2nd International Conference on Wireless Intelligent and Distributed Environment for Communication : WIDECOM 2019 / / edited by Isaac Woungang, Sanjay Kumar Dhurandher |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (272 pages) |
Disciplina | 621.384 |
Collana | Lecture Notes on Data Engineering and Communications Technologies |
Soggetto topico |
Electrical engineering
Microwaves Optical engineering Computer communication systems Computers Communications Engineering, Networks Microwaves, RF and Optical Engineering Computer Communication Networks Information Systems and Communication Service |
ISBN | 3-030-11437-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1. Performance Evaluation of G.711 and GSM Codecs on VoIP Applications using OSPF and RIP Routing Protocols -- Chapter 2. Cyclic Redundancy Check based Data Authentication in Opportunistic Networks -- Chapter 3. Hybrid Cryptographic Based Approach for Privacy Preservation in Location Based Services -- Chapter 4. Design of Energy-Aware PRoPHET and Spray-and-Wait Routing Protocols for Opportunistic Networks -- Chapter 5.An Asymmetric RSA based Security Approach for Opportunistic IoT -- Chapter 6. Performance Analysis of A* Based Hop Selection Technique in Opportunistic Networks through Movement Mobility Models -- Chapter 7. Data Loss Prevention Using Document Semantic Signature -- Chapter 8. Data Loss Prevention Using Document Semantic Signature -- Chapter 9. PSARV: Particle Swarm Angular Routing in Vehicular Ad hoc Networks -- Chapter 10. A Reliable Firefly-based Routing Protocol for Efficient Communication in Vehicular Ad Hoc Networks -- Chapter 11. Exploring the Application of Random Sampling in Spectrum Sensing -- Chapter 12. White-box Cryptography: A Time-security Trade-off for the SPNbox Family -- Chapter 13. CESIS: Cost Effective and Self-regulating Irrigation System -- Chapter 14. Maximum Eigenvalue based detection using Jittered Random Sampling -- Chapter 15. Prevention of Flooding Attacks in Mobile Ad hoc Networks -- Chapter 16. Prevention of Flooding Attacks in Mobile Ad hoc Networks -- Chapter 17. Real Time Spectrum Occupancy Prediction -- Chapter 18. SCC-LBS: Secure Criss-Cross Location Based Service in Logistics. |
Record Nr. | UNINA-9910337633203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
3rd International Conference on Wireless, Intelligent and Distributed Environment for Communication : WIDECOM 2020 / / edited by Isaac Woungang, Sanjay Kumar Dhurandher |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (199 pages) |
Disciplina | 621.384 |
Collana | Lecture Notes on Data Engineering and Communications Technologies |
Soggetto topico |
Electrical engineering
Microwaves Optical engineering Computer networks Computers Communications Engineering, Networks Microwaves, RF and Optical Engineering Computer Communication Networks Information Systems and Communication Service |
ISBN | 3-030-44372-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Part I: Infrastructure -- Infrastructures of network computing -- Infrastructures of mobile/ubiquitous systems -- Infrastructures of cloud systems -- Infrastructures of IoT systems -- Part II: Architecture -- Architectures of network computing -- Architectures of mobile/ubiquitous systems -- Architectures of cloud systems -- Architectures of IoT systems -- Part III: Algorithms -- Algorithms of network computing -- Algorithms of mobile/ubiquitous systems -- Algorithms of cloud systems -- Algorithms of IoT systems -- Part IV: Protocols -- Protocols of network computing -- Protocols of mobile/ubiquitous systems -- Protocols of cloud systems -- Protocols of IoT systems -- Conclusion. |
Record Nr. | UNINA-9910407726403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
4th International Conference on Wireless, Intelligent and Distributed Environment for Communication : WIDECOM 2021 / / Isaac Woungang, Sanjay Kumar Dhurandher, editors |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2022] |
Descrizione fisica | 1 online resource (149 pages) |
Disciplina | 004.6 |
Collana | Lecture notes on data engineering and communications technologies |
Soggetto topico |
Computer networks
Wireless communication systems |
ISBN | 3-030-89776-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Fourth International Conference on Wireless, Intelligent and Distributed Environment for Communication |
Record Nr. | UNINA-9910522566703321 |
Cham, Switzerland : , : Springer, , [2022] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The 6th International Conference on Wireless, Intelligent and Distributed Environment for Communication : WIDECOM 2023 / / edited by Isaac Woungang, Sanjay Kumar Dhurandher |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (XIV, 224 p. 1 illus.) |
Disciplina | 004.6 |
Collana | Lecture Notes on Data Engineering and Communications Technologies |
Soggetto topico |
Telecommunication
Computer networks Communications Engineering, Networks Microwaves, RF Engineering and Optical Communications Computer Communication Networks |
ISBN | 3-031-47126-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Part I: Infrastructure -- Infrastructures of network computing -- Infrastructures of mobile/ubiquitous systems -- Infrastructures of cloud systems -- Infrastructures of IoT systems -- Part II: Architecture -- Architectures of network computing -- Architectures of mobile/ubiquitous systems -- Architectures of cloud systems -- Architectures of IoT systems -- Part III: Algorithms -- Algorithms of network computing -- Algorithms of mobile/ubiquitous systems -- Algorithms of cloud systems -- Algorithms of IoT systems -- Part IV: Protocols -- Protocols of network computing -- Protocols of mobile/ubiquitous systems -- Protocols of cloud systems -- Protocols of IoT systems -- Conclusion. |
Record Nr. | UNINA-9910799496403321 |
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Information Networking and Applications : Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Volume 2 / / edited by Leonard Barolli, Isaac Woungang, Tomoya Enokido |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (xxx, 797 pages) : illustrations (some color) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Engineering - Data processing
Computational intelligence Artificial intelligence Data Engineering Computational Intelligence Artificial Intelligence Xarxes d'ordinadors Computació distribuïda Xarxes d'informació Intel·ligència artificial |
Soggetto genere / forma |
Llibres electrònics
Congressos |
ISBN | 3-030-75075-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910483963403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Information Networking and Applications : Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Volume 1 / / edited by Leonard Barolli, Isaac Woungang, Tomoya Enokido |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (xxxi, 773 pages) : illustrations (some color) |
Disciplina | 001.64404 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Engineering - Data processing
Computational intelligence Artificial intelligence Data Engineering Computational Intelligence Artificial Intelligence Xarxes d'ordinadors Computació distribuïda Sistemes d'informació Intel·ligència artificial |
Soggetto genere / forma |
Llibres electrònics
Congressos |
ISBN | 3-030-75100-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910484710603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Information Networking and Applications : Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Volume 3 / / edited by Leonard Barolli, Isaac Woungang, Tomoya Enokido |
Edizione | [1st ed. 2021.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
Descrizione fisica | 1 online resource (753 pages) |
Disciplina | 004.6 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Engineering - Data processing
