top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Autore Tomar Ranjeet Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (350 pages)
Disciplina 621.39
004.6
Altri autori (Persone) VermaShekhar
ChaurasiaBrijesh Kumar
SinghVrijendra
AbawajyJemal H
AkasheShyam
HsiungPao-Ann
PrasadRamjee
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Image processing - Digital techniques
Computer vision
Computer Engineering and Networks
Artificial Intelligence
Data Structures and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-031-43140-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wired and Wireless Communication Systems -- Networks and Information Security -- Electronics Circuits for Communication Systems.
Record Nr. UNINA-9910746951803321
Tomar Ranjeet Singh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part I / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Autore Tomar Ranjeet Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (350 pages)
Disciplina 621.39
004.6
Altri autori (Persone) VermaShekhar
ChaurasiaBrijesh Kumar
SinghVrijendra
AbawajyJemal H
AkasheShyam
HsiungPao-Ann
PrasadRamjee
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Image processing - Digital techniques
Computer vision
Computer Engineering and Networks
Artificial Intelligence
Data Structures and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-031-43140-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Wired and Wireless Communication Systems -- Networks and Information Security -- Electronics Circuits for Communication Systems.
Record Nr. UNISA-996550551003316
Tomar Ranjeet Singh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Autore Tomar Ranjeet Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (330 pages)
Disciplina 621.39
004.6
Altri autori (Persone) VermaShekhar
ChaurasiaBrijesh Kumar
SinghVrijendra
AbawajyJemal H
AkasheShyam
HsiungPao-Ann
PrasadRamjee
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Image processing - Digital techniques
Computer vision
Computer Engineering and Networks
Artificial Intelligence
Data Structures and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-031-43145-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- High Dimensional Data Representation and Processing -- Brain Tumor Classification Using Feature Extraction and Non-linear SVM Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 VGG-SVM Model -- 3.1 Model Architecture -- 3.2 Implementation Details and Preprocessing -- 3.3 Dataset Description -- 4 Experimental Results and Discussion -- 4.1 Results -- 4.2 Discussion -- 5 Conclusion -- References -- Lightweight Django-Based Customer Relationship Management System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Feasibility and Requirement Analysis -- 3.2 Design of the System -- 3.3 Development Tools Used are Majorly Django, HTML, CSS, Bootstrap, and SQLite -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References -- Single Server Banking Management System -- 1 Introduction -- 1.1 Background and Overview -- 1.2 Problem Statement -- 1.3 Objective -- 1.4 Scope -- 1.5 Organization of the Paper -- 2 Paper Preparation -- 3 Characteristics and Features -- 3.1 SIP Calculator -- 3.2 EMI Calculator -- 3.3 OTP Verification -- 3.4 Email Facility -- 4 Methodology -- 4.1 Results -- 5 Conclusion -- 5.1 Future Scope -- References -- Prioritization of MQTT Messages: A Novel Approach -- 1 Introduction -- 1.1 Message Queuing Telemetry Transport (MQTT) Protocol -- 1.2 Problem Statement -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Identifying min-max Range -- 3.2 Forwarding High Priority Messages -- 3.3 Identifying Trivial Range -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of Crop Yield Prediction Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Methodology -- 5 Result Analysis -- 6 Conclusion -- 7 Future work -- References.
Big Data Analytics for Classification in Sentiment Analysis -- 1 Introduction -- 1.1 The 5 V'S of Big Data -- 1.2 Big Data Generation -- 1.3 Sentiment Analysis -- 2 Literature Review -- References -- Ensemble Classifiers for Classification of Imbalanced Dataset of Malicious and Benign Websites -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Data Summarization -- 3.3 Data Analysis and Preprocessing -- 3.4 Data Sampling and Balancing -- 3.5 Machine Learning Classifiers -- 4 Performance Evaluation -- 5 Conclusion -- References -- Forecasting of Congestive Cardiac Failure Using Deep Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Architecture -- 3.2 Algorithms -- 4 Result -- 5 Conclusion -- References -- Internet of Things-Based Smart Irrigation System for Moisture in the Soil and Weather Forecast -- 1 Introduction -- 2 Related Work -- 3 Benefits of Smart Irrigation System -- 4 Impect of Sustainability on Smart Irrigation System -- 5 The Smart Irrigation Systems' Basic Architecture and Layout -- 6 Difficulties and Potential Outcome -- 7 Conclusion -- References -- Visual Cryptography: An Emerging Technology -- 1 Introduction -- 1.1 Visual Cryptography for Binary Image -- 1.2 Visual Cryptography for Gray Image -- 1.3 Visual Cryptography for Colored Images -- 2 Literature Survey -- 3 Applications of Visual Cryptography -- 3.1 Watermarking -- 3.2 Anti- Phishing Systems -- 3.3 Human Machine Identification -- 3.4 Secure Banking Communication -- 3.5 Defense System -- 3.6 Captcha -- 4 Results -- 5 Conclusions -- References -- Computing Techniques for Efficient Networks Design -- Machine Learning Based Techniques for the Network Design of Advanced 5G Network, Beyond 5G (B5G) and Towards 6G: Challenges and Trends -- 1 Introduction -- 2 Motivation -- 2.1 Key Contributions.
3 Challenges Associated with NGWN -- 3.1 Deployment 5G (Denser) Cells -- 3.2 MIMO Along with Beam Forming -- 3.3 Challenges Associated with the System or Network Latency -- 3.4 Improvement of the Spectral Efficiency -- 4 The Requirements of Network Intelligence: ML in Advanced 5G -- 5 Application Areas of ML in 5G/B5G: Industry Perspective -- 6 State-of-the-Art ML Approached in Advanced 5G, B5G and Towards 6G -- 6.1 The Architecture of Radio Learning -- 7 Challenges Associated with Applying ML in NGWN -- 7.1 Challenges of Implementing the Process of Desired Learning -- 7.2 Challenges of Implementing the Network Edge Intelligence -- 7.3 The Trends for Addressing Challenges in Advanced 5G -- 8 ML Incorporation: Open Issues Offer Research Directions -- 8.1 Trends Towards ML-Powered 6G Network: Edge Intelligence -- 9 Conclusion -- References -- Recognition of Speech Emotion Using Machine Learning Techniques -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Collection -- 2.2 Data Preparation -- 2.3 Data Visualization -- 2.4 Feature Extraction and Model Building -- 3 Results and Discussions -- 4 Conclusion -- References -- Convolution Neural Network Based Model for Classification and Identification of Fake Profile on Social Network -- 1 Introduction -- 2 Social Media -- 3 Social Media Mining -- 4 Social Media Spam -- 5 Related Work -- 6 Proposed framework for Identifying Malicious Profile over Social Media -- 7 Result Analysis -- 8 Conclusion -- References -- Social Distance Monitoring and Infection Risk Assessment in COVID-19 Pandemic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Human Detection -- 3.2 Location Tracking -- 3.3 Inter Distance Estimation -- 3.4 Inter Distance Estimation -- 3.5 Inter Distance Estimation -- 4 Results -- 5 Conclusion -- References -- Vibrations Signal Analysis of Cantilever Beam Using Machine Learning.
1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results -- 5 Future Scope of the Work -- References -- Pneumonia Detection Using Deep Learning: A Bibliometric Study -- 1 Introduction -- 2 Materials and Methods -- 2.1 Selection of Articles -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Numerical Simulation Design of Multiple Users Offloading Using Improved Optimization Approach for Edge Computing -- 1 Introduction -- 2 Mobile Edge/Fog Computing -- 3 Related Works -- 4 Modelling of the System -- 5 Simulation and Results -- 6 Conclusion -- References -- Numerical Simulation and Mathematical Modelling of Machine Learning Based Improved Crypto Currency Forecasting System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result Analysis -- 4.1 Dataset -- 4.2 Flow Chart of Simulation -- 4.3 Result Discussion -- 5 Conclusion and Future Scope -- References -- Reinforcement Learning in Blockchain-Enabled IIoT Networks -- 1 Introduction -- 2 Interconnection Between Blockchain, IIoT, and AI -- 3 Blockchain Technology and IIoT -- 4 Reinforcement Learning Techniques -- 4.1 Q-Learning -- 4.2 Multi-armed Bandit Learning -- 4.3 Actor-Critic Learning -- 5 Blockchain-Enabled IIoT Network -- 5.1 Security -- 5.2 Cost Effectiveness -- 5.3 Trustless -- 5.4 Autonomy -- 5.5 Smart Contracts -- 5.6 Blockchain-Enabled IIoT Layers -- 5.7 Physical Layer -- 5.8 Network Layer -- 5.9 Application Layer -- 6 Reinforcement Learning Applications in Blockchain-Enabled IIoT Network -- 6.1 Minimizing Forking Events -- 6.2 Improving Energy Efficiency -- 6.3 Time to Finality Minimization -- 6.4 Enhancing Transaction Throughput -- 6.5 Improving Link Security -- 6.6 Average Blocktime Reduction -- 7 Conclusion -- References -- Practical Challenges in Implementation of Information and Communication Technology -- 1 Introduction.
2 Research Methodology -- 3 Bibliometric Details -- 3.1 Authors -- 3.2 Source Documents and Keywords -- 3.3 Countries, Sponsors, and Affiliations -- 4 Thematic Discussion -- 4.1 Technological and Implementation Challenges -- 4.2 Infrastructure Based Challenges -- 4.3 Teacher Related Challenges -- 4.4 Student Related Challenges -- 4.5 Other Challenges -- 5 Future Research Agenda -- 5.1 Other Challenges -- 5.2 Research Niches -- 6 Conclusion -- References -- Facial Analytics or Virtual Avatars: Competencies and Design Considerations for Student-Teacher Interaction in AI-Powered Online Education for Effective Classroom Engagement -- 1 Introduction -- 2 Background -- 3 Conceptual Foundation -- 4 AI-Powered Online Learning -- 5 Methods and Methodology -- 5.1 Creation of a Storyboard -- 5.2 Participants -- 5.3 Procedure -- 5.4 Data Analysis -- 6 Findings -- 6.1 Communication -- 6.2 Quantity and Quality -- 6.3 Responsibility -- 6.4 Support -- 6.5 Agency -- 6.6 Connection -- 6.7 Surveillance -- 7 Analysis and Conclusion -- References -- Vehicular Technology and Applications -- Real Time Connectivity Analysis of Vehicles in Different City Dense Environment -- 1 Introduction -- 2 Problem Description -- 2.1 VANET Scenario -- 2.2 VANETsim Overview -- 3 Performance Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Analysis of Energy Efficient Wireless Senor Network with 6LoWPAN IoT Gateway -- 1 Introduction -- 2 Wireless Energy Harvesting and Implementation Techniques -- 2.1 Role of Performance Parameters in the Proposed System -- 3 Proposed System Model of Wireless Sensor Network with 6LoWPAN Gateway -- 4 Simulation Results and Discussion -- 5 Conclusion and Future Work -- References -- Energy-Efficient Data Routing Protocols for Sink Mobility in Wireless Sensor Networks -- 1 Introduction -- 1.1 Motivation -- 2 Related Work.
3 Research Gaps.
Record Nr. UNINA-9910746997303321
Tomar Ranjeet Singh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Communication, Networks and Computing [[electronic resource] ] : Third International Conference, CNC 2022, Gwalior, India, December 8–10, 2022, Proceedings, Part II / / edited by Ranjeet Singh Tomar, Shekhar Verma, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal H. Abawajy, Shyam Akashe, Pao-Ann Hsiung, Ramjee Prasad
Autore Tomar Ranjeet Singh
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (330 pages)
Disciplina 621.39
004.6
Altri autori (Persone) VermaShekhar
ChaurasiaBrijesh Kumar
SinghVrijendra
AbawajyJemal H
AkasheShyam
HsiungPao-Ann
PrasadRamjee
Collana Communications in Computer and Information Science
Soggetto topico Computer engineering
Computer networks
Artificial intelligence
Data structures (Computer science)
Information theory
Image processing - Digital techniques
Computer vision
Computer Engineering and Networks
Artificial Intelligence
Data Structures and Information Theory
Computer Imaging, Vision, Pattern Recognition and Graphics
ISBN 3-031-43145-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Preface -- Organization -- Contents - Part II -- Contents - Part I -- High Dimensional Data Representation and Processing -- Brain Tumor Classification Using Feature Extraction and Non-linear SVM Hybrid Model -- 1 Introduction -- 2 Related Works -- 3 VGG-SVM Model -- 3.1 Model Architecture -- 3.2 Implementation Details and Preprocessing -- 3.3 Dataset Description -- 4 Experimental Results and Discussion -- 4.1 Results -- 4.2 Discussion -- 5 Conclusion -- References -- Lightweight Django-Based Customer Relationship Management System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 System Feasibility and Requirement Analysis -- 3.2 Design of the System -- 3.3 Development Tools Used are Majorly Django, HTML, CSS, Bootstrap, and SQLite -- 4 Experimental Results -- 5 Conclusion and Future Scope -- References -- Single Server Banking Management System -- 1 Introduction -- 1.1 Background and Overview -- 1.2 Problem Statement -- 1.3 Objective -- 1.4 Scope -- 1.5 Organization of the Paper -- 2 Paper Preparation -- 3 Characteristics and Features -- 3.1 SIP Calculator -- 3.2 EMI Calculator -- 3.3 OTP Verification -- 3.4 Email Facility -- 4 Methodology -- 4.1 Results -- 5 Conclusion -- 5.1 Future Scope -- References -- Prioritization of MQTT Messages: A Novel Approach -- 1 Introduction -- 1.1 Message Queuing Telemetry Transport (MQTT) Protocol -- 1.2 Problem Statement -- 2 Related Work -- 3 Proposed Algorithm -- 3.1 Identifying min-max Range -- 3.2 Forwarding High Priority Messages -- 3.3 Identifying Trivial Range -- 4 Results and Discussion -- 5 Conclusion -- References -- Analysis of Crop Yield Prediction Using Machine Learning Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 System Architecture -- 4 Methodology -- 5 Result Analysis -- 6 Conclusion -- 7 Future work -- References.
Big Data Analytics for Classification in Sentiment Analysis -- 1 Introduction -- 1.1 The 5 V'S of Big Data -- 1.2 Big Data Generation -- 1.3 Sentiment Analysis -- 2 Literature Review -- References -- Ensemble Classifiers for Classification of Imbalanced Dataset of Malicious and Benign Websites -- 1 Introduction -- 2 Related Work -- 3 Proposed Methodology -- 3.1 Data Acquisition -- 3.2 Data Summarization -- 3.3 Data Analysis and Preprocessing -- 3.4 Data Sampling and Balancing -- 3.5 Machine Learning Classifiers -- 4 Performance Evaluation -- 5 Conclusion -- References -- Forecasting of Congestive Cardiac Failure Using Deep Learning Algorithms -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Architecture -- 3.2 Algorithms -- 4 Result -- 5 Conclusion -- References -- Internet of Things-Based Smart Irrigation System for Moisture in the Soil and Weather Forecast -- 1 Introduction -- 2 Related Work -- 3 Benefits of Smart Irrigation System -- 4 Impect of Sustainability on Smart Irrigation System -- 5 The Smart Irrigation Systems' Basic Architecture and Layout -- 6 Difficulties and Potential Outcome -- 7 Conclusion -- References -- Visual Cryptography: An Emerging Technology -- 1 Introduction -- 1.1 Visual Cryptography for Binary Image -- 1.2 Visual Cryptography for Gray Image -- 1.3 Visual Cryptography for Colored Images -- 2 Literature Survey -- 3 Applications of Visual Cryptography -- 3.1 Watermarking -- 3.2 Anti- Phishing Systems -- 3.3 Human Machine Identification -- 3.4 Secure Banking Communication -- 3.5 Defense System -- 3.6 Captcha -- 4 Results -- 5 Conclusions -- References -- Computing Techniques for Efficient Networks Design -- Machine Learning Based Techniques for the Network Design of Advanced 5G Network, Beyond 5G (B5G) and Towards 6G: Challenges and Trends -- 1 Introduction -- 2 Motivation -- 2.1 Key Contributions.
3 Challenges Associated with NGWN -- 3.1 Deployment 5G (Denser) Cells -- 3.2 MIMO Along with Beam Forming -- 3.3 Challenges Associated with the System or Network Latency -- 3.4 Improvement of the Spectral Efficiency -- 4 The Requirements of Network Intelligence: ML in Advanced 5G -- 5 Application Areas of ML in 5G/B5G: Industry Perspective -- 6 State-of-the-Art ML Approached in Advanced 5G, B5G and Towards 6G -- 6.1 The Architecture of Radio Learning -- 7 Challenges Associated with Applying ML in NGWN -- 7.1 Challenges of Implementing the Process of Desired Learning -- 7.2 Challenges of Implementing the Network Edge Intelligence -- 7.3 The Trends for Addressing Challenges in Advanced 5G -- 8 ML Incorporation: Open Issues Offer Research Directions -- 8.1 Trends Towards ML-Powered 6G Network: Edge Intelligence -- 9 Conclusion -- References -- Recognition of Speech Emotion Using Machine Learning Techniques -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Data Collection -- 2.2 Data Preparation -- 2.3 Data Visualization -- 2.4 Feature Extraction and Model Building -- 3 Results and Discussions -- 4 Conclusion -- References -- Convolution Neural Network Based Model for Classification and Identification of Fake Profile on Social Network -- 1 Introduction -- 2 Social Media -- 3 Social Media Mining -- 4 Social Media Spam -- 5 Related Work -- 6 Proposed framework for Identifying Malicious Profile over Social Media -- 7 Result Analysis -- 8 Conclusion -- References -- Social Distance Monitoring and Infection Risk Assessment in COVID-19 Pandemic -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Human Detection -- 3.2 Location Tracking -- 3.3 Inter Distance Estimation -- 3.4 Inter Distance Estimation -- 3.5 Inter Distance Estimation -- 4 Results -- 5 Conclusion -- References -- Vibrations Signal Analysis of Cantilever Beam Using Machine Learning.
1 Introduction -- 2 Literature Survey -- 3 Proposed System -- 4 Results -- 5 Future Scope of the Work -- References -- Pneumonia Detection Using Deep Learning: A Bibliometric Study -- 1 Introduction -- 2 Materials and Methods -- 2.1 Selection of Articles -- 3 Results -- 4 Discussion -- 5 Conclusion -- References -- Numerical Simulation Design of Multiple Users Offloading Using Improved Optimization Approach for Edge Computing -- 1 Introduction -- 2 Mobile Edge/Fog Computing -- 3 Related Works -- 4 Modelling of the System -- 5 Simulation and Results -- 6 Conclusion -- References -- Numerical Simulation and Mathematical Modelling of Machine Learning Based Improved Crypto Currency Forecasting System -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Result Analysis -- 4.1 Dataset -- 4.2 Flow Chart of Simulation -- 4.3 Result Discussion -- 5 Conclusion and Future Scope -- References -- Reinforcement Learning in Blockchain-Enabled IIoT Networks -- 1 Introduction -- 2 Interconnection Between Blockchain, IIoT, and AI -- 3 Blockchain Technology and IIoT -- 4 Reinforcement Learning Techniques -- 4.1 Q-Learning -- 4.2 Multi-armed Bandit Learning -- 4.3 Actor-Critic Learning -- 5 Blockchain-Enabled IIoT Network -- 5.1 Security -- 5.2 Cost Effectiveness -- 5.3 Trustless -- 5.4 Autonomy -- 5.5 Smart Contracts -- 5.6 Blockchain-Enabled IIoT Layers -- 5.7 Physical Layer -- 5.8 Network Layer -- 5.9 Application Layer -- 6 Reinforcement Learning Applications in Blockchain-Enabled IIoT Network -- 6.1 Minimizing Forking Events -- 6.2 Improving Energy Efficiency -- 6.3 Time to Finality Minimization -- 6.4 Enhancing Transaction Throughput -- 6.5 Improving Link Security -- 6.6 Average Blocktime Reduction -- 7 Conclusion -- References -- Practical Challenges in Implementation of Information and Communication Technology -- 1 Introduction.
2 Research Methodology -- 3 Bibliometric Details -- 3.1 Authors -- 3.2 Source Documents and Keywords -- 3.3 Countries, Sponsors, and Affiliations -- 4 Thematic Discussion -- 4.1 Technological and Implementation Challenges -- 4.2 Infrastructure Based Challenges -- 4.3 Teacher Related Challenges -- 4.4 Student Related Challenges -- 4.5 Other Challenges -- 5 Future Research Agenda -- 5.1 Other Challenges -- 5.2 Research Niches -- 6 Conclusion -- References -- Facial Analytics or Virtual Avatars: Competencies and Design Considerations for Student-Teacher Interaction in AI-Powered Online Education for Effective Classroom Engagement -- 1 Introduction -- 2 Background -- 3 Conceptual Foundation -- 4 AI-Powered Online Learning -- 5 Methods and Methodology -- 5.1 Creation of a Storyboard -- 5.2 Participants -- 5.3 Procedure -- 5.4 Data Analysis -- 6 Findings -- 6.1 Communication -- 6.2 Quantity and Quality -- 6.3 Responsibility -- 6.4 Support -- 6.5 Agency -- 6.6 Connection -- 6.7 Surveillance -- 7 Analysis and Conclusion -- References -- Vehicular Technology and Applications -- Real Time Connectivity Analysis of Vehicles in Different City Dense Environment -- 1 Introduction -- 2 Problem Description -- 2.1 VANET Scenario -- 2.2 VANETsim Overview -- 3 Performance Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Design and Analysis of Energy Efficient Wireless Senor Network with 6LoWPAN IoT Gateway -- 1 Introduction -- 2 Wireless Energy Harvesting and Implementation Techniques -- 2.1 Role of Performance Parameters in the Proposed System -- 3 Proposed System Model of Wireless Sensor Network with 6LoWPAN Gateway -- 4 Simulation Results and Discussion -- 5 Conclusion and Future Work -- References -- Energy-Efficient Data Routing Protocols for Sink Mobility in Wireless Sensor Networks -- 1 Introduction -- 1.1 Motivation -- 2 Related Work.
3 Research Gaps.
Record Nr. UNISA-996550551503316
Tomar Ranjeet Singh  
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui