Vai al contenuto principale della pagina

Decision Intelligence Solutions : Proceedings of the International Conference on Information Technology, InCITe 2023, Volume 2



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Autore: Hasteer Nitasha Visualizza persona
Titolo: Decision Intelligence Solutions : Proceedings of the International Conference on Information Technology, InCITe 2023, Volume 2 Visualizza cluster
Pubblicazione: Singapore : , : Springer, , 2024
©2023
Edizione: 1st ed.
Descrizione fisica: 1 online resource (388 pages)
Disciplina: 004
Altri autori: McLooneSeán  
KhariManju  
SharmaPurushottam  
Nota di contenuto: Intro -- Preface -- Contents -- About the Editors -- Dual Band Open Slot and Notch Loaded Bandwidth Enhanced Microstrip Patch Antenna for IoT/WiMAX/WLAN Applications -- 1 Introduction -- 2 Antenna Design -- 3 Design Specifications and Proposed Geometry -- 4 Procedure of Antenna Design -- 5 Results and Discussion -- 6 Conclusion -- References -- Carbon Nanotubes as Interconnects: A Short Review on Modelling and Optimization -- 1 Introduction -- 2 Literature Reviews on Carbon Interconnect -- 3 Conclusions -- References -- AutoML Based IoT Application for Heart Attack Risk Prediction -- 1 Introduction -- 2 Proposed System Architecture -- 3 Methodology Auto ML -- 4 Results -- 5 Conclusion -- References -- An Overview of Security Issues in IoT-Based Smart Healthcare Systems -- 1 Introduction -- 2 Literature Review -- 3 Discussion -- 3.1 Attacks on Smart Health System's Security -- 3.2 Attack's Classification -- 4 Conclusion -- References -- Continuous Integration and Continuous Deployment (CI/CD) Pipeline for the SaaS Documentation Delivery -- 1 Introduction -- 2 Background of Software Solution Delivery Workflow -- 2.1 Lack of Proper Product Technical Documentation for SaaS Customization -- 3 What is CI/CD Pipeline Approach? -- 3.1 CI/CD Code and Manual Doc Approach -- 3.2 Help as a Service (HaaS) -- 3.3 Measuring Success -- 4 Research Methodology -- 4.1 Requirement Gathering and Analysis -- 5 CI/CD Documentation by Example -- 5.1 Objectives and Key Results -- 5.2 Build Automation Workflow -- 5.3 Configure Build Automation Workflow -- 6 An Experimental Study Using the CI/CD Pipeline -- 6.1 Result of the Testing Exercise -- 7 Conclusions -- References -- Secure & -- Trusted Framework for Cloud Services Recommendation-A Systematic Review -- 1 Introduction -- 2 Related Work.
3 SWOT Analysis of Secure and Trusted Framework (STF) for Cloud Services Recommendations -- 3.1 Strengths of STF -- 3.2 Weakness of STF -- 3.3 Opportunities of STF -- 3.4 Threats of STF -- 3.5 This Review Paper Will Be Trying to Answer Some of the Research Questions(RQs) -- 4 Conclusion -- 5 Future Work -- References -- Time-Series Based Prediction of Air Quality Index Using Various Machine Learning Models -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Data Description and Pre-processing -- 3.2 Model Optimization and Training -- 3.3 Performance Evaluation Metrics -- 4 Experimental Result and Discussion -- 5 Conclusion -- References -- The Development of Internet of Things Skills to Enhance Youth Employability in Developing Countries: A Systematic Literature Review -- 1 Introduction -- 2 Background and Motivation for the Study -- 3 Research Method -- 4 Discussion of Findings -- 4.1 Job Opportunities Available for the Youth -- 4.2 Skills for the Youth to Adopt -- 4.3 Recommendations for Developing IoT Skills in Youth -- 5 Conclusion -- References -- Investigating Robotic Process Automation Adoption in South African Banking -- 1 Introduction -- 2 Literature Review -- 2.1 Background -- 2.2 Case Studies of RPA Implementations Specifications -- 3 Research Model -- 3.1 Propositions -- 3.2 Research Approach -- 4 Data Analysis -- 4.1 Data Analysis Technique -- 4.2 Participant Demographics -- 4.3 Thematic Analysis -- 5 Discussion -- 5.1 Technology -- 5.2 Organisation -- 5.3 Environment -- 6 Conclusion -- 6.1 Recommended Further Research -- References -- Calculation of Polarization Conversion Ratio (PCR) of Proposed Polarization Conversion Metamaterials (PCM) is Employed in Reduction of RCS Using AI Techniques for Stealth Technology -- 1 Introduction -- 2 PCM Unit Cell Design -- 3 Artificial Neural Networks -- 4 Data Collection.
4.1 Training Data of PCM -- 4.2 ANN Trained Model -- 5 Validation of Linear Regression Medium Neural Network (LRMNN) -- 6 Result -- 7 Conclusion -- References -- A Mobile Application for Currency Denomination Identification for Visually Impaired -- 1 Introduction -- 2 Related Work -- 3 Proposed Method for Currency Identification -- 3.1 Significant Feature Point Generation -- 3.2 Development of Feature Point Descriptors -- 3.3 Feature Point Matching -- 3.4 Mobile App -- 4 Results and Performance Evaluation -- 5 Conclusions and Future Work -- References -- Deep Belief Network Algorithm-Based Intrusion Detection System in Internet of Things Environments -- 1 Introduction -- 2 Related Work -- 3 Proposed System -- 3.1 Deep Belief Network (DBN) -- 3.2 K Nearest Neighbor -- 3.3 Intrusion Detection System -- 4 Result and Discussion -- 4.1 Environmental Setup -- 4.2 Validation Dataset (Sec) -- 4.3 Accuracy (%) -- 4.4 Mathew Correlation Coefficient (%) -- 5 Conclusion -- References -- Crop Classification Based on Multispectral and Multitemporal Images Using CNN and GRU -- 1 Introduction -- 2 Existing Systems -- 3 Proposed System Design -- 4 Proposed Methodology -- 4.1 Dataset -- 4.2 Data Preprocessing -- 4.3 Data Augmentation -- 4.4 Data Standardization -- 4.5 Train and Test Data Split -- 5 Model Architecture -- 5.1 Flow Diagram -- 5.2 2D CNN Layer -- 5.3 Group Normalization Layer -- 5.4 GRU Layer -- 5.5 Linear Layer -- 6 Results and Comparison -- 6.1 Performance Metrics -- 6.2 Training and Validation Results -- 6.3 Results Comparison -- 7 Conclusion and Future Work -- References -- An IoT-based Arduino System for Client Health Monitoring & -- Interpretation on Account of Basic Essential Markers -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Experimental Results.
4.1 Assessment of Quasi Temperature Mercury Thermometer and Sensor Components (MLX90614) for Bodily Temperature Readings (FI01) -- 4.2 For Those with Respiratory Disease, a Comparison of the MLX90614 Detectors' Measurements of Internal Temperature with a Quasi-Infrared Camera (F101) -- 4.3 A Comparison of the MLX90614 Sensors' Measurements of Core Body Temperature with a Quasi-infrared Camera for Asthmatic Patients (F101). A Subsection Sample -- 5 Conclusions -- References -- A Blockchain Based System for Product Tracing and Tracking in the Supply Chain Management -- 1 Introduction -- 2 Literature Survey -- 3 Methodology -- 3.1 System Design -- 3.2 System Implementation -- 4 Results and Discussion -- 5 Conclusion and Future Work -- References -- Deadline Laxity and Load Imbalance Analysis for Energy Efficient Greedy, Semi-Greedy and Random Fog Scheduling -- 1 Introduction -- 2 Related Work and Objective -- 3 Simulation Set-Up -- 4 Performance Metrics -- 5 Results and Discussion -- 6 Conclusion -- References -- Survey on the Effectiveness of Traffic Sign Detection and Recognition System -- 1 Introduction -- 2 Traffic Sign and Dataset -- 3 Sign Detection and Recognition -- 4 Performance Evalution of the TSDR -- 5 Challenges in Accurate Tsdr -- 6 Conclusion -- References -- Detection of Ductal Carcinoma Using Restricted Boltzmann Machine and Autoencoder (RBM-AE) in PET Scan -- 1 Introduction -- 2 Literature Survey -- 3 Materials and Methods -- 3.1 Restricted Boltzmann Machine (RBM) for Image Extraction -- 3.2 Autoencoder (AE) for Detection -- 4 Materials and Methods -- 4.1 Synthetically Generated PET Scan and Data Normalization -- 4.2 Image Extraction Using RBM -- 4.3 Detection of Malignant and Benign Tumors Using Autoencoder -- 5 Experimentation and Results -- 5.1 Experimentation Setup -- 5.2 Results and Discussion -- 6 Conclusion -- References.
Novel Approach for Network Anomaly Detection Using Autoencoder on CICIDS Dataset -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 Computer Model -- 3.2 CICIDS-2017 Dataset -- 3.3 Proposed Workflow -- 4 Performance Evaluation -- 5 Result and Discussion -- 6 Conclusion and Future Scope -- References -- Predictive Analysis of Road Accidents Using Data Mining and Machine Learning -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 3.1 Defining Problem Statement -- 3.2 Data Collection -- 3.3 Data Cleaning and Preprocessing -- 3.4 Data Analysis (on Various Identified Parameters) -- 3.5 Building Prediction Model -- 3.6 Model Validation, Accuracy Test and Monitoring -- 4 Building Prediction Model -- 4.1 Parameter Identification -- 4.2 Model Training -- 4.3 Prediction Using Linear Regression -- 4.4 Prediction Using Random Forest -- 5 Results and Discussions -- 5.1 Analytical Observations -- 5.2 Prediction Result -- 6 Conclusion -- References -- Digital Shopping Cart with Automatic Billing System -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Existing System -- 4 Flowchart -- 5 Method -- 6 Results and Discussions -- 7 Future Scope -- 8 Conclusion -- References -- Analysis of Automated Music Generation Systems Using RNN Generators -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Artificial Intelligence -- 3.2 Deep Learning -- 3.3 Recurrent Neural Networks (RNN's) -- 3.4 Long Short Term (LSTM) -- 3.5 Architecture of LSTM -- 3.6 Description -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Differential Evolution Image Contrast Enhancement Using Clustering -- 1 Introduction -- 2 Differential Evolution Algorithm -- 3 Related Work -- 4 Proposed Method -- 5 Preciseness of Proposed Method -- 6 Experiment and Results -- 6.1 Comparison -- 7 Conclusion -- References.
Smart Traffic Monitoring System.
Titolo autorizzato: Decision Intelligence Solutions  Visualizza cluster
ISBN: 981-9959-94-2
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910770248203321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes in Electrical Engineering Series