Computational intelligence Artificial intelligence Data Engineering Computational Intelligence Artificial Intelligence Xarxes d'ordinadors Computació distribuïda Sistemes d'informació Intel·ligència artificial |
Soggetto genere / forma |
Congressos
Llibres electrònics |
ISBN | 3-030-75078-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Welcome Message from AINA-2021 Organizers -- AINA-2021 Organizing Committee -- General Co-chairs -- Program Committee Co-chairs -- Workshops Co-chairs -- International Journals Special Issues Co-chairs -- Award Co-chairs -- Publicity Co-chairs -- International Liaison Co-chairs -- Local Arrangement Co-chairs -- Finance Chair -- Web Co-chairs -- Steering Committee Chairs -- Tracks and Program Committee Members -- 1. Network Protocols and Applications -- Sec300 -- Sec301 -- 2. Next Generation Wireless Networks -- Sec303 -- Sec304 -- 3. Multimedia Systems and Applications -- Sec305 -- Sec306 -- 4. Pervasive and Ubiquitous Computing -- Sec105 -- Sec106 -- 5. Web-Based and E-Learning Systems -- Sec331 -- Sec312 -- 6. Distributed and Parallel Computing -- Sec256 -- Sec251 -- 7. Data Mining, Big Data Analytics and Social Networks -- Sec261 -- Sec389 -- 8. Internet of Things and Cyber-Physical Systems -- Sec265 -- Sec266 -- 9. Intelligent Computing and Machine Learning -- Sec291 -- Sec298 -- 10. Cloud and Services Computing -- Sec351 -- Sec352 -- 11. Security, Privacy and Trust Computing -- Sec365 -- Sec366 -- 12. Software-Defined Networking and Network Virtualization -- Sec382 -- Sec399 -- AINA-2021 Reviewers -- AINA-2021 Keynote Talks -- The Role of Artificial Intelligence in the Industry 4.0 -- Localization in 6G -- Contents -- An Improved DOA Estimation Algorithm of Neural Network Based on Interval Division -- 1 Introduction -- 2 Signal Model of DOA Estimation -- 3 Improved DOA Estimation Algorithm of Neural Networks Based on Interval Division -- 3.1 DOA Estimation Algorithm of Neural Networks Based on Interval Division -- 3.2 Improved Interval Division Method -- 3.3 Performance Analysis -- 4 Conclusion -- References -- The Application in Handwritten Digit Recognition of Deep Belief Network Based on Improved Genetic Algorithm.
1 Introduction -- 2 The DBN Optimized by Adaptive Genetic Algorithm (IAGA-DBN) -- 2.1 DBN -- 2.2 IAGA -- 2.3 The Algorithm Fow of IAGA-DBN -- 3 Realization of Handwritten Digit Recognition Based on IAGA-DBN -- 3.1 Experimental Data -- 3.2 Test Comparison and Analysis of Each Model -- 4 Conclusion -- References -- A Fuzzy-Based Scheme for Admission Control in 5G Wireless Networks: Improvement of Slice QoS Considering Slice Reliability as a New Parameter -- 1 Introduction -- 2 Software-Defined Networks (SDNs) -- 3 Outline of Fuzzy Logic -- 3.1 Linguistic Variables -- 3.2 Fuzzy Control Rules -- 3.3 Defuzzificaion Method -- 4 Proposed Fuzzy-Based System -- 5 Simulation Results -- 6 Conclusions and Future Work -- References -- Evaluation of a User Finger Movement Capturing Device for Control of Self-standing Omnidirectional Robot -- 1 Introduction -- 2 Related Work -- 3 Proposed Self-standing Omnidirectional Robot -- 3.1 Kinematics -- 3.2 Control System of the Proposed Self-standing Omnidirectional Robot -- 4 Implementation of User Finger Capturing Device -- 5 Experimental Results -- 6 Conclusions and Future Work -- References -- Adaptive Architecture for Fault Diagnosis of Rotating Machinery -- 1 Introduction -- 2 Related Work -- 3 Motivating Example -- 4 Fault Diagnosis of Rotating Machinery -- 4.1 RTRL Training -- 4.2 Online Monitoring -- 5 Experimental Results -- 5.1 Visualization of Variability Markers -- 6 Conclusions -- References -- Unsupervised Classification of Medical Documents Through Hybrid MWEs Discovery -- 1 Introduction -- 2 State of Art -- 3 Classification Methodology -- 3.1 Hybrid MWEs Discovery -- 3.2 Document Classification -- 4 Experiment -- 5 Conclusion and Future Work -- References -- Building a Pos Tagger and Lemmatizer for the Italian Language -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach. 4 Experiment and Evaluation -- 5 Conclusions and Future Work -- References -- Extracting Information from Food-Related Textual Sources -- 1 Introduction -- 2 Motivation -- 3 WEB Scraping -- 3.1 Extracting Meta-data -- 4 Extracting Images -- 5 Ontology Building -- 6 Conclusions -- References -- PaSy - Management of a Smart-Parking System Based on Priority Queues -- 1 Introduction -- 2 Related Work -- 3 Integration Model -- 3.1 Profiling -- 3.2 Mathematical Model -- 3.3 Priority Queues -- 3.4 Queues Categories -- 4 Conclusions -- References -- An Ontological Model to Represent Food Consumption Risks -- 1 Introduction -- 2 Case Study -- 3 The Represented Information -- 4 Conclusions -- References -- Intelligent Cloud Agents in Multi-participant Conversations for Cyber-Physical Exploitation of Cultural Heritage -- 1 Introduction -- 2 Related Work -- 3 The Cleopatra Project -- 4 Architecture Design -- 5 Bridging Multi Users Conversation with Dyadic Agents -- 5.1 Parallel Conversations versus Multiple Threads -- 5.2 Own Messages versus Multiple Receivers -- 5.3 Replies versus Posts -- 6 Prototype Development -- 7 Conclusion -- References -- E-government and Italian Local Government: Managerial Approach in Two Macro Areas to Improve Manager's Culture and Services -- 1 Introduction -- 2 Literature Review -- 2.1 Italian Public Administration -- 2.2 Case Study Context -- 2.3 Northern vs Southern IPA -- 3 Methodology -- 4 Empirical Results -- 5 Discussion -- 6 Conclusions -- References -- Container Based Simulation of Electric Vehicles Charge Optimization -- 1 Introduction -- 2 The Greencharge Simulator -- 3 Formulating the Energy Management Problem -- 4 Optimization Algorithm -- 4.1 GA Based Load Shifting -- 4.2 Linear EV Charge Optimization -- 5 Experimental Results -- 6 Conclusion -- References -- Cloud Computing Projects: A Bibliometric Overview. 1 Introduction -- 2 Background Information -- 2.1 Bibliometric Investigations -- 2.2 The Projects Under Analysis -- 3 Data Collection and Methodology -- 3.1 Data Sources -- 3.2 Data Preparation -- 4 Results -- 4.1 Impact Overview -- 4.2 Distribution of Papers and Collaboration -- 4.3 Co-occurrences of Keywords Analysis for Research Areas -- 5 Conclusions -- References -- Applying Patterns to Support Deployment in Cloud-Edge Environments: A Case Study -- 1 Introduction -- 2 State of the Art -- 3 The Methodology -- 3.1 Selection of the Computational Pattern -- 3.2 Mapping to an Agnostic Architectural Pattern -- 3.3 Mapping to an Agnostic Deployment Pattern -- 4 Conclusion and Future Work -- References -- Obserbot: A Totally Automated Watcher to Monitor Essential Services -- 1 Introduction -- 2 The Obserbot Framework -- 3 Platform Description -- 4 The Semantic Analysis -- 5 Results -- 6 Conclusions and Further Developments -- References -- Saving Electronic Health Record (EHR) in private and secure mHealth system with blockchain Smart contracts -- 1 Introduction -- 2 Previous Work -- 3 Blockchain -- 3.1 Consortium Blockchain -- 4 System Implementation -- 5 Discussion -- 6 Conclusion and Future Work -- References -- iNote: A Low Cost Banknote Recognition System for Visually Impaired Persons -- 1 Introduction -- 2 Literature Review -- 3 System Overview and Problem Formulation -- 3.1 System Overview -- 3.2 Problem Formulation -- 4 Methodology -- 4.1 Algorithm -- 5 Results -- 5.1 Hardware -- 5.2 Experimental Results -- 6 Conclusions and Future Work -- References -- Design of a Diagnostic Support Method Utilizing Interrogation Information in Traditional Chinese Medicine -- 1 Introduction -- 2 Related Research and Issues -- 2.1 Traditional Chinese Medicine (TCM) -- 2.2 Related Research -- 2.3 Technical Issues and Proposals -- 3 Diagnostic Support Method. 