Information Systems for Intelligent Systems [[electronic resource] ] : Proceedings of ISBM 2022 / / edited by Chakchai So-In, Narendra D. Londhe, Nityesh Bhatt, Meelis Kitsing |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (649 pages) |
Disciplina | 006.3 |
Collana | Smart Innovation, Systems and Technologies |
Soggetto topico |
Engineering—Data processing
Business information services Artificial intelligence Data Engineering Business Information Systems Artificial Intelligence IT in Business |
ISBN | 981-19-7447-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Social Media as Communication-Transformation Tools -- Bi directional DC-DC converter-based Energy Storage Method for Electric Vehicles -- Design of Smart Irrigation System in Sone Command Area Bihar for Paddy Crop -- A Footstep to Image Deconvolution Technique for the both Known and Unknown Blur Parameter -- Secured Monitoring of Unauthorized UAV by Surveillance Drone Using NS2. |
Record Nr. | UNINA-9910767584803321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 4 |
Autore | Senjyu Tomonobu |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2024 |
Descrizione fisica | 1 online resource (518 pages) |
Altri autori (Persone) |
So-InChakchai
JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN | 981-9713-29-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Analytics of Machine Learning in Healthcare Industries -- 1 Information -- 2 Machine Learning in Healthcare -- 3 Analytical Tools -- 4 Machine Learning Approaches in Healthcare -- 5 Analytics Market Size -- 6 Conclusion -- References -- Design and Implementation of First-In-First-Out (FIFO) Buffer for Distributed Load Balancing Systems -- 1 Introduction -- 2 FIFO Working and Its Architecture -- 3 Design Implementation and Simulation Results -- 4 Conclusion -- References -- Artificial Neural Network-Based Forecasting to Anticipate the Indian Stock Market -- 1 Introduction -- 2 Description -- 3 Discussion and Evaluation -- 3.1 Theory of LM -- 3.2 Theory of SCG -- 3.3 Theory of BRT -- 4 Discussion of Results -- 4.1 Performance Plots -- 4.2 Regression Plots -- 5 Error Histograms -- 6 Conclusion and Future Work -- References -- A Framework for Real-Time Crowd Behaviour Monitoring System Based on Human Activity Recognition in Surveillance Videos -- 1 Introduction -- 2 Literature Review -- 3 Research Gaps and Objective -- 4 Proposed Framework -- 5 Discussion -- 6 Integration Plans -- 7 Conclusion -- References -- STM32-Based Home Automation and Energy Monitoring System with TFT Display -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Implementation -- 5 Costing and Scalability -- 6 Conclusion -- References -- Smart Rover for Farm Pesticide Spraying -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 4 Result -- 5 Areas of Improvement and Further Research -- 6 Conclusion -- References -- Emergency Alert and Adaptive Traffic Signal System Using Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Adaptive Traffic Signal Systems for Emergency Vehicle -- 3.2 Emergency Vehicle Alert Systems -- 3.3 RFID Tag and GSM Kit.
3.4 Use of ML in the Proposed System -- 4 Conclusion -- References -- Design of a Chatbot for Relieving Academic Stress in Adolescent Students -- 1 Introduction -- 2 Literature Review -- 3 Methods -- 3.1 Interviews -- 3.2 Proposed Framework -- 3.3 Prototyping the Chatbot -- 3.4 Design of the Smartphone Application -- 3.5 Testing -- 4 Results -- 4.1 Interview Findings -- 4.2 Proposed Framework -- 4.3 Conceptualisation of a Prototype Chatbot -- 4.4 Design and Development -- 4.5 Evaluation of the Smartphone Application -- 5 Discussion -- 5.1 Learnings from Proposed Framework -- 5.2 Insights from Chatbot Development -- 5.3 Smartphone Application Development -- 5.4 Testing -- 5.5 Research Contribution -- 5.6 Limitations and Future Scope -- 6 Conclusion -- References -- Mental Health Predictive Analysis Using Machine-Learning Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Materials and Methods -- 3.1 Classification Models -- 3.2 Dataset -- 3.3 Performance Measures -- 4 Methodology -- 5 Experimental Setup and Results -- 6 Conclusion -- References -- Crime Prediction and Prevention Using Design Intervention and Artificial Intelligence -- 1 Introduction -- 1.1 Literature Review -- 2 Methodology -- 2.1 Proposed System -- 2.2 Model Application -- 2.3 Model Implementation -- 3 Results and Discussions -- 4 Conclusion -- References -- Enhancing Dysarthria Detection: Harnessing Ensemble Models and MFCC -- 1 Introduction -- 1.1 Research Objective -- 2 Literature Review -- 2.1 Research Gap and Limitations -- 3 Proposed Work -- 3.1 Dataset -- 3.2 Audio Feature Extraction -- 3.3 Data Pre-processing -- 3.4 Classification -- 4 Results and Discussion -- 4.1 Discussion and Comparative Study -- 5 Conclusion -- References -- A Deep Learning Approach for Evaluating Children's Handwriting -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology. 3.1 Data Collection -- 3.2 Data Preprocessing -- 3.3 Model Architecture -- 3.4 Training -- 3.5 Evaluation -- 3.6 User Interface -- 3.7 Practical Implementation and Scalability -- 3.8 User Interface Design and User Experience -- 4 Model Implementation -- 4.1 Architecture Selection -- 4.2 Flattening Layers and SoftMax Layer -- 4.3 Training Process -- 4.4 Achieved Results -- 4.5 Rationale for Selection -- 5 Performance Analysis -- 5.1 K-Fold Cross-Validation -- 5.2 Model Performance Evaluation Metrics -- 5.3 Real-Time Model Inference -- 5.4 Results -- 6 Conclusions and Future Scope -- References -- Detection of Online Fake Review Using Deep Learning -- 1 Introduction -- 2 Related Work -- 2.1 Deep Learning -- 2.2 Convolution Neural Network (CNN) -- 3 Proposed Method -- 3.1 Recurrent Neural Networks (RNN) -- 3.2 Convolutional Long Short-Term Memory (CLSTM) -- 4 Experimental Setup and Result Analysis -- 4.1 Data Balancing -- 4.2 Confusion Matrix -- 5 Conclusion -- References -- Deep Learning-Based Object Detection, Face Recognition, and Tracking Support Model for Visually Challenged -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Model -- 3.1 Object Detection -- 3.2 Face Recognition and Emotion Detection -- 3.3 GPS and GSM Module -- 4 Hardware Specifications -- 5 First Section Introduction -- 5.1 Qualitative Results -- 5.2 Quantitative Results -- 6 Conclusion and Future Work -- References -- Wi-Fi Inter-Network Simulation and Performance Analysis Using QualNet -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Simulation Environment and Tools -- 3.2 Network Topology Design -- 3.3 Simulation Scenarios and Parameters -- 4 Network Design and Setup -- 4.1 Architecture and Network Layout -- 4.2 Configuration and Interconnection -- 4.3 Traffic Models -- 5 Simulation and Data Collection -- 5.1 Scenario Setup. 5.2 Simulation Run: Simulation Control -- 5.3 Data Collection and Analysis -- 5.4 Multiple Runs and Variations -- 5.5 Post-simulation Analysis -- 5.6 Iterative Process -- 6 Results and Analysis -- 6.1 Presentation of Results -- 6.2 Analysis in Relation to Research Objectives -- 6.3 Comparison of Network Configurations and Scenarios -- 7 Conclusion -- 7.1 Key Takeaways and Contributions -- 7.2 Importance of Using QualNet -- 7.3 Future Research Directions -- References -- Location-Based QR Attendance Application -- 1 Introduction -- 2 Literature Review -- 3 Proposed System -- 4 Execution of Application -- 4.1 Faculty Module -- 4.2 Student Module -- 5 Tools and Technology -- 5.1 Visual Studio Code -- 5.2 Flutter SDK -- 5.3 Firebase -- 6 System Design -- 6.1 Login/Register -- 6.2 Faculty Module -- 6.3 Student Module -- 6.4 Student Attendance Data (Faculty) -- 7 Future Scope -- 8 Conclusion -- References -- Optimizing Endurance in Fixed Wing UAVs -- 1 Introduction -- 2 Literature Review -- 2.1 Design of a Low-Cost Fixed Wing UAV -- 2.2 Yaw, Pitch, and Roll Controller Design for Fixed Wing UAV Under Uncertainty and Perturbed Condition -- 2.3 Development of a Fixed Wing Unmanned Aerial Vehicle (UAV) for Disaster Area Monitoring and Mapping -- 2.4 Overview of Unmanned Aerial Vehicles -- 2.5 Comprehensive Analysis of Unmanned Aircraft System Technologies for Urban Operations -- 2.6 Energy-Efficient Trajectory Design for UAV-Aided Maritime Data Collection in Wind -- 2.7 Design and Fabrication of a Fixed Wing Unmanned Aerial Vehicle (UAV) -- 2.8 V-Tail Stalling at Combined Angles of Attack and Sideslip -- 2.9 Battery Package Design Optimization for Small Electric Aircraft -- 3 Methodology -- 4 Design of UAV -- 5 Conclusion -- References -- StoryWood-Story and Post Maker Application -- 1 Introduction -- 2 Literature Review -- 3 Proposed System. 4 Execution of Application -- 5 Tools and Technology -- 5.1 Android Studio and Visual Studio Code -- 5.2 Firebase -- 5.3 Flutter SDK -- 5.4 Dart SDK -- 6 System Diagram -- 7 Future Scope -- 8 Conclusion -- References -- A Survey on Imparting Education Using Augmented Reality -- 1 Introduction -- 2 Literature Survey -- 2.1 Augmented Reality Technologies in Education -- 2.2 Mobile Augmented Reality in Education -- 2.3 Augmented Reality in Education: Advantages and Applications -- 2.4 Effectiveness of Augmented Reality on Students with Special Disability in Higher Education -- 2.5 Effectiveness of Augmented Reality Environments on Individuals with Special Education Needs -- 3 Methodology -- 4 Application of Augmented Reality in Education Sector -- 5 Research Review -- 6 Conclusion -- References -- Secure Access Firearm -- 1 Introduction -- 1.1 Background and Motivation -- 1.2 Problem Statement -- 1.3 Objectives -- 2 Literature Review -- 3 Methodology -- 4 Implementation -- 4.1 Biometric Sensor Integration -- 4.2 Waterproof Camera Installation -- 4.3 Biometric Sensor Integration -- 4.4 Backend Infrastructure Setup -- 4.5 Emotional Analysis Algorithm Integration -- 5 Emotional Analysis Algorithm -- 5.1 Convolution Operation -- 5.2 Activation Function (ReLU) -- 5.3 Max-Pooling Operation -- 5.4 Fully Connected Layer -- 5.5 Categorical Cross-Entropy Loss -- 5.6 Gradient Descent Update Rule -- 6 Flowchart -- 7 Results and Discussion -- 8 Conclusion -- References -- Facial Expression Recognition Using Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 3 Datasets -- 4 Proposed Method -- 5 Experiments and Results -- 6 Conclusion -- References -- Attitude Control of Satellites with Reaction Wheels and Its Formation Keeping -- 1 Introduction -- 2 Modeling -- 2.1 Mathematical Modeling -- 3 Results with PID and LQR. 4 Formation Keeping and Its Control. |
Record Nr. | UNINA-9910857793803321 |
Senjyu Tomonobu | ||
Singapore : , : Springer Singapore Pte. Limited, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 2 |
Autore | Senjyu Tomonobu |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (480 pages) |
Altri autori (Persone) |
So-InChakchai
JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN |
9789819713233
9789819713226 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- YOLOv8: Advancements and Innovations in Object Detection -- 1 Introduction -- 2 Objectives -- 3 Literature Survey -- 4 YOLO V8 Process -- 5 Experiments and Results -- 6 Conclusion -- References -- Anxiety and Depression Red Flag Marker in Social Media -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Data Gathering -- 3.2 Data Preprocessing -- 3.3 Creating TF-IDF Matrix -- 3.4 Choosing the Optimal Model -- 4 Result -- 5 Application Development -- 6 Conclusion -- References -- Object Detection and Tracking Approach for Traffic Monitoring -- 1 Introduction -- 2 Related Work -- 3 Inferencing on Pretrained Weights -- 3.1 YOLOv7 -- 3.2 Mask R-CNN -- 4 Retraining -- 4.1 Inferencing on Retrained Weights -- 5 Implementation of Tracking Approach -- 6 Results and Conclusion -- References -- Detection of Malnutrition in Children Using Deep Learning Model -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 Preprocessing Images Are Preprocessed Using Operations -- 4 ResNet18 Model and Transfer Learning -- 5 Results and Discussion -- 6 Conclusion -- References -- Multilingual Indian COVID-19 Chatbot -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Data Pre-processing -- 3.2 Keyword Extraction -- 3.3 Telegram API -- 3.4 Translation Tool -- 3.5 BM25 -- 3.6 uSIF -- 3.7 BioBERT -- 3.8 Dockerization and Cloud Implementation -- 4 System Design -- 5 Results and Analysis -- 6 Conclusion -- References -- Blockchain, IoT, and Smart Grids Challenges for Energy Systems -- 1 Introduction -- 2 Materials and Methods -- 3 Conclusions -- References -- IAM Dataset-Based Author Identification via Convolutional Neural Networks -- 1 Introduction -- 2 Literature Survey -- 3 Dataset -- 4 Custom Model Selection -- 4.1 Author Net V1 -- 4.2 Author Net V2.
4.3 Author Net V3 -- 5 Author Net V1 -- 5.1 Adam Optimizer -- 5.2 Adadelta Optimizer -- 5.3 Adagrad Optimizer -- 5.4 RMSprop Optimizer -- 6 Author Net V2 -- 6.1 Adam Optimizer -- 6.2 Adadelta Optimizer -- 6.3 Adagrad Optimizer -- 6.4 Rmspropoptimizer -- 7 Author Net V3 -- 7.1 Adam Optimizer -- 7.2 Adadelta Optimizer -- 7.3 Adagrad Optimizer -- 7.4 RMSprop Optimizer -- 8 Conclusion -- References -- Design of Low Power Booth Multiplier with Enhance Pre-logic Mechanism Using Verilog -- 1 Introduction -- 2 Related Works -- 3 The Proposed Design of Multiplier -- 4 Simulation Results and Analysis -- 5 Limitation and Challenges -- 6 Conclusion and Future Work -- References -- Novel Statistical Glaucoma Prediction Algorithm Based on Spectral Analysis -- 1 Background and Summary -- 2 Materials -- 3 Methods and Observation -- 3.1 Noise Reduction -- 3.2 Randomizer -- 3.3 Optic Disc Segmentation -- 3.4 Spectral Analysis -- 3.5 Application of Statistical Methods -- 3.6 Manual Analysis and Threshold Boundary Detection -- 3.7 Favourable Judgement Algorithm (FJA) -- 3.8 Out of Bound Algorithm (OOB) -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- A Comparative Study of Audio Source Separation Techniques on Indian Classical Music: Performance Evaluation and Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Median Filtering -- 3.2 Non-negative Matrix Factorization -- 3.3 Modified Lead Percussion Source Separation -- 3.4 Kernal Additive Modeling -- 4 Results and Comparison -- 4.1 Harmonic Ratio -- 4.2 Processing Time -- 5 Conclusion -- References -- A Hybrid FAST-LIO2 and SC-A-LOAM SLAM Algorithm for Autonomous Vehicles -- 1 Introduction -- 2 Methodology -- 3 Overview of FAST-LIO2 and SC-A-LOAM Algorithms -- 3.1 Fast Direct LiDAR-Inertial Odometry (FAST-LIO2) -- 3.2 Scan Context Advanced Lidar Odometry and Mapping (SC-A-LOAM). 