top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in computing and network communications . Volume 2 : proceedings of CoCoNet 2020 / / edited by Sabu M. Thampi [and four others]
Advances in computing and network communications . Volume 2 : proceedings of CoCoNet 2020 / / edited by Sabu M. Thampi [and four others]
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (XX, 611 p. 275 illus., 205 illus. in color.)
Disciplina 004
Collana Lecture Notes in Electrical Engineering
Soggetto topico Computer science
Computer networks
ISBN 981-336-987-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part 1: Machine Learning, Visual Computing and Signal Processing -- Chapter 1. Computational Reconstructions of Extracellular Action Potentials and Local Field Potentials of a Rat Cerebellum using Point Neurons -- Chapter 2. Iris Recognition using Integer Wavelet Transform and Log Energy Entropy -- Chapter 3. Deep Learning Based Approach for Skin Burn Detection with Multi-level Classification -- Chapter 4. Semantic Retrieval of Microbiome Information Based on Deep Learning -- Chapter 5. Early Detection of Covid-19 on CT Scans Using Deep Learning Techniques -- Chapter 6. Towards Protein Tertiary Structure Prediction using LSTM/BLSTM -- Chapter 7. An Android Based Smart Home Automation System in Native Language -- Chapter 8. Live Acoustic Monitoring of Forests to Detect Illegal Logging and Animal Activity -- Chapter 9. CATS: Cluster-Aided Two-Step Approach for Anomaly Detection in Smart Manufacturing -- Chapter 10. Prediction of Energy Consumption using Statistical and Machine Learning Methods and Analysing the Significance of Climate and Holidays in the Demand Prediction -- Chapter 11. Ranking of Educational Institutions based on user priorities using AHP-PROMETHEE Approach -- Chapter 12. Using AUDIT Scores to Identify Synbiotic Supplement Effect in High Risk Alcoholics -- Chapter 13. Accurate Identification of Cardiac Arrhythmia using Machine Learning Approaches -- Chapter 14. Learning based Macro Nutrient Detection Through Plant Leaf -- Chapter 15. Characteristics of Karawitan Musicians' Brain: sLORETA Investigation.
Record Nr. UNINA-9910483695403321
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in computing and network communications : proceedings of CoCoNet 2020 / / Editor, Sabu M. Thampi [and four others]
Advances in computing and network communications : proceedings of CoCoNet 2020 / / Editor, Sabu M. Thampi [and four others]
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (705 pages)
Disciplina 004
Collana Lecture Notes in Electrical Engineering
Soggetto topico Signal processing
Computer science
Computer networks
ISBN 981-336-977-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910483508203321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in signal processing and intelligent recognition systems : 6th International Symposium, SIRS 2020, Chennai, India, October 14-17, 2020, revised selected papers / / Sabu M. Thampi [and five others]
Advances in signal processing and intelligent recognition systems : 6th International Symposium, SIRS 2020, Chennai, India, October 14-17, 2020, revised selected papers / / Sabu M. Thampi [and five others]
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (XI, 376 p. 180 illus., 136 illus. in color.)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Computers
Optical data processing
Artificial intelligence
ISBN 981-16-0425-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484134603321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in signal processing and intelligent recognition systems : 6th International Symposium, SIRS 2020, Chennai, India, October 14-17, 2020, revised selected papers / / Sabu M. Thampi [and five others]
Advances in signal processing and intelligent recognition systems : 6th International Symposium, SIRS 2020, Chennai, India, October 14-17, 2020, revised selected papers / / Sabu M. Thampi [and five others]
Edizione [1st ed. 2021.]
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (XI, 376 p. 180 illus., 136 illus. in color.)
Disciplina 006.3
Collana Communications in Computer and Information Science
Soggetto topico Computers
Optical data processing
Artificial intelligence
ISBN 981-16-0425-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464509703316
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Soft Computing and Communication Networks : Proceedings of ACN 2023 / / edited by Sabu M. Thampi, Jiankun Hu, Ashok Kumar Das, Jimson Mathew, Shikha Tripathi
Applied Soft Computing and Communication Networks : Proceedings of ACN 2023 / / edited by Sabu M. Thampi, Jiankun Hu, Ashok Kumar Das, Jimson Mathew, Shikha Tripathi
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (590 pages)
Disciplina 006.3
Collana Lecture Notes in Networks and Systems
Soggetto topico Computational intelligence
Artificial intelligence
Telecommunication
Signal processing
Big data
Computational Intelligence
Artificial Intelligence
Communications Engineering, Networks
Digital and Analog Signal Processing
Big Data
ISBN 9789819720040
9789819720033
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Conference Organization -- Preface -- Contents -- Editors and Contributors -- Artificial Intelligence and Human-Computer Interaction -- Open Gaze: Open-Source Eye Tracker for Smartphone Devices Using Deep Learning -- 1 Introduction -- 2 Dataset -- 3 Data Splits -- 3.1 MIT Split -- 3.2 Exclusively Mobile Devices in All Orientations -- 3.3 Mobile Devices Used Solely in Portrait Orientation -- 3.4 Google's Data Division -- 4 Model Architecture -- 5 Training -- 5.1 Implementation -- 5.2 Refining Hyperparameters -- 6 Post-training SVR Personalization -- 6.1 Differential Impact Based on Dataset Characteristics -- 6.2 Segmentation According to 13-Point Calibration -- 6.3 Google's 70/30 Training and Testing Split Methods -- 7 Results -- 7.1 PyTorch Results -- 8 Individualization Using Transformations -- 8.1 SVR Results -- 8.2 Version of Google Split -- 8.3 Version of MIT Split -- 8.4 Unique -- 8.5 Random Data Points/Samples -- 8.6 Outcomes from MIT Split Evaluation -- 8.7 Results from Google Split Evaluation -- 9 Future Scope and Improvements -- 10 Availability of Code and Data -- References -- Comparison on the Metaverse Space Development in Spatial.io Platform and Monaverse Platform -- 1 Introduction -- 2 Background -- 2.1 Spatial.io: Platform Overview -- 2.2 Monaverse: Platform Overview -- 3 Comparative Analysis -- 3.1 Decentralization -- 3.2 Interoperability -- 3.3 Space Creation and Scalability -- 3.4 Project Setup and Space Components -- 3.5 Interaction Interface of the Metaverse Space -- 3.6 Examples of Monetization and Opportunities -- 4 Discussion and Future Work -- References -- Intelligent Holo-Assistant Avatar with Lip-Syncing -- 1 Introduction -- 2 Methodology -- 2.1 Designing of GUI of Holo-Assistant Applications -- 2.2 Developing Intelligent Assistant Avatar with Lip-Syncing.
2.3 Integrate the Intelligent Holo-Assistant Avatar with Lip-Syncing -- 3 Implementation and Results -- 4 Conclusion -- References -- Historical Analysis of Financial Fraud and Its Future -- 1 Introduction -- 2 Historical Analysis of Financial Fraud -- 2.1 Early Modern Finance -- 2.2 Industrial Revolution and Capital Market Development -- 2.3 Post World War II -- 2.4 Globalization and Financial Deregulation -- 2.5 Digital Age and FinTech -- 3 Factors Contributing to Financial Fraud -- 3.1 The Human Factor -- 3.2 Weak Internal Controls -- 3.3 The Psychological Factor -- 4 Classification and Impacts of Financial Fraud -- 4.1 Direct Impact of Financial Fraud -- 4.2 Indirect Impact of Financial Fraud -- 5 The Future of Financial Fraud -- 5.1 The Technology Advancements -- 5.2 Dynamic Economic Circumstances -- 5.3 Regulatory Responses -- 5.4 Fraudster Adaptability -- 5.5 Ethical Considerations -- 6 Conclusion -- References -- A Study on Colour-Emotion Association for Happiness Among the Indian Youth Using Artificial Intelligence -- 1 Introduction -- 2 Methodology -- 2.1 Colour Extraction from T-Shirts -- 2.2 Facial Emotion Recognition -- 2.3 Data Collection for Colour-Emotion Mapping -- 3 Discussion -- 4 Conclusion and Future Directions -- References -- Comparative Analysis of Chicken Swarm Optimization and IbI Logics Algorithm for Multiobjective Optimization in kk-Coverage and mm-Connectivity Problem -- 1 Introduction -- 2 Related Works -- 3 Problem Formulation -- 3.1 Multiobjective Optimization Formulation -- 4 Proposed Algorithm -- 4.1 ILA Versus CSO -- 4.2 Fitness Function for both Algorithm -- 5 Simulation Results -- 6 Conclusion -- References -- Security and Privacy in Emerging Technologies -- Machine Learning-Based Detection of Attacks and Anomalies in Industrial Internet of Things (IIoT) Networks -- 1 Introduction.
1.1 IIoT Network Security Challenges -- 1.2 Attack Detection and Anomaly Identification Using Machine Learning -- 2 Literature Review -- 2.1 Existing IDS Systems Based on GANs -- 2.2 G-IDS Proposal -- 3 Dataset Information -- 4 Proposed System -- 4.1 Data Preprocessing -- 4.2 Feature Selection Algorithm -- 4.3 Generative Adversarial Networks -- 5 Results and Discussion -- 6 Conclusion -- References -- Privacy in Data Handling in Agile Development Environments -- 1 Introduction -- 1.1 Motivation -- 1.2 Problem and Target Audience -- 2 Theoretical Reference -- 3 Related Work -- 4 Proposal Presentation -- 4.1 Methodological Structure -- 4.2 Setting Security and Privacy Controls -- 4.3 Proposed Instruction Set -- 5 Practical Application -- 6 Final Considerations -- References -- Feature Enriched Framework for Rumor Detection Using Tweets -- 1 Introduction -- 2 Related Work -- 2.1 Machine Learning Models/Techniques -- 2.2 Deep Learning Models/Techniques -- 2.3 Hybrid Techniques -- 2.4 Word/Contextual Embedding Techniques and Transformer Models -- 3 Research Design -- 3.1 Feature Enriched Rumor Detection Framework -- 3.2 Perspectives Used for Rumor Modeling -- 4 Methodology -- 4.1 Models Used for Experimentation -- 4.2 Rumor Dataset Description -- 4.3 Experimentation -- 4.4 Evaluation Results -- 5 Analysis and Discussion -- 6 Conclusion -- References -- Enhancing KYC Verification: A Secure and Efficient Approach Utilizing Blockchain Technology -- 1 Introduction -- 2 Background -- 2.1 Traditional KYC Verification -- 2.2 Blockchain -- 2.3 KYC and Blockchain -- 3 Related Work -- 4 Enhancements -- 5 Proposed Approach -- 5.1 System Architecture -- 5.2 Proposed Algorithms -- 6 Results and Discussion -- 6.1 Scalability -- 6.2 Flexibility -- 6.3 Transparency -- 6.4 Privacy -- 6.5 History Tracking -- 7 Future Scope -- 8 Conclusion -- References.
A Smartphone Data Steganography Framework Based on K-mean Image Selection and Random Embedding in Three Image Channels -- 1 Introduction -- 2 Related Works -- 3 K-mean Select Random Insert (KSRI) Framework -- 3.1 The K-mean Selector Layer -- 3.2 The Random Inserter Layer -- 4 Experiment -- 4.1 The K-means Model Validation -- 4.2 The Data Embedding in Cover Images -- 5 Conclusion -- References -- Communication and Network Technologies -- Comparative Analysis of LSTM and GRU for Uplink Data Rate Prediction in 5G Networks -- 1 Introduction -- 2 Background and State of the Art -- 3 Data and Methods -- 3.1 Data Collection -- 3.2 RNN Variants-LSTM and GRU -- 3.3 Performance Measures -- 4 Proposed Approach -- 4.1 Data Preparation -- 4.2 Experiments -- 4.3 Evaluation -- 5 Conclusion -- References -- Scheduling in Time-Sensitive Networks Using Deep Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 3 The Solution Approach -- 3.1 Reinforcement Learning -- 3.2 Simulation -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Power Control for Collaborative Sensors in Internet of Things Environments Using upper KK-means Approach -- 1 Introduction -- 2 Channel and Signal Modeling of Collaborative Sensors -- 3 Power Control Strategy of Collaborative Sensors -- 3.1 Energy Consumption Model -- 3.2 Power Control Strategy -- 4 Implementing K-means -- 5 Simulation and Results -- 6 Conclusion -- References -- Optimizing the EDFA Gain for Optical WDM Network Using Simulation Method -- 1 Introduction -- 2 Simulative Setup -- 3 Results and Discussion -- 4 Conclusion -- References -- RFID-Based Smart Trolley with Mobile Application -- 1 Introduction -- 2 Literature Survey -- 3 Materials and Methods -- 3.1 Arduino UNO -- 3.2 EM-18 Reader Module -- 3.3 Bluetooth Module (HC-05) -- 3.4 RFID Tags -- 3.5 Voltage Divider Circuit.
3.6 Android Studio -- 3.7 Radio Frequency Identification -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Secure Authentication and Key Management -- SAKM-ITS: Secure Authentication and Key Management Protocol Concerning Intelligent Transportation Systems -- 1 Introduction -- 2 Related Work -- 3 Threat Model -- 4 Proposed Model -- 4.1 Registration of Entities -- 4.2 Authentication and Key Exchange Phase -- 5 Security Analysis -- 5.1 Formal Verification Using Scyther -- 5.2 Formal Verification Using Tamarin Prover -- 5.3 Informal Security Analysis -- 6 Comparative Analysis -- 6.1 Communication Cost -- 6.2 Computation Cost -- 7 Conclusion -- References -- Addressing Single Point of Failure in Group Communication of Constrained Environments -- 1 Introduction -- 2 Background -- 2.1 Shamir's Secret Sharing -- 2.2 Lagrange Interpolation -- 2.3 ECC and ECDH -- 3 The Proposed Scheme -- 3.1 Sharing Shares -- 4 Analysis of the Scheme -- 5 Conclusion -- References -- An RFID-Based Authentication Protocol for Smart Healthcare Applications -- 1 Introduction -- 1.1 Motivation and Contribution -- 1.2 Organization of the Paper -- 2 Preliminaries -- 2.1 Basic Concept of Elliptic Curve over a Prime Field GF(p) -- 2.2 Cryptographic Hash Function -- 2.3 Threat Model -- 3 Proposed Protocol -- 3.1 Initialization Phase -- 3.2 Registration Phase -- 3.3 Login and Mutual Authentication Phase -- 4 Security and Performance Analysis -- 4.1 Formal Security Verification Using AVISPA Tool -- 4.2 Security Features Comparison -- 4.3 Performance Analysis -- 5 Conclusion -- References -- Advanced Threat Detection and Mitigation -- On Credit Card Fraud Detection Using Machine Learning Techniques -- 1 Introduction -- 2 Machine Learning Techniques -- 2.1 Decision Tree -- 2.2 Random Forest -- 2.3 Isolation Forest -- 2.4 Support Vector Machine.
3 Experimental Results.
Record Nr. UNINA-9910878069803321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied soft computing and communication networks : proceedings of ACN 2020 / / Sabu M. Thampi [and five others], editors
Applied soft computing and communication networks : proceedings of ACN 2020 / / Sabu M. Thampi [and five others], editors
Pubbl/distr/stampa Gateway East, Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (347 pages)
Disciplina 006.3
Collana Lecture notes in networks and systems
Soggetto topico Soft computing
Informàtica tova
Xarxes de comunicacions
Soggetto genere / forma Congressos
Llibres electrònics
ISBN 981-336-173-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organized By -- Contents -- Editors and Contributors -- Algebraic Modelling of a Generic Fog Scenario for Moving IoT Devices -- 1 Introduction -- 2 Algebra of Communicating Processes -- 3 Topology Framework -- 4 Actions to be Modelled -- 4.1 Action Cloud IN -- 4.2 Action Migrate IN -- 4.3 Action Init VM -- 4.4 Action Cloud OUT -- 4.5 Action Migration OUT -- 4.6 Action Kill VM -- 5 Verification of the Models -- 6 Conclusions -- References -- A Novel Approach to Preserve DRM for Content Distribution over P2P Networks -- 1 Introduction -- 1.1 Literature Review -- 2 Challenges and Contributions -- 3 Proposed System -- 3.1 System Approach -- 3.2 Physical Architecture/Layout -- 3.3 The P2P Network -- 3.4 The Secured DRM -- 4 Discussion -- 5 Conclusion -- References -- Secure Multimodal Biometric Recognition in Principal Component Subspace -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Similarity Measure Based on Principal Components -- 3.2 Protection Scheme for Multimodal Templates -- 4 Experiments and Results -- 4.1 Face -- 4.2 Fingerprint -- 4.3 Finger Vein -- 4.4 Fusing Face, Fingerprint and Finger Vein Features -- 5 Security Analysis -- 6 Conclusion -- References -- EEG-Based Emotion Recognition and Its Interface with Augmented Reality -- 1 Introduction -- 2 Basic Principles -- 2.1 Electroencephalography (EEG) -- 2.2 EEG Data Analysis -- 2.3 10-20 EEG Positioning System -- 2.4 Augmented Reality -- 2.5 Socket Programming and Application Development -- 2.6 Valence-Arousal Model -- 3 Hardware Used -- 4 Detailed Circuit Design -- 5 Implementation -- 6 Results -- 7 Conclusions and Future Scope -- References -- Profile Verification Using Blockchain -- 1 Introduction -- 1.1 Blockchain -- 1.2 Ethereum -- 1.3 Existing Systems -- 1.4 Decentralization of Certification -- 2 Related Work -- 3 System Architecture.
3.1 Data and Process Flow -- 3.2 Smart Contract -- 3.3 Verification Protocol -- 3.4 Image Hashing -- 4 Implementation -- 4.1 Teachers and Mentors -- 4.2 Web Interface -- 4.3 Events and Transactions -- 5 Results -- 6 Conclusion -- References -- Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach -- 1 Introduction -- 2 Background and Related Work -- 2.1 DDoS Attacks and Its Detection Type -- 2.2 Machine Learning Solutions -- 3 Experimental Database and Setup -- 4 Classification Algorithms and Performance Measurements -- 4.1 Classification Algorithms -- 4.2 Performance Measurements -- 5 Results and Discussion -- 6 Conclusion -- References -- Intrusion Detection Using Deep Neural Network with AntiRectifier Layer -- 1 Introduction -- 1.1 Motivation -- 1.2 Contribution -- 2 Related Work -- 3 Deep Neural Network -- 3.1 Rectified Linear Unit -- 3.2 AntiRectifier Layer -- 3.3 Dropout and Noise Layers -- 3.4 Gaussian Dropout and Gaussian Noise -- 4 Experimental Methodology -- 4.1 Datasets for Experimentation -- 5 Results Analysis and Observations -- 6 Conclusion -- References -- CloudSim Exploration: A Knowledge Framework for Cloud Computing Researchers -- 1 Introduction -- 2 Related Work -- 2.1 Procure Knowledge -- 2.2 Family of Simulators -- 2.3 Art: Architecture -- 2.4 Techniques: Tools -- 2.5 Techniques: Language -- 2.6 Setup -- 2.7 Integrated Development Environment (IDE) -- 3 Proposed Work and Methodology -- 3.1 Framework -- 3.2 Algorithms -- 4 Results and Discussions -- 4.1 Experimental Setup -- 5 Conclusion and Future Direction -- References -- A Comprehensive Survey on Big Data Technology Based Cybersecurity Analytics Systems -- 1 Introduction -- 1.1 Survey Methodology -- 1.2 Paper Organization -- 2 Related Work -- 3 Big Data Technologies Used in the Existing BDTCA Systems.
4 Datasets Used in the Existing BDTCA Systems -- 5 Feature Selection Algorithms Used in the Existing BDTCA Systems -- 6 Various Methods Used to Read Packet Trace Files from HDFS -- 7 Observations, Recommendations and Directions -- 7.1 Migration from Batch Processing to Stream Processing -- 7.2 Lack of Modern Datasets for Evaluation -- 7.3 Feature Selection -- 7.4 Overhead of Converting PCAP Files to Text Files -- 8 Conclusion -- References -- An Asynchronous Leader-Based Neighbor Discovery Protocol in Static Wireless Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Reference Protocols -- 4 Asynchronous Leader-Based Neighbor Discovery Protocol -- 4.1 Assumptions -- 4.2 Model -- 5 Simulation Results -- 5.1 Simulation Scenario -- 5.2 Results -- 6 Conclusion -- References -- P2P Bot Detection Based on Host Behavior and Big Data Technology -- 1 Introduction -- 1.1 Botnet -- 1.2 Peer-to-Peer Botnet -- 1.3 Big Data -- 1.4 Role of Big Data Technologies in Detecting P2P Botnets -- 1.5 Role of Machine Learning in Detecting P2P Botnets -- 2 Related Works -- 3 System Architecture -- 3.1 Data Collection -- 3.2 Parsing PCAP Files -- 3.3 Classification -- 4 Implementation -- 4.1 Dataset Used -- 4.2 Parsing PCAP Files -- 4.3 Classification -- 5 Results -- 6 Conclusion -- References -- Localization in Wireless Sensor Networks Using a Mobile Anchor and Subordinate Nodes -- 1 Introduction -- 2 Related Works -- 3 Localization in WSNs Using a Mobile Anchor and Subordinate Nodes (LWMS): A Proposed Algorithm -- 4 Simulations and Results -- 4.1 Percentage of Error at Various Stages of the Algorithm -- 4.2 Localization Error Versus Communication Range -- 4.3 Localization Error Versus Total Number of Nodes -- 5 Conclusion -- References -- Serverless Deployment of a Voice-Bot for Visually Impaired -- 1 Introduction -- 2 Related Work -- 3 Background.
3.1 Economics and Architectural Impact of Serverless Applications -- 3.2 General Bot Architecture -- 4 Blueprints for a Serverless Voice Bot for Visually Impaired -- 4.1 Overview of Technology Stack for Voice Bot -- 4.2 Overall Design Architecture of Feed-O-Back Voice Bot -- 5 Experimental Results -- 6 Conclusion -- References -- Smart Cities and Spectrum Vulnerabilities in Long-Range Unlicensed Communication Bands: A Review -- 1 Introduction -- 2 Related Works -- 3 Spectrum Management Techniques -- 4 Security Vulnerabilities of LPWANS and Proposed Solutions -- 5 Challenges of Proper Spectrum Utilization in Unlicensed Bands -- 6 Competing Incompatible Long-Range Technologies in Unlicensed Bands -- 7 Comparison and Discussion -- 8 Key Findings of the Review -- 9 Recommendations and Future Direction -- 10 Conclusion -- References -- Stability Certification of Dynamical Systems: Lyapunov Logic Learning Machine -- 1 Introduction -- 1.1 Context -- 1.2 Contribution -- 1.3 Related Works -- 2 Preliminaries -- 2.1 Lyapunov Stability -- 2.2 SOS Lyapunov Functions -- 2.3 Classical ROA Estimation -- 3 Method -- 3.1 Intelligible Analytics -- 3.2 Value Ranking -- 3.3 LLM with Zero Error -- 3.4 ROA Explanation -- 3.5 ROA Candidates for Certification -- 4 Results -- 5 Conclusion and Future Work -- References -- Two-Dimensional Angle of Arrival Estimation Using L-Shaped Array -- 1 Introduction -- 2 System Model -- 3 Proposed Method -- 3.1 Method Without Noise -- 3.2 Method with Noise -- 4 Simulation Results -- 5 Conclusion -- References -- Interference Management Technique for LTE, Wi-Fi Coexistence Based on CSI at the Transmitter -- 1 Introduction -- 2 Related Works -- 3 Interference Modeling -- 3.1 Channel Estimation -- 4 LTE and Wi-Fi Simulation Modeling -- 4.1 Channel Model -- 4.2 LTE/LTE-A Transceiver -- 4.3 WLAN 802.11ac Transceiver.
4.4 Generation of Clean LTE and Wi-Fi Signal -- 4.5 LTE and Wi-Fi Coexistence Deployment Scenario -- 5 Performance Evaluation and Results -- 6 Conclusion and Future Work -- References -- VHF OSTBC MIMO System Used to Overcome the Effects of Irregular Terrain on Radio Signals -- 1 Introduction -- 2 Methods to Mitigate Propagation Challenges in Irregular Terrain -- 3 Proposed Model -- 4 Simulation Results -- 4.1 The Receive Signal Strength Results of the VHF OSTBC MIMO System Using Two Different VHF Frequencies -- 4.2 The Bit Error Rate Results of the OSTBC MIMO System Using Two Different MIMO Antenna Arrays -- 5 Conclusion and Discussion -- References -- Modelling Video Frames for Object Extraction Using Spatial Correlation -- 1 Introduction -- 2 Global Threshold: Otsu's Method -- 3 2D-Continuous Wavelet Analysis -- 3.1 Analysing Wavelets -- 3.2 Reproducing Kernel -- 4 Detection Theory -- 4.1 Binary Hypothesis Testing -- 5 Object Extraction -- 5.1 Implementation of Algorithm -- 5.2 Results -- 6 Conclusion and Future Work -- References -- Speech-Based Selective Labeling of Objects in an Inventory Setting -- 1 Introduction -- 2 Experimental Methodology -- 2.1 Data Preprocessing -- 2.2 Voice-Based Object Detection -- 2.3 Faster RCNN -- 3 Results and Discussion -- 4 Conclusion -- References -- Classification and Evaluation of Goal-Oriented Requirements Analysis Methods -- 1 Introduction -- 2 Classification of GORA Methods -- 2.1 GORA Methods for the Analysis of FRs and NFRs -- 2.2 GORA Method(s) for the Analysis of NFRs -- 2.3 GORA Method(s) for Social Modeling -- 3 Evaluation of GORA Methods -- 4 Conclusion -- References -- iCREST: International Cross-Reference to Exchange-Based Stock Trend Prediction Using Long Short-Term Memory -- 1 Introduction -- 1.1 Motivation -- 2 Proposed Approach -- 2.1 Time-Series Data Collection -- 2.2 Mapping and Cleaning.
2.3 Currency Conversion.
Record Nr. UNINA-9910488690403321
Gateway East, Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer vision and machine intelligence paradigms for SDGs : select proceedings of ICRTAC-CVMIP 2021 / / edited by R. Jagadeesh Kannan, Sabu M. Thampi, Shyh-Hau Wang
Computer vision and machine intelligence paradigms for SDGs : select proceedings of ICRTAC-CVMIP 2021 / / edited by R. Jagadeesh Kannan, Sabu M. Thampi, Shyh-Hau Wang
Pubbl/distr/stampa Singapore : , : Springer, , [2023]
Descrizione fisica 1 online resource (339 pages)
Disciplina 060
Collana Lecture Notes in Electrical Engineering
Soggetto topico Artificial intelligence
ISBN 981-19-7169-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- PTZ-Camera-Based Facial Expression Analysis using Faster R-CNN for Student Engagement Recognition -- 1 Introduction -- 2 Related Work -- 2.1 Contribution and Objective -- 3 Methodology -- 3.1 Face Detection using YOLO Detector -- 3.2 Detection of Landmark Points using Ensemble of Robust Constrained Local Models (CLM) -- 3.3 Affine Transformation -- 3.4 Face Expression Recognition using Faster R-CNN (Faster Regions with Convolutional Neural Network) -- 4 Results and Discussion -- 4.1 Performance Analysis -- 5 Conclusion -- References -- Convergence Perceptual Model for Computing Time Series Data on Fog Environment -- 1 Introduction -- 1.1 Goals Aimed at the Convergence Fog Model -- 1.2 Fog for Time-Series Computing -- 1.3 Proposed Convergence Perceptual Architecture -- 1.4 Perceptual Layer on CPM -- 2 Conclusion -- References -- Localized Super Resolution for Foreground Images Using U-Net and MR-CNN -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Architecture -- 4 Implementation and Training -- 4.1 Dataset and Augmentation -- 4.2 Model Architecture -- 4.3 Loss Function and Optimizer -- 4.4 Training -- 5 Evaluation Metrics -- 5.1 PSNR-Peak Signal-To-Noise Ratio -- 5.2 SSIM-Structural Similarity Index -- 5.3 Universal Image Quality Index -- 6 Results and Discussion -- 7 Conclusion and Future Work -- References -- SMS Spam Classification Using PSO-C4.5 -- 1 Introduction -- 2 Problem Statement -- 3 Research Objective -- 4 Review of Literature -- 4.1 Review of Text-Processing -- 4.2 Review on Feature Extraction -- 4.3 Review on Feature Selection -- 4.4 Review on Classifiers -- 5 Research Contribution -- 6 Data Collection and Data Sampling -- 7 Experimental Results -- 8 Conclusion and Future Enhancement -- References.
Automated Sorting, Grading of Fruits Based on Internal and External Quality Assessment Using HSI, Deep CNN -- 1 Introduction -- 2 Related Works -- 3 Overview of Proposed Idea -- 3.1 Preprocessing -- 3.2 Segmentation -- 3.3 CNN Model Development -- 4 Experimental Results and Discussion -- 4.1 Experimental Setup -- 4.2 Performance Measures -- 4.3 Experimental Results -- 5 Conclusion -- References -- Pest Detection Using Improvised YOLO Architecture -- 1 Introduction -- 2 Literature Review -- 2.1 Pest Detection Methods -- 2.2 Pest Classification Methods -- 3 YOLO V3 Architecture -- 4 Improvised YOLO V3 Architecture -- 5 Results and Discussions -- 6 Conclusion -- References -- Classification of Fungi Effected Psidium Guajava Leaves Using ML and DL Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Overview of Database -- 4 Proposed Method/Model -- 4.1 Classification Using Deep Learning Techniques -- 5 Experimental Results -- 5.1 Experimental Results Using Deep Learning Techniques -- 6 Comparative Analysis -- 7 Conclusions -- References -- Deep Learning Based Recognition of Plant Diseases -- 1 Introduction -- 2 Literature Review -- 3 Scope -- 4 Methodology -- 4.1 Procedure -- 4.2 Library -- 5 Results and Findings -- 6 Discussion -- 7 Conclusion -- 8 Future Scope -- 9 Recommendation -- References -- Artificial Cognition of Temporal Events Using Recurrent Point Process Networks -- 1 Introduction -- 2 Recurrent Point Process Network -- 2.1 Recurrent Neural Network -- 2.2 Interoperability and Prediction Module -- 2.3 Point Processes Equations -- 3 Automated Data Relation Process -- 3.1 Model Creation -- 3.2 Training Phase -- 3.3 Testing Phase -- 3.4 Anomaly Detection -- 3.5 Visualization -- 4 Temporal Variation Samples -- 4.1 Synchronous Event -- 4.2 Asynchronous Event -- 5 Conclusion -- References.
Performance Analysis of Energy Efficient Video Transmission Using LEACH Based Protocol in WSN -- 1 Introduction -- 2 Related Work -- 3 Problem Statement and Our Contribution -- 4 LEACH Based Routing Protocol -- 5 Video Transmission Over WSN -- 6 Experimental Result -- 7 Conclusion -- References -- Hybridization of Texture Features for Identification of Bi-Lingual Scripts from Camera Images at Wordlevel -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Method -- 3.1 Creation of LBP Image -- 3.2 Extraction of GLCM Feature from LBP Image -- 3.3 Extraction HOG Feature from LBP Image -- 3.4 Combined Feature Vector of GLCM and HOG from LBP Image -- 4 Experimental Results and Discussion -- 4.1 Results and Discussion -- 5 Conclusion -- References -- Advanced Algorithmic Techniques for Topic Prediction and Recommendation-An Analysis -- 1 Introduction -- 2 Proposed Model -- 2.1 Hashtag-Based Approach -- 2.2 Word Ranking Based Approach -- 2.3 Authority Weighting Based Approach -- 2.4 Background Tweet Detection-Based Approach -- 2.5 Short-Term Fluctuation Modeling Based Approach -- 3 Results and Discussion -- 4 Conclusion -- References -- Implementation of an Automatic EEG Feature Extraction with Gated Recurrent Neural Network for Emotion Recognition -- 1 Introduction -- 2 Related Study -- 3 Methodology -- 3.1 Preprocessing -- 3.2 Feature Extraction -- 3.3 Classifier -- 4 Results and Discussions -- 4.1 Dataset -- 4.2 Implementation -- 5 Conclusion -- References -- High Performance Classifier for Brain Tumor Detection Using Capsule Neural Network -- 1 Introduction -- 2 Methods -- 2.1 Convolutional Neural Network -- 2.2 Capsule Networks -- 3 Literature Survey -- 4 Proposed Model -- 4.1 Capsule Network Model Creation -- 4.2 Prediction -- 5 Proposed Algorithm -- 5.1 Prediction Through Flask Framework -- 6 Results and Discussions -- 6.1 Accuracy.
6.2 Predicting Tumor -- 6.3 Training and Validation -- 7 Conclusion -- References -- Mining Suitable Symptoms to Identify Disease Using Apriori and NBC -- 1 Introduction -- 2 Review of Literature -- 3 Association Rule Mining -- 4 Proposed Work -- 4.1 Apriori Algorithm -- 5 Conclusion -- References -- Background Features-Based Novel Visual Ego-Motion Estimation -- 1 Introduction -- 1.1 Related Work -- 2 Algorithm -- 2.1 System Overview -- 2.2 Steerable Pyramid Transformation (SPT) -- 2.3 Keypoint Detection and Matching -- 2.4 Ransac -- 3 Experimental Results -- 4 Conclusion -- References -- Livspecs: Design and Implementation of Smart Specs for Hearing and Visually Challenged Persons -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Result and Discussion -- 5 Conclusion -- References -- Self-balancing Robot Using Arduino and PID Controller -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Block Diagram of the Two-Wheeled Robot -- 3.2 Working Principle -- 3.3 Control Action -- 4 Results and Discussion -- 5 Conclusion -- References -- A Survey Based on Online Voting System Using Blockchain Technology -- 1 Introduction -- 2 Background -- 2.1 Overview of Computerized Voting System -- 2.2 Blockchain Technology -- 2.3 Analysis of Ethereum -- 3 Comparative Study of Blockchain-Based Electronic Voting Plans -- 4 Discussion -- 5 Conclusion and Future Work -- References -- Survey on Collaborative Filtering Technique for Recommender System Using Deep Learning -- 1 Introduction -- 2 Recommender Systems -- 2.1 Deep Learning-Based Recommendation Systems -- 2.2 Deep Collaborative Filtering Techniques -- 2.3 Datasets -- 3 Recommendation System Applications -- 4 Conclusion -- References -- A Survey on Power Consumption Indicator Using Machine Learning-Based Approach -- 1 Introduction -- 2 System Description.
2.1 Power Limit Indicator System (PLIS) -- 2.2 PLIS Basic Flow -- 3 Review and Analysis of Power Consumption Systems -- 4 Conclusion -- References -- A Novel Hand Gesture Recognition for Aphonic People Using Convolutional Neural Network -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Binarization -- 2.2 Contour Detection -- 2.3 Feature Extraction Using Sift Algorithm -- 2.4 Classification Using Convolutional Neural Network -- 3 Experimental Results -- 4 Conclusion and Future Enhancement -- References -- Comprehensive Analysis of Defect Detection Through Image Processing and Machine Learning for Photovoltaic Panels -- 1 Introduction -- 1.1 Photovoltaic Panels -- 1.2 Defects in Photovoltaic Panels -- 2 Fault Identification System -- 2.1 Image Processing-Based Defect Identification -- 2.2 Machine Learning-Based Defect Identification -- 2.3 Deep Learning-Based Defect Identification -- 3 Experimental Results and Analysis -- 3.1 Canny Edge Detector -- 3.2 Support Vector Machine -- 3.3 AlexNet -- 4 Conclusion and Discussions -- References -- Covid Analysis Prediction Using Densenet Method in Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodologies -- 3.1 DenseNet -- 4 Proposed Work -- 4.1 Need for Covıd Detectıon -- 4.2 Dataset -- 4.3 Server Creatıon -- 4.4 Identıfıcatıon of Covıd -- 4.5 System Architecture -- 5 Implementation and Results -- 6 Conclusion and Future Enhancement -- References -- Feature Extraction Based on GLCM and GLRM Methods on COVID-19 Dataset -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Feature Extraction -- 3.2 Gray Level Co-Occurrence Matrixes -- 3.3 Gray Level Run Length Matrix -- 4 Classification Techniques -- 5 Results and Discussion -- 5.1 Performance Measures Parameters -- 6 Conclusion -- References.
Memory Augmented Distributed Monte Carlo Tree Search Algorithm-Based Content Popularity Aware Content Recommendation Using Content Centric Networks.
Record Nr. UNISA-996547970903316
Singapore : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer vision and machine intelligence paradigms for SDGs : select proceedings of ICRTAC-CVMIP 2021 / / edited by R. Jagadeesh Kannan, Sabu M. Thampi, Shyh-Hau Wang
Computer vision and machine intelligence paradigms for SDGs : select proceedings of ICRTAC-CVMIP 2021 / / edited by R. Jagadeesh Kannan, Sabu M. Thampi, Shyh-Hau Wang
Pubbl/distr/stampa Singapore : , : Springer, , [2023]
Descrizione fisica 1 online resource (339 pages)
Disciplina 060
Collana Lecture Notes in Electrical Engineering
Soggetto topico Artificial intelligence
ISBN 981-19-7169-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Contents -- Editors and Contributors -- PTZ-Camera-Based Facial Expression Analysis using Faster R-CNN for Student Engagement Recognition -- 1 Introduction -- 2 Related Work -- 2.1 Contribution and Objective -- 3 Methodology -- 3.1 Face Detection using YOLO Detector -- 3.2 Detection of Landmark Points using Ensemble of Robust Constrained Local Models (CLM) -- 3.3 Affine Transformation -- 3.4 Face Expression Recognition using Faster R-CNN (Faster Regions with Convolutional Neural Network) -- 4 Results and Discussion -- 4.1 Performance Analysis -- 5 Conclusion -- References -- Convergence Perceptual Model for Computing Time Series Data on Fog Environment -- 1 Introduction -- 1.1 Goals Aimed at the Convergence Fog Model -- 1.2 Fog for Time-Series Computing -- 1.3 Proposed Convergence Perceptual Architecture -- 1.4 Perceptual Layer on CPM -- 2 Conclusion -- References -- Localized Super Resolution for Foreground Images Using U-Net and MR-CNN -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Architecture -- 4 Implementation and Training -- 4.1 Dataset and Augmentation -- 4.2 Model Architecture -- 4.3 Loss Function and Optimizer -- 4.4 Training -- 5 Evaluation Metrics -- 5.1 PSNR-Peak Signal-To-Noise Ratio -- 5.2 SSIM-Structural Similarity Index -- 5.3 Universal Image Quality Index -- 6 Results and Discussion -- 7 Conclusion and Future Work -- References -- SMS Spam Classification Using PSO-C4.5 -- 1 Introduction -- 2 Problem Statement -- 3 Research Objective -- 4 Review of Literature -- 4.1 Review of Text-Processing -- 4.2 Review on Feature Extraction -- 4.3 Review on Feature Selection -- 4.4 Review on Classifiers -- 5 Research Contribution -- 6 Data Collection and Data Sampling -- 7 Experimental Results -- 8 Conclusion and Future Enhancement -- References.
Automated Sorting, Grading of Fruits Based on Internal and External Quality Assessment Using HSI, Deep CNN -- 1 Introduction -- 2 Related Works -- 3 Overview of Proposed Idea -- 3.1 Preprocessing -- 3.2 Segmentation -- 3.3 CNN Model Development -- 4 Experimental Results and Discussion -- 4.1 Experimental Setup -- 4.2 Performance Measures -- 4.3 Experimental Results -- 5 Conclusion -- References -- Pest Detection Using Improvised YOLO Architecture -- 1 Introduction -- 2 Literature Review -- 2.1 Pest Detection Methods -- 2.2 Pest Classification Methods -- 3 YOLO V3 Architecture -- 4 Improvised YOLO V3 Architecture -- 5 Results and Discussions -- 6 Conclusion -- References -- Classification of Fungi Effected Psidium Guajava Leaves Using ML and DL Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Overview of Database -- 4 Proposed Method/Model -- 4.1 Classification Using Deep Learning Techniques -- 5 Experimental Results -- 5.1 Experimental Results Using Deep Learning Techniques -- 6 Comparative Analysis -- 7 Conclusions -- References -- Deep Learning Based Recognition of Plant Diseases -- 1 Introduction -- 2 Literature Review -- 3 Scope -- 4 Methodology -- 4.1 Procedure -- 4.2 Library -- 5 Results and Findings -- 6 Discussion -- 7 Conclusion -- 8 Future Scope -- 9 Recommendation -- References -- Artificial Cognition of Temporal Events Using Recurrent Point Process Networks -- 1 Introduction -- 2 Recurrent Point Process Network -- 2.1 Recurrent Neural Network -- 2.2 Interoperability and Prediction Module -- 2.3 Point Processes Equations -- 3 Automated Data Relation Process -- 3.1 Model Creation -- 3.2 Training Phase -- 3.3 Testing Phase -- 3.4 Anomaly Detection -- 3.5 Visualization -- 4 Temporal Variation Samples -- 4.1 Synchronous Event -- 4.2 Asynchronous Event -- 5 Conclusion -- References.
Performance Analysis of Energy Efficient Video Transmission Using LEACH Based Protocol in WSN -- 1 Introduction -- 2 Related Work -- 3 Problem Statement and Our Contribution -- 4 LEACH Based Routing Protocol -- 5 Video Transmission Over WSN -- 6 Experimental Result -- 7 Conclusion -- References -- Hybridization of Texture Features for Identification of Bi-Lingual Scripts from Camera Images at Wordlevel -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Method -- 3.1 Creation of LBP Image -- 3.2 Extraction of GLCM Feature from LBP Image -- 3.3 Extraction HOG Feature from LBP Image -- 3.4 Combined Feature Vector of GLCM and HOG from LBP Image -- 4 Experimental Results and Discussion -- 4.1 Results and Discussion -- 5 Conclusion -- References -- Advanced Algorithmic Techniques for Topic Prediction and Recommendation-An Analysis -- 1 Introduction -- 2 Proposed Model -- 2.1 Hashtag-Based Approach -- 2.2 Word Ranking Based Approach -- 2.3 Authority Weighting Based Approach -- 2.4 Background Tweet Detection-Based Approach -- 2.5 Short-Term Fluctuation Modeling Based Approach -- 3 Results and Discussion -- 4 Conclusion -- References -- Implementation of an Automatic EEG Feature Extraction with Gated Recurrent Neural Network for Emotion Recognition -- 1 Introduction -- 2 Related Study -- 3 Methodology -- 3.1 Preprocessing -- 3.2 Feature Extraction -- 3.3 Classifier -- 4 Results and Discussions -- 4.1 Dataset -- 4.2 Implementation -- 5 Conclusion -- References -- High Performance Classifier for Brain Tumor Detection Using Capsule Neural Network -- 1 Introduction -- 2 Methods -- 2.1 Convolutional Neural Network -- 2.2 Capsule Networks -- 3 Literature Survey -- 4 Proposed Model -- 4.1 Capsule Network Model Creation -- 4.2 Prediction -- 5 Proposed Algorithm -- 5.1 Prediction Through Flask Framework -- 6 Results and Discussions -- 6.1 Accuracy.
6.2 Predicting Tumor -- 6.3 Training and Validation -- 7 Conclusion -- References -- Mining Suitable Symptoms to Identify Disease Using Apriori and NBC -- 1 Introduction -- 2 Review of Literature -- 3 Association Rule Mining -- 4 Proposed Work -- 4.1 Apriori Algorithm -- 5 Conclusion -- References -- Background Features-Based Novel Visual Ego-Motion Estimation -- 1 Introduction -- 1.1 Related Work -- 2 Algorithm -- 2.1 System Overview -- 2.2 Steerable Pyramid Transformation (SPT) -- 2.3 Keypoint Detection and Matching -- 2.4 Ransac -- 3 Experimental Results -- 4 Conclusion -- References -- Livspecs: Design and Implementation of Smart Specs for Hearing and Visually Challenged Persons -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Result and Discussion -- 5 Conclusion -- References -- Self-balancing Robot Using Arduino and PID Controller -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Block Diagram of the Two-Wheeled Robot -- 3.2 Working Principle -- 3.3 Control Action -- 4 Results and Discussion -- 5 Conclusion -- References -- A Survey Based on Online Voting System Using Blockchain Technology -- 1 Introduction -- 2 Background -- 2.1 Overview of Computerized Voting System -- 2.2 Blockchain Technology -- 2.3 Analysis of Ethereum -- 3 Comparative Study of Blockchain-Based Electronic Voting Plans -- 4 Discussion -- 5 Conclusion and Future Work -- References -- Survey on Collaborative Filtering Technique for Recommender System Using Deep Learning -- 1 Introduction -- 2 Recommender Systems -- 2.1 Deep Learning-Based Recommendation Systems -- 2.2 Deep Collaborative Filtering Techniques -- 2.3 Datasets -- 3 Recommendation System Applications -- 4 Conclusion -- References -- A Survey on Power Consumption Indicator Using Machine Learning-Based Approach -- 1 Introduction -- 2 System Description.
2.1 Power Limit Indicator System (PLIS) -- 2.2 PLIS Basic Flow -- 3 Review and Analysis of Power Consumption Systems -- 4 Conclusion -- References -- A Novel Hand Gesture Recognition for Aphonic People Using Convolutional Neural Network -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Binarization -- 2.2 Contour Detection -- 2.3 Feature Extraction Using Sift Algorithm -- 2.4 Classification Using Convolutional Neural Network -- 3 Experimental Results -- 4 Conclusion and Future Enhancement -- References -- Comprehensive Analysis of Defect Detection Through Image Processing and Machine Learning for Photovoltaic Panels -- 1 Introduction -- 1.1 Photovoltaic Panels -- 1.2 Defects in Photovoltaic Panels -- 2 Fault Identification System -- 2.1 Image Processing-Based Defect Identification -- 2.2 Machine Learning-Based Defect Identification -- 2.3 Deep Learning-Based Defect Identification -- 3 Experimental Results and Analysis -- 3.1 Canny Edge Detector -- 3.2 Support Vector Machine -- 3.3 AlexNet -- 4 Conclusion and Discussions -- References -- Covid Analysis Prediction Using Densenet Method in Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodologies -- 3.1 DenseNet -- 4 Proposed Work -- 4.1 Need for Covıd Detectıon -- 4.2 Dataset -- 4.3 Server Creatıon -- 4.4 Identıfıcatıon of Covıd -- 4.5 System Architecture -- 5 Implementation and Results -- 6 Conclusion and Future Enhancement -- References -- Feature Extraction Based on GLCM and GLRM Methods on COVID-19 Dataset -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Feature Extraction -- 3.2 Gray Level Co-Occurrence Matrixes -- 3.3 Gray Level Run Length Matrix -- 4 Classification Techniques -- 5 Results and Discussion -- 5.1 Performance Measures Parameters -- 6 Conclusion -- References.
Memory Augmented Distributed Monte Carlo Tree Search Algorithm-Based Content Popularity Aware Content Recommendation Using Content Centric Networks.
Record Nr. UNINA-9910637702803321
Singapore : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computing science, communication and security : third International Conference, COMS2 2022, Gujarat, India, February 6-7, 2022, revised selected papers / / Nirbhay Chaubey, Sabu M. Thampi, and Noor Zaman Jhanjhi, editors
Computing science, communication and security : third International Conference, COMS2 2022, Gujarat, India, February 6-7, 2022, revised selected papers / / Nirbhay Chaubey, Sabu M. Thampi, and Noor Zaman Jhanjhi, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (327 pages)
Disciplina 004.6
Collana Communications in Computer and Information Science
Soggetto topico Computer networks
Computer security
ISBN 3-031-10551-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910580139003321
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computing science, communication and security : third International Conference, COMS2 2022, Gujarat, India, February 6-7, 2022, revised selected papers / / Nirbhay Chaubey, Sabu M. Thampi, and Noor Zaman Jhanjhi, editors
Computing science, communication and security : third International Conference, COMS2 2022, Gujarat, India, February 6-7, 2022, revised selected papers / / Nirbhay Chaubey, Sabu M. Thampi, and Noor Zaman Jhanjhi, editors
Pubbl/distr/stampa Cham, Switzerland : , : Springer International Publishing, , [2022]
Descrizione fisica 1 online resource (327 pages)
Disciplina 004.6
Collana Communications in Computer and Information Science
Soggetto topico Computer networks
Computer security
ISBN 3-031-10551-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996483165403316
Cham, Switzerland : , : Springer International Publishing, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui