Vai al contenuto principale della pagina

Intelligent communication technologies and virtual mobile networks : proceedings of ICICV 2022 / / G. Rajakumar [and three others]



(Visualizza in formato marc)    (Visualizza in BIBFRAME)

Titolo: Intelligent communication technologies and virtual mobile networks : proceedings of ICICV 2022 / / G. Rajakumar [and three others] Visualizza cluster
Pubblicazione: Singapore : , : Springer, , [2022]
©2022
Descrizione fisica: 1 online resource (807 pages)
Disciplina: 004.6
Soggetto topico: Computer networks
Wireless communication systems
Persona (resp. second.): RajakumarG
Nota di contenuto: Intro -- Preface -- Acknowledgments -- Contents -- About the Editors -- Implementation of Machine and Deep Learning Algorithms for Intrusion Detection System -- 1 Introduction -- 2 Previous Research Works -- 3 Dataset -- 4 Proposed Methodology -- 4.1 Data Preprocessing -- 4.2 Feature Selection -- 4.3 Machine Learning -- 4.4 Deep Learning -- 4.5 Models -- 5 Evaluation of Models -- 6 Results and Discussion -- 7 Conclusion -- References -- Selection of a Rational Composition of İnformation Protection Means Using a Genetic Algorithm -- 1 Introduction -- 2 Literature Overview and Analysis -- 3 The Objectives and Aim of the Research -- 4 Models and Methods -- 4.1 Formulation of the Problem -- 4.2 Solution Example -- 5 Software Implementation of the Model and Computational Experiment -- 6 Discussion of the Results of the Computational Experiment -- 7 Conclusions -- References -- Classification of Breast Cancer Using CNN and Its Variant -- 1 Introduction -- 2 Literature Review -- 3 Proposed Work -- 3.1 Image Preprocessing -- 3.2 Augmentation -- 3.3 Training and Testing the Model -- 3.4 DenseNet Architecture -- 4 Algorithms Used -- 4.1 Histogram Equalization Method -- 4.2 Adaptive Histogram Equalization -- 5 Performance Metrics -- 6 Experimental Setup -- 6.1 Dataset -- 6.2 Result and Discussion -- 7 Conclusion -- References -- Systematic Approach for Network Security Using Ethical Hacking Technique -- 1 Introduction -- 2 Penetration Testing -- 3 Algorithm -- 4 Proposed System -- 5 Result -- 6 Future Work -- 7 Conclusion -- References -- Analysis of Modulation Techniques for Short Range V2V Communication -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Methodology -- 3.1 BER Calculation for QPSK Modulation Technique -- 3.2 BER Calculation for BPSK Modulation Technique -- 3.3 Calculation of Spectral Efficiency of BPSK:.
3.4 Determination of Spectral Efficiency of QPSK -- 4 Results and Discussion -- 5 Conclusion -- References -- Security Requirement Analysis of Blockchain-Based E-Voting Systems -- 1 Introduction -- 2 Fundamental Concepts -- 3 Related Work -- 4 Requirement Analysis -- 4.1 Functional Requirements (FR) -- 4.2 Nonfunctional Requirements (NFR) -- 4.3 Countermeasures on the Typical Attacks -- 4.4 Security and Privacy Requirements of Voting -- 5 Conclusion -- References -- OTP-Based Smart Door Opening System -- 1 Introduction -- 2 Literature Review -- 3 Existing Method -- 4 Proposed Method -- 4.1 Block Diagram -- 4.2 Flowchart -- 4.3 Arduino -- 4.4 LCD Display -- 4.5 Servomotor -- 4.6 Hardware Specifications -- 5 Result and Discussion -- 6 Conclusion -- References -- Tourist Spot Recognition Using Machine Learning Algorithms -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Data Augmentation -- 3.3 Proposed Method -- 4 Result Analysis -- 5 Conclusion and Future Work -- References -- Heart Disease Predictive Analysis Using Association Rule Mining -- 1 Introduction -- 1.1 Risk Factors Causing Heart Disease -- 2 Literature -- 3 Proposed Method -- 3.1 Association Rule -- 4 Experimental Results -- 5 Conclusion -- References -- Cluster-Enabled Optimized Data Aggregation Technique for WSN -- 1 Introduction -- 2 Related Work -- 3 Proposed Work -- 4 Performance Evaluation -- 5 Conclusion -- References -- Recreating Poompuhar Ancient History Using Virtual Reality -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Work -- 4 Technology Used -- 4.1 Blender -- 4.2 Unity3D -- 4.3 Image-Based Rendering -- 5 Results and Discussion -- 6 Conclusion -- References -- Dynamic Energy Efficient Load Balancing Approach in Fog Computing Environment -- 1 Introduction -- 2 Related Work -- 3 Proposed Architecture -- 3.1 System Design and Model.
4 Performance Evaluation Parameters -- 5 Results and Discussion -- 6 Conclusion and Future Work -- References -- Sentiment Analysis Using CatBoost Algorithm on COVID-19 Tweets -- 1 Introduction -- 2 Literature Review -- 3 Methodology -- 3.1 Dataset -- 3.2 Preprocessing -- 3.3 Counter Vectorizer -- 3.4 Classification of Tweets Using CatBoost Algorithm -- 4 Result Analysis -- 4.1 Results and Discussion for Multiclass Classification -- 4.2 Performing Binary Classification on the Dataset -- 5 Conclusion and Future Work -- References -- Analysis and Classification of Abusive Textual Content Detection in Online Social Media -- 1 Introduction -- 2 Defining Abusive Textual Content -- 2.1 Classification of Online Abusive Content -- 3 Approaches for Detecting Textual Abusive Content -- 4 Abusive Content in Social Media -- 5 Discussion -- 6 Conclusion and Future Scope -- References -- A Survey of Antipodal Vivaldi Antenna Structures for Current Communication Systems -- 1 Introduction -- 2 Antipodal Vivaldi Antennas-Performance Enhancement Techniques -- 3 Recently Proposed AVA Structures -- 3.1 UWB End-Fire Vivaldi Antenna with Low RCS Capability -- 3.2 Balanced Antipodal Vivaldi Antenna with Dielectric Director -- 3.3 High-Gain Antipodal Vivaldi Antenna Surrounded by Dielectric -- 3.4 Notched Band Vivaldi Antenna with High Selectivity -- 3.5 Fern Fractal Leaf Inspired Wideband Antipodal Vivaldi Antenna -- 3.6 Comparison of the AVA Structures in the Literature -- 4 Conclusion -- References -- Survey on Wideband MIMO Antenna Design for 5G Applications -- 1 Introduction -- 2 5G MIMO Antenna, Classifications and Its Performance Enhancement Techniques -- 2.1 MIMO Antenna -- 2.2 Suitable Antennas for 5G Applications -- 2.3 Antenna Performance Enhancement Techniques -- 3 MIMO Wideband Antennas -- 3.1 Wideband Decoupled MIMO Antenna -- 3.2 PIFA-Pair-Based MIMO Antenna.
3.3 Y-Shaped MIMO Antenna -- 3.4 Highly Isolated MIMO Antenna -- 3.5 Compact Four-Element Optically Transparent MIMO Antenna -- 3.6 Comparison of MIMO Wideband Antennas Structures -- 4 Conclusion -- References -- Transprecision Gaussian Average Background Modelling Technique for Multi-vehicle Tracking Applications -- 1 Introduction -- 2 Literature Review -- 3 Proposed Methodology -- 4 Proposed Transprecision Gaussian Adaptive Background Subtraction Methodology -- 4.1 Vehicle Tracking and Counting Stage -- 5 Experimental Results and Discussion -- 6 Conclusion -- References -- Spam Message Filtering Based on Machine Learning Algorithms and BERT -- 1 Introduction -- 2 Related Work -- 3 Experiment Design -- 3.1 Pre-processing the Data -- 3.2 NLP Techniques -- 3.3 Modelling -- 4 Results -- 5 Conclusions -- References -- Li-Fi: A Novel Stand-In for Connectivity and Data Transmission in Toll System -- 1 Introduction -- 2 Principle of Li-Fi -- 3 State of Art of Li-Fi -- 3.1 Li-Fi Products -- 3.2 Li-Fi-Based Smart Cities -- 4 Comparison of Different Existing Connection Technologies -- 5 Comparison of Existing Connection Technologies as an Alternative for Conventional Toll System -- 5.1 Wi-Fi -- 5.2 Bluetooth -- 5.3 Zigbee -- 6 Conventional Toll System -- 7 Prototype Description -- 8 System Requirements -- 8.1 Hardware Requirements -- 8.2 Software Requirements -- 9 System Design -- 9.1 Transmitter Section -- 9.2 Receiver Section -- 10 Results -- 11 Challenges in the Implementation of Li-Fi -- 12 Conclusion and Future Works -- References -- Classification of ECG Signal for Cardiac Arrhythmia Detection Using GAN Method -- 1 Introduction -- 2 Review of the Literature -- 3 Methodology -- 3.1 Baseline Wander -- 3.2 Support Vector Regression -- 3.3 Kernel Principal Component Analysis -- 3.4 General Sparsed Neural Network Classifier (GSNN).
3.5 Generative Adversarial Networks -- 3.6 ECG Transformation -- 3.7 MIT-BIH Dataset -- 4 Experimental Results -- 5 Conclusion -- References -- Classifying Pulmonary Embolism Cases in Chest CT Scans Using VGG16 and XGBoost -- 1 Introduction -- 2 Related Work -- 3 Experiment Design -- 3.1 Dataset -- 3.2 Creating Train and Test Subsets -- 3.3 Model Building -- 3.4 Proposed Methodology -- 4 Results -- 5 Conclusion -- 6 Future Scope -- References -- User Credibility-Based Trust Model for 5G Wireless Networks -- 1 Introduction -- 2 Related Work -- 3 Proposed User Credibility-Based Trust Model for 5G Networks -- 3.1 Direct Credibility Degree Calculation -- 3.2 Indirect Credibility Degree Calculation -- 3.3 Credibility Value Verification -- 4 Conclusion -- References -- Advanced Signature-Based Intrusion Detection System -- 1 Introduction -- 2 Literature Survey -- 3 Proposed Framework -- 4 Experiment and Results -- 5 Conclusion -- References -- A Survey on Detection of Cyberbullying in Social Media Using Machine Learning Techniques -- 1 Introduction -- 1.1 Motivation -- 1.2 Organization -- 2 Background -- 2.1 Impact of Cyberbullying -- 2.2 How to Prevent Cyberbullying -- 3 Related Work -- 4 Conclusion and Future Work -- References -- A Comparison of Similarity Measures in an Online Book Recommendation System -- 1 Introduction -- 2 Literature Review -- 3 Dataset -- 4 Similarity Measures -- 5 Conclusion -- References -- Novel Approach for Improving Security and Confidentiality of PHR in Cloud Using Public Key Encryption -- 1 Introduction -- 1.1 Advantages of PHR -- 1.2 PHR Architecture -- 2 Related Work -- 3 Architecture of Proposed Methodology -- 4 Experimental Setup -- 4.1 RSA and ECC Encryption Technique -- 5 Conclusion and Future Work -- References.
Sentimental Analysis (SA) of Employee Job Satisfaction from Twitter Message Using Flair Pytorch (FP) Method.
Titolo autorizzato: Intelligent Communication Technologies and Virtual Mobile Networks  Visualizza cluster
ISBN: 981-19-1844-9
Formato: Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione: Inglese
Record Nr.: 9910627275703321
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Serie: Lecture Notes on Data Engineering and Communications Technologies