4 Results and Discussion -- 5 Conclusion -- References -- Real-Time ATM Booth Suspicious Behavior Monitoring System -- 1 Introduction -- 2 Literature Survey -- 3 Related Works -- 4 Methodology -- 4.1 Pose Estimation -- 4.2 Gaze Tracking -- 4.3 Multiple People Detection -- 4.4 Face Covering Detection -- 5 Overview and Workflow Integration -- 6 Experimental Modeling and Analysis -- 7 Discussion on Obtained Results -- 8 Ethical Considerations and Privacy -- 9 Conclusion -- References -- Exploring the Balance Between Automated Decision-Making and Human Judgment in Managerial Contexts -- 1 Introduction -- 2 Literature Review -- 2.1 Artificial Intelligence in the Present World -- 2.2 History of Artificial Intelligence -- 2.3 AI in Future -- 3 Research Gap -- 4 Objectives -- 5 Methodology -- 6 Artificial Intelligence as a Tool in Managerial Decision-Making -- 6.1 Focus on Consumer Behavior -- 6.2 Decision Augmentation -- 6.3 Decision Support System -- 7 Suggestions -- 8 Conclusion -- References -- SmartCrop: An IoT-Powered Crop Health Monitoring System -- 1 Introduction -- 2 Problem Statement -- 3 Methodology -- 3.1 Data Collection -- 3.2 Sensor Integration -- 3.3 Data Analysis -- 3.4 Efficient Irrigation -- 3.5 Motion Detection -- 3.6 Remote Monitoring -- 3.7 Visualization -- 4 Results and Discussion -- 4.1 Eco System for Monitoring Crop Health -- 4.2 Detection of Insects and Animals Using Motion Sensor -- 4.3 Automatic Operation of Water Pump -- 5 Conclusion -- References -- Gaussian and Impulse Noise Identification from Image Using Frequency Domain Analysis -- 1 Introduction -- 2 Literature Review -- 3 Dataset Used in Experiment -- 4 Methodology -- 4.1 Algorithm -- 5 Result -- 6 Conclusion -- References -- Predictive Paradigm: AI-Driven Social Media Analysis for Real Estate Sales Forecasts -- 1 Introduction -- 2 Related Works -- 3 Methodology. 3.1 Machine Learning Models -- 4 Experimental Analysis and Discussion -- 4.1 Data Collection -- 4.2 Simulation Results -- 5 Conclusion -- References -- E-Governance and Digital Innovation-Indian Perspective -- 1 Overview to Digital Administration Plan -- 2 Digital Payments in India: A Step Toward Digitalization -- 2.1 Overview -- 2.2 Transitioning from Cash to Low-Cash -- 2.3 The Rise of Digital Payments -- 3 Digital Administration Substructure Setup -- 4 Challenges in Digital India -- 5 Conclusion -- References -- IoT-Based Smart Car Parking Agent Using Raspberry Pi -- 1 Introduction -- 1.1 Internet of Things -- 2 Background Work -- 2.1 Related Work -- 2.2 Component Selection -- 3 System Configuration -- 3.1 Proposed Methodology -- 3.2 System Setup -- 3.3 System Implementation -- 3.4 System Workflow -- 4 Dependability to Boost the System -- 5 Methodology -- 6 Experimental Result -- 7 Conclusion -- References -- Object Detection and Trajectory Prediction of Unmanned Aerial Vehicle Using Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Materials and Methods -- 3.1 YOLO -- 3.2 Comparative Analysis of YOLO Versions -- 3.3 DeepSORT -- 3.4 Custom Dataset -- 3.5 Object Detection Using Deep Learning -- 4 Result -- 5 Conclusion -- References -- A Survey of Automatic Number Plate Recognition and Parking Management System -- 1 Introduction -- 2 Background -- 3 Main Body -- 3.1 Number Plate Localization -- 3.2 Character Segmentation -- 3.3 Character Recognition and Syntax Checking -- 3.4 Databases Systems -- 4 Discussions -- 5 Conclusions -- References -- Immersive Experiences and Brand Recall in the Metaverse: A Comparative Analysis of Virtual Reality and 3D Interfaces -- 1 Introduction -- 2 Theoretical Background and Literature Review -- 2.1 Immersive Technologies and Brand Placements -- 2.2 Hypotheses Development -- 3 Methodology -- 3.1 Pre-test. 3.2 Participant Selection and Recruitment -- 3.3 Experimental Design -- 3.4 Brand Presentation and Control -- 3.5 Data Collection Procedures -- 3.6 Measures -- 4 Results -- 5 Discussion -- 5.1 Theoretical Contributions -- 5.2 Implications for Marketing Firms -- 6 Limitations and Scope for Future Research -- References -- Analysis and Prediction of the Sentiments of the WhatsApp Chat Using Sentiment Analysis -- 1 Introduction -- 2 Project Description and Objectives -- 2.1 Research Objectives -- 3 Methodology -- 4 Expected Output -- 5 Significance and Applications -- 6 Output -- 7 Conclusion -- References -- Driving Factors of Mobile Payment Adoption: A Focus on Gen-Z Consumers -- 1 Introduction -- 2 Literature Review -- 2.1 Theoretical Background -- 2.2 The Evolution of Payment Methods in India -- 2.3 Mobile Payment Interface -- 2.4 Hypotheses Development -- 3 Research Methodology -- 3.1 Research Design -- 3.2 Sample Size and the Method of Sampling -- 3.3 Data Collection Instrument -- 4 Results -- 4.1 Reliability and Validity -- 4.2 SEM Analysis -- 5 Discussion -- 6 Conclusion -- References -- Review on Cybersecurity and Techniques -- 1 Introduction -- 1.1 The Real Meaning of Cybersecurity -- 1.2 History of Cyber Security -- 2 Overall Study of Cybersecurity -- 2.1 Who is a Hacker? -- 2.2 How Does Cybersecurity Work? -- 2.3 What Are the Types of Cyber Security Threats? -- 2.4 Domains of Cyber Security -- 2.5 Motives of Cybercrimes -- 2.6 Trends Changing in Cyber Security -- 2.7 Roles of Social Media Platform in Cyber Security -- 3 CIA Model -- 3.1 Confidentiality -- 3.2 Integrity -- 3.3 Availability -- 4 Advantages and Disadvantages of Cyber Security -- 4.1 Advantages of Cybersecurity -- 4.2 Disadvantages of Cyber Security -- 5 Future Scope of Cyber Security -- 6 Conclusion -- References. An Adaptive Federated Learning Approach for Efficiency and Privacy Preservation of Dynamic Network of IoT. |
Record Nr. | UNINA-9910864190603321 |
Senjyu Tomonobu | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 5 |
Autore | Senjyu Tomonobu |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (486 pages) |
Altri autori (Persone) |
So-InChakchai
JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN |
9789819713134
9789819713127 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- A Structure for Forecasting Stomach Cancer Using Deep Learning and Advanced Tongue Characteristics -- 1 Introduction -- 2 Related Works -- 3 Methods -- 3.1 Date Sources -- 3.2 Date Preprocess -- 3.3 Tongue Image Segmentation -- 3.4 Performance Metrics -- 4 Results -- 5 Conclusion -- References -- Smart Rack System Using AI -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Data Extraction from Internet -- 3.2 Data Annotations -- 3.3 Model Configuration -- 3.4 Model Training and Model Evaluation -- 3.5 Output -- 4 Result and Conclusion -- References -- Enhancing Pneumonia Detection Accuracy Through ResNet-Based Deep Learning Models and Ensemble Techniques: A Study Using Chest X-Ray Images -- 1 Introduction -- 2 Methodology -- 2.1 Dataset -- 2.2 Data Preprocessing -- 3 Model -- 3.1 ResNet -- 3.2 Custom CNN Model -- 4 Optuna for Hyperparameter Tuning -- 5 Ensembling -- 6 Results and Analysis -- 7 Conclusion -- 8 Future Work -- References -- POLISENTIX: Political Sentiment Analyzer -- 1 Introduction -- 1.1 Background and Motivation -- 2 Review of Literature -- 3 Design of the Platform -- 4 Working Methodology -- 4.1 Design of the Website -- 4.2 Data Collection -- 4.3 Pre-processing -- 4.4 Training Data -- 4.5 Sentiment Analyzer -- 4.6 Data Visualization -- 4.7 Output -- 5 Result Analysis -- 6 Conclusion -- References -- An Interactive Smartphone Application to Manage Youth Loneliness -- 1 Introduction -- 2 Methodology -- 2.1 Interviews and Surveys -- 2.2 Literature Review and Market Study -- 2.3 Giga Mapping -- 2.4 Framework Development -- 3 Result -- 3.1 Interview Findings -- 3.2 Survey Findings -- 3.3 Matrix Ideation and Concept Generation -- 3.4 Proposed Framework -- 3.5 Mobile App -- 3.6 AR Companion Development -- 4 Discussion -- 5 Research Contribution -- 6 Conclusion.
References -- The Integral Significance of Data Science in Startup Ecosystems -- 1 Introduction -- 2 Literature Review -- 3 Analysis -- 4 Need for Data Science -- 5 The Process of Validity -- 6 Conclusion and Discussion -- References -- Comparing Object Detection Models for Public Safety -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Dataset -- 3.2 YOLOv6 -- 3.3 Detectron2 -- 3.4 Model Implementation -- 4 Results -- 4.1 YOLOv6 -- 4.2 Detectron2 -- 5 Conclusion and Future Work -- References -- Evolution of ChatGPT and Different Language Models: A Review -- 1 Introduction -- 2 Background -- 3 Literature Review -- 4 Working and Method Used in ChatGPT -- 5 New Versions of Large Language Models -- 6 Different Methodologies Used -- 7 Challenges -- 8 Conclusion -- References -- Emotion Detection for the Blind Using Deep Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 4 Results and Discussion -- References -- Impact of Feature Normalization Techniques for Recognition of Speech for Mathematical Expression -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 4 Results and Discussions -- 5 Comparative Analysis -- 6 Conclusion -- References -- Anomaly Prediction in Real-Time Water Flow Data-Machine Learning Versus Statistical Models -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology and Implementation -- 3.1 Simple Moving Average (SMA) -- 3.2 Weighted Moving Average (WMA) -- 3.3 Exponential Weighted Moving Average -- 3.4 K-Nearest Neighbors (KNNs) -- 3.5 Isolation Forest -- 3.6 Support Vector Machine (SVM) -- 4 Analysis and Results -- 5 Conclusion and Future Scope -- References -- Smart IoT Devices: An Efficient and Elegant Revolution Using Smart Switches -- 1 Introduction -- 1.1 IoT Background -- 1.2 The Sinric Pro Platform -- 1.3 Sinric and ESP8266 Integration -- 2 Problem Statement. 3 Literature Review -- 4 Methodology and Implementation -- 4.1 System Design and Prototyping -- 4.2 IoT Platform Integration -- 4.3 Real-World Testing and Iteration -- 4.4 Security and Privacy -- 4.5 User Experience and Interface Design -- 4.6 Final Deployment and Training -- 5 Block Diagram -- 6 Results -- 6.1 Efficient Energy Consumption -- 6.2 Voice Assistant Integration -- 6.3 Security Enhancements -- 6.4 Aesthetic Design and User Experience -- 6.5 Comparative Analysis -- 7 Conclusion -- References -- Malware Detection and Classification with Machine Learning Algorithms -- 1 Introduction -- 2 Related Work -- 3 Data Collection -- 4 Methodology -- 5 Results and Discussion -- 6 Conclusion -- References -- Analyzing the Customer Sentiment of Reels and Short Video Viewers of Facebook Using Social Media Analysis -- 1 Introduction -- 2 Theoretical Background and Hypothesis Development -- 2.1 SOR Theory -- 2.2 Stimulus -- 2.3 Organism -- 2.4 Response -- 3 Research Methodology -- 4 Data Analysis and Results -- 4.1 Reliability and Validity Testing -- 4.2 Path Diagram of Research Model -- 5 Discussions of the Results -- 6 Implication -- 7 Conclusion -- 8 Limitation and Future Scope -- References -- Image Forgery Detection Using Machine Learning -- 1 Introduction -- 2 Methodology -- 2.1 ELA -- 3 Results and Discussion -- 4 Future Scope -- 5 Conclusion -- References -- Text-to-Speech Conversion Using Concatenative Approach for Gujarati Language -- 1 Introduction -- 2 Gujarati Language for Speech -- 3 Literature Review -- 4 Speech Synthesis Process -- 4.1 Articulatory Synthesis -- 4.2 Formant Synthesis -- 4.3 Concatenative Synthesis -- 5 Implementation of Concatenation Technique -- 6 Conclusion -- References -- Transfer Learning for Speaker Verification with Short-Duration Audio -- 1 Introduction -- 2 Literature Review -- 3 Methodology. 3.1 Short-Duration Audio -- 3.2 Data Representation -- 3.3 Process Architecture -- 3.4 Stages of Verifying the Speaker's Identity -- 4 Implementation -- 4.1 Create a Virtual Environment -- 4.2 Enroll New Users Using an Audio File -- 4.3 Verify the User's Enrollment -- 4.4 Deploy in Streamlit -- 5 Analysis and Results -- 6 Conclusion -- References -- Demystifying Complex Algorithms: A Visual Guide Through the DSA Visualizer -- 1 Introduction -- 2 Motivation -- 3 Analysis of DSA Visualization Application -- 4 Methodology for DSA Visualization -- 5 System Application Design -- 6 Proposed Flow of Model -- 7 Visualization and Interface Designs -- 8 Result Analysis -- 9 Conclusion and Future Research -- References -- Late Leaf Spot Detection and Its Effect on Pod Quality of Groundnut Plants Using Deep Neural Networks: A Review -- 1 Introduction -- 1.1 Motivation -- 1.2 Late Leaf Spot -- 2 Literature Survey -- 2.1 Accuracy and Efficiency of Image Classification in Identifying Various Diseases in Crops -- 2.2 Plant Pod Quality and Yield Prediction -- 2.3 Advanced Methods for Assessing Disease Severity -- 2.4 Assessing Plant Disease Control: Manual Solutions Versus Machine Learning Techniques -- 3 Research Scope -- 4 Conclusion -- References -- An Inventory of Breast Cancer: A Comprehensive Approach -- 1 Introduction -- 2 Screening Modalities -- 2.1 Mammography -- 2.2 Histopathology -- 2.3 Ultrasound -- 2.4 Conclusion -- References -- An Improved Method of Phishing URL Detection Using Machine Learning -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Dataset Preparation -- 3.2 Data Preprocessing -- 3.3 Training and Evaluation -- 4 Implementation and Deployment -- 4.1 Supervised Machine Learning Algorithms Used -- 4.2 Model Deployment -- 4.3 User Interface -- 4.4 DNS Records -- 5 Analysis and Findings -- 6 Results -- 7 Conclusions. 8 Future Scope -- References -- Comparing Effectiveness of Statistical Versus Deep Learning for Time Series Forecasting -- 1 Introduction -- 2 Background -- 2.1 Time Series and Forecasting Definitions -- 2.2 Deep Learning Models for Time Series -- 2.3 Statistical Models for Time Series -- 3 Literature Review -- 4 Methodology -- 4.1 Hyperparameters -- 4.2 Datasets -- 5 Results -- 5.1 Evaluations Measures -- 5.2 Experimental Results -- 6 Conclusion -- References -- Development of Metaverse-Based Experiential Learning Platform to Enhance Shape Recognition Skills in Autistic Children -- 1 Introduction -- 2 Related Works -- 3 Framework of the Proposed Methodology -- 4 Evaluation and Outcome of Proposed Platform -- 5 Conclusion -- References -- FinTech for E-Governance and MSME: Leveraging FinTech for Inclusive Digital Payments in Governance of MSME -- 1 Introduction -- 2 Literature Review -- 2.1 Theoretical Framework -- 2.2 Hypothesis -- 3 Research Methodology -- 3.1 Application of Research Tool on Conceptual Model -- 3.2 Sample Size Calculations -- 3.3 Sample Selection -- 4 Data Analysis and Interpretation -- 5 Conclusion -- References -- Learning Module for Visually-Challenged Children in the Post-covid World -- 1 Introduction -- 2 Related Works -- 2.1 Literature Review -- 2.2 Market Study -- 3 Methods -- 3.1 Case Study -- 3.2 Interviews -- 3.3 Framework Development -- 3.4 Prototype Development -- 3.5 App Development -- 4 Results -- 4.1 Case Study Insights -- 4.2 Interview Findings -- 4.3 Proposed Framework -- 4.4 Prototype Development -- 4.5 Smartphone Application Development -- 5 Discussion -- 5.1 Research Contribution -- 5.2 Stakeholder Analysis -- 5.3 Implementation Framework -- 5.4 Limitations and Future Scope -- 6 Conclusion -- References -- Learning Rate Scheduler for Multi-criterion Movie Recommender System -- 1 Introduction. 1.1 Recommender System. |
Record Nr. | UNINA-9910865262703321 |
Senjyu Tomonobu | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 3 |
Autore | Senjyu Tomonobu |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (515 pages) |
Altri autori (Persone) |
So-InChakchai
JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN |
9789819713264
9789819713257 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- A Comprehensive Analysis of Machine Learning Models for IDS -- 1 First Section -- 1.1 Introduction -- 2 Related Work -- 3 Experimental Setup -- 3.1 Dataset -- 3.2 Machine Learning Algorithms -- 3.3 Methodology -- 4 Results and Discussion -- 5 Conclusion -- References -- An Overview of Artificial Intelligence Applications in Cybersecurity Domains -- 1 Introduction -- 2 Vulnerability Assessment and Penetration Testing (VAPT) -- 2.1 Information -- 2.2 Tools Used in VAPT -- 2.3 Example -- 2.4 Challenges and Drawbacks -- 2.5 Applications of AI in VAPT -- 3 Security Operations Center (SOC) -- 3.1 Information -- 3.2 Tools Used in SOC -- 3.3 Examples -- 3.4 Challenges and Drawbacks -- 3.5 Use of AI in SOC -- 4 Threat Intelligence and Malware Analysis -- 4.1 Information -- 4.2 Tools Used in Threat Intelligence and Malware Analysis -- 4.3 Example -- 4.4 Challenges and Drawbacks -- 4.5 Use of AI in Threat Intelligence and Malware Analysis -- 5 Digital Forensics -- 5.1 Information -- 5.2 Tools Used in Digital Forensics -- 5.3 Example -- 5.4 Challenges and Drawbacks -- 5.5 Use of AI in Digital Forensics -- 6 Conclusion -- References -- Enhancing Security in Wireless Communications Through Blockchain and Smart Contracts: A Comprehensive Study -- 1 Introduction -- 2 Related Work -- 3 Research Gaps Identified -- 4 Research Objectives -- 5 Research Methodology -- 6 Significance of the Research -- 7 Conclusion -- References -- Racist and Abusive Memes Classification Using Deep Learning Techniques -- 1 Introduction -- 2 Background -- 2.1 BERT -- 2.2 RoBERTa -- 2.3 CNN -- 3 Literature Survey -- 4 Racism and Memes Classification Model -- 5 Experimental Results -- 6 Conclusion and Future Works -- References -- Comparative Study of Learning Effectiveness Across NEPs on Network Fault Correlation.
1 Network Fault Correlation -- 1.1 Self-Healing Network -- 1.2 Key Capabilities -- 1.3 Key Benefits -- 1.4 Success Criteria -- 2 Solution Overview -- 2.1 Novelty of the Solution -- 2.2 Summary of the Solution -- 2.3 Advantages -- 3 Conclusion -- References -- Securing Networks: A Machine Learning Approach to Intrusion Detection Systems -- 1 Introductions -- 1.1 Overview -- 1.2 Motivation -- 1.3 Applications -- 1.4 Advantages -- 2 Related Work -- 3 Proposed Work -- 4 Experimental Results -- 5 Conclusion and Future Work -- References -- NL2Code: Harnessing Transformers for Automatic Code Generation from Natural Language Descriptions -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Understanding the Dataset for Training -- 3.2 Preprocessing -- 3.3 Model Architecture -- 3.4 Training Data -- 4 Result and Discussion -- 5 Conclusion -- References -- A Comprehensive Survey and Future Standpoints on Big Data Analytics of Mobile Data -- 1 Introduction -- 2 Mobile Analytics -- 3 Mobile Data Analytics Tools and Technologies -- 3.1 Google Analytics -- 3.2 Hadoop -- 3.3 Apple Analytics -- 3.4 Kobo Toolbox -- 4 Current Scenario Based on Past Surveys -- 5 Future Prospective of Usages Smartphone -- 6 Literature Reviews -- 7 Conclusion -- References -- An Approach to Detect Violations of Social Distancing Norms in the Public Domain -- 1 Introduction -- 2 Background Study and Related Work -- 3 Object Detection and Technologies Used -- 4 Proposed Idea -- 5 Output -- 6 Use Cases -- 7 Future Scope and Challenges -- 8 Conclusions -- References -- AI Art Authenticator: Deep Learning Image Classification -- 1 Introduction -- 2 Motivation -- 2.1 Preserving Creative Integrity -- 2.2 Copyright and Intellectual Property -- 2.3 Content Verification -- 2.4 Ethical Considerations -- 2.5 AI Development -- 3 Scope of the Project -- 3.1 Dataset Creation. 3.2 Deep Learning Model -- 3.3 Data Augmentation -- 3.4 Training and Testing -- 3.5 Confusion Matrix Analysis -- 4 Methodology -- 4.1 Data Collection and Processing -- 4.2 CNN Architecture -- 4.3 Model Training -- 4.4 Model Evaluation -- 4.5 Image Classification -- 4.6 Binary Classification -- 4.7 Confusion Matrix -- 5 Relevant Works -- 6 Results -- 7 Accuracy -- 7.1 Robustness and Generalization -- 7.2 Confusion Matrix Analysis -- 8 Conclusion -- References -- Creation and Deployment of E-Commerce Magento Website in AWS Cloud -- 1 Introduction -- 2 History of Magento -- 2.1 Magento 1 -- 2.2 Magento 2 -- 2.3 Magento Today -- 3 Features -- 4 Infrastructure Setup -- 5 Security -- 6 Performance Optimization -- 7 Key Security and Performance Optimization Measures: -- 8 Challenges for Magento Website in AWS -- 9 System Requirements -- 10 Deployment Process -- 11 Creating Replica of Instance -- 12 Taking Weekly Automated Backup -- 13 Troubleshooting Magento 2 -- 14 Conclusion -- References -- Empowering Rural Entrepreneurship in the Digital Age: A Systematic Exploration of Potential Tracks of Social Computing -- 1 Introduction -- 1.1 Research Problem and Significance -- 2 Research Objectives -- 3 Research Questions -- 4 Theoretical Background -- 5 Research Methodology -- 5.1 Search Criteria -- 6 The Transformative Potential of Social Computing, Success Factors and Best Practices -- 7 Conclusion, Implications for Policy and Practice, and Future Research Directions -- References -- Stock Market Prediction Using LSTM -- 1 Introduction -- 1.1 Navigating the Complexity -- 1.2 The Multifaceted Challenges -- 1.3 Feature Selection Dilemma -- 1.4 The Imperfect Tools of the Past -- 1.5 The Emergence of Deep Learning -- 1.6 The Rise of Recurrent Neural Networks (RNNs) -- 1.7 The Persistence of Challenges -- 1.8 Enter the Long Short-Term Memory (LSTM) Network. 1.9 Our Vision -- 1.10 The Need for Holistic Predictions -- 1.11 Our Contribution -- 1.12 Empowering Decision-Makers -- 1.13 A Fusion of Technology and Wisdom -- 2 Related Work -- 2.1 Long Short-Term Memory (LSTM): A Revolution in Sequential Data -- 2.2 LSTM in Financial Time Series Forecasting: A Pioneering Study -- 2.3 Stock Price Prediction with LSTMs: A Comprehensive Approach -- 2.4 LSTM Versus Traditional Models: A Comparative Analysis -- 2.5 Interpretable LSTM Models: Recent Developments -- 2.6 Holistic Stock Market Analysis with LSTMs -- 2.7 Sentiment Analysis Integration -- 2.8 Attention Mechanisms -- 2.9 Attention Mechanisms in Stock Price Prediction -- 3 Summary of the Table for References -- 3.1 Machine Learning Algorithms -- 3.2 Dataset -- 3.3 Evaluation Metrics -- 4 Dataset Preparation -- 4.1 Data Collection -- 4.2 Selection of Stocks -- 4.3 Data Features -- 4.4 Data Preprocessing -- 4.5 Feature Engineering -- 4.6 Target Variable -- 4.7 Data Splitting -- 4.8 Data Sequencing -- 4.9 Model Input Preparation -- 5 Dataset Preparation Approach -- 5.1 Data Collection -- 5.2 Stock Selection -- 5.3 Data Features -- 5.4 Data Preprocessing -- 5.5 Feature Engineering -- 5.6 Target Variable Definition -- 5.7 Data Splitting -- 5.8 Documentation -- 6 Limitations -- 6.1 Market Volatility -- 6.2 Complex Market Dynamics -- 6.3 Limited Historical Data -- 6.4 Model Complexity -- 6.5 Real-Time Data -- 6.6 Black Swan Events -- 6.7 Model Interpretability -- 7 Conclusion -- References -- UAV-Based Crop Health Analysis Using the Normalized Difference Vegetation Index (NDVI) Method -- 1 Introduction -- 2 Study Area and Dataset -- 3 Methodology -- 3.1 Data Acquisition Platform -- 3.2 Cotton Seed Variety Information -- 3.3 Dataset and Pre-processing Operations -- 3.4 Normalized Difference Vegetation Index (NDVI) -- 4 Result and Discussion -- 5 Conclusion. References -- Secured Routing Approaches to Mitigate Various Attacks in DTN: A Survey -- 1 Introduction -- 2 Related Work -- 2.1 Black Hole Attack and Gray Hole Attack -- 2.2 Flooding -- 2.3 Selfish Nodes -- 2.4 Other Security Threats -- 3 Conclusion -- References -- Implementing "DevSecOps as a Culture"-The Concept, Benefits, Execution Strategies, and Challenges -- 1 Introduction -- 1.1 The Concept of "DevSecOps as a Culture" -- 1.2 A Typical DevSecOps Pipeline Involves Following Stages -- 1.3 Tools Used in DevSecOps Framework -- 2 Benefits of Implementing "DevSecOps as a Culture" -- 3 Execution Strategies and Methods for Implementing "DevSecOps as a Culture" -- 4 Challenges in Implementing "DevSecOps as a Culture" -- 5 Probable Solutions for Different DevSecOps Implementation Challenges -- 6 Conclusion -- References -- Advancements and Challenges in Fully Automated Online Proctoring Systems: A Comprehensive Survey of AI-Driven Solutions -- 1 Introduction -- 2 Overview of Fully Automated Proctoring Systems -- 2.1 Vardan AI Proctoring -- 2.2 Automated Proctoring -- 2.3 Cheating Detection -- 2.4 Attentive Net -- 2.5 Proctor Net -- 3 Research Questions and Challenges Identified -- 4 What Attributes are to be Considered for Fully AOP Systems? -- 5 What is the Literature of Various Attributes of the Fully AOP Systems? -- 6 What is the Future of the Fully AOP Systems? -- 7 Conclusion -- References -- Review of the Diabetic Retinopathy Prediction Model Based on the Enhanced VGH Algorithm -- 1 Introduction -- 1.1 Uses for AI in Retina Images -- 1.2 Diabetic Retinopathy -- 1.3 Motivation -- 2 Literature Review -- 3 Convolutional Neural Network (CNN) -- 4 Research Methodology -- 5 Conclusion and Future Work -- 6 Future Studies -- References -- Intelligent Educational Chatbot for Student Interaction Based on DaVinci Model -- 1 Introduction -- 2 Motivation. 3 Relevant Works. |
Record Nr. | UNINA-9910865240603321 |
Senjyu Tomonobu | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Trends in Computing and Communications : Proceedings of SmartCom 2024, Volume 1 |
Autore | Senjyu Tomonobu |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Singapore : , : Springer, , 2024 |
Descrizione fisica | 1 online resource (509 pages) |
Altri autori (Persone) |
So-InChakchai
JoshiAmit |
Collana | Lecture Notes in Networks and Systems Series |
ISBN |
9789819713202
9789819713196 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Cancer Classification Using Gene Expression Data -- 1 Introduction -- 2 Literature Review -- 3 Datasets -- 4 Proposed Work -- 4.1 The Various Phases Are -- 4.2 The Four ML Algorithms Are -- 5 Experimental Analysis -- 5.1 Import Libraries -- 5.2 Import Dataset -- 5.3 Data Processing and Splitting -- 5.4 Modeling -- 5.5 Model Selection and Application -- 6 Result and Discussion -- 7 Conclusion and Future Scope -- References -- A Three-Phase Heart Rate Variability Analysis for Assessing Cardiac Health Deterioration in Diabetics -- 1 Introduction -- 2 Literature Survey -- 3 Data Collection -- 4 Methodology -- 5 Results and Discussion -- 6 Conclusion and Future Plan -- References -- Right to Be Forgotten: A Human Rights-Based Approach for Governance in Generative AI -- 1 RTBF-A Digital Right for Governance in GAI -- 2 Role of RTBF in GAI -- 2.1 Evolution of RTBF -- 2.2 RTBF and Personality Rights in GAI -- 2.3 Rights and Liabilities of GAI Models -- 3 Lacunae in Enforcement of RTBF in GAI -- 3.1 Lack of Legislative Framework -- 3.2 Legal Controversies Surrounding RTBF -- 3.3 Role of Internet Intermediaries -- 3.4 Practical Problems in Implementation of RTBF in GAI -- 4 Essential Suggestions for Strengthening RTBF in GAI -- 4.1 Social Contract for Data -- 4.2 Segregation at Source -- 4.3 Technological Solutions -- 5 Conclusion -- References -- "Correlation of Emotional Intelligence and Perceived Stress: A Comprehensive Analysis" -- 1 Introduction -- 2 Further Related Studies -- 3 Methodology -- 4 Results and Discussion -- 4.1 Findings -- 5 Future Scope -- 6 Conclusion -- References -- Use of CNNs for Estimating Depth from Stereo Images -- 1 Introduction -- 2 Related Work -- 2.1 Deep Learning on Stereo Matching Development -- 2.2 Traditional Approach for Stereo Matching -- 3 Algorithm.
3.1 Matching Cost Computation -- 4 The Convolutional Neural Network: -- 4.1 Cost Aggregation -- 4.2 Disparity Computation -- 4.3 Disparity Refinement -- 5 Results -- 6 Conclusion -- References -- An AI and IoT Based Smart Green Home Sustainability -- 1 Introduction -- 2 Background and Findings -- 3 System Design -- 4 Simulation and Results -- 5 Conclusion -- References -- Automated Gym Exercise Form Checker: Deep Learning-Based Pose Estimation -- 1 Introduction -- 2 Related Work -- 3 Standing Dumbbell Shoulder Press -- 4 Data Collection and Preprocessing -- 4.1 Video Pre-processing -- 4.2 Human Detection -- 5 Pose Estimation -- 5.1 Key point Extraction -- 5.2 Angle Calculation -- 5.3 Automated Form Checker -- 6 Results -- 7 Conclusion -- References -- Virtual Reality-Based Pedagogical Framework for Design Education -- 1 Introduction -- 1.1 Artificial Intelligence in Education -- 1.2 Virtual Reality in Education -- 1.3 Existing Works -- 1.4 Objective -- 2 Methodology -- 2.1 Survey -- 2.2 VR App Development -- 2.3 Code for Movement in VR -- 3 Result -- 3.1 Survey Insights -- 3.2 Integrated VR Framework for Design Education (iVFDE) -- 3.3 Gestalt Principles-Simulation of Design Education -- 4 Discussion -- 5 Conclusion -- References -- Routing Strategies for Quality of Service Optimization over Vehicular Ad Hoc Networks: A Review -- 1 Introduction -- 1.1 VANET Overview and Architecture -- 1.2 VANET and MANET Comparison -- 2 Communication Protocols in VANET -- 3 QoS-Based Routing in VANET -- 4 Realistic Mobility Models for VANET Simulation -- 5 Open Issues and Challenges in VANETs -- 6 Conclusion -- References -- A Review of Plant Classification Using Deep Learning Models -- 1 Introduction -- 2 Deep Learning Models for Plant Classification -- 2.1 Multilayer Perceptron -- 2.2 Convolutional Neural Networks -- 2.3 Recurrent Neural Network. 2.4 Graph Convolutional Networks -- 2.5 Capsule Networks -- 2.6 Siamese Networks -- 3 Datasets and Evaluation Metrics -- 4 Challenges and Future Directions -- 5 Conclusion -- References -- Algo-Powered Banking: Enhancing Investment Decisions Through Machine Learning -- 1 Introduction -- 2 Literature Survey -- 3 Technical Analysis -- 3.1 Complex Adaptive System (CAS): A Continuous Learning Framework -- 3.2 Convolutional Neural Networks (CNNs): Specialized Feature Extraction -- 3.3 ResNet: Overcoming the Vanishing Gradient Challenge -- 3.4 LeNet-5: Efficiency and Simplicity for Real-Time Applications -- 3.5 VGG-16: Unveiling Fine-Grained Details -- 3.6 A Synergistic Ensemble: Combining Adaptability and Expertise -- 4 Sentiment Analysis -- 4.1 VADER: A Powerful Tool for Financial Sentiment Analysis -- 4.2 Capture Nuances in Financial Sentiment -- 4.3 Advantages of VADER in Financial Sentiment Analysis -- 4.4 Applications of VADER in Financial Sentiment Analysis -- 4.5 VADER: A Valuable Tool for Financial Professionals -- 5 Long-Term Economic Prediction -- 5.1 Applications of Engle-Granger Cointegration in Long-Term Economic Prediction -- 5.2 Empirical Evidence and Limitations -- 6 Conclusion -- References -- Predicting the Air Quality Using Machine Learning Algorithms: A Comparative Study -- 1 Introduction -- 2 Literature Review -- 3 Materials and Methods -- 3.1 Classification Models -- 3.2 Performance Metrics -- 3.3 Datasets -- 4 Experimental Setup -- 5 Results and Discussions -- 6 Comparison -- 7 Conclusion -- References -- Quantum Image Processing Using Edge Detection Based on Roberts Cross Operators -- 1 Introduction -- 2 Methods -- 3 Edge Detection -- 3.1 Quantum Circuit for Edge Detection -- 4 Conclusions -- References. A Conceptual Framework for Building Robust Blockchain Technology-Enabled Business Processes in Commodity Markets: A Systems Approach -- 1 Introduction -- 2 Preliminary Study -- 2.1 Simplified Architecture of Blockchain -- 2.2 Cryptographically Secured Hash Function -- 2.3 Cryptographically Secured Series of Blocks via Hashing -- 2.4 Merkle Trees -- 2.5 Smart Contract -- 2.6 Systems Approach -- 2.7 Documentary Credit -- 2.8 Bill of Lading -- 3 Review of Existing Literature -- 4 Conceptual Framework for Commodity Trading Using Blockchain -- 5 Discussion and Future Scope -- References -- Victimization (V) of Big Data: A Solution Using Federated Learning -- 1 Introduction -- 2 Literature Survey -- 3 Victimization: A Big Data Characteristic -- 4 System Architecture -- 4.1 Conventional Deep Learning Approach -- 4.2 Federated Learning Approach -- 4.3 Apache Spark Architecture -- 5 Results and Analysis -- 5.1 Dataset Description -- 5.2 Analysis and Discussion -- 6 Conclusion -- References -- Demystifying the Applications of Wavelet Transform in Bio Signal and Medical Data Processing -- 1 Introduction -- 2 Medical Image and Bio Signal Processing Using Wavelet Transforms -- 2.1 Discrete Wavelet Transforms -- 2.2 Lifting Wavelet Transform -- 2.3 Quincunx Wavelet Transform -- 2.4 Quaternion Wavelet Transform (QWT) -- 2.5 Dual-Tree Complex Wavelet Transform -- 2.6 Integer Wavelet Transform (IWT) -- 2.7 Gabor Wavelet Transform -- 3 Results and Discussion -- 4 Conclusion -- References -- Risk Prediction of Diabetic Disease Using Machine Learning Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 Dataset Preprocessing -- 3.2 Feature Extraction -- 4 Materials and Methods -- 4.1 Dataset -- 4.2 Classification of Machine Learning Algorithms -- 4.3 Performance Analysis -- 5 Experimental Seup -- 6 Conclusion -- References. IoT-Based Weather Monitoring System Using NodeMCU ESP8266 -- 1 Introduction -- 1.1 Literature Survey -- 2 Proposed Method for Weather Monitoring System -- 2.1 Problem Statement -- 2.2 Proposed System -- 2.3 Hardware Setup -- 2.4 Software Setup -- 2.5 Implementation of Proposed Method -- 3 Results and Discussion -- 4 Conclusion -- References -- Real-Time Obstacle Detection Using YOLOv8 on Raspberry Pi 4 for Visually Challenged People -- 1 Introduction -- 2 Related Work -- 3 Background -- 3.1 YOLOv8 -- 3.2 Raspberry Pi 4 -- 3.3 Raspberry Pi Camera -- 4 Methodology -- 4.1 Experimental Setup -- 5 Result Analysis -- 6 Conclusions, Limitations, and Future Work -- References -- Location Jamming of Radar Waves Using Software-Defined Radio -- 1 Introduction -- 2 Related Topics -- 2.1 Electronic Counter Measures Against Radar (ECM) -- 2.2 Software-Defined Radio (SDR) -- 3 Problem Statement -- 4 Motivation -- 5 Proposed Approach -- 5.1 Angle Calculator -- 5.2 DRFM -- 5.3 Range Tracker -- 5.4 Module Integration with SDR -- 6 Experimental Evaluation -- 7 Conclusion -- References -- Machine Learning Approaches for Film Censorship: A Comprehensive Survey of Techniques -- 1 Introduction -- 2 Existing Techniques in AFCR -- 3 Datasets Available and Their Description -- 4 Literature Survey -- 5 Description of Chart -- 6 Conclusion -- References -- A Survey: Network Attack Detection and Mitigation Techniques -- 1 Introduction -- 2 Network Attack Detection Techniques -- 3 Network Attack Mitigation Techniques -- 4 Conclusion -- References -- A High-Accuracy Deep Learning Approach for Wheat Disease Detection -- 1 Introduction -- 2 Literature Survey -- 3 Research Methodology -- 3.1 Dataset -- 3.2 Transfer Learning -- 3.3 Multistage Fine Tuning -- 3.4 Performance Metrics -- 4 Experimental Results -- 4.1 Model Performances -- 4.2 Accuracy and Loss Curves -- 5 Conclusion. References. |
Record Nr. | UNINA-9910865237903321 |
Senjyu Tomonobu | ||
Singapore : , : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Trends in Computing and Communications : Proceedings of SmartCom 2021 |
Autore | Zhang Yu-Dong |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (751 pages) |
Altri autori (Persone) |
SenjyuTomonobu
So-InChakchai JoshiAmit |
Collana | Lecture Notes in Networks and Systems Ser. |
Soggetto genere / forma | Electronic books. |
ISBN | 981-16-4016-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- Influencing User Intention of Plant-Based Sensing System Adoption in Public Vocational High Schools of Indonesia Using TAM -- 1 Introduction -- 2 Literature Review -- 2.1 The Plant-Based Sensing System Proposed -- 2.2 The Theory of Technology Acceptance Model -- 3 Methodology -- 4 Research Model and Hypothesis -- 4.1 External Variable of Model -- 4.2 Perceived Ease of Use, Perceived Usefulness, Attitude, and Behavioral Intention -- 5 Results -- 5.1 Reliability Analysis -- 5.2 Regression Analysis -- 6 Conclusion -- References -- An Empirical Study of Critical Success Factors for the Adoption of m-Government Services in Tanzania -- 1 Introduction -- 2 Literature Review and Hypothesis Development -- 2.1 m-Government Services in Tanzania -- 2.2 Mobile Services Acceptance Model (MSAM) -- 2.3 Hypotheses Development -- 3 Methodology -- 4 Findings -- 5 Discussion -- 6 Conclusion -- References -- Smart City Based on LoRaWAN: Coverage Study for Cusco Urban Area -- 1 Introduction -- 2 LoRaWAN Technology -- 3 Cusco Urban Area Coverage Simulation -- 4 Data Collection -- 5 Analysis of Experimental Measurements -- 5.1 Efficiency Analysis for SF12 -- 5.2 RSSI Analysis for SF12 -- 5.3 Efficiency and RSSI Analysis for SF7 -- 6 Conclusion -- References -- Digital Transformation in Education in Knowledge Society -- 1 Introduction -- 1.1 Basic Considerations -- 2 Materials and Methods -- 3 Results -- 4 Conclusion -- References -- Induction Motor Overload Recognition Based on Sound Analysis -- 1 Introduction -- 2 Related Works -- 3 The Corpus -- 4 The Experiments -- 4.1 Frame-by-Frame Classification -- 4.2 One-Second Segment Classification -- 4.3 Half-a-Second Segment Classification -- 4.4 The Selected Classifier -- 5 Conclusions -- References.
Simulation of an All-Terrain Vehicle Driving Experience Using Virtual Reality -- 1 Introduction -- 2 Materials and Methods -- 2.1 Conception of the Virtual Experience -- 2.2 Learning Programming Tools -- 2.3 Virtual Environment Validation -- 2.4 Conception of the Immersive Environment -- 3 Results -- 4 Discussion -- 5 Conclusions and Recommendations -- References -- Safety-Centric and Smart Outdoor Workplace: A New Research Direction and Its Technical Challenges -- 1 Introduction -- 2 The Need of Dedicated Focus on Smart Outdoor Workplace -- 2.1 Smart Workplace -- 2.2 Smart Outdoor Workplace -- 2.3 Divergent Technology Streams -- 3 Technical Challenges -- 3.1 Diverse and Incompatible Sensors and Devices -- 3.2 Growing Gap Between Battery Technologies and Power Requirements -- 4 Research Prospects Driven by the Identified Challenges -- 4.1 Sandwich Approach to a Knowledge Architecture for Smart Outdoor Workplace -- 4.2 Model-Driven Simulation and Optimization of Energy Consumption in Smart Outdoor Workplace -- 5 Conclusions and Future Work -- References -- Devising Auxiliary Glyph Schemas Combined with XOR Filters for Improvised Font Delivery and Reliable Dynamic Font Augmentation -- 1 Introduction -- 2 Background and Related Work -- 3 Methodology and Algorithm -- 3.1 Basic Font Subsetting Solution and Problems -- 3.2 Client Side: Proposed Data Structures -- 3.3 Font Subsetting and Augmentation Workflows Using Proposed Solution -- 3.4 Flow for an Application Session with the Proposed Solution -- 3.5 XOR Filter Processing for Subset or Font Portion Serving on Server Side -- 4 Conclusion -- References -- Multiple Sequence Alignment Algorithms in Bioinformatics -- 1 Introduction -- 2 Multiple Sequence Alignment (MSA) -- 3 Multiple Sequence Alignment Algorithms (MSA) -- 3.1 ClustalW -- 3.2 Clustal Omega -- 3.3 T-Coffee -- 3.4 MAFFT -- 3.5 Kalign. 3.6 MUSCLE -- 3.7 Probcons -- 3.8 Genetic Algorithms -- 4 Evaluation of MSA -- 5 Conclusion -- References -- Design and Implementation of a Machine Learning-Based Technique to Detect Unipolar and Bipolar Depression Using Motor Activity Data -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results -- 5 Discussion -- 6 Conclusion -- References -- Underwater Magnetic Release System -- 1 Overview -- 2 System Components -- 2.1 The Software -- 3 Power Considerations -- 4 Design Specifics -- 5 Conclusion -- References -- An Optimal Route for People with Ambulant Disabilities Using Mathematical Risk Modeling and Analytic Hierarchy Process -- 1 Introduction -- 2 Methods -- 2.1 Factors Affecting the Selection of Best Route -- 2.2 Mathematical Risk Modeling -- 2.3 AHP Technique -- 3 Results and Discussion -- 4 Conclusion -- References -- The Innovation in Manufacturing Areas of Electronics Industry of Mexicali Using PLC -- 1 Introduction -- 2 Technological Innovation -- 3 Technology Development -- 4 Improving Competitiveness -- 5 Software Quality in the Electronics Industry -- 6 Limitations of the Investigation -- 7 Methodology -- 8 Results -- 9 PLC Analysis -- 10 Correlation Analysis of Industrial Parameters -- 11 Conclusions -- References -- Assistive Autonomous Electric Vehicle for Disaster Management -- 1 Introduction -- 2 Mechanical System Design -- 2.1 Overview -- 2.2 Frame Design -- 2.3 Assembly for the Wheels -- 2.4 Sensors Stand -- 2.5 Body Housing -- 3 Electronics System Design -- 3.1 Brief Overview -- 3.2 Electronic Suite Description -- 4 Working of the Circuit -- 5 Software and Control System -- 5.1 Brief Overview -- 5.2 Main Software Pipeline -- 5.3 Lane Detection and Path Mapping -- 5.4 Object Discovery Pipeline -- 5.5 Arduino Communication -- 5.6 Motor Driving -- 6 Advantage and Applications -- 6.1 Advantages -- 6.2 Applications. 7 Conclusion -- References -- On the Existing and New Potential Methods for Partial Discharge Source Monitoring in Electrical Power Grids -- 1 Introduction -- 2 Theoretical Aspects -- 2.1 Spectrogram -- 2.2 Wavelet Transform -- 2.3 Compressive Sensing -- 2.4 Phase-Diagram-Based Analysis -- 3 Experimental Configuration and Results -- 4 Conclusions -- References -- Efficient Approach for Block-Based Copy-Move Forgery Detection -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 4 Experimental Results -- 5 Discussion and Conclusion -- References -- Smart IoT Sensor Network for Monitoring of Cultural Heritage Monuments -- 1 Introduction -- 2 Sensor Design -- 3 Visualization Platform -- 4 Conclusions -- References -- MorArch: A Software Architecture for Interoperability to Improve the Communication in the Edge Layer of a Smart IoT Ecosystem -- 1 Introduction -- 2 Present Context and Previous Works -- 2.1 Interoperability Architectures -- 2.2 Interoperability Protocols -- 3 Proposal -- 4 Experiments -- 4.1 File System -- 4.2 Data Flow Inside Our Fog Ecosystem -- 4.3 Results -- 5 Conclusions -- References -- A Design of an IoT-Based Smart Home with Auto-sanitization System -- 1 Introduction -- 2 Literature Review -- 3 Methodology and Modeling -- 4 Working Procedure -- 4.1 Remote Access -- 4.2 Voice Command Access -- 5 Implementation of the Prototype -- 5.1 Software Implementation -- 5.2 Hardware Implementation -- 5.3 Visual Models of a Smart Home with Auto-sanitization -- 6 Future Developments, Scopes, and Social Impact -- 7 Results and Data Analysis -- 8 Conclusion -- References -- An Experiment Study on Federated Learning Testbed -- 1 A Novel PPML Framework: Federated Learning -- 2 Methodology and System Implementation -- 3 Results on Efficiency Test -- 3.1 Training Speed -- 3.2 Communication Cost -- 4 Privacy Analysis -- 5 Conclusion. References -- Visual Quality Comparison of Ocean Wave Effects at Different Camera Distances -- 1 Introduction -- 2 Material and Method -- 2.1 Setting in Houdini -- 2.2 Setting in Unreal -- 2.3 Minor Conclusion -- 3 Result -- 4 Conclusion -- References -- Control System to International Parental Child Abduction, Case: Colombia -- 1 Introduction -- 2 Background -- 3 Design and Method for Colombia -- 4 Results -- 5 Analysis of the Results -- 6 Conclusions and Further Work -- References -- It is not Always Ethical: Data Manipulation to Justify Public Policy Choices in COVID-19 Response -- 1 Introduction -- 2 Background -- 3 Cases of COVID-19 Data Manipulation -- 4 Florida's COVID-19 Data Portal -- 5 Georgia's COVID-19 Data Portal -- 6 Arizona's COVID-19 Data Portal -- 7 Texas, Virginia, and Vermont's COVID-19 Data Portals -- 8 Implications of Data Manipulation -- 9 Conclusion -- References -- BPMN2EVENTB Supporting Transformation from BPMN2.0 to Event B Using Kermeta -- 1 Introduction -- 2 The Proposed Approach -- 3 Subset of Mapping Rules BPMN-Event B -- 4 Illustration -- 5 Conclusion and Future Work -- References -- Teaching Neuroscience Through Flipped Classroom: Systematizing an Experience with Students of the Professional Career of Elementary Education -- 1 Introduction -- 1.1 Contributions of Neuroscience to Education -- 1.2 Teaching Neuroscience Through Digital Resources -- 2 Methodology -- 2.1 Procedures -- 2.2 Participants -- 2.3 Measures -- 3 Results -- 3.1 Analysis of Means and Variation Coefficients -- 3.2 Exploratory Analysis with Boxplots -- 3.3 Analysis of Some Items -- 4 Discussion -- 5 Conclusions and Future Works -- References -- Low-Cost IoT Platform for Telemedicine Applications -- 1 Introduction -- 2 Related Works -- 3 Case of Study -- 4 Implementation of the Proposal -- 4.1 Wearable Device -- 4.2 Android TV App -- 4.3 Cloud Service. 5 Discussion of Results. |
Record Nr. | UNINA-9910506402003321 |
Zhang Yu-Dong | ||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Trends in Computing and Communications [[electronic resource] ] : Proceedings of SmartCom 2023, Volume 2 / / edited by Tomonobu Senjyu, Chakchai So-In, Amit Joshi |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (838 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Signal processing Computational Intelligence Artificial Intelligence Communications Engineering, Networks Signal, Speech and Image Processing |
ISBN | 981-9908-38-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Wireless SDN : A Perspective for Handover Management -- Classification of Sentiment Analysis of Tweets On Twitter -- A Boosted Random Forest Algorithm for Automated Bug Classification -- Secure QR Code Transactions Using Mobile Banking App -- A Small-Scale Ontology to represent Knowledge about Question Items -- Deep Learning for classification of encrypted images -- A Clustering-based Approach to Feature Selection for Breast-Cancer Classification -- Knowledge Discovery and Visualization of UMLS based on Complex Network Analysis -- An Automatic Early Detection of Melanoma Skin Cancer Using Fuzzy C-Means -- Integrating Hybrid feature extraction techniques with Support Vector Machine for Efficient Facial emotion recognition -- Classification of ISL using Pose and Object Detection based Techniques -- Explainable Artificial Intelligence for Autonomous Surface Vessels by Fuzzy-Based Collision Avoidance System -- Gamification: Secret ingredient in enhancing flavor of Theory of Computation understanding -- Voice Controlled Home Automation System -- A Review of Depressive Disorder Detection Based on Sentiment Analysis -- Efficient bounding strategy for CEC 2020 winner algorithms in solving production planning problems. |
Record Nr. | UNINA-9910731485903321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Trends in Computing and Communications [[electronic resource] ] : Proceedings of SmartCom 2023, Volume 1 / / edited by Tomonobu Senjyu, Chakchai So–In, Amit Joshi |
Edizione | [1st ed. 2023.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 |
Descrizione fisica | 1 online resource (823 pages) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Signal processing Computational Intelligence Artificial Intelligence Communications Engineering, Networks Signal, Speech and Image Processing |
ISBN | 981-9907-69-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Impact of Data Centric Approach to Improve the Performance of Leaf Disease Classification -- Evolution, Trends and Future Developments of Business Intelligence -- A Secure Protocol for Authentication and Data Storage for Healthcare System -- OMA-DSS: Ontology Based Multi Agent Decision Support System in Healthcare Domain to Prevent Cardiovascular Diseases -- Innovative Task Scheduling and Allocation Algorithm for E-Governance with Multi-cloud Environment -- Distributed Deep Learning with Data Parallelism for Diabetic Retinopathy Classification -- Sting - A User Governed Crime Alert App -- Classification of Traffic Signal Images using Deep Neural Networks -- Automatic Evaluatıon for Machıne Translatıon -- Evolving Time Series Data Streams: A Review -- Semi-Supervised Medical Image Segmentation on Data from Different Distributions -- Profiling Network Traffic by using Classification Techniques in Machine Learning -- Identification of Cracks in High Rise Buildings Using Drones and Deep Learning -- Wine Quality Prediction Using Machine Learning Techniques -- Wearable Technology with Location Tracking, Health Monitoring, and Attendance Tracking for Employees. |
Record Nr. | UNINA-9910731459403321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Trends in Computing and Communications [[electronic resource] ] : Proceedings of SmartCom 2019 / / edited by Yu-Dong Zhang, Jyotsna Kumar Mandal, Chakchai So-In, Nileshsingh V. Thakur |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (498 pages) |
Disciplina | 006.3 |
Collana | Smart Innovation, Systems and Technologies |
Soggetto topico |
Computational intelligence
Electrical engineering Signal processing Image processing Speech processing systems Computational Intelligence Communications Engineering, Networks Signal, Image and Speech Processing |
ISBN | 981-15-0077-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Comparison of Different Image Segmentation Techniques on MRI Image -- Business-Driven Blockchain-Mempool Model for Cooperative Optimization in Smart Grids -- Impact on the Information Security Management due to the Use of Social Networks in a Public Organization in Ecuador -- Appropriate Security Protocols to Mitigate the Risks in Electronic Money Management -- Acceptance and Readiness of Thai Farmers toward Digital Technology -- Design and Implementation of Rule Based Hindi Stemmer for Hindi Information Retrieval -- Research on the Development Trend of Ships Integrated Power System Based on Patent Analysis -- Road Travel Time Prediction Method Based on Random Forest Model -- Video Synchronization and Alignment using Motion Detection and Contour Filtering -- Quick insight of Research Literature using Topic Modeling -- Security Vulnerabilities of Open Stack Cloudand Security Assessment using Different Software Tools -- Smart Physical Intruder Detection System for Highly Sensitive Area -- Two level classication of Radar Targets using Machine Learning -- A Hyperledger Scheme for the Deployment of Smart Contracts in a Public Organization of Ecuador -- Web Mash-up Development & Security using AOP -- Enhanced Text Stemmer with Noisy Text Normalization for Malay Texts -- An Overview on Privacy Preservation and Public Auditing on Outsourced Cloud Data -- Segmentation of Handwritten Text using Bacteria Foraging Optimization -- Problems with PIR sensors in Smart Lighting+Security Solution and Solutions of Problems -- Multi-level Thresholding and Quantization for Segmentation of Color Images. |
Record Nr. | UNINA-9910484089503321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|