The 11th International Conference on EUropean Transnational Educational (ICEUTE 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
| The 11th International Conference on EUropean Transnational Educational (ICEUTE 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (450 pages) |
| Disciplina |
371.33
378.016 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Education Computational Intelligence Data Engineering |
| ISBN | 3-030-57799-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910733724103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 12th Conference on Information Technology and Its Applications : Proceedings of the International Conference CITA 2023 / / edited by Ngoc Thanh Nguyen, Hoa Le-Minh, Cong-Phap Huynh, Quang-Vu Nguyen
| The 12th Conference on Information Technology and Its Applications : Proceedings of the International Conference CITA 2023 / / edited by Ngoc Thanh Nguyen, Hoa Le-Minh, Cong-Phap Huynh, Quang-Vu Nguyen |
| Autore | Nguyen Ngoc Thanh |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (414 pages) |
| Disciplina | 004 |
| Altri autori (Persone) |
Le-MinhHoa
HuynhCong Phap NguyenQuang-Vu |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Engineering—Data processing
Computational intelligence Artificial intelligence Data Engineering Computational Intelligence Artificial Intelligence |
| ISBN |
9783031368868
303136886X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Conference Organization -- Contents -- Data Science and Artificial Intelligence -- A New ConvMixer-Based Approach for Diagnosis of Fault Bearing Using Signal Spectrum -- 1 Introduction -- 2 Related Work -- 2.1 Conv-Mixer Neural Networks -- 2.2 Siamese Neural Networks -- 3 Methodology -- 3.1 General Architecture for Failure Diagnosis -- 3.2 The Proposed Siamese-Based Conv-Mixer Model -- 3.3 Diagnosis Network -- 4 Experiment -- 4.1 Datasets -- 4.2 Training -- 4.3 Results -- 4.4 Comparison -- 5 Conclusion -- References -- Differentially-Private Distributed Machine Learning with Partial Worker Attendance: A Flexible and Efficient Approach -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Paper Organization -- 2 Preliminaries -- 3 Our Proposed Algorithm -- 4 Experiments -- 5 Conclusion -- References -- Building Legal Knowledge Map Repository with NLP Toolkits -- 1 Introduction -- 2 Legal Knowledge Maps -- 2.1 Modeling -- 2.2 Hierarchy of Legislation -- 2.3 Legal Ontology Design -- 2.4 Legal Knowledge Map Construction -- 3 Implementation -- 3.1 Materials -- 3.2 Vietnamese NLP Toolkits -- 3.3 Building VLegalKMaps as Linked Data -- 4 Validations -- 4.1 Experiment Setup -- 4.2 Case Study -- 4.3 Statistics and Discussions -- 5 Conclusions and Future Works -- References -- Classification of Ransomware Families Based on Hashing Techniques -- 1 Introduction -- 2 Overview of Hashing Techniques in Malware Analysis -- 3 The Proposed Method -- 3.1 The Combined Analysis Method of Imphash, File Level Ssdeep Hashing, and Section Level Ssdeep Hashing -- 3.2 Preparing the Database -- 3.3 Predictive Model -- 3.4 Evaluation Criteria -- 4 Evaluations and Results -- 4.1 Experiment with Test Set Containing only Ransomware -- 4.2 Experiment with Test Set Containing both Malicious and Benign Samples.
4.3 Advantages and Limitations of the Proposed Method -- 5 Conclusions -- References -- Towards a New Multi-tasking Learning Approach for Human Fall Detection -- 1 Introduction -- 2 Related Work -- 2.1 Simulated Falls -- 2.2 Real Falls -- 2.3 Multi-task Learning -- 2.4 Summary -- 3 Multi-task Deep Neural Network for Fall Detection -- 3.1 Multiple Classifiers -- 3.2 Temporal Convolutional Network as a Feature Extractor -- 3.3 Re-sampling for Class and Task Balance -- 3.4 Data Augmentation -- 4 Experiments -- 4.1 Datasets -- 4.2 Experiment Settings -- 4.3 Evaluation and Discussion -- 5 Conclusion and Future Work -- References -- A Comparative Study of Wrapper Feature Selection Techniques in Software Fault Prediction -- 1 Introduction -- 2 Related Work -- 3 Feature Selection -- 3.1 Software Metrics -- 3.2 Genetic Algorithm -- 3.3 Particle Swarm Optimization -- 3.4 Whale Optimization Algorithm -- 3.5 Cuckoo Search -- 3.6 Mayfly Algorithm -- 3.7 Binary Bat Algorithm -- 3.8 Feature Selection Details -- 4 Methodology -- 4.1 Proposed Approach -- 4.2 VanillaGAN for Handling Imbalanced Data -- 4.3 Dataset -- 4.4 Evaluation Measurement -- 5 Experimental Result -- 6 Conclusion -- References -- Incorporating Natural Language-Based and Sequence-Based Features to Predict Protein Sumoylation Sites -- 1 Introduction -- 2 Methodology -- 2.1 Data Preparation and Pre-processing -- 2.2 Feature Extraction and Encoding -- 2.3 Model Construction, Learning and Evaluation -- 3 Results and Discussion -- 3.1 Impact of Amino Acid Composition and Single Features -- 3.2 Impact of Hybrid Features -- 3.3 RSXSUMO Model Construction -- 3.4 Comparison with Other Predictors -- 4 Conclusion -- References -- A Model for Alliance Partner Selection Based on GM (1, 1) and DEA Frameworks - Case of Vietnamese Coffee Industry -- 1 Introduction -- 2 Related Works -- 2.1 Strategic Alliance. 2.2 Grey Forecasting Model -- 2.3 Data Envelopment Analysis -- 3 Proposal Research -- 4 Case Study -- 4.1 DMU Collection -- 4.2 Inputs and Outputs Selection -- 4.3 Forecast the Performance of All DMU by GM (1, 1) Model. -- 4.4 Analysis Performance Before Alliance -- 4.5 Analysis the Performance After Alliance -- 5 Conclusions -- References -- Car Detector Based on YOLOv5 for Parking Management -- 1 Introduction -- 2 Related Works -- 2.1 Traditional Machine Learning-Based Methods -- 2.2 CNN-Based Methods -- 3 Methodology -- 3.1 Proposed Network Architecture -- 3.2 Loss Function -- 4 Experiments -- 4.1 Datasets -- 4.2 Experimental Setup -- 4.3 Experimental Results -- 4.4 Ablation Study -- 5 Conclusion -- References -- Deep Learning-Based Approach for Automatic Detection of Malaria in Peripheral Blood Smear Images -- 1 Introduction -- 2 Related Works -- 3 Experiments -- 3.1 Data Collection -- 3.2 Exploratory Data Analysis -- 3.3 Two-Stage Approach -- 4 Results and Discussions -- 4.1 Evaluation Metrics -- 4.2 Results -- 5 Conclusion -- References -- An Improved Transfer Learning-Based Approach for Detecting Abnormal Cervical Cells from Pap Smear Microscopic Images -- 1 Introduction -- 2 Abnormal Cervical Cells and Preprocessing Data -- 2.1 Abnormal Cervical Cells -- 2.2 Exploratory Data Analysis and Preprocessing -- 3 Transfer Learning and Proposed Approach -- 3.1 ResNet50v2 -- 3.2 EfficientNetv2L -- 3.3 Proposed Approach Based on Transfer Learning -- 4 Experimental Results -- 5 Conclusion -- References -- Digital Economy -- Emotional Intelligence and Social Media Site Experiences' Effects on College Choice Behavior: The Mediating Role of Brand Attitude -- 1 Introduction -- 2 Theoretical Background and Hypotheses -- 2.1 Website Experiences and Emotional intelligence -- 2.2 The Attitude Toward Website Model - AWS Model. 2.3 The Research Model and Hypotheses -- 3 Research Method -- 4 Research Result -- 4.1 Descriptive Data Statistics -- 4.2 Reliability Test Results -- 4.3 Exploratory Factor Analysis (EFA) Results -- 4.4 Research Model Testing -- 5 Discussion -- 6 Conclusion -- References -- Image and Natural Language Processing -- A Multi Context Decoder-based Network with Applications for Polyp Segmentation in Colonoscopy Images -- 1 Introduction -- 2 Related Work -- 2.1 Vision Transformer -- 2.2 Fusion On Multi Resolution Feature Map -- 3 Methodology -- 3.1 Overview -- 3.2 Generate Context Feature Map (GCF) -- 3.3 Decoder Block -- 4 Experiments -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Implementation Details -- 4.4 Representative Results -- 4.5 Comparative Results -- 5 Conclusion -- References -- AMG-Mixer: A Multi-Axis Attention MLP-Mixer Architecture for Biomedical Image Segmentation -- 1 Introduction -- 2 Related Work -- 3 Proposed Network Architecture -- 3.1 AxialMBConv Token Mix and Mixer Building Block -- 3.2 Multi-scale Multi-axis MLP Gated (MS-MAMG) -- 3.3 Decoder Unit -- 4 Experiments -- 4.1 Datasets -- 4.2 Training Strategy -- 4.3 Evaluation Metrics -- 4.4 Representative Results -- 4.5 Comparative Results -- 5 Conclusion -- References -- Investigating YOLO Models for Rice Seed Classification -- 1 Introduction -- 2 Methodology -- 2.1 YOLOv5 -- 2.2 YOLOv6 -- 2.3 YOLOv7 -- 3 Experiments and Results -- 3.1 Data Description -- 3.2 Performance Indicator -- 3.3 Result and Discussion -- 4 Conclusion -- References -- Extending OCR Model for Font and Style Classification -- 1 Introduction -- 2 Related Works -- 3 Methods -- 3.1 Problem Formulation -- 3.2 Overview -- 3.3 Encoder -- 3.4 Decoder -- 3.5 Image-wise Font Clsasification -- 3.6 Style Classification -- 3.7 Loss Function -- 4 Experiments -- 4.1 Experiment Setting -- 4.2 Benchmarks. 4.3 Experiment Result and Discussion -- 5 Conclusion -- References -- STG-SimVP: Spatiotemporal GAN-Based SimVP for Video Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Video Frame Synthesis -- 2.2 Generative Adversarial Networks - GAN -- 2.3 SimVP -- 3 Proposed Methods -- 3.1 STG-SimVP -- 3.2 Dual Discriminators -- 3.3 Objective Function -- 4 Experiments -- 4.1 Datasets -- 4.2 Training Details -- 4.3 Comparisons With State-of-the-Art Methods -- 5 Ablation Study -- 6 Limitations -- 7 Conclusion -- References -- Tritention U-Net: A Modified U-Net Architecture for Lung Tumor Segmentation -- 1 Introduction -- 2 Tritention U-Net Architechture (TU-Net) -- 2.1 Architechture Overview -- 2.2 Backbone U-Net Architecture -- 2.3 Tritention Gate -- 3 Experimental and Results -- 3.1 Dataset -- 3.2 Experimental Setup -- 3.3 Results -- 4 Conclusion -- References -- Multi-modal with Multiple Image Filters for Facial Emotion Recognition -- 1 Introduction -- 2 Multiple Filter Levels for FER -- 2.1 Multiple Model -- 2.2 Dropping Pixels - Processor -- 2.3 Blurring Image - Processor -- 3 Experimental and Results -- 3.1 Dataset -- 3.2 Experimental Setup -- 3.3 Results -- 4 Conclusion -- References -- Few-Shots Novel Space-Time View Synthesis from Consecutive Photos -- 1 Introduction -- 2 Related Work -- 3 Proposed Methods -- 3.1 Background: Neural Scene Flow Fields (NSFF) -- 3.2 NSFF with Encoder -- 4 Experiments -- 4.1 Implement Details -- 4.2 Evaluations -- 5 Limitations -- 6 Conclusion -- References -- Information Technology Skills Extractor for Job Descriptions in vku-ITSkills Dataset Using Natural Language Processing -- 1 Introduction -- 2 Preliminary -- 3 Construct IT Skills Dictionary and vku-ITSkills Dataset -- 4 The Proposed NLP Pipeline for IT Skills Extractor -- 4.1 Tokenizer -- 4.2 Transformers Based Token Embedding. 4.3 Part of Speech (POS) Tagging, Noun Phrases and Combination Rules. |
| Record Nr. | UNINA-9910736019003321 |
Nguyen Ngoc Thanh
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 13th Conference on Information Technology and Its Applications : Proceedings of the International Conference CITA 2024 / / edited by Ngoc Thanh Nguyen, Cong-Phap Huynh, Thanh Thuy Nguyen, Nhien-An Le-Khac, Quang-Vu Nguyen
| The 13th Conference on Information Technology and Its Applications : Proceedings of the International Conference CITA 2024 / / edited by Ngoc Thanh Nguyen, Cong-Phap Huynh, Thanh Thuy Nguyen, Nhien-An Le-Khac, Quang-Vu Nguyen |
| Autore | Nguyen Ngoc Thanh |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (559 pages) |
| Disciplina | 004 |
| Altri autori (Persone) |
HuynhCong-Phap
NguyenThanh Thuy Le-KhacNhien-An NguyenQuang-Vu |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Engineering - Data processing
Computational intelligence Artificial intelligence Data Engineering Computational Intelligence Artificial Intelligence |
| ISBN |
9783031741272
3031741277 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | MiRNA disease associations prediction based on improving feature vectors quality combined with highly reliable negative samples selection -- signBEER Decentralized Optimization with Improved Communication by Signs -- Frequency spatial Feature Fusion Network for Infrared and Visible Image Fusion -- Combining Lora With AR In IoT Enabled Smart Farm Monitoring -- AI Fitness Trainer using 3D Human Pose Estimation and Dynamic Time Warping -- A Non Test Driver Concolic Based Unit Testing Method for Java Projects -- Deep Learning Based Convolutional Neural Network for Crash Severity Prediction -- Enhanced Attention based Multimodal Deep Learning for Product Categorization on E commerce Platform -- Pre trained Self Attention Framework An Efficient Mechanism for Source Separation -- Meta heuristic for a flight service scheduling problem in Viet Nam -- Implementation of a VCO based ADC on TSMC CMOS 65nm for Audio Applications -- Federated Learning of Random Oblique Stumps Tailored on the Raspberry Pi Zero for the ImageNet Challenge -- COMBINATION OF GALE SHAPLEY AND PESA II ALGORITHM IN STUDENT UNIVERSITY MATCH -- Optimising Deep Learning for Wearable Sensor based Fall Detection -- A New Approach for Concept Drift Detection in Visual Data -- cMDTPS Comprehensive Masked Modality Modeling with improved similarity distribution matching loss for Text based Person Search -- Implementing Efficient Memory Based Collaborative Filtering Recommendation Systems Methods for Improving Scalability in Training Phase -- A Case Study Evaluating Improved Performance in Image Classification Through Combination of CBAM and ShuffleNetV2 Model -- BERT based model for Vietnamese Fact Verification Dataset -- Statistical vs Neural Machine Translations for Khmer Braille -- Exploring Scalability in Large Scale Time Series in DeepVATS framework -- GEO An Approach for Out of Distribution Detection in Graph Neural Networks using Energy Scoring and One Class Learning -- COLLISION AVOIDANCE PROBLEM FOR ROBOTS IN SMART WAREHOUSES USING A FOCUSED DECENTRALIZED REINFORCEMENT LEARNING MODEL -- Data Augmentation Methods for Cross device Acoustic Scene Classification -- In depth with Spatial Temporal Graph Neural Networks for Traffic Forecasting An overview with Attention -- A group decision model using picture fuzzy rough approximation space -- Sentiment Analysis of Airline Customer Reviews in Vietnamese Language using Deep Learning -- How does Data Augmentation Affect to Model Performance in Long Tailed Classification? -- Improved Tomato Detector Supporting for Automatic Harvesting Systems -- Multi scale Convolutions Meet Group Attention for Dense Prediction Tasks -- Small Object Detection with Attention free Transformer for Aerial Surveillance System -- A Lightweight based Architecture for Nuclei Segmentation in Histopathology Images -- MCST Net A Multi Cross Spatial attention U net with Transformer block for Skin Lesion Segmentation -- Governance in Digital Entrepreneurship Ecosystems A Narrative Review -- Exploring Determinants of E banking Non adoption among Customers A case study in Export Import Commercial Joint Stock Bank, Vietnam -- Factors influencing the organizational commitment of employees in the digital work environment A case of Dak Lak province in Vietnam -- Enhanced the GMr (1,1) Model in Forecasting and Decision – Making -- RadSense Radio Sensing for Crime Monitoring in Restricted Access Areas -- An Effective Unsupervised Cyber Attack Detection on Web Applications using Gaussian Mixture Model -- 5G Core Security An Insider Threat Vulnerability Assessment -- Advancing Security in SDN IoT Networks DL Based Autonomous Anomaly Detection with Enhanced Cross Validation for Poisoning Attack Detection -- Multimodal Deep Learning Feedback for Generating Evasive Malware Samples against Malware Detector -- Advancing Phishing Attack Detection with A Novel Dataset and Deep Learning Solution. |
| Record Nr. | UNINA-9910906200503321 |
Nguyen Ngoc Thanh
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
| 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (xvii, 472 pages) : illustrations |
| Disciplina | 005.8 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Data protection Computational Intelligence Data Engineering Data and Information Security |
| ISBN | 3-030-57805-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910863154003321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
13th International Conference on Information Systems and Advanced Technologies “ICISAT 2023” : New Trends in Artificial Intelligence, Computing and Decision Making. Volume 2 / / edited by Mohamed Ridda Laouar, Valentina Emilia Balas, Vincenzo Piuri, Dana Rad, Zineb Touati Hamad, Abbas Cheddad
| 13th International Conference on Information Systems and Advanced Technologies “ICISAT 2023” : New Trends in Artificial Intelligence, Computing and Decision Making. Volume 2 / / edited by Mohamed Ridda Laouar, Valentina Emilia Balas, Vincenzo Piuri, Dana Rad, Zineb Touati Hamad, Abbas Cheddad |
| Autore | Laouar Mohamed Ridda |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (203 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
BalasValentina Emilia
PiuriVincenzo RadDana Touati HamadZineb CheddadAbbas |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Computational Intelligence Data Engineering |
| ISBN | 3-031-60594-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Contents -- Perspectives of TinyML-Based Self-management in IoT-Based Systems -- 1 Introduction -- 2 Background Information -- 2.1 Self-management -- 2.2 IoT-Based Systems -- 3 Self-management Issues in IoT-Based Systems -- 3.1 Increasing Complexity of IoT Software Systems -- 3.2 Challenges Specific to Self-management of IoT-Based Systems -- 4 Needs and Requirements for an Effective Self-management Solution -- 5 TinyML -- 5.1 Definition -- 5.2 Fundamental Principles of TinyML -- 6 TinyML-Based Self-management for IoT-Based Systems -- 6.1 Motivations -- 6.2 Current Limitations -- 7 Future Prospects and Opportunities -- 7.1 Evolution of TinyML and Related Techniques -- 7.2 Integrating TinyML into Existing IoT Management Architectures -- 7.3 Practical Implications and Potential Applications -- 8 Conclusion -- References -- Blockchain Technology for Absence Tracking -- 1 Introduction and Related Works -- 2 Preliminaries -- 2.1 Principale of Blockchain Technology -- 2.2 Smart Contracts -- 2.3 Transaction -- 2.4 Wallet -- 3 Our Approach -- 3.1 Global Architecture of Our System -- 4 Experimentation -- 5 Discussion -- 6 Conclusion -- References -- Deep Neural Network Binary Classification for Malware Detection: A Parametric Study -- 1 Introduction -- 2 Malware Detection Techniques -- 3 State of the Art -- 4 Datasets -- 5 Used Deep Learning Architecture -- 6 Results and Discussion -- 7 Conclusion and Perspectives -- References -- An Overview of Formal Verification of Network-on-Chip (NoC) Methods -- 1 Introduction -- 2 Network on Chip Architecture -- 3 Network on Chip and Formal Verification -- 4 Related Works -- 5 Conclusion -- References -- Image Classification Using a Deep Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Experimental Results -- 5 Conclusion -- References.
Handwriting Recognition Using HOG and Gabor Features -- 1 Introduction -- 2 Related Works -- 3 Proposed Methods -- 4 Experimental Results -- 5 Conclusions -- References -- Application of Faster-RCNN with Detectron2 for Effective Breast Tumor Detection in Mammography -- 1 Introduction -- 2 Related Works -- 3 Method -- 3.1 Data Preparation and Augmentation -- 3.2 Detection Model -- 4 Experiment and Results -- 4.1 Dataset -- 4.2 Dataset Preprocessing -- 4.3 Evaluation and Performance -- 4.4 Our Model -- 4.5 Results and Discussion -- 5 Conclusion -- References -- Explaining Machine Learning Based Speed Anomaly Detection System Using eXplainable Artificial Intelligence -- 1 Introduction -- 2 Related Literature Review -- 3 The Proposed Method -- 3.1 The System Model -- 3.2 Dataset Description -- 3.3 The Methodology -- 4 Results and Discussion -- 4.1 Comparisons Between Classifiers -- 4.2 Comparison with Recent Works in the Literature -- 4.3 Explanation -- 5 Conclusion and Future Work -- References -- Enhanced CNN Architecture with Comprehensive Performance Metrics for Emotion Recognition -- 1 Introduction -- 2 Literature Survey -- 2.1 CNN Approach for Emotion Recognition via EEG -- 2.2 Real-Time Evaluation Algorithm for Noncontact Heart Rate Variability Monitoring -- 2.3 System of Emotion Recognition and Judgment and Its Application in Adaptive Interactive Game -- 2.4 Dual-Branch Dynamic Graph Convolution Based Adaptive Transformer Feature Fusion Network for EEG Emotion Recognition -- 2.5 Adaptive Gamification in Science Education -- 3 Problem Statement -- 4 Proposed Methodology -- 5 Result -- 6 Conclusion -- References -- Pelican Search Optimization for MANETs Routing -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach AODVPE -- 3.1 Source of Inspiration -- 4 Implementation and Experimental Results -- 4.1 Implementation Details. 4.2 Results and Discussion -- 5 Discussion -- 6 Conclusion -- References -- Detection of Obstructive Sleep Apnea Based on Deep Learning Models from ECG Signals: A Review -- 1 Introduction -- 2 Methodology -- 2.1 Datasets -- 2.2 Preprocessing and Segmentation -- 2.3 Deep Learning Architectures -- 2.4 Performance Metrics -- 3 Deep Learning Techniques for OSA Detection -- 4 Discussion -- 5 Conclusion -- References -- MPPT Controller Based on Adaptive Pid Based on Programmed Gains for Maximum Power Point Tracking in a Photovoltaic Power Plant with a Battery Load -- 1 Introduction -- 2 General Diagram of the PV System -- 3 General Diagram of the PV System -- 3.1 Mathematical Model -- 4 Simulink Library Model -- 4.1 Design of DC/DC Step-Down Converter (Buck) -- 4.2 Adaptive PID Controller with Programmed Gains -- 5 Controller Performance Indexes -- 5.1 PV Module Validation -- 6 Results -- 7 Conclusions -- References -- Optimal Reconfiguration of Electric Power Distribution Networks -- 1 Introduction -- 2 Methodology -- 2.1 Distribution Network Reconfiguration Model -- 2.2 Methodology for Optimal Distribution Network Reconfiguration -- 2.3 Final Model -- 3 Results -- 3.1 Discussion Analysis -- 4 Conclusions -- References -- QFANet: A New Communication Model Base on Tree Architecture for Flying Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 2.1 Centralized Architecture -- 2.2 Satellite Architecture -- 2.3 Cellular Architecture -- 2.4 Single Group Ad Hoc Architecture -- 2.5 Multi-group UAVs Ad Hoc Architecture -- 2.6 Multi Layers UAVs Ad Hoc Architecture -- 3 The Proposed Communication Model QFANet -- 4 Simulation -- 5 Conclusion -- References -- VAAD: A VAE Based Anomaly Detection Approach for Smart Grids -- 1 Introduction -- 2 Literature Review -- 2.1 Traditional Approaches -- 2.2 Machine Learning in Anomaly Detection. 2.3 Variational Autoencoders (VAEs) -- 2.4 Context-Aware Anomaly Detection -- 3 Proposed VAAD Approach -- 3.1 Data Preprocessing -- 3.2 Variational Autoencoder Architecture -- 3.3 Contextual and Temporal Integration -- 3.4 Noise-Tolerant Concept Drift Detection -- 3.5 Anomaly Identification -- 4 Case Study -- 4.1 Dataset Description -- 4.2 Results -- 4.3 Discussion -- 5 Conclusion -- References -- DNA Data Encoding and Compression Using Image Compression Algorithms -- 1 Introduction -- 2 Literature Review -- 2.1 DNA Compression -- 2.2 Applications of DNA Compression -- 2.3 DNA Sequencing -- 3 Image-Based DNA Encoding -- 4 Conclusion -- References -- Generalized Multistage Feature for Deep Age Estimation from a Human Face Image -- 1 Introduction -- 2 State of the Art -- 3 Proposed System -- 3.1 Preprocessing -- 3.2 Face Features Extraction -- 3.3 Dimensionality Reduction -- 3.4 Robust Regression Step -- 4 Experimental Framework -- 4.1 Databases -- 4.2 Evaluation Protocol -- 4.3 Experımental Results -- 5 Conclusion -- References -- Enhancing Intrusion Detection Systems Through Simultaneous Feature Selection and Hyperparameter Tuning -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 3.1 Representation of Individuals/population -- 3.2 Fitness Evaluation -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 Experiments -- 4.3 Evaluation Metrics -- 4.4 Experimental Results -- 5 Conclusion -- References -- A Hybrid Genetic Algorithm for Hierarchical Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 General Description and Objectives of the GF Scheme -- 4 Experimental Analysis -- 4.1 Simulation Step -- 4.2 Results and Discussion -- 5 Conclusion -- References -- Energy-Aware LEACH: A Weighted Metric Approach for Dynamic Cluster Head Selection in WSN -- 1 Introduction. 1.1 LEACH Protocol Overview -- 1.2 Contributions to This Paper -- 1.3 Energy Model -- 1.4 Assumptions -- 2 Related Works -- 3 Proposed Work -- 3.1 Cluster Head Selection Approach -- 4 Implementation and Experimental Results -- 4.1 Performance Metrics -- 5 Conclusion -- References -- Author Index. |
| Record Nr. | UNINA-9910878055903321 |
Laouar Mohamed Ridda
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
13th International Conference on Information Systems and Advanced Technologies “ICISAT 2023” : New Trends in Artificial Intelligence, Computing and Decision Making. Volume 1 / / edited by Mohamed Ridda Laouar, Valentina Emilia Balas, Vincenzo Piuri, Dana Rad, Zineb Touati Hamad, Abbas Cheddad
| 13th International Conference on Information Systems and Advanced Technologies “ICISAT 2023” : New Trends in Artificial Intelligence, Computing and Decision Making. Volume 1 / / edited by Mohamed Ridda Laouar, Valentina Emilia Balas, Vincenzo Piuri, Dana Rad, Zineb Touati Hamad, Abbas Cheddad |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (252 pages) |
| Disciplina | 006.3 |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Computational Intelligence Data Engineering |
| ISBN | 3-031-60591-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910882892303321 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) / / edited by Juan José Gude Prego, José Gaviria de la Puerta, Pablo García Bringas, Héctor Quintián, Emilio Corchado
| 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) / / edited by Juan José Gude Prego, José Gaviria de la Puerta, Pablo García Bringas, Héctor Quintián, Emilio Corchado |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (430 pages) |
| Disciplina | 006.3 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Computational Intelligence Data Engineering |
| ISBN | 3-030-87872-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | BIECO Runtime Auditing Framework -- Basic aspects in redundancy-based intrusion tolerance -- A Survey on the State of the Art of Vulnerability Assessment Techniques -- Comparison of Safety and Security analysis techniques -- Longitudinal study of grades for the Industrial Electronics and Automation Engineering degree programme -- Analysis of students' online interactions in the Covid era from the perspective of anomaly detection -- Evaluation of e-learning criteria to improve the academic and functional results of PhD studies -- Development of competencies applying the project method. Application in environmental engineering -- Bioengineering as a strategy for the consolidation of innovation and technological development processes in the central zone of Colombia -- Challenges and competences in Master Degrees from a Comprehensive Security perspective. |
| Record Nr. | UNINA-9910733725203321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
2020 International Conference on Applications and Techniques in Cyber Intelligence : Applications and Techniques in Cyber Intelligence (ATCI 2020) / / edited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman
| 2020 International Conference on Applications and Techniques in Cyber Intelligence : Applications and Techniques in Cyber Intelligence (ATCI 2020) / / edited by Jemal H. Abawajy, Kim-Kwang Raymond Choo, Zheng Xu, Mohammed Atiquzzaman |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (1,162 pages) : illustrations |
| Disciplina | 005.8 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Engineering - Data processing
Computational intelligence Data Engineering Computational Intelligence |
| ISBN | 3-030-53980-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Combination of Information Technology and College English in the Age of Media -- The Application of Computer Internet of Things in Modern Agricultural Planting Management -- The Influencing Factors Analysis of Network Interactive Teaching Mode Validity -- The Application Analysis of Computer Network Security Data Encryption Technology -- The Application of Computer Technology in Sports Training and Competition -- The Application of BIM Technology in Landscape Garden Engineering Projects -- College Physical Education Based on Multimedia Network Teaching Platform -- Development and Implementation of Health Information Management Platform in Medical Institutions -- Teaching Methods of University Economic Management Course Based on Python -- Innovative Application Paths of Big Data of Automobile Based on Internet of Vehicles. |
| Record Nr. | UNINA-9910483970303321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems : DPTA 2020 / / edited by Chuanchao Huang, Yu-Wei Chan, Neil Yen
| 2020 International Conference on Data Processing Techniques and Applications for Cyber-Physical Systems : DPTA 2020 / / edited by Chuanchao Huang, Yu-Wei Chan, Neil Yen |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (1587 pages) |
| Disciplina | 006.3 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Automatic control Robotics Automation Computational Intelligence Data Engineering Control, Robotics, Automation |
| ISBN | 981-16-1726-0 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Application of Big Data Technology in Enterprise Financial Management -- The Cultivation Research of Management Accounting Talents in Universities under the Background of Artificial Intelligence -- Volatility Modeling of S&P500 Returns: A Comparative Study of GARCH Family Models and VIX -- Research on the Control System of Intelligent Discrimination of Electricity Stealing and Omission -- Analysis of Port Efficiency and Influencing Factors Based on DEA-Tobit -- Application Status and Prospect of Artificial Intelligence Big Data in Stadium Management -- Design of Automatic Intelligent Water Saving System for Faucet -- Optimization of labor value and relationship distribution under the blockchain -- Algorithm design and function realization of home decoration design software based on BIMm -- On the Early Warning of Internet Financial Risk Based on Big Data -- Design of ceramic art design assistant teaching system based on Cloud Computing Technology -- Research on security situation analysis and intelligent disposal technology of edge side area -- Design of horse health management system based on wireless network and simulation system. |
| Record Nr. | UNINA-9910483438103321 |
| Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy [[electronic resource] ] : SPIoT-2020, Volume 1 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma
| The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy [[electronic resource] ] : SPIoT-2020, Volume 1 / / edited by John MacIntyre, Jinghua Zhao, Xiaomeng Ma |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (XXXI, 884 p. 221 illus., 150 illus. in color.) |
| Disciplina | 620.00285 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Engineering—Data processing
Cooperating objects (Computer systems) Computational intelligence Machine learning Big data Data Engineering Cyber-Physical Systems Computational Intelligence Machine Learning Big Data |
| ISBN | 3-030-62743-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910483068103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||