Systems? -- 7 Conclusion -- References -- Review of the Diabetic Retinopathy Prediction Model Based on the Enhanced VGH Algorithm -- 1 Introduction -- 1.1 Uses for AI in Retina Images -- 1.2 Diabetic Retinopathy -- 1.3 Motivation -- 2 Literature Review -- 3 Convolutional Neural Network (CNN) -- 4 Research Methodology -- 5 Conclusion and Future Work -- 6 Future Studies -- References -- Intelligent Educational Chatbot for Student Interaction Based on DaVinci Model -- 1 Introduction -- 2 Motivation.
3 Relevant Works.
Record Nr. UNINA-9910865240603321
Senjyu Tomonobu  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 1
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 1
Autore Senjyu Tomonobu
Edizione [1st ed.]
Pubbl/distr/stampa Singapore : , : Springer, , 2024
Descrizione fisica 1 online resource (509 pages)
Altri autori (Persone) So-InChakchai
JoshiAmit
Collana Lecture Notes in Networks and Systems Series
ISBN 9789819713202
9789819713196
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Cancer Classification Using Gene Expression Data -- 1 Introduction -- 2 Literature Review -- 3 Datasets -- 4 Proposed Work -- 4.1 The Various Phases Are -- 4.2 The Four ML Algorithms Are -- 5 Experimental Analysis -- 5.1 Import Libraries -- 5.2 Import Dataset -- 5.3 Data Processing and Splitting -- 5.4 Modeling -- 5.5 Model Selection and Application -- 6 Result and Discussion -- 7 Conclusion and Future Scope -- References -- A Three-Phase Heart Rate Variability Analysis for Assessing Cardiac Health Deterioration in Diabetics -- 1 Introduction -- 2 Literature Survey -- 3 Data Collection -- 4 Methodology -- 5 Results and Discussion -- 6 Conclusion and Future Plan -- References -- Right to Be Forgotten: A Human Rights-Based Approach for Governance in Generative AI -- 1 RTBF-A Digital Right for Governance in GAI -- 2 Role of RTBF in GAI -- 2.1 Evolution of RTBF -- 2.2 RTBF and Personality Rights in GAI -- 2.3 Rights and Liabilities of GAI Models -- 3 Lacunae in Enforcement of RTBF in GAI -- 3.1 Lack of Legislative Framework -- 3.2 Legal Controversies Surrounding RTBF -- 3.3 Role of Internet Intermediaries -- 3.4 Practical Problems in Implementation of RTBF in GAI -- 4 Essential Suggestions for Strengthening RTBF in GAI -- 4.1 Social Contract for Data -- 4.2 Segregation at Source -- 4.3 Technological Solutions -- 5 Conclusion -- References -- "Correlation of Emotional Intelligence and Perceived Stress: A Comprehensive Analysis" -- 1 Introduction -- 2 Further Related Studies -- 3 Methodology -- 4 Results and Discussion -- 4.1 Findings -- 5 Future Scope -- 6 Conclusion -- References -- Use of CNNs for Estimating Depth from Stereo Images -- 1 Introduction -- 2 Related Work -- 2.1 Deep Learning on Stereo Matching Development -- 2.2 Traditional Approach for Stereo Matching -- 3 Algorithm.
3.1 Matching Cost Computation -- 4 The Convolutional Neural Network: -- 4.1 Cost Aggregation -- 4.2 Disparity Computation -- 4.3 Disparity Refinement -- 5 Results -- 6 Conclusion -- References -- An AI and IoT Based Smart Green Home Sustainability -- 1 Introduction -- 2 Background and Findings -- 3 System Design -- 4 Simulation and Results -- 5 Conclusion -- References -- Automated Gym Exercise Form Checker: Deep Learning-Based Pose Estimation -- 1 Introduction -- 2 Related Work -- 3 Standing Dumbbell Shoulder Press -- 4 Data Collection and Preprocessing -- 4.1 Video Pre-processing -- 4.2 Human Detection -- 5 Pose Estimation -- 5.1 Key point Extraction -- 5.2 Angle Calculation -- 5.3 Automated Form Checker -- 6 Results -- 7 Conclusion -- References -- Virtual Reality-Based Pedagogical Framework for Design Education -- 1 Introduction -- 1.1 Artificial Intelligence in Education -- 1.2 Virtual Reality in Education -- 1.3 Existing Works -- 1.4 Objective -- 2 Methodology -- 2.1 Survey -- 2.2 VR App Development -- 2.3 Code for Movement in VR -- 3 Result -- 3.1 Survey Insights -- 3.2 Integrated VR Framework for Design Education (iVFDE) -- 3.3 Gestalt Principles-Simulation of Design Education -- 4 Discussion -- 5 Conclusion -- References -- Routing Strategies for Quality of Service Optimization over Vehicular Ad Hoc Networks: A Review -- 1 Introduction -- 1.1 VANET Overview and Architecture -- 1.2 VANET and MANET Comparison -- 2 Communication Protocols in VANET -- 3 QoS-Based Routing in VANET -- 4 Realistic Mobility Models for VANET Simulation -- 5 Open Issues and Challenges in VANETs -- 6 Conclusion -- References -- A Review of Plant Classification Using Deep Learning Models -- 1 Introduction -- 2 Deep Learning Models for Plant Classification -- 2.1 Multilayer Perceptron -- 2.2 Convolutional Neural Networks -- 2.3 Recurrent Neural Network.
2.4 Graph Convolutional Networks -- 2.5 Capsule Networks -- 2.6 Siamese Networks -- 3 Datasets and Evaluation Metrics -- 4 Challenges and Future Directions -- 5 Conclusion -- References -- Algo-Powered Banking: Enhancing Investment Decisions Through Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Technical Analysis -- 3.1 Complex Adaptive System (CAS): A Continuous Learning Framework -- 3.2 Convolutional Neural Networks (CNNs): Specialized Feature Extraction -- 3.3 ResNet: Overcoming the Vanishing Gradient Challenge -- 3.4 LeNet-5: Efficiency and Simplicity for Real-Time Applications -- 3.5 VGG-16: Unveiling Fine-Grained Details -- 3.6 A Synergistic Ensemble: Combining Adaptability and Expertise -- 4 Sentiment Analysis -- 4.1 VADER: A Powerful Tool for Financial Sentiment Analysis -- 4.2 Capture Nuances in Financial Sentiment -- 4.3 Advantages of VADER in Financial Sentiment Analysis -- 4.4 Applications of VADER in Financial Sentiment Analysis -- 4.5 VADER: A Valuable Tool for Financial Professionals -- 5 Long-Term Economic Prediction -- 5.1 Applications of Engle-Granger Cointegration in Long-Term Economic Prediction -- 5.2 Empirical Evidence and Limitations -- 6 Conclusion -- References -- Predicting the Air Quality Using Machine Learning Algorithms: A Comparative Study -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Classification Models -- 3.2 Performance Metrics -- 3.3 Datasets -- 4 Experimental Setup -- 5 Results and Discussions -- 6 Comparison -- 7 Conclusion -- References -- Quantum Image Processing Using Edge Detection Based on Roberts Cross Operators -- 1 Introduction -- 2 Methods -- 3 Edge Detection -- 3.1 Quantum Circuit for Edge Detection -- 4 Conclusions -- References.
A Conceptual Framework for Building Robust Blockchain Technology-Enabled Business Processes in Commodity Markets: A Systems Approach -- 1 Introduction -- 2 Preliminary Study -- 2.1 Simplified Architecture of Blockchain -- 2.2 Cryptographically Secured Hash Function -- 2.3 Cryptographically Secured Series of Blocks via Hashing -- 2.4 Merkle Trees -- 2.5 Smart Contract -- 2.6 Systems Approach -- 2.7 Documentary Credit -- 2.8 Bill of Lading -- 3 Review of Existing Literature -- 4 Conceptual Framework for Commodity Trading Using Blockchain -- 5 Discussion and Future Scope -- References -- Victimization (V) of Big Data: A Solution Using Federated Learning -- 1 Introduction -- 2 Literature Survey -- 3 Victimization: A Big Data Characteristic -- 4 System Architecture -- 4.1 Conventional Deep Learning Approach -- 4.2 Federated Learning Approach -- 4.3 Apache Spark Architecture -- 5 Results and Analysis -- 5.1 Dataset Description -- 5.2 Analysis and Discussion -- 6 Conclusion -- References -- Demystifying the Applications of Wavelet Transform in Bio Signal and Medical Data Processing -- 1 Introduction -- 2 Medical Image and Bio Signal Processing Using Wavelet Transforms -- 2.1 Discrete Wavelet Transforms -- 2.2 Lifting Wavelet Transform -- 2.3 Quincunx Wavelet Transform -- 2.4 Quaternion Wavelet Transform (QWT) -- 2.5 Dual-Tree Complex Wavelet Transform -- 2.6 Integer Wavelet Transform (IWT) -- 2.7 Gabor Wavelet Transform -- 3 Results and Discussion -- 4 Conclusion -- References -- Risk Prediction of Diabetic Disease Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Preprocessing -- 3.2 Feature Extraction -- 4 Materials and Methods -- 4.1 Dataset -- 4.2 Classification of Machine Learning Algorithms -- 4.3 Performance Analysis -- 5 Experimental Seup -- 6 Conclusion -- References.
IoT-Based Weather Monitoring System Using NodeMCU ESP8266 -- 1 Introduction -- 1.1 Literature Survey -- 2 Proposed Method for Weather Monitoring System -- 2.1 Problem Statement -- 2.2 Proposed System -- 2.3 Hardware Setup -- 2.4 Software Setup -- 2.5 Implementation of Proposed Method -- 3 Results and Discussion -- 4 Conclusion -- References -- Real-Time Obstacle Detection Using YOLOv8 on Raspberry Pi 4 for Visually Challenged People -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 YOLOv8 -- 3.2 Raspberry Pi 4 -- 3.3 Raspberry Pi Camera -- 4 Methodology -- 4.1 Experimental Setup -- 5 Result Analysis -- 6 Conclusions, Limitations, and Future Work -- References -- Location Jamming of Radar Waves Using Software-Defined Radio -- 1 Introduction -- 2 Related Topics -- 2.1 Electronic Counter Measures Against Radar (ECM) -- 2.2 Software-Defined Radio (SDR) -- 3 Problem Statement -- 4 Motivation -- 5 Proposed Approach -- 5.1 Angle Calculator -- 5.2 DRFM -- 5.3 Range Tracker -- 5.4 Module Integration with SDR -- 6 Experimental Evaluation -- 7 Conclusion -- References -- Machine Learning Approaches for Film Censorship: A Comprehensive Survey of Techniques -- 1 Introduction -- 2 Existing Techniques in AFCR -- 3 Datasets Available and Their Description -- 4 Literature Survey -- 5 Description of Chart -- 6 Conclusion -- References -- A Survey: Network Attack Detection and Mitigation Techniques -- 1 Introduction -- 2 Network Attack Detection Techniques -- 3 Network Attack Mitigation Techniques -- 4 Conclusion -- References -- A High-Accuracy Deep Learning Approach for Wheat Disease Detection -- 1 Introduction -- 2 Literature Survey -- 3 Research Methodology -- 3.1 Dataset -- 3.2 Transfer Learning -- 3.3 Multistage Fine Tuning -- 3.4 Performance Metrics -- 4 Experimental Results -- 4.1 Model Performances -- 4.2 Accuracy and Loss Curves -- 5 Conclusion.
References.
Record Nr. UNINA-9910865237903321
Senjyu Tomonobu  
Singapore : , : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Trends in Computing and Communications : Proceedings of SmartCom 2021
Smart Trends in Computing and Communications : Proceedings of SmartCom 2021
Autore Zhang Yu-Dong
Pubbl/distr/stampa Singapore : , : Springer Singapore Pte. Limited, , 2021
Descrizione fisica 1 online resource (751 pages)
Altri autori (Persone) SenjyuTomonobu
So-InChakchai
JoshiAmit
Collana Lecture Notes in Networks and Systems Ser.
Soggetto genere / forma Electronic books.
ISBN 981-16-4016-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- Influencing User Intention of Plant-Based Sensing System Adoption in Public Vocational High Schools of Indonesia Using TAM -- 1 Introduction -- 2 Literature Review -- 2.1 The Plant-Based Sensing System Proposed -- 2.2 The Theory of Technology Acceptance Model -- 3 Methodology -- 4 Research Model and Hypothesis -- 4.1 External Variable of Model -- 4.2 Perceived Ease of Use, Perceived Usefulness, Attitude, and Behavioral Intention -- 5 Results -- 5.1 Reliability Analysis -- 5.2 Regression Analysis -- 6 Conclusion -- References -- An Empirical Study of Critical Success Factors for the Adoption of m-Government Services in Tanzania -- 1 Introduction -- 2 Literature Review and Hypothesis Development -- 2.1 m-Government Services in Tanzania -- 2.2 Mobile Services Acceptance Model (MSAM) -- 2.3 Hypotheses Development -- 3 Methodology -- 4 Findings -- 5 Discussion -- 6 Conclusion -- References -- Smart City Based on LoRaWAN: Coverage Study for Cusco Urban Area -- 1 Introduction -- 2 LoRaWAN Technology -- 3 Cusco Urban Area Coverage Simulation -- 4 Data Collection -- 5 Analysis of Experimental Measurements -- 5.1 Efficiency Analysis for SF12 -- 5.2 RSSI Analysis for SF12 -- 5.3 Efficiency and RSSI Analysis for SF7 -- 6 Conclusion -- References -- Digital Transformation in Education in Knowledge Society -- 1 Introduction -- 1.1 Basic Considerations -- 2 Materials and Methods -- 3 Results -- 4 Conclusion -- References -- Induction Motor Overload Recognition Based on Sound Analysis -- 1 Introduction -- 2 Related Works -- 3 The Corpus -- 4 The Experiments -- 4.1 Frame-by-Frame Classification -- 4.2 One-Second Segment Classification -- 4.3 Half-a-Second Segment Classification -- 4.4 The Selected Classifier -- 5 Conclusions -- References.
Simulation of an All-Terrain Vehicle Driving Experience Using Virtual Reality -- 1 Introduction -- 2 Materials and Methods -- 2.1 Conception of the Virtual Experience -- 2.2 Learning Programming Tools -- 2.3 Virtual Environment Validation -- 2.4 Conception of the Immersive Environment -- 3 Results -- 4 Discussion -- 5 Conclusions and Recommendations -- References -- Safety-Centric and Smart Outdoor Workplace: A New Research Direction and Its Technical Challenges -- 1 Introduction -- 2 The Need of Dedicated Focus on Smart Outdoor Workplace -- 2.1 Smart Workplace -- 2.2 Smart Outdoor Workplace -- 2.3 Divergent Technology Streams -- 3 Technical Challenges -- 3.1 Diverse and Incompatible Sensors and Devices -- 3.2 Growing Gap Between Battery Technologies and Power Requirements -- 4 Research Prospects Driven by the Identified Challenges -- 4.1 Sandwich Approach to a Knowledge Architecture for Smart Outdoor Workplace -- 4.2 Model-Driven Simulation and Optimization of Energy Consumption in Smart Outdoor Workplace -- 5 Conclusions and Future Work -- References -- Devising Auxiliary Glyph Schemas Combined with XOR Filters for Improvised Font Delivery and Reliable Dynamic Font Augmentation -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology and Algorithm -- 3.1 Basic Font Subsetting Solution and Problems -- 3.2 Client Side: Proposed Data Structures -- 3.3 Font Subsetting and Augmentation Workflows Using Proposed Solution -- 3.4 Flow for an Application Session with the Proposed Solution -- 3.5 XOR Filter Processing for Subset or Font Portion Serving on Server Side -- 4 Conclusion -- References -- Multiple Sequence Alignment Algorithms in Bioinformatics -- 1 Introduction -- 2 Multiple Sequence Alignment (MSA) -- 3 Multiple Sequence Alignment Algorithms (MSA) -- 3.1 ClustalW -- 3.2 Clustal Omega -- 3.3 T-Coffee -- 3.4 MAFFT -- 3.5 Kalign.
3.6 MUSCLE -- 3.7 Probcons -- 3.8 Genetic Algorithms -- 4 Evaluation of MSA -- 5 Conclusion -- References -- Design and Implementation of a Machine Learning-Based Technique to Detect Unipolar and Bipolar Depression Using Motor Activity Data -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Underwater Magnetic Release System -- 1 Overview -- 2 System Components -- 2.1 The Software -- 3 Power Considerations -- 4 Design Specifics -- 5 Conclusion -- References -- An Optimal Route for People with Ambulant Disabilities Using Mathematical Risk Modeling and Analytic Hierarchy Process -- 1 Introduction -- 2 Methods -- 2.1 Factors Affecting the Selection of Best Route -- 2.2 Mathematical Risk Modeling -- 2.3 AHP Technique -- 3 Results and Discussion -- 4 Conclusion -- References -- The Innovation in Manufacturing Areas of Electronics Industry of Mexicali Using PLC -- 1 Introduction -- 2 Technological Innovation -- 3 Technology Development -- 4 Improving Competitiveness -- 5 Software Quality in the Electronics Industry -- 6 Limitations of the Investigation -- 7 Methodology -- 8 Results -- 9 PLC Analysis -- 10 Correlation Analysis of Industrial Parameters -- 11 Conclusions -- References -- Assistive Autonomous Electric Vehicle for Disaster Management -- 1 Introduction -- 2 Mechanical System Design -- 2.1 Overview -- 2.2 Frame Design -- 2.3 Assembly for the Wheels -- 2.4 Sensors Stand -- 2.5 Body Housing -- 3 Electronics System Design -- 3.1 Brief Overview -- 3.2 Electronic Suite Description -- 4 Working of the Circuit -- 5 Software and Control System -- 5.1 Brief Overview -- 5.2 Main Software Pipeline -- 5.3 Lane Detection and Path Mapping -- 5.4 Object Discovery Pipeline -- 5.5 Arduino Communication -- 5.6 Motor Driving -- 6 Advantage and Applications -- 6.1 Advantages -- 6.2 Applications.
7 Conclusion -- References -- On the Existing and New Potential Methods for Partial Discharge Source Monitoring in Electrical Power Grids -- 1 Introduction -- 2 Theoretical Aspects -- 2.1 Spectrogram -- 2.2 Wavelet Transform -- 2.3 Compressive Sensing -- 2.4 Phase-Diagram-Based Analysis -- 3 Experimental Configuration and Results -- 4 Conclusions -- References -- Efficient Approach for Block-Based Copy-Move Forgery Detection -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experimental Results -- 5 Discussion and Conclusion -- References -- Smart IoT Sensor Network for Monitoring of Cultural Heritage Monuments -- 1 Introduction -- 2 Sensor Design -- 3 Visualization Platform -- 4 Conclusions -- References -- MorArch: A Software Architecture for Interoperability to Improve the Communication in the Edge Layer of a Smart IoT Ecosystem -- 1 Introduction -- 2 Present Context and Previous Works -- 2.1 Interoperability Architectures -- 2.2 Interoperability Protocols -- 3 Proposal -- 4 Experiments -- 4.1 File System -- 4.2 Data Flow Inside Our Fog Ecosystem -- 4.3 Results -- 5 Conclusions -- References -- A Design of an IoT-Based Smart Home with Auto-sanitization System -- 1 Introduction -- 2 Literature Review -- 3 Methodology and Modeling -- 4 Working Procedure -- 4.1 Remote Access -- 4.2 Voice Command Access -- 5 Implementation of the Prototype -- 5.1 Software Implementation -- 5.2 Hardware Implementation -- 5.3 Visual Models of a Smart Home with Auto-sanitization -- 6 Future Developments, Scopes, and Social Impact -- 7 Results and Data Analysis -- 8 Conclusion -- References -- An Experiment Study on Federated Learning Testbed -- 1 A Novel PPML Framework: Federated Learning -- 2 Methodology and System Implementation -- 3 Results on Efficiency Test -- 3.1 Training Speed -- 3.2 Communication Cost -- 4 Privacy Analysis -- 5 Conclusion.
References -- Visual Quality Comparison of Ocean Wave Effects at Different Camera Distances -- 1 Introduction -- 2 Material and Method -- 2.1 Setting in Houdini -- 2.2 Setting in Unreal -- 2.3 Minor Conclusion -- 3 Result -- 4 Conclusion -- References -- Control System to International Parental Child Abduction, Case: Colombia -- 1 Introduction -- 2 Background -- 3 Design and Method for Colombia -- 4 Results -- 5 Analysis of the Results -- 6 Conclusions and Further Work -- References -- It is not Always Ethical: Data Manipulation to Justify Public Policy Choices in COVID-19 Response -- 1 Introduction -- 2 Background -- 3 Cases of COVID-19 Data Manipulation -- 4 Florida's COVID-19 Data Portal -- 5 Georgia's COVID-19 Data Portal -- 6 Arizona's COVID-19 Data Portal -- 7 Texas, Virginia, and Vermont's COVID-19 Data Portals -- 8 Implications of Data Manipulation -- 9 Conclusion -- References -- BPMN2EVENTB Supporting Transformation from BPMN2.0 to Event B Using Kermeta -- 1 Introduction -- 2 The Proposed Approach -- 3 Subset of Mapping Rules BPMN-Event B -- 4 Illustration -- 5 Conclusion and Future Work -- References -- Teaching Neuroscience Through Flipped Classroom: Systematizing an Experience with Students of the Professional Career of Elementary Education -- 1 Introduction -- 1.1 Contributions of Neuroscience to Education -- 1.2 Teaching Neuroscience Through Digital Resources -- 2 Methodology -- 2.1 Procedures -- 2.2 Participants -- 2.3 Measures -- 3 Results -- 3.1 Analysis of Means and Variation Coefficients -- 3.2 Exploratory Analysis with Boxplots -- 3.3 Analysis of Some Items -- 4 Discussion -- 5 Conclusions and Future Works -- References -- Low-Cost IoT Platform for Telemedicine Applications -- 1 Introduction -- 2 Related Works -- 3 Case of Study -- 4 Implementation of the Proposal -- 4.1 Wearable Device -- 4.2 Android TV App -- 4.3 Cloud Service.
5 Discussion of Results.
Record Nr. UNINA-9910506402003321
Zhang Yu-Dong  
Singapore : , : Springer Singapore Pte. Limited, , 2021
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Trends in Computing and Communications [[electronic resource] ] : Proceedings of SmartCom 2023, Volume 2 / / edited by Tomonobu Senjyu, Chakchai So-In, Amit Joshi
Smart Trends in Computing and Communications [[electronic resource] ] : Proceedings of SmartCom 2023, Volume 2 / / edited by Tomonobu Senjyu, Chakchai So-In, Amit Joshi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (838 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Signal processing
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Signal, Speech and Image Processing
ISBN 981-9908-38-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wireless SDN : A Perspective for Handover Management -- Classification of Sentiment Analysis of Tweets On Twitter -- A Boosted Random Forest Algorithm for Automated Bug Classification -- Secure QR Code Transactions Using Mobile Banking App -- A Small-Scale Ontology to represent Knowledge about Question Items -- Deep Learning for classification of encrypted images -- A Clustering-based Approach to Feature Selection for Breast-Cancer Classification -- Knowledge Discovery and Visualization of UMLS based on Complex Network Analysis -- An Automatic Early Detection of Melanoma Skin Cancer Using Fuzzy C-Means -- Integrating Hybrid feature extraction techniques with Support Vector Machine for Efficient Facial emotion recognition -- Classification of ISL using Pose and Object Detection based Techniques -- Explainable Artificial Intelligence for Autonomous Surface Vessels by Fuzzy-Based Collision Avoidance System -- Gamification: Secret ingredient in enhancing flavor of Theory of Computation understanding -- Voice Controlled Home Automation System -- A Review of Depressive Disorder Detection Based on Sentiment Analysis -- Efficient bounding strategy for CEC 2020 winner algorithms in solving production planning problems.
Record Nr. UNINA-9910731485903321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Trends in Computing and Communications [[electronic resource] ] : Proceedings of SmartCom 2023, Volume 1 / / edited by Tomonobu Senjyu, Chakchai So–In, Amit Joshi
Smart Trends in Computing and Communications [[electronic resource] ] : Proceedings of SmartCom 2023, Volume 1 / / edited by Tomonobu Senjyu, Chakchai So–In, Amit Joshi
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (823 pages)
Disciplina 004.6
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Signal processing
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Signal, Speech and Image Processing
ISBN 981-9907-69-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Impact of Data Centric Approach to Improve the Performance of Leaf Disease Classification -- Evolution, Trends and Future Developments of Business Intelligence -- A Secure Protocol for Authentication and Data Storage for Healthcare System -- OMA-DSS: Ontology Based Multi Agent Decision Support System in Healthcare Domain to Prevent Cardiovascular Diseases -- Innovative Task Scheduling and Allocation Algorithm for E-Governance with Multi-cloud Environment -- Distributed Deep Learning with Data Parallelism for Diabetic Retinopathy Classification -- Sting - A User Governed Crime Alert App -- Classification of Traffic Signal Images using Deep Neural Networks -- Automatic Evaluatıon for Machıne Translatıon -- Evolving Time Series Data Streams: A Review -- Semi-Supervised Medical Image Segmentation on Data from Different Distributions -- Profiling Network Traffic by using Classification Techniques in Machine Learning -- Identification of Cracks in High Rise Buildings Using Drones and Deep Learning -- Wine Quality Prediction Using Machine Learning Techniques -- Wearable Technology with Location Tracking, Health Monitoring, and Attendance Tracking for Employees.
Record Nr. UNINA-9910731459403321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Trends in Computing and Communications [[electronic resource] ] : Proceedings of SmartCom 2019 / / edited by Yu-Dong Zhang, Jyotsna Kumar Mandal, Chakchai So-In, Nileshsingh V. Thakur
Smart Trends in Computing and Communications [[electronic resource] ] : Proceedings of SmartCom 2019 / / edited by Yu-Dong Zhang, Jyotsna Kumar Mandal, Chakchai So-In, Nileshsingh V. Thakur
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (498 pages)
Disciplina 006.3
Collana Smart Innovation, Systems and Technologies
Soggetto topico Computational intelligence
Electrical engineering
Signal processing
Image processing
Speech processing systems
Computational Intelligence
Communications Engineering, Networks
Signal, Image and Speech Processing
ISBN 981-15-0077-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Comparison of Different Image Segmentation Techniques on MRI Image -- Business-Driven Blockchain-Mempool Model for Cooperative Optimization in Smart Grids -- Impact on the Information Security Management due to the Use of Social Networks in a Public Organization in Ecuador -- Appropriate Security Protocols to Mitigate the Risks in Electronic Money Management -- Acceptance and Readiness of Thai Farmers toward Digital Technology -- Design and Implementation of Rule Based Hindi Stemmer for Hindi Information Retrieval -- Research on the Development Trend of Ships Integrated Power System Based on Patent Analysis -- Road Travel Time Prediction Method Based on Random Forest Model -- Video Synchronization and Alignment using Motion Detection and Contour Filtering -- Quick insight of Research Literature using Topic Modeling -- Security Vulnerabilities of Open Stack Cloudand Security Assessment using Different Software Tools -- Smart Physical Intruder Detection System for Highly Sensitive Area -- Two level classication of Radar Targets using Machine Learning -- A Hyperledger Scheme for the Deployment of Smart Contracts in a Public Organization of Ecuador -- Web Mash-up Development & Security using AOP -- Enhanced Text Stemmer with Noisy Text Normalization for Malay Texts -- An Overview on Privacy Preservation and Public Auditing on Outsourced Cloud Data -- Segmentation of Handwritten Text using Bacteria Foraging Optimization -- Problems with PIR sensors in Smart Lighting+Security Solution and Solutions of Problems -- Multi-level Thresholding and Quantization for Segmentation of Color Images.
Record Nr. UNINA-9910484089503321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui