The 11th International Conference on EUropean Transnational Educational (ICEUTE 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
| The 11th International Conference on EUropean Transnational Educational (ICEUTE 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (450 pages) |
| Disciplina |
371.33
378.016 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Education Computational Intelligence Data Engineering |
| ISBN | 3-030-57799-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910733724103321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 12th Conference on Information Technology and Its Applications : Proceedings of the International Conference CITA 2023 / / edited by Ngoc Thanh Nguyen, Hoa Le-Minh, Cong-Phap Huynh, Quang-Vu Nguyen
| The 12th Conference on Information Technology and Its Applications : Proceedings of the International Conference CITA 2023 / / edited by Ngoc Thanh Nguyen, Hoa Le-Minh, Cong-Phap Huynh, Quang-Vu Nguyen |
| Autore | Nguyen Ngoc Thanh |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (414 pages) |
| Disciplina | 004 |
| Altri autori (Persone) |
Le-MinhHoa
HuynhCong Phap NguyenQuang-Vu |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Engineering - Data processing
Computational intelligence Artificial intelligence Data Engineering Computational Intelligence Artificial Intelligence |
| ISBN |
9783031368868
303136886X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Preface -- Conference Organization -- Contents -- Data Science and Artificial Intelligence -- A New ConvMixer-Based Approach for Diagnosis of Fault Bearing Using Signal Spectrum -- 1 Introduction -- 2 Related Work -- 2.1 Conv-Mixer Neural Networks -- 2.2 Siamese Neural Networks -- 3 Methodology -- 3.1 General Architecture for Failure Diagnosis -- 3.2 The Proposed Siamese-Based Conv-Mixer Model -- 3.3 Diagnosis Network -- 4 Experiment -- 4.1 Datasets -- 4.2 Training -- 4.3 Results -- 4.4 Comparison -- 5 Conclusion -- References -- Differentially-Private Distributed Machine Learning with Partial Worker Attendance: A Flexible and Efficient Approach -- 1 Introduction -- 1.1 Background -- 1.2 Our Contributions -- 1.3 Paper Organization -- 2 Preliminaries -- 3 Our Proposed Algorithm -- 4 Experiments -- 5 Conclusion -- References -- Building Legal Knowledge Map Repository with NLP Toolkits -- 1 Introduction -- 2 Legal Knowledge Maps -- 2.1 Modeling -- 2.2 Hierarchy of Legislation -- 2.3 Legal Ontology Design -- 2.4 Legal Knowledge Map Construction -- 3 Implementation -- 3.1 Materials -- 3.2 Vietnamese NLP Toolkits -- 3.3 Building VLegalKMaps as Linked Data -- 4 Validations -- 4.1 Experiment Setup -- 4.2 Case Study -- 4.3 Statistics and Discussions -- 5 Conclusions and Future Works -- References -- Classification of Ransomware Families Based on Hashing Techniques -- 1 Introduction -- 2 Overview of Hashing Techniques in Malware Analysis -- 3 The Proposed Method -- 3.1 The Combined Analysis Method of Imphash, File Level Ssdeep Hashing, and Section Level Ssdeep Hashing -- 3.2 Preparing the Database -- 3.3 Predictive Model -- 3.4 Evaluation Criteria -- 4 Evaluations and Results -- 4.1 Experiment with Test Set Containing only Ransomware -- 4.2 Experiment with Test Set Containing both Malicious and Benign Samples.
4.3 Advantages and Limitations of the Proposed Method -- 5 Conclusions -- References -- Towards a New Multi-tasking Learning Approach for Human Fall Detection -- 1 Introduction -- 2 Related Work -- 2.1 Simulated Falls -- 2.2 Real Falls -- 2.3 Multi-task Learning -- 2.4 Summary -- 3 Multi-task Deep Neural Network for Fall Detection -- 3.1 Multiple Classifiers -- 3.2 Temporal Convolutional Network as a Feature Extractor -- 3.3 Re-sampling for Class and Task Balance -- 3.4 Data Augmentation -- 4 Experiments -- 4.1 Datasets -- 4.2 Experiment Settings -- 4.3 Evaluation and Discussion -- 5 Conclusion and Future Work -- References -- A Comparative Study of Wrapper Feature Selection Techniques in Software Fault Prediction -- 1 Introduction -- 2 Related Work -- 3 Feature Selection -- 3.1 Software Metrics -- 3.2 Genetic Algorithm -- 3.3 Particle Swarm Optimization -- 3.4 Whale Optimization Algorithm -- 3.5 Cuckoo Search -- 3.6 Mayfly Algorithm -- 3.7 Binary Bat Algorithm -- 3.8 Feature Selection Details -- 4 Methodology -- 4.1 Proposed Approach -- 4.2 VanillaGAN for Handling Imbalanced Data -- 4.3 Dataset -- 4.4 Evaluation Measurement -- 5 Experimental Result -- 6 Conclusion -- References -- Incorporating Natural Language-Based and Sequence-Based Features to Predict Protein Sumoylation Sites -- 1 Introduction -- 2 Methodology -- 2.1 Data Preparation and Pre-processing -- 2.2 Feature Extraction and Encoding -- 2.3 Model Construction, Learning and Evaluation -- 3 Results and Discussion -- 3.1 Impact of Amino Acid Composition and Single Features -- 3.2 Impact of Hybrid Features -- 3.3 RSXSUMO Model Construction -- 3.4 Comparison with Other Predictors -- 4 Conclusion -- References -- A Model for Alliance Partner Selection Based on GM (1, 1) and DEA Frameworks - Case of Vietnamese Coffee Industry -- 1 Introduction -- 2 Related Works -- 2.1 Strategic Alliance. 2.2 Grey Forecasting Model -- 2.3 Data Envelopment Analysis -- 3 Proposal Research -- 4 Case Study -- 4.1 DMU Collection -- 4.2 Inputs and Outputs Selection -- 4.3 Forecast the Performance of All DMU by GM (1, 1) Model. -- 4.4 Analysis Performance Before Alliance -- 4.5 Analysis the Performance After Alliance -- 5 Conclusions -- References -- Car Detector Based on YOLOv5 for Parking Management -- 1 Introduction -- 2 Related Works -- 2.1 Traditional Machine Learning-Based Methods -- 2.2 CNN-Based Methods -- 3 Methodology -- 3.1 Proposed Network Architecture -- 3.2 Loss Function -- 4 Experiments -- 4.1 Datasets -- 4.2 Experimental Setup -- 4.3 Experimental Results -- 4.4 Ablation Study -- 5 Conclusion -- References -- Deep Learning-Based Approach for Automatic Detection of Malaria in Peripheral Blood Smear Images -- 1 Introduction -- 2 Related Works -- 3 Experiments -- 3.1 Data Collection -- 3.2 Exploratory Data Analysis -- 3.3 Two-Stage Approach -- 4 Results and Discussions -- 4.1 Evaluation Metrics -- 4.2 Results -- 5 Conclusion -- References -- An Improved Transfer Learning-Based Approach for Detecting Abnormal Cervical Cells from Pap Smear Microscopic Images -- 1 Introduction -- 2 Abnormal Cervical Cells and Preprocessing Data -- 2.1 Abnormal Cervical Cells -- 2.2 Exploratory Data Analysis and Preprocessing -- 3 Transfer Learning and Proposed Approach -- 3.1 ResNet50v2 -- 3.2 EfficientNetv2L -- 3.3 Proposed Approach Based on Transfer Learning -- 4 Experimental Results -- 5 Conclusion -- References -- Digital Economy -- Emotional Intelligence and Social Media Site Experiences' Effects on College Choice Behavior: The Mediating Role of Brand Attitude -- 1 Introduction -- 2 Theoretical Background and Hypotheses -- 2.1 Website Experiences and Emotional intelligence -- 2.2 The Attitude Toward Website Model - AWS Model. 2.3 The Research Model and Hypotheses -- 3 Research Method -- 4 Research Result -- 4.1 Descriptive Data Statistics -- 4.2 Reliability Test Results -- 4.3 Exploratory Factor Analysis (EFA) Results -- 4.4 Research Model Testing -- 5 Discussion -- 6 Conclusion -- References -- Image and Natural Language Processing -- A Multi Context Decoder-based Network with Applications for Polyp Segmentation in Colonoscopy Images -- 1 Introduction -- 2 Related Work -- 2.1 Vision Transformer -- 2.2 Fusion On Multi Resolution Feature Map -- 3 Methodology -- 3.1 Overview -- 3.2 Generate Context Feature Map (GCF) -- 3.3 Decoder Block -- 4 Experiments -- 4.1 Dataset -- 4.2 Evaluation Metrics -- 4.3 Implementation Details -- 4.4 Representative Results -- 4.5 Comparative Results -- 5 Conclusion -- References -- AMG-Mixer: A Multi-Axis Attention MLP-Mixer Architecture for Biomedical Image Segmentation -- 1 Introduction -- 2 Related Work -- 3 Proposed Network Architecture -- 3.1 AxialMBConv Token Mix and Mixer Building Block -- 3.2 Multi-scale Multi-axis MLP Gated (MS-MAMG) -- 3.3 Decoder Unit -- 4 Experiments -- 4.1 Datasets -- 4.2 Training Strategy -- 4.3 Evaluation Metrics -- 4.4 Representative Results -- 4.5 Comparative Results -- 5 Conclusion -- References -- Investigating YOLO Models for Rice Seed Classification -- 1 Introduction -- 2 Methodology -- 2.1 YOLOv5 -- 2.2 YOLOv6 -- 2.3 YOLOv7 -- 3 Experiments and Results -- 3.1 Data Description -- 3.2 Performance Indicator -- 3.3 Result and Discussion -- 4 Conclusion -- References -- Extending OCR Model for Font and Style Classification -- 1 Introduction -- 2 Related Works -- 3 Methods -- 3.1 Problem Formulation -- 3.2 Overview -- 3.3 Encoder -- 3.4 Decoder -- 3.5 Image-wise Font Clsasification -- 3.6 Style Classification -- 3.7 Loss Function -- 4 Experiments -- 4.1 Experiment Setting -- 4.2 Benchmarks. 4.3 Experiment Result and Discussion -- 5 Conclusion -- References -- STG-SimVP: Spatiotemporal GAN-Based SimVP for Video Prediction -- 1 Introduction -- 2 Related Work -- 2.1 Video Frame Synthesis -- 2.2 Generative Adversarial Networks - GAN -- 2.3 SimVP -- 3 Proposed Methods -- 3.1 STG-SimVP -- 3.2 Dual Discriminators -- 3.3 Objective Function -- 4 Experiments -- 4.1 Datasets -- 4.2 Training Details -- 4.3 Comparisons With State-of-the-Art Methods -- 5 Ablation Study -- 6 Limitations -- 7 Conclusion -- References -- Tritention U-Net: A Modified U-Net Architecture for Lung Tumor Segmentation -- 1 Introduction -- 2 Tritention U-Net Architechture (TU-Net) -- 2.1 Architechture Overview -- 2.2 Backbone U-Net Architecture -- 2.3 Tritention Gate -- 3 Experimental and Results -- 3.1 Dataset -- 3.2 Experimental Setup -- 3.3 Results -- 4 Conclusion -- References -- Multi-modal with Multiple Image Filters for Facial Emotion Recognition -- 1 Introduction -- 2 Multiple Filter Levels for FER -- 2.1 Multiple Model -- 2.2 Dropping Pixels - Processor -- 2.3 Blurring Image - Processor -- 3 Experimental and Results -- 3.1 Dataset -- 3.2 Experimental Setup -- 3.3 Results -- 4 Conclusion -- References -- Few-Shots Novel Space-Time View Synthesis from Consecutive Photos -- 1 Introduction -- 2 Related Work -- 3 Proposed Methods -- 3.1 Background: Neural Scene Flow Fields (NSFF) -- 3.2 NSFF with Encoder -- 4 Experiments -- 4.1 Implement Details -- 4.2 Evaluations -- 5 Limitations -- 6 Conclusion -- References -- Information Technology Skills Extractor for Job Descriptions in vku-ITSkills Dataset Using Natural Language Processing -- 1 Introduction -- 2 Preliminary -- 3 Construct IT Skills Dictionary and vku-ITSkills Dataset -- 4 The Proposed NLP Pipeline for IT Skills Extractor -- 4.1 Tokenizer -- 4.2 Transformers Based Token Embedding. 4.3 Part of Speech (POS) Tagging, Noun Phrases and Combination Rules. |
| Record Nr. | UNINA-9910736019003321 |
Nguyen Ngoc Thanh
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
12th International Conference on Information Systems and Advanced Technologies “ICISAT 2022” : Intelligent Information, Data Science and Decision Support System / / edited by Mohamed Ridda Laouar, Valentina Emilia Balas, Brahim Lejdel, Sean Eom, Mohamed Amine Boudia
| 12th International Conference on Information Systems and Advanced Technologies “ICISAT 2022” : Intelligent Information, Data Science and Decision Support System / / edited by Mohamed Ridda Laouar, Valentina Emilia Balas, Brahim Lejdel, Sean Eom, Mohamed Amine Boudia |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (586 pages) |
| Disciplina | 006.3 |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Computational Intelligence Data Engineering |
| ISBN | 3-031-25344-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Contents -- Modelling of Propagation Loss for Single Trees Using Simulated Coppice at Microwave Frequencies -- 1 Introduction -- 2 Measurement Details -- 3 Conclusion -- References -- A New Collective Simulated Annealing with Adapted Objective Function for Web Service Selection -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 4 Experimentation -- 5 Case Study -- 6 Conclusion -- References -- An Image Encryption-Based Method for Handwritten Digit Recognition -- 1 Introduction -- 2 Related Works -- 3 Image Encryption Systems -- 3.1 RSA Encryption -- 3.2 ECC Encryption -- 3.3 Chaos Encryption -- 3.4 Knight Encryption -- 3.5 Arnold Encryption -- 3.6 Joseph Encryption -- 4 Proposed Method -- 5 Experimentation and Results -- 6 Conclusion and Perspectives -- References -- The Malaysian Higher Education Students' Perceptions and Acceptance Toward Mobile Learning During the COVID-19 Pandemic -- 1 Introduction -- 1.1 Mobile Learning in Malaysia During the COVID-19 Pandemic -- 2 Purpose and Objectives of the Study -- 3 The Conceptual Framework -- 4 Methodology -- 5 Results and Discussion -- 5.1 Respondent Profile -- 5.2 Perceptions of Mobile Technology Adoption -- 5.3 Mobile Learning Perceptions and Acceptance During the COVID-19 Pandemic -- 5.4 Open-Ended Items -- 6 Conclusion -- References -- Face Masks Use and Face Perception: Social Judgments and Emotion Recognition -- 1 Introduction -- 2 Key Parameters -- 2.1 Sex Recognition -- 2.2 Age Estimation -- 2.3 Trustworthiness -- 2.4 Attractiveness -- 2.5 Approachability -- 2.6 Emotion Perception -- 3 The Current Study -- 3.1 Participants -- 3.2 Materials and Stimuli -- 4 Design -- 4.1 Procedure -- 4.2 Data Analysis -- 5 Results -- 5.1 Experiment 1 -- 5.2 Experiment 2 -- 6 Discussion -- References.
Bibliometric Analysis of Research Publication Trends on the ICT Use in Government Institutions from 2015-2022 -- 1 Introduction -- 2 Literature Review -- 2.1 Use ICT in Government -- 2.2 Bibliometrics Analysis -- 3 Research Methods -- 4 Finding and Discussion -- 4.1 Analysis of Global Publication -- 4.2 Mapping of Co-occurrences Analysis -- 4.3 Topic Classification and Theme Descriptions -- 5 Conclusion -- References -- A Paring-Free ID-Based Authenticated Key Agreement Protocol for IoT Environment -- 1 Introduction -- 1.1 Motivation -- 1.2 Outline of Paper -- 2 Related Work -- 3 Technical Background -- 3.1 Diffie Hellman Key Agreement Protocol -- 3.2 Elliptic Curve Cryptography -- 3.3 ECDL Hard Problem -- 3.4 Computational Diffie-Hellman Hard (CDHP) Problem -- 3.5 Identity-Based Encryption -- 4 Proposed Scheme -- 4.1 Setup -- 4.2 Private Key Extraction -- 4.3 Session Key Agreement -- 5 Security Analysis -- 5.1 MITM Attack -- 5.2 Known Provisionally Information Attack -- 5.3 Known Key Attack -- 5.4 Perfect Forward Security -- 5.5 PKG Forward Security -- 5.6 No Key Dominant -- 5.7 Replication and Unidentified Key Share Attack -- 6 Conclusion -- References -- Intention to Use Hackathon by Information Technology Programming Students -- 1 Introduction -- 2 Literature Review -- 3 Research Methodology -- 3.1 Material, Methods, Research Population and Sample -- 3.2 Instrument Development and Research Hypothesis -- 4 Results and Discussion -- 4.1 Reliability Analysis -- 4.2 Factor Analysis -- 4.3 Level of Hackathon Acceptance -- 4.4 Correlation Analysis -- 5 Conclusion, Recommendation, and Future Studies -- References -- Clustering Algorithms for Wireless Sensor Networks: A Review -- 1 Introduction -- 2 Overview on Clustering Mechanism -- 3 Analysis of Relevant Clustering Algorithms in WSNs -- 3.1 Literature Review. 3.2 Classification of Clustering Techniques -- 4 Comparison Between Some Relevant Clustering Algorithms -- 5 Conclusion -- References -- Vision Sensor Surveillance for Online Stationary Object Detection Based on Basic Sequential Clustering -- 1 Introduction -- 2 Method Schema -- 3 Background Model and Foreground Estimation -- 4 Stationary Luggage Detection -- 4.1 Stationary Object Detection -- 4.2 MRF Framework -- 4.3 Stationary Human Event Elimination -- 5 Experimental Results -- 6 Conclusion -- References -- A Fuzzy Navigation Approach Using the Intelligent Lights Algorithm for an Autonomous Mobile Robot -- 1 Introduction -- 2 Related Works -- 2.1 Smarts Light Control System -- 2.2 Fuzzy Logic -- 2.3 Bee Colony Optimization (BCO) -- 2.4 Artificial Bee Colony -- 2.5 Neural Network -- 2.6 Particle Swarm Optimization -- 2.7 Genetic Algorithm -- 3 Methodology -- 3.1 The Smart Lights Control System -- 3.2 Discussion -- 4 Conclusion -- References -- Emotion Analysis of Social Media Content for Mental Health Improvement -- 1 Introduction -- 1.1 Anxiety -- 1.2 Stress -- 1.3 Depression -- 1.4 Loneliness -- 1.5 Eating Disorders -- 2 Overview -- 3 Methodology -- 3.1 Data Preprocessing -- 3.2 Sentiment Analysis of Tweet Content -- 3.3 Emotion Analysis of Tweet Content -- 4 Discussion -- 5 Limitations -- 6 Conclusion and Perspectives -- References -- Named Entity Recognition for Algerian Arabic Dialect in Social Media -- Abstract -- 1 Introduction -- 2 Algerian Dialect: Overview and Specificities -- 3 Related Work -- 4 Methodology -- 5 Arabic Pre-trained Models -- 5.1 AraBERT -- 5.2 MARBERT -- 5.3 ARBERT -- 5.4 DziriBERT -- 5.5 mBERT -- 6 Experiments -- 6.1 Dataset -- 6.2 Experimentation Setup -- 7 Results -- 8 Discussion -- 9 Conclusion -- References -- Protection of Nurse-Sys Platform from Man-In the Middle Attacks -- 1 Introduction. 2 Hardware Design and Testing -- 3 Neuro-Fuzzy Modeling -- 4 Attack Session Hijacking -- 5 Results and Discussion -- 5.1 Temperature Sensor Design -- 5.2 Analyzing Data in Server -- 6 Conclusion -- References -- On the Effectiveness of Dimensionality Reduction Techniques on High Dimensionality Datasets -- 1 Introduction -- 2 Materials and Method -- 2.1 Related Works -- 2.2 Data Normalization -- 2.3 Dimensionality Reduction Methods -- 3 Dataset Evaluation -- 4 Results and Discussion -- 5 Conclusion -- References -- Industries Application of Type-2 Fuzzy Logic -- 1 Introduction -- 2 T2FL is Used in Pattern Classification -- 3 T2FL is Used in the Classification -- 4 T2FL is Used in Intelligent Control -- 5 T2FL is Used in Other Regions of Use -- 5.1 Assembly Plants and Companies are Standard Techniques -- 5.2 Uses in the Manufacturing and Service Sectors -- 5.3 Uses Relating to Communication and Technologies -- 6 A Broad Review of the Industry and Its Prospects -- 7 Discussion -- 8 Conclusion -- References -- New Research Methodology to Analyze Time Series and Correlations' Reliability -- 1 Introduction -- 2 The Framework -- 2.1 CReMIT Module -- 2.2 Analysis Module (AM) -- 2.3 Random Correlations (RC) -- 3 Implementation of the Framework -- 4 Conclusion -- References -- A Comparative Study of Filter Feature Selection Methods on Microarray Data -- 1 Introduction -- 2 Related Works -- 3 Methods and Materials -- 3.1 ReliefF -- 3.2 Chi-Square -- 3.3 Mutual Information -- 3.4 Fisher Score -- 3.5 F-Score -- 3.6 Laplacian Score -- 3.7 Conditional Mutual Information Maximization (CMIM) -- 3.8 Minimum Redundancy Maximum Relevance -- 4 Results and Discussion -- 4.1 Datasets -- 5 Conclusion -- References -- Glaucoma Detection Using Optimal Batch Size for Transfer Learning and Ensemble Model Techniques -- 1 Introduction -- 2 Related Works -- 2.1 Pre-trained CNN. 2.2 Generative Models -- 3 Contribution of the Paper -- 4 Method Overview -- 4.1 Pre-processing -- 4.2 Fine-Tuned Models -- 4.3 Batch Size Optimization -- 4.4 Ensemble Models -- 5 Experimental Results -- 5.1 Datasets Presentation -- 5.2 Method Performance -- 5.3 Training Time and Accuracy Comparison -- 5.4 Comparative Results -- 6 Discussions -- 7 Conclusion -- References -- A Semantic Interoperability Approach for Heterogeneous Meteorology Big IoT Data -- 1 Introduction -- 2 Related Work -- 3 Approach Overview -- 3.1 BID Sensing Module -- 3.2 BID Semantic Module -- 3.3 BID Cloud Module -- 4 Use Case and Implementation -- 4.1 Analysis of Collected Data -- 4.2 Creation and Population of the SWR Ontology -- 4.3 Querying the KB and Viewing Data -- 4.4 Publication of SWR on LOD Cloud -- 4.5 Using SWR on the Web -- 5 Conclusion and Future Work -- References -- Delineation of Raining Cloud Using a WkNN from Multispectral Data of SEVIRI Radiometer -- 1 Introduction -- 2 Region of Study and Data -- 2.1 Region of Study -- 2.2 The Data -- 3 Methodology -- 3.1 Application -- 4 Results and Discussion -- 5 Conclusions -- References -- Water Quality Monitoring Systems for Sub-saharan Africa: Towards an Effectiveness Framework -- 1 Introduction -- 2 Background -- 3 Effectiveness Framework -- 4 Research Design and Methodology -- 5 Findings and Discussion -- 5.1 In Situ Water Quality Monitoring Systems (In Situ) -- 5.2 Wireless Sensor Network Water Quality Monitoring Systems (WSN) -- 5.3 IoT and Cloud Computing Smart Water Quality Monitoring Systems (SWQMS) -- 5.4 Summary of Findings -- 6 Conclusion -- References -- Insect Recognition and Classification Using Optimized Densely Connected Convolutional Neural Network -- 1 Introduction -- 2 Literature Review -- 2.1 Automated Insect Species Identification Models -- 2.2 Local Feature Based Insect Recognition. 2.3 Combination Model. |
| Record Nr. | UNINA-9910647785303321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 13th Conference on Information Technology and Its Applications : Proceedings of the International Conference CITA 2024 / / edited by Ngoc Thanh Nguyen, Cong-Phap Huynh, Thanh Thuy Nguyen, Nhien-An Le-Khac, Quang-Vu Nguyen
| The 13th Conference on Information Technology and Its Applications : Proceedings of the International Conference CITA 2024 / / edited by Ngoc Thanh Nguyen, Cong-Phap Huynh, Thanh Thuy Nguyen, Nhien-An Le-Khac, Quang-Vu Nguyen |
| Autore | Nguyen Ngoc Thanh |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (559 pages) |
| Disciplina | 004 |
| Altri autori (Persone) |
HuynhCong-Phap
NguyễnThanh Thủy Le-KhacNhien-An NguyenQuang-Vu |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Engineering - Data processing
Computational intelligence Artificial intelligence Data Engineering Computational Intelligence Artificial Intelligence |
| ISBN |
9783031741272
3031741277 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | MiRNA disease associations prediction based on improving feature vectors quality combined with highly reliable negative samples selection -- signBEER Decentralized Optimization with Improved Communication by Signs -- Frequency spatial Feature Fusion Network for Infrared and Visible Image Fusion -- Combining Lora With AR In IoT Enabled Smart Farm Monitoring -- AI Fitness Trainer using 3D Human Pose Estimation and Dynamic Time Warping -- A Non Test Driver Concolic Based Unit Testing Method for Java Projects -- Deep Learning Based Convolutional Neural Network for Crash Severity Prediction -- Enhanced Attention based Multimodal Deep Learning for Product Categorization on E commerce Platform -- Pre trained Self Attention Framework An Efficient Mechanism for Source Separation -- Meta heuristic for a flight service scheduling problem in Viet Nam -- Implementation of a VCO based ADC on TSMC CMOS 65nm for Audio Applications -- Federated Learning of Random Oblique Stumps Tailored on the Raspberry Pi Zero for the ImageNet Challenge -- COMBINATION OF GALE SHAPLEY AND PESA II ALGORITHM IN STUDENT UNIVERSITY MATCH -- Optimising Deep Learning for Wearable Sensor based Fall Detection -- A New Approach for Concept Drift Detection in Visual Data -- cMDTPS Comprehensive Masked Modality Modeling with improved similarity distribution matching loss for Text based Person Search -- Implementing Efficient Memory Based Collaborative Filtering Recommendation Systems Methods for Improving Scalability in Training Phase -- A Case Study Evaluating Improved Performance in Image Classification Through Combination of CBAM and ShuffleNetV2 Model -- BERT based model for Vietnamese Fact Verification Dataset -- Statistical vs Neural Machine Translations for Khmer Braille -- Exploring Scalability in Large Scale Time Series in DeepVATS framework -- GEO An Approach for Out of Distribution Detection in Graph Neural Networks using Energy Scoring and One Class Learning -- COLLISION AVOIDANCE PROBLEM FOR ROBOTS IN SMART WAREHOUSES USING A FOCUSED DECENTRALIZED REINFORCEMENT LEARNING MODEL -- Data Augmentation Methods for Cross device Acoustic Scene Classification -- In depth with Spatial Temporal Graph Neural Networks for Traffic Forecasting An overview with Attention -- A group decision model using picture fuzzy rough approximation space -- Sentiment Analysis of Airline Customer Reviews in Vietnamese Language using Deep Learning -- How does Data Augmentation Affect to Model Performance in Long Tailed Classification? -- Improved Tomato Detector Supporting for Automatic Harvesting Systems -- Multi scale Convolutions Meet Group Attention for Dense Prediction Tasks -- Small Object Detection with Attention free Transformer for Aerial Surveillance System -- A Lightweight based Architecture for Nuclei Segmentation in Histopathology Images -- MCST Net A Multi Cross Spatial attention U net with Transformer block for Skin Lesion Segmentation -- Governance in Digital Entrepreneurship Ecosystems A Narrative Review -- Exploring Determinants of E banking Non adoption among Customers A case study in Export Import Commercial Joint Stock Bank, Vietnam -- Factors influencing the organizational commitment of employees in the digital work environment A case of Dak Lak province in Vietnam -- Enhanced the GMr (1,1) Model in Forecasting and Decision – Making -- RadSense Radio Sensing for Crime Monitoring in Restricted Access Areas -- An Effective Unsupervised Cyber Attack Detection on Web Applications using Gaussian Mixture Model -- 5G Core Security An Insider Threat Vulnerability Assessment -- Advancing Security in SDN IoT Networks DL Based Autonomous Anomaly Detection with Enhanced Cross Validation for Poisoning Attack Detection -- Multimodal Deep Learning Feedback for Generating Evasive Malware Samples against Malware Detector -- Advancing Phishing Attack Detection with A Novel Dataset and Deep Learning Solution. |
| Record Nr. | UNINA-9910906200503321 |
Nguyen Ngoc Thanh
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado
| 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020) / / edited by Álvaro Herrero, Carlos Cambra, Daniel Urda, Javier Sedano, Héctor Quintián, Emilio Corchado |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (xvii, 472 pages) : illustrations |
| Disciplina | 005.8 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Data protection Computational Intelligence Data Engineering Data and Information Security |
| ISBN | 3-030-57805-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910863154003321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
13th International Conference on Information Systems and Advanced Technologies “ICISAT 2023” : New Trends in Artificial Intelligence, Computing and Decision Making. Volume 2 / / edited by Mohamed Ridda Laouar, Valentina Emilia Balas, Vincenzo Piuri, Dana Rad, Zineb Touati Hamad, Abbas Cheddad
| 13th International Conference on Information Systems and Advanced Technologies “ICISAT 2023” : New Trends in Artificial Intelligence, Computing and Decision Making. Volume 2 / / edited by Mohamed Ridda Laouar, Valentina Emilia Balas, Vincenzo Piuri, Dana Rad, Zineb Touati Hamad, Abbas Cheddad |
| Autore | Laouar Mohamed Ridda |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (203 pages) |
| Disciplina | 006.3 |
| Altri autori (Persone) |
BalasValentina Emilia
PiuriVincenzo RadDana Touati HamadZineb CheddadAbbas |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Computational Intelligence Data Engineering |
| ISBN | 3-031-60594-2 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
Intro -- Contents -- Perspectives of TinyML-Based Self-management in IoT-Based Systems -- 1 Introduction -- 2 Background Information -- 2.1 Self-management -- 2.2 IoT-Based Systems -- 3 Self-management Issues in IoT-Based Systems -- 3.1 Increasing Complexity of IoT Software Systems -- 3.2 Challenges Specific to Self-management of IoT-Based Systems -- 4 Needs and Requirements for an Effective Self-management Solution -- 5 TinyML -- 5.1 Definition -- 5.2 Fundamental Principles of TinyML -- 6 TinyML-Based Self-management for IoT-Based Systems -- 6.1 Motivations -- 6.2 Current Limitations -- 7 Future Prospects and Opportunities -- 7.1 Evolution of TinyML and Related Techniques -- 7.2 Integrating TinyML into Existing IoT Management Architectures -- 7.3 Practical Implications and Potential Applications -- 8 Conclusion -- References -- Blockchain Technology for Absence Tracking -- 1 Introduction and Related Works -- 2 Preliminaries -- 2.1 Principale of Blockchain Technology -- 2.2 Smart Contracts -- 2.3 Transaction -- 2.4 Wallet -- 3 Our Approach -- 3.1 Global Architecture of Our System -- 4 Experimentation -- 5 Discussion -- 6 Conclusion -- References -- Deep Neural Network Binary Classification for Malware Detection: A Parametric Study -- 1 Introduction -- 2 Malware Detection Techniques -- 3 State of the Art -- 4 Datasets -- 5 Used Deep Learning Architecture -- 6 Results and Discussion -- 7 Conclusion and Perspectives -- References -- An Overview of Formal Verification of Network-on-Chip (NoC) Methods -- 1 Introduction -- 2 Network on Chip Architecture -- 3 Network on Chip and Formal Verification -- 4 Related Works -- 5 Conclusion -- References -- Image Classification Using a Deep Convolutional Neural Network -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 4 Experimental Results -- 5 Conclusion -- References.
Handwriting Recognition Using HOG and Gabor Features -- 1 Introduction -- 2 Related Works -- 3 Proposed Methods -- 4 Experimental Results -- 5 Conclusions -- References -- Application of Faster-RCNN with Detectron2 for Effective Breast Tumor Detection in Mammography -- 1 Introduction -- 2 Related Works -- 3 Method -- 3.1 Data Preparation and Augmentation -- 3.2 Detection Model -- 4 Experiment and Results -- 4.1 Dataset -- 4.2 Dataset Preprocessing -- 4.3 Evaluation and Performance -- 4.4 Our Model -- 4.5 Results and Discussion -- 5 Conclusion -- References -- Explaining Machine Learning Based Speed Anomaly Detection System Using eXplainable Artificial Intelligence -- 1 Introduction -- 2 Related Literature Review -- 3 The Proposed Method -- 3.1 The System Model -- 3.2 Dataset Description -- 3.3 The Methodology -- 4 Results and Discussion -- 4.1 Comparisons Between Classifiers -- 4.2 Comparison with Recent Works in the Literature -- 4.3 Explanation -- 5 Conclusion and Future Work -- References -- Enhanced CNN Architecture with Comprehensive Performance Metrics for Emotion Recognition -- 1 Introduction -- 2 Literature Survey -- 2.1 CNN Approach for Emotion Recognition via EEG -- 2.2 Real-Time Evaluation Algorithm for Noncontact Heart Rate Variability Monitoring -- 2.3 System of Emotion Recognition and Judgment and Its Application in Adaptive Interactive Game -- 2.4 Dual-Branch Dynamic Graph Convolution Based Adaptive Transformer Feature Fusion Network for EEG Emotion Recognition -- 2.5 Adaptive Gamification in Science Education -- 3 Problem Statement -- 4 Proposed Methodology -- 5 Result -- 6 Conclusion -- References -- Pelican Search Optimization for MANETs Routing -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach AODVPE -- 3.1 Source of Inspiration -- 4 Implementation and Experimental Results -- 4.1 Implementation Details. 4.2 Results and Discussion -- 5 Discussion -- 6 Conclusion -- References -- Detection of Obstructive Sleep Apnea Based on Deep Learning Models from ECG Signals: A Review -- 1 Introduction -- 2 Methodology -- 2.1 Datasets -- 2.2 Preprocessing and Segmentation -- 2.3 Deep Learning Architectures -- 2.4 Performance Metrics -- 3 Deep Learning Techniques for OSA Detection -- 4 Discussion -- 5 Conclusion -- References -- MPPT Controller Based on Adaptive Pid Based on Programmed Gains for Maximum Power Point Tracking in a Photovoltaic Power Plant with a Battery Load -- 1 Introduction -- 2 General Diagram of the PV System -- 3 General Diagram of the PV System -- 3.1 Mathematical Model -- 4 Simulink Library Model -- 4.1 Design of DC/DC Step-Down Converter (Buck) -- 4.2 Adaptive PID Controller with Programmed Gains -- 5 Controller Performance Indexes -- 5.1 PV Module Validation -- 6 Results -- 7 Conclusions -- References -- Optimal Reconfiguration of Electric Power Distribution Networks -- 1 Introduction -- 2 Methodology -- 2.1 Distribution Network Reconfiguration Model -- 2.2 Methodology for Optimal Distribution Network Reconfiguration -- 2.3 Final Model -- 3 Results -- 3.1 Discussion Analysis -- 4 Conclusions -- References -- QFANet: A New Communication Model Base on Tree Architecture for Flying Ad Hoc Networks -- 1 Introduction -- 2 Related Work -- 2.1 Centralized Architecture -- 2.2 Satellite Architecture -- 2.3 Cellular Architecture -- 2.4 Single Group Ad Hoc Architecture -- 2.5 Multi-group UAVs Ad Hoc Architecture -- 2.6 Multi Layers UAVs Ad Hoc Architecture -- 3 The Proposed Communication Model QFANet -- 4 Simulation -- 5 Conclusion -- References -- VAAD: A VAE Based Anomaly Detection Approach for Smart Grids -- 1 Introduction -- 2 Literature Review -- 2.1 Traditional Approaches -- 2.2 Machine Learning in Anomaly Detection. 2.3 Variational Autoencoders (VAEs) -- 2.4 Context-Aware Anomaly Detection -- 3 Proposed VAAD Approach -- 3.1 Data Preprocessing -- 3.2 Variational Autoencoder Architecture -- 3.3 Contextual and Temporal Integration -- 3.4 Noise-Tolerant Concept Drift Detection -- 3.5 Anomaly Identification -- 4 Case Study -- 4.1 Dataset Description -- 4.2 Results -- 4.3 Discussion -- 5 Conclusion -- References -- DNA Data Encoding and Compression Using Image Compression Algorithms -- 1 Introduction -- 2 Literature Review -- 2.1 DNA Compression -- 2.2 Applications of DNA Compression -- 2.3 DNA Sequencing -- 3 Image-Based DNA Encoding -- 4 Conclusion -- References -- Generalized Multistage Feature for Deep Age Estimation from a Human Face Image -- 1 Introduction -- 2 State of the Art -- 3 Proposed System -- 3.1 Preprocessing -- 3.2 Face Features Extraction -- 3.3 Dimensionality Reduction -- 3.4 Robust Regression Step -- 4 Experimental Framework -- 4.1 Databases -- 4.2 Evaluation Protocol -- 4.3 Experımental Results -- 5 Conclusion -- References -- Enhancing Intrusion Detection Systems Through Simultaneous Feature Selection and Hyperparameter Tuning -- 1 Introduction -- 2 Related Works -- 3 Proposed Approach -- 3.1 Representation of Individuals/population -- 3.2 Fitness Evaluation -- 4 Experiments and Results -- 4.1 Dataset -- 4.2 Experiments -- 4.3 Evaluation Metrics -- 4.4 Experimental Results -- 5 Conclusion -- References -- A Hybrid Genetic Algorithm for Hierarchical Routing in Wireless Sensor Networks -- 1 Introduction -- 2 Literature Review -- 3 Proposed Approach -- 3.1 General Description and Objectives of the GF Scheme -- 4 Experimental Analysis -- 4.1 Simulation Step -- 4.2 Results and Discussion -- 5 Conclusion -- References -- Energy-Aware LEACH: A Weighted Metric Approach for Dynamic Cluster Head Selection in WSN -- 1 Introduction. 1.1 LEACH Protocol Overview -- 1.2 Contributions to This Paper -- 1.3 Energy Model -- 1.4 Assumptions -- 2 Related Works -- 3 Proposed Work -- 3.1 Cluster Head Selection Approach -- 4 Implementation and Experimental Results -- 4.1 Performance Metrics -- 5 Conclusion -- References -- Author Index. |
| Record Nr. | UNINA-9910878055903321 |
Laouar Mohamed Ridda
|
||
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
13th International Conference on Information Systems and Advanced Technologies “ICISAT 2023” : New Trends in Artificial Intelligence, Computing and Decision Making. Volume 1 / / edited by Mohamed Ridda Laouar, Valentina Emilia Balas, Vincenzo Piuri, Dana Rad, Zineb Touati Hamad, Abbas Cheddad
| 13th International Conference on Information Systems and Advanced Technologies “ICISAT 2023” : New Trends in Artificial Intelligence, Computing and Decision Making. Volume 1 / / edited by Mohamed Ridda Laouar, Valentina Emilia Balas, Vincenzo Piuri, Dana Rad, Zineb Touati Hamad, Abbas Cheddad |
| Edizione | [1st ed. 2024.] |
| Pubbl/distr/stampa | Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 |
| Descrizione fisica | 1 online resource (252 pages) |
| Disciplina | 006.3 |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Computational Intelligence Data Engineering |
| ISBN | 3-031-60591-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910882892303321 |
| Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) / / edited by Juan José Gude Prego, José Gaviria de la Puerta, Pablo García Bringas, Héctor Quintián, Emilio Corchado
| 14th International Conference on Computational Intelligence in Security for Information Systems and 12th International Conference on European Transnational Educational (CISIS 2021 and ICEUTE 2021) / / edited by Juan José Gude Prego, José Gaviria de la Puerta, Pablo García Bringas, Héctor Quintián, Emilio Corchado |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (430 pages) |
| Disciplina | 006.3 |
| Collana | Advances in Intelligent Systems and Computing |
| Soggetto topico |
Computational intelligence
Engineering - Data processing Computational Intelligence Data Engineering |
| ISBN | 3-030-87872-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | BIECO Runtime Auditing Framework -- Basic aspects in redundancy-based intrusion tolerance -- A Survey on the State of the Art of Vulnerability Assessment Techniques -- Comparison of Safety and Security analysis techniques -- Longitudinal study of grades for the Industrial Electronics and Automation Engineering degree programme -- Analysis of students' online interactions in the Covid era from the perspective of anomaly detection -- Evaluation of e-learning criteria to improve the academic and functional results of PhD studies -- Development of competencies applying the project method. Application in environmental engineering -- Bioengineering as a strategy for the consolidation of innovation and technological development processes in the central zone of Colombia -- Challenges and competences in Master Degrees from a Comprehensive Security perspective. |
| Record Nr. | UNINA-9910733725203321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 15th International Conference Interdisciplinarity in Engineering : Conference Proceedings / / edited by Liviu Moldovan, Adrian Gligor
| The 15th International Conference Interdisciplinarity in Engineering : Conference Proceedings / / edited by Liviu Moldovan, Adrian Gligor |
| Edizione | [1st ed. 2022.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 |
| Descrizione fisica | 1 online resource (869 pages) |
| Disciplina |
658.4038028563
620 |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Engineering mathematics
Engineering - Data processing Industrial engineering Production engineering Computational intelligence Mathematical and Computational Engineering Applications Industrial and Production Engineering Computational Intelligence |
| ISBN | 3-030-93817-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910522558503321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The 16th International Conference Interdisciplinarity in Engineering : Inter-Eng 2022 Conference Proceedings / / edited by Liviu Moldovan, Adrian Gligor
| The 16th International Conference Interdisciplinarity in Engineering : Inter-Eng 2022 Conference Proceedings / / edited by Liviu Moldovan, Adrian Gligor |
| Edizione | [1st ed. 2023.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 |
| Descrizione fisica | 1 online resource (934 pages) |
| Disciplina |
929.374
620 |
| Collana | Lecture Notes in Networks and Systems |
| Soggetto topico |
Engineering mathematics
Engineering - Data processing Industrial engineering Production engineering Computational intelligence Mathematical and Computational Engineering Applications Industrial and Production Engineering Computational Intelligence |
| ISBN | 3-031-22375-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910635387903321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2023 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||