3.1 Outline of the Diagnostic Support Method -- 3.2 Pattern Candidate Extraction Method -- 3.3 Interpattern Relational Model Creation Method -- 4 Conclusion -- References -- Software-Defined Networking: Open-Source Alternatives for Small to Medium Sized Enterprises -- 1 Introduction -- 2 Literature Review -- 2.1 SDN Architecture in Smaller Networks -- 3 Methodology -- 3.1 Cisco DNA Centre -- 3.2 Key Technologies in Cisco DNA Centre -- 3.3 Open Source SDN Controller for SME-Based Network -- 3.4 OpenDaylight SDN Controller -- 4 Deploying LISP, VxLAN Within OpenDaylight SDN Controller -- 4.1 Location Identifier Separation Protocol (LISP) Within OpenDaylight -- 4.2 Virtual Extensible Local Area Networks and OpenDaylight -- 5 Conclusion -- References -- A Survey of Description Methods for Fieldbus Systems -- 1 Introduction -- 2 Description Methods -- 2.1 EDDL -- 2.2 ESI and ENI -- 2.3 EDS -- 2.4 CiA 311 -- 2.5 FIBEX -- 2.6 AutomationML -- 3 Evaluation -- 4 Summary -- References -- A Hybrid Message Delivery Method for Vehicular DTN Considering Impact of Shuttle Buses and Roadside Units -- 1 Introduction -- 2 Overview of DTN Protocols -- 3 Proposed Hybrid Message Delivery Method -- 4 Evaluation of Proposed Method -- 4.1 Evaluation Setting -- 4.2 Simulation Results -- 5 Conclusions -- References -- Optimum Path Finding Framework for Drone Assisted Boat Rescue Missions -- 1 Introduction -- 2 Related Work -- 3 Proposed Framework -- 4 Conclusions and Future Works -- References -- Algorithmic Aspects of the Maximum 2-edge-colorable Subgraph Problem -- 1 Introduction -- 2 Problem Statement -- 3 Related Work -- 4 Graphs with Bounded Carving-Width -- 5 Graphs with Bounded Pathwidth -- 6 Conclusion and Future Work -- References -- Effective Use of Low Power Heterogeneous Wireless Multimedia Sensor Networks for Surveillance Applications Using IEEE 802.15.4 Protocol. 1 Introduction. |
Record Nr. | UNINA-9910484687603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Network Technologies and Intelligent Computing : Third International Conference, ANTIC 2023, Varanasi, India, December 20-22, 2023, Proceedings, Part IV / / edited by Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Sanjay Kumar Dhurandher, Isaac Woungang |
Autore | Verma Anshul |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (400 pages) |
Disciplina |
621.39
004.6 |
Altri autori (Persone) |
VermaPradeepika
PattanaikKiran Kumar DhurandherSanjay Kumar WoungangIsaac |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Software engineering Cryptography Data encryption (Computer science) Coding theory Information theory Computer Engineering and Networks Software Engineering Cryptology Computer Communication Networks Coding and Information Theory |
ISBN | 3-031-64067-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | -- Intelligent Computing. -- Neural Network Approach for Early detection of Sugarcane Diseases. -- Enhanced Residual Network Framework for Robust Classification of Noisy Lung Cancer CT Images. -- Single-Cell Drug Perturbation Prediction Using Machine Learning. -- Underwater Image Enhancement using Convolutional Neural Network and the MultiUnet Model. -- A hybrid time series model for the spatio-temporal analysis of air pollution prediction based on PM2.5. -- Detection of Lung Diseases Using Deep Transfer Learning-Based Convolution Neural Networks. -- DG-GAN: A Deep Neural Network for Real-World Anomaly Detection in Surveillance Videos. -- Auto-LVEF: A novel method to determine Ejection Fraction from 2D echocardiograms. -- Phishing Detection in Browser-In-The-Middle: A Novel Empirical Approach Incorporating Machine Learning Algorithms. -- Feature Engineering for Predicting Consumer Purchase Behavior: A Comprehensive Analysis. -- Enhanced Simulation of Collision Events Using Quantum GANs for Jet Images Generation. -- Class imbalance learning using Fuzzy SVM with Fuzzy Weighted Gaussian Kernel. -- Material Handling Cost (MHC) Minimization through Facility Layout Design (FLD) Using Genetic Algorithm (GA) combined with the Particle Swarm Optimization (PSO) Method. -- Detecting ADHD among children using EEG signals. -- Enhancing Skin Cancer Classification with Ensemble Models. -- Efficient real-time Sign Detection for Autonomous Vehical in Hazy environment using Deep Learning Models. -- Kannada Continuous Speech Recognition using Deep Learning. -- A new type of classification algorithm inspired by the chromatographic separation mechanism. -- Comparative Analysis of ELM and Sparse Bayesian ELM for Healthcare Diagnosis. -- Integration of Generative AI and Deep Tabular Data Learning Architecture for Heart Attack Prediction. -- Navigating the Domain Shift: Object Detection in Indian Road Datasets with Limited Data. -- An Efficient Hybrid Algorithm with Novel Inver-over Operator and Ant Colony Optimization for Traveling Salesman Problem. -- Sparsity Analysis of New Biased Pearson Similarity Measure for Memory Based Collaborative Filtering. -- Advancing Medical Predictive Models with Integrated Approaches. |
Record Nr. | UNINA-9910879596203321 |
Verma Anshul | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Network Technologies and Intelligent Computing : Third International Conference, ANTIC 2023, Varanasi, India, December 20-22, 2023, Proceedings, Part III / / edited by Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Sanjay Kumar Dhurandher, Isaac Woungang |
Autore | Verma Anshul |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (417 pages) |
Disciplina |
621.39
004.6 |
Altri autori (Persone) |
VermaPradeepika
PattanaikKiran Kumar DhurandherSanjay Kumar WoungangIsaac |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Software engineering Cryptography Data encryption (Computer science) Coding theory Information theory Computer Engineering and Networks Software Engineering Cryptology Computer Communication Networks Coding and Information Theory |
ISBN | 3-031-64070-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | -- Intelligent Computing. -- Implementation and Performance Evaluation of Deep Learning Models for Disease Classification and Severity Estimation of Coffee Leaves. -- Flow-Optimized Channel-Attentive Excitation DenseNet Algorithm for Multi-Disease Classification and Severity Estimation. -- Image Captioning using Deep Learning. -- Visualizing Optimal Classifiers in EEG-Based Sleepy Driver Prediction. -- Revolutionizing Glaucoma Diagnosis with a Hybrid AI Algorithm. -- Unravelling Crop Yield Secrets Through Identification of Significant Factors Using Machine Learning. -- Comparative Analysis of Short-Term Load Forecasting Using K-Nearest Neighbor, Random Forest, and Gradient Boost Models. -- Heuristics for Influence Maximization with Tiered Influence and Activation thresholds. -- Sentiment Analysis and Offensive Language Identification In Code-Mixed Tamil-English Languages Using Transformer-based Models. -- Performance evaluation of Deep Transfer Learning and Semantic Segmentation models for crop and weed detection in the Sesame Production System. -- Machine Learning Analysis on Hate Speech against Asians. -- Deep Transfer Learning for Enhanced Blackgram Disease Detection: A Transfer Learning - Driven Approach. -- Sustainable Natural Gas Price Forecasting with DEEPAR. -- Whale Optimized Deep Learning Technique for Accurate Skin Cancer Identification. -- Multi-Domain Feature Extraction Methods for Classification of Human Emotions from Electroencephalography (EEG) Signals. -- Enhancing Speech Quality using Spectral Subtraction and Time-Frequency Filtering. -- Analyzing the performance of BERT for the sentiment classification task in Bengali text. -- Student’s Performance Prediction using Decision Tree Regressor. -- A Comprehensive Analysis on Features and Performance Evaluation Metrics in Audio-Visual Voice Conversion. -- Time Series Analytic Models for Forecasting Vehicular Registration Volume in the Indian Context. -- Impact of Clinical Features on Disease Diagnosis using Knowledge Graph Embedding and Machine Learning: a Detailed Analysis. -- Advancements in Alzheimer's Disease Diagnosis: The MRI-CNN Synergy for Early Detection. -- Drinking Addiction Predictive Model Using Body Characteristics Machine Learning Approach. -- An Ensemble of Machine Learning Models Utilizing Deep Convolutional Features for Medical Image Classification. |
Record Nr. | UNINA-9910879592203321 |
Verma Anshul | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advanced Network Technologies and Intelligent Computing : Third International Conference, ANTIC 2023, Varanasi, India, December 20-22, 2023, Proceedings, Part II / / edited by Anshul Verma, Pradeepika Verma, Kiran Kumar Pattanaik, Sanjay Kumar Dhurandher, Isaac Woungang |
Autore | Verma Anshul |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (389 pages) |
Disciplina |
621.39
004.6 |
Altri autori (Persone) |
VermaPradeepika
PattanaikKiran Kumar DhurandherSanjay Kumar WoungangIsaac |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer engineering
Computer networks Cryptography Data encryption (Computer science) Software engineering Coding theory Information theory Computer Engineering and Networks Cryptology Software Engineering Computer Communication Networks Coding and Information Theory |
ISBN | 3-031-64064-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | -- Advanced Network Technologies. -- An Insider Threat Resilient Framework Based on Honey Traps in a Function-Based Access Control Environment. -- Performance comparison of QoS aware power allocation and optimization techniques for the small-cell 5G networks. -- Reduced Competitive ratio of Sparse Semi-oblivious routing using social spider algorithm. -- Underwater Wireless Sensor Network Based on Mulithop Transmission using Ant Colony Optimization Algorithm. -- Detection of Malicious Network Traffic Attacks using Support Vector Machine. -- IoT Based Safety Monitoring and Communication System for Underground Coal Mines. -- Enhancing Network Security: A Hybrid Approach for Detection and Mitigation of Distributed Denial-of-Service Attacks Using Machine Learning. -- A Comparative Study of Low Power Wide Area Network Technologies for Smart Agriculture. -- OpenGNN: Augmenting Graph Neural Networks for Open-Set Node Prediction in Complex Networks. -- Optimizing Amazon SageMaker Workloads with Predictive Compute Type Selection Strategies. -- Threshold Based VM Placement Using MAD and IQR. -- On Designing an Intelligent Shipping Algorithm for Decentralized E-Commerce Systems. -- PwnShield: An Automated Approach To Detect And Exploit Buffer Overflows And Bypassing Modern Mitigation Techniques. -- Analysis of the Impacts of Flooding-based DDoS Attacks on SDN-enabled Cloud. -- Tree Topologies and Node Covers for Efficient Communication in Wireless Sensor Networks. -- Binary Computation Offloading in Edge Computing using Deep Reinforcement Learning. -- Data Agent-Based Volumetric Progress Monitoring over Mobile Ad-hoc Network in Disaster Management. -- Intelligent Computing. -- Deep Neural Networks for efficient Image Caption Generator. -- Computing Social Presence in Online Discussions Using Natural Language Processing Algorithms: A Conceptual Proposal in Python. -- Applications of Data Science and Machine Learning for Combating COVID-19. -- Hate Speech Detection in Audio using SHAP - An Explainable AI. -- Distributed Random Forest for Predicting Forest Wildfires Based on Weather Data. -- Audio-text Retrieval: Exploring Shared Parameters and Intra-Modal Constraint Loss. -- Grey Wolf Optimization based Hyper-Parameter Optimized Deep EfficientNet for Chest X-Ray based Detection of COVID-19. -- An Assorted Ensemble Method for Prediction of Terminal Care Preference by Caregivers of Alzheimer’s Victims. |
Record Nr. | UNINA-9910879595803321 |
Verma Anshul | ||
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|