Advances in computing and network communications . Volume 2 : proceedings of CoCoNet 2020 / / edited by Sabu M. Thampi [and four others] |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XX, 611 p. 275 illus., 205 illus. in color.) |
Disciplina | 004 |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico |
Computer science
Computer networks |
ISBN | 981-336-987-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part 1: Machine Learning, Visual Computing and Signal Processing -- Chapter 1. Computational Reconstructions of Extracellular Action Potentials and Local Field Potentials of a Rat Cerebellum using Point Neurons -- Chapter 2. Iris Recognition using Integer Wavelet Transform and Log Energy Entropy -- Chapter 3. Deep Learning Based Approach for Skin Burn Detection with Multi-level Classification -- Chapter 4. Semantic Retrieval of Microbiome Information Based on Deep Learning -- Chapter 5. Early Detection of Covid-19 on CT Scans Using Deep Learning Techniques -- Chapter 6. Towards Protein Tertiary Structure Prediction using LSTM/BLSTM -- Chapter 7. An Android Based Smart Home Automation System in Native Language -- Chapter 8. Live Acoustic Monitoring of Forests to Detect Illegal Logging and Animal Activity -- Chapter 9. CATS: Cluster-Aided Two-Step Approach for Anomaly Detection in Smart Manufacturing -- Chapter 10. Prediction of Energy Consumption using Statistical and Machine Learning Methods and Analysing the Significance of Climate and Holidays in the Demand Prediction -- Chapter 11. Ranking of Educational Institutions based on user priorities using AHP-PROMETHEE Approach -- Chapter 12. Using AUDIT Scores to Identify Synbiotic Supplement Effect in High Risk Alcoholics -- Chapter 13. Accurate Identification of Cardiac Arrhythmia using Machine Learning Approaches -- Chapter 14. Learning based Macro Nutrient Detection Through Plant Leaf -- Chapter 15. Characteristics of Karawitan Musicians' Brain: sLORETA Investigation. |
Record Nr. | UNINA-9910483695403321 |
Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in computing and network communications : proceedings of CoCoNet 2020 / / Editor, Sabu M. Thampi [and four others] |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (705 pages) |
Disciplina | 004 |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico |
Signal processing
Computer science Computer networks |
ISBN | 981-336-977-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483508203321 |
Gateway East, Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in signal processing and intelligent recognition systems : 6th International Symposium, SIRS 2020, Chennai, India, October 14-17, 2020, revised selected papers / / Sabu M. Thampi [and five others] |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XI, 376 p. 180 illus., 136 illus. in color.) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computers
Optical data processing Artificial intelligence |
ISBN | 981-16-0425-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484134603321 |
Gateway East, Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in signal processing and intelligent recognition systems : 6th International Symposium, SIRS 2020, Chennai, India, October 14-17, 2020, revised selected papers / / Sabu M. Thampi [and five others] |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XI, 376 p. 180 illus., 136 illus. in color.) |
Disciplina | 006.3 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computers
Optical data processing Artificial intelligence |
ISBN | 981-16-0425-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996464509703316 |
Gateway East, Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Soft Computing and Communication Networks : Proceedings of ACN 2023 / / edited by Sabu M. Thampi, Jiankun Hu, Ashok Kumar Das, Jimson Mathew, Shikha Tripathi |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (590 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Artificial intelligence Telecommunication Signal processing Big data Computational Intelligence Artificial Intelligence Communications Engineering, Networks Digital and Analog Signal Processing Big Data |
ISBN |
9789819720040
9789819720033 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Conference Organization -- Preface -- Contents -- Editors and Contributors -- Artificial Intelligence and Human-Computer Interaction -- Open Gaze: Open-Source Eye Tracker for Smartphone Devices Using Deep Learning -- 1 Introduction -- 2 Dataset -- 3 Data Splits -- 3.1 MIT Split -- 3.2 Exclusively Mobile Devices in All Orientations -- 3.3 Mobile Devices Used Solely in Portrait Orientation -- 3.4 Google's Data Division -- 4 Model Architecture -- 5 Training -- 5.1 Implementation -- 5.2 Refining Hyperparameters -- 6 Post-training SVR Personalization -- 6.1 Differential Impact Based on Dataset Characteristics -- 6.2 Segmentation According to 13-Point Calibration -- 6.3 Google's 70/30 Training and Testing Split Methods -- 7 Results -- 7.1 PyTorch Results -- 8 Individualization Using Transformations -- 8.1 SVR Results -- 8.2 Version of Google Split -- 8.3 Version of MIT Split -- 8.4 Unique -- 8.5 Random Data Points/Samples -- 8.6 Outcomes from MIT Split Evaluation -- 8.7 Results from Google Split Evaluation -- 9 Future Scope and Improvements -- 10 Availability of Code and Data -- References -- Comparison on the Metaverse Space Development in Spatial.io Platform and Monaverse Platform -- 1 Introduction -- 2 Background -- 2.1 Spatial.io: Platform Overview -- 2.2 Monaverse: Platform Overview -- 3 Comparative Analysis -- 3.1 Decentralization -- 3.2 Interoperability -- 3.3 Space Creation and Scalability -- 3.4 Project Setup and Space Components -- 3.5 Interaction Interface of the Metaverse Space -- 3.6 Examples of Monetization and Opportunities -- 4 Discussion and Future Work -- References -- Intelligent Holo-Assistant Avatar with Lip-Syncing -- 1 Introduction -- 2 Methodology -- 2.1 Designing of GUI of Holo-Assistant Applications -- 2.2 Developing Intelligent Assistant Avatar with Lip-Syncing.
2.3 Integrate the Intelligent Holo-Assistant Avatar with Lip-Syncing -- 3 Implementation and Results -- 4 Conclusion -- References -- Historical Analysis of Financial Fraud and Its Future -- 1 Introduction -- 2 Historical Analysis of Financial Fraud -- 2.1 Early Modern Finance -- 2.2 Industrial Revolution and Capital Market Development -- 2.3 Post World War II -- 2.4 Globalization and Financial Deregulation -- 2.5 Digital Age and FinTech -- 3 Factors Contributing to Financial Fraud -- 3.1 The Human Factor -- 3.2 Weak Internal Controls -- 3.3 The Psychological Factor -- 4 Classification and Impacts of Financial Fraud -- 4.1 Direct Impact of Financial Fraud -- 4.2 Indirect Impact of Financial Fraud -- 5 The Future of Financial Fraud -- 5.1 The Technology Advancements -- 5.2 Dynamic Economic Circumstances -- 5.3 Regulatory Responses -- 5.4 Fraudster Adaptability -- 5.5 Ethical Considerations -- 6 Conclusion -- References -- A Study on Colour-Emotion Association for Happiness Among the Indian Youth Using Artificial Intelligence -- 1 Introduction -- 2 Methodology -- 2.1 Colour Extraction from T-Shirts -- 2.2 Facial Emotion Recognition -- 2.3 Data Collection for Colour-Emotion Mapping -- 3 Discussion -- 4 Conclusion and Future Directions -- References -- Comparative Analysis of Chicken Swarm Optimization and IbI Logics Algorithm for Multiobjective Optimization in kk-Coverage and mm-Connectivity Problem -- 1 Introduction -- 2 Related Works -- 3 Problem Formulation -- 3.1 Multiobjective Optimization Formulation -- 4 Proposed Algorithm -- 4.1 ILA Versus CSO -- 4.2 Fitness Function for both Algorithm -- 5 Simulation Results -- 6 Conclusion -- References -- Security and Privacy in Emerging Technologies -- Machine Learning-Based Detection of Attacks and Anomalies in Industrial Internet of Things (IIoT) Networks -- 1 Introduction. 1.1 IIoT Network Security Challenges -- 1.2 Attack Detection and Anomaly Identification Using Machine Learning -- 2 Literature Review -- 2.1 Existing IDS Systems Based on GANs -- 2.2 G-IDS Proposal -- 3 Dataset Information -- 4 Proposed System -- 4.1 Data Preprocessing -- 4.2 Feature Selection Algorithm -- 4.3 Generative Adversarial Networks -- 5 Results and Discussion -- 6 Conclusion -- References -- Privacy in Data Handling in Agile Development Environments -- 1 Introduction -- 1.1 Motivation -- 1.2 Problem and Target Audience -- 2 Theoretical Reference -- 3 Related Work -- 4 Proposal Presentation -- 4.1 Methodological Structure -- 4.2 Setting Security and Privacy Controls -- 4.3 Proposed Instruction Set -- 5 Practical Application -- 6 Final Considerations -- References -- Feature Enriched Framework for Rumor Detection Using Tweets -- 1 Introduction -- 2 Related Work -- 2.1 Machine Learning Models/Techniques -- 2.2 Deep Learning Models/Techniques -- 2.3 Hybrid Techniques -- 2.4 Word/Contextual Embedding Techniques and Transformer Models -- 3 Research Design -- 3.1 Feature Enriched Rumor Detection Framework -- 3.2 Perspectives Used for Rumor Modeling -- 4 Methodology -- 4.1 Models Used for Experimentation -- 4.2 Rumor Dataset Description -- 4.3 Experimentation -- 4.4 Evaluation Results -- 5 Analysis and Discussion -- 6 Conclusion -- References -- Enhancing KYC Verification: A Secure and Efficient Approach Utilizing Blockchain Technology -- 1 Introduction -- 2 Background -- 2.1 Traditional KYC Verification -- 2.2 Blockchain -- 2.3 KYC and Blockchain -- 3 Related Work -- 4 Enhancements -- 5 Proposed Approach -- 5.1 System Architecture -- 5.2 Proposed Algorithms -- 6 Results and Discussion -- 6.1 Scalability -- 6.2 Flexibility -- 6.3 Transparency -- 6.4 Privacy -- 6.5 History Tracking -- 7 Future Scope -- 8 Conclusion -- References. A Smartphone Data Steganography Framework Based on K-mean Image Selection and Random Embedding in Three Image Channels -- 1 Introduction -- 2 Related Works -- 3 K-mean Select Random Insert (KSRI) Framework -- 3.1 The K-mean Selector Layer -- 3.2 The Random Inserter Layer -- 4 Experiment -- 4.1 The K-means Model Validation -- 4.2 The Data Embedding in Cover Images -- 5 Conclusion -- References -- Communication and Network Technologies -- Comparative Analysis of LSTM and GRU for Uplink Data Rate Prediction in 5G Networks -- 1 Introduction -- 2 Background and State of the Art -- 3 Data and Methods -- 3.1 Data Collection -- 3.2 RNN Variants-LSTM and GRU -- 3.3 Performance Measures -- 4 Proposed Approach -- 4.1 Data Preparation -- 4.2 Experiments -- 4.3 Evaluation -- 5 Conclusion -- References -- Scheduling in Time-Sensitive Networks Using Deep Reinforcement Learning -- 1 Introduction -- 2 Related Work -- 3 The Solution Approach -- 3.1 Reinforcement Learning -- 3.2 Simulation -- 4 Results and Discussions -- 5 Conclusion and Future Work -- References -- Power Control for Collaborative Sensors in Internet of Things Environments Using upper KK-means Approach -- 1 Introduction -- 2 Channel and Signal Modeling of Collaborative Sensors -- 3 Power Control Strategy of Collaborative Sensors -- 3.1 Energy Consumption Model -- 3.2 Power Control Strategy -- 4 Implementing K-means -- 5 Simulation and Results -- 6 Conclusion -- References -- Optimizing the EDFA Gain for Optical WDM Network Using Simulation Method -- 1 Introduction -- 2 Simulative Setup -- 3 Results and Discussion -- 4 Conclusion -- References -- RFID-Based Smart Trolley with Mobile Application -- 1 Introduction -- 2 Literature Survey -- 3 Materials and Methods -- 3.1 Arduino UNO -- 3.2 EM-18 Reader Module -- 3.3 Bluetooth Module (HC-05) -- 3.4 RFID Tags -- 3.5 Voltage Divider Circuit. 3.6 Android Studio -- 3.7 Radio Frequency Identification -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Secure Authentication and Key Management -- SAKM-ITS: Secure Authentication and Key Management Protocol Concerning Intelligent Transportation Systems -- 1 Introduction -- 2 Related Work -- 3 Threat Model -- 4 Proposed Model -- 4.1 Registration of Entities -- 4.2 Authentication and Key Exchange Phase -- 5 Security Analysis -- 5.1 Formal Verification Using Scyther -- 5.2 Formal Verification Using Tamarin Prover -- 5.3 Informal Security Analysis -- 6 Comparative Analysis -- 6.1 Communication Cost -- 6.2 Computation Cost -- 7 Conclusion -- References -- Addressing Single Point of Failure in Group Communication of Constrained Environments -- 1 Introduction -- 2 Background -- 2.1 Shamir's Secret Sharing -- 2.2 Lagrange Interpolation -- 2.3 ECC and ECDH -- 3 The Proposed Scheme -- 3.1 Sharing Shares -- 4 Analysis of the Scheme -- 5 Conclusion -- References -- An RFID-Based Authentication Protocol for Smart Healthcare Applications -- 1 Introduction -- 1.1 Motivation and Contribution -- 1.2 Organization of the Paper -- 2 Preliminaries -- 2.1 Basic Concept of Elliptic Curve over a Prime Field GF(p) -- 2.2 Cryptographic Hash Function -- 2.3 Threat Model -- 3 Proposed Protocol -- 3.1 Initialization Phase -- 3.2 Registration Phase -- 3.3 Login and Mutual Authentication Phase -- 4 Security and Performance Analysis -- 4.1 Formal Security Verification Using AVISPA Tool -- 4.2 Security Features Comparison -- 4.3 Performance Analysis -- 5 Conclusion -- References -- Advanced Threat Detection and Mitigation -- On Credit Card Fraud Detection Using Machine Learning Techniques -- 1 Introduction -- 2 Machine Learning Techniques -- 2.1 Decision Tree -- 2.2 Random Forest -- 2.3 Isolation Forest -- 2.4 Support Vector Machine. 3 Experimental Results. |
Record Nr. | UNINA-9910878069803321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied soft computing and communication networks : proceedings of ACN 2020 / / Sabu M. Thampi [and five others], editors |
Pubbl/distr/stampa | Gateway East, Singapore : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (347 pages) |
Disciplina | 006.3 |
Collana | Lecture notes in networks and systems |
Soggetto topico |
Soft computing
Informàtica tova Xarxes de comunicacions |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 981-336-173-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organized By -- Contents -- Editors and Contributors -- Algebraic Modelling of a Generic Fog Scenario for Moving IoT Devices -- 1 Introduction -- 2 Algebra of Communicating Processes -- 3 Topology Framework -- 4 Actions to be Modelled -- 4.1 Action Cloud IN -- 4.2 Action Migrate IN -- 4.3 Action Init VM -- 4.4 Action Cloud OUT -- 4.5 Action Migration OUT -- 4.6 Action Kill VM -- 5 Verification of the Models -- 6 Conclusions -- References -- A Novel Approach to Preserve DRM for Content Distribution over P2P Networks -- 1 Introduction -- 1.1 Literature Review -- 2 Challenges and Contributions -- 3 Proposed System -- 3.1 System Approach -- 3.2 Physical Architecture/Layout -- 3.3 The P2P Network -- 3.4 The Secured DRM -- 4 Discussion -- 5 Conclusion -- References -- Secure Multimodal Biometric Recognition in Principal Component Subspace -- 1 Introduction -- 2 Related Works -- 3 Proposed Method -- 3.1 Similarity Measure Based on Principal Components -- 3.2 Protection Scheme for Multimodal Templates -- 4 Experiments and Results -- 4.1 Face -- 4.2 Fingerprint -- 4.3 Finger Vein -- 4.4 Fusing Face, Fingerprint and Finger Vein Features -- 5 Security Analysis -- 6 Conclusion -- References -- EEG-Based Emotion Recognition and Its Interface with Augmented Reality -- 1 Introduction -- 2 Basic Principles -- 2.1 Electroencephalography (EEG) -- 2.2 EEG Data Analysis -- 2.3 10-20 EEG Positioning System -- 2.4 Augmented Reality -- 2.5 Socket Programming and Application Development -- 2.6 Valence-Arousal Model -- 3 Hardware Used -- 4 Detailed Circuit Design -- 5 Implementation -- 6 Results -- 7 Conclusions and Future Scope -- References -- Profile Verification Using Blockchain -- 1 Introduction -- 1.1 Blockchain -- 1.2 Ethereum -- 1.3 Existing Systems -- 1.4 Decentralization of Certification -- 2 Related Work -- 3 System Architecture.
3.1 Data and Process Flow -- 3.2 Smart Contract -- 3.3 Verification Protocol -- 3.4 Image Hashing -- 4 Implementation -- 4.1 Teachers and Mentors -- 4.2 Web Interface -- 4.3 Events and Transactions -- 5 Results -- 6 Conclusion -- References -- Distributed Denial of Service (DDoS) Attacks Detection: A Machine Learning Approach -- 1 Introduction -- 2 Background and Related Work -- 2.1 DDoS Attacks and Its Detection Type -- 2.2 Machine Learning Solutions -- 3 Experimental Database and Setup -- 4 Classification Algorithms and Performance Measurements -- 4.1 Classification Algorithms -- 4.2 Performance Measurements -- 5 Results and Discussion -- 6 Conclusion -- References -- Intrusion Detection Using Deep Neural Network with AntiRectifier Layer -- 1 Introduction -- 1.1 Motivation -- 1.2 Contribution -- 2 Related Work -- 3 Deep Neural Network -- 3.1 Rectified Linear Unit -- 3.2 AntiRectifier Layer -- 3.3 Dropout and Noise Layers -- 3.4 Gaussian Dropout and Gaussian Noise -- 4 Experimental Methodology -- 4.1 Datasets for Experimentation -- 5 Results Analysis and Observations -- 6 Conclusion -- References -- CloudSim Exploration: A Knowledge Framework for Cloud Computing Researchers -- 1 Introduction -- 2 Related Work -- 2.1 Procure Knowledge -- 2.2 Family of Simulators -- 2.3 Art: Architecture -- 2.4 Techniques: Tools -- 2.5 Techniques: Language -- 2.6 Setup -- 2.7 Integrated Development Environment (IDE) -- 3 Proposed Work and Methodology -- 3.1 Framework -- 3.2 Algorithms -- 4 Results and Discussions -- 4.1 Experimental Setup -- 5 Conclusion and Future Direction -- References -- A Comprehensive Survey on Big Data Technology Based Cybersecurity Analytics Systems -- 1 Introduction -- 1.1 Survey Methodology -- 1.2 Paper Organization -- 2 Related Work -- 3 Big Data Technologies Used in the Existing BDTCA Systems. 4 Datasets Used in the Existing BDTCA Systems -- 5 Feature Selection Algorithms Used in the Existing BDTCA Systems -- 6 Various Methods Used to Read Packet Trace Files from HDFS -- 7 Observations, Recommendations and Directions -- 7.1 Migration from Batch Processing to Stream Processing -- 7.2 Lack of Modern Datasets for Evaluation -- 7.3 Feature Selection -- 7.4 Overhead of Converting PCAP Files to Text Files -- 8 Conclusion -- References -- An Asynchronous Leader-Based Neighbor Discovery Protocol in Static Wireless Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 3 Reference Protocols -- 4 Asynchronous Leader-Based Neighbor Discovery Protocol -- 4.1 Assumptions -- 4.2 Model -- 5 Simulation Results -- 5.1 Simulation Scenario -- 5.2 Results -- 6 Conclusion -- References -- P2P Bot Detection Based on Host Behavior and Big Data Technology -- 1 Introduction -- 1.1 Botnet -- 1.2 Peer-to-Peer Botnet -- 1.3 Big Data -- 1.4 Role of Big Data Technologies in Detecting P2P Botnets -- 1.5 Role of Machine Learning in Detecting P2P Botnets -- 2 Related Works -- 3 System Architecture -- 3.1 Data Collection -- 3.2 Parsing PCAP Files -- 3.3 Classification -- 4 Implementation -- 4.1 Dataset Used -- 4.2 Parsing PCAP Files -- 4.3 Classification -- 5 Results -- 6 Conclusion -- References -- Localization in Wireless Sensor Networks Using a Mobile Anchor and Subordinate Nodes -- 1 Introduction -- 2 Related Works -- 3 Localization in WSNs Using a Mobile Anchor and Subordinate Nodes (LWMS): A Proposed Algorithm -- 4 Simulations and Results -- 4.1 Percentage of Error at Various Stages of the Algorithm -- 4.2 Localization Error Versus Communication Range -- 4.3 Localization Error Versus Total Number of Nodes -- 5 Conclusion -- References -- Serverless Deployment of a Voice-Bot for Visually Impaired -- 1 Introduction -- 2 Related Work -- 3 Background. 3.1 Economics and Architectural Impact of Serverless Applications -- 3.2 General Bot Architecture -- 4 Blueprints for a Serverless Voice Bot for Visually Impaired -- 4.1 Overview of Technology Stack for Voice Bot -- 4.2 Overall Design Architecture of Feed-O-Back Voice Bot -- 5 Experimental Results -- 6 Conclusion -- References -- Smart Cities and Spectrum Vulnerabilities in Long-Range Unlicensed Communication Bands: A Review -- 1 Introduction -- 2 Related Works -- 3 Spectrum Management Techniques -- 4 Security Vulnerabilities of LPWANS and Proposed Solutions -- 5 Challenges of Proper Spectrum Utilization in Unlicensed Bands -- 6 Competing Incompatible Long-Range Technologies in Unlicensed Bands -- 7 Comparison and Discussion -- 8 Key Findings of the Review -- 9 Recommendations and Future Direction -- 10 Conclusion -- References -- Stability Certification of Dynamical Systems: Lyapunov Logic Learning Machine -- 1 Introduction -- 1.1 Context -- 1.2 Contribution -- 1.3 Related Works -- 2 Preliminaries -- 2.1 Lyapunov Stability -- 2.2 SOS Lyapunov Functions -- 2.3 Classical ROA Estimation -- 3 Method -- 3.1 Intelligible Analytics -- 3.2 Value Ranking -- 3.3 LLM with Zero Error -- 3.4 ROA Explanation -- 3.5 ROA Candidates for Certification -- 4 Results -- 5 Conclusion and Future Work -- References -- Two-Dimensional Angle of Arrival Estimation Using L-Shaped Array -- 1 Introduction -- 2 System Model -- 3 Proposed Method -- 3.1 Method Without Noise -- 3.2 Method with Noise -- 4 Simulation Results -- 5 Conclusion -- References -- Interference Management Technique for LTE, Wi-Fi Coexistence Based on CSI at the Transmitter -- 1 Introduction -- 2 Related Works -- 3 Interference Modeling -- 3.1 Channel Estimation -- 4 LTE and Wi-Fi Simulation Modeling -- 4.1 Channel Model -- 4.2 LTE/LTE-A Transceiver -- 4.3 WLAN 802.11ac Transceiver. 4.4 Generation of Clean LTE and Wi-Fi Signal -- 4.5 LTE and Wi-Fi Coexistence Deployment Scenario -- 5 Performance Evaluation and Results -- 6 Conclusion and Future Work -- References -- VHF OSTBC MIMO System Used to Overcome the Effects of Irregular Terrain on Radio Signals -- 1 Introduction -- 2 Methods to Mitigate Propagation Challenges in Irregular Terrain -- 3 Proposed Model -- 4 Simulation Results -- 4.1 The Receive Signal Strength Results of the VHF OSTBC MIMO System Using Two Different VHF Frequencies -- 4.2 The Bit Error Rate Results of the OSTBC MIMO System Using Two Different MIMO Antenna Arrays -- 5 Conclusion and Discussion -- References -- Modelling Video Frames for Object Extraction Using Spatial Correlation -- 1 Introduction -- 2 Global Threshold: Otsu's Method -- 3 2D-Continuous Wavelet Analysis -- 3.1 Analysing Wavelets -- 3.2 Reproducing Kernel -- 4 Detection Theory -- 4.1 Binary Hypothesis Testing -- 5 Object Extraction -- 5.1 Implementation of Algorithm -- 5.2 Results -- 6 Conclusion and Future Work -- References -- Speech-Based Selective Labeling of Objects in an Inventory Setting -- 1 Introduction -- 2 Experimental Methodology -- 2.1 Data Preprocessing -- 2.2 Voice-Based Object Detection -- 2.3 Faster RCNN -- 3 Results and Discussion -- 4 Conclusion -- References -- Classification and Evaluation of Goal-Oriented Requirements Analysis Methods -- 1 Introduction -- 2 Classification of GORA Methods -- 2.1 GORA Methods for the Analysis of FRs and NFRs -- 2.2 GORA Method(s) for the Analysis of NFRs -- 2.3 GORA Method(s) for Social Modeling -- 3 Evaluation of GORA Methods -- 4 Conclusion -- References -- iCREST: International Cross-Reference to Exchange-Based Stock Trend Prediction Using Long Short-Term Memory -- 1 Introduction -- 1.1 Motivation -- 2 Proposed Approach -- 2.1 Time-Series Data Collection -- 2.2 Mapping and Cleaning. 2.3 Currency Conversion. |
Record Nr. | UNINA-9910488690403321 |
Gateway East, Singapore : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computer vision and machine intelligence paradigms for SDGs : select proceedings of ICRTAC-CVMIP 2021 / / edited by R. Jagadeesh Kannan, Sabu M. Thampi, Shyh-Hau Wang |
Pubbl/distr/stampa | Singapore : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (339 pages) |
Disciplina | 060 |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico | Artificial intelligence |
ISBN | 981-19-7169-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- PTZ-Camera-Based Facial Expression Analysis using Faster R-CNN for Student Engagement Recognition -- 1 Introduction -- 2 Related Work -- 2.1 Contribution and Objective -- 3 Methodology -- 3.1 Face Detection using YOLO Detector -- 3.2 Detection of Landmark Points using Ensemble of Robust Constrained Local Models (CLM) -- 3.3 Affine Transformation -- 3.4 Face Expression Recognition using Faster R-CNN (Faster Regions with Convolutional Neural Network) -- 4 Results and Discussion -- 4.1 Performance Analysis -- 5 Conclusion -- References -- Convergence Perceptual Model for Computing Time Series Data on Fog Environment -- 1 Introduction -- 1.1 Goals Aimed at the Convergence Fog Model -- 1.2 Fog for Time-Series Computing -- 1.3 Proposed Convergence Perceptual Architecture -- 1.4 Perceptual Layer on CPM -- 2 Conclusion -- References -- Localized Super Resolution for Foreground Images Using U-Net and MR-CNN -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Architecture -- 4 Implementation and Training -- 4.1 Dataset and Augmentation -- 4.2 Model Architecture -- 4.3 Loss Function and Optimizer -- 4.4 Training -- 5 Evaluation Metrics -- 5.1 PSNR-Peak Signal-To-Noise Ratio -- 5.2 SSIM-Structural Similarity Index -- 5.3 Universal Image Quality Index -- 6 Results and Discussion -- 7 Conclusion and Future Work -- References -- SMS Spam Classification Using PSO-C4.5 -- 1 Introduction -- 2 Problem Statement -- 3 Research Objective -- 4 Review of Literature -- 4.1 Review of Text-Processing -- 4.2 Review on Feature Extraction -- 4.3 Review on Feature Selection -- 4.4 Review on Classifiers -- 5 Research Contribution -- 6 Data Collection and Data Sampling -- 7 Experimental Results -- 8 Conclusion and Future Enhancement -- References.
Automated Sorting, Grading of Fruits Based on Internal and External Quality Assessment Using HSI, Deep CNN -- 1 Introduction -- 2 Related Works -- 3 Overview of Proposed Idea -- 3.1 Preprocessing -- 3.2 Segmentation -- 3.3 CNN Model Development -- 4 Experimental Results and Discussion -- 4.1 Experimental Setup -- 4.2 Performance Measures -- 4.3 Experimental Results -- 5 Conclusion -- References -- Pest Detection Using Improvised YOLO Architecture -- 1 Introduction -- 2 Literature Review -- 2.1 Pest Detection Methods -- 2.2 Pest Classification Methods -- 3 YOLO V3 Architecture -- 4 Improvised YOLO V3 Architecture -- 5 Results and Discussions -- 6 Conclusion -- References -- Classification of Fungi Effected Psidium Guajava Leaves Using ML and DL Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Overview of Database -- 4 Proposed Method/Model -- 4.1 Classification Using Deep Learning Techniques -- 5 Experimental Results -- 5.1 Experimental Results Using Deep Learning Techniques -- 6 Comparative Analysis -- 7 Conclusions -- References -- Deep Learning Based Recognition of Plant Diseases -- 1 Introduction -- 2 Literature Review -- 3 Scope -- 4 Methodology -- 4.1 Procedure -- 4.2 Library -- 5 Results and Findings -- 6 Discussion -- 7 Conclusion -- 8 Future Scope -- 9 Recommendation -- References -- Artificial Cognition of Temporal Events Using Recurrent Point Process Networks -- 1 Introduction -- 2 Recurrent Point Process Network -- 2.1 Recurrent Neural Network -- 2.2 Interoperability and Prediction Module -- 2.3 Point Processes Equations -- 3 Automated Data Relation Process -- 3.1 Model Creation -- 3.2 Training Phase -- 3.3 Testing Phase -- 3.4 Anomaly Detection -- 3.5 Visualization -- 4 Temporal Variation Samples -- 4.1 Synchronous Event -- 4.2 Asynchronous Event -- 5 Conclusion -- References. Performance Analysis of Energy Efficient Video Transmission Using LEACH Based Protocol in WSN -- 1 Introduction -- 2 Related Work -- 3 Problem Statement and Our Contribution -- 4 LEACH Based Routing Protocol -- 5 Video Transmission Over WSN -- 6 Experimental Result -- 7 Conclusion -- References -- Hybridization of Texture Features for Identification of Bi-Lingual Scripts from Camera Images at Wordlevel -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Method -- 3.1 Creation of LBP Image -- 3.2 Extraction of GLCM Feature from LBP Image -- 3.3 Extraction HOG Feature from LBP Image -- 3.4 Combined Feature Vector of GLCM and HOG from LBP Image -- 4 Experimental Results and Discussion -- 4.1 Results and Discussion -- 5 Conclusion -- References -- Advanced Algorithmic Techniques for Topic Prediction and Recommendation-An Analysis -- 1 Introduction -- 2 Proposed Model -- 2.1 Hashtag-Based Approach -- 2.2 Word Ranking Based Approach -- 2.3 Authority Weighting Based Approach -- 2.4 Background Tweet Detection-Based Approach -- 2.5 Short-Term Fluctuation Modeling Based Approach -- 3 Results and Discussion -- 4 Conclusion -- References -- Implementation of an Automatic EEG Feature Extraction with Gated Recurrent Neural Network for Emotion Recognition -- 1 Introduction -- 2 Related Study -- 3 Methodology -- 3.1 Preprocessing -- 3.2 Feature Extraction -- 3.3 Classifier -- 4 Results and Discussions -- 4.1 Dataset -- 4.2 Implementation -- 5 Conclusion -- References -- High Performance Classifier for Brain Tumor Detection Using Capsule Neural Network -- 1 Introduction -- 2 Methods -- 2.1 Convolutional Neural Network -- 2.2 Capsule Networks -- 3 Literature Survey -- 4 Proposed Model -- 4.1 Capsule Network Model Creation -- 4.2 Prediction -- 5 Proposed Algorithm -- 5.1 Prediction Through Flask Framework -- 6 Results and Discussions -- 6.1 Accuracy. 6.2 Predicting Tumor -- 6.3 Training and Validation -- 7 Conclusion -- References -- Mining Suitable Symptoms to Identify Disease Using Apriori and NBC -- 1 Introduction -- 2 Review of Literature -- 3 Association Rule Mining -- 4 Proposed Work -- 4.1 Apriori Algorithm -- 5 Conclusion -- References -- Background Features-Based Novel Visual Ego-Motion Estimation -- 1 Introduction -- 1.1 Related Work -- 2 Algorithm -- 2.1 System Overview -- 2.2 Steerable Pyramid Transformation (SPT) -- 2.3 Keypoint Detection and Matching -- 2.4 Ransac -- 3 Experimental Results -- 4 Conclusion -- References -- Livspecs: Design and Implementation of Smart Specs for Hearing and Visually Challenged Persons -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Result and Discussion -- 5 Conclusion -- References -- Self-balancing Robot Using Arduino and PID Controller -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Block Diagram of the Two-Wheeled Robot -- 3.2 Working Principle -- 3.3 Control Action -- 4 Results and Discussion -- 5 Conclusion -- References -- A Survey Based on Online Voting System Using Blockchain Technology -- 1 Introduction -- 2 Background -- 2.1 Overview of Computerized Voting System -- 2.2 Blockchain Technology -- 2.3 Analysis of Ethereum -- 3 Comparative Study of Blockchain-Based Electronic Voting Plans -- 4 Discussion -- 5 Conclusion and Future Work -- References -- Survey on Collaborative Filtering Technique for Recommender System Using Deep Learning -- 1 Introduction -- 2 Recommender Systems -- 2.1 Deep Learning-Based Recommendation Systems -- 2.2 Deep Collaborative Filtering Techniques -- 2.3 Datasets -- 3 Recommendation System Applications -- 4 Conclusion -- References -- A Survey on Power Consumption Indicator Using Machine Learning-Based Approach -- 1 Introduction -- 2 System Description. 2.1 Power Limit Indicator System (PLIS) -- 2.2 PLIS Basic Flow -- 3 Review and Analysis of Power Consumption Systems -- 4 Conclusion -- References -- A Novel Hand Gesture Recognition for Aphonic People Using Convolutional Neural Network -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Binarization -- 2.2 Contour Detection -- 2.3 Feature Extraction Using Sift Algorithm -- 2.4 Classification Using Convolutional Neural Network -- 3 Experimental Results -- 4 Conclusion and Future Enhancement -- References -- Comprehensive Analysis of Defect Detection Through Image Processing and Machine Learning for Photovoltaic Panels -- 1 Introduction -- 1.1 Photovoltaic Panels -- 1.2 Defects in Photovoltaic Panels -- 2 Fault Identification System -- 2.1 Image Processing-Based Defect Identification -- 2.2 Machine Learning-Based Defect Identification -- 2.3 Deep Learning-Based Defect Identification -- 3 Experimental Results and Analysis -- 3.1 Canny Edge Detector -- 3.2 Support Vector Machine -- 3.3 AlexNet -- 4 Conclusion and Discussions -- References -- Covid Analysis Prediction Using Densenet Method in Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodologies -- 3.1 DenseNet -- 4 Proposed Work -- 4.1 Need for Covıd Detectıon -- 4.2 Dataset -- 4.3 Server Creatıon -- 4.4 Identıfıcatıon of Covıd -- 4.5 System Architecture -- 5 Implementation and Results -- 6 Conclusion and Future Enhancement -- References -- Feature Extraction Based on GLCM and GLRM Methods on COVID-19 Dataset -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Feature Extraction -- 3.2 Gray Level Co-Occurrence Matrixes -- 3.3 Gray Level Run Length Matrix -- 4 Classification Techniques -- 5 Results and Discussion -- 5.1 Performance Measures Parameters -- 6 Conclusion -- References. Memory Augmented Distributed Monte Carlo Tree Search Algorithm-Based Content Popularity Aware Content Recommendation Using Content Centric Networks. |
Record Nr. | UNISA-996547970903316 |
Singapore : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer vision and machine intelligence paradigms for SDGs : select proceedings of ICRTAC-CVMIP 2021 / / edited by R. Jagadeesh Kannan, Sabu M. Thampi, Shyh-Hau Wang |
Pubbl/distr/stampa | Singapore : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (339 pages) |
Disciplina | 060 |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico | Artificial intelligence |
ISBN | 981-19-7169-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- Editors and Contributors -- PTZ-Camera-Based Facial Expression Analysis using Faster R-CNN for Student Engagement Recognition -- 1 Introduction -- 2 Related Work -- 2.1 Contribution and Objective -- 3 Methodology -- 3.1 Face Detection using YOLO Detector -- 3.2 Detection of Landmark Points using Ensemble of Robust Constrained Local Models (CLM) -- 3.3 Affine Transformation -- 3.4 Face Expression Recognition using Faster R-CNN (Faster Regions with Convolutional Neural Network) -- 4 Results and Discussion -- 4.1 Performance Analysis -- 5 Conclusion -- References -- Convergence Perceptual Model for Computing Time Series Data on Fog Environment -- 1 Introduction -- 1.1 Goals Aimed at the Convergence Fog Model -- 1.2 Fog for Time-Series Computing -- 1.3 Proposed Convergence Perceptual Architecture -- 1.4 Perceptual Layer on CPM -- 2 Conclusion -- References -- Localized Super Resolution for Foreground Images Using U-Net and MR-CNN -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Architecture -- 4 Implementation and Training -- 4.1 Dataset and Augmentation -- 4.2 Model Architecture -- 4.3 Loss Function and Optimizer -- 4.4 Training -- 5 Evaluation Metrics -- 5.1 PSNR-Peak Signal-To-Noise Ratio -- 5.2 SSIM-Structural Similarity Index -- 5.3 Universal Image Quality Index -- 6 Results and Discussion -- 7 Conclusion and Future Work -- References -- SMS Spam Classification Using PSO-C4.5 -- 1 Introduction -- 2 Problem Statement -- 3 Research Objective -- 4 Review of Literature -- 4.1 Review of Text-Processing -- 4.2 Review on Feature Extraction -- 4.3 Review on Feature Selection -- 4.4 Review on Classifiers -- 5 Research Contribution -- 6 Data Collection and Data Sampling -- 7 Experimental Results -- 8 Conclusion and Future Enhancement -- References.
Automated Sorting, Grading of Fruits Based on Internal and External Quality Assessment Using HSI, Deep CNN -- 1 Introduction -- 2 Related Works -- 3 Overview of Proposed Idea -- 3.1 Preprocessing -- 3.2 Segmentation -- 3.3 CNN Model Development -- 4 Experimental Results and Discussion -- 4.1 Experimental Setup -- 4.2 Performance Measures -- 4.3 Experimental Results -- 5 Conclusion -- References -- Pest Detection Using Improvised YOLO Architecture -- 1 Introduction -- 2 Literature Review -- 2.1 Pest Detection Methods -- 2.2 Pest Classification Methods -- 3 YOLO V3 Architecture -- 4 Improvised YOLO V3 Architecture -- 5 Results and Discussions -- 6 Conclusion -- References -- Classification of Fungi Effected Psidium Guajava Leaves Using ML and DL Techniques -- 1 Introduction -- 2 Literature Survey -- 3 Overview of Database -- 4 Proposed Method/Model -- 4.1 Classification Using Deep Learning Techniques -- 5 Experimental Results -- 5.1 Experimental Results Using Deep Learning Techniques -- 6 Comparative Analysis -- 7 Conclusions -- References -- Deep Learning Based Recognition of Plant Diseases -- 1 Introduction -- 2 Literature Review -- 3 Scope -- 4 Methodology -- 4.1 Procedure -- 4.2 Library -- 5 Results and Findings -- 6 Discussion -- 7 Conclusion -- 8 Future Scope -- 9 Recommendation -- References -- Artificial Cognition of Temporal Events Using Recurrent Point Process Networks -- 1 Introduction -- 2 Recurrent Point Process Network -- 2.1 Recurrent Neural Network -- 2.2 Interoperability and Prediction Module -- 2.3 Point Processes Equations -- 3 Automated Data Relation Process -- 3.1 Model Creation -- 3.2 Training Phase -- 3.3 Testing Phase -- 3.4 Anomaly Detection -- 3.5 Visualization -- 4 Temporal Variation Samples -- 4.1 Synchronous Event -- 4.2 Asynchronous Event -- 5 Conclusion -- References. Performance Analysis of Energy Efficient Video Transmission Using LEACH Based Protocol in WSN -- 1 Introduction -- 2 Related Work -- 3 Problem Statement and Our Contribution -- 4 LEACH Based Routing Protocol -- 5 Video Transmission Over WSN -- 6 Experimental Result -- 7 Conclusion -- References -- Hybridization of Texture Features for Identification of Bi-Lingual Scripts from Camera Images at Wordlevel -- 1 Introduction -- 2 Review of Literature -- 3 Proposed Method -- 3.1 Creation of LBP Image -- 3.2 Extraction of GLCM Feature from LBP Image -- 3.3 Extraction HOG Feature from LBP Image -- 3.4 Combined Feature Vector of GLCM and HOG from LBP Image -- 4 Experimental Results and Discussion -- 4.1 Results and Discussion -- 5 Conclusion -- References -- Advanced Algorithmic Techniques for Topic Prediction and Recommendation-An Analysis -- 1 Introduction -- 2 Proposed Model -- 2.1 Hashtag-Based Approach -- 2.2 Word Ranking Based Approach -- 2.3 Authority Weighting Based Approach -- 2.4 Background Tweet Detection-Based Approach -- 2.5 Short-Term Fluctuation Modeling Based Approach -- 3 Results and Discussion -- 4 Conclusion -- References -- Implementation of an Automatic EEG Feature Extraction with Gated Recurrent Neural Network for Emotion Recognition -- 1 Introduction -- 2 Related Study -- 3 Methodology -- 3.1 Preprocessing -- 3.2 Feature Extraction -- 3.3 Classifier -- 4 Results and Discussions -- 4.1 Dataset -- 4.2 Implementation -- 5 Conclusion -- References -- High Performance Classifier for Brain Tumor Detection Using Capsule Neural Network -- 1 Introduction -- 2 Methods -- 2.1 Convolutional Neural Network -- 2.2 Capsule Networks -- 3 Literature Survey -- 4 Proposed Model -- 4.1 Capsule Network Model Creation -- 4.2 Prediction -- 5 Proposed Algorithm -- 5.1 Prediction Through Flask Framework -- 6 Results and Discussions -- 6.1 Accuracy. 6.2 Predicting Tumor -- 6.3 Training and Validation -- 7 Conclusion -- References -- Mining Suitable Symptoms to Identify Disease Using Apriori and NBC -- 1 Introduction -- 2 Review of Literature -- 3 Association Rule Mining -- 4 Proposed Work -- 4.1 Apriori Algorithm -- 5 Conclusion -- References -- Background Features-Based Novel Visual Ego-Motion Estimation -- 1 Introduction -- 1.1 Related Work -- 2 Algorithm -- 2.1 System Overview -- 2.2 Steerable Pyramid Transformation (SPT) -- 2.3 Keypoint Detection and Matching -- 2.4 Ransac -- 3 Experimental Results -- 4 Conclusion -- References -- Livspecs: Design and Implementation of Smart Specs for Hearing and Visually Challenged Persons -- 1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Result and Discussion -- 5 Conclusion -- References -- Self-balancing Robot Using Arduino and PID Controller -- 1 Introduction -- 2 Related Works -- 3 Proposed Methodology -- 3.1 Block Diagram of the Two-Wheeled Robot -- 3.2 Working Principle -- 3.3 Control Action -- 4 Results and Discussion -- 5 Conclusion -- References -- A Survey Based on Online Voting System Using Blockchain Technology -- 1 Introduction -- 2 Background -- 2.1 Overview of Computerized Voting System -- 2.2 Blockchain Technology -- 2.3 Analysis of Ethereum -- 3 Comparative Study of Blockchain-Based Electronic Voting Plans -- 4 Discussion -- 5 Conclusion and Future Work -- References -- Survey on Collaborative Filtering Technique for Recommender System Using Deep Learning -- 1 Introduction -- 2 Recommender Systems -- 2.1 Deep Learning-Based Recommendation Systems -- 2.2 Deep Collaborative Filtering Techniques -- 2.3 Datasets -- 3 Recommendation System Applications -- 4 Conclusion -- References -- A Survey on Power Consumption Indicator Using Machine Learning-Based Approach -- 1 Introduction -- 2 System Description. 2.1 Power Limit Indicator System (PLIS) -- 2.2 PLIS Basic Flow -- 3 Review and Analysis of Power Consumption Systems -- 4 Conclusion -- References -- A Novel Hand Gesture Recognition for Aphonic People Using Convolutional Neural Network -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Binarization -- 2.2 Contour Detection -- 2.3 Feature Extraction Using Sift Algorithm -- 2.4 Classification Using Convolutional Neural Network -- 3 Experimental Results -- 4 Conclusion and Future Enhancement -- References -- Comprehensive Analysis of Defect Detection Through Image Processing and Machine Learning for Photovoltaic Panels -- 1 Introduction -- 1.1 Photovoltaic Panels -- 1.2 Defects in Photovoltaic Panels -- 2 Fault Identification System -- 2.1 Image Processing-Based Defect Identification -- 2.2 Machine Learning-Based Defect Identification -- 2.3 Deep Learning-Based Defect Identification -- 3 Experimental Results and Analysis -- 3.1 Canny Edge Detector -- 3.2 Support Vector Machine -- 3.3 AlexNet -- 4 Conclusion and Discussions -- References -- Covid Analysis Prediction Using Densenet Method in Deep Learning -- 1 Introduction -- 2 Related Work -- 3 Methodologies -- 3.1 DenseNet -- 4 Proposed Work -- 4.1 Need for Covıd Detectıon -- 4.2 Dataset -- 4.3 Server Creatıon -- 4.4 Identıfıcatıon of Covıd -- 4.5 System Architecture -- 5 Implementation and Results -- 6 Conclusion and Future Enhancement -- References -- Feature Extraction Based on GLCM and GLRM Methods on COVID-19 Dataset -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 3.1 Feature Extraction -- 3.2 Gray Level Co-Occurrence Matrixes -- 3.3 Gray Level Run Length Matrix -- 4 Classification Techniques -- 5 Results and Discussion -- 5.1 Performance Measures Parameters -- 6 Conclusion -- References. Memory Augmented Distributed Monte Carlo Tree Search Algorithm-Based Content Popularity Aware Content Recommendation Using Content Centric Networks. |
Record Nr. | UNINA-9910637702803321 |
Singapore : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computing science, communication and security : third International Conference, COMS2 2022, Gujarat, India, February 6-7, 2022, revised selected papers / / Nirbhay Chaubey, Sabu M. Thampi, and Noor Zaman Jhanjhi, editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer International Publishing, , [2022] |
Descrizione fisica | 1 online resource (327 pages) |
Disciplina | 004.6 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer networks
Computer security |
ISBN | 3-031-10551-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910580139003321 |
Cham, Switzerland : , : Springer International Publishing, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Computing science, communication and security : third International Conference, COMS2 2022, Gujarat, India, February 6-7, 2022, revised selected papers / / Nirbhay Chaubey, Sabu M. Thampi, and Noor Zaman Jhanjhi, editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer International Publishing, , [2022] |
Descrizione fisica | 1 online resource (327 pages) |
Disciplina | 004.6 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer networks
Computer security |
ISBN | 3-031-10551-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996483165403316 |
Cham, Switzerland : , : Springer International Publishing